+ a anhn. h 2

Size: px
Start display at page:

Download "+ a anhn. h 2"

Transcription

1 NEW MAJORITY-LOGIC DECODABLE CODES By C. L. CHEN Summary.-A method of the construction of majority-logic decodable codes is presented. Many of the codes constructed are more efficient than any other comparable majority-logic decodable codes previously known. Introduction.-Majority-logic decodable codes are attractive for errorcontrol in data transmission because of their simplicity in implementation. Since Massey introduced the concept of orthogonal parity-check sums in 963 and Rudolph constructed the class of finite geometry codes in 964, a lot of effort has been expended on the construction of majority-logic decodable codes and their decoding schemes. Many important results have been obtained [ -6] In general the decoding of finite geometry codes is considered to be simpler than that of other types of codes. However, the efficiency of finite geometry codes is generally lower than the well-known Bose Chaudhuri-Hocquenghem codes. Thus the construction of efficient majoritylogic decodable codes is an important problem. Recently several authors have generalized the construction of finite geometry codes [6-9], The generalized codes are majority-logic decodable, In addition, many of these codes are more efficient than the original finite geometry codes. In this paper the construction method of linear codes proposed in [o] is used to construct new majority-logic decodable binary codes. Many of these codes constructed are more efficient than any other comparable majority-logic decodable codes previously found including the generalized finite geometry codes. For examples, the new code of length 8 with 69 information digits and a majority-logic decodable distance of 6 has five more information digits than the best majority-logic decodable codes previously found with the same code length and distance, and the new code of length 5 with 44 information digits and a majority-logic decodable distance of 6 has 9 more information digits than the best comparable majority-logic decodable codes previously known. Some of the codes constructed are shown in a table. It is also shown that a special class of the new codes are cyclic codes. Throughout this paper binary codes will be assumed. The readers are assumed to be familiar with linear codes and cyclic codes. Majority-Logic Decoding.-A binary (n,k) linear code of length n with k information digits is a k-dimensional subspace of an n-dimensional vector space over the binary field GF(). Let~= (a,a,,an) be a transmitted code word, E = (r,r,,rn) be a received vector. Define! = (e,e,,en) as the error vector. Then E = ~ +! Leth= (h,h,,hn) be a vector in the null space of the code space. Then the scalar product of~ and his a h a h + a h anhn This work was supported in part by NSF Grant GK-4879 and in part by the Joint services Electronics Program under contract DAAB-7-7-C-59. Dr. Chen is with the Coordinated Science Laboratory, University of Illinois.

2 since a is a code word. r h The scalar product of rand his (~ +!).!; e h () Thus a vector h of the null space of a code forms a parity-check sum that checks on the sum of the values of the error digits at those positions corresponding to the nonzero components of h. Let I be the set of integers corresponding to the nonzero components of h. Since each component of his either zero or one, the parity-check sum of () can be written ass = _E.h. = z.:: e. (la) Now suppose that sums can be formed by a set of J vectors in for a binary linear code the following J taking the scalar products of a received the null space. sl z.:: e. + z.:: e.. Sz z.:: e. + z.:: e. parity-check vector with SJ z.:: ei + z.:: e. J () where the integers in I,I,,IJ are all distinct. Notice that ei appears in every check sum for, and ei appears in at most one of the J check sums for ifi The set of the J check sums is said to be orthogonal on the sums' = Z.:: e. If the number of errors in the received vector is. less than or equal to J/, then the value of s' can be assumed to be if more than J/ of the sts are, and assumed to be O otherwise. Once the value of s' is obtained, s' can be considered a new parity check sum and added to the set of the existing parity check sums. If a set of J check sums orthogonal on a new sum, say S, can be formed from the enlarged set of parity-check sums, then the value of Scan be determined by the majoritylogic decision rule described above. Again, S becomes a new check sum and is added to the set of the existing check sums. If this procedure can be continued until a set of J check sums orthogonal on a single error digit is formed, then the value of the error digit can be determined. The code is said ~o be majority-logic decodable with majority decodable distance d = J+l if every error digit can be determined in this way. Note that d may not be the true minimum distance of the code. In the following sections (n,k,d) denotes a binary linear code of length n with k information digits and a majority-logic decodable distance of d. Construction of New Majority-logic Decodable Codes.-Let c be an (n,k,d ) majority-logic decodable code and c be an (n,k,d ) majoritylogic decodable code. The new code C is defined by C = [zjz = (x,x+y), xec, yecz} The length of code C is n, and the number of information digits is k +k In the following it is shown that code C can be majority logic decoded up to distanced= min(dz,d) Thus d = dz if dz= d. The generator matrix G of code C can be depicted as follows

3 G where G and G are the generator matrices of c and c, respectively. A row vector in G is either a vector of G repeated once or a vector of G. Let H and H be the parity check matrices of c and C respectively. Then the parity check matrix Hof code C is H = Let R = (r,r,,rn,r,,rn) = R+R be a received vector corresponding to the input code word Z = (x,x+y), where R = (r rn), R = (r rn), and xec, yec The error vector E = (e eln e e n) = R-Z can be expressed as E = (E,E ), where E = (e en), E = (e,,e n) Thus R = x+e and R = x+y+e For a vector in H there is a vector ii\ H which is the vector in H repeated once. Thus for a parity check sum S = ifrei in code c, there is a parity check sum S' = ~ (e.+e.) in codec. Therefore, if a set of J = d-l orthogonal check sums on Scan be formed in c, a set of J orthogonal check sums on s' can be formed inc. Following the majoritylogic decoding procedure for code C, the values of (e i+e i), i=l,,,n can be determined provided that the number of errors is less than_.r equal to J/. Since H is a submatrix of H, a set of J orthogonal check sums can be formed in each decoding step for code C. Suppose that the following set of J orthogonal check sums is formed. sl ~ e + S ~ e + ~ e ~ e S3l ~ e + ~ e ier li J Since (ei+ei) has been determined for i orthogonal check sums can be formed. s' ~ e + ~ e. 8 I ~ e + ~ e. sl + L (e+e.) 8 I L e. + L e. ier. S, =.L eli + ~ e. Ji ei ie 3,,n, the following J + The set of J + check sums in (3) and (4) are orthogonal on i~i e i. The value of L e. is determined according to the usual majority-8gic decision rulg. Following the decoding procedure for code C, a set of (3) (4)

4 J + orthogonal check sums can always be formed. Thus, the values of eli i =,,n can be determined provided that the number of errors is less than or equal to min((j /),(J+/)). Once e i is determined, e i can be determined from the check sum e i+ei for i =,,,n. Therefore-, code C is majority-logic decodable up to distanced= min(d,d ). Some new majority-logic decodable codes of length 8 and 5 constructed are shown in the Table. For those codes that have ID)re information digits than comparable codes previously discovered the difference is shown in the last column. For example, (8,3,3) code has ID)re information digits than the (8,9,3) Reed-Muller code. TABLE. Some new majo~ity-logic decodable codes. Remarks C n k d C k d C n k d 64,4,6 7,3 8,3,3 64,37, 3, 8,5, +c 64,45,8,6 8,67,6 +3c 64,45,8 4,6 8,69, ,57,4 45,8 8,,8 +3c 56,45,64 9,8 5,54,8 +Sc 56,94,3 45,64 5,4,64 C 56,9,6 95,3 5,86,3 + 56,9,6 93,3 5,84,3 +loc 56,3,8 9,6 5,44,6 +9c 56,47,4 3,8 5,47,8 C Cyclic Codes.-If c and C codes are cyclic codes, and c is a subcode of c, then code C constructed in the last section is also a cyclic code. A cyclic code is specified by the roots of its generator polynomia Let Q,Ql,,Qls be the set of roots of the generator polynomial g (x) of code c, and Ql,Q,,QIJ, be the set of roots of the generator polynomial g (x) of code C, where J,~s, and QI~=. That is, g (x)=(x-a)(x"') (X-Ct's), and g(x)=(x-a )(x-' ) (x-a,). Then the parity check matrix of code C is Qll ~ H QI s QI s n QI s The columns of H can be permuted to become the following matrix:

5 H' Q' s n Q' s 3 Q' s Now consider the null space c' of H'. Let (a,a,a,,a n-l) be a vector of C'. Then and i =,,.,s i =,,.,f, Thus ',',,O's are roots of the polynomial a(x) = a +a x+a x +.. +a n_ x n-l corresponding to the vector (a,a,..,a n-l), and ',',...,O'i, are roots of a x+a 3 x +.. +a n_ x n-l = a'(x)x, where a'(x) is the formal derivative of a(x). In oth~r words, ',',,.,O';, are repeated roots of a(x). Therefore, a polynomi~l in the null space of H' is a multiple of the polynomial g(x)=(x-a) (x-a) (x-a;,) (x-a;,+) (x-as). The null space of H' is a cyclic code of length n whose generator polynomial is g(x). This code is equivalent to the original code C. Most of the codes shown in the Table can be put into cyclic form. If codes C and C are punctured with digits, they become cyclic codes with distance one less than the original distance. If C is a subcode of c, then C is a cyclic code. For example, let C be the (55,3,7) cyclic code and C be the (55,9,5) cyclic code. Then C is a (5,44,4) cyclic code. Those codes in the Table that can be put into cyclic form are marked with c in the last column. Conclusions.-Using the construction method in [o] we have constructed new majority-logic decodable codes. Many of these codes constructed are more efficient than the best comparable codes previously discovered. In addition, many of the new codes constructed are cyclic codes. The results reported in this paper should encourage one to search further for more efficient majority-logic decodable codes. There may exist majority-logic decodable codes with efficiency competitive with BCH codes. References [] J. L. Massey, Threshold Decoding, MIT Press, Mass., 963. [] L. D. Rudolph, "Geometric Configuration and Majority-Logic Decodable Codes," MEE Thesis, University of Oklahoma, Norman, Oklahoma, 964.

6 [3] E. J. Weldon, Jr., ''Euclidean Geometry Cyclic Codes," Proc. of Symeosium of Combinatorial Mathematics at the University of North Carolina, Chapel Hill, 967. [4] E. J. Weldon, Jr., "Some Results on Majority-Logic Decoding," Chapter 8, Error Correcting Codes, edited by Mann, John Wiley and Sons, N.Y., 968. [ 5] E. J. Weldon, Jr., "New Generalizations of the Reed-Muller Codes - Part II," IEEE Trans., IT-4, 99-6, 968. [6] T. Kasami, s. Lin and w. w. Peterson, "New Generalizations of the Reed-Muller Codes - Part I," IEEE Trans., IT-4, 89-99, 968. [ 7] D. K. Chow, "A Geometric Approach to Coding Theory with Application to Information Retrieval," Report R-368, CSL, Univ. of Illinois, Urbana, 967. [8] J. M, Goethals and P, Delsarte, "On a Class of Majority-Logic Decodable Cyclic Codes," IEEE Trans., IT-4, 8-89, 968. [9] K.J.C. Smith, ''Majority Decodable Codes Derived from Finite Geometries," Memo No. 56, Dept. of Statist. Inst., Univ. of North Carolina, Chapel Hill, 967. [] P. Delsarte, J.M. Goethals andf. J. Macwilliams, "On Generalized Reed-Muller Codes and Their Relatives," Information and Control, Vo 6, No. 5, 43-44, 97. [ ] T. Kasami and S. Lin, "On Majority-Logic Decoding for Duals of Primitive Polynomial Codes," IEEE Trans., IT-7, 33-33, 97. [] w. w. Peterson and E. J. Weldon, Jr., Error-Correcting Codes, Edition II, MIT Press, Mass., 97. [ 3] R. L. Townsend and E. J. Weldon, Jr., "Self-Orthogonal Quasi-Cyclic Codes," IEEE Trans., IT-3, 83-95, 967. [4] C. L. Chen, "Note on Majority-Logic Decoding of Finite Geometry Codes," IEEE Trans., IT-8, , 97. [5] L. D. Rudolph and w. E. Robbins, "One-Step Weighted-Majority Decoding, IEEE Trans., IT-8, , 97. [6] L. D. Rudolph and C.R.P. Hartmann, ''Decoding by Sequential Code Reduction," Report to be published, Syracuse University, 97. [7] P. Delsarte, "A Geometric Approach to a Class of Cyclic Codes," Journal of Combinatorial Theory, 6, , 969. [8] s. Lin and E. J. Weldon, "Multifold Euclidean Geometry Codes," Report to be published, University of Hawaii, 97. [ 9] C.R.P. Hartmann and L. D. Rudolph, "Generalized Finite-Geometry Codes," Proc. of the Tenth Allerton Conference on Circuit and Systems Theory, Univ. of Illinois, 97. [] N.J.A. Sloane and D, S. Whitehead, "New Family of Single-Error Correcting Codes," IEEE Trans., IT-6, No. 6, pp , November 97.

- 1 - Association Schemes. Orthogonal Arrays and Codes from Non-degenerate Quadrics and Hermitian Varieties in Finite Projective Geometries.

- 1 - Association Schemes. Orthogonal Arrays and Codes from Non-degenerate Quadrics and Hermitian Varieties in Finite Projective Geometries. - 1 - Association Schemes. Orthogonal Arrays and Codes from Non-degenerate Quadrics and Hermitian Varieties in Finite Projective Geometries. I.M. aiakravarti Department of Statistics University of North

More information

Unlabeled equivalence for matroids representable over finite fields

Unlabeled equivalence for matroids representable over finite fields Unlabeled equivalence for matroids representable over finite fields November 16, 2012 S. R. Kingan Department of Mathematics Brooklyn College, City University of New York 2900 Bedford Avenue Brooklyn,

More information

Fault Tolerant Parallel Filters Based On Bch Codes

Fault Tolerant Parallel Filters Based On Bch Codes RESEARCH ARTICLE OPEN ACCESS Fault Tolerant Parallel Filters Based On Bch Codes K.Mohana Krishna 1, Mrs.A.Maria Jossy 2 1 Student, M-TECH(VLSI Design) SRM UniversityChennai, India 2 Assistant Professor

More information

Comparative Performance Analysis of Block and Convolution Codes

Comparative Performance Analysis of Block and Convolution Codes Comparative Performance Analysis of Block and Convolution Codes Manika Pandey M.Tech scholar, ECE DIT University Dehradun Vimal Kant Pandey Assistant Professor/ECE DIT University Dehradun ABSTRACT Error

More information

The Extended Quadratic Residue Code is the only (48; 24; 12) Self-Dual Doubly-Even Code

The Extended Quadratic Residue Code is the only (48; 24; 12) Self-Dual Doubly-Even Code Brock University Department of Computer Science The Extended Quadratic Residue Code is the only (48; 24; 12) Self-Dual Doubly-Even Code Sheridan K. Houghten, C.W.H. Lam, L.H. Thiel, and J.A. Parker Technical

More information

Formally Self-Dual Codes Related to Type II Codes

Formally Self-Dual Codes Related to Type II Codes Formally Self-Dual Codes Related to Type II Codes Koichi Betsumiya Graduate School of Mathematics Nagoya University Nagoya 464 8602, Japan and Masaaki Harada Department of Mathematical Sciences Yamagata

More information

Department of Statistics Chapel Hill, N. C.

Department of Statistics Chapel Hill, N. C. UNIV ltsity OF NORTH CAROLINA Department of Statistics Chapel Hill, N. C. Mathematical Sciences Directorate Air Force Office of Scientific Research Washington 25, D. C. AFOSR Report TN - 591241 ON SOME

More information

Forward Error Correction Codes

Forward Error Correction Codes Appendix 6 Wireless Access Networks: Fixed Wireless Access and WLL Networks Ð Design and Operation. Martin P. Clark Copyright & 000 John Wiley & Sons Ltd Print ISBN 0-471-4998-1 Online ISBN 0-470-84151-6

More information

AN EFFICIENT DESIGN OF VLSI ARCHITECTURE FOR FAULT DETECTION USING ORTHOGONAL LATIN SQUARES (OLS) CODES

AN EFFICIENT DESIGN OF VLSI ARCHITECTURE FOR FAULT DETECTION USING ORTHOGONAL LATIN SQUARES (OLS) CODES AN EFFICIENT DESIGN OF VLSI ARCHITECTURE FOR FAULT DETECTION USING ORTHOGONAL LATIN SQUARES (OLS) CODES S. SRINIVAS KUMAR *, R.BASAVARAJU ** * PG Scholar, Electronics and Communication Engineering, CRIT

More information

Cyclic and Quasi-Cyclic LDPC Codes: New Developments

Cyclic and Quasi-Cyclic LDPC Codes: New Developments 1 Cyclic and Quasi-Cyclic LDPC Codes: New Developments Qin Huang, Qiuju Diao, Shu Lin and Khaled Abdel-Ghaffar Email: {qinhuang,qdiao, shulin, ghaffar}@ucdavisedu Department of Electrical and Computer

More information

Capability CHIN-LONG CHEN. generalized Hamming code over GF(16) can accommodate. only 60 data bits. The generalized Hamming code cannot detect

Capability CHIN-LONG CHEN. generalized Hamming code over GF(16) can accommodate. only 60 data bits. The generalized Hamming code cannot detect IEEE TRANSACTIONS ON COMPUTERS, VOL. c-32, NO. 7, JULY 1983 Error-Correcting Codes with Byte Error-Detection Capability CHIN-LONG CHEN 615 Abstract-Single error-correcting and double error-detecting codes

More information

Design Single and Multiple Errors Correction Block Codes

Design Single and Multiple Errors Correction Block Codes Design Single and Multiple Errors Correction Block Codes Zahraa Raad Mayoof Hajiyat Faculty of Engineering Technology & Built Environment, Department of Electrical and Electronic Engineering, B.Eng (Hons)

More information

Performance study and synthesis of new Error Correcting Codes RS, BCH and LDPC Using the Bit Error Rate (BER) and Field-Programmable Gate Array (FPGA)

Performance study and synthesis of new Error Correcting Codes RS, BCH and LDPC Using the Bit Error Rate (BER) and Field-Programmable Gate Array (FPGA) IJCSNS International Journal of Computer Science and Network Security, VOL.16 No.5, May 2016 21 Performance study and synthesis of new Error Correcting Codes RS, BCH and LDPC Using the Bit Error Rate (BER)

More information

HDL IMPLEMENTATION OF SRAM BASED ERROR CORRECTION AND DETECTION USING ORTHOGONAL LATIN SQUARE CODES

HDL IMPLEMENTATION OF SRAM BASED ERROR CORRECTION AND DETECTION USING ORTHOGONAL LATIN SQUARE CODES HDL IMPLEMENTATION OF SRAM BASED ERROR CORRECTION AND DETECTION USING ORTHOGONAL LATIN SQUARE CODES (1) Nallaparaju Sneha, PG Scholar in VLSI Design, (2) Dr. K. Babulu, Professor, ECE Department, (1)(2)

More information

Introduction to Mathematical Programming IE406. Lecture 20. Dr. Ted Ralphs

Introduction to Mathematical Programming IE406. Lecture 20. Dr. Ted Ralphs Introduction to Mathematical Programming IE406 Lecture 20 Dr. Ted Ralphs IE406 Lecture 20 1 Reading for This Lecture Bertsimas Sections 10.1, 11.4 IE406 Lecture 20 2 Integer Linear Programming An integer

More information

Linear Block Codes. Allen B. MacKenzie Notes for February 4, 9, & 11, Some Definitions

Linear Block Codes. Allen B. MacKenzie Notes for February 4, 9, & 11, Some Definitions Linear Block Codes Allen B. MacKenzie Notes for February 4, 9, & 11, 2015 This handout covers our in-class study of Chapter 3 of your textbook. We ll introduce some notation and then discuss the generator

More information

Pierre A. Humblet* Abstract

Pierre A. Humblet* Abstract Revised March 1980 ESL-P-8 0 0 GENERALIZATION OF HUFFMAN CODING TO MINIMIZE THE PROBABILITY OF BUFFER OVERFLOW BY Pierre A. Humblet* Abstract An algorithm is given to find a prefix condition code that

More information

Arithmetic in a Finite Field

Arithmetic in a Finite Field MATHEMATICS OF COMPUTATION, VOLUME 35, NUMBER 152 OCTOBER 198, PAGES 1353-1359 Arithmetic in a Finite Field By Michael Willett * Abstract. An algorithm for realizing finite field arithmetic is presented.

More information

A geometric non-existence proof of an extremal additive code

A geometric non-existence proof of an extremal additive code A geometric non-existence proof of an extremal additive code Jürgen Bierbrauer Department of Mathematical Sciences Michigan Technological University Stefano Marcugini and Fernanda Pambianco Dipartimento

More information

SMALL DISTANCE CODES FOR HEADER ERROR DETECTION IN ATM NETWORKS

SMALL DISTANCE CODES FOR HEADER ERROR DETECTION IN ATM NETWORKS SMALL DISTANCE CODES FOR HEADER ERROR DETECTION IN ATM NETWORKS Tony Antonio Universitas Pancasila, Jakarta Jl. Srengseng Sawah Jagakarsa, Jakarta 12640 tony.antonio@yahoo.com Abstrak On transmission links

More information

On the Spherical code (4, ρ, 9) 1

On the Spherical code (4, ρ, 9) 1 1 On the Spherical code (4, ρ, 9) 1 D. V. Zinoviev dzinov@iitp.ru V. A. Zinoviev zinov@iitp.ru A.A. Kharkevich Institute for Problems of Information Transmission, Moscow, Russia Abstract. A well known

More information

ON THE CONSTRUCTION OF ORTHOGONAL ARRAYS

ON THE CONSTRUCTION OF ORTHOGONAL ARRAYS Hacettepe Journal of Mathematics and Statistics Volume 31 (2002), 45 51 ON THE CONSTRUCTION OF ORTHOGONAL ARRAYS Hülya Bayrak and Aslıhan Alhan Received 04. 10. 2001 Abstract In this study, the geometric

More information

FPGA IMPLEMENTATION OF A NEW BCH DECODER USED IN DIGITAL VIDEO BROADCASTING - SATELLITE - SECOND GENERATION (DVB-S2)

FPGA IMPLEMENTATION OF A NEW BCH DECODER USED IN DIGITAL VIDEO BROADCASTING - SATELLITE - SECOND GENERATION (DVB-S2) FPGA IMPLEMENTATION OF A NEW BCH DECODER USED IN DIGITAL VIDEO BROADCASTING - SATELLITE - SECOND GENERATION (DVB-S2) 1* EL HABTI EL IDRISSI ANAS, 1, 2 EL GOURI RACHID, 3 AHMED LICHIOUI, 1 HLOU LAAMARI

More information

THE DESIGN OF STRUCTURED REGULAR LDPC CODES WITH LARGE GIRTH. Haotian Zhang and José M. F. Moura

THE DESIGN OF STRUCTURED REGULAR LDPC CODES WITH LARGE GIRTH. Haotian Zhang and José M. F. Moura THE DESIGN OF STRUCTURED REGULAR LDPC CODES WITH LARGE GIRTH Haotian Zhang and José M. F. Moura Department of Electrical and Computer Engineering Carnegie Mellon University, Pittsburgh, PA 523 {haotian,

More information

Error Correcting Codes

Error Correcting Codes Error Correcting Codes 2. The Hamming Codes Priti Shankar Priti Shankar is with the Department of Computer Science and Automation at the Indian Institute of Science, Bangalore. Her interests are in Theoretical

More information

Graph Adjacency Matrix Automata Joshua Abbott, Phyllis Z. Chinn, Tyler Evans, Allen J. Stewart Humboldt State University, Arcata, California

Graph Adjacency Matrix Automata Joshua Abbott, Phyllis Z. Chinn, Tyler Evans, Allen J. Stewart Humboldt State University, Arcata, California Graph Adjacency Matrix Automata Joshua Abbott, Phyllis Z. Chinn, Tyler Evans, Allen J. Stewart Humboldt State University, Arcata, California Abstract We define a graph adjacency matrix automaton (GAMA)

More information

A Connection between Network Coding and. Convolutional Codes

A Connection between Network Coding and. Convolutional Codes A Connection between Network Coding and 1 Convolutional Codes Christina Fragouli, Emina Soljanin christina.fragouli@epfl.ch, emina@lucent.com Abstract The min-cut, max-flow theorem states that a source

More information

Error Detecting and Correcting Code Using Orthogonal Latin Square Using Verilog HDL

Error Detecting and Correcting Code Using Orthogonal Latin Square Using Verilog HDL Error Detecting and Correcting Code Using Orthogonal Latin Square Using Verilog HDL Ch.Srujana M.Tech [EDT] srujanaxc@gmail.com SR Engineering College, Warangal. M.Sampath Reddy Assoc. Professor, Department

More information

A New Non-Iterative Decoding Algorithm for the Erasure Channel : Comparisons with Enhanced Iterative Methods

A New Non-Iterative Decoding Algorithm for the Erasure Channel : Comparisons with Enhanced Iterative Methods SUBMITTED TO ISIT 2005 ON 31 JANUARY 2005 1 arxiv:cs/0503006v1 [cs.it] 2 Mar 2005 A New Non-Iterative Decoding Algorithm for the Erasure Channel : Comparisons with Enhanced Iterative Methods J. Cai, C.

More information

4. Simplicial Complexes and Simplicial Homology

4. Simplicial Complexes and Simplicial Homology MATH41071/MATH61071 Algebraic topology Autumn Semester 2017 2018 4. Simplicial Complexes and Simplicial Homology Geometric simplicial complexes 4.1 Definition. A finite subset { v 0, v 1,..., v r } R n

More information

LOW-density parity-check (LDPC) codes are widely

LOW-density parity-check (LDPC) codes are widely 1460 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 4, APRIL 2007 Tree-Based Construction of LDPC Codes Having Good Pseudocodeword Weights Christine A Kelley, Member, IEEE, Deepak Sridhara, Member,

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Algebraic Topology: A brief introduction

Algebraic Topology: A brief introduction Algebraic Topology: A brief introduction Harish Chintakunta This chapter is intended to serve as a brief, and far from comprehensive, introduction to Algebraic Topology to help the reading flow of this

More information

PRIME FACTOR CYCLOTOMIC FOURIER TRANSFORMS WITH REDUCED COMPLEXITY OVER FINITE FIELDS

PRIME FACTOR CYCLOTOMIC FOURIER TRANSFORMS WITH REDUCED COMPLEXITY OVER FINITE FIELDS PRIME FACTOR CYCLOTOMIC FOURIER TRANSFORMS WITH REDUCED COMPLEXITY OVER FINITE FIELDS Xuebin Wu, Zhiyuan Yan, Ning Chen, and Meghanad Wagh Department of ECE, Lehigh University, Bethlehem, PA 18015 PMC-Sierra

More information

A Method for Construction of Orthogonal Arrays 1

A Method for Construction of Orthogonal Arrays 1 Eighth International Workshop on Optimal Codes and Related Topics July 10-14, 2017, Sofia, Bulgaria pp. 49-54 A Method for Construction of Orthogonal Arrays 1 Iliya Bouyukliev iliyab@math.bas.bg Institute

More information

Application of Two-dimensional Periodic Cellular Automata in Image Processing

Application of Two-dimensional Periodic Cellular Automata in Image Processing International Journal of Computer, Mathematical Sciences and Applications Serials Publications Vol. 5, No. 1-2, January-June 2011, pp. 49 55 ISSN: 0973-6786 Application of Two-dimensional Periodic Cellular

More information

Orthogonal Latin Square Configuration for

Orthogonal Latin Square Configuration for 52 [5] P. J. Klass, "Multiplex system to be tested on B-," Aviat. Week Space Technol., pp. 37-4, Mar. 5, 973. [6] K. L. Peterson and R. S. Babin, "Integrated reliability and safety analysis of the DC-

More information

FAULT TOLERANT SYSTEMS

FAULT TOLERANT SYSTEMS FAULT TOLERANT SYSTEMS http://www.ecs.umass.edu/ece/koren/faulttolerantsystems Part 6 Coding I Chapter 3 Information Redundancy Part.6.1 Information Redundancy - Coding A data word with d bits is encoded

More information

Some Contributions to Incidence Geometry and the Polynomial Method

Some Contributions to Incidence Geometry and the Polynomial Method Some Contributions to Incidence Geometry and the Polynomial Method Anurag Bishnoi Department of Mathematics Ghent University https://anuragbishnoi.wordpress.com/ Promoter: Prof. Dr. Bart De Bruyn Outline

More information

Maths for Signals and Systems Linear Algebra in Engineering. Some problems by Gilbert Strang

Maths for Signals and Systems Linear Algebra in Engineering. Some problems by Gilbert Strang Maths for Signals and Systems Linear Algebra in Engineering Some problems by Gilbert Strang Problems. Consider u, v, w to be non-zero vectors in R 7. These vectors span a vector space. What are the possible

More information

LINEAR CODES WITH NON-UNIFORM ERROR CORRECTION CAPABILITY

LINEAR CODES WITH NON-UNIFORM ERROR CORRECTION CAPABILITY LINEAR CODES WITH NON-UNIFORM ERROR CORRECTION CAPABILITY By Margaret Ann Bernard The University of the West Indies and Bhu Dev Sharma Xavier University of Louisiana, New Orleans ABSTRACT This paper introduces

More information

MDS (maximum-distance separable) codes over large

MDS (maximum-distance separable) codes over large IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 55, NO 4, APRIL 2009 1721 Cyclic Lowest Density MDS Array Codes Yuval Cassuto, Member, IEEE, and Jehoshua Bruck, Fellow, IEEE Abstract Three new families of

More information

6. Concluding Remarks

6. Concluding Remarks [8] K. J. Supowit, The relative neighborhood graph with an application to minimum spanning trees, Tech. Rept., Department of Computer Science, University of Illinois, Urbana-Champaign, August 1980, also

More information

Extended and generalized weight enumerators

Extended and generalized weight enumerators Extended and generalized weight enumerators Relinde Jurrius Ruud Pellikaan Eindhoven University of Technology, The Netherlands International Workshop on Coding and Cryptography, 2009 1/23 Outline Previous

More information

1-GENERATOR QUASI-CYCLIC CODES

1-GENERATOR QUASI-CYCLIC CODES Jrl Syst Sci & Complexity (2007) 20: 554 561 1-GENERATOR QUASI-CYCLIC CODES Junying PEI Xuejun ZHANG Received: 16 June 2005 Abstract This paper discusses the enumeration of 1-generator quasi-cyclic codes

More information

Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission.

Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission. Convex Programming with Set-Inclusive Constraints and Applications to Inexact Linear Programming Author(s): A. L. Soyster Source: Operations Research, Vol. 21, No. 5 (Sep. - Oct., 1973), pp. 1154-1157

More information

Capacity-Approaching Low-Density Parity- Check Codes: Recent Developments and Applications

Capacity-Approaching Low-Density Parity- Check Codes: Recent Developments and Applications Capacity-Approaching Low-Density Parity- Check Codes: Recent Developments and Applications Shu Lin Department of Electrical and Computer Engineering University of California, Davis Davis, CA 95616, U.S.A.

More information

MATH3016: OPTIMIZATION

MATH3016: OPTIMIZATION MATH3016: OPTIMIZATION Lecturer: Dr Huifu Xu School of Mathematics University of Southampton Highfield SO17 1BJ Southampton Email: h.xu@soton.ac.uk 1 Introduction What is optimization? Optimization is

More information

ApplMath Lucie Kárná; Štěpán Klapka Message doubling and error detection in the binary symmetrical channel.

ApplMath Lucie Kárná; Štěpán Klapka Message doubling and error detection in the binary symmetrical channel. ApplMath 2015 Lucie Kárná; Štěpán Klapka Message doubling and error detection in the binary symmetrical channel In: Jan Brandts and Sergej Korotov and Michal Křížek and Karel Segeth and Jakub Šístek and

More information

REGULAR GRAPHS OF GIVEN GIRTH. Contents

REGULAR GRAPHS OF GIVEN GIRTH. Contents REGULAR GRAPHS OF GIVEN GIRTH BROOKE ULLERY Contents 1. Introduction This paper gives an introduction to the area of graph theory dealing with properties of regular graphs of given girth. A large portion

More information

Constrained Types and their Expressiveness

Constrained Types and their Expressiveness Constrained Types and their Expressiveness JENS PALSBERG Massachusetts Institute of Technology and SCOTT SMITH Johns Hopkins University A constrained type consists of both a standard type and a constraint

More information

Implementation and Analysis of an Error Detection and Correction System on FPGA

Implementation and Analysis of an Error Detection and Correction System on FPGA Implementation and Analysis of an Error Detection and Correction System on FPGA Constantin Anton, Laurenţiu Mihai Ionescu, Ion Tutănescu, Alin Mazăre, Gheorghe Şerban University of Piteşti, Romania Abstract

More information

FPGA Implementation of Binary Quasi Cyclic LDPC Code with Rate 2/5

FPGA Implementation of Binary Quasi Cyclic LDPC Code with Rate 2/5 FPGA Implementation of Binary Quasi Cyclic LDPC Code with Rate 2/5 Arulmozhi M. 1, Nandini G. Iyer 2, Anitha M. 3 Assistant Professor, Department of EEE, Rajalakshmi Engineering College, Chennai, India

More information

Error Correction Using Extended Orthogonal Latin Square Codes

Error Correction Using Extended Orthogonal Latin Square Codes International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 9, Number 1 (2016), pp. 55-62 International Research Publication House http://www.irphouse.com Error Correction

More information

On the Performance Evaluation of Quasi-Cyclic LDPC Codes with Arbitrary Puncturing

On the Performance Evaluation of Quasi-Cyclic LDPC Codes with Arbitrary Puncturing On the Performance Evaluation of Quasi-Cyclic LDPC Codes with Arbitrary Puncturing Ying Xu, and Yueun Wei Department of Wireless Research Huawei Technologies Co., Ltd, Shanghai, 6, China Email: {eaglexu,

More information

A Particular Type of Non-associative Algebras and Graph Theory

A Particular Type of Non-associative Algebras and Graph Theory A Particular Type of Non-associative Algebras and Graph Theory JUAN NÚÑEZ, MARITHANIA SILVERO & M. TRINIDAD VILLAR University of Seville Department of Geometry and Topology Aptdo. 1160. 41080-Seville SPAIN

More information

ON SOME METHODS OF CONSTRUCTION OF BLOCK DESIGNS

ON SOME METHODS OF CONSTRUCTION OF BLOCK DESIGNS ON SOME METHODS OF CONSTRUCTION OF BLOCK DESIGNS NURNABI MEHERUL ALAM M.Sc. (Agricultural Statistics), Roll No. I.A.S.R.I, Library Avenue, New Delhi- Chairperson: Dr. P.K. Batra Abstract: Block designs

More information

CHAPTER 7. Copyright Cengage Learning. All rights reserved.

CHAPTER 7. Copyright Cengage Learning. All rights reserved. CHAPTER 7 FUNCTIONS Copyright Cengage Learning. All rights reserved. SECTION 7.1 Functions Defined on General Sets Copyright Cengage Learning. All rights reserved. Functions Defined on General Sets We

More information

H. W. Kuhn. Bryn Mawr College

H. W. Kuhn. Bryn Mawr College VARIANTS OF THE HUNGARIAN METHOD FOR ASSIGNMENT PROBLEMS' H. W. Kuhn Bryn Mawr College The author presents a geometrical modelwhich illuminates variants of the Hungarian method for the solution of the

More information

Chip Design for Turbo Encoder Module for In-Vehicle System

Chip Design for Turbo Encoder Module for In-Vehicle System Chip Design for Turbo Encoder Module for In-Vehicle System Majeed Nader Email: majeed@wayneedu Yunrui Li Email: yunruili@wayneedu John Liu Email: johnliu@wayneedu Abstract This paper studies design and

More information

International Journal of Multidisciplinary Research and Modern Education (IJMRME) Impact Factor: 6.725, ISSN (Online):

International Journal of Multidisciplinary Research and Modern Education (IJMRME) Impact Factor: 6.725, ISSN (Online): COMPUTER REPRESENTATION OF GRAPHS USING BINARY LOGIC CODES IN DISCRETE MATHEMATICS S. Geetha* & Dr. S. Jayakumar** * Assistant Professor, Department of Mathematics, Bon Secours College for Women, Villar

More information

WORD LEVEL FINITE FIELD MULTIPLIERS USING NORMAL BASIS

WORD LEVEL FINITE FIELD MULTIPLIERS USING NORMAL BASIS WORD LEVEL FINITE FIELD MULTIPLIERS USING NORMAL BASIS 1 B.SARGUNAM, 2 Dr.R.DHANASEKARAN 1 Assistant Professor, Department of ECE, Avinashilingam University, Coimbatore 2 Professor & Director-Research,

More information

TAGUCHI TECHNIQUES FOR 2 k FRACTIONAL FACTORIAL EXPERIMENTS

TAGUCHI TECHNIQUES FOR 2 k FRACTIONAL FACTORIAL EXPERIMENTS Hacettepe Journal of Mathematics and Statistics Volume 4 (200), 8 9 TAGUCHI TECHNIQUES FOR 2 k FRACTIONAL FACTORIAL EXPERIMENTS Nazan Danacıoğlu and F.Zehra Muluk Received 0: 0: 200 : Accepted 14: 06:

More information

Sparse Hypercube 3-Spanners

Sparse Hypercube 3-Spanners Sparse Hypercube 3-Spanners W. Duckworth and M. Zito Department of Mathematics and Statistics, University of Melbourne, Parkville, Victoria 3052, Australia Department of Computer Science, University of

More information

Algebraic Graph Theory- Adjacency Matrix and Spectrum

Algebraic Graph Theory- Adjacency Matrix and Spectrum Algebraic Graph Theory- Adjacency Matrix and Spectrum Michael Levet December 24, 2013 Introduction This tutorial will introduce the adjacency matrix, as well as spectral graph theory. For those familiar

More information

CS321: Computer Networks Error Detection and Correction

CS321: Computer Networks Error Detection and Correction CS321: Computer Networks Error Detection and Correction Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Error Detection and Correction Objective: System must

More information

Efficient Majority Logic Fault Detector/Corrector Using Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes

Efficient Majority Logic Fault Detector/Corrector Using Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes Efficient Majority Logic Fault Detector/Corrector Using Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes 1 U.Rahila Begum, 2 V. Padmajothi 1 PG Student, 2 Assistant Professor 1 Department Of

More information

The absence of efficient dual pairs of spanning trees in planar graphs

The absence of efficient dual pairs of spanning trees in planar graphs The absence of efficient dual pairs of spanning trees in planar graphs T.R.Riley and W.P.Thurston Mathematics Department, 310 Malott Hall, Cornell University, Ithaca, NY 14853-4201, USA tim.riley@math.cornell.edu,

More information

Convex Optimization - Chapter 1-2. Xiangru Lian August 28, 2015

Convex Optimization - Chapter 1-2. Xiangru Lian August 28, 2015 Convex Optimization - Chapter 1-2 Xiangru Lian August 28, 2015 1 Mathematical optimization minimize f 0 (x) s.t. f j (x) 0, j=1,,m, (1) x S x. (x 1,,x n ). optimization variable. f 0. R n R. objective

More information

What Types of ECC Should Be Used on Flash Memory?

What Types of ECC Should Be Used on Flash Memory? What Types of ECC Should Be Used on Flash Memory? Application by Scott Chen 1. Abstract NOR Flash normally does not need ECC (Error-Correcting Code). On the other hand, NAND requires ECC to ensure data

More information

Achieving Reliable Digital Data Communication through Mathematical Algebraic Coding Techniques

Achieving Reliable Digital Data Communication through Mathematical Algebraic Coding Techniques International Journal of Pure and Applied Mathematical Sciences. ISSN 0972-9828 Volume 9, Number 2 (2016), pp. 183-190 Research India Publications http://www.ripublication.com Achieving Reliable Digital

More information

Graph Folding of Link Graph and Knot Graph

Graph Folding of Link Graph and Knot Graph Graph Folding of Link Graph and Knot Graph Redman Al-Shamiri Assistant Professor of Algebra and Topological geometry Department of Mathematics, Ibb University AUTHORIZED BY AL-NASSER UNIVERSITY'S RESEARCH

More information

4. Error correction and link control. Contents

4. Error correction and link control. Contents //2 4. Error correction and link control Contents a. Types of errors b. Error detection and correction c. Flow control d. Error control //2 a. Types of errors Data can be corrupted during transmission.

More information

Single error correction, double error detection and double adjacent error correction with no mis-correction code

Single error correction, double error detection and double adjacent error correction with no mis-correction code This article has been accepted and published on J-STAGE in advance of copyediting. Content is final as presented. IEICE Electronics Express, Vol.* No.*,*-* Single error correction, double error detection

More information

stabilizers for GF(5)-representable matroids.

stabilizers for GF(5)-representable matroids. AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 49 (2011), Pages 203 207 Stabilizers for GF(5)-representable matroids S. R. Kingan Department of Mathematics Brooklyn College, City University of New York Brooklyn,

More information

DM545 Linear and Integer Programming. Lecture 2. The Simplex Method. Marco Chiarandini

DM545 Linear and Integer Programming. Lecture 2. The Simplex Method. Marco Chiarandini DM545 Linear and Integer Programming Lecture 2 The Marco Chiarandini Department of Mathematics & Computer Science University of Southern Denmark Outline 1. 2. 3. 4. Standard Form Basic Feasible Solutions

More information

Minimum-Cost Spanning Tree. as a. Path-Finding Problem. Laboratory for Computer Science MIT. Cambridge MA July 8, 1994.

Minimum-Cost Spanning Tree. as a. Path-Finding Problem. Laboratory for Computer Science MIT. Cambridge MA July 8, 1994. Minimum-Cost Spanning Tree as a Path-Finding Problem Bruce M. Maggs Serge A. Plotkin Laboratory for Computer Science MIT Cambridge MA 02139 July 8, 1994 Abstract In this paper we show that minimum-cost

More information

Chapter 9 Graph Algorithms

Chapter 9 Graph Algorithms Introduction graph theory useful in practice represent many real-life problems can be if not careful with data structures Chapter 9 Graph s 2 Definitions Definitions an undirected graph is a finite set

More information

Calculation of extended gcd by normalization

Calculation of extended gcd by normalization SCIREA Journal of Mathematics http://www.scirea.org/journal/mathematics August 2, 2018 Volume 3, Issue 3, June 2018 Calculation of extended gcd by normalization WOLF Marc, WOLF François, LE COZ Corentin

More information

Linear Convolutional Codes for Compound Channels*

Linear Convolutional Codes for Compound Channels* INFORMATION AND CONTROL 19, 387-400 (1971) Linear Convolutional Codes for Compound Channels* SUDHAKAR M. REDDY Department of Electrical Engineering, University of Iowa, Iowa City, Iowa 52240 A class of

More information

Efficient Markov Chain Monte Carlo Algorithms For MIMO and ISI channels

Efficient Markov Chain Monte Carlo Algorithms For MIMO and ISI channels Efficient Markov Chain Monte Carlo Algorithms For MIMO and ISI channels Rong-Hui Peng Department of Electrical and Computer Engineering University of Utah /7/6 Summary of PhD work Efficient MCMC algorithms

More information

arxiv: v1 [math.co] 15 Dec 2009

arxiv: v1 [math.co] 15 Dec 2009 ANOTHER PROOF OF THE FACT THAT POLYHEDRAL CONES ARE FINITELY GENERATED arxiv:092.2927v [math.co] 5 Dec 2009 VOLKER KAIBEL Abstract. In this note, we work out a simple inductive proof showing that every

More information

NOTICE WARNING CONCERNING COPYRIGHT RESTRICTIONS: The copyright law of the United States (title 17, U.S. Code) governs the making of photocopies or

NOTICE WARNING CONCERNING COPYRIGHT RESTRICTIONS: The copyright law of the United States (title 17, U.S. Code) governs the making of photocopies or NOTICE WARNING CONCERNING COPYRIGHT RESTRICTIONS: The copyright law of the United States (title 17, U.S. Code) governs the making of photocopies or other reproductions of copyrighted material. Any copying

More information

A DH-parameter based condition for 3R orthogonal manipulators to have 4 distinct inverse kinematic solutions

A DH-parameter based condition for 3R orthogonal manipulators to have 4 distinct inverse kinematic solutions Wenger P., Chablat D. et Baili M., A DH-parameter based condition for R orthogonal manipulators to have 4 distinct inverse kinematic solutions, Journal of Mechanical Design, Volume 17, pp. 150-155, Janvier

More information

392D: Coding for the AWGN Channel Wednesday, March 21, 2007 Stanford, Winter 2007 Handout #26. Final exam solutions

392D: Coding for the AWGN Channel Wednesday, March 21, 2007 Stanford, Winter 2007 Handout #26. Final exam solutions 92D: Coding for the AWGN Channel Wednesday, March 2, 27 Stanford, Winter 27 Handout #26 Problem F. (8 points) (Lexicodes) Final exam solutions In this problem, we will see that a simple greedy algorithm

More information

Table of Contents. Preface... vii Abstract... vii Kurzfassung... x Acknowledgements... xiii. I The Preliminaries 1

Table of Contents. Preface... vii Abstract... vii Kurzfassung... x Acknowledgements... xiii. I The Preliminaries 1 Preface............................................ vii Abstract............................................ vii Kurzfassung.......................................... x Acknowledgements......................................

More information

Kevin Buckley

Kevin Buckley Kevin Buckley - 69 ECE877 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 3 Convolutional Codes x c (a) (b) (,) (,) (,) (,)

More information

Performance Analysis of Gray Code based Structured Regular Column-Weight Two LDPC Codes

Performance Analysis of Gray Code based Structured Regular Column-Weight Two LDPC Codes IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 11, Issue 4, Ver. III (Jul.-Aug.2016), PP 06-10 www.iosrjournals.org Performance Analysis

More information

Chapter 4 Concepts from Geometry

Chapter 4 Concepts from Geometry Chapter 4 Concepts from Geometry An Introduction to Optimization Spring, 2014 Wei-Ta Chu 1 Line Segments The line segment between two points and in R n is the set of points on the straight line joining

More information

The Matrix-Tree Theorem and Its Applications to Complete and Complete Bipartite Graphs

The Matrix-Tree Theorem and Its Applications to Complete and Complete Bipartite Graphs The Matrix-Tree Theorem and Its Applications to Complete and Complete Bipartite Graphs Frankie Smith Nebraska Wesleyan University fsmith@nebrwesleyan.edu May 11, 2015 Abstract We will look at how to represent

More information

The Linear Cutwidth of Complete Bipartite and Tripartite Graphs

The Linear Cutwidth of Complete Bipartite and Tripartite Graphs The Linear Cutwidth of Complete Bipartite and Tripartite Graphs Stephanie Bowles August 0, 00 Abstract This paper looks at complete bipartite graphs, K m,n, and complete tripartite graphs, K r,s,t. The

More information

Design of Convolutional Codes for varying Constraint Lengths

Design of Convolutional Codes for varying Constraint Lengths Design of Convolutional Codes for varying Constraint Lengths S VikramaNarasimhaReddy 1, Charan Kumar K 2, Neelima Koppala 3 1,2 MTech(VLSI) Student, 3 Assistant Professor, ECE Department, SreeVidyanikethan

More information

Binary trees having a given number of nodes with 0, 1, and 2 children.

Binary trees having a given number of nodes with 0, 1, and 2 children. Binary trees having a given number of nodes with 0, 1, and 2 children. Günter Rote 13. August 1997 Zusammenfassung We give three combinatorial proofs for the number of binary trees having a given number

More information

Antimagic Labelings of Weighted and Oriented Graphs

Antimagic Labelings of Weighted and Oriented Graphs Antimagic Labelings of Weighted and Oriented Graphs Zhanar Berikkyzy, Axel Brandt, Sogol Jahanbekam, Victor Larsen, Danny Rorabaugh October 7, 014 Abstract A graph G is k weighted list antimagic if for

More information

Chapter 9 Graph Algorithms

Chapter 9 Graph Algorithms Chapter 9 Graph Algorithms 2 Introduction graph theory useful in practice represent many real-life problems can be if not careful with data structures 3 Definitions an undirected graph G = (V, E) is a

More information

Check-hybrid GLDPC Codes Without Small Trapping Sets

Check-hybrid GLDPC Codes Without Small Trapping Sets Check-hybrid GLDPC Codes Without Small Trapping Sets Vida Ravanmehr Department of Electrical and Computer Engineering University of Arizona Tucson, AZ, 8572 Email: vravanmehr@ece.arizona.edu David Declercq

More information

Error-Correcting Codes

Error-Correcting Codes Error-Correcting Codes Michael Mo 10770518 6 February 2016 Abstract An introduction to error-correcting codes will be given by discussing a class of error-correcting codes, called linear block codes. The

More information

Full Fault Dictionary Storage Based on Labeled Tree Encoding

Full Fault Dictionary Storage Based on Labeled Tree Encoding Full Fault Dictionary Storage Based on Labeled Tree Encoding Vamsi Boppana, Ismed Hartanto and W. Kent Fuchs Coordinated Science Laboratory University of Illinois at UrbanaChampaign Urbana, IL 6181 Abstract

More information

Quasi-Orthogonal Sequences for Code-Division Multiple-Access Systems

Quasi-Orthogonal Sequences for Code-Division Multiple-Access Systems 982 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 46, NO. 3, MAY 2000 Quasi-Orthogonal Sequences for Code-Division Multiple-Access Systems Kyeongcheol Yang, Member, IEEE, Young-Ky Kim, and P. Vijay Kumar,

More information

WINDING AND UNWINDING AND ESSENTIAL INTERSECTIONS IN H 3

WINDING AND UNWINDING AND ESSENTIAL INTERSECTIONS IN H 3 WINDING AND UNWINDING AND ESSENTIAL INTERSECTIONS IN H 3 JANE GILMAN AND LINDA KEEN Abstract. Let G = A, B be a non-elementary two generator subgroup of Isom(H 2 ). If G is discrete and free and geometrically

More information