2,049 research outputs found

    New bounds for the minimum length of quaternary linear codes of dimension five

    Get PDF
    AbstractLet n4(k, d) be the smallest integer n, such that a quaternary linear [n, k, d]-code exists. The bounds n4(5, 21) ⩽ 32, n4(5, 30) = 43, n4(5, 32) = 46, n4(5, 36) = 51, n4(5,40) ⩽ 57, n4(5, 48) ⩽ 67, n4(5, 64) = 88, n4(5, 68) ⩽ 94, n4(5, 70) ⩽ 97, n4(5, 92) ⩽ 126, n4(5, 98) ⩽ 135, n4(5, 122) = 165, n4(5, 132) ⩽ 179, n4(5, 136) ⩽ 184, n4(5, 140) = 189, n4(5, 156) ⩽ 211, n4(5,162) = 219, n4(5, 164) ⩽ 222, n4(5, 166) ⩽ 225, n4(5, 173) ⩽ 234, n4(5, 194) = 261, n4(5, 204) = 273, n4(5, 208) = 279, n4(5, 212) = 284, n4(5, 214) = 287, n4(5, 216) = 290 and n4(5, 220) = 295 are proved. A [q4 + q2 + 1, 5, q4 − q3 + q2 − q]-code over GF(q) exists for every q

    QPSK Block-Modulation Codes for Unequal Error Protection

    Get PDF
    Unequal error protection (UEP) codes find applications in broadcast channels, as well as in other digital communication systems, where messages have different degrees of importance. Binary linear UEP (LUEP) codes combined with a Gray mapped QPSK signal set are used to obtain new efficient QPSK block-modulation codes for unequal error protection. Several examples of QPSK modulation codes that have the same minimum squared Euclidean distance as the best QPSK modulation codes, of the same rate and length, are given. In the new constructions of QPSK block-modulation codes, even-length binary LUEP codes are used. Good even-length binary LUEP codes are obtained when shorter binary linear codes are combined using either the well-known |u¯|u¯+v¯|-construction or the so-called construction X. Both constructions have the advantage of resulting in optimal or near-optimal binary LUEP codes of short to moderate lengths, using very simple linear codes, and may be used as constituent codes in the new constructions. LUEP codes lend themselves quite naturally to multistage decoding up to their minimum distance, using the decoding of component subcodes. A new suboptimal two-stage soft-decision decoding of LUEP codes is presented and its application to QPSK block-modulation codes for UEP illustrated

    Asymmetric Lee Distance Codes for DNA-Based Storage

    Full text link
    We consider a new family of codes, termed asymmetric Lee distance codes, that arise in the design and implementation of DNA-based storage systems and systems with parallel string transmission protocols. The codewords are defined over a quaternary alphabet, although the results carry over to other alphabet sizes; furthermore, symbol confusability is dictated by their underlying binary representation. Our contributions are two-fold. First, we demonstrate that the new distance represents a linear combination of the Lee and Hamming distance and derive upper bounds on the size of the codes under this metric based on linear programming techniques. Second, we propose a number of code constructions which imply lower bounds

    Codes for Key Generation in Quantum Cryptography

    Full text link
    As an alternative to the usual key generation by two-way communication in schemes for quantum cryptography, we consider codes for key generation by one-way communication. We study codes that could be applied to the raw key sequences that are ideally obtained in recently proposed scenarios for quantum key distribution, which can be regarded as communication through symmetric four-letter channels.Comment: IJQI format, 13 pages, 1 tabl

    Tables of subspace codes

    Get PDF
    One of the main problems of subspace coding asks for the maximum possible cardinality of a subspace code with minimum distance at least dd over Fqn\mathbb{F}_q^n, where the dimensions of the codewords, which are vector spaces, are contained in K{0,1,,n}K\subseteq\{0,1,\dots,n\}. In the special case of K={k}K=\{k\} one speaks of constant dimension codes. Since this (still) emerging field is very prosperous on the one hand side and there are a lot of connections to classical objects from Galois geometry it is a bit difficult to keep or to obtain an overview about the current state of knowledge. To this end we have implemented an on-line database of the (at least to us) known results at \url{subspacecodes.uni-bayreuth.de}. The aim of this recurrently updated technical report is to provide a user guide how this technical tool can be used in research projects and to describe the so far implemented theoretic and algorithmic knowledge.Comment: 44 pages, 6 tables, 7 screenshot
    corecore