2,049 research outputs found
New bounds for the minimum length of quaternary linear codes of dimension five
AbstractLet n4(k, d) be the smallest integer n, such that a quaternary linear [n, k, d]-code exists. The bounds n4(5, 21) ⩽ 32, n4(5, 30) = 43, n4(5, 32) = 46, n4(5, 36) = 51, n4(5,40) ⩽ 57, n4(5, 48) ⩽ 67, n4(5, 64) = 88, n4(5, 68) ⩽ 94, n4(5, 70) ⩽ 97, n4(5, 92) ⩽ 126, n4(5, 98) ⩽ 135, n4(5, 122) = 165, n4(5, 132) ⩽ 179, n4(5, 136) ⩽ 184, n4(5, 140) = 189, n4(5, 156) ⩽ 211, n4(5,162) = 219, n4(5, 164) ⩽ 222, n4(5, 166) ⩽ 225, n4(5, 173) ⩽ 234, n4(5, 194) = 261, n4(5, 204) = 273, n4(5, 208) = 279, n4(5, 212) = 284, n4(5, 214) = 287, n4(5, 216) = 290 and n4(5, 220) = 295 are proved. A [q4 + q2 + 1, 5, q4 − q3 + q2 − q]-code over GF(q) exists for every q
QPSK Block-Modulation Codes for Unequal Error Protection
Unequal error protection (UEP) codes find applications in broadcast channels, as well as in other digital communication systems, where messages have different degrees of importance. Binary linear UEP (LUEP) codes combined with a Gray mapped QPSK signal set are used to obtain new efficient QPSK block-modulation codes for unequal error protection. Several examples of QPSK modulation codes that have the same minimum squared Euclidean distance as the best QPSK modulation codes, of the same rate and length, are given. In the new constructions of QPSK block-modulation codes, even-length binary LUEP codes are used. Good even-length binary LUEP codes are obtained when shorter binary linear codes are combined using either the well-known |u¯|u¯+v¯|-construction or the so-called construction X. Both constructions have the advantage of resulting in optimal or near-optimal binary LUEP codes of short to moderate lengths, using very simple linear codes, and may be used as constituent codes in the new constructions. LUEP codes lend themselves quite naturally to multistage decoding up to their minimum distance, using the decoding of component subcodes. A new suboptimal two-stage soft-decision decoding of LUEP codes is presented and its application to QPSK block-modulation codes for UEP illustrated
Asymmetric Lee Distance Codes for DNA-Based Storage
We consider a new family of codes, termed asymmetric Lee distance codes, that
arise in the design and implementation of DNA-based storage systems and systems
with parallel string transmission protocols. The codewords are defined over a
quaternary alphabet, although the results carry over to other alphabet sizes;
furthermore, symbol confusability is dictated by their underlying binary
representation. Our contributions are two-fold. First, we demonstrate that the
new distance represents a linear combination of the Lee and Hamming distance
and derive upper bounds on the size of the codes under this metric based on
linear programming techniques. Second, we propose a number of code
constructions which imply lower bounds
Codes for Key Generation in Quantum Cryptography
As an alternative to the usual key generation by two-way communication in
schemes for quantum cryptography, we consider codes for key generation by
one-way communication. We study codes that could be applied to the raw key
sequences that are ideally obtained in recently proposed scenarios for quantum
key distribution, which can be regarded as communication through symmetric
four-letter channels.Comment: IJQI format, 13 pages, 1 tabl
Tables of subspace codes
One of the main problems of subspace coding asks for the maximum possible
cardinality of a subspace code with minimum distance at least over
, where the dimensions of the codewords, which are vector
spaces, are contained in . In the special case of
one speaks of constant dimension codes. Since this (still) emerging
field is very prosperous on the one hand side and there are a lot of
connections to classical objects from Galois geometry it is a bit difficult to
keep or to obtain an overview about the current state of knowledge. To this end
we have implemented an on-line database of the (at least to us) known results
at \url{subspacecodes.uni-bayreuth.de}. The aim of this recurrently updated
technical report is to provide a user guide how this technical tool can be used
in research projects and to describe the so far implemented theoretic and
algorithmic knowledge.Comment: 44 pages, 6 tables, 7 screenshot
- …