496 research outputs found
The Perfect Binary One-Error-Correcting Codes of Length 15: Part II--Properties
A complete classification of the perfect binary one-error-correcting codes of
length 15 as well as their extensions of length 16 was recently carried out in
[P. R. J. \"Osterg{\aa}rd and O. Pottonen, "The perfect binary
one-error-correcting codes of length 15: Part I--Classification," IEEE Trans.
Inform. Theory vol. 55, pp. 4657--4660, 2009]. In the current accompanying
work, the classified codes are studied in great detail, and their main
properties are tabulated. The results include the fact that 33 of the 80
Steiner triple systems of order 15 occur in such codes. Further understanding
is gained on full-rank codes via switching, as it turns out that all but two
full-rank codes can be obtained through a series of such transformations from
the Hamming code. Other topics studied include (non)systematic codes, embedded
one-error-correcting codes, and defining sets of codes. A classification of
certain mixed perfect codes is also obtained.Comment: v2: fixed two errors (extension of nonsystematic codes, table of
coordinates fixed by symmetries of codes), added and extended many other
result
Coding with Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis
This study examines the use of nonsystematic channel codes to obtain secure
transmissions over the additive white Gaussian noise (AWGN) wire-tap channel.
Unlike the previous approaches, we propose to implement nonsystematic coded
transmission by scrambling the information bits, and characterize the bit error
rate of scrambled transmissions through theoretical arguments and numerical
simulations. We have focused on some examples of Bose-Chaudhuri-Hocquenghem
(BCH) and low-density parity-check (LDPC) codes to estimate the security gap,
which we have used as a measure of physical layer security, in addition to the
bit error rate. Based on a number of numerical examples, we found that such a
transmission technique can outperform alternative solutions. In fact, when an
eavesdropper (Eve) has a worse channel than the authorized user (Bob), the
security gap required to reach a given level of security is very small. The
amount of degradation of Eve's channel with respect to Bob's that is needed to
achieve sufficient security can be further reduced by implementing scrambling
and descrambling operations on blocks of frames, rather than on single frames.
While Eve's channel has a quality equal to or better than that of Bob's
channel, we have shown that the use of a hybrid automatic repeat-request (HARQ)
protocol with authentication still allows achieving a sufficient level of
security. Finally, the secrecy performance of some practical schemes has also
been measured in terms of the equivocation rate about the message at the
eavesdropper and compared with that of ideal codes.Comment: 29 pages, 10 figure
Embedding in a perfect code
A binary 1-error-correcting code can always be embedded in a 1-perfect code
of some larger lengthComment: Eng: 5pp, Rus: 5pp. V3: revised, a survey added; the accepted
version; Russian translation adde
Shortening array codes and the perfect 1-factorization conjecture
The existence of a perfect 1-factorization of the complete graph with n nodes, namely, K_n , for arbitrary even number n, is a 40-year-old open problem in graph theory. So far, two infinite families of perfect 1-factorizations have been shown to exist, namely, the factorizations of K_(p+1) and K_2p , where p is an arbitrary prime number (p > 2) . It was shown in previous work that finding a perfect 1-factorization of K_n is related to a problem in coding, specifically, it can be reduced to constructing an MDS (Minimum Distance Separable), lowest density array code. In this paper, a new method for shortening arbitrary array codes is introduced. It is then used to derive the K_(p+1) family of perfect 1-factorization from the K_2p family. Namely, techniques from coding theory are used to prove a new result in graph theory-that the two factorization families are related
Development of rate-compatible structured LDPC CODEC algorithms and hardware IP
Issued as final reportSamsung Advanced Institute of Technolog
- âŠ