8 research outputs found
On Optimal Anticodes over Permutations with the Infinity Norm
Motivated by the set-antiset method for codes over permutations under the
infinity norm, we study anticodes under this metric. For half of the parameter
range we classify all the optimal anticodes, which is equivalent to finding the
maximum permanent of certain -matrices. For the rest of the cases we
show constraints on the structure of optimal anticodes
Limited-Magnitude Error-Correcting Gray Codes for Rank Modulation
We construct Gray codes over permutations for the rank-modulation scheme,
which are also capable of correcting errors under the infinity-metric. These
errors model limited-magnitude or spike errors, for which only
single-error-detecting Gray codes are currently known. Surprisingly, the
error-correcting codes we construct achieve a better asymptotic rate than that
of presently known constructions not having the Gray property, and exceed the
Gilbert-Varshamov bound. Additionally, we present efficient ranking and
unranking procedures, as well as a decoding procedure that runs in linear time.
Finally, we also apply our methods to solve an outstanding issue with
error-detecting rank-modulation Gray codes (snake-in-the-box codes) under a
different metric, the Kendall -metric, in the group of permutations over
an even number of elements , where we provide asymptotically optimal
codes.Comment: Revised version for journal submission. Additional results include
more tight auxiliary constructions, a decoding shcema, ranking/unranking
procedures, and application to snake-in-the-box codes under the Kendall
tau-metri
Error-Correction in Flash Memories via Codes in the Ulam Metric
We consider rank modulation codes for flash memories that allow for handling
arbitrary charge-drop errors. Unlike classical rank modulation codes used for
correcting errors that manifest themselves as swaps of two adjacently ranked
elements, the proposed \emph{translocation rank codes} account for more general
forms of errors that arise in storage systems. Translocations represent a
natural extension of the notion of adjacent transpositions and as such may be
analyzed using related concepts in combinatorics and rank modulation coding.
Our results include derivation of the asymptotic capacity of translocation rank
codes, construction techniques for asymptotically good codes, as well as simple
decoding methods for one class of constructed codes. As part of our exposition,
we also highlight the close connections between the new code family and
permutations with short common subsequences, deletion and insertion
error-correcting codes for permutations, and permutation codes in the Hamming
distance
Synchronization with permutation codes and Reed-Solomon codes
D.Ing. (Electrical And Electronic Engineering)We address the issue of synchronization, using sync-words (or markers), for encoded data. We focus on data that is encoded using permutation codes or Reed-Solomon codes. For each type of code (permutation code and Reed-Solomon code) we give a synchronization procedure or algorithm such that synchronization is improved compared to when the procedure is not employed. The gure of merit for judging the performance is probability of synchronization (acquisition). The word acquisition is used to indicate that a sync-word is acquired or found in the right place in a frame. A new synchronization procedure for permutation codes is presented. This procedure is about nding sync-words that can be used speci cally with permutation codes, such that acceptable synchronization performance is possible even under channels with frequency selective fading/jamming, such as the power line communication channel. Our new procedure is tested with permutation codes known as distance-preserving mappings (DPMs). DPMs were chosen because they have de ned encoding and decoding procedures. Another new procedure for avoiding symbols in Reed-Solomon codes is presented. We call the procedure symbol avoidance. The symbol avoidance procedure is then used to improve the synchronization performance of Reed-Solomon codes, where known binary sync-words are used for synchronization. We give performance comparison results, in terms of probability of synchronization, where we compare Reed-Solomon with and without symbol avoidance applied
Spectral shaping permutation coding with injections
Abstract: Please refer to full text to view abstract.Ph.D. (Electric and Electronic Engineering Science
Two constructions of permutation arrays
10.1109/TIT.2004.826659IEEE Transactions on Information Theory505881-883IETT