共查询到20条相似文献,搜索用时 15 毫秒
1.
We describe a code lengthening technique that uses unequal error protection codes as suffix codes and combine it with iteration of the conventional Construction X. By applying this technique to BCH codes, we obtain five new binary codes, 13 new ternary codes, and 13 new quarternary codes. An improvement of Construction XX yields two new ternary codes. 相似文献
2.
We consider generalized algebraic-geometry codes, based on places of the same degree of a fixed algebraic function field over a finite field. In this note, using a method similar to the Justesen’s one, we construct a family of such codes which is asymptotically good.Communicated by: D. Jangnickel 相似文献
3.
It is shown how ternary BCH codes can be lengthened to get linear codes with covering radius 2. The family obtained has the ternary Golay code as its first code, contains codes with record-breaking parameters, and has a good asymptotic behavior. The ternary Golay code is further used to obtain short proofs for the best known upper bounds for the football pool problem for 11 and 12 matches. 相似文献
4.
5.
The Goethals code is a binary nonlinear code of length 2m+1 which has
codewords and minimum Hamming distance 8 for any odd
. Recently, Hammons et. al. showed that codes with the same weight distribution can be obtained via the Gray map from a linear code over Z
4of length 2m and Lee distance 8. The Gray map of the dual of the corresponding Z
4 code is a Delsarte-Goethals code. We construct codes over Z
4 such that their Gray maps lead to codes with the same weight distribution as the Goethals codes and the Delsarte-Goethals codes. 相似文献
6.
M. A. Shokrollahi 《Designs, Codes and Cryptography》1996,9(2):203-213
Let p be an odd prime and
be a primitive p th root of unity over
. The Galois group G of
over
is a cyclic group of order p-1. The integral group ring
[G] contains the Stickelberger ideal S
p
which annihilates the ideal class group of K. In this paper we investigate the parameters of cyclic codes S
p
(q) obtained as reductions of S
p
modulo primes q which we call Stickelberger codes. In particular, we show that the dimension of S
p
(p) is related to the index of irregularity of p, i.e., the number of Bernoulli numbers B
2k
,
, which are divisible by p. We then develop methods to compute the generator polynomial of S
p
(p). This gives rise to anew algorithm for the computation of the index of irregularity of a prime. As an application we show that 20,001,301 is regular. This significantly improves a previous record of 8,388,019 on the largest explicitly known regular prime. 相似文献
7.
Vince Grolmusz 《Designs, Codes and Cryptography》2006,38(3):363-372
We define, construct and sketch possible applications of a new class of non-linear codes: co-orthogonal codes, with possible
applications in cryptography and parallel processing. We also describe a fast and general method for generating (non-linear)
codes with prescribed dot-products with the help of multi-linear polynomials. 相似文献
8.
We show that almost all codes satisfy an antichain condition. This states that the minimum length of a two dimensional subcode of a code C increases if the subcode is constrained to contain a minimum weight codeword. In particular, almost no code satisfies the chain condition. In passing, we study the typical behaviour of codes with respect to generalized distances and show that almost all lie on a generalized Varshamov-Gilbert bound. 相似文献
9.
We show how to get a 1-1 correspondence between projective linear codes and 2-weight linear codes. A generalization of the construction gives rise to several new ternary linear codes of dimension six. 相似文献
10.
研究给出了一类基于循环码的常重复合码的构造,并利用指数和计算其参数.与相关的常重复合码相比,该码具有更多的码字,且渐近性较好. 相似文献
11.
《Finite Fields and Their Applications》2000,6(3):255-281
Classical Goppa codes are a special case of Alternant codes. First we prove that the parity-check subcodes of Goppa codes and the extended Goppa codes are both Alternant codes. Before this paper, all known cyclic Goppa codes were some particular BCH codes. Many families of Goppa codes with a cyclic extension have been found. All these cyclic codes are in fact Alternant codes associated to a cyclic Generalized Reed–Solomon code. In (1989, J. Combin. Theory Ser. A 51, 205–220) H. Stichtenoth determined all cyclic extended Goppa codes with this property. In a recent paper (T. P. Berger, 1999, in “Finite Fields: Theory, Applications and Algorithms (R. Mullin and G. Mullen, Eds.), pp. 143–154, Amer. Math. Soc., Providence), we used some semi-linear transformations on GRS codes to construct cyclic Alternant codes that are not associated to cyclic GRS codes. In this paper, we use these results to construct cyclic Goppa codes that are not BCH codes, new families of Goppa codes with a cyclic extension, and some families of non-cyclic Goppa codes with a cyclic parity-check subcode. 相似文献
12.
Almost MDS Codes 总被引:2,自引:0,他引:2
Mario A. de Boer 《Designs, Codes and Cryptography》1996,9(2):143-155
MDS codes are codes meeting the Singleton bound. Both for theory and practice, these codes are very important and have been studied extensively. Codes near this bound, but not attaining it, have had far less attention. In this paper we study codes that almost reach the Singleton bound. 相似文献
13.
Masaaki Harada 《Designs, Codes and Cryptography》1996,8(3):273-283
Recently the author and Kimura have considered a construction of doubly-even codes from a given doubly-even code. In this note, we show that the restricutoion of doubly-even can be removed in the above construction. As an application, at least 137 inequivalent extremal doubly-even [56,28,12] codes and at least 1000 inequivalent extremal doubly-even [40,20,8] codes are constructed from known self-dual codes. The existence of new extremal singly-even codes is also described. 相似文献
14.
Extending MDS Codes 总被引:1,自引:0,他引:1
T. L. Alderson 《Annals of Combinatorics》2005,9(2):125-135
A q-ary (n, k)-MDS code, linear or not, satisfies n ≤ q + k − 1. A code meeting this bound is said to have maximum length. Using purely combinatorial methods we show that an MDS code with n = q + k − 2 can be uniquely extended to a maximum length code if and only if q is even. This result is best possible in the sense that there is, for example, a non-extendable 4-ary (5, 4)-MDS code. It may be that the proof of our result is as interesting as the result itself. We provide a simple necessary and sufficient condition
for code extendability. In future work, this condition might be suitably modified to give an extendability condition for arbitrary (shorter) MDS codes.Received December 1, 2003 相似文献
15.
16.
Laura Monroe 《Designs, Codes and Cryptography》1996,9(1):79-83
In this paper, we examine greedily generated self-orthogonal codes. Weshow that they are linear, and discuss several properties whichthey possess. We also look at specific examples of these codes. 相似文献
17.
J. Wolfowitz 《Probability Theory and Related Fields》1979,46(3):307-315
Summary We prove coding theorems for list codes for compound channels and for codes within codes. The theorems imply corresponding results for what are usually called simply codes, which are list codes where one is the maximum decoding list length permitted to the decoder. The Bergmans coding theorem for degraded channels ([4], Theorem 15.2.1) and the positive part of the Wyner-Ziv theorem ([4], Theorem 13.2.1) are easy consequences of our results.Research supported by the National Science Foundation under Grant No. MCS 78-02148 相似文献
18.
An almost affine code is a code C for which the size of all codes obtained by multiple puncturing of C is a power of the alphabet size. Essentially, almost affine codes are the same as ideal perfect secret haring schemes or partial affine geometries. The present paper explores these interrelations, gives short proofs of known and new results, and derives some properties of the distance distribution of almost affine codes. 相似文献
19.
Three binary fingerprinting code classes with properties similar to codes with the identifiable parent property are proposed. In order to compare such codes a new combinatorial quality measure is introduced. In the case of two cooperating pirates the measure is derived for the proposed codes, upper and lower bounds are constructed and the results of computer searches for good codes in the sense of the quality measure are presented. Some properties of the quality measure are also derived.AMS classification:94B60, 94B65 相似文献
20.