• No results found

Study of Some Bounds on Binary Codes

N/A
N/A
Protected

Academic year: 2020

Share "Study of Some Bounds on Binary Codes"

Copied!
7
1
0
Show more ( Page)

Full text

(1)

5

X

October 2017

(2)

Study of Some Bounds on Binary Codes

Rajiv Jain1, Jaskarn Singh Bhullar2

1,2

Department of Applied Sciences, MIMIT, Malout Punjab

Abstract: In this paper, various bounds on maximum number of codeword’s for a given size and minimum distance is discussed. Then these bounds are studied with example and various types of upper bounds are calculated for size and distance. The comparison of these bounds have been done and the tighter bounds for ( , ) is discussed.

Keywords: Error Correction, Binary Codes, Bounds, Hamming Bound, Plot kin Bound, Elias Bound

I. INTRODUCTION

For a given q-ary (n, M, d) error correcting code, n is the size of code, d is the minimum distance between codewords of the code and M is the maximum number of codewords in the code. The efficiency of error correcting code is measured by number of

codewords M in the code and the d is the error correcting capability of the code[1, 5]. It is necessary to have maximum number of

codewords M in code with minimum distance d as high as possible for a good error correcting code. But in practice, for a code of

given size n and minimum distance d, it is not always possible to obtain large M. So for given n, one has to negotiate between

number of codewords M and Minimum distance d.

For q> 1, The ( , ) is defined as the largest possible size M for which aq-ary code with size n, codeword’s and distance d exists.

( , ) = max { ∶an( , , ) code exists }

So, the bound on maximum number of codewords ( , )plays very important role in construction of codes in the Coding theory.

To find ( , ) for given q, n and d is main coding theory problem. In other words, the basic coding theory problem is to find

such a code of size n for given minimum distance d, which has maximum number of codewords. Generally it is not easy to find

( , ). To achieve the bounds of ( , ), a few basic theorems are used:

A. For q>1, ( , )≤ for all1≤ ≤

B. ( , 1) =

C. ( , ) =

II. SOMEBASICUPPERBOUNDSOF ( , )

In this paper, various basic upper bounds on size( or rate) of linear codes like Singleton bound, SpherePacking bound or Hamming

Bound, Plotkin bound, Johnson upper bound, and Elias Upper bound are discussed. Then their bounds on various values of n and d

are computed using their definitions. First the definitions of these upper bounds as follows:

A. Singleton bound

Singletonbound[1, 3, 5]is the one of the basic bound on the number of codewordsfrom the definition of codes. For integers ≥ ≥

1, integer q > 1,

( , )≤

For a parameter [ , , ] of linear code, when q is a prime power,then + −1≤ . The codes[ , , ]which satisfy this equality

i.e. + − = 1, are known as MDS Codes. Reed Solomon codes are good example of Maximum Distance Separable (MDS)

codes.

B. Hamming Bound or SpherePacking Bound

For integer n,q > 1& integer d, 1≤ ≤ , =

( , )≤

∑ ( −1)

TheSpheres of radius twith centre as individualcodewords are disjoint. As there are =∑ ( −1) total vectors in any one

(3)

Hamming or SpherePacking bound are known as Perfect codes[1, 5]. The (23, 12, 7)2and (11, 6, 5)3 are perfect codes as they satisfy the Hamming bound.

C. Plotkin Bound

The Plotkin Bound[1, 2, 5] is an improvement of the SpherePacking Bound on ( , ). Plotkin bounds gives more tightly bounds

than singleton bounds,SpherePacking bounds or hamming bounds for linear codes. It uses Cauchy Schwarz inequality to prove Plotkin bounds. Plotkin bounds holds for minimum distance d is close to size n.

For integer n,q > 1, integer dand = 1− , if < /

( , )≤

So, For binary codes, q = 2, Plotkin bounds becomes

≤ ⎩ ⎪ ⎪ ⎨ ⎪ ⎪ ⎧2

2 − when is even

4

< 2 = 2

2 + 1

2 + 1− when is odd < 2 + 1

4 + 4 = 2 + 1 ⎭

⎪ ⎪ ⎬ ⎪ ⎪ ⎫

D. Johnson Upper Bound

The constant weight codes are used to understand Johnson’s upper bound[1, 4, 5]on ( , ). If Cis codewordwith weight w then

( , , )is defined as themaximum of the number of codewordswith size n and distance dof a constant weight w. Then the

bounds on ( , , ) is used to find the upper bounds on ( , ).The following theorems are used to find ( , ) :

1) For Upper bound on ( , , ):

i. If ≤ 2 , and define = if is even

if is odd

( , , )≤ ( −1) ( −1)( −1)

−1 …

( − + )( −1)

ii. If > 2 , ( , , ) = 1

2) Johnson Upper bound on ( , ) is defined as:

Let = ,

If is odd

( , )≤

∑ ( −1) + ( )( , , ) ( , , )

If is even

( , )≤

∑ ( −1) + ( , ,( ))

E. Elias Upper Bound

Elias Upper bound is applied for constant weight error correcting codes. For a given n and d, Elias bound is weaker bound than Plotkin’s bound, Hamming Bound and Johnson upper bound.[1, 5].

For integer n>1, integer q > 1, integer d, ≥ ≥1, integer w < r nfor = 1− , & −2 + > 0, then

(4)

Where ( , ) =∑ ( −1)

III. ANEXAMPLE

To understand the concept of various upper bounds, we take the examples of bounds on (8, 4) are as follows:

A. Singleton Bound

For = 2, = 8, = 4

(8, 4)≤2 = 32

B. Hamming Bound or Sphere Packing Bound

For = 2, = 8, = 4

(8, 4)≤ 2

∑ 8 (2−1)

= 2

∑ 8 =

2 8 0 + 8 1 =2

9 ≈28

C. Plotkin Bound

For = 2, = 8, = 4 as here n = 2d

(8,4)≤4 (4) = 16

D. Johnson Bound

For = 2, = 8, = 4

Here d is even, therefore For = = 1

(8,4)≤ 2

∑ 8 (2−1) + (( , , ))

= 2

∑ 8 + ( , , )

= 256

9 + ( , , )

Now, for = 2, = 8, = 4, = 2, As is even, therefore = /2 = 4

(8,4,2)≤ ( −1) ( −1)( −1)

−1 …

( − + )( −1)

(8,4,2)≤ 8

2 = 4

So, (8, 4)≤

( , , )

= = = 16

TABLE I

VARIOUS BOUNDS ON A (8, 4)

Singleton Bound Sphere Packing or Hamming Bound Plotkin Bound Johnson

Bound Elias Bound

A2(8, 4) 32 28 16 16

w = 1 w = 2 w = 3

50 27 44

E. Elias Bound = 2, = 8, = 4

For = , integer < 8 = 4,And −8 + 16 > 0, So = 1, 2, 3 then

( , )≤

(5)

So, (8,4)≤ 16

−8 + 16

2 (8, )

Now, ( , ) = ( −1)

For = 1, (8, 1) =∑ 8 (2−1) =∑ 8 = 8

0 +

8

1 = 9

For = 2, (8, 2) =∑ 8 (2−1) =∑ 8 = 8

0 +

8

1 +

8

2 = 37

For = 3, (8, 3) =∑ 8 (2−1) =∑ 8 = 8

0 + 8 1 + 8 2 + 8

3 = 93

So, For = 1, (8, 4)≤ 16

−8 + 16

2

(8, )=

16 9

2

9 ≈50

So, For = 2, (8, 4)≤ 16

−8 + 16

2

(8, )=

16 4

2

37≈27

So, For = 3, (8, 4)≤ 16

−8 + 16

2

(8, )=

16 1

2

93≈44

IV. CONCLUSION

After applying the above defined upper bounds on ( , ), the following table is obtained. From tableII, it is observed that Plotkin

bound is much tighter bound on than Hamming bound and Singleton bound. For n= 8, d=4, Plotkin bound and Johnson bound gives the value 16 which is much tighter than singleton bound and hamming bound which are 32 and 28 respectively. But the drawback of Plotkin bound is that it is valid only for minimum distance d near to the size n.Due to which Plotkin bound is not defined large

values of size of code as compared to minimum distance d. Also it can be seen from table II that Johnson bound is much tighter

bound that Singleton bound, SpherePacking bound and Plotkin Bound, whereas Elias bound are very weak bound defined on constant weight codes. As for n= 10, d=4, Johnson bound gives the value 51 which is much tighter than singleton bound and hamming bound which are 128 and 93 respectively and Plotkin bound is not defined. Also it can be seen from Table Ithat Elias

bound for w = 1, 2, 3 are much higher than other bounds discussed here. So it is concluded that for construction of linear binary

codes, researcher should keep in mind of Johnson bounds on linear binary codes than other bounds discussed here.

TABLE II

SINGLETON BOUND,SPHERE PACKING BOUND,PLOTKIN BOUND AND JOHNSON BOUNDS ON A (N,D)

Singleton Bound

Size →

distance ↓

3 4 5 6 7 8 9 10 11 12

3 2 4 8 16 32 64 128 256 512 1024

4 --- 2 4 8 16 32 64 128 256 512

5 --- --- 2 4 8 16 32 64 128 256

7 --- --- --- --- 2 4 8 16 32 64

Sphere Packing Bound

Size →

distance ↓

3 4 5 6 7 8 9 10 11 12

3 2 3 5 9 16 28 51 93 170 315

4 --- 3 5 9 16 28 51 93 170 315

5 --- --- 2 2 4 6 11 18 30 51

7 --- --- --- --- 2 2 3 5 8 13

Plotkin Bound

Size →

distance ↓

(6)

4 --- 2 2 4 8 16 20 --- --- ---

5 --- --- 2 2 2 4 6 12 24 ---

7 --- --- --- --- 2 2 2 2 4 4

Johnson Bound

Size →

distance ↓

3 4 5 6 7 8 9 10 11 12

3 2 2 4 8 16 25 51 83 167 292

4 --- 2 2 5 8 16 26 51 89 170

REFERENCES

[1] F. J. Mac Williams and N. J. A. Sloane, The Theory of Error-Correcting Codes, Amsterdam, North-Holland, 1977.

[2] M. Plotkin, "Binary codes with specified minimum distance," in IRE Transactions on Information Theory, vol. 6, no. 4, pp. 445-450, September 1960. [3] R. Singleton, "Maximum distanceq-nary codes," in IEEE Transactions on Information Theory, vol. 10, no. 2, pp. 116-118, April 1964.

[4] S. M. Johnson, "A new upper bound for error-correcting codes" in IRE Transactions on Information Theory, vol. 8, no.3, pp. 203–207, April 1962.

(7)

References

Related documents

Inquiry into mechanisms for compensation for economic loss to farmers in Western Australia caused by contamination by genetically modified material: Submissions &amp; Hearings.

End-user services are likely to succeed where the end-user needs to interact with content – hence, addressing the question of where different user groups need access to open

In Vitro Cytotoxicity Assay and Apoptosis Analysis The csMSN were incubated with A549 cells for 72 h at different concentrations (from 12.5 to 500 μ g/ml).. As seen

But the song connects this fantasy vision to the power of ideology, in particular the power of our desire to love something even if this love must prove

Resuspend the mitochondrial pellet in 500 μl Mitochondrial Lysis Buffer and incubate at room temperature for 10–15 minutes.. Following this, incubate the sample on ice for 1 minute

Floating tablets of Cefuroxime Axetil were prepared using Albizia gum, Dammar gum and Moi gum as polymers for controlling the drug release.. Cefuroxime Axetil

In this thesis, we consider a multiuser massive MIMO downlink system, where a BS equipped with a large number of antennas serves multiple single-antenna users over the same channel.

Follow- ing the research trend of experimental probabilistic pragmatics (exemplified, among others, by RSA and RSA-like modeling of pragmatic phenomena) we bring together

1) IEPS 2.1 (formerly IEG 11) has been rewritten and updated. Is the document still helpful to member bodies in addressing the requirements of IES 2 and other International Education

In this study, bacterial production and purification of recombinant GRA8 protein (rGRA8) was accomplished as a basis for developing an ELISA test using combination of different

Prosjek ocjena na studiju i trajanje studiranja ne ovise o vrsti završene srednje škole, ali gledajući cijeli uzorak, postoji povezanost između prosjeka u srednjoj školi i

(2008) &#34;CBT for the Treatment of Depression in Young Adults: A Review and Analysis of the Empirical Literature,&#34; Graduate Journal of Counseling Psychology: Vol. 1,

Shaded area represents the re- gion between the average of the upper and lower hound +/- the upper bound on the standard deviation. Bound on Average Average - Upper

It is desirable to study upper and lower bounds on the minimum distance and dimensions of quantum codes, so the computer search on the code parameter can be minimized and optimal

Variable Quantity Lower Bound Upper Bound Interval Pages Translated Earnings.. Calculate the difference between the upper and lower bounds for each quantity and the number of

2.1. Upper Bound for American options. Upper Bounds for Swing Options. Upper Bounds for Swing Options with Volume Constraint. Directions for Further Research. Hourly Forward

In this paper we extend this upper bound so as to apply to forests in which the trees have upper bounds on their diameter and vertex degrees.. This concept is

- Since: vì (Since và As được dùng khi người nói muốn nhắc đến một lý do nào đó mà người nói cho rằng người nghe đã biết hoặc cho rằng nó là một thông tin

• The lower bound is used for early timing • The upper bound is used for late timing • This is called an early/late split. • Static timing obtains bounds on

In the event that the Company determines that any of the events set forth below has occurred or is occurring with respect to an BusinessConnect Server that has been

California not only opted in to the federal provision banning persons convicted of drug related felonies from TANF and Food Stamps, but went further by also excluding those who

Communication Preferences and Job Satisfaction Levels of North Carolina Cooperative Extension

4 FINDINGS AND DISCUSSSION 48 Introduction 48 49 Demographic Profile of the Respondents Research Objective 1: To describe the parenting styles of Malay, Chinese and Indian parents