Lecture 6a (draft; 9/21/03). Linear codes. Weights, supports, ranks.
نویسنده
چکیده
A shortening of C on the coordinate i is the [n − 1, k − 1, d] linear code obtained by leaving only such codewords and deleting the ith coordinate. Let [n] := {1, . . . , n}, E ⊂ [n], Ē = [n]\E. For a matrix M with n columns we denote by M(E) the submatrix formed by all the columns with numbers in E. The support of a vector x ∈ H n q is defined as supp(x) = {i : xi 6= 0}. Given a subcode A ⊂ C, its support is supp(A) = {i ∈ [n] : ∃a∈A ai 6= 0} A shortening of C on the coordinates in Ē is a linear code C such that ∀x∈CE supp(x) ⊂ E. A projection of C on the coordinates in Ē, also called puncturing, is a restriction of C to the coordinates in E (simply said, deleting the coorinates in Ē from every codevector of C and deleting repeated entries from the result). The basic facts about shortenings and puncturings are given in the following
منابع مشابه
Lecture 2 (draft; 9/5/03). Average properties of codes.
In brief, we do not know very well how to construct good codes. This claim comes with a number of qualifiers (yes we know some very nice algebraic code families and some good randomized code ensembles), and yet in general it is true. How do we know what is achievable in principle in terms of code construction with infinite computational power? The answer is: by computing average properties of s...
متن کاملLinear codes with two or three weights from quadratic Bent functions
Linear codes with few weights have applications in secrete sharing, authentication codes, association schemes, and strongly regular graphs. In this paper, several classes of p-ary linear codes with two or three weights are constructed from quadratic Bent functions over the finite field Fp, where p is an odd prime. They include some earlier linear codes as special cases. The weight distributions...
متن کاملA new class of three-weight linear codes from weakly regular plateaued functions
Linear codes with few weights have many applications in secret sharing schemes, authentication codes, communication and strongly regular graphs. In this paper, we consider linear codes with three weights in arbitrary characteristic. To do this, we generalize the recent contribution of Mesnager given in [Cryptography and Communications 9(1), 71-84, 2017]. We first present a new class of binary l...
متن کاملLecture 6 (draft; 9/6/03). Error exponents for Discrete Memoryless Channels
Let us take a step back and suppose that information is transmitted over a discrete memoryless channel W with input and output alphabet X and output alphabet Y. The channel is defined by a stochastic matrix W . This means that a letter x ∈ X is received as y ∈ Y with probability wx,y = W (y|x) given by the corresponding entry of W . The term “stochastic matrix” means that its entries are betwee...
متن کاملCharacteristics of invariant weights related to code equivalence over rings
The Equivalence Theorem states that, for a given weight on the alphabet, every linear isometry between linear codes extends to a monomial transformation of the entire space. This theorem has been proved for several weights and alphabets, including the original MacWilliams’ Equivalence Theorem for the Hamming weight on codes over finite fields. The question remains: What conditions must a weight...
متن کامل