throbber
392
`
`[41
`[51
`WI
`
`[71
`
`PI
`
`[91
`WI
`
`WI
`WI
`
`REFERENCES
`F. J. MacWilliams and N. J. A. Sloane, The Theory of’ Error-Correcring
`Codes. New York: North Holland, 1977.
`S. Lin and D. J. Costello, Jr., Error Control Coding: Fundamentals and
`Applications. Englewood Cliffs, NJ: Prentice-Hall, 1982.
`V. I. Koahik, “Bounds on undetected error probability and optimum
`group codes in a channel with feedback,” Telecommun. Radio Eng., vol.
`20, no. 1, pt. 2, pp. 87-92, Jan. 1965.
`V. K. Leontev, “Error-detecting encoding,” Probl. Inform. Transmission,
`vol. 8, pp. 86-92, 1972.
`V. I. Levenshtein, “Bounds on the probability of undetected error,”
`Probl. Inform. Transmission, vol. 13, pp. 1-12, 1978.
`S. K. Leung-Yan-Cheong and M. E. Hellman, “Concerning a bound on
`undetected error probability,”
`IEEE Trans. Iform. Theory, vol. IT-22,
`no. 2, pp. 235-237, Mar. 1976.
`S. K. Leung-Yan-Cheong, E. R. Barnes, and D. U. Friedman, “Some
`properties of undetected error probability of linear codes,” IEEE Trans.
`Theory, vol. IT-25, no. 1, pp. 110-112, Jan. 1979.
`Inform.
`J. K. Wolf, A. M. Michelson, and A. H. Levesque, “On the probability
`of undetected error for linear block codes,” IEEE Trans. Commun., vol.
`COM-30, no. 2, pp. 317-324, Feb. 1982.
`T. Kasami, T. Klove, and S. Lin, “Linear block codes for error detection,”
`IEEE Truns. Inform. Theory, vol. IT-29, no. 1, pp. 131-136, Jan. 1983.
`T. Helleseth, T. Klove, and J. Mykkeltveit, “The weight distribution of
`irreducible cyclic codes with block lengths n,( q’ - 1)/N,” Discrete Math.,
`vol. 18, pp. 179-211, 1977.
`J. MacWilliams, “A
`theorem on the distribution of weights in a sys-
`tematic code,” Bell Syst. Tech. J., vol. 42, pp. 79-94, Jan. 1963.
`R. Padovani and J. K. Wolf, “Data transmission using error detection
`codes,” in GLOBECOM ‘82, IEEE Global Telecom. Conf., Miami, Nov.
`29-Dec. 2, 1982, pp. 626-631.
`
`On an Infinite Series of [4n, 2 n ] Binary Codes
`LkON ti. H. E. DRIESSEN, MEMBER, IEEE
`
`correspondence deals with an infinite series of binary,
`Abstract-This
`reversible [4n, 2n, 41, n 1 2, unequal error protection codes, which are
`majority logic de&able. The weight emtmerators and automorphism groups
`are determined completely. For n .even the codes are ,self dual. By pasting
`together copies of a [4n, 2n, 41 code, binary codes with parameters
`[8n,2n,8]
`for n L 2,
`[8n,2n,l2]
`for n 24,
`and [12n,2n,16]
`and
`[16n, 2n, 241 for n > 3 are obtained.
`I.
`INTRODUCTION
`The decoder with the best error correction performance for an
`[n, k, d] binary code to be used on a binary symmetric channel,
`is a complete nearest neighbor decoder [l, p. 111. That is, any
`received word is mapped into a codeword that is nearest in
`Hamming distance. In many applications not all message bits are
`equally important and errors in more important bits are more
`serious than errors in less important bits. The question arises to
`what extent error patterns of weight greater than 1 (d - 1)/2]
`can be decoded such that the most important message bits are
`correctly retrieved. This is the same as asking for an [n, k, d]
`binary unequal error protection (UEP) code which is optimal [2],
`[31.
`In an experimental digital recorder we have implemented an
`optimal [12,6,4] binary UEP code [4], which guarantees the two
`most important message bits to be protected against two bit
`errors in the corresponding codeword. This code is a member of
`an infinite class of [4n, 2 n, 41 binary UEP codes which will be
`defined and studied in the next section. The [12,6,4] UEP code is
`used as an example throughout the correspondence.
`
`IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. IT-30, NO. 2, MARCH 1984
`
`In Section III constructions of [4nr, 2 n] binary codes are given
`for r = 1,2, 3, and 4. These constructions are based on a detailed
`knowledge of the weight structure of the codes from Section II.
`Several codes constructed in this correspondence are optimal in
`the sense that they have the largest minimum distance known for
`a binary code with the same length and dimension [5].
`The notation we use and basic concepts will be explained
`where necessary. For additional information on coding theory or
`group theory the reader is referred to [l] and [6], respectively.
`II.
`INFINITE SERIES OF [4n, 2 n, 41 BINARY CODES
`AN
`this section we define and study an infinite class of
`In
`[4n, 2n, 41, n 2 2, binary codes. As these codes may be consid-
`ered to be generalizations of the code F16 of [7], they are denoted
`by 4;.
`Let Z, be the n by n identity matrix and let J, be the
`Definition:
`n-by-n all-one matrix. The code I;k, is defined by the generator
`matrix
`
`Gdn:=
`
`b(2) = g(“+‘),
`
`Let gci) be the ith row of G4,, and let the codewords b(l),
`1 I
`i I 2n, be defined by
`b(l) = g(l) md
`p-u
`= g(‘) + g(r),
`21iIn,
`p) = g(n+l) + g(“+‘)
`21iIn.
`The code generated by { b(‘): 3 I
`i I 2 n } is called Ban.
`Let V, be ‘the n-dimensional vector space over GF(2); On
`denotes the all-zero word in V, and 1, denotes the all-one word
`in y?. For A c V, and x E V, we denote by x + A the coset of A
`obtained by (componentwise modulo 2) addition of x to each
`element of A.
`The cosets B4;, b(l) + B4,,, bc2) + B4,,, and b(l) + bc2) + Bdn are
`denoted by Bdw B”
`and B”
`respectively. Clearly Fb,, =
`B”’
`BdT U Biz U B>j u”%iA!%e shall 4n”dw derive the weight enumer-
`ators of these cosets of B4,,.
`The (Hamming) weight of x E V, is denoted by wt (x) and the
`(Hamming) weight enumerator of A c V, is denoted by W(A ;
`z), where z is an indeterminate.
`Lemma: A codeword c E F4,, can be expressed as c =
`i, j I 1 it holds
`(x3 Y>G4,,,, where x E Z$ and y E V,. For 0 I
`that c E BiJ, if and only if wt(x) = imod
`and wt( y) =jmod2.
`The lemma immediately follows from the observation that
`
`c =
`
`(~9 Y)G,,
`
`=i
`
`x,g(i)
`
`+
`
`yjg(n+~)
`
`L
`j=l
`
`i=l
`
`i=2
`
`+
`
`2
`j=2
`
`i=l
`
`yj(g(n+j)
`
`+ g(n+l))
`
`+
`
`pi"+"j$lYj~
`
`Theorem 1: The weight enumerators of the cosets of B4* in Fd,,
`are
`
`WB4:;
`
`z)
`
`Manuscript received August 13, 1982; revised March 29, 1983.
`The author is with Philips Research Laboratories, P.O. Box 80.000, 5600 JA
`Eindhoven, The Netherlands.
`
`W(B,‘,o; z) = W(Bj;;
`
`z) = 2”-’
`
`y’
`
`( 2i 1 J2)1+2+41,
`
`WB,‘:;
`
`z)
`
`= 22n-2z2n
`
`0018-9448/84/0300-0392$01.00 01984 IEEE
`
`IPR2018-1556
`HTC EX1055, Page 1
`
`

`

`IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. IT-30, NO. 2, MARCH 1984
`
`393
`
`Proof: From the Lemma we deduce that
`c E B4y if and only if wt (x) and wt ( y) are even, in which
`case c = (x, x, y, y) and wt(c) = 2(wt(x) + wt( y)),
`if and only if wt (x)
`is odd and wt ( y) is even, in
`c E Biz
`which case c = (x,x, y, y + 1,) and wt(c) = n + 2wt(x),
`if and only if wt (x)
`is even and wt ( y) is odd, in
`c E Bji
`whichcasec=(x+
`ln,x,y,y)andwt(c)=
`n+ 2wt(y),
`c E BlA if and only if wt (x) and wt ( y) are odd, in which case
`c = (x + l,, x, y, y + 1,) and wt(c) = 2n.
`The expressions for the weight enumerators are now easily found.
`Q.E.D.
`From Theorem 1 we know that Fan, n 2 2, has minimum
`distance 4. There is a generalization of the concept of minimum
`distance, called separation vector, the value of which strongly
`depends on the encoding procedure [2], [3]. Let h(l), h(‘);
`.,hck)
`be k basis codewords according to which the encoding takes
`place. That is, if tn E V,, the corresponding codeword is c(m) =
`m,h(‘) + m,ld2) +
`. . . + m,hck). The separation vector s =
`(Sl, S2,‘. . ,s,) is defined bysi:= min{wt(c(m)): m E.V~, m, =
`l}
`for 1 I
`i 5 k. A separation vector s guarantees the correct
`if the number of errors in the code
`retrieval of message bit mi
`word c(m) is at most [(sI - 1)/2],
`[2], [3]. If not all s, are equal
`to the minimum distance, the code is said to have the unequal
`error protection property. For n 2 3, the code F4, has the UEP
`property. We state this in Theorem 2.
`Theorem 2: The code F4,,, n 2 2, has the following properties:
`a) Fdn is reversible.
`b) F4, is equivalent to its dual code.
`c) Fan is self dual if and only if n is even.
`d) F4, is equivalent to a double circulant code.
`e) If the message word m E V,, is encoded as c(m) = mlbC1)
`. . . + m2nb(2n), then F4,, n 2 3, has the UEP
`+ m2bC2) +
`property with separation vector s, si = s2 = n + 2, and
`si = 4 for 3 I
`i 5 2n.
`f) F4, is majority logic decodable.
`Proof:
`a) The reversibility
`matrix G+
`b) The matrix obtained from G4,, by interchanging the columns
`i and n + i for 1 _< i 5 n and 2n + 1 I
`i 4 3n is a parity check
`matrix for F4,.
`c) Ed, is self dual if and only if G4,,GTn = Ozn, thus if and only
`if n is even.
`d) The matrix formed by taking the columns of G,, in the
`order n + i, i,2n + i,3n + i for i = 1,2;..,n,
`is the generator
`matrix of a quasi-cyclic code with shift 2.
`e) If m E V,,, then c(m) E B4;lm*.
`.,szn):
`The separation vector is s = (si, s2;.
`Sl = min {wt(c):
`c E Bi’f, U Biz}
`= n + 2,
`s2 = min{wt(c):cEB~~UB~~}=n+2,
`c E Fan}
`si = wt(b(‘)) = 4 = min {wt(c):
`For n 2 3 this proves the UEP property of Ed,.
`f) For m E V,, we define x(m) and y(m) as
`
`follows immediately
`
`from
`
`the generator
`
`and
`for 3 I
`
`i 5 2n.
`
`x(m):=
`
`i
`i=l
`
`i
`
`m2i-1, m3, m5,...,m2n-1
`
`i
`
`and
`
`y(m):=
`
`i m2,, m4, m6,..‘,m2n
`( i=l
`
`.
`
`i
`
`Then we have
`c(m) = (x(m), u(m>)G,
`= (x(m) + m21n, x(m), y(m), v(m) + mll,,).
`
`Let 2 be the received word. We have to find a number of
`checks on each message bit m, such that with majority
`logic
`decoding the error protection as specified by e) is achieved. For
`j = 1,2,3,4 we definepi:= C:=l?(j-l)n+i. Consider m, first.
`If n is even, then it is easy to find n + 2 orthogonal checks [3]
`i < n. If n is
`on ml, namely pi, p2, and ?2n+r + E3n+i for 1 I
`odd we again have the n orthogonal checks c2,,+ i + ?3n+i for
`1 I
`i I n but the other checks, although orthogonal to the previ-
`ous ones, will not be mutually orthogonal. Note that p2, 2, +
`^
`c,+l + ~1, and 22 + G+2 + p1 are three checks on m, which
`only involve the bits ?,; . ., 2,“.
`If these checks are mutually
`equal, which happens to be so if
`there are no errors among
`L
`Cl,‘. ‘,%I, then p2 is considered as a double check on ml.
`If the
`three checks are not mutually equal, which happens to be so if
`exactly one error occurs among ?,, . . . , ?,, , then p2 and p2 + 1
`are considered as checks on ml (or no check is considered).
`It is easily seen that a majority vote on the n + 2 checks on ml,
`found as explained above, guarantees m, to be correctly retrieved
`if at most 1 (n + 1)/2] errors occur in 2. In a similar way n + 2
`checks on m2 are found.
`Once we have m, and m 2, four orthogonal checks on m 2i _ 1 for
`2 5 i 5 n are ?i + m2, ?n+i, p1 + & + m, + (m2
`if n is even),
`mdP2 + cn+i + m,. In a similar way four orthogonal checks on
`Q.E.D.
`m2i for 2 I
`i I n are found.
`Example: Let n = 3. The code F12 is generated by
`f)“’ = p
`= (LO, &LO, o,o, 090, 1, 1,1)
`
`@’
`
`= &4)
`
`=
`(l,l,l,o,o,o,l,o,o,l,o,o)
`b(3) = g(l) + g(2) = (1, LO, 1, l,O, o,o, o,o, 0,O) \
`b(4) = g(4) + g(5) = (0, o,o,o, o,o, l,l, O,l, 1,O)
`b(5) = g(l) + g(3) = (LO, 1, l,O, LO, o,o, O,O,O)
`b(6) = g(4) + $6) = (O,O,O, o,o, O,l, O,l, l,O, 1) j
`
`generate B,,
`
`in F12 are
`The weight enumerators of the cosets of B,,
`=l + 6z4 + 9zs,
`W4”;
`z)
`12z5 + 4z9,
`W( B;;; z) = W(B;;;
`z) =
`=
`16~~.
`WB::;
`z)
`F12 is equivalent to the double circulant code with
`culants (100000) and (110101).
`F12 is a [12,6,4] code with separation vector (5,5,4,4,4 4). This
`is optimal [3], [4]. The check sets on m,, m2;.
`.,m6 are
`^
`^
`4
`= Cl + ClO,
`= E, +
`i?,,,
`ml
`m, = 2, f ?,,,
`
`the cir-
`
`elsep, + 1.
`
`m2 = C, + ?,,
`m2 = C, + C,,
`m2 = ?, + Z,,
`m2 = t, + 2, + t, = p3,
`+ cl2 + Es
`m2 = p3 if 2, + 2s + 2, = E,, + ?,, + t, = c -10
`^
`elsep, + 1.
`
`m3=2,+m2,
`m3 = Z,,
`m3 = ?, + 2, -I- m,,
`m3 = 2, i- ?, + m,.
`m5 = i?, + m2,
`m5 = Z,,
`m5 = t, + e2 + ml,
`^
`I
`m5 = c4 •t c5 + m,.
`
`m4 = t,,
`m4 = C,, + m,,
`m4 = ?, •t 2, + m2,
`m4 = L?,, •t ?,, •t m2,
`m6 = t,,
`m6 = Z,, + m,,
`m6 = ?, + ?, •t m2,
`e
`m6 = cl0 + i?,, + m2.
`
`IPR2018-1556
`HTC EX1055, Page 2
`
`

`

`394
`
`IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. IT-~& NO. 2, MARCH 1984
`
`We have proved that Aut (F4,) = T, X &, X 3, X S/, X SL.
`Q.E.D.
`
`Example: Let n = 3.
`T, =
`((1>,(1,12>(2,11)(3,10)(4,9)(5,8)(6,7)).
`L, =
`((1>,(1,4),(2,5>,(3,6),(1,4)(2,5),(1,4)(3,6),
`(2,5)(3,6>,(1,4>(2,5>(3,6)}.
`((1>,(1,4>(2,5),(1,4>(3,6),(2,5)(3,6)}.
`{(1>,(7,lO>,(8,ll>,(9,12),(7,10)(8,11),
`(7,10)(9,12),
`(8,11)(9,12),
`(7,10)(8,11)(9,12)}.
`
`L3 =
`R, =
`
`+ l),
`
`- 2) ... (2n,2n
`
`The code F, is an [8,4,4] code with weight enumerator W(F8;
`Z) = 1 + 1424 + z8 and hence F8 is the nearly perfect and self
`dual [8,4,4] extended Hamming code or, equivalently, the first-
`order Reed-Muller code of length 8 [l, p. 281. Consequently the
`automorphism group of 10, is the general affine group GA(3) [l,
`p. 3761 of order 1344. The automorphism group of F4,, n 2 3, is
`given by Theorem 3.
`If ?r is a permutation of { 1,2,. . , n }, then r~ induces a mapping
`of V, onto V, as follows:
`the word x E V, is mapped onto
`g(x)
`=
`(x,-l(l),
`x,-1(2),‘.
`.,x,-y,)).
`The automorphism group of A c V, is denoted by Aut (A).
`Theorem 3: Let the permutations 7, hi, and p,, 1 I
`i I n, of
`., 4n) be given by
`{1,2;.
`- 1)(3,4n
`7 = (1,4n)(2,4n
`A, = (i, n + i),
`pi = (2n + i,3n + i).
`Let T,, L,, &,, R,, and R,, be the groups generated by r, {xi:
`1 < i I n},
`{ hihi: 1 I
`i < j I n}, {pi: 1 5 i 4,n}, and { p,p,:
`1 I
`i < j I n }, respectively. Let S,’ be the symmetric group on n
`points acting on {1,2;..,n}
`and
`{n + 1, n + 2;..,n
`+ n}
`simultaneously. Let Sl be the symmetric group on n points acting
`+
`on (2n + 1,2n + 2;.., 2n + n} and (3n + 1,3n + 2;..,3n
`n} simultaneously. The automorphism groups of B4n and F4,,,
`n 2 3, respectively, are
`Aut (B,,)
`= T, x L, x R, X S; X S;
`Aut (F4,) = T, X z, x &, X S, X S,r.
`Both groups are l-transitive groups acting on 4n points and have
`order 22”+‘(n!)2 and 22”-‘(n!)2,
`respectively.
`Proof: A permutation of the coordinate set acting on words
`is weight-preserving. From theorem 1 it follows that for n 2 3
`any codeword of F4, having weight 4 is in B4,,. Since B4n is
`generated by codewords of weight 4, we have that for n 2 3
`Aut ( F4n) is a subgroup of Aut ( B4n).
`From the lemma we know that
`{(x,x,y,y):x~
`V,,wt(x)iseven;
`B4n=
`y E &,wt(y)iseven}.
`Due to the special form of the elements of B4n we define the pairs
`of coordinates {i, n + i}, 1 5 i I n,
`to be left pairs and the
`pairs (2n + i,3n + i}, 1 I
`i I n, to be right pairs.
`A word is equivalently represented by the set of its nonzero
`coordinates. So c E B4n if and only if c is the union of an even
`number of left pairs and an even number of right pairs. For
`n 2 3, an automorphism of B4n must send pairs into pairs.
`Moreover, if an automorphism of B4n sends a left pair into a left
`pair, then all left pairs are sent into left pairs and all right pairs
`into right pairs; if an automorphism sends a left pair into a right
`pair, then all left pairs are sent into right pairs and vice versa.
`From Theorem 2 a) we know that T is an automorphism of F4n; T
`has order 2 and sends left pairs into right pairs and vice versa.
`Any automorphism of B4n leaving the coordinates 2 n + 1,2 n +
`. ,4n fixed is the product of a permutation leaving every left
`2;.
`pair fixed and a permutation of the left pairs and hence is an
`element of L,, X SL. Any element of L, X S,’ is an automorphism
`of B4n. Similarly any element of R, x SL is an automorphism of
`B 47l’
`We have proved that Aut (B4,,) = T, x L, x R, x S! x S,l.
`As we saw above, Aut (F4,)
`is a subgroup of Aut ( B4,,). An
`automorphism of B4n is an automorphism of F4:4n if and only if b(l)
`and bc2) are sent into codewords of F4,. For 7~ E S,’ we have
`a(bc2)) = bc2) and a(b’“)
`= g (no)). Hence S! c Aut ( F4,,). Anal-
`ogously SL C Aut (F4n). For r E R, we have v(bc2’) = bc2), but
`= (10 . . . 0,lO
`... O,y,y+
`l,,)forsomeyE
`I$,which
`.(b’“)
`according to the lemma is a codeword of F4,, if and only if wt ( y)
`is even. So x(b”)) E F4, if and only if r E R,,. Analogously for
`VI E L, we have +rr E Aut ( F4”) if and only if r E z,.
`
`(8,11)(9,12)}.
`
`R, =
`
`s; =
`
`s; =
`
`(7,10)(9,12),
`ll),
`(7,10)(8,
`{(I),
`((1),(1,2>(4,5),(1,3>(4,6),(2,3)(5,6),
`(1,2,3>(4,5,6>,(1,3,2)(4,6,5)}.
`(8,9)(11,12),
`((I),
`(7, @(lo, 111, (7,9)(10,12),
`(7,8,9)(10,11,12),
`(7,9,8)(10,12,11>>
`.
`]Aut(B,,)] = 4608 and ]Aut(Fi,)] = 1152.
`III.
`COMBINING CODES
`In this section we use the structure of the codes F4,,, defined
`and studied in Section II,
`to obtain linear codes with other
`parameters. Some of these codes are good in the sense that they
`have the largest minimum distance known [5].
`Concatenating or “pasting” two words x and y of length n and
`m, respectively, to form a new word 1x1 y], gives a word of length
`n + m:
`
`lxlyl=
`(X1,X2,...,X,,Y1,Y2,...,Ym)..
`Let x(l), xc’),. . .,xck) and y(l), yc2);. .,yck’ be k basis code-
`words for an [n,, k, d,] and an [n,, k, d2] code, respectively. A
`pasting of these codes may be the [nl + n2, k, d] code with
`~,(l)l~(l)l
`. . .,lxWly’k’l
`as k basis codewords, where d 2 d, +
`d,.
`’
`Theorem 4: Let the code Gs,,, n 2 2, of length 8n be generated
`by
`
`+ 14,J,
`i = 1,2,
`Ib(‘)I
`Ib(’
`3 5 i 5 2n.
`I2
`The code G,, is an [8n, 2n, 81 code and for n 2 3 it has the UEP
`property with separation vectors, si = s2 = 4n and s, = 8, 3 < i
`5 2n.
`The weight enumerator of G,, is
`
`W(G,,;
`
`z) = ‘g’
`
`‘$
`
`( li)(
`
`;j)z2(4i+4J)
`
`+ 3 . 22n-2z4n.
`
`Proof: Obviously G,, has dimension 2 n. Let Ix] y ] be any
`codeword of G,,.
`If x E B4T,
`then y = x and, according to
`Theoreml,wt(y)=wt(x)=4rforsomer,O<r<2[n/2].If
`then
`If x E Bit U BiE,
`x E B,‘,:, then y = x and wt(x) = 2n.
`y = x + 14rz and wt ( y) = 4n - wt (x). The separation vector
`Q.E.D.
`and the weight enumerator are now easily found.
`Theorem 5: Let the code HBn, n 2 2, of length 8n be generated
`by
`
`lb(‘)
`lb”’
`I7
`lb”’ + b(‘+l)
`lb”’
`I 9
`lb@n)lb(2”) + b(3) + b(4)1,
`
`i = 1,2,
`3 I
`i I2ri
`
`- 1,
`
`ThecodeHs,isan[8n,2n,d]codewhered=2(n+2)ifn=2,
`3 and d = 12 otherwise. For n 2 5, HBn has the UEP property
`with separation vector s, si = s2 = 2(n + 2) and s, = 12 for
`3 5 i 5 2n.
`
`IPR2018-1556
`HTC EX1055, Page 3
`
`

`

`IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. IT-30, NO. 2, MARCH 1984
`
`395
`
`Proof: Obviously Hsn has dimension 2 n. Let Ix] y I be any
`codeword of Hsn. If x E Bii U Bit,
`then alsoy E B:A U Biz and
`so, according to Theorem 1, wt (Ix] y]] = 2(n + 2) + 4r for some
`If XEB~~,
`then alsoy~B~~
`and
`r, O<r<2[(n-1)/21.
`hence wt (x) = wt ( y) = 2n.
`If x E B4y,
`then also y E B4T.
`Clearly wt (x) = 0 if and only if wt ( y) = 0. If wt (x) = 4, then
`either x = b(”
`for some i, 3 I
`i I 2n or x = b(‘) + b(i+2r)
`for
`some r and i, 0 < r < n and 3 I
`i 5 2n - 2r.
`In both cases
`wt ( y) 2 8. From this we deduce that if wt ( y) = 4, then wt (x)
`2 8. The separation vector is now easily derived.
`Q.E.D.
`Example: Let n = 3. The code G24 is a [24,6,8] code with
`weight enumerator 1 + 6z8 + 48~‘~ + 9~‘~. The separation vec-
`tor of G,, is (12,12,8,8,8,8).
`The code H24 is a [24,6, lo] code. The weight enumerator,
`determined by inspection, is
`W(ZZ,,; z) = 1 + 182” + 28~‘~ + 12~‘~ + 3~‘~ + 22”.
`The proofs of the following theorems are omitted since they are
`similar to the proofs of Theorem 4 and Theorem 5.
`Theorem 6: Let the code Z12,,, n 2 2, of length 12n be gen-
`erated by
`lb(‘) lb”’ + l,,lb”’
`I?
`,
`lb(‘) lb”’
`lb”’ + b(‘+‘)
`lb(2n)lb(*n)
`lb@) + b(3) + b@)l,
`
`i = 1,2,
`3IiI2n-1,
`
`d] code where d = 12 if n = 2 and
`The code K12,, is a [12n,2n,
`d = 16 otherwise. All weights are divisible by 4. For n 2 4, K12n
`has the UEP property with separation vectors, si = s2 = 4n + 4,
`and s, = 16 for 3 I
`i I 2n.
`is a [36,6,16] code. The
`Example: Let n = 3. The code K,,
`inspection (compare with
`weight enumerator is determined b
`z) = 1 + 38~‘~ + 142 2x + 11~~~.
`Z3& W(K,,;
`
`SUMMARY
`In this correspondence an infinite class of [4n, 2n, 41, n 2 2,
`binary codes has been studied in some detail. In particular the
`weight enumerators and automorphism groups have been de-
`termined. The detailed knowledge of the weight structure of these
`codes has led to several other infinite series of binary codes.
`
`REFERENCES
`F. J. MacWilliams and N. .I. A. Sloane, The Theory of Error Correcting
`Codes. Amsterdam: North-Holland, 1977.
`L. A. Dunning and W. E. Robbins, “Optimal encoding of linear block
`Inform. Corm., vol. 37, pp. 150-177,
`codes for unequal error protection,”
`May 1978.
`tonics on linear uneaual error orotection codes:
`W. .I. van Gils. “Two
`Bounds on their length and cyclic code classes,” IEEE> Trans. Inform.
`Theory, vol. IT-29, pp. 866-876, Nov. 1983.
`L. M. H. E. Driessen, Dutch Patent Nr. 8105799, Dec. 1981.
`H. .I. Helgert and R. D. Stinaff, “Minimum-distance bounds for binary
`Trans. Inform. Theory, vol. IT-19, pp. 344-356, May
`linear codes.” IEEE
`1973.
`M. Hall, The Theory of Groups. New York: McMillan, 1964.
`V. Pless, “A classification of self-orthogonal codes over GF (2),” Dtscrete
`Math., vol. 3, pp. 209-246, 1972.
`
`VI
`PI
`
`[31
`
`[41
`[51
`
`[61
`[71
`
`Further Classifications of Codes Meeting the
`Griesmer Bound
`TOR HELLESETH
`
`an
`Abstract-For
`(n, k, d) binary linear code, the Griesmer bound
`r’ d/2’], where [ x 1 denotes the smallest integer > x.
`says that n > Cf:/
`We consider codes meeting the Griesmer bound with equality. These codes
`have parameters
`
`( s(2k -
`
`l)-
`
`,
`
`i2u1+
`&l),k,&-
`i=l
`r=l
`i
`> up > 1. We characterize all such codes whenp = 2
`where k > u1 >
`or u,ml - u, > 2 for 2 < i 6 p.
`
`I.
`INTRODUCTION
`We let an (n, k, d) code be a binary linear code of length n,
`dimension k, and minimum distance of at least d. We let n (k, d)
`be the smallest integer n such that an (n, k, d) code exists. Many
`efforts have been made
`to
`find
`codes with parameters
`(n(k, d), k, d). For an extensive list of bounds on n(k, d)
`the
`reader should consult the tables of Helgert and Stinaff [l].
`A general lower bound on n(k, d), due to Griesmer [2], says
`k-l
`c
`i=O I
`
`n(k,d)>
`
`f
`
`,
`1
`
`(1.1)
`
`Manuscript received September 27, 1982; revised March 7, 1983. This work
`was presented in part at the IEEE International Symposium on Information
`Theory, Les Arcs, France, June 21-25, 1982.
`The author
`is with CHOD Norway/SEC, Oslo Mil/Akershus, Oslo 1,
`Norway.
`
`I,
`1,
`31,i<2n-1,
`If+) + b(3) + b@)lb%) + $3) + b(4)/.
`
`i = 1,2,
`
`d] code where d = 12 if n = 2 and
`The code Z12n is a [12n,2n,
`d = 16 otherwise. For n 2 3, Z12n has the UEP property with
`I
`separation vectors, si = s2 = 5n + 2 ,ands, = 16for3
`i I 2n.
`Theorem 7: Let the code J16n, n 2 2, of length 16n be gen-
`erated by
`lb(‘) lb”’ + 14,Jbci)
`lb(‘) + b(‘+‘)
`lb”’
`lb(‘)
`
`lb(‘) + l,,
`lb(‘) + /,(I+‘)
`
`lb@n)/b@)
`
`The code J16n is a [16n, 2 n, d ] code where d = 16 if n = 2 and
`d = 24 otherwise. For n 2 4, J16n has the UEP property with
`separation vectors, si = s2 = 8n, and si = 24 for 3 I
`i I 2n.
`Example: Let n = 3. The code Z36 is a [36,6,16] code with
`separation vector (17,17,16,16,16,16), and the code J48 is a
`[48,6,24] code. The weight enumerators of both codes can be
`determined without writing out all codewords,
`
`z) = 1 + 6~‘~ + 242” + 16~” + 6z2’ + 8z21 + 3z24
`
`w(z36;
`and
`
`W( J48; z) = 1 + 60~~~ + 3~~~.
`
`Copies of F4h, may be combined in many other ways, yielding
`codes again with other parameters or codes with the same param-
`eters but with another weight enumerator. As an example of this
`latter statement we give the following theorem.
`Theorem 8: Let the code K12n, n 2 2, of length 12n be gen-
`erated by
`lb(‘) lb’”
`I,
`lb”’ + bc2)
`/b(2)
`lb@) lb(‘) + b(2)
`I3
`lb(3) lb’% + b(4) lb@)
`IT
`lb(‘) lb”’ + b(l+l)lb(‘) + b(‘-1) I,
`lb(2+(2n)
`lb@“) + b@-l)l.
`
`4IiI2n-1,
`
`0018-9448/84/0300-0395$01.00 01984 IEEE
`
`IPR2018-1556
`HTC EX1055, Page 4
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket