In this paper we prove that all bent functions in the kerdock code, except for the coset of the symmetric quadratic bent function, are bent-negabent. In this direction, we characterize the set of quadratic bent-negabe...
详细信息
In this paper we prove that all bent functions in the kerdock code, except for the coset of the symmetric quadratic bent function, are bent-negabent. In this direction, we characterize the set of quadratic bent-negabent functions and show some results connecting quadratic bent-negabent functions and the kerdock code. Further, we note that there are bent-negabent preserving nonsingular transformations outside the well known class of orthogonal ones that might provide additional functions in the bent-negabent set. This is the first time we could identify non-orthogonal (nonsingular) linear transformations that preserve bent-negabent property for a special subset.
Separating codes find applications in many fields including automata theory and digital fingerprinting. It is known that the kerdock code of sufficient order is (2, 1)- and (2, 2) -separating, but the separating weigh...
详细信息
Separating codes find applications in many fields including automata theory and digital fingerprinting. It is known that the kerdock code of sufficient order is (2, 1)- and (2, 2) -separating, but the separating weight is only known by a lower bound due to Sagalovich. In this correspondence, we prove that the lower bound on the (2, 1)-separating weight is met with equality.
In the paper we investigate the structure of i-components of two classes of codes: the kerdock codes and the duals of the linear uniformly packed codes with parameters of the primitive double-error-correcting BCH code...
详细信息
In the paper we investigate the structure of i-components of two classes of codes: the kerdock codes and the duals of the linear uniformly packed codes with parameters of the primitive double-error-correcting BCH code. We prove that for any admissible length the punctured kerdock code consists of two i-components and the duals of the linear uniformly packed codes with parameters of the primitive double-error-correcting BCH code is an i-component for any i. We give an alternative proof for the fact presented by De Caen and van Dam in 1999 that the restrictions of the Hamming scheme to the doubly shortened kerdock codes are association schemes. (C) 2019 Published by Elsevier B.V.
A code is called distance regular, if for every two codewords x, y and integers i, j the number of codewords z such that d(x, z) = i and d(y, z) = j, with d the Hamming distance, does not depend on the choice of x, y ...
详细信息
A code is called distance regular, if for every two codewords x, y and integers i, j the number of codewords z such that d(x, z) = i and d(y, z) = j, with d the Hamming distance, does not depend on the choice of x, y and depends only on d(x, y) and i, j. Using some properties of the discrete Fourier transform we give a new combinatorial proof of the distance regularity of an arbitrary kerdock code. We also calculate the parameters of the distance regularity of a kerdock code.
We give a method to compute the complete weight distribution of translates of linear codes over Z(4). The method follows known ideas that have already been used successfully by others for Hamming weight distributions....
详细信息
We give a method to compute the complete weight distribution of translates of linear codes over Z(4). The method follows known ideas that have already been used successfully by others for Hamming weight distributions. For the particular case of quaternary Preparata codes, we obtain that the number of distinct complete weights for the dual Preparata codes and the number of distinct complete coset weight enumerators for the Preparata codes are both equal to ten, independent of the codelength.
For quaternary Preparata and kerdock codes of length N=2(m), m odd, we prove that the split complete weight enumerator for a coordinate partition into 3 and N-3 coordinates is independent of the chosen partition. The ...
详细信息
For quaternary Preparata and kerdock codes of length N=2(m), m odd, we prove that the split complete weight enumerator for a coordinate partition into 3 and N-3 coordinates is independent of the chosen partition. The result implies that the words of a given complete weight in either a Preparata code or kerdock code define a 3-design.
The first lower bound on the peak-to-average power ratio (PAPR) of a constant energy code of a given length n, minimum Euclidean distance and rate is established. Conversely, using a nonconstructive Varshamov-Gilbert ...
详细信息
The first lower bound on the peak-to-average power ratio (PAPR) of a constant energy code of a given length n, minimum Euclidean distance and rate is established. Conversely, using a nonconstructive Varshamov-Gilbert style argument yields a lower bound on the achievable rate of a code of a given length, minimum Euclidean distance and maximum PAPR, The derivation of these bounds relies on a geometrical analysis of the PAPR of such a code. Further analysis shows that there exist asymptotically good codes whose PAPR is at most 8 log n, These bounds motivate the explicit construction of error-correcting codes with low PAPR, Bounds for exponential sums over Galois fields and rings are applied to obtain an upper bound of order (log n)(2) on the PAPRs of a constructive class of codes, the trace codes. This class includes the binary simplex code, duals of binary, primitive Bose-Chaudhuri-Hocquenghem (BCH) codes and a variety of their nonbinary analogs. Some open problems are identified.
In this correspondence, the trellis representation of the kerdock and Delsarte-Goethals codes is addressed. It is shown that the states of a trellis representation of DG(m, delta) under any bit-order are either strict...
详细信息
In this correspondence, the trellis representation of the kerdock and Delsarte-Goethals codes is addressed. It is shown that the states of a trellis representation of DG(m, delta) under any bit-order are either strict-sense nonmerging or strict-sense nonexpanding, except, maybe, at indices within the code's distance set. For delta greater than or equal to 3 and for m greater than or equal to 6, the slate complexity, s(max) [DG(m, delta)], is found. For all values of m and delta, a formula for the number of states and branches of the biproper trellis diagram of DG(m, delta) is given for some of the indices, and upper and lower bounds are given for the remaining indices. The formula and the bounds refer to the Delsarte-Goethals codes when arranged in the standard bit-order.
Since the paper by Hammons e.a. [1], various authors have shown an enormous interest in linear codes over the ring Z(4). A special weight function on Z(4) was introduced and by means of the so called Gray map phi : Z(...
详细信息
Since the paper by Hammons e.a. [1], various authors have shown an enormous interest in linear codes over the ring Z(4). A special weight function on Z(4) was introduced and by means of the so called Gray map phi : Z(4) --> Z(2)(2) a relation was established between linear codes over Z(4) and certain interesting non-linear binary codes of even length. Here, we shall generalize these notions to codes over Z(p)(2) where p is an arbitrary prime. To this end, a new weight function will be proposed for Z(p2). Further, properties of linear codes over Z(p2) will be discussed and the mapping phi will be generalized to an isometry between Z(p2) and Z(p)(p) resp. between Z(p2)(n) and Z(p)(pn). Some properties of Galois rings over Z(q) will be described and two dual families of linear codes of length n = p(m) - 1, gcd(m, p) = 1, over Z(q) will be constructed. Taking q = p(2), their images under the new mapping can be viewed as a generalization of the binary kerdock and the Preparata code, although they miss some of their nice combinatorial properties.
暂无评论