This paper addresses two coding schemes which can handle emerging errors with crisscross patterns. First, a code with maximum rank distance, so-called Rank-codes, is described and a modified Berlekamp-Massey algorithm...
详细信息
This paper addresses two coding schemes which can handle emerging errors with crisscross patterns. First, a code with maximum rank distance, so-called Rank-codes, is described and a modified Berlekamp-Massey algorithm is provided. Secondly, a permutation code based coding scheme for crisscross error patterns is presented. The influence of different types of noise are also discussed.
We present composition check codes for noisy storage and transmission channels with unknown gain and/or offset. In the proposed composition check code, like in systematic error correcting codes, the encoding of the ma...
详细信息
We present composition check codes for noisy storage and transmission channels with unknown gain and/or offset. In the proposed composition check code, like in systematic error correcting codes, the encoding of the main data into a constant composition code is completely avoided. To the main data, a coded label is appended that carries information regarding the composition vector of the main data. Slepian's optimal detection technique of codewords that are taken from a constant composition code is applied for detection. A first Slepian detector detects the label and subsequently restores the composition vector of the main data. The composition vector, in turn, is used by a second Slepian detector to optimally detect the main data. We compute the redundancy and error performance of the new method, and results of computer simulations are presented.
In this paper, we present a variable-length binary code for permutations of degree n, where n is a power of 2. The Lehmer code and its variants provide a bijection between permutations and the indexes in lexicographic...
详细信息
In this paper, we present a variable-length binary code for permutations of degree n, where n is a power of 2. The Lehmer code and its variants provide a bijection between permutations and the indexes in lexicographic ordering. They provide compression of permutations approaching Shannon bound at the expense of structural information. The variable-length code proposed in this paper has asymptotically optimal compression capability while preserving structural information of permutations. In other words, the code encodes the way a permutation is organized, and is optimal in the sense that the ratio of average codeword length and the entropy of permutations approaches 1 as n tends to infinity. The encoding and decoding are efficient. Like the Lehmer code and other enumerative codes, it is not necessary to construct look-up tables. The code is complete and satisfies the prefix condition. Furthermore, the codeword length indicates how "well shuffled" a permutation is. permutations with longer codewords seem more "random." An enumeration method of the variable-length code is also given by using T. Cover's enumerative coding scheme and Schalkwijk code. This gives a different indexing from the Lehmer code. This work can be extended to the case of arbitrary n in a straightforward way.
A permutation code of length n and minimum distance d is a set Gamma of permutations from some fixed set of n symbols such that the Hamming distance between any distinct u, upsilon is an element of Gamma is at least d...
详细信息
A permutation code of length n and minimum distance d is a set Gamma of permutations from some fixed set of n symbols such that the Hamming distance between any distinct u, upsilon is an element of Gamma is at least d. As a generalization, we introduce the problem of packing injections from an m-set, m <= n, sometimes called m-arrangements, relative to Hamming distance. We offer some preliminary coding-theoretic bounds, a few design-theoretic connections, and a short discussion on possible applications.
A constant composition code over a k-ary alphabet has the property that the numbers of occurrences of the k symbols within a codeword is the same for each codeword. These specialize to constant weight codes in the bin...
详细信息
A constant composition code over a k-ary alphabet has the property that the numbers of occurrences of the k symbols within a codeword is the same for each codeword. These specialize to constant weight codes in the binary case, and permutation codes in the case that each symbol occurs exactly once. Constant composition codes arise in powerline communication and balanced scheduling, and are used in the construction of permutation codes. In this paper, direct and recursive methods are developed for the construction of constant composition codes. (c) 2005 Elsevier B.V. All rights reserved.
We consider the algebraic combinatorics of the set of injections from a k-element set to an n-element set. In particular, we give a new combinatorial formula for the spherical functions of the Gelfand pair (S-k x S-n,...
详细信息
We consider the algebraic combinatorics of the set of injections from a k-element set to an n-element set. In particular, we give a new combinatorial formula for the spherical functions of the Gelfand pair (S-k x S-n, diag(S-k) x Sn- k). We use this combinatorial formula to give new Delsarte linear programming bounds on the size of codes over injections.
The performance of certain transmission and storage channels, such as optical data storage and nonvolatile memory (flash), is seriously hampered by the phenomena of unknown offset (drift) or gain. We will show that mi...
详细信息
The performance of certain transmission and storage channels, such as optical data storage and nonvolatile memory (flash), is seriously hampered by the phenomena of unknown offset (drift) or gain. We will show that minimum Pearson distance (MPD) detection, unlike conventional minimum Euclidean distance detection, is immune to offset and/or gain mismatch. MPD detection is used in conjunction with T-constrained codes that consist of q-ary codewords, where in each codeword T reference symbols appear at least once. We will analyze the redundancy of the new q-ary coding technique and compute the error performance of MPD detection in the presence of additive noise. Implementation issues of MPD detection will be discussed, and results of simulations will be given.
A doubly resolvable packing design with block size k, index lambda, replication number r, and nu elements is called a generalized Kirkman square and denoted by GKS(k) (nu;1, lambda;r). Existence of GKS(3) (4u;1, 1;2(u...
详细信息
A doubly resolvable packing design with block size k, index lambda, replication number r, and nu elements is called a generalized Kirkman square and denoted by GKS(k) (nu;1, lambda;r). Existence of GKS(3) (4u;1, 1;2(u - 1))s and GKS(3)(6u;1, 1;3(u - 1))s is implied by existence of doubly resolvable group divisible designs with block size 3, index 1, and types 4(u) and 6(u) (i.e., (3, 1)-DRGDDs of types 4(u) and 6(u). In this paper, we establish the spectra of (3, 1)-DRGDDs of types 4(u) and 6(u) with 15 and 31 possible exceptions, respectively. As applications, we get some new classes of permutation codes and doubly constant weight codes. We also construct 5 new resolvable GDDs with block size 4 and index 1. (C) 2015 Elsevier B.V. All rights reserved.
For large q, does the (discrete) uniform distribution on the set of q! permutations of the vector (X) over bar (q) = (1, 2, ..., q)' closely approximate the (continuous) uniform distribution on the (q - 2)-sphere ...
详细信息
For large q, does the (discrete) uniform distribution on the set of q! permutations of the vector (X) over bar (q) = (1, 2, ..., q)' closely approximate the (continuous) uniform distribution on the (q - 2)-sphere that contains them? These permutations comprise the vertices of the regular permutohedron, a (q - 1)-dimensional convex polyhedron. The answer is emphatically no: these permutations are confined to a negligible portion of the sphere, and the regular permutohedron occupies a negligible portion of the ball. However, (1, 2, ..., q) is not the most favorable configuration for spherical uniformity of permutations. A more favorable configuration (X) over cap (q) is found, namely that which minimizes the normalized surface area of the largest empty spherical cap among its q! permutations. Unlike that for (X) over bar (q), the normalized surface area of the largest empty spherical cap among the permutations of (X) over cap (q) approaches 0 as q -> infinity. Nonetheless the permutations of (X) over cap (q) do not approach spherical uniformity either. The existence of an asymptotically spherically uniform permutation sequence remains an open question.
In 2000 Babson and Steingrimsson introduced the notion of vincular patterns in permutations. They show that essentially all well-known Mahonian permutation statistics can be written as combinations of such patterns. A...
详细信息
In 2000 Babson and Steingrimsson introduced the notion of vincular patterns in permutations. They show that essentially all well-known Mahonian permutation statistics can be written as combinations of such patterns. Also, they proved and conjectured that other combinations of vincular patterns are still Mahonian. These conjectures were proved later: by Foata and Zeilberger in 2001, and by Foata and Randrianarivony in 2006. In this paper we give an alternative proof of some of these results. Our approach is based on permutation codes which, like the Lehmer code, map bijectively permutations onto subexcedant sequences. More precisely, we give several code transforms (i.e., bijections between subexcedant sequences) which when applied to the Lehmer code yield new permutation codes which count occurrences of some vincular patterns. These code transforms can be seen as a pre-compression step of the Lehmer code because they map some redundancies into runs of 0s. Also, our proofs, unlike the previous ones, provide explicit bijections between permutations having a given value for two different Mahonian pattern-based statistics. (C) 2012 Elsevier B.V. All rights reserved.
暂无评论