ISSN:

1930-5346

eISSN:

1930-5338

All Issues

## Advances in Mathematics of Communications

February 2017 , Volume 11 , Issue 1

Select all articles

Export/Reference:

*+*[Abstract](3767)

*+*[HTML](91)

*+*[PDF](5941.51KB)

**Abstract:**

Polar codes are recursive general concatenated codes. This property motivates a recursive formalization of the known decoding algorithms: Successive Cancellation, Successive Cancellation with Lists and Belief Propagation. Using such description allows an easy development of these algorithms for arbitrary polarizing kernels. Hardware architectures for these decoding algorithms are also described in a recursive way, both for Arıkan's standard polar codes and for arbitrary polarizing kernels.

*+*[Abstract](2019)

*+*[HTML](25)

*+*[PDF](331.37KB)

**Abstract:**

By using shift sequences defined by difference balanced functions with *d*-form property, and column sequences defined by a mutually orthogonal almost perfect sequences pair, new almost perfect, odd perfect, and perfect sequences are obtained via interleaving method. Furthermore, the proposed perfect QAM+ sequences positively answer to the problem of the existence of perfect QAM+ sequences proposed by Boztaş and Udaya.

*+*[Abstract](1796)

*+*[HTML](1)

*+*[PDF](293.5KB)

**Abstract:**

In this paper, we construct some designs and associated binary codes from a primitive permutation representation of degree 1755 of the sporadic simple Tits group $^2F_4 \left(2 \right)'$. In particular, we construct a binary code $[1755, 26,1024]_2$ on which $^2F_4 \left(2 \right)'$ acts irreducibly. This is the smallest non-trivial irreducible $GF(2)$-module for our group.

*+*[Abstract](2999)

*+*[HTML](19)

*+*[PDF](376.24KB)

**Abstract:**

In this paper we construct new DNA cyclic codes over rings. Firstly, we introduce a new family of DNA cyclic codes over the ring $R=\mathbb{F}_2[u]/(u.6)$. A direct link between the elements of such a ring and the $64$ codons used in the amino acids of the living organisms is established. Using this correspondence we study the reverse-complement properties of our codes. We use the edit distance between the codewords which is an important combinatorial notion for the DNA strands. Next, we define the Lee weight, the Gray map over the ring $R$ as well as the binary image of the DNA cyclic codes allowing the transfer of studying DNA codes into studying binary codes. Secondly, we introduce another new family of DNA skew cyclic codes constructed over the ring $\tilde {R}=\mathbb{F}_2+v\mathbb{F}_2=\{0, 1, v, v+1\}, $ where $v^2=v$. The codes obtained are cyclic reverse-complement over the ring $\tilde {R}$. Further we find their binary images and construct some explicit examples of such codes.

*+*[Abstract](2281)

*+*[HTML](31)

*+*[PDF](373.91KB)

**Abstract:**

We study cyclic codes over commutative local Frobenius rings of order 16 and give their binary images under a Gray map which is a generalization of the Gray maps on the rings of order 4. We prove that the binary images of cyclic codes are quasi-cyclic codes of index 4 and give examples of cyclic codes of various lengths constructed from these techniques including new optimal quasi-cyclic codes.

*+*[Abstract](1465)

*+*[HTML](8)

*+*[PDF](334.02KB)

**Abstract:**

In this work, we studied the *generalized Hamming weights* of algebraic geometric Goppa codes on the $\mathcal{GH}$ curve. Especially, exact results on the second generalized Hamming weight are given for almost all cases. Furthermore, we apply the results obtained to show an example where the weight hierarchy characterizes the performance of the $\mathcal{GH}$ codes on a noiseless communication channel.

*+*[Abstract](2323)

*+*[HTML](19)

*+*[PDF](535.43KB)

**Abstract:**

We consider decoding of LDPC codes over GF(*q*) with a harddecision low-complexity majority algorithm, which is a generalization of the bit-flipping algorithm for binary LDPC codes. A modification of this algorithm with multiple thresholds is suggested. A lower estimate on the decoding radius realized by the new algorithm is derived. The estimate is shown to be better than the estimate for a single threshold majority decoder. At the same time, introducing multiple thresholds does not affect the order of decoding complexity.

*+*[Abstract](1996)

*+*[HTML](5)

*+*[PDF](313.8KB)

**Abstract:**

Pseudo-random sequence generators are widely used in many areas, such as stream ciphers, radar systems, Monte-Carlo simulations and multiple access systems. Generalization of linear feedback shift registers (LFSRs) and feedback with carry shift registers (FCSRs), algebraic feedback shift registers (AFSRs) [

*+*[Abstract](1862)

*+*[HTML](3)

*+*[PDF](321.19KB)

**Abstract:**

Aperiodic Hamming correlation is an important criterion for evaluating the goodness of frequency hopping (FH) sequence design, while it received little attraction in the literature. In this paper, a construction of FH sequences with optimal aperiodic Hamming correlation by interleaving techniques is presented. Further, a class of one-coincidence FH sequence sets under aperiodic Hamming correlation is proposed. By employing the one-coincidence FH sequence sets, a class of FH sequence sets with optimal aperiodic Hamming correlation is also constructed by interleaving techniques.

*+*[Abstract](2207)

*+*[HTML](12)

*+*[PDF](590.78KB)

**Abstract:**

The paradigm of forward security provides a promising approach to deal with the key exposure problem as it can effectively minimize the damage caused by the key exposure. In this paper, we develop a new forward-secure identity-based encryption scheme without random oracles. We formally prove that the proposed scheme is secure against adaptive chosen-ciphertext attacks in the standard model. In the proposed scheme, the running time of the private key extraction and decryption algorithms and the sizes of the user's initial private key and the ciphertext are independent on the total number of time periods, and any other performance parameter has at most log-squared complexity in terms of the total number of time periods. Compared with the previous forward-secure identity-based encryption schemes, the proposed scheme enjoys obvious advantage in the overall performance. To the best of our knowledge, it is the first forward-secure identity-based encryption scheme that achieves direct chosen-ciphertext security in the standard model.

*+*[Abstract](1746)

*+*[HTML](7)

*+*[PDF](303.42KB)

**Abstract:**

We show explicitly that the dimension of the ternary code of the Hall plane of order 9 is greater than the dimension of the ternary code of the desarguesian plane of order 9. The proof requires finding a word with some defined properties in the dual ternary code of the desarguesian plane of order 9. The idea can be generalised for other orders, provided that words in the dual code of the desarguesian projective plane that have the specified properties can be found.

*+*[Abstract](1781)

*+*[HTML](1)

*+*[PDF](391.4KB)

**Abstract:**

An $(N, K)$ codebook $\mathcal{C}$ is a collection of unit norm vectors in a $K$-dimensional vectors space. In applications of codebooks such as CDMA, those vectors in a codebook should have a small maximum magnitude of inner products, denoted by $I_{\max}(\mathcal{C})$, between any pair of distinct code vectors. Since the famous Welch bound is a lower bound on $I_{\max}(\mathcal{C})$, it is desired to construct codebooks meeting the Welch bound strictly or asymptotically. Recently, N. Y. Yu presents a method for constructing codebooks associated with a binary sequence from a $\Phi$-transform matrix. Using this method, he discovers new classes of codebooks with nontrivial bounds on the maximum inner products from Fourier and Hadamard matrices. We construct more near optimal codebooks by Yu's idea. We first provide more choices of binary sequences. We also show more choices of the $\Phi$-transform matrices. Therefore, we can present more codebooks $\mathcal{C}$ with nontrivial bounds on their $I_{\max}(\mathcal{C})$. Our work can serve as a complement of Yu's work.

*+*[Abstract](1609)

*+*[HTML](3)

*+*[PDF](464.02KB)

**Abstract:**

Information retrieval in an associative memory was introduced in a recent paper by Yaakobi and Bruck. The associative memory is represented by a graph where the vertices correspond to the stored information units and the edges to associations between them. The goal is to find a stored information unit in the memory using input clues. In this paper, we study the minimum average number of input clues needed to find the sought information unit in the infinite king grid. We provide a geometric approach to determine the minimum number of input clues. Using this approach we are able to find optimal results and bounds on the number of input clues. The model by Yaakobi and Bruck has also applications to sensor networks monitoring and Levenshtein's sequence reconstruction problem.

*+*[Abstract](1590)

*+*[HTML](2)

*+*[PDF](341.0KB)

**Abstract:**

This paper investigates the generalized rank weights, with a definition implied by the study of the generalized rank weight enumerator. We study rank metric codes over $L$, where $L$ is a finite extension of a field $K$. This is a generalization of the case where $K=\mathbb{F}_q $ and $L={\mathbb{F}_{{q^m}}}$ of Gabidulin codes to arbitrary characteristic. We show equivalence to previous definitions, in particular the ones by Kurihara-Matsumoto-Uyematsu ^{[12,13]}, Oggier-Sboui ^{[16]} and Ducoat ^{[6]}. As an application of the notion of generalized rank weights, we discuss codes that are degenerate with respect to the rank metric.

*+*[Abstract](2290)

*+*[HTML](10)

*+*[PDF](273.67KB)

**Abstract:**

The Legendre sequence possesses several desirable features of pseudorandomness in view of different applications such as a high linear complexity (profile) for cryptography and a small (aperiodic) autocorrelation for radar, gps, or sonar. Here we prove the first nontrivial bound on its arithmetic autocorrelation, another figure of merit introduced by Mandelbaum for errorcorrecting codes.

*+*[Abstract](2326)

*+*[HTML](18)

*+*[PDF](361.66KB)

**Abstract:**

One of the most important and challenging problems in coding theory is to construct codes with good parameters. There are various methods to construct codes with the best possible parameters. A promising and fruitful approach has been to focus on the class of quasi-twisted (QT) codes which includes constacyclic codes as a special case. This class of codes is known to contain many codes with good parameters. Although constacyclic codes and QT codes have been the subject of numerous studies and computer searches over the last few decades, we have been able to discover a new fundamental result about the structure of constacyclic codes which was instrumental in our comprehensive search method for new QT codes over *GF*(7). We have been able to find 41 QT codes with better parameters than the previously best known linear codes. Furthermore, we derived a number of additional new codes via Construction X as well as standard constructions, such as shortening and puncturing.

*+*[Abstract](1797)

*+*[HTML](25)

*+*[PDF](316.52KB)

**Abstract:**

Spontaneous emission error designs (SEEDs) are combinatorial objects that can be used to construct quantum jump codes. The lifted Golay code $G_{24}$ of length $24$ over $\mathbb{Z}_4$ is cyclic self-dual code. It is known that $G_{24}$ yields $5$-designs. In this paper, by using the generator matrices of bordered double circulant codes, we obtain $22$ mutually disjoint $5$-$(24, k, \lambda)$ designs with $(k, \lambda)=(8, 1), $ $(10, 36), $ $(12,1584)$ and $5$-$(24, k;22)$-SEEDs for $k=8, $ $10, $ $12, $ $13$ from $G_{24}$.

2018 Impact Factor: 0.879

## Readers

## Authors

## Editors

## Referees

## Librarians

## Email Alert

Add your name and e-mail address to receive news of forthcoming issues of this journal:

[Back to Top]