Construction of Error-Correcting Codes for Random Network Coding Tuvi Etzion and Natalia Silberstein Technion-Israel Institute of Technology

1

Definitions 

Let Fq be the finite field of size q



The projective space Pq (n) is the set of all subspaces of Fqn



Pq (n) is a metric space with the distance function d s (U ,W ) = dim (U ) + dim (V ) − 2 dim (U ∩ W ), ∀U ,W ∈Pq (n).



C ⊆ Pq (n) is an (n, M , d ) q code in projective space if | C |= M

and d s (U , V ) ≥ d for all U , V ∈ C

2

Definitions 

Grassmannian, Gq (n, k ), is the set of all subspaces of Fqn with dimension k , k ≤ n.



C ⊆ Gq (n, k ) is an (n, M , d , k ) q constant dimension code if

| C |= M and d s (U ,V ) ≥ d for all U , V ∈ C 

Constant dimension codes are analogous to constant weight codes in the Hamming space

3

Motivation



Kotter and Kschischang (2007) showed that codes in Pq (n) are useful for correcting errors and erasures in random network coding

4

Representation of subspaces Let X ∈ Pq (n) be a subspace with dim( X ) = k



We represent X by a k × n generator matrix in reduced row echelon form and denote it by E ( X )





Example. Let X ∈ P2 (6) with dim( X ) = 3

X = {( 000000 ), (101100 ), (100110 ), (101001 ), ( 001010 ), ( 000101 ), ( 001111 ), (100011 )} Then

1 00011   E(X ) = 001 01 0 000101   5

Identifying vectors 





Each subspace X ∈ Pq (n) with dim( X ) = k has an identifying vector v( X )

v( X ) is a binary vector of length n and weight k , where the ones in v(X ) are in the positions where E (X ) has the leading ones. Example. Let then

100011   E(X ) = 0 01 01 0 000101   v ( X ) = 1 0 1 1 00



Lemma. d s ( X , Y ) ≥ d H (v( X ), v(Y )); X , Y ∈ Pq (n) 6

Echelon Ferrers form  



Let v be a binary vector of length n and weight k The echelon Ferrers form of v, EF (v), is the k × n matrix in reduced row echelon form such that  The leading entries in the columns indexed by ones of v  There are "•" (dots) in the all “arbitrary ” entries The dots of EF (v) form a Ferrers diagram Example.

v = 1 0 1 1 00 1 • 0 0••   then EF (v ) =  0 0 1 0 • •  with the diagram • 0 0 01••  

Let

• •

• •





• If we substitute elements of Fq in the dots of EF (v) we obtain a subspace X with dim( X ) = k 7

Construction of Constant Dimension Code (n, M ,2δ , k ) 

q

Step 1. Choose a binary constant weight code C of length n , weight k and minimum distance 2δ Example. Let q = 2, n = 5, k = 2, 2δ = 4 and C = {c1 = 11000, c2 = 00110} The next steps are performed for each c ∈ C :



Step 2. Construct the echelon Ferrers form EF (c) Example.

 1 0 •••  0 0 1 0•  EF (c2 ) =   EF (c1 ) =   0 1 •••  0 0 0 1 • 8

Rank-metric codes 



For two matrices A, B ∈ Fqm×η the rank distance is defined by d R ( A, B ) = rank( A − B ) A code C ⊆ Fq m×η is an [ m ×η , κ , δ ] rank-metric code if 

it is a subspace of Fq m×η of dimension κ



for each distinct

A, B ∈ C , d R ( A, B) ≥ δ

9

Ferrers diagram rank-metric code 



Let F be a Ferrers (dots) diagram which embedded in an m ×η matrix A code CF is an [ F , κ , δ ] Ferrers diagram rank-metric code if  All codewords are m ×η matrices in which all entries not in F 

are zeroes It forms a rank-metric code with dimension κ and minimum rank distance δ

Example. Let F =

• • •

then an [F ,1,2] code CF is equal to

 0 0   1 1 ,   CF =   0 0   0 1 10

Lifted Ferrers diagram rank-metric code    



Let v be a vector of length n and weight k Let EF (v) be its echelon Ferrers form Let F be its Ferrers diagram Let C F be a Ferrers diagram rank-metric code

CF is lifted to a constant dimension code C v by substituting each codeword A ∈ CF in the dots of EF (v) Example.

v = 010101

 0 1 0• 0 0• 0   0 1 1• 0 1• 0  0 1 • 0 • 0    0 0   1 1 C =  0 0 0 1 0• 0 ,  0 0 0 1 1• 0  EF (v) =  0 0 0 1 • 0  CF =  v  0 0 ,  0 1  0 0 0 0 0 1   0 0 0 0 0 1  0 0 0 0 01          

Lemma. The minimum distance of C v is 2δ , where δ is the minimum distance of CF 11

Construction (cont.) 

 

 

Step 1. Choose a binary constant weight code C of length n weight k and minimum distance 2δ The next steps are performed for each c ∈ C: Step 2. Construct the echelon Ferrers form EF (c) Step 3. Construct the largest [ F , κ , δ ] Ferrers diagram rank metric code CF for the Ferrers diagram F of EF (c) Step 4. Lift CF to a constant dimension code C c Finally C = U C c c∈C



C is an (n, M ,2δ , k ) q constant dimension code 12

Example of construction 

Let q = 2, n = 6, k = 3, 2δ = 4

C = {c1 = 111000, c2 = 100110, c3 = 010101, c4 = 001011} 1 0 0•••   EF ( c1 ) =  0 1 0 • • •  | CF1 |= 64 001•••  

01 •0• 0   | C |= 2 F3 EF ( c 3 ) =  0 0 0 1 • 0  000001  

1 • • 0 0•   EF ( c 2 ) =  0 0 0 1 0 •  | CF2 |= 4 0 0 001•  

001 • 00   EF ( c 4 ) =  0 0 0 0 1 0  | CF4 |= 1 000001  

| C |=| C c1 ∪ C c2 ∪ C c3 ∪ C c4 |= 64 + 4 + 2 + 1 = 71 Note. A code of the size 74 was obtained via a computer search by Kohnert and Kurz (2008) 13

Sizes of some of our codes compared to previous known codes q 2 2 2 2 3 3 4 4

d 4 4 6 6 4 4 4 4

n 8 9 10 13 7 8 7 8

k 4 4 5 4 3 4 3 4

Code size * 212 215 215 218 38 312 48 412

Size of our code 212 +477 215+4177 215+73 218+4357 38+124 312+8137 48+345 412+72529

* Codes obtained by Silva, Koetter and Kschischang, (2008)

14

Punctured codes 

We construct the codes in Pq (n) which are not constant dimension codes



Let C be a code in Gq (n, k ) n Q ⊆ F Let q such that dim(Q ) = n − 1 n Let v ∈ Fq such that v ∉ Q



Define the punctured code

C 'Q ,v = C Q ∪ C Q ,v , where 

C Q = { X ∈ C : X ⊆ Q} , C Q ,v = { X ∩ Q : X ∈ C, v ∈ X }

The punctured code C 'Q ,v of an (n, M , d , k ) qcode C is an (n − 1, M ' , d − 1) q code 15

Example of punctured construction 

Let C be the (8,4573,4,4) 2 code obtained by previous construction



Let Q with dim(Q) = 7 and generator matrix

 



1 0 L 0 0 0 0 Q =  0M 1M L O M M  0 0 L 1 0 Let v = 10000001 | C Q |= 289 and | C Q ,v |= 284 | C 'Q ,v |= 573 By adding to C 'Q ,v the null space {0} and F27 we obtained a (7,575,3) 2 code in P2 (7) Note. By using the multilevel construction we obtain a (7,394,3) 2 code in P2 (7)



16

Thank you!

17

Construction of Error-Correcting Codes for Random ...

Rank-metric codes. ▫ For two matrices the rank distance is defined by. ▫ A code is an rank-metric code if it is a subspace of of dimension. ) rank(. ),(. BA. BAd. R.

141KB Sizes 1 Downloads 272 Views

Recommend Documents

CONSTRUCTION OF ERROR-CORRECTING CODES ...
Dec 13, 2009 - dimension code. Koetter and Kschischang [10] showed that codes in Pq(n) are useful for correcting errors and erasures in random network coding. This is the motivation to explore error- correcting codes in Pq(n) [3, 4, 6, 7, 8, 11, 12,

performance of random fingerprinting codes under ... - IEEE Xplore
University of Illinois at Urbana-Champaign, USA. ABSTRACT. This paper analyzes the performance of arbitrary nonlinear collu- sion attacks on random fingerprinting codes. We derive the error exponent of the fingerprinting system, which determines the

On the list decodability of random linear codes with ...
Jul 9, 2013 - proof that the RIP is a sufficient condition follows, after some computations, from ..... consider the family of (binary) degree r Reed-Muller codes, RM(r, m) ⊂ .... Foundations and Trends in Theoretical Computer Science, 2011.

Nba2k17 Codes For Ps3 327 ^ Nba2k17 Codes Without Human ...
NBA 2k17 Locker Codes 2017, Unlimited VC Glitch Free ... Generator Nba2k17 Vc Generator Android Live Free Game Generator Codes online, Free Game ...

A New Construction of Self-Dual Codes from Projective ...
Jun 22, 2011 - weights in the code. The Hamming weight enumerator of a code C is given by. WC(x, y) = ∑ c∈C xn−wt(c)ywt(c). (1) where wt(c) is the number of non-zero elements in c. Usually, when displaying the weight enumerator we set y = 1. 2

Material of Construction for Pharmaceutical and Biotechnology ...
of Minnesota's Bioprocess Technical Institute and reported ... The data of Figure 6 indicate that Teflon® PFA HP .... Glennon, B., “Control Systems Validation in.

Codes of Conduct.pdf
Page 1 of 8. CODES OF CONDUCT & EQUITY POLICY. All members of Tottonians RFC are expected to abide by the laws of the RFU (Rugby Football. Union) ...

Asymptotic Interference Alignment for Optimal Repair of MDS Codes in ...
Viveck R. Cadambe, Member, IEEE, Syed Ali Jafar, Senior Member, IEEE, Hamed Maleki, ... distance separable (MDS) codes, interference alignment, network.

Call Of Duty Cheat Codes For Ps4432
GameStop: Buy Call of Duty: Black Ops II, Activision, PlayStation 3, Find release ... Free Game Generator Codes Call Of Duty 3 Ps2 Cheats Code Generator Call ...

Confidence Sets for the Aumann Mean of a Random ... - CiteSeerX
indeed enough to observe their support lines on a grid of directions); this .... Section 4 presents an application to simulated data and Sec- .... Z (ui) , ui ∈ Sd−1; ...

Performance evaluation of a reservation random access scheme for ...
We compute the steady state distribution of the Markov chain. This result is used to ... This work is supported by a University of California MICRO and Pacific-Bell ...

Co-Training of Conditional Random Fields for ...
Bootstrapping POS taggers using unlabeled data. In. CoNLL-2003. [26] Berger, A., Pietra, A.D., and Pietra, J.D. A maximum entropy approach to natural language processing. Computational Linguistics, 22(1):39-71,. 1996. [26] Kudo, T. and Matsumoto, Y.

Confidence Sets for the Aumann Mean of a Random ... - CiteSeerX
Almost the same technique can be used to obtain a confidence region for a set ..... Hajivassiliou V., McFadden D.L., Ruud P.: Simulation of multivariate normal rectangle ... Ihaka R., Gentleman R.: R: a language for data analysis and graphics.

Logarithmic components of the vacant set for random ... - Project Euclid
choice of a sufficiently large constant c0 > 0 is crucial in the definition of the ... the d-dimensional integer torus E = (Z/NZ)d for a sufficiently large dimension d and ...

Nonspecificity for infinite random sets of indexable type
Aug 22, 2007 - In this document the Hartley-like-based measure of nonspecificity for finite random sets is extended to infinite random sets of indexable type. In the course of the paper, concepts defined in the realm of Dempster-Shafer evidence theor

Erasure Codes for Increasing the Availability of Grid ...
available Grid data storage system. ... paper we will present an implementation of a file system ... on framework as our application, by definition, communi-.

The Local Linearization method for numerical integration of random ...
A Local Linearization (LL) method for the numerical integration of Random ... interest in the study of RDEs has been motivated by the development of the ... However, the application of these averaged methods is not only restricted to the ...

Estimation for parameters of interest in random ... - ScienceDirect.com
Sep 8, 2006 - Y = (X ⊗ Im)A + (Z ⊗ Im)U + E,. Cov(Vec(Y )) = IN ⊗ ,. (3) which is a general growth curve model with multivariate random effects covariance structure, where. = ((1),..., (r)) is the qm × r matrix of the growth curve coefficients

Pay Grades Codes Details for the Purpose of Health Cards.pdf ...
Pay Grades Codes Details for the Purpose of Health Cards.pdf. Pay Grades Codes Details for the Purpose of Health Cards.pdf. Open. Extract. Open with. Sign In.

FULL-DIVERSITY SPREADING CODES FOR ... -
show that the performance of single-user detectors can also be improved by the ... sis on the performance of ML-MUD for the downlink ..... So performance improvement can also .... application of the maximum-likelihood detection is more.

Chapter Codes for VH.pdf
Wine Country Riders WCR. Yakima Valley YVC. Jr. BCH JrBCH. Revised March 2014. Page 1 of 1. Chapter Codes for VH.pdf. Chapter Codes for VH.pdf. Open.

Symmetric Dialog Codes for Confidential ...
Department of Computer Science and Engineering. Ohio State University. Columbus, OH, 43210. Email: [email protected]. Lifeng Sang. Core Security.

Purchasing Commodity Codes - Updated Listing for Administrative ...
Retrying... Purchasing Commodity Codes - Updated Listing for Administrative Staff Use.pdf. Purchasing Commodity Codes - Updated Listing for Administrative Staff Use.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying Purchasing Commodity Co

Optimal codes for human beings
Oct 3, 2006 - forming that word, and the computer deduces the word. ... the next button iterate over all words whose code starts with the sequence of digits we have just .... easier for him to select a word from the list by pressing next than to deci