Optimal binary linear codes from maximal arcs
WebThe binary Hamming codes with parameters [{2^{m}-1, 2^{m}-1-m, 3}] are perfect. Their extended codes have parameters [{2^{m}, 2^{m}-1-m, 4}] and are distance-optimal. The first objective of this paper is to construct a class of binary linear codes with parameters [{2^{m+s}+2^{s}-2^{m},2^{m+s}+2^{s}-2^{m}-2m-2,4}] , which have better information rates …
Optimal binary linear codes from maximal arcs
Did you know?
WebA few chapters deal with designs obtained from linear codes in other ways. Connections among ovals, hyperovals, maximal arcs, ovoids, linear codes and designs are also investigated. This book consists of both classical results on designs from linear codes and recent results yet published by others. WebThere are exactly two non-equivalent [32,11,12] -codes in the binary Reed-Muller code {\\cal{RM}}(2,5) which contain {\\cal{RM}}(1,5) and have the weight set \\{0,12 ...
WebThe only nontrivial infinite family of perfect binary linear codes are the binary Hamming codes with parameters [2m−1,2m−1−m,3]. The extended binary Hamming codes have parameters [2m,2m−1−m,4] and are distance-optimal. The motivation of this paper is to search for a class of binary linear codes which are better than the extended ... WebAug 1, 2010 · Several new upper bounds on the maximum size of an optimal constant weight code are obtained, leading among other things to the exact values of 12,4,5)=80, and 15,6,6)=70. A binary code C ⊆ F 2 n with minimum distance at least d and codewords of Hamming weight w is called an (n , d , w >) constant weight code.
Weblinear codes are the binary Hamming codes with parameters [2m−1,2m−1−m,3]. The extended binary Hamming codes have parameters [2m,2m−1−m,4] and are distance … WebJan 4, 2024 · Title:Optimal Binary Linear Codes from Maximal Arcs. Authors:Ziling Heng, Cunsheng Ding, Weiqiong Wang. Download PDF. Abstract:The binary Hamming codes …
Weblater extended in [49], [51]. In [24], optimal binary linear codes were constructed from maximal arcs. Meanwhile, in [26], they presented the subfield codes of [q+1,2,q] MDS codes with different forms of generator matrix and some optimal linear codes are obtained. The subfield codes of some cyclic codes were also studied in [25], [47].
WebDec 15, 2024 · In this paper we firstly show that a binary code reaches one of the above bounds for δ_r () if and only if reaches the corresponding bounds for d_H and r is … invulnerability timeWebThe newly obtained codewords each have length n−(d−1)=n−d+1,{\displaystyle n-(d-1)=n-d+1,} and thus, there can be at most qn−d+1{\displaystyle q^{n-d+1}}of them. Since C{\displaystyle C}was arbitrary, this bound must hold for the largest possible code with these parameters, thus:[2] invulnerability theory armyWebThe binary Hamming codes with parameters $[2^m-1, 2^m-1-m, 3]$ are perfect. Their extended codes have parameters $[2^m, 2^m-1-m, 4]$ and are distance-optimal. The first … invulnerability windowsWebJan 4, 2024 · The optimality of these four families of linear codes are characterized with an explicit computable criterion using the Griesmer bound and several classes of (distance-)optimal linear codes with few weights are obtained, which are useful in applications. 1 PDF View 1 excerpt, cites background invulnerability theory tenetsWebMar 16, 2024 · The hull of a linear code C is the intersection of C with its dual. To the best of our knowledge, there are very few constructions of binary linear codes with the hull dimension $$\\ge 2$$ ≥ 2 except for self-orthogonal codes. We propose a building-up construction to obtain a plenty of binary $$[n+2, k+1]$$ [ n + 2 , k + 1 ] codes with hull … invulnera billboard weaknessWebAbstract We study [2m-1,2m]-binary linear codes whose weights lie between w0 and 2m-w0, where w0 takes the highest possible value. Primitive cyclic codes with two zeros whose dual satisfies this property actually correspond to almost bent power functions and to pairs of maximum-length sequences with preferred crosscorrelation. invulnerable artinyaWebJan 1, 2024 · Recently, subfield codes of some optimal linear codes have been studied. In this paper, we further investigate a class of subfield codes and generalize the results of … invulnerability wikia