ON SOME LINEAR CODES OVER Z2S
A Thesis Submitted
in Partial Fulfillment of the Requirements
for the Degree of
Doctor of Philosophy
by
MANISH K. GUPTA
to the
DEPARTMENT OF MATHEMATICS
INDIAN INSTITUTE OF TECHNOLOGY, KANPUR
December, 1999
✁
✂ ✄ ☎✆✝✞✟✠ ✡ ☛ ☞✝✌✠ ✍✞✝ ✆✟ ✎ ✏✑✡✠ ✞✝
iv
CERTIFICATE
It is certified that the work contained in the thesis entitled On Some
Linear Codes over Z2s by Manish K. Gupta has been carried out under
our supervision and that this work has not been submitted elsewhere
for a degree.
Professor M. C. Bhandari
Professor A. K. Lal
Department of Mathematics
Indian Institute of Technology
December, 1999
Kanpur
v
vi
Nomenclature
S
: A Commutative ring with unity
|S|
: Cardinality of the set S
Sn
: Set of all n-tuples over S
Fq
: Set of q Alphabets
Fqn
: Set of all n-tuples over Fq
M
: A left S-module
GF (q)
: Galois field with q elements
Zq
: Ring of integers modulo m
Zps
: Ring of integers modulo ps
U
: Set of all units of Zps
Z
: Set of all zero divisors of Zps
⌊x⌋
: Greatest integer less than or equal to x
⌈x⌉
: Smallest integer greater than or equal to x
x
: Element of Fnq
wH (x)
: Hamming weight of x
wL (x)
: Lee weight of x
wE (x)
: Euclidean weight of x
dH (x, y)
: Hamming distance between x and y
dL (x, y)
: Lee distance between x and y
dGL (x, y) : Generalized Lee distance between x and y
dH
: Minimum Hamming distance of C
dL
: Minimum Lee distance of C
dGL
: Minimum generalized Lee distance of C
vii
d(x, D)
:
Smallest distance of x from a word in D
C
:
A code of length n
c
:
A codeword of C
(n, M, dH , dL , dE )
:
A code of length n, number of codewords M and
minimum Hamming, Lee and Euclidean distances
respectively dH , dL and dE
[n, k, dH , dL, dE ]
:
A Linear code of length n, 2-dimension k and minimum
distances dH , dL and dE respectively
[n, k, dH , dL, dGL ]
:
A Linear code of length n, 2-dimension k and minimum
distances dH , dL and dGL respectively
[n, k]
:
A Linear Code
AH (i)(AL (i))
:
Number of codewords of Hamming ( Lee ) weight i
dr (C)
:
r th Generalized Hamming weight (GHW) of C
wS (D)
:
Support size of C
C⊥
:
Dual code of C
Aut(C)
:
Automorphism group of C
HamC (x, y) or WC (x, y) :
Hamming weight enumerator (hwe) of C
ωj (c)
:
|{k : ck = j}|
cweC (x0 , . . . , xm )
:
Complete weight enumerator (cwe) of C
sweC (x, y, z)
:
Symmetrized weight enumerator (swe) of C
LeeC (x, y)
:
Lee weight enumerator of C
Sk (q)
:
q-ary Simplex Code
Gk (q)
:
Generator matrix of Sk (q)
Mk,u (q)
:
q-ary MacDonald Code
Gk,u (q)
:
Generator matrix of Mk,u(q)
Sk
:
Binary Simplex Code
Sˆk
:
Extended binary Simplex Code
G(Sk )
:
Generator matrix of Sk
viii
G(Sˆk )
:
Generator matrix of Sˆk
RM(r, m)
:
r th -order Reed Müller Code
P (m)
:
Binary nonlinear Preparata Code
K(m)
:
Binary nonlinear Kerdock Code
A(n, dH )
:
max{M| there exists a binary (n, M, dH ) code }
φ
:
Gray map
φ(C)
:
{φ(c) : c ∈ C} : Gray image of C
h2 (x)
:
Irreducible polynomial over Z2 such that it divides xn − 1 over Z2
h(x)
:
Hensel uplift of h2 (x) over Z4
B
:
p-basis of C
p−dim(C)
:
p-dimension of C
φG
:
Generalized gray map
φG (C)
:
Generalized gray image of C
Cφ
:
Generalized gray image of C in 2-basis form
C (1)
:
Binary residue code of C
C (2)
:
Binary torsion code of C
θ(c)
:
Correlation of c ∈ C
Skα
:
Simplex Code of type α
Skβ
:
Simplex Code of type β
Gk
:
Generator matrix of Skα
Gβk
:
Generator matrix of Skβ
S¯kα
:
Punctured code of Skα obtained by deleting the zero coordinate
Ri
:
Rows of a generator matrix
K4m
:
Klemm code
O8
:
Octacode code
QRn
:
Uplifted extended quadratic residue code over Z4
R1,m−s+1
:
First order Reed Müller code over Z2s
Cp
:
Norm quadratic residue (NQR) code
ix
Hp
: Finite version of Poincáre upper half-plane
δ
: Arbitrary chosen quadratic non residue modulo p
γ
: First row of a circulant matrix C
Pγ (z)
: Polynomial corresponding to γ
P SL2 (p)
: Projective special linear group on GF(p)
SL2 (p)
: Special linear group on GF(p)
R(C)
: Covering radius of C
N (i)
: Norm of C with respect to ith -coordinate
N(C)
: Norm of C
: End of the proof
Synopsis
Name of the student: Manish Kumar Gupta
Degree for which submitted: Ph.D.
Roll No.: 9310863
Department: Mathematics
Thesis Title: On Some Linear Codes over Z2s
Name of the Thesis Supervisors: Prof. M. C. Bhandari & Prof. A. K. Lal
Month and Year of Thesis Submission: December, 1999
Let q be a positive integer and let Fq be a set of q-alphabets. A code C of length
n and size M is a subset of Fnq having M elements. The elements of C are called
codewords. In order to be able to correct errors we associate some algebraic structure
with Fq . If q is a prime power one usually take Fq = GF (q) otherwise Fq = Zq . Let
Fq = GF (q)( Zq ). A linear code of length n over GF (q)( Zq ) is a subspace (submodule)
of Fnq . Two codes over Zps are said to be equivalent if one can be obtained from the
other by a permutation of coordinates and or by multiplying one or more coordinates
by a unit in Zps . Let C be a linear code of length n over Zps . In 1995, Calderbank and
Sloane have shown that C is equivalent to a code generated by the rows of the matrix
(see[15])
G=
I k0
A01
A02
···
A0s−1
A0s
0
pIk1
pA12
···
pA1s−1
pA1s
0
..
.
0
..
.
p 2 I k2
..
.
···
p2 A2s−1
..
.
p2 A2s
..
.
0
0
0
···
ps−1 Iks−1
ps−1 As−1s
..
.
,
(1)
xi
where Aij are matrices over Zps and the columns are grouped into blocks of size
k0 , k1 , · · · , ks−1 , ks . Let k =
Ps−1
i=0 (s − i)ki .
Then |C| = pk . Note that C is a free module
if and only if ki = 0 for all i = 1, 2, . . . , s − 1. Notion of dual code of C is defined via
inner product x · y =
Pn
i=1
xi yi (mod ps ).
Two notorious binary nonlinear codes–the Kerdock code and the Preparata code-have in the past been something of an enigma in coding theory since they possess many
linear-like properties. Until recently, their mysterious formal duality (with respect to
the MacWilliams transform) had been dismissed as a “mere coincidence” since an appropriate algebraic notion of duality was lacking for nonlinear codes. In[52], Hammons
et al have shown that both Kerdock and Preparata codes are gray images of some
linear codes over Z4 which are dual to each other over Z4 . Description of these codes
become simpler using the properties of corresponding linear codes over Z4 . In addition, the customary notions of generator matrices, parity-check matrices, syndromes
etc., become meaningful. Since then many linear codes over Z4 and in general over
Zps have been investigated by several researchers. They have also studied the Gray
images of different codes.
Let C be a linear code over Z4 . Then C has a generator matrix of the form
G=
Ik0
A
0
2Ik1
B1 + 2B2
2C
,
(2)
where A, B1 , B2 , C have entries 0 and 1 and Ik is the identity matrix of order k.
Let dH (dL ) be the minimum Hamming (Lee) distance of C. In[93], E. M. Rains
has shown that dH ≥ ⌈ d2L ⌉. C is said to be of type α ( β) if dH = ⌈ d2L ⌉ (dH > ⌈ d2L ⌉).
The Gray map φ : Z4n → Z22n is the coordinate wise extension of the function from
Z4 to Z22 defined by 0 → (0, 0), 1 → (0, 1), 2 → (1, 1) and 3 → (1, 0). The image
φ(C) = {φ(c) : c ∈ C} of C under the Gray map φ is a binary code of length 2n.
xii
However it may not be linear. If φ(C) is linear then C is called Z2 -linear. A binary
code of even length is called Z4 -linear if it is equivalent to φ(C) for some linear code
over Z4 . In[53], Hammons et al have shown that many known binary nonlinear codes
are Z4 -linear.
In the present dissertation we have constructed Simplex codes of type α and β over
Z4 and over Z2s , and first order Reed Müller code over Z2s . Some fundamental properties like 2-dimension, weight hierarchy etc. are obtained. We have also considered
their gray images in two ways and obtained some interesting binary codes. It is shown
that Simplex code of type α and β and many known self dual codes satisfy the chain
condition. A brief survey of known results is given in Chapter 2.
A vector v is a p-linear combination of the vectors v1 , v2 , . . . , vk if v = l1 v1 +. . .+lk vk
with li ∈ Zp for 1 ≤ i ≤ k. A subset S = {v1 , v2 , ..., vk } of C is called a p-basis for C
if for each i = 1, 2, ..., k − 1, pvi is a p−linear combination of vi+1 , ..., vk , pvk = 0, C is
the p-linear span of S and S is p-linearly independent[112]. The number of elements
in a p-basis for C is called the p-dimension of C. It is easy to verify that the rows of
the matrix
B=
Ik0
A
2Ik0
2A
0
2Ik1
B1 + 2B2
2B1
2C
(3)
form a 2-basis for the code C generated by the matrix G given in (1).
A linear code C over Z2s ( Z2 ) of length n, 2-dimension k, minimum Hamming
distance dH and minimum Lee distance dL is called an [n, k, dH , dL ] ([n, k, dH ]) or simply
an [n, k] code.
Let φ(B) be the matrix obtained from B (given in (3)) by applying the gray map
φ to each row of B. The code Cφ generated by φ(B) is a [2n, k, ≥ ⌈ d2L ⌉] binary linear
code.
xiii
Let C be an [n, k] linear code over Z2s . For 1 ≤ r ≤ k, the r-th generalized Hamming
weight of C is defined by
dr (C) = min{wS (Dr ) : Dr is an [n, r] subcode of C},
where wS (D), called support size of D, is the number of coordinates in which some
codeword of D has a nonzero entry. The set {d1 (C), d2 (C), . . . , dk (C)} is called the
weight hierarchy of C. C is said to satisfy the chain condition if there exists a chain
D1 ⊆ D2 ⊆ · · · ⊆ D k ,
of subcodes of C satisfying wS (Dr ) = dr (C), 1 ≤ r ≤ k.
Let Gk and Gβk be defined inductively by
G1 = [0123], Gk =
Gβ2 =
1111 0 2
0123 1 1
,
00 · · · 0 11 · · · 1 22 · · · 2 33 · · · 3
Gk−1
Gk−1
Gβk =
Gk−1
Gk−1
,
11 · · · 1 00 · · · 0 22 · · · 2
Gk−1
Gβk−1
Gβk−1
.
Note that columns of Gk consist of all elements of Zk4 and no two columns of Gβk are
multiples of each other. The code Skα (Skβ ) generated by Gk (Gβk ) over Z4 is of type
α (β) and is called Simplex code of type α (β). In[97], Satyanarayana has shown that
the Lee weight of every nonzero codeword of Skα is 22k and in[20] Carlet has classified
all constant Lee weight codes over Z4 .
For each a ∈ Z4 , let ā be the reduction of a modulo 2 then the code C (1) =
{(c¯1 , c¯2 , . . . , c¯n ) : (c1 , c2 , . . . , cn ) ∈ C} is a binary linear code called the residue code
of C. It is shown that the residue code of Skα Skβ is equivalent to 2k copies of the
extended binary simplex code ( 2k−1 copies of the binary simplex code).
The following theorems that give properties of Skα and Skβ are proved in Chapter 3.
Theorem 0.1 The Hamming and Lee weight distribution of Skα are:
xiv
1. AH (0) = 1, AH (22k−1 ) = 2k − 1, AH (3 · 22k−2 ) = 2k (2k − 1) and
2. AL (0) = 1, AL (22k ) = 22k − 1.
where AH (i)(AL (i)) denotes the number of codewords of Hamming (Lee) weight
i in Skα .
Theorem 0.2 The Hamming and Lee weight distributions of Skβ are:
1. AH (0) = 1, AH (22k−2 ) = 2k − 1, AH (2k−3 [3(2k − 1) + 1]) = 2k (2k − 1) and
2. AL (0) = 1, AL (22k−1 ) = 2k − 1, AL (2k−1(2k − 1)) = 2k (2k − 1).
Thus Skα is a [22k , 2k, 22k−1, 22k ] and Skβ is a [2k−1 (2k − 1), 2k, 22k−2, 2k−1(2k − 1)]
linear code over Z4 . It is further shown that both Skα and Skβ are not Z2 -linear.
Following theorems have been obtained for Skα and Skβ .
Theorem 0.3 Skα satisfies the chain condition and its weight hierarchy is given by
dr (Skα ) =
r
X
i=1
22k−i = 22k − 22k−r , 1 ≤ r ≤ 2k.
Theorem 0.4 Skβ satisfies the chain condition and its weight hierarchy is given by
r
dr (Skβ ) = n(k) − 2k−r−1(2k − 2⌈ 2 ⌉ ),
1 ≤ r ≤ 2k,
where n(k) = 2k−1(2k − 1).
The description of the code Cφ for the simplex codes of type α and β are given by
the following theorems.
Theorem 0.5 Let C = S¯kα , be the punctured code of Skα . Then Cφ is an [22k+1 −
2, 2k, 22k ] binary linear code consisting of two copies of binary simplex code S2k with
Hamming weight distribution same as the Lee weight distribution of S¯kα .
xv
Theorem 0.6 Let C = Skβ . Then Cφ is the binary MacDonald code
M2k,k : [22k − 2k , 2k, 22k−1 − 2k−1 ]
with Hamming weight distribution same as the Lee weight distribution of Skβ .
The gray image φ(C) of a linear code C over Z4 is a binary code of even length and
the minimum Hamming distance as the minimum Lee distance of C. A natural Question
arises : Does there exist a generalized gray map which maps a linear code over Zps to
a code over Zp having similar properties? Recently Ana Sălăgean − Mandache has
shown that it is not possible to construct a weight function on Zps for which Zps is
isometric to Zps with the Hamming metric unless p = s = 2[98].
s−1
In[19], Carlet has introduced the generalized gray map φG from Z2s to Z2 2
and
has obtained the Z2s version of Kerdock code. φG is a mapping from Z2s onto the
Reed Müller code of order 1 and length 2s−1 . φG is defined as a Boolean function φG (u)
evaluated on GF (2s−1) by :
φG (u) : (y1 , y2 , · · · , ys−1) 7→ us +
s−1
X
ui yi .
i=1
Note that φG is distance preserving[19]. We have used φG to obtain generalization of
theorems 0.5 to 0.6 for codes over Z2s in Chapter 4.
The concept of chain condition is extended to the codes over Zps in Chapter 2. In
Chapter 5, we have shown that various known self dual codes over Z4 satisfy the chain
condition. The construction of the first order Reed Müller code R1,m−s+1 of length
2m−s+1 is also given in Chapter 5. The following theorems are proved in Chapter 5.
Theorem 0.7 D2m , E7 , E7+ and E8 satisfy the chain conditions.
′
Theorem 0.8 Klemm Code K4m (m ≥ 1) and the code K8 satisfy the chain condition
and the weight hierarchy of K4m is given by
dr (K4m ) =
r + 1,
1 ≤ r ≤ 4m − 2
4m,
r = 4m − 1 & 4m.
xvi
Theorem 0.9 Extended quadratic residue codes QR8 and QR24 over Z4 satisfy the
chain condition.
Theorem 0.10 R1,m−s+1 satisfies the chain condition and its weight hierarchy is given
by
dt (R1,m−s+1 ) =
Pt−1 m−s−i
2
,
1≤t≤m−s+1
i=0
2m−s+1 ,
m − s + 1 < t ≤ m + 1.
Theorem 0.11 R1,m−s+1 is Z2 -linear.
Let p be an odd prime. The Poincaré finite upper half plane is the set
(
Hp := x +
√
δy x, y ∈ GF (p), y 6= 0, δ is a quadratic non residue (q.n.r.)
)
(mod p) .
In[110], Tiu and Wallace have used it to construct a new class of binary linear code
Cp called norm quadratic residue (NQR) codes. The length of each codeword in Cp is
p(p − 1), the number of points in Hp . The points in Hp are ordered lexicographically;
i.e, (x, y) < (u, v) if x < u or x = u and y < v. For each a ∈ GF (p), the set
Ba = {(a, 1), (a, 2), . . . , (a, p − 1)} is called a block. Let G be the (p + 1) × p(p − 1)
matrix
G=
p(p−1)
where each Ri ∈ IF 2
R0
R1
..
.
Rp
is defined as follows.
,
R0 has an 1 in position (x, y) if x2 − δy 2 , the norm of (x, y) in Hp , is a quadratic
residue (q.r.) mod p and 0, otherwise. R1 , R2 , . . . , Rp−1 are block wise cyclic shifts of
R0 corresponding to blocks B0 , B1 , . . . , Bp−1 and Rp is the all one vector.
The code Cp generated by the matrix G is called the NQR Code[110]. If p is of the
form 4m + 1 then Tiu and Wallace[110] have shown that dim Cp ≤ p, dH ≥ p − 1, Cp is
xvii
weakly self dual and that the weight of each codeword is divisible by 4. They conjectured
that dim Cp = p. In Chapter 6, we show that if p is a prime of the form 4m − 1 then
also Cp satisfies similar properties. The following results are proved for Cp .
Theorem 0.12 dim Cp = p, (p 6= 2).
Theorem 0.13 PSL2 (p) fixes Cp and acts transitively on the coordinate positions.
Theorem 0.14 Cp is Z4 -linear.
The Covering Radius R(C) of a linear code C is the least integer R such that spheres
of radius R around the codewords cover the whole space. It is known that R(C) is the
maximum weight of the coset leader.
The following theorem gives the covering radius of Cp .
Theorem 0.15 Covering radius of Cp is
p(p−1)
.
2
Moreover Cp is a normal code with
every coordinate acceptable.
The last chapter concludes with some general remarks.
Acknowledgments
It is better to do the right problem the wrong way than to do the wrong
problem the right way. . . . Richard W. Hamming (1915-1998)
The best way to learn a craft is to work under the guidance of a skilled professional.
I am very grateful to my “guruji” Prof. M. C. Bhandari who has not only made me
aware about the beautiful subject of “Algebraic Coding Theory” but also constantly
supported me with his many ideas and healthy discussions. It has been a privilege to
work with him. Learning how to do research and how to write technical papers from
him has been a life time experiences in itself.
I am also grateful to Prof. A. K. Lal for having accepted to be my co-guide. His
critical comments and constructive suggestions have helped me to substantially improve
the presentation of this thesis.
I am highly indebted to both of my gurus for the patience they have shown in
guiding and going through my work.
This is also a unique occasion to express my sincere thanks to many people who
have shared time to cooperate with and to help me. First of all I wish to thank Prof.
R.K.S. Rathore for continuously inspiring me throughout my stay at IIT K. I also
thank with pleasure Prof. U.B. Tewari, Prof. Shobha Madan, Prof. Prabha Sharma,
Prof. A. K. Maloo and to all other members of the Mathematics Department, IIT K.
I also thank to Prof. H.L. Janwa and Brajesh Kumar for helping me during my
xviii
xix
visits at MRI, Allahabad. I am also thankful to C. Carlet, C. Charnes, C. Ding, M.
Harada, Z. Quian, E.M. Rains, J. Wolfmann and J.A. Wood for sending the re/pre
prints of their manuscripts.
I wish to thank all my friends who has contributed to make my stay at IIT K as
one of the most beautiful periods in my life. Let me express my sincere thanks to
my colleagues and batch mates: Chanduka, Durairajan, K. Balaji, S.B. Rao, Mahesh,
V.S.N. Kaliprasad and Nemade.
It would be really immodest if i do not appreciate the various facilities provided by
IIT Kanpur.
Last but not least, it were the blessings of my parents and family members who
have always shadowed me. Its really beyond words to express my feelings regarding
them.
Manish K. Gupta
Contents
Nomenclature
vi
Synopsis
x
Acknowledgments
xviii
1 Introduction
1
2 Preliminaries and Survey
5
3
2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5
2.2 Classical Codes over GF (q) . . . . . . . . . . . . . . . . . . . . . . . .
11
2.3 Codes over Integer Residue Rings . . . . . . . . . . . . . . . . . . . . .
12
2.4 Codes over Zps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
15
2.4.1
p-dimension of Linear Codes over Zps
. . . . . . . . . . . . . .
16
2.4.2
Generalized Gray Map . . . . . . . . . . . . . . . . . . . . . . .
18
2.4.3
Generalized Hamming weights of Linear codes over Zps . . . . .
21
2.4.4
Codes over Z4 . . . . . . . . . . . . . . . . . . . . . . . . . . .
23
Z4 -Simplex Codes and their Gray Images
25
3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
25
3.2
26
Z4 -Simplex Codes of Type α and β . . . . . . . . . . . . . . . . . . .
xx
xxi
4
3.3 Gray Image Families . . . . . . . . . . . . . . . . . . . . . . . . . . . .
31
Z2s -Simplex Codes and their Generalized Gray Images
36
4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
36
Z2s -Simplex Codes of Type α and β . . . . . . . . . . . . . . . . . . .
37
4.2.1
42
4.2
Gray Image Families . . . . . . . . . . . . . . . . . . . . . . . .
5 Codes Satisfying the Chain Condition
47
5.1 Self-Dual and Self Orthogonal Codes over Z4 . . . . . . . . . . . . . .
47
5.2 First order Reed Müller Code over Z2s . . . . . . . . . . . . . . . . . .
54
6 Norm Quadratic Residue Codes
6.1 Definitions and Basic Results . . . . . . . . . . . . . . . . . . . . . . .
7 Conclusions
Bibliography
57
57
65
66
Chapter 1
Introduction
Men are from Mars, women are from Venus and computers are from hell
thats what we say once they makes an error . . . , IEEE Computer Magazine
Information Theory is a field in which profound theoretical investigation often has
immediate and far-reaching impact on Technology and practice. Last year it was an
exciting time for Information Theory distinguished to celebrate 50th year anniversary
of Shannon’s seminal paper A Mathematical Theory of Communication[101]. Soon
after Shannon’s paper Richard W. Hamming in 1950 published the paper[51] which
together with Golay’s paper[41] forms the foundation of the constructive counterpart
to Shannon’s theory, namely, Algebraic Coding Theory. Applications of Coding Theory
ranges from deep space communications to consumer electronics. Infact, “ Algebraic
Coding Theory is a branch of Engineering with roots in Mathematics and applications
to Computer Science.”
The origins of the Binary Code can be traced as far back as the 17th century, when
the secretary of nature and the great philosopher of the world Sir Francis Bacon devised
a binary scheme called Biliterarie Cipher or omnia per omnia a five letter binary code
first mentioned in The Advancement of Learning (1605) and later published in detail in
1
2
De Augmentis Scientarum (1623) for encoding his diplomatic secret messages (see web
site[4]). After this three men approached the subject from different directions. Early
in the 19th century in France Joseph Marie Jacquard designed the first binary coded
punched cards for operating Looms. The other two men were George Boole the English
Mathematician whose algebra of propositional calculus forms the basis of the modern
design of computer logic and Emile Baudot a french engineer whose cyclic-permuted
code (now often called Gray code as it was patented by Frank Gray on 17.03.1953[46] )
represented a major advance in telegraphy. There are various other applications of this
code like solving puzzles such as Tower of Hanoi and the Brain. It is very recent when
it was used in solving a 30 year old coding theory puzzle[53].
The key idea of this puzzle can be described in few sentences. For many years
it was observed that binary nonlinear Preparata and Kerdock codes satisfy the duality relations and they appeared to be duals to each other. Many researchers viz
MacWilliams, Sloane etc. worked hard to explain this mystery. The answer turns out
to be astonishingly simple. In 1994, Hammons et al have shown that both Kerdock
and Preparata codes are gray images of linear codes over Z4 , which are dual to each
other. This has motivated a great deal of research in Codes over Z4 and in general
Codes over Zps [113], [15]etc. Though there were few papers on codes over the ring of
integers modulo q in early seventies, it was forgotten by the researchers partly because
of the presence of the zero divisors. These codes also found various other applications
like orthogonal frequency division multiplexing (OFDM), phase modulated channels
etc. to diverse areas such as bent functions and various lattice constructions.
There are various binary linear codes studied so far by several researchers[79]. Some
important class of binary codes are Hamming code, the first order Reed Müller code and
Simplex code. Any nonzero codeword of the simplex code has many of the properties
that we would expect from a sequence obtained by tossing a fair coin 2m − 1 times.
3
This randomness makes these codewords very useful in a number of applications such
as range-finding, synchronizing, modulation, scrambling etc. Similar properties holds
for the binary first order Reed Müller code. This family of code is one of the few for
which maximum likelihood decoding is practical. Hamming code is the dual of the
simplex code. All these codes have been generalized to codes over GF (q). A binary
code of even length is said to be Z4 -linear if upto suitable permutation of coordinates
it is the image of some linear code over Z4 . In[53], Hammons et al have shown that the
first order Reed Müller code, Kerdock code and Preparata code are Z4 -linear. Since
then many researchers have constructed various linear codes over Z4 and over Zps
and studied their gray images (see[113],[15],[53],[21] etc.).
In the present dissertation, we have constructed Simplex code of type α and β over
Z4 and over Z2s . Some fundamental properties like 2-dimension, Hamming, Lee and
Generalized Lee weight distributions, weight hierarchy etc. are determined for these
codes. It is shown that binary images of these codes give rise to some interesting binary
codes. The concept of chain condition defined for GF (q) is extended to codes over Z2s .
In[110], Tiu and Wallace constructed a binary linear family of self orthogonal codes
Cp based on the concept of quadratic residue and conjectured that dim(Cp ) = p. We
have proved the conjecture and extended the construction to any odd prime p. It is
shown that Cp is Z4 -linear.
This dissertation is divided into seven chapters. Chapter 2 contains preliminary
definitions and a brief survey of known results on codes over GF (q), and codes over
integer modulo ps . Some new results are also included.
Chapter 3 introduces Simplex codes of type α and type β, denoted Skα and Skβ over
Z4 . Basic properties like 2- dimension, weight hierarchy, and Symmetrized weight enumerator etc. are obtained in section 1. The gray images of these codes are constructed
in two ways and some interesting linear and nonlinear binary families are obtained. It
4
is also shown that both Skα and Skβ satisfy the chain condition.
Chapter 4 deals with simplex codes of type α and β over Z2s . Using the generalized
gray map introduced by Carlet, the result obtained in Chapter 3 over Z4 are extended
for Simplex codes of type α and β over Z2s .
The concept of chain condition for various self-dual and self-orthogonal codes over
Z4 is studied in chapter 5. Section 1 deals with self dual codes of length at most 9 or
of length 2m and 4m. A construction and some of the fundamental properties of the
first order Reed Müller code over Z2s is given in section 2.
In Chapter 6, we study binary linear Norm Quadratic Residue (NQR) codes Cp for
any odd prime p. It is shown that Cp is Z4 linear, dim(Cp ) = p and its covering radius
is
p(p−1)
.
2
The thesis concludes with some general remarks in the last chapter.
Chapter 2
Preliminaries and Survey
If you are faced by a difficulty or a controversy in science, an ounce of
algebra is worth a ton of verbal argument. . . . J.B.S. Haldane (1892-1964)
2.1
Introduction
A nonempty set S with two binary operations ‘+’ and ‘.’ ( called addition and multiplication) is a ring if (i) < S, + > is an abelian group, (ii) ‘.’ is associative , and (iii)
distributive laws hold. If in addition, a.b = b.a for all a, b ∈ S, S is called a commutative ring. If S contains a multiplicative identity, denoted 1, then S is called a ring with
unity. A nonzero element ‘a’ in a ring S with 1 is called a unit if there exists b ∈ S
such that a.b = b.a = 1. A commutative ring with 1 in which every nonzero element is
a unit is called a field. It is known that a finite field with q elements exists if and only
if q is a prime power. A finite field having q elements is unique up to isomorphism,
called the Galois field, denoted GF (q).
Let q be a positive integer. The set Zq of all equivalent classes of integers modulo
q, with respect to addition and multiplication modulo q, forms a commutative ring
with unity. If p is a prime and s is a positive integer then the set of all units in Zps is
5
6
the set U = {ap + b|0 ≤ a ≤ p(s−1) − 1, 1 ≤ b ≤ p − 1}. The set of zero divisors in Zps
is given by Z = {ap|0 ≤ a ≤ ps−1 − 1}.
Let S be a commutative ring with unity. An abelian group < M, + > is called a
left S-module if there exists a function µ : S × M → M denoted by µ(α, a) satisfying
(i) µ(α, a + b) = µ(α, a) + µ(α, b), (ii) µ(αβ, a) = µ(α, µ(β, a)), (iii) µ(α + β, a) =
µ(α, a) + µ(β, a), (iv) µ(1, a) = a. ∀α, β ∈ S and a, b ∈ M. The set S n = {x =
(x1 , x2 , . . . , xn )|xi ∈ S} is a left S-module.
A subset B of M is a generating set for M if every element of M is a finite
linear combination of elements in B over S. B is called a basis for M if the above
representation is unique for each element of M. A module which admits a basis is
called a free module. If S is a field then a left S-module V is called a vector space.
It is well known that every vector space has a basis. Moreover, if V has a finite basis
then any two bases for V have the same number of elements. In such a case, if |B| = n,
then V is called an n-dimensional vector space and we write, dim V = n. If S is a field
then S n is an n-dimensional vector space over the field S.
Let Fq be a set of q-alphabets. A code C of length n and size M is a subset of Fnq
having M elements. The elements of C are called codewords. In order to be able to
correct errors, if any, arising out of noise one would like to have some algebraic structure
attached to the set Fq of alphabets. If q is a prime power one usually takes Fq to be
GF (q) and otherwise Fq = Zq . Let Fq = GF (q)( Zq ) and let C ⊆ Fnq . If C is a subspace
(submodule) of Fnq then C is called a linear code over Fq . In case Fq = GF (2)(GF (3))
then C is called a binary (ternary) code.
Let x, y ∈ Fnq . The number of nonzero components in x is called the Hamming weight
of x, denoted wH (x). Hamming distance dH (x, y) between x and y is the number of
coordinates in which they differ. Note that for x, y ∈ C, dH (x, y) = wH (x − y). Let
dH = min{dH (x, y) : x, y ∈ C, x 6= y}. dH is called the minimum Hamming distance
7
of C. A code C with minimum Hamming distance dH can correct up to ⌊ (dH2−1) ⌋ errors
using nearest neighborhood decoding. Almost all codes in classical coding theory are
defined for the Hamming distance. Hamming distance codes are ideal for the balanced
channel in which error probability of each symbol is same. In 1958, C. Y. Lee, defined
Lee distance which is suitable for memory less, discrete and symmetric channels[75].
Another useful distance is the Euclidean distance. The Lee (Euclidean) weight of an
element a ∈ Zq is given by wL(a) = min {a, q − a} (wE (a) = (wL (a))2 ). The Lee
(Euclidean) weight of a vector x ∈ Zqn is the sum of the Lee (Euclidean) weights of its
components. For x, y ∈ Zqn , dL (x, y) = wL (x − y)(dE (x, y) = wE (x − y)) is called the
Lee (Euclidean) distance between x and y. For binary codes the concept of Hamming,
Lee and Euclidean distance coincide while for ternary codes the Hamming and Lee
weight coincide. The minimum Lee (Euclidean) distance dL (dE ) of a code C is defined
analogously. The choice of distance for any code depends on the decoding procedure
and the channel under consideration.
Let Fq = GF (q)( Zq ) and let C ⊆ Fnq . If C has M codewords and minimum
Hamming, Lee and Euclidean distances as dH , dL and dE respectively then C is called
an (n, M, dH , dL , dE ) code. If in addition, for Fq = GF (q), C is linear and dim C = k
then C is called an [n, k, dH , dL, dE ] or simply an [n, k] code if we do not wish to specify
distances. Any [n, k] linear code C, being a subspace can be specified either by a k × n
generator matrix G (rows of G form a basis for C) or by an (n − k) × n full rank matrix
H (called parity-check matrix) whose solution space is C. Therefore, C must contain a
codeword of Hamming weight n − k + 1 and hence
dH ≤ n − k + 1.
(2.1)
This bound is called the Singleton bound for Hamming distance. For given k and dH the
minimum value of n for which there exists an [n, k, dH ] code is denoted
by nq (k, dH ).
& '
In 1965 Solomon and Stiffler[105] have shown that nq (k, dH ) ≥
Pk−1
i=0
dH
qi
≡ gq (k, dH ).
8
The binary version of this was first proved by Griesmer in 1960[49]. A code meeting
this bound is called a Griesmer code. An [nq (k, dH ), k, dH ] code is called an optimum
code.
In 1991, V. K. Wei introduced the notion of Generalized Hamming weights for
binary linear codes[115]. This was later extended to linear codes over GF (q) by Klove
et al[72] and to linear codes over Z4 by Ashikhmin[1]. It has been further studied by
many researchers[60],[72],[59],[61],[22],[73]. Let C be an [n, k] linear code over GF (q)
and let 1 ≤ r ≤ k. The r-th Generalized Hamming weight(GHW) , dr (C), of C is defined
by
dr (C) = min{wS (D) | D is an [n, r] subcode of C},
where wS (D), called the support size of D, is the number of coordinates in which some
codeword of D has a nonzero entry. The set {d1 (C), d2 (C), . . . , dk (C)} is called the
weight hierarchy of C. The following theorem summarizes some of the basic properties
of the weight hierarchy of C.
Theorem 2.1 Let C be an [n, k] linear code over GF (q). Then
1. (Monotonicity):1 ≤ d1 (C) < d2 (C) < · · · < dk (C) ≤ n
2. (Generalized Singleton Bound):
dr (C) ≤ n − k + r; for 1 ≤ r ≤ k (r=1 yields (2.1)).
3. (Duality): {dr (C) : 1 ≤ r ≤ k} = {1, 2, . . . , n}\{n + 1 − dr (C ⊥ ) : 1 ≤ r ≤ n − k}
In[60], Helleseth, Klove, Levenshtein and Ytrehus have proved the following lemma
connecting the Hamming weight distribution and support size of any linear code C.
Lemma 2.2 If D is an [n, r] linear code over GF (q) then
X
c∈D
wH (c) = q r−1 (q − 1)wS (D).
9
Thus, an alternative definition of dr (C) is given by
X
1
wH (d) : Dr is an [n, r] subcode of C .
dr (C) = r−1
min
q (q − 1)
d∈Dr
In another paper[116], Wei and Yang have introduced the concept of chain condition
for studying the weight hierarchies of linear codes. A linear code C is said to satisfy
the chain condition if there exists a chain
D 1 ⊆ D2 ⊆ · · · ⊆ D k ,
of subcodes of C satisfying wS (Dr ) = dr (C), 1 ≤ r ≤ k. It is known that almost all good
codes over GF (q) satisfy the chain condition[31],[23],[32],[24]. The weight hierarchies
of linear codes over finite fields play an important role in Cryptography, for example,
Wire-Tap Channel-II (WTC-II)[84]. For various other applications see[67],[56],[115]
etc. In[2], Ashikhmin has shown that Octacode code over Z4 is better (from the point
of view of GHW) than any optimal linear code over GF (4) of the same length and
cardinality.
Let x, y ∈ Fnq . The standard inner product of x and y is the scalar < x, y >=
Pn
i=1
xi yi in Fq . The subset C ⊥ = {x ∈ Fnq | < x, c >= 0, ∀c ∈ C} is called the dual code
⊥
of C. It is easy to verify that |C||C ⊥ | = |Fnq | and C ⊥ = C. If C is an [n, k] linear code
over a field then C ⊥ is an [n, n − k] linear code. Moreover, G is a generator matrix of
C if and only if, G is a parity-check matrix of C ⊥ . If C = C ⊥ (C ⊂ C ⊥ ) then C is called
a self-dual (self orthogonal or weakly self dual) code. A self dual linear code C over a
field must have even length. However this need not be true for codes over Z4 . In[87]
Pless et al have constructed self dual codes of odd lengths over Z4 . A self dual code
over Zq , q even, is called a code of type II(I) if all the Euclidean weights are divisible
by 2q(q). For details on self dual codes, see the excellent survey written by Rains and
Sloane[92].
10
Two codes are said to be equivalent if one can be obtained from the other by applying
finitely many operations of the type (i) permutation of coordinates, (ii) multiplying one
or more coordinates by a unit. A mapping θ : C → C is called an automorphism of C
if θ is 1 − 1, onto and a homomorphism. The collection of all automorphisms of C is a
group called the automorphism group of C, denoted Aut(C).
For each 1 ≤ i ≤ n, let AH (i)(AL (i)) be the number of codewords of Hamming
(Lee) weight i in C. Then {AH (0), AH (1), . . . , AH (n)} ({AL (0), AL (1), . . . , AL (n)}) is
called the Hamming (Lee) weight distribution of C. The Hamming weight enumerator
(hwe) of C is a polynomial defined by
WC (x, y) or HamC (x, y) =
X
xn−wH (c) y wH (c) =
c∈C
n
X
AH (i)xn−i y i .
i=0
There is an analogous definition for nonlinear codes. Complete weight enumerator(cwe)
for a code C over Zps is defined as follows. Let m = ps −1, and let c = (c1 , c2 , . . . , cn ) ∈
C. For each j ∈ Zps , let ωj (c) = |{k : ck = j}|. Then the cwe is the polynomial
cweC (x0 , . . . , xm ) =
P
c∈C
x0 ω0 (c) x1 ω1 (c) · · · xm ωm (c) . Note that permutation equivalent
codes have the same cwe but in general two equivalent codes may have different cwe’s.
The appropriate weight enumerator for an equivalent class of codes is called a Symmetrized weight enumerator(swe). For example, the swe of a code over Z4 is the
polynomial: swe(x, y, z) = cwe(x, y, z, y). The Lee weight enumerator of C is the homogeneous polynomial of degree 2n given by LeeC (x, y) =
P
c∈C
x2n−wL (c) y wL(c) . The
Hamming weight enumerators of code C and C ⊥ are connected by the identity
HamC ⊥ =
1
HamC (x + y, x − y)
|C|
(2.2)
called the MacWilliams identities. Similar identities have been obtained for codes over
rings[92]. The following analogue of (2.2) holds for codes over Z4 .
sweC ⊥ (x, y, z) =
LeeC ⊥ (x, y) =
1
sweC (x
|C|
1
LeeC (x
|C|
HamC ⊥ (x, y) =
+ 2y + z, x − z, x − 2y + z).
+ y, x − y).
1
HamC (x
|C|
+ 3y, x − y).
11
2.2
Classical Codes over GF (q)
Let Fq = GF (q) = {0, 1, α3 , . . . , αq }. For a given k and q, let Gk (q) be a
k × (q k − 1)/(q − 1) matrix over Fq in which any two columns are linearly independent.
The code Sk (q) generated by the matrix Gk (q) is called the Simplex code. Note that
i
h
Sk (q) is a (q k − 1)/(q − 1), k, q k−1 code. It is known that any linear code with the
above parameters is equivalent to Sk (q)[40]. Gk (q) can be defined inductively by
G2 (q) =
and
Gk (q) =
00 · · · 0
0 1 1 α3 · · · αq−1 αq
1 0 1
1
1
11 · · · 1
···
1
1
,
α3 · · · α3 · · · αq · · · αq
Gk−1 (q) 0 Gk−1 (q) Gk−1 (q) · · ·
Gk−1 (q)
.
Every nonzero codeword of Sk (q) has weight q k−1 . The binary simplex code (usually
denoted Sk ) was first discovered by Ronald A. Fisher[35] in 1942 in connection with
statistical designs. In 1945, it was further generalized to arbitrary prime powers[36].
The dual of the Simplex code is the well known
h
q k −1 q k −1
, q−1
q−1
i
− k, 3 Hamming Code.
A nice way to construct new codes is by puncturing or appending one or more
coordinates of a known code. Let 1 ≤ u ≤ k − 1 and let Gk,u (q) be the matrix obtained
from Gk (q) by deleting columns corresponding to the columns of the matrix Gu (q), i.e,
Gk,u (q) =
where 0 is a (k − u) ×
q u −1
q−1
Gk (q) \
0
Gu (q)
,
zero matrix and [A\B] denotes the matrix obtained from
the matrix A by deleting the columns of the matrix B. The code Mk,u (q) generated
by the matrix Gk,u (q) is the punctured code of Sk (q) and is called a MacDonald code.
Mk,u (q) is a
h
q k −q u
, k, q k−1
q−1
i
− q u−1 code in which every nonzero codeword has weight
either q k−1 or q k−1 − q u−1 [77].
12
h
In 1954, I. S. Reed and R. Müller constructed a 2m ,
Pr
i=0
m
i
i
, 2m−r binary lin-
ear code, denoted RM(r, m), called the r th -order Reed Müller code for all m ≥ 0,
0 ≤ r ≤ m. If G(r, m) is a generator matrix for RM(r, m) then
G(r + 1, m + 1) =
G(r + 1, m) G(r + 1, m)
0
G(r, m)
is a generator matrix for RM(r + 1, m + 1). Further RM(r, m)⊥ = RM(m − r − 1, m).
Let A(n, dH ) = max{M| there exists a binary (n, M, dH ) code}. It is known that
A(16, 6) ≤ 28 = 256. Hence a question arose whether there exists a (16, 256, 6) code
or not? In[83], Nordstrom constructed a (16, 256, 6) nonlinear code popularly known
as Nordstrom Robinson code. In 1968, Preparata generalized this by constructing a
m −2m)
(2m , 2(2
, 6) binary nonlinear code, P (m), called Preparata code for m even and
m ≥ 4 [89]. Another construction of a 2m , 22m , 2m−1 − 2(m−2)/2
binary nonlinear
code K(m), called Kerdock code for m even and m ≥ 4 was given by Kerdock in
1972 [70]. For m = 4, P (4) = K(4). Further nonlinear generalizations were later found
by Goethals, Delsarte and Hergert[28],[42],[43],[62].
2.3
Codes over Integer Residue Rings
Codes over Zq have various applications including phase modulated channels[6],[81],
multifrequency phase telegraphy[82], multilevel quantized pulse amplitude modulated
channels[6], multilevel transmission system[80], multiplexing in multiaccess communication system[109], multichannel communication[109]etc. By Chinese Remainder theorem, the study of codes over Zq can be reduced to the study of codes over Zps . Many
different kind of codes over Zq have been constructed in seventies by Blake[7],[8],
Spigel(1977)[106], Priti Shankar (1979)[100] etc. In early eighties not much attention
was paid to such codes[114]. This is partly due to the difficulties arising due to the presence of zero divisors in Zps . In 1989, P. Solé[104] discovered a family of nearly optimal
13
four-phase sequences of period 22r+1 − 1 with alphabet 1, i, −1, −i, where i =
√
−1.
This was also found independently by Boztas, Hammons and Kumar in 1990 [13]. The
above family may be viewed as a linear code over Z4 by identifying the alphabet ia
by its exponent a. When studying these four-phase sequences, Hammons and Kumar
and later independently Calderbank, Sloane and Solé noticed the resemblance between
the 2-base expansion of the quaternary codewords and the standard construction of
the Kerdock codes. Thus they realized that the Kerdock code is simply the image of
a linear code over Z4 under a suitable map. In October 1992, in a DIMACS/IEEE
workshop M. D. Trott, acting on a suggestion by Forney proved that the NordstromRobinson (NR) code is the binary image of a linear code over Z4 , called Octacode[38].
However, this was already known to Hammons and Kumar in June 1992 [13]. After
realizing that they are working on the same problem they formed a group. Combined
efforts of the group lead to an award winning paper[53] in which they could map various good nonlinear binary families of codes to some linear codes over Z4 . They have
shown that Kerdock and Preparata codes are actually dual to each other when viewed
as a linear code over Z4 . They observed that ( Z4n , Lee distance) and ( Z22n , Hamming distance) are isometric to each other and hence obtained the explanation for the
m
mysterious connection |P (m)||K(m)| = 22 .
The mapping φ : Z4 → Z22 defined by φ(0) = 00, φ(1) = 01, φ(2) = 11 and
φ(3) = 10 is called the Gray map. It is extended from Z4n → Z22n by applying φ
to each coordinate and is popularly known as Gray map. It was used by F. Gray to
avoid large errors in transmitting signals by pulse code modulation (PCM) in 1940’s.
Clearly, Gray map is distance preserving[53].
If C is a linear code over Z4 then φ(C) will denote the image of C under the Gray
map. C is called Z2 -Linear if φ(C) is a binary linear code. A binary code is said to be
Z4 -linear if it is equivalent to φ(C) for some linear code C over Z4 . A necessary and
14
sufficient conditions for Z4 -linearity ( Z2 -linearity) is given by the following Theorem.
Theorem 2.3 Hammons et al[53]
1. A binary linear code C of even length is Z4 -linear if and only if its coordinates
can be permuted so that
u, v ∈ C ⇒ (u + σ(u)) ⋆ (v + σ(v)) ∈ C
(2.3)
where σ is the swap map that interchanges the left and the right halfs of a vector
and ⋆ denotes the componentwise product of two vectors.
2. For each a ∈ Z4 , let ā be the reduction of a modulo 2 and let C be a linear
code over Z4 , then C is Z2 -linear if and only if c = (c1 , . . . , cn ) and c′ =
(c′1 , . . . , c′n ) ∈ C implies 2c̄ ⋆ c̄′ = (2c¯1 c¯1 ′ , . . . , 2c¯n c¯n ′ ) ∈ C.
It is known that the r th order binary Reed Müller code R(r, m) is Z4 -linear for r =
0, 1, 2, m − 1 and m[53] and is not Z4 - linear for other values of r[63]. The Golay code
and the extended Hamming code of length n = 2m (m ≥ 5) are not Z4 -linear[53].
Let h2 (x) ∈ Z2 [x] be an irreducible polynomial over Z2 such that h2 (x)|(xn −1) over
Z2 . Then Hensel lemma ( see[78]) guarantees the existence of a polynomial h(x) ∈ Z4 [x]
such that (i) h(x) ≡ h2 (x) (mod 2), (ii) h(x)|(xn − 1) over Z4 . This polynomial h(x)
can be obtained, for example, by Graffe’s method, called the Hensel uplift of h2 (x)[11].
In[53], Hammons et al have shown that the gray image of the Hensel uplift of the first
order Reed Müller code R(1, m) is the Kerdock code and the Gray image of the Hensel
uplift of the extended Hamming code is Preparata code (differ slightly from classical
Preparata code but shares the same distance structure). Thus these nonlinear codes
are extended cyclic codes over Z4 . This process of Hensel uplifts can be continued till
Z2s or in general up to the ring of 2-adic integers.
The classical Theory of cyclic codes over finite fields was extended to cyclic codes
over Z4 by Pless and Quian[88] and over Zps by Pramod Kanwar and Permouth[68].
15
Some basic theorems giving the structure of cyclic codes of length n over Zps and over
the p-adic numbers was considered by Calderbank and Sloane[15]. A generalization of
McEliece theorem that characterizes the possible Hamming weights of a binary cyclic
code was given by Calderbank, Li and Poonen[17].
2.4
Codes over Zps
Let C be a linear code of length n over Zps . Then C is a finite abelian group of type
psk0 p(s−1)k1 · · · pks−1 with
Ps
i=0
ki = n and ki (0 ≤ i ≤ s) are nonnegative integers[15].
Using this Calderbank and Sloane[15] have shown that C has a generator matrix G
(rows of G generate C) of the form
G=
where Aij
Ik0
0
A01
···
A0s−1
A0s
pIk1 pA12 · · ·
pA1s−1
pA1s
p2 Ik2 · · ·
..
..
.
.
p2 A2s−1
..
.
p2 A2s
..
.
0
..
.
0
..
.
0
0
are matrices over
blocks of size k0 ,
|C| = (ps )
Ps−1
i=0
ki
k1 ,
··· ,
A02
· · · ps−1 Iks−1 ps−1 As−1s
0
ks−1 ,
k
is a free module if and only if ki = 0
ks . Let k
ks−1
=
Ps−1
i=0 (s
H=
(2.4)
− i)ki .
which is equal to pk .
for all
···
B0s
B0s−1
pB1s
..
.
pB1s−1 · · · pIks−1
..
..
..
.
.
.
ps−1 Bs−1s ps−1 Ik1 · · ·
Then
Note that C
i = 1, 2, · · · , s − 1. It is easy to
see that a generator matrix for C ⊥ is of the form
,
and the columns are grouped into
Zps
/ 1k0 pk1 (p2 ) 2 · · · (ps−1 )
B01
0
Iks
0
..
.
0
,
where Bij are matrices over Zps and the columns are grouped into blocks of size
ks , ks−1, · · · , k1 . Therefore |C ⊥ | = (ps )
Ps−1
i=0
ki
/ 1ks pks−1 (p2 )
ks−2
· · · (ps−1 )
k1
= psn−k .
16
Note that sn − k =
2.4.1
Ps
i=1
iki .
p-dimension of Linear Codes over Zps
The presence of zero divisors in Zps creates problem in defining linear dependence of
vectors in Zpns . For example, the following two statements are equivalent for a subset
D of a vector space over a field.
1. A nontrivial linear combination of vectors in D is zero.
2. One of the vector in D is a linear combination of some other vectors of D.
However, these are not equivalent for modules over Zps . For example, the subset
D = {(1, 2), (1, 0)} of Z42 satisfies 1 but not 2. Also, note that the module generated
by (2,0) and (0,2) over Z4 are properly contained in the module generated by (1,0)
and (0,1). Consequently, defining the dimension of a module as a cardinality of its
basis is not meaningful. Recently, while studying Trellis description of linear codes
over Zps Vazirani, Saran and Sundar Rajan[112] have introduced the following notion
of p-dimension for finitely generated modules over Zps .
A vector v ∈ Zpns is a p-linear combination of the vectors v1 , v2 , · · · , vk if v =
Pk
i=1
λi vi with λi ∈ Zp ; 1 ≤ i ≤ k. Let D = {v1 , v2 , · · · , vk } be an ordered subset
of Zpns . Then p-span of D is the set
nP
k
i=1
o
ai vi : ai ∈ Zp . D is called a p-generating
sequence if for each i = 1, 2, · · · , k − 1, pvi is a p-linear combination of vi+1 , ..., vk and
pvk = 0. If in addition, 0 is a nontrivial p-linear combination of v1 , v2 , · · · , vk then D
is called p-linearly dependent. A subset B of C is a p-basis for the linear code C over
Zps if B is p-linearly independent and C is the p-span of B. The number of vectors in
any two p-bases for C is same and is called p-dimension of C, denoted p−dim(C). The
following theorem summarizes results for a p-basis.
Theorem 2.4 [112]
17
1. Every module over Zps admits a p-basis.
2. p−dim Zpns = sn.
3. B is a p-basis for C if and only if every vector in C is a unique p-linear combination
of vectors in B.
Let C be the linear code generated by the matrix B given in (2.4) and B be the matrix
Ik0
pIk0
..
.
s−1
p
Ik0
0
0
..
.
B=
0
0
0
..
.
0
..
.
0
A01
A02
···
A0s−1
A0s
pA01
..
.
pA02
..
.
···
..
.
pA0s−1
..
.
pA0s
..
.
ps−1 A0s−1
ps−1 A0s
ps−1 A01 ps−1 A02 · · ·
pIk1
pA12
···
pA1s−1
pA1s
p2 Ik1
..
.
p2 A12
..
.
···
..
.
p2 A1s−1
..
.
p2 A1s
..
.
ps−1 A1s−1
ps−1 A1s
ps−1 Ik1
ps−1 A12 · · ·
0
p2 Ik2
···
···
p2 A2s
0
..
.
p3 Ik2
..
.
···
..
.
···
..
.
p3 A2s
..
.
0
..
.
ps−1 Ik2
..
.
···
..
.
···
..
.
ps−1 A2s
..
.
0
0
···
ps−1 Iks−1
ps−1 As−1s
.
(2.5)
Then for an appropriate permutation matrix P it is easy to see that rows of P B
form a p-basis for the code generated by B. Hence p −dim(C) = k =
Ps−1
i=0 (s
− i)ki .
Note that, for an [n, k] linear code C over Zps , the dual code C ⊥ is an [n, sn − k] linear
code. The p-span of the vectors v1 , . . . , vk will be denoted by < v1 , . . . , vk > .
18
2.4.2
Generalized Gray Map
It was observed in section 2.3 that the image of the linear code over Z4 under the
Gray map is a binary code of twice the length and whose minimum Hamming distance
is same as the minimum Lee distance of C. Thus, it is natural to ask: Does there exist
a generalized gray map which maps a linear code over Zps to a code over Zp having
similar properties? Unfortunately, no such generalization is known. Infact, recently,
Ana Sălăgean- Mandache[98] has shown that except for the well-known case p = s = 2,
it is not possible to construct a weight function on Zps for which Zps is isometric to
Zps with the Hamming metric. In[19], C. Carlet has defined a generalized gray map φG
s−1
from Z2s to Z22
and has obtained the Z2s version of Kerdock and Delsarte-Goethals
codes.
Let s be a positive integer and let Es be the s × 2s matrix whose columns consist
of binary representation of numbers 0, 1, 2, · · · , 2s − 1 (elements of Z2s ). Thus Es can
be inductively defined by
Es =
Es−1
Es−1
00 . . . 0 11 . . . 1
,
with E1 = [01].
Let s > 1 and let u ∈ Z2s , 0 ≤ u < 2s . Let u =
Ps
i=1
(2.6)
ui 2i−1 (ui = 0 or 1) and let
s−1
Es−1 = [yij ]; 1 ≤ i ≤ s − 1, 0 ≤ j ≤ 2s−1 − 1. Define a map φG : Z2s 7→ Z22
by
φG (u) = (x0 , x1 , . . . , x2s−1 −1 ); where
xj = us +
s−1
X
i=1
ui yij ∈ Z2 .
(2.7)
Note that φG is a mapping from Z2s onto the Reed Müller code of order 1 and length
2s−1 . φG can also be defined as a Boolean function φG (u) evaluated on GF (2s−1 ) by :
φG (u) : (y1 , y2 , · · · , ys−1) 7→ us +
s−1
X
ui yi .
i=1
φG is a mapping from Z2s onto the Reed Müller code of order 1 and length 2s−1 .
19
Note that this map is distance preserving[19]. For s = 3 this is a well understood
generalization of the gray map but for s > 3 still several things need to be investigated.
Note that Es−1 is the generator matrix of the extended binary simplex code of
dimension s − 1. Thus weight of any row will be 2s−2 . Hence corresponding to entries
1, 2, 22, · · · , 2s−2 of Z2s , φG (u) will have weight 2s−2 and the weight of φG (2s−1 ) will
be 2s−1 (see (2.6) and (2.7)). Now all other nonzero elements of Z2s will also give the
weight 2s−2 since the weight of other entries corresponds to some linear combination
of rows of Es−1 . Thus, for u 6= 0, we have
wt(φG (u)) =
2s−2, u 6= 2s−1
(2.8)
2s−1, u = 2s−1 .
We call this weight the Generalized Lee weight of u and is denoted by wGL (u).
Also, we have the matrix
φG (1)
φ (2)
G
φG (22 )
Gs (say) =
..
.
φ (2s−2 )
G
φG (2s−1 )
=
0101 0101 0101 0101 · · ·
0011
0000
.
.
.
0000
0011 0011 0011 · · ·
1111 0000 1111 · · ·
..
..
..
..
.
.
.
.
···
0000
···
···
1111 1111 1111 1111 · · ·
0101 0101 0101
0011 0011 0011
1111 0000
..
..
.
.
1111
···
1111
.
..
.
(2.9)
1111
1111 1111 1111
Also, let Gs−i denote the matrix obtained from Gs by dropping first i rows. Note that
φG can be naturally extended to Z2ns by applying φG to its components.
Definition 2.1 A binary code is called Z2s -linear if it is equivalent to φG (C) for some
linear code C over Z2s .
A necessary and sufficient condition for the Z23 -linearity is given in[19]. It is also shown
that any Z2s -linear code is distance invariant and dH (φG (u), φG (v)) = wGL (u − v)[19].
The minimum generalized Lee weight, dGL , of C can be defined in the usual sense. Note
also that for s = 2, dGL = dL . The following Lemma is useful in Sections 3.3 and 4.2.1.
20
Lemma 2.5 For p = 2, the images of the rows of the matrix B given by (2.5) under
the generalized gray map φG are linearly independent over Z2 .
Proof:
Applying the generalized gray map φG to the rows of B with a suitable
arrangements of rows yields a binary matrix of the type
Gs
0
..
0
0
Gs
0
0
0
Gs−1
0
0
0
0
..
0
..
.
0
..
.
0
..
.
0
..
.
0
..
.
0
0
0
0
0
0
0
G2
0
0
0
0
0
0
0
0
..
0
0
0
0
0
0
0
0
0
G2
0
0
0
0
0
0
0
0
0
0
.
.
Gs−1
..
..
.
.
.
G1 ∗
,
where Gs and Gs−i are as defined in (2.9) and ∗ is some block. It is easy to see that
the rows of the above matrix are linearly independent.
Remark 2.1 Lemma 2.5 implies that the transform of a 2-basis of C under the generalized gray map gives rise to linearly independent over Z2 . The converse of this need not
be true, in general, For example, If s = 2, then {101100,011100} are Z2 -independent
but {320,120} are not.
A linear code C over Z2s of length n, 2-dimension k, minimum Hamming distance
dH , minimum Lee distance dL and minimum Generalized Lee distance dGL is called
an [n, k, dH , dL , dGL] code or simply an [n, k] code. C is called Z2 -linear if φG (C) is a
21
binary linear code. Thus, if C is an [n, k, dH , dL, dGL ] Z2 -linear code then φG (C) is a
binary linear code of length 2s−1 n, dimension k and minimum Hamming distance dGL .
Hence, by the Griesmer bound for binary linear codes[79], we have
&
&
X dGL
1 k−1
n ≥ s−1
2
2i
i=0
2.4.3
''
.
(2.10)
Generalized Hamming weights of Linear codes over Zps
Let C be an [n, k] linear code over
Zps . The definitions of Generalized Hamming
weight (GHW), weight hierarchies and chain condition given in section 2.1 for linear
codes over GF (q) can be extended in a similar fashion for linear codes over Zps .
The only difference is that we replace dimension by p-dimension everywhere. Thus for
1 ≤ r ≤ k, the r th generalized hamming weight of C is defined as dr (C) = min{wS (Dr ) :
Dr is an [n, r] subcode of C}, where wS (Dr ) is the support size of a subcode Dr of C
with p−dim(Dr ) = r.
The following theorem summarizes basic properties of GHW[2].
Theorem 2.6 Let C be an [n, k] linear code over Zps . Then
1. (Monotonicity): 1 ≤ d1 (C) ≤ d2 (C) ≤ · · · ≤ dk (C) ≤ n and if, dr (C) = dr+1 (C) =
· · · = dr+s−1(C), then dr+s−1(C) < dr+s (C).
2. (Duality): {dr (C) : 1 ≤ r ≤ k} = {1, · · · , 1, 2, · · · , 2, . . . , n, · · · , n}\{n + 1 −
dr (C ⊥ ) : 1 ≤ r ≤ sn − k}
|
{z
s
} |
{z
s
}
|
{z
For p = 2, the following Lemma is a generalization of Lemma 2.2.
Lemma 2.7 If D is an [n, r] linear code over Z2s then
1.
2.
P
P
c∈D
wL (c) = 2r+s−2wS (D),
c∈D
wGL (c) = 2r+s−2wS (D).
s
}
22
Proof:
Consider the (2r × n) array of all codewords in D. Let 0 ≤ m ≤ s and
let nm−1 be the number of columns that contain the entries 0, 1 · 2s−m, 2 · 2s−m ,
3 · 2s−m , · · · , (2m − 1) · 2s−m equally often. Then
X
wL (c) =
m=1
c∈D
=
s
X
s
X
m=1
r
nm−1
2
2m
Ps
m=1
nm−1 = wS (D) and hence
(2m −1)
X
t=0
wL (t · 2s−m )
(2.11)
nm−1 2r−m (2s+m−2 ) = 2r+s−2 · wS (D)
as
wL (t · 2
s−m
)=
t · 2s−m ,
t 6= 2m−1
2s−1 ,
otherwise.
This proves 1. Proof of 2 follows using (2.8) and an equation similar to the equation
(2.11).
Remark 2.2 For s = 2, above Lemma was first proved by K. Yang et al (cf.[117]).
Corollary 2.8 (Plotkin-type Bound) Let C be an [n, k, dL , dGL] linear code over Z2s .
Then dL ≤ n · 2s−1 and dGL ≤ n · 2s−1 .
Proof:
n·
2k+s−2
(2k−1 )
By Lemma 2.7, the average Lee weight of the codewords will be
≥ dL .
The proof of the following Corollary follows immediately by Lemma 2.7.
Corollary 2.9 If 1 ≤ r ≤ k, then r th GHW of C satisfies
&
'
&
'
(2r − 1)dL
(2r − 1)dGL
dr (C) ≥
,
and
d
(C)
≥
.
r
2r+s−2
2r+s−2
Remark 2.3 In view of Lemma 2.7, GHW can be defined alternately as
dr (C) =
1
2r+s−2
min
X
d∈Dr
wL (d) : Dr is an [n,r] subcode of C
for 1 ≤ r ≤ k.
23
Similar definition hold for wGL . If r = 1, we get the following corollary from Lemma
2.7. In[93](see also[25]), Rains has proved that for a linear code over Z4 , dH ≥ ⌈ d2L ⌉.
The following corollary generalizes it.
Corollary 2.10 Let C be a Linear code over Z2s , then
'
&
&
'
dGL
and dH ≥ s−1 .
2
dL
dH ≥ s−1 ,
2
A linear code over C over Z2s is said to be of type α (β) if
&
dGL
dH = s−1
2
2.4.4
'
&
dGL
dH > s−1
2
'!
.
Codes over Z4
Codes over Z4 have been studied extensively (cf.[103],[113] etc.). In this section we
collect some basic definitions specific to these codes and some further results.
A linear code C over Z4 has a generator matrix G of the form
A
Ik0
G=
0
2Ik1
B1 + 2B2
,
2C
where A, B1 , B2 and C are matrices with entries 0 and 1 and Ik is the identity matrix of
order k. One can associate two binary linear codes with C as follows. The residue code
, C (1) of C is given by C (1) = {(c¯1 , c¯2 , . . . , c¯n ) : (c1 , c2 , . . . , cn ) ∈ C} where c¯i denotes the
reduction of ci modulo 2. Another binary linear code C (2) , called the torsion code of C
is given by
C
(2)
=
c
: c = (c1 , . . . , cn ) ∈ C and ci ≡ 0
2
(mod 2) f or 1 ≤ i ≤ n .
If k1 = 0 then C (1) = C (2) . The generator matrices of these codes are given by G(1) and
G(2) , respectively, where
G(1) =
Ik0 A B1
Ik0
and G(2) =
0
A
Ik1
B1
C
.
24
⊥
If C is self orthogonal then C (1) is doubly even and C (1) ⊂ C (2) ⊂ C (1) and if C is self
⊥
dual then C (2) = C (1) [26].
Let c = (c1 , c2 , . . . , cn ) ∈ C. The Correlation of c is defined by θ(c) = (ω0 (c) −
√
ω2 (c)) + i(ω1 (c) − ω3 (c)); where i = −1 and ωj (c) = |{k : ck = j}| [104].
If d1 , d2 , . . . , dk is the weight hierarchy of an [n, k, dH , dL ] linear code C over Z4 then
for s = 2, and p = 2 by Theorem 2.6 and Corollary 2.10,
Hence n −
dL
2
≥
k−1
.
2
dL
2
≤ d1 < d3 < · · · < dk ≤ n.
Thus we get the following corollary.
Corollary 2.11 For any [n, k, dH , dL] linear code over Z4 , n ≥
l
dL +k−1
2
m
.
If C is Z2 -linear then the following proposition gives another lower bound, though
not tight for type β code of C.
Proposition 2.1 Let C be a Z2 -linear code over Z4 . Then
&
&
X dL
1 r−1
dr (C) ≥
2 i=0 2i
Proof:
''
.
Follows easily using inequality (2.10).
The following upper bound on the weight hierarchy of a linear code C follows from
Theorem 2.6 for s = 2.
Proposition 2.2
1. dr (C) ≥ n −
2. dr (C) ≥ n −
(k−r−1)
; (k
2
3. dr (C) ≥ n −
(k−r−2)
; (k, r
2
(k−r)
; (k, r
2
even ).
even , r odd or k odd, r even ).
odd ).
Chapter 3
Z4-Simplex Codes and their Gray
Images
The binary Gray code is fun,
For in it strange things can be done,
Fifteen, as you know,
Is one,oh,oh,oh,
And ten is one,one,one, and one. . . . Anon
3.1
Introduction
In this chapter, we introduce simplex codes of types α and β over Z4 . These are generalizations of binary simplex codes in many ways. The torsion/reduction codes of these
families are equivalent to several copies of binary simplex codes. Basic properties of
these codes are determined in section 1. The gray images of these codes are constructed
in two ways in section 2. It is shown that these families satisfy the chain condition.
Generalization of these codes to codes over Z2s is done in the next chapter.
25
26
3.2
Z4-Simplex Codes of Type α and β
Let Gk be a k × 22k matrix over Z4 defined inductively by
Gk =
00 · · · 0 11 · · · 1 22 · · · 2 33 · · · 3
Gk−1
Gk−1
Gk−1
(3.1)
Gk−1
with G1 =[0123]. Note that columns of Gk consist of all distinct k-tuples over Z4 .
Clearly, the code Skα generated by Gk has length 22k and 2-dimension 2k. The following
observations are useful in determining Hamming and Lee weights of Skα .
α
Remark 3.1 If Ak−1 denotes an array of codewords in Sk−1
and if i = (iii...i) then
an array of all codewords of Skα is given by
Ak−1
Ak−1
Ak−1
Ak−1
Ak−1 1 + Ak−1 2 + Ak−1 3 + Ak−1
Ak−1 2 + Ak−1
Ak−1
2 + Ak−1
Ak−1 3 + Ak−1 2 + Ak−1 1 + Ak−1
.
Remark 3.2 If R1 , R2 , ..., Rk denote the rows of the matrix Gk then wH (Ri ) =
3 · 22k−2 , wH (2Ri ) = 22k−1 and wL (Ri ) = 22k = wL (2Ri ).
It may be observed that each element of Z4 occurs equally often in every row of
Gk . In fact we have the following lemma.
Lemma 3.1 Let c(6= 0) ∈ Skα . If one of the coordinates of c is a unit then every
element of Z4 occurs 4k−1 times as a coordinate of c. Otherwise wH (c) = 22k−1 .
Proof:
y1 =
α
By Remark 3.1, any x ∈ Sk−1
gives rise to following four codewords of Skα
x x x x
,
y2 =
x 1+x 2+x 3+x
,
27
y3 =
x 2+x x 2+x
and y4 =
x 3+x 2+x 1+x
Hence by induction, the assertion follows.
.
Let G(Sk ) (columns consist of all nonzero binary k-tuples) be a generator matrix
for an [n, k] binary simplex code Sk . Then the extended binary simplex code Sˆk is
generated by the matrix
G(Sˆk ) =
0 G(Sk )
.
Inductively,
G(Sˆk ) =
00 . . . 0
11 . . . 1
ˆ ) G(Sk−1
ˆ )
G(Sk−1
with G(Sˆ1 ) = [0 1] .
(3.2)
Lemma 3.2 Torsion code of Skα is equivalent to the 2k copies of Sˆk .
Proof:
Recall that torsion code of Skα is the set of codewords obtained by replacing
2 by 1 in all 2-linear combination of the rows of the matrix 2Gk where Gk is defined in
(3.1). The proof is by induction on k. It is easy to see that the result holds for k = 2.
ˆ ) then the matrix 2Gk
If 2Gk−1 is permutation equivalent to the 2k−1 copies of 2G(Sk−1
takes the form
"
00 · · · 0
22 · · · 2
00 · · · 0
ˆ ) · · · 2G(Sk−1
ˆ )
2G(Sk−1
ˆ ) · · · 2G(Sk−1
ˆ )
2G(Sk−1
ˆ ) · · · 2G(Sk−1
ˆ )
2G(Sk−1
22 · · · 2
ˆ ) ···
2G(Sk−1
ˆ )
2G(Sk−1
Regrouping the columns according to (3.2) (Infact, 2G(Sˆk )) gives us the desired result.
As a consequence of Lemmas 3.1 and 3.2 we determine Hamming and Lee weight
distributions of Skα .
Theorem 3.3 Hamming and Lee weight distribution of Skα are:
1. AH (0) = 1, AH (22k−1 ) = 2k − 1, and AH (3 · 22k−2 ) = 2k (2k − 1)
#
.
28
2. AL (0) = 1, AL (22k ) = 22k − 1,
Proof:
By Lemma 3.1, each nonzero codeword of Skα has Hamming weight either
3 · 4k−1 or 22k−1 and Lee weight 22k . By Lemma 3.2, the dimension of the torsion code
of Skα is k, Thus there will be 2k − 1 codewords of Hamming weight 22k−1 . Hence the
number of codewords having Hamming weight , 3 · 4k−1 , is 4k − 2k .
Remark 3.3
1. Skα is an equidistant code with respect to Lee distance whereas Sk
is an equidistant binary code with respect to Hamming distance.
2. Skα is of type α.
3. Skα is a 4-ary balanced code (see[111]).
4. The minimum Euclidean weight dE of Skα is 3 · 22k−1 .
Let S¯kα be the punctured code of Skα obtained by deleting the zero coordinate. Then
the swe (see section 2.4.4) of S¯kα is
2k−1
swe(x, y, z) = xn(k) + (2k − 1)(xz)n(k−1) z[(xz)n(k−1)+1 + 2k y 2
],
where n(k) = 4k − 1 and correlation of any c ∈ S¯kα is given by
θ(c) = −1.
(3.3)
The length of Skα is large compared to its 2-dimension and increases fast with
increment in 2-dimension. But one can always puncture some columns from Gk to
yield good codes over Z4 in the sense of having maximum possible Lee weights for a
given length and 2-dimension.
Let Gβk be the k × 2k−1(2k − 1) matrix defined inductively by
Gβ2 =
1111 0 2
0123 1 1
,
(3.4)
29
and for k > 2
Gβk =
11 · · · 1 00 · · · 0 22 · · · 2
Gk−1
Gβk−1
,
Gβk−1
(3.5)
α
where Gk−1 is the generator matrix of Sk−1
. Note that Gβk is obtained from Gk by
deleting 2k−1 (2k + 1) columns. By induction it is easy to verify that no two columns
of Gβk are multiple of each other. Let Skβ be the code generated by Gβk . Note that Skβ is
a [2k−1(2k − 1), 2k] code. To determine Hamming (Lee) weight distributions of Skβ we
first make few observations.
β
α
Remark 3.4 If Ak−1 (Bk−1) denotes an array of codewords in Sk−1
(Sk−1
) and if i =
(i, i, . . . , i) then an array of all codewords of Skβ is given by
Ak−1
Bk−1
Bk−1
1 + Ak−1 Bk−1 2 + Bk−1
2 + Ak−1 Bk−1
Bk−1
3 + Ak−1 Bk−1 2 + Bk−1
.
Remark 3.5 Each row of Gβk has Hamming weight 2k−3[3(2k − 1) + 1] and Lee weight
2k−1 (2k − 1).
Proposition 3.1 Each row of Gβk contains 22(k−1) units and ω0 = ω2 = 2k−2(2k−1 −1).
Proof:
The result can be easily verified for the k = 2. Assume that the result holds
for each row of Gβk−1 . Then the number of units in each row of Gβk−1 is 22(k−2) . By
Lemma 3.1, the number of units in any row of Gk−1 is 22k−3 . Hence the total number
of units in any row of Gβk will be 22k−3 + 2 · 22(k−2) = 22(k−1) . A similar argument holds
for the number of 0’s and 2’s.
Infact, similar to Skα , we have the following lemma
30
Lemma 3.4 Let c ∈ Skβ , c 6= 0. If one of the coordinates of c is a unit then ω1 (c) +
ω3 (c) = 22(k−1) and ω0 (c) = ω2 (c) = 2k−2(2k−1 − 1). Otherwise ω1 (c) = ω3 (c) = 0, and
ω0 (c) = 2k−1 (2k−1 − 1), ω2 (c) = 22(k−1) .
Proof:
β
α
By Remark 3.4, there exist y1 ∈ Sk−1
and y2 ∈ Sk−1
such that c can have
any of the following four forms:
c=
c=
y1 y2 y2
c=
. . . (iii) and c =
, . . . (i)
2 + y1 y2 y2
1 + y1 y2 2 + y2
, . . . (ii)
3 + y1 y2 2 + y2
. . . (iv).
We prove the result by induction on k. Clearly result holds for k = 2. So assume
β
β
that it holds for Sk−1
. Let y2 ∈ Sk−1
such that y2 is neither all zero nor all 2 codeword.
If all the components of c(6= 0) are zero divisors (Note that this can happen only in
β
the first or the third form of c). In either of these forms of c, if y2 ∈ Sk−1
then by
α
induction hypothesis ω0 (y2 ) = 2k−2 (2k−2 − 1) and ω2 (y2 ) = 22(k−2) . Since y1 ∈ Sk−1
,
by Lemma 3.1, ω0 (y1 ) = 22k−3 = ω2 (y1 ). Thus if c is of the form (i) and then ω0 (c) =
2{2k−2(2k−2 − 1)} + 22k−3 = 2k−1 (2k−1 − 1) and ω2 (c) = 2{22(k−2) } + 22k−3 = 22(k−1) so
the result holds. Similar arguments hold if c is of the form (iii). If one of the coordinate
of c is a unit then c can be of any form (i)-(iv) above. In any of these forms by Lemma
3.1 each entry in (i + y1 ); will occur equally often (= 4k−2 times). Therefore total
number of units in c will be 2 × 4k−2 + 22(k−2) + 22(k−2) = 22(k−1) Similarly, the number
of zero divisors occurs equally often 2k−2(2k−1 − 1) times. The case when y2 = 0 or 2
is trivial as codewords will be the multiple of the first row of Gβk only.
Lemma 3.5 The torsion code of Skβ is equivalent to the 2k−1 copies of the binary
simplex code Sk .
Proof:
The proof is by induction on k and is similar to that of Lemma 3.2. If 2Gβk−1
is permutation equivalent to the 2k−2 copies of 2G(Sk−1) then 2Gβk , where Gβk is given
31
by (3.5), takes the form
2Gβk =
22 · · · 2
22 · · · 2
00 · · · 0
0
2G(Sk−1) · · · 2G(Sk−1 )
2G(Sk−1) · · · 2G(Sk−1)
.
Now grouping one column from first block together with one block of 2G(Sk−1 )
from each of second and third block yields the desired result.
Again, as a consequence of Lemmas 3.4 & 3.5 one obtains Hamming and Lee weight
distributions of Skβ .
Theorem 3.6 The Hamming and Lee weight distributions of Skβ are:
1. AH (0) = 1, AH (22k−2 ) = 2k − 1, AH (2k−3 [3(2k − 1) + 1]) = 2k (2k − 1) and
2. AL (0) = 1, AL (22k−1 ) = 2k − 1, AL (2k−1(2k − 1)) = 2k (2k − 1).
Proof:
Similar to the proof of Theorem 3.3.
Remark 3.6 (i) Skβ is of type β.
(ii) The correlation of each nonzero codeword of Skβ with components 0’s or 2’s
only is −2k−1 .
(iii) The swe of Skβ is given as
k−1
swe(x, y, z) = xn(k) + (2k − 1)x2·n(k−1) z 4
k−1
+ 2 · n(k)xn(k−1) y 4
z n(k−1) ,
where n(k) = 2k−1(2k − 1).
(iv) The minimum Euclidean weight of Skβ is 2k (3 · 2k−2 − 1).
3.3
Gray Image Families
Let C be an [n, k, dH , dL] linear code over Z4 . Then φ(C), the image of C under the Gray
map φ, is a binary code having 2k codewords of length 2n, and minimum Hamming
32
distance dL. However φ(C) need not be linear. Let B be the matrix (given in (2.5) for
p = 2, s = 2) whose rows form a 2-basis for C and let φ(B) be the matrix obtained
from B by applying gray map to each entry of B. The code Cφ generated by φ(B)
is a [2n, k, ≥ ⌈ d2L ⌉] binary linear code. Note that φ(C) and Cφ have same number of
codewords but in general they are not equal. The following proposition shows that
both φ(S¯kα) and φ(Skβ ) are not linear.
Proposition 3.2 φ(S¯kα ) and φ(Skβ ) are nonlinear for all k.
Proof:
Let R1 , R2 , . . . Rk be the rows of the generator matrix Gk (Gβk ). Let c =
/ S¯kα (Skβ ).
Rk (R1 ) and let c′ = Rk−1 (Rk ) then by (3.3) ( Remark 3.6(ii) ), 2c̄ ⋆ c̄′ ∈
Hence, by Theorem 2.3, the result follows.
Remark 3.7 (i) φ(S¯kα ) is a binary nonlinear code of length 22k+1 − 2 and minimum
Hamming distance 22k . It meets the Plotkin bound[79] and n < 2dH .
(ii) φ(Skβ ) is a binary nonlinear code of length 2k (2k − 1) and minimum Hamming
distance 2k−1 (2k − 1). This is an example of a code having n = 2dH [79].
(iii) Even though, both S¯kα and Skβ are not Z2 −linear they meet the bound given by
(2.10) which is true for Z2 -linear codes.
Next two results are about the binary linear codes obtained from S¯kα and Skβ .
Theorem 3.7 Let C = S¯kα . Then Cφ is an [22k+1 − 2, 2k, 22k ] binary linear code consisting of two copies of binary simplex code S2k with Hamming weight distribution same
as the Lee weight distribution of S¯kα .
33
Proof:
By Lemma 2.5, Cφ is a binary linear code of length 22k+1 − 2 and dimension
2k. Let Gk be a generator matrix of Skα in 2-basis form. Then
Gk =
0...0 1...1 2...2 3...3
0...0 2...2 0...0 2...2
Gk−1
Gk−1
Gk−1
Gk−1
2Gk−1 2Gk−1 2Gk−1 2Gk−1
Upto the suitable rearrangement of rows, φ(Gk ) is given by
.
0000 . . . 00 0101 . . . 01 1111 . . . 11 1010 . . . 10
0000 . . . 00 1111 . . . 11 0000 . . . 00 1111 . . . 11 .
φ(Gk ) =
φ(Gk−1)
φ(Gk−1 )
φ(Gk−1 )
φ(Gk−1)
The proof now follows by induction on k. Statement trivially holds for k = 2. Assume
i
h
that φ(Gk−1 ) yields a 22k−1 , 2(k − 1), 22k−2 binary code in which every nonzero codeword is of weight 22k−2 . Then the possible nonzero weight from the lower portion of
the above matrix φ(Gk ) will be 4 · 22k−2 = 22k . From the structure of the first two rows
of φ(Gk ) it is easy to verify that any linear combination of these rows with other rows
has weight 22k . Puncturing the first two columns and rearranging the columns yields
the code having two copies of S2k .
Theorem 3.8 Let C = Skβ . Then Cφ is the binary MacDonald code
M2k,k : [22k − 2k , 2k, 22k−1 − 2k−1 ]
with Hamming weight distribution same as the Lee weight distribution of Skβ .
Proof:
We again use induction on k. For k = 2 the result can be easily verified. If
Gkβ is a generator matrix of Skβ in 2-basis form then upto rearrangement of rows
0101 · · · 01 0000 · · · 00 1111 · · · 11
φ(Gkβ ) = 1111 · · · 11 0000 · · · 00 0000 · · · 00 ,
φ(Gk−1)
β
φ(Gk−1
)
β
φ(Gk−1
)
34
α
where Gk−1 is the generator matrix of Sk−1
in 2-basis form. Assume that the result
i
h
β
β
holds for Sk−1
i.e., φ(Gk−1
) yields a 22k−2 − 2k−1 , 2k − 2, 22k−3 − 2k−2 binary code
with possible nonzero weights either 22k−3 or 2k−2 (2k−1 − 1). By Theorem 3.7, φ(Gk−1 )
h
i
is a 22k−1 , 2(k − 1), 22k−2 binary code in which every nonzero codeword is of weight
22k−2 . Thus possible nonzero weights from lower portion of the above matrix will be
either 2(22k−3 ) + 22(k−1) or 2 22k−3 − 2k−2 + 22k−2, i.e., either 22k−1 or 2k−1 (2k − 1).
Now the proof easily follows (due to structure of first two rows of the above matrix)
by showing that the resulting weight of any linear combination of first two rows with
lower portion of the matrix, does not changes.
The weight hierarchy of Skα and Skβ are given by the following two theorems.
Theorem 3.9 Skα satisfies the chain condition and its weight hierarchy is given by
dr (Skα ) =
r
X
i=1
Proof:
22k−i = 22k − 22k−r ; 1 ≤ r ≤ 2k.
By Remark 3.3(1), Any r-dimensional subcode of Skα is of constant Lee
weight. Hence by Remark 2.3 (for s = 2),
dr (Skα ) =
1 r
(2 − 1)22k = 22k − 22k−r .
r
2
Let D1 =< 2R1 >, D2 =< 2R1 , 2R2 >, D3 =< R1 , 2R1 , 2R2 >,
D4 =< R1 , 2R1 , R2 , 2R2 >, . . . , D2k =< R1 , 2R1 , . . . , Rk , 2Rk > . It is easy to verify
that
D1 ⊆ D2 ⊆ · · · ⊆ D2k ,
and wS (Dr ) = dr (Skα ) for 1 ≤ r ≤ 2k.
Theorem 3.10 Skβ satisfies the chain condition and its weight hierarchy is given by
r
dr (Skβ ) = n(k) − 2k−r−1 (2k − 2⌈ 2 ⌉ ) 1 ≤ r ≤ 2k,
where n(k) = 2k−1(2k − 1).
35
Proof:
The proof follows by induction on k. Clearly result holds for k = 2. Assume
β
that the result holds for Sk−1
. Hence if 1 ≤ r ≤ 2k−2, then there exists an r-dimensional
r
β
subcode of Sk−1
with minimum support size as n(k − 1) − 2k−r−2(2k−1 − 2⌈ 2 ⌉ ). By
Remark 3.4,
β
α
dr (Skβ ) = 2dr (Sk−1
) + dr (Sk−1
).
(3.6)
α
But all r-dimensional subcodes of Sk−1
have constant support size (22k−2 − 22k−2−r ).
Thus simplifying (3.6) yields the result. The case r = 2k − 1 & 2k are trivial. Let
D1 =< 2R1 >, D2 =< R1 , 2R1 >, D3 =< R1 , 2R1 , 2R2 >, D4 =< R1 , 2R1 , R2 , 2R2 >
, . . . , D2k =< R1 , 2R1 , . . . , Rk , 2Rk > . It is easy to see that
D1 ⊆ D2 ⊆ · · · ⊆ D2k ,
is the required chain of subcodes.
The dual code of Skα is a code of length 22k and 2-dimension 22k+1 − 2k, whereas
the dual code of Skβ is a code of length 2k−1 (2k − 1) and 2-dimension 22k − 2k − 2k.
The Hamming and Lee weight distributions of these dual codes can be obtained with
the help of Theorems 3.3 and 3.6 and the MacWilliams Identities[92]. Similarly,
the weight hierarchies of duals can be obtained from Theorems 2.6, 3.9 & 3.10. For
example, we have
Proposition 3.3 If 1 ≤ r ≤ 22k+1 − 2k − 2. Then
{dr (Skα ⊥ )} = {1, 1, 2, 2, . . . , n, n}\{2i : 0 ≤ i < 2k}.
In[108], Sun and Leib have considered the dual of Skβ (k ≥ 3) in a different context.
They have used combinatorial arguments to obtain a code of length n = 2r−1 (2r − 1),
q
redundancy r and minimum squared noncoherent weight N +1− (N − 2)2 + 9, where
N = n − 1. They have further punctured these codes to get some good codes in the
sense of having larger coding gains over noncoherent detection.
Chapter 4
Z2s -Simplex Codes and their
Generalized Gray Images
The purpose of computing is insight, not numbers.
. . . Richard W. Hamming (1915-1998)
4.1
Introduction
In section 2.4.2 we have studied some basic properties of generalized gray map φG
introduced by Carlet. In[19] he has given two other generalizations of gray map φ.
There may be several other generalizations. Thus the study of gray map on linear
codes over Z4 , as seen in section 3.3 of the last chapter can be extended to codes
over Z2s in several ways. In this chapter we restrict ourselves to the map φG . Simplex
codes of type α and β over Z2s are studied in section 4.2. Section 4.2.1 deals with the
properties of generalized gray images of Skα and Skβ .
36
37
4.2
Z2s -Simplex Codes of Type α and β
Let Gk be a k × 2sk matrix over Z2s defined inductively by
Gk =
G1 = [0123 · · · 2s − 1],
s
s
s
00 · · · 0 11 · · · 1 22 · · · 2 · · · (2 − 1)(2 − 1) · · · (2 − 1)
Gk−1
Gk−1
Gk−1
···
;k
Gk−1
≥ 2.
Clearly, the code Skα generated by Gk over Z2s has length 2sk and 2-dimension sk.
The following observations are straightforward generalizations of Remarks 3.1 and 3.2
of the previous chapter.
α
Remark 4.1 If Ak−1 denotes an array of codewords in Sk−1
and if i = (iii...i) then
an array of all codewords of Skα is given by
Ak−1
Ak−1
Ak−1
···
Ak−1
1 + Ak−1
2 + Ak−1
· · · (2s − 1) + Ak−1
Ak−1
..
.
2 + Ak−1
..
.
22 + Ak−1
..
.
· · · (2s − 2) + Ak−1
..
..
.
.
Ak−1 (2s − 1) + Ak−1 (2s − 2) + Ak−1 · · ·
Ak−1
1 + Ak−1
.
Remark 4.2 If R1 , R2 , ..., Rk denote the rows of the matrix Gk then wH (Ri ) = 2sk −
2s(k−1) , wH (2s−1 Ri ) = 2sk−1 , wL(Ri ) = 2s(k+1)−2 , and wGL (Ri ) = 2s(k+1)−2 .
For each m,
0 ≤ m ≤ s, let Sm = {0, 1 · 2s−m , 2 · 2s−m , · · · , (2m − 1) · 2s−m }.
Note that Ss−1 = Z, the set of all zero divisors of Z2s and Ss = Z2s . A codeword
c = (c1 , . . . , cn ) ∈ Skα is said to be of type m if all of its components belong to the set
Sm . It may be observed that each element of Z2s occurs equally often in every row of
Gk . In fact we have the following Lemma.
Lemma 4.1 Let c ∈ Skα be a type m codeword. Then all the components of c will
occur equally often 2sk−m times.
38
Proof:
y1 =
y3 =
y2s =
α
Any x ∈ Sk−1
gives rise to following 2s codewords of Skα
x x x ··· x
,
y2 =
x 2 + x 22 + x · · · (2s − 2) + x
s
s
x 1 + x 2 + x · · · (2 − 1) + x
,
, . . . , and
s
x (2 − 1) + x (2 − 2) + x · · · 1 + x
.
Hence the proof follows easily by induction on k and the Remark 4.1.
To determine weight distribution of Skα one needs to determine the number of codewords of type m in Skα for 1 ≤ m ≤ s. Let Cm be the matrix defined by
Cm =
2
s−m
..
.
R1
2s−1 R1
2s−mR2
..
.
2s−1 R2
..
.
2s−m Rk
..
.
2s−1Rk
,
where Ri is the ith row of the matrix Gk . The subcodes D (m) of C generated by the
2-linear combinations of the rows of Cm will have 2mk codewords. Note that the
codewords generated by the matrix C1 have components either 0 or 2s−1 and Cs yields
the whole code Skα . Thus, for all m, 1 ≤ m ≤ s, a codeword of type m will occur
2mk − 2(m−1)k times in Skα . This proves the following Lemma.
Lemma 4.2 Let 0 < m ≤ s. Then the number of codewords of type m in Skα is
2(m−1)k (2k − 1).
39
Theorem 4.3 The Hamming, Lee and the generalized Lee weight distributions of Skα
are:
1. AH (0) = 1, AH (2sk−m(2m − 1)) = 2(m−1)k (2k − 1) for 1 ≤ m ≤ s,
2. AL (0) = 1, AL (2s(k+1)−2 ) = 2sk − 1 and
3. AGL (0) = 1, AGL (2s(k+1)−2 ) = 2sk − 1.
Let c ∈ Skα be a codeword of type m(6= 0). Then by Lemma 4.1, wH (c) =
Proof:
2sk − 2sk−m and hence by Lemma 4.2, AH (2sk−m(2m − 1)) = 2(m−1)k (2k − 1). For m = 0,
AH (0) = 1. Also, by Lemma 4.1 wL(c) = 2sk−m
P m
(2 −1)
t=0
wL(t · 2s−m) = 2s(k+1)−2
which is independent of m. Thus all type m(6= 0) codewords will have same Lee weight.
Similar argument holds for generalized Lee weight.
Remark 4.3 (i) Skα is an equidistant code with respect to Lee and generalized Lee
distances.
(ii) Skα is of type α.
(iii) For s = 1, Skα reduces to extended binary simplex code Sˆk .
(iv) In[97], Satyanarayna also visited the codes Skα and obtained the second part of the
above theorem.
Let Gβk be the k × 2(s−1)(k−1) (2k − 1) matrix defined inductively by
and for k > 2,
Gβk =
Gβ2 =
111 · · · 1
s
s
0 2 4 6 · · · (2 − 2)
0123 · · · (2 − 1) 1 1 1 1 · · ·
1
,
s
s
11 · · · 1 00 · · · 0 22 · · · 2 44 · · · 4 · · · (2 − 2) · · · (2 − 2)
Gk−1
Gβk−1
Gβk−1
Gβk−1
···
Gβk−1
,
40
α
where Gk−1 is the generator matrix of Sk−1
. By induction, it is easy to verify that no
two columns of Gβk are multiple of each other. Let Skβ be the linear code over Z2s
generated by Gβk . Note that Skβ is a [2(s−1)(k−1) (2k − 1), sk] code. Now the Remarks 3.4
& 3.5 of previous chapter generalize to the following.
β
α
Remark 4.4 If Ak−1 (Bk−1) denotes an array of codewords in Sk−1
(Sk−1
) and if i =
(i, i, . . . , i) then an array of all codewords of Skβ is given by
Ak−1
Bk−1
Bk−1
Bk−1
···
Bk−1
1 + Ak−1
Bk−1
2 + Bk−1
22 + Bk−1
···
(2s − 2) + Bk−1
2 + Ak−1
..
.
Bk−1
..
.
22 + Bk−1
..
.
23 + Bk−1
..
.
···
..
.
(2s − 22 ) + Bk−1
..
.
(2s − 1) + Ak−1 Bk−1 (2s − 2) + Bk−1 (2s − 22 ) + Bk−1 · · ·
2 + Bk−1
.
Remark 4.5 Each row of Gβk has Hamming weight 2(s−1)(k−1)−s [(2k − 1)(2s − 1) + 1],
and Generalized Lee weight 2sk−k−1(2k − 1). The Lee weight of the first row will be
2s(k−1) + 2sk−2 − 2sk−k−1.
Let U, Z be the set of units and zero divisors of Z2s , respectively. Proposition 3.1
generalizes to the following.
Proposition 4.1 Let 1 ≤ j ≤ k and let Rj be the j th row of Gβk . Then
P
i∈U
ωi =
2s(k−1) , and each zero divisor in Z2s occurs 2(s−1)(k−2) (2k−1 − 1) times in Rj .
Proof:
It follows by induction and is similar to the proof of proposition 3.1
The next Proposition is similar to Lemma 4.2 of Skα .
Proposition 4.2 Let c ∈ Skβ . If one of the coordinates of c is a unit then
2s(k−1) , and each zero divisor in Z2s occurs 2(s−1)(k−2) (2k−1 − 1) times in c.
P
i∈U
ωi =
41
β
α
By Remark 4.4, there exist y1 ∈ Sk−1
and y2 ∈ Sk−1
such that c can have
Proof:
any of the following 2s forms:
c=
c=
c=
y1 y2 y2 · · · y2
,
c=
2 + y1 y2 22 + y2 · · · (2s − 22 ) + y2
s
s
1 + y1 y2 2 + y2 · · · (2 − 2) + y2
s
, . . . , or
(2 − 1) + y1 y2 (2 − 2) + y2 · · · 2 + y2
.
The proof now follows on the lines of the proof of Lemma 3.4.
Let C be a linear code over Z2s . We can define the reduction code C (1) and the
torsion code C (2) of C as follows. Let D = {c ∈ C|ci = 0 or 2s−1 for all i}. Then
1
C (2) = { 2s−1
c|c ∈ D} is the torsion code of C. The binary code C (1) = C (mod 2)
is called the reduction code of C. If C is a free module then C (2) = C (1) . Hence the
reduction and torsion codes of Skα Skβ are equal. Next proposition determines these
binary codes.
Proposition 4.3 The torsion code of Skα
Skβ is equivalent to 2(s−1)k copies of the
extended binary simplex code 2(s−1)(k−1) copies of the binary simplex code .
Proof:
The proof is by induction on k and follows on the lines of the proof of
Lemmas 3.2 and 3.5.
Theorem 4.4 The Hamming and Generalized Lee weight distributions of Skβ are
1. AH (0) = 1, AH (2(s−1)(k−1) [2k−m {2m − 1} + {21−m − 1}]) = 2(m−1)k (2k − 1), for
each m; 1 ≤ m ≤ s, and
2. AGL (0) = 1, AGL (2sk−1) = 2k − 1, AGL (2sk−k−1(2k − 1)) = 2k (2(s−1)k − 1).
Proof:
By induction on k. By Theorem 4.3 and Remark 4.4 it is easy to see that
the possible nonzero Hamming (Generalized Lee) weights of Skβ are
n
2(s−1)(k−1) 2k−m (2m − 1) + (21−m − 1) : 1 ≤ m ≤ s
o n
o
2sk−1 , 2sk−k−1(2k − 1)
.
,
42
By Lemma 4.2, Hamming weight of type m will occur 2(m−1)k (2k − 1) times. Moreover
generalized lee weight 2sk−1 will occur 2k − 1 times. Thus the other weight will occur
2sk − 2k times.
Corollary 4.5 (i) Skβ is of type β.
(ii) For s = 1, Skβ reduces to binary Simplex Code Sk .
4.2.1
Gray Image Families
Let C be an [n, k, dH , dGL] linear code over Z2s and let φG be the Generalized Gray map
defined in section 2.4.2. Then φG (C) is a binary code having 2k codewords of length
2s−1 n, and minimum Hamming distance dGL. However φG (C) need not be linear. Let
B be the matrix given in (2.5) for p = 2. The rows of B form a 2-basis for C and let
φG (B) be the matrix obtained from B by applying the generalized gray map φG to each
GL
⌉] binary linear code.
entry of B. The code Cφ generated by φG (B) is a [2s−1 n, k, ≥ ⌈ 2ds−1
Note that φG (C) and Cφ have the same number of codewords but they are not equal in
general.
Recall that S¯kα is the punctured code Skα .
Remark 4.6 (i) φG (S¯kα ) is a binary code of length 2s−1 (2sk − 1) and minimum Hamming distance 2s(k+1)−2 . It meets the Plotkin bound (cf.[79]) and n < 2dH .
(ii) φG (Skβ ) is a binary code of length 2k(s−1) (2k − 1) and minimum Hamming distance
2sk−k−1(2k − 1). This is an example of a code having n = 2dH (cf.[79]).
The next two results are about the binary linear codes obtained from S¯kα and Skβ .
Theorem 4.6 Let C = S¯kα . Then Cφ is a [2s−1 · (2sk − 1), sk, 2s(k+1)−2] binary linear
code consisting of 2s−1 copies of the binary simplex code Ssk with Hamming weight dis-
43
tribution same as the Generalized Lee weight distribution of S¯kα .
Proof:
By Lemma 2.5, Cφ is a binary linear code of length 2s−1 · (2sk − 1) and
dimension sk. Let Gk be a generator matrix of Skα in 2-basis form. Then
Gk =
0...0
1...1
2...2
3...3
...
0...0
2...2
4...4
3 · 2...3 · 2
...
22 . . . 3
· 22
...
..
.
(2s − 1) . . . (2s − 1)
(2s
22 ) . . . (2s
− 22 )
0...0
..
.
4...4
..
.
8...8
..
.
3·
0...0
2s−1 . . . 2s−1
0...0
2s−1 . . . 2s−1
...
2s−1 . . . 2s−1
Gk−1
Gk−1
Gk−1
Gk−1
...
Gk−1
2Gk−1
..
.
2Gk−1
..
.
2Gk−1
..
.
2Gk−1
..
.
...
..
.
2Gk−1
..
.
2s−1 Gk−1
2s−1 Gk−1
2s−1 Gk−1
2s−1 Gk−1
...
2s−1 Gk−1
..
.
(2s − 2) . . . (2s − 2)
−
..
.
and
φG (Gk ) =
φG (2s − 1) . . . φG (2s − 1)
..
.
0000 . . . 00
..
.
0101 . . . 01
..
.
0011 . . . 11
..
.
0110 . . . 10
..
.
...
0000 . . . 00
1111 . . . 11
0000 . . . 00
1111 . . . 11
...
1111 . . . 11
φG (Gk−1 )
φG (Gk−1 )
φG (Gk−1 )
φG (Gk−1 )
...
φG (Gk−1 )
..
.
.
The proof is by induction on k and proceeds on the lines of the proof of Theorem 3.7.
For k = 2, result follows trivially. Assume that result holds for k − 1, i.e, φG (Gk−1 )
yields a binary code in which every nonzero codeword is of weight 2sk−2. Then by
induction hypothesis the possible nonzero weight from the lower portion of the matrix
φG (Gk ) will be 2s · 2sk−2 = 2s(k+1)−2 . From the structure of the first s rows of φ(Gk ) it is
easy to verify that any linear combination of these rows with other rows coming from
the lower portion has weight 2sk+s−2. Puncturing the first 2s−1 columns corresponding
to the first column of Gk and rearranging the rest of the columns yields the code having
2s−1 copies of Ssk .
44
Theorem 4.7 Let C = Skβ . Then Cφ is the binary MacDonald code
Msk,(s−1)k : [2sk − 2(s−1)k , sk, 2sk−1 − 2(s−1)k−1 ]
with Hamming weight distribution same as the Generalized Lee weight distribution of
Skβ .
Proof:
By induction on k and is similar to the proof of Theorem 3.8. Let Gkβ be a
generator matrix of Skβ in 2-basis form then
φG (Gkβ )
=
φG (2s − 2) · · · φG (2s − 2)
..
.
0101 · · · 01
..
.
0000 · · · 00
..
.
0011 · · · 11
..
.
0000 · · · 1111
..
.
···
1111 · · · 11
0000 · · · 00
0000 · · · 00
0000 · · · 0000
···
0000 · · · 0000
φG (Gk−1 )
β
φG (Gk−1
)
β
φG (Gk−1
)
β
φG (Gk−1
)
···
β
φG (Gk−1
)
..
.
,
α
where Gk−1 is the generator matrix of Sk−1
in 2-basis form. It is easy to verify
β
β
that result holds for k = 2. Assume that result holds for Sk−1
. Then φG (Gk−1
) yields
a binary code with possible nonzero weights either 2sk−s−1 or 2sk−s−k (2k−1 − 1). By
Theorem 4.6, φG (Gk−1 ) is a binary code in which every nonzero codeword is of weight
2sk−2. Thus possible nonzero weights from lower portion of the above matrix will be
either 2s−1(2sk−s−1) + 2sk−2 or 2s−1 2sk−s−1 − 2sk−s−k + 2sk−2 . Now the proof follows
(easily from the structure of first s rows of the above matrix) by showing that the
resulting weight, of any linear combination of first s rows with lower portion of the
matrix, does not changes.
The weight hierarchy of Skα and Skβ are given by the following two theorems.
Theorem 4.8 Skα satisfies the chain condition and its weight hierarchy is given by
dr (Skα )
=
r
X
i=1
2sk−i = 2sk − 2sk−r ; 1 ≤ r ≤ sk.
45
Proof:
By Remark 4.3, any r-dimensional subcode of Skα is of constant Generalized
Lee weight. Hence by definition (see Remark 2.3)
dr (Skα ) =
1
2r+s−2
X
c(6=0)∈Dr
wGL(c) = 2−r−s+2 · 2sk+s−2 ·
X
c(6=0)∈Dr
1 = 2sk−r (2r − 1).
Let D1 =< 2s−1R1 >, D2 =< 2s−1 R1 , 2s−1 R2 >, . . . , Dk =< 2s−1 R1 , . . . , 2s−1Rk >
, Dk+1 =< 2s−2 R1 , 2s−1 R1 , 2s−1 R2 , . . . , 2s−1Rk >, . . . ,
Dsk =< R1 , 2R1 , . . . , 2s−1R1 , . . . , Rk , 2Rk , . . . , 2s−1Rk > . It is easy to verify that
D1 ⊆ D2 ⊆ · · · ⊆ Dsk ,
and wS (Dr ) = dr (Skα ) for 1 ≤ r ≤ sk.
Theorem 4.9 Weight hierarchy of Skβ is given by dr (Skβ ) = n(k) − 2(s−1)(k−1) (2k−r −
2i−r ), where 1 ≤ i ≤ k, (i − 1)s < r ≤ is and n(k) = 2(s−1)(k−1) (2k − 1). Moreover Skβ
satisfies the chain condition.
Proof:
The proof follows by induction on k. Clearly the result holds for k = 2.
β
Assume that the result holds for Sk−1
. Hence, if 1 ≤ i ≤ k − 1, then there exβ
ists an r-dimensional subcode of Sk−1
with minimum support size as n(k − 1) −
2(s−1)(k−2) (2k−1−r − 2i−r ). By Remark 4.4,
β
α
dr (Skβ ) = 2s−1 dr (Sk−1
) + dr (Sk−1
).
(4.1)
α
But all r-dimensional subcodes of Sk−1
have constant support size (2sk−s − 2sk−s−r ).
Thus simplifying (4.1) yields the result. The case i = k is trivial. Let D1 =< 2s−1R1 >
, D2 =< 2s−2 R1 , 2s−1R1 >, . . . , Ds =< R1 , 2R1 , 22 R2 , . . . , 2s−1 R1 >,
Ds+1 =< R1 , 2R1 , 22 R2 , . . . , 2s−1 R1 , 2s−1 R2 >, . . . ,
Ds+s =< R1 , 2R1 , 22 R2 , . . . , 2s−1 R1 , R2 , 2R2 , . . . , 2s−1R2 >, . . . ,
Dsk =< R1 , 2R1 , 22 R2 , . . . , 2s−1 R1 , R2 , 2R2 , . . . , 2s−1R2 , . . . , Rk , 2Rk , 22 Rk , . . . , 2s−1 Rk > .
It is easy to see that
D1 ⊆ D2 ⊆ · · · ⊆ Dsk
46
is the required chain of subcodes.
The dual code of Skα is a code of length 2sk and 2-dimension s(2sk − k), whereas the
dual code of Skβ is a code of length 2(s−1)(k−1) (2k − 1) and 2-dimension
s 2(s−1)(k−1) (2k − 1) − k . The weight hierarchies of duals can be obtained from
Theorem 2.6, 4.8 & 4.9.
Chapter 5
Codes Satisfying the Chain Condition
As the births of living creatures, at first, are ill-shapen: so are all Innovations, which are the births of time. . . . Francis Bacon (1561-1626)
The concept of chain condition for linear codes over GF (q) was found useful in expressing weight hierarchies of a product code in terms of the weight hierarchies of its
component codes. In Chapter 2, we extended the concept of chain condition to codes
over Zps . In this chapter, it is shown that various known self-dual codes over Z4 satisfy
the chain condition. Construction and properties of first order Reed Müller code over
Z2s are given in section 2.
5.1
Self-Dual and Self Orthogonal Codes over Z4
Self dual and self orthogonal codes over Z4 were recently studied by several researchers
like Bonnecaze, Conway, Harada, Pless, Quian, Rains and Sloane etc. (see[26],[11],[12],
[33],[50],[39],[54],[86],[64],[87],[93],[92],[88] etc.). The binary image under the gray map
φ of a self dual code over Z4 is formally self-dual and distance-invariant[53]. Let C be
47
48
a linear code over Z4 . A codeword c ∈ C is said to be a tetrad if it has exactly four
coordinates congruent to 1 or 3 (mod 4) and the rest congruent to 0 (mod 4).
Let m ≥ 2 be a positive integer. Let D2m be the [2m, 2m − 2, 4, 4] type β code
generated by (m − 1) × 2m matrix
1 1 1 3 0 0 ··· 0 0 0 0 0
0
..
.
0
..
.
1
..
.
1
..
.
1
..
.
3 ··· 0 0
.. . . .. ..
. . .
.
0
..
.
0
..
.
0
..
.
0 0 0 0 0 0 ··· 0 1 1 1 3
,
(5.1)
0
and let D2m
be the [2m, 2m − 1] code generated by D2m and the tetrads 1300 . . . 0011.
0
Equivalently D2m
is generated by the matrix (see[26])
1 1 1 3 0 0 ··· 0 0 0 0 0
0
..
.
0
..
.
1
..
.
1
..
.
1
..
.
3 ··· 0 0
.. . . .. ..
. . .
.
0
..
.
0
..
.
0
..
.
0 0 0 0 0 0 ··· 0 1 1 1 3
2 0 2 0 2 0 ··· 0 2 0 2 0
.
(5.2)
+
⊕
Let D2m
be the [2m, 2m − 1] code generated by D2m and 00 . . . 0022 and let D2m
be
+
⊕
0
the code generated by D2m
and D2m
. Note that D2m
is a [2m, 2m] self-dual code([26]).
Let E7 be the [7, 6, 4, 4] type β code generated by the matrix
1 0 0 3 1 1 0
1 0 1 0 0 3 1
1 1 0 1 0 0 3
(5.3)
and let E7+ be the [7, 7, 4, 4] type β code generated by E7 and 2222222. It was observed
in[26] that E7+ is a self-dual code and the reduction code of both E7 & E7+ is the
49
Hamming code of length 7. They also show that the code E8 generated by the matrix
1 0 0 0 0 1 1 1
0 1 0 0 3 0 1 3
(5.4)
0 0 1 0 3 3 0 1
0 0 0 1 3 1 3 0
is a [8, 8, 4, 4] self dual code. Note that it is a type β code.
In[26] Conway and Sloane has shown that any self orthogonal code over Z4 gen+
⊕
0
erated by ‘tetrads’ is equivalent to a direct sum of codes D2m , D2m
, D2m
, D2m
(m =
1, 2, . . . ), E7 , E7+ , E8 . The following Theorem shows that D2m , E7 , E7+ and E8 satisfy the
chain condition. Note that the smallest self-dual code A1 = {0, 2} trivially satisfies the
chain condition.
Theorem 5.1 D2m , E7 , E7+ and E8 satisfies chain conditions.
Proof:
It is easy to verify that the weight hierarchy of E7 is {4, 4, 6, 6, 7, 7}. Con-
sider the codewords x1 = (1101003), x2 = (2111030) and x3 = (3023132) of E7 . Let
D1 =< 2x1 >, D2 =< x1 , 2x1 >, D3 =< x1 , 2x1 , 2x2 >, D4 =< x1 , 2x1 , x2 , 2x2 >,
D5 =< x1 , 2x1 , x2 , 2x2 , 2x3 >, and D6 =< x1 , 2x1 , x2 , 2x2 , x3 , 2x3 > . It is easy to
verify that D1 ⊆ D2 . . . ⊆ D6 is the required chain of subcodes.
Therefore for E7+ the required chain of subcodes can be taken as D1 ⊆ D2 . . . ⊆
D6 ⊆ D7 where Di for 1 ≤ i ≤ 6 are the subcodes defined for E7 and
D7 =< x1 , 2x1 , x2 , 2x2 , x3 , 2x3 , 2222222 > . Hence E7+ satisfies the chain condition and
its weight hierarchy is {4, 4, 6, 6, 7, 7, 8}.
Clearly, the weight hierarchy of E8 is {4, 4, 6, 6, 7, 7, 8, 8}. If Ri (1 ≤ i ≤ 4) denote
the first four rows of the matrix given in (5.4) and if D1 =< 2R4 >, D2 =< R4 , 2R4 >,
D3 =< 2R3 , R4 , 2R4 >, D4 =< R3 , 2R3 , R4 , 2R4 >, . . . ,
D8 =< R1 , 2R1 , . . . , R3 , 2R3 , R4 , 2R4 > then D1 ⊆ D2 . . . ⊆ D8 and ws (Dr ) = dr (E8 ).
50
It is easy to see that the code D2m has weight hierarchy
{4, 4, 6, 6, 8, 8, . . . , 2m − 2, 2m − 2, 2m, 2m}.
Let
R1 , . . . Rm−1
be
the
first
m − 1 rows of the matrix given in (5.1) and let D1 =< 2R1 >, D2 =< R1 , 2R1 >, . . . ,
D2m−3 =< R1 , 2R1 , . . . , Rm−2 , 2Rm−2 , 2Rm−1 >,
D2m−2 =< R1 , 2R1 , . . . , Rm−2 , 2Rm−2 , Rm−1 , 2Rm−1 > . Then D1 ⊆ D2 . . . ⊆ D2m−2
and ws (Dr ) = dr (D2m ), 1 ≤ r ≤ 2m − 2.
There is another self-dual code L8 of length 8 defined in[26]. L8 is [8, 8, 2, 4] type
α code generated by the matrix
00 11 02 13
00 02 13 11
.
11 02 00 13
02 02 02 02
00 00 00 22
(5.5)
Proposition 5.1 L8 satisfies the chain condition.
Proof:
It is easy to see that the weight hierarchy of L8 is {2, 4, 5, 6, 7, 7, 8, 8}. Let
x1 = (00000022), x2 = (11020013), x3 = (13000211), x4 = (02001131) and
x5 = (13021122) be the five codewords of L8 . Let D1 =< x1 >, D2 =< 2x2 , x1 >,
D3 =< x2 , 2x2 , x1 >, D4 =< x3 , x2 , 2x2 , x1 >, D5 =< 2x4 , x3 , x2 , 2x2 , x1 >,
D6
=<
x4 , 2x4 , x3 , x2 , 2x2 , x1
>, D7
=<
2x5 , x4 , 2x4 , x3 , x2 , 2x2 , x1
>, and
D8 =< x5 , 2x5 , x4 , 2x4 , x3 , x2 , 2x2 , x1 > . Then D1 ⊆ D2 . . . ⊆ D8 and ws (Dr ) =
dr (L8 ), 1 ≤ r ≤ 8.
Let m ≥ 1. Let K4m be the [4m, 4m, 2, 4] type α code generated by the (4m−1)×4m
51
matrix
′
1 1 1 ··· 1 1
0 2 0 ··· 0 2
0
..
.
0
..
.
2 ··· 0 2
.. . . .. ..
. . .
.
0 0 0 ··· 2 2
(5.6)
and let K8 be the [8, 8, 2, 4] type α code generated by the matrix
1 1 1 1 0 0 0 2
0 0 0 2 1 1 1 1
0 2 0 2 0 0 0 0
.
(5.7)
0 0 2 2 0 0 0 0
0 0 0 0 0 2 0 2
0 0 0 0 0 0 2 2
Both of these self dual codes can also be obtained from a labeled graph[26]. The code
K4m was first constructed by Klemm[71].
′
Theorem 5.2 Klemm Code K4m (m ≥ 1) and the code K8 satisfy the chain condition
and weight hierarchy of K4m is given by
dr (K4m ) =
Proof:
r + 1,
1 ≤ r ≤ 4m − 2,
4m,
r = 4m − 1 & 4m.
(5.8)
It is easy to see that the weight hierarchy of the Klemm code is given by
(5.8). Let Ri (1 ≤ i ≤ 4m − 1) be the first 4m − 1 rows of (5.6). For 1 ≤ r ≤ 4m − 2, let
Dr =< R4m−i : 1 ≤ i ≤ r > also let D4m−1 =< 2R1 , R2 , R3 , · · · , R4m−2 , R4m−1 >
, D4m =< R1 , 2R1 , R2 , R3 , · · · , R4m−2 , R4m−1 > . Then D1 ⊆ D2 . . . ⊆ D4m and
ws (Dr ) = dr (K4m ), 1 ≤ r ≤ 4m.
′
For the code K8 it can be easily checked that its weight hierarchy is {2, 3, 4, 5, 6, 7, 8, 8}.
Let x1 = (00000022), x2 = (00000202), x3 = (00021111), x4 = (00201111),
52
′
x5 = (02001111), x6 = (20001111) and x7 = (20001133) be the seven codewords of K8 .
Then D1 =< x1 >, D2 =< x2 , x1 >, D3 =< 2x3 , x2 , x1 >, D4 =< x3 , 2x3 , x2 , x1 >,
D5 =< x4 , x3 , 2x3 , x2 , x1 >, D6 =< x5 , x4 , x3 , 2x3 , x2 , x1 >,
D7 =< x6 , x5 , x4 , x3 , 2x3 , x2 , x1 > and D8 =< x7 , x6 , x5 , x4 , x3 , 2x3 , x2 , x1 > form the
required chain of subcodes.
Some of the self-dual Z4 -codes have the property that all Euclidean weights are
multiple of 8 and they contain the all-one vector. These codes are called Type-II
codes over Z4 (see[54],[26]). The key motivation to study these codes is that one can
associate a Type-II even unimodular lattice via the construction A (mod 4)[92],[16].
Several such Type-II lattices have been obtained in such a fashion.
Quadratic residue codes over Z4 is a well known family of Type-II codes. These
codes are obtained by Hensel uplifting of the binary quadratic residue codes[88],[54].
If n = q + 1 and q ≡ −1 (mod 8) is a prime power then Pless and Quian have shown
that an extended quadratic residue code QRn of length n is a Type II code[88]. These
have been widely studied by Pless et al for n = 8, 24, 32, 48 etc.[88],[87]. QR8 is the
well known Octacode generated by the matrix
3 3 2 3 1 0 0 0
3 0 3 2 3 1 0 0
3 0 0 3 2 3 1 0
3 0 0 0 3 2 3 1
.
(5.9)
It is an [8, 8, 4, 6] code of type β. The code QR24 is the well known lifted Golay
Code. It is a [24, 24, 8, 12] code of type β generated by the matrix
53
3
3
1
0
0
2
3
3
3
0
3
2
1
0
0
0
0
0
0
0
0
0
0
0
3
0
3
1
0
0
2
3
3
3
0
3
2
1
0
0
0
0
0
0
0
0
0
0
3
0
0
3
1
0
0
2
3
3
3
0
3
2
1
0
0
0
0
0
0
0
0
0
3
0
0
0
3
1
0
0
2
3
3
3
0
3
2
1
0
0
0
0
0
0
0
0
3
0
0
0
0
3
1
0
0
2
3
3
3
0
3
2
1
0
0
0
0
0
0
0
3
0
0
0
0
0
3
1
0
0
2
3
3
3
0
3
2
1
0
0
0
0
0
0
3
0
0
0
0
0
0
3
1
0
0
2
3
3
3
0
3
2
1
0
0
0
0
0
3
0
0
0
0
0
0
0
3
1
0
0
2
3
3
3
0
3
2
1
0
0
0
0
3
0
0
0
0
0
0
0
0
3
1
0
0
2
3
3
3
0
3
2
1
0
0
0
3
0
0
0
0
0
0
0
0
0
3
1
0
0
2
3
3
3
0
3
2
1
0
0
3
0
0
0
0
0
0
0
0
0
0
3
1
0
0
2
3
3
3
0
3
2
1
0
3
0
0
0
0
0
0
0
0
0
0
0
3
1
0
0
2
3
3
3
0
3
2
1
.
(5.10)
The following theorem shows that these codes satisfy the chain condition.
Theorem 5.3 Extended quadratic residue codes QR8 and QR24 over Z4 satisfy the
chain condition.
Proof:
It is easy to see that the weight hierarchy of the Octacode is {4, 5, 6, 6, 7, 7, 8, 8}
(see also[1]). Let Ri , 1 ≤ i ≤ 4, be the last four rows of the matrix (5.9). Let
D1 =< 2R1 >, D2 =< R1 , 2R1 >, D3 =< 2R2 , R1 , 2R1 >, D4 =< R2 , 2R2 , R1 , 2R1 >,
D5 =< 2R3 , R2 , 2R2 , R1 , 2R1 >, D6 =< R3 , 2R3 , R2 , 2R2 , R1 , 2R1 >,
D7 =< 2R4 , R3 , 2R3 , R2 , 2R2 , R1 , 2R1 >, and D8 =< R4 , 2R4 , R3 , 2R3 , R2 , 2R2 , R1 , 2R1 > .
Then it is easy to verify that D1 ⊆ D2 . . . ⊆ D8 and ws (Dr ) = dr (QR8 ), 1 ≤ r ≤ 8.
It can be seen easily that
{8, 10, 12, 13, 14, 15, 16, 16, 17, 17, 18, 18, 19, 19, 20, 20, 21, 21, 22, 22, 23, 23, 24, 24} is the
weight hierarchy of QR24 . Let Ri ; 1 ≤ i ≤ 12 be the first 12 rows of (5.10). Let
D1 =< 2R12 >, D2 =< R12 , 2R12 >, D3 =< R12 , 2R12 , 2R11 >, . . . ,
D24 =< R1 , 2R1 , . . . , R12 , 2R12 > . Then D1 ⊆ D2 . . . ⊆ D24 and ws (Dr ) = dr (QR24 ),
1 ≤ r ≤ 24.
54
5.2
First order Reed Müller Code over Z2s
In[53], Hammons et al have constructed a linear code over Z4 (called Quaternary first
order Reed Müller code) whose gray image is the binary first order Reed Müller code.
In this section we construct a linear code over Z2s whose image under the generalized
gray map φG is the binary first order Reed Müller code. Some basic properties of these
are also obtained.
Let 1 ≤ i ≤ m − s + 1. Let vi be a vector of length 2m−s+1 consisting of successive
blocks of 0′ s and 1′ s each of size 2(m−s+1)−i and let 1 = (111 . . . 11) ∈
m−s+1
Z22
.
Let G be a (m − s + 2) × 2m−s+1 matrix given by (consisting of the rows as 1 and
2s−1 vi (1 ≤ i ≤ m − s + 1))
G=
1
0
..
.
1
0
..
.
··· 1
··· 0
. . ..
. .
1
1
1
0
..
.
s−1
s−1
2
2
..
.
0 2s−1 · · · 0 2s−1
···
1
s−1
s−1
··· 2
..
..
.
.
..
.
2s−1 · · ·
0
1
2
..
.
2s−1
0
(5.11)
The code generated by G is called the first order Reed Müller code over Z2s ,
denoted R1,m−s+1 . It is a [2m−s+1 , m + 1, 2m−s , 2m−s+1 , 2m−1 ] linear code over Z2s . It’s
generator matrix in 2-basis form is given by
G=
1
1
···
1
1
1
1
···
1
1
2
..
.
2
..
.
···
..
.
2
..
.
2
..
.
2
..
.
2
..
.
···
..
.
2
..
.
2
..
.
2s−1 2s−1 · · · 2s−1 2s−1 2s−1 2s−1 · · · 2s−1 2s−1
0
..
.
0
0
..
.
···
..
.
0
..
.
0
..
.
2s−1 · · ·
0
2s−1
2s−1 2s−1 · · · 2s−1 2s−1
..
..
..
..
..
.
.
.
.
.
0
2s−1 · · ·
0
2s−1
(5.12)
55
Remark 5.1 For s = 2, R1,m−s+1 reduces to Quaternary first order Reed Müller Code
ZRM(1, m) defined in[53].
Proposition 5.2 Hamming and Generalized Lee weight distributions of R1,m−s+1 are:
1. AH (0) = 1, AH (2m−s ) = 2m−s+2 − 2 & AH (2m−s+1 ) = 2m+1 − 2m−s+2 + 1,
2. AGL (0) = 1, AGL (2m ) = 1 & AGL (2m−1 ) = 2m+1 − 2.
Proof:
Note that first s rows of the matrix G given by (5.12) have Hamming weight
2m−s+1 and remaning m − s + 1 rows are of Hamming weight 2m−s . It is easy to see
that any 2-linear combination of last m − s + 1 rows also has Hamming weight 2m−s .
Hence AH (2m−s ) = 2m−s+2 − 2. Since −2s−1 = 2s−1 in Z2s , every other nontrivial 2linear combination has weight 2m−s+1 . Thus AH (2m−s+1 ) = 2m+1 − 2m−s+2 + 1. Similar
arguments holds for generalized Lee weight.
Theorem 5.4 Weight hierarchy of R1,m−s+1 is given by
Pt−1 m−s−i
,
i=0 2
dt (R1,m−s+1 ) =
2m−s+1 ,
1≤t≤m−s+1
m − s + 1 < t ≤ m + 1.
Moreover, R1,m−s+1 satisfies the chain condition.
Proof:
By Corollary 2.9,
dt (R1,m−s+1 ) ≥
&
t
m−1
(2 − 1)2
2t+s−2
'
=
Pt−1 m−s−i
2
,
i=0
2m−s+1 ,
1≤t≤m−s+1
m − s + 1 < t ≤ m + 1.
(5.13)
Let 1 ≤ t ≤ m − s + 1. Let D be a t-dimensional subcode of R1,m−s+1 generated
by any t rows chosen from last m − s + 1 rows of (5.12). Thus chosen t rows shares
2m−s+1−t common zero bit positions. Hence the support size of D is
t > m − s + 1 then trivially equality holds in (5.13).
Pt−1
i=0
2m−s−i. If
56
Let D1 =< 2s−1vm−s+1 >, D2 =< 2s−1 vm−s , 2s−1 vm−s+1 >, . . . ,
Dm−s+1 =< 2s−1 v1 , . . . , 2s−1 vm−s , 2s−1vm−s+1 >,
Dm−s+2 =< 2s−1 , 2s−1 v1 , . . . , 2s−1vm−s , 2s−1 vm−s+1 >, . . . , and
Dm−1 =< 1, 2, 22 , . . . , 2s−1 , 2s−1 v1 , . . . , 2s−1vm−s , 2s−1 vm−s+1 > .
Then D1 ⊆ D2 . . . ⊆ Dm+1 and ws (Dr ) = dr (R1,m−s+1 ); 1 ≤ r ≤ m + 1.
The map φG is nonlinear over Z2s as φG (2 + 3) 6= φG (2) + φG (3). However we have
the following Lemma.
Lemma 5.5 Let T = {2i : 0 ≤ i ≤ s − 1} ∪ {0}. Then
φG (a + b) = φG (a) + φG (b), for all a, b ∈ T.
Proof:
The verification follows easily using the structure of Es given by (2.6) and
the definition of φG in (2.7).
Theorem 5.6 R1,m−s+1 is Z2 -linear.
Proof:
Let c ∈ R1,m−s+1 . Then c can be written as a 2-linear combination of the
rows of the matrix G given by (5.12). Since φG maps G to a generator matrix of a
binary first order Reed Müller code (with some permutation of the rows, see (2.9, 5.12
and the Lemma 5.5). Thus φG (c) belongs to the binary linear first order Reed Müller
code. Hence R1,m−s+1 is Z2 -linear.
Chapter 6
Norm Quadratic Residue Codes
Often you have to rely on intuition. . . . Bill Gates (1955-till date)
In this chapter we investigate a weakly self dual family of binary linear codes, called,
NQR Codes based on the concept of quadratic residues and obtain its basic properties
over binary field. It is shown that NQR Codes are Z4 -linear.
6.1
Definitions and Basic Results
Let p be an odd prime. The Poincáre finite upper half plane is the set
Hp := {x +
√
δy
x, y ∈ GF (p), y 6= 0,
δ is a quadratic non residue (q.n.r.)
(mod p)}.
(6.1)
In[110] Tiu and Wallace have used it to construct a new class of binary linear codes
Cp called norm quadratic residue (NQR) codes. The length of each codeword in Cp is
p(p − 1), the number of points in Hp . The points in Hp are ordered lexicographically;
i.e, (x, y) < (u, v) if x < u or x = u and y < v. For each a ∈ GF (p), the set
Ba = {(a, 1), (a, 2), . . . , (a, p − 1)} is called a block. Let G be the (p + 1) × p(p − 1)
57
58
matrix
G=
p(p−1)
where each Ri ∈ IF 2
R0
R1
..
.
Rp
is defined as follows. R0 has an 1 in position (x, y) if
x2 − δy 2 , the norm of (x, y) in Hp , is a quadratic residue (q.r.) mod p and 0, otherwise. R1 , R2 , . . . , Rp−1 are block wise cyclic shifts of R0 corresponding to blocks
B0 , B1 , . . . , Bp−1 , and Rp is the all one vector. The set of entries in R0 corresponding
to the block Ba will be denoted by ba . For example, for p = 7, the columns of G
are grouped corresponding to blocks B0 , B1 , · · · , B6 , and the corresponding generator
matrix of the NQR code C7 with δ = 6 is
G=
b0 b1 b2 b3 b4 b5 b6
b6 b0 b1 b2 b3 b4 b5
b5 b6 b0 b1 b2 b3 b4
b4 b5 b6 b0 b1 b2 b3
b3 b4 b5 b6 b0 b1 b2
b2 b3 b4 b5 b6 b0 b1
b1 b2 b3 b4 b5 b6 b0
e
e
e
e
e
e
e
;
where b0 = 111111, b1 = 100001, b2 = 010010, b3 = 001100, b4 = 001100, b5 =
010010, b6 = 100001, and e = 111111.
The code Cp generated by the matrix G is called the NQR Code[110]. If p is of the
form 4m + 1 then Tiu and Wallace[110] have shown that dim Cp ≤ p, dH ≥ p − 1, Cp is
weakly self dual and that the weight of each codeword is divisible by 4. In the present
chapter we show that if p is a prime of the form 4m − 1 then also Cp satisfies similar
59
properties. It is shown that dim Cp = p, Cp is normal and its covering radius is
p(p−1)
.
2
It is also shown that Cp is Z4 -linear.
The following observations about the matrix G are useful for further discussion.
Remark 6.1 In R0 , the entries corresponding to the block B0 has all 0’s
(all 1’s) if p is of the form 4m + 1 (4m − 1).
Remark 6.2 For a > 0, ba = bp−a .
Remark 6.3 In any row of G, the entries corresponding to any block Ba , have mirror
symmetry with respect to its center. Thus, in Ri , the entry corresponding to point (a, j)
is same as the entry corresponding to the point (a, p − j) for every 0 ≤ a ≤ p − 1 and
1≤j≤
(p−1)
.
2
The following result of Perrön [85] (also see [79]) about the q.r. is useful in determining properties of NQR codes.
Theorem 6.1 (i) Let p = 4m + 1 and let r1 , r2 , . . . , r2m+1 be the (2m + 1) quadratic
residues mod p (together with 0). If k is a q.n.r. mod p then among (2m + 1) numbers
ri +k there are m quadratic residues (not including 0) and m+1 quadratic non residues.
(ii) Let p = 4m + 1 and let n1 , n2 , . . . , n2m be the 2m quadratic non residues mod p.
If k is a q.r. mod p then among the 2m numbers ni + k there are exactly m quadratic
residues (not including 0) and m quadratic non residues.
(iii) Let p = 4m − 1 be a prime and let r1 , r2 , . . . , r2m be the 2m quadratic residues mod
p (together with 0). If a is relatively prime to p then among the 2m numbers ri + a
there are m quadratic residues and m quadratic non residues.
(iv) Let p = 4m − 1. Suppose n1 , n2 , . . . , n2m−1 are the (2m − 1) quadratic non residues
and let a be relatively prime to p. Then among the (2m − 1) numbers ni + a there are
m quadratic residues (possibly including 0) and m − 1 quadratic non residues.
60
Lemma 6.2 Every row of G except the last row has weight
Proof:
(p−1)2
.
2
Since each row except the last row of G is a block wise cyclic shift of
R0 , wt(Ri ) = wt(R0 ) for all i = 1, 2, . . . , p − 1. By Remark 6.2,
wt(R0 ) = wt(b0 ) + 2{wt(b1 ) + . . . + wt(b p−1 )}
(6.2)
2
and by Remark 6.1, wt(b0 ) =
To determine wt(ba ) for a
0
if p = 4m + 1
p − 1 if p = 4m − 1.
6=
0, let Ba′
=
2
{(a, 1), . . . , (a, (p−1)
)}, and let
2
N(Ba′ ) = {a2 − δ.12 , a2 − δ.22 , . . . , a2 − δ. (p−1)
}. If p = 4m + 1 by (ii) of
4
Theorem 6.1, N(Ba′ ) contains m quadratic residues and m quadratic non residues.
Therefore by equation (6.2), wt(R0 ) = 0 + 2.{2m + . . . + 2m} = 8m2 =
(p−1)2
.
2
If
p = 4m − 1, by (iii) of Theorem 6.1 there will be (m − 1) quadratic residues and m
quadratic non residues in N(Ba′ ). Hence by Equation (6.2) wt(R0 ) =
(p−1)2
.
2
As an immediate Corollary we have
Corollary 6.3 The minimum distance of Cp is at most
Lemma 6.4 Weight of each column of G is
Proof:
(p−1)2
.
2
(p+1)
.
2
It is sufficient to show that the result is true for the coordinate position
(0, a) ∈ Hp , for some a ∈ GF (p). The first p entries in this column will be entries
from R0 corresponding to coordinate positions Ma = {(0, a), (1, a), . . . , (p − 1, a)}. Let
N(Ma ) = {02 −δa2 , . . . , (p−1)2 −δa2 }. If p = 4m+1, then (−δa2 ) is a q.n.r. and hence
by (i) of Theorem 6.1, N(Ma ) contains 2m quadratic residues and (2m + 1) quadratic
non residues. Hence total number of 1’s in the ath column is (2m + 1).
If p = 4m−1, then (−δa2 ) is a q.r. and (p, −δa2 ) = 1. Hence by (iii) of Theorem 6.1,
N(Ma ) contains (2m − 1) quadratic residues and 2m quadratic non residues. Thus the
61
number of 1’s in the ath column is 2m.
The following relation among the rows of G follows immediately from the above
Lemma.
Corollary 6.5 (i)
(ii)
If p = 4m + 1 then R0 = R1 + R2 + . . . + Rp−1 ;
If p = 4m − 1 then Rp = R0 + R1 + . . . + Rp−1 .
Before stating our next theorem we recall some basic facts needed about the circulant matrices over binary fields as they play an important role in the proof.
A binary square matrix C of order p is said to be circulant if C = (cij ) = (cj−i+1) :=
cir(γ) ; where γ = (c0 , c1 , . . . , cp−1 ) is the first row of C and subscripts are mod p.
We state some of its basic properties in the following Lemma. These are given as an
exercise in[79].
Lemma 6.6 (i) The algebra of p × p circulant matrices over a field IF is isomorphic
to the algebra of polynomials in the ring IF [z]/(z p − 1), if the circulant matrix
C = cir(γ) is mapped onto the polynomial Pγ (z) = c0 + c1 z + . . . + cp−1 z p−1 .
(ii) Let α0 (= 1), α1 , . . . , αp−1 be the pth roots of unity in some extension field, say,
GF (2r ) and let A = (aij ) = (αij ), 0 ≤ i, j ≤ p − 1, be the van der Monde matrix
over GF (2r ). Then A diagonalizes C with diagonal entries as the eigen values of
C. More precisely we have,
A−1 CA = diag(Pγ (α0 ), Pγ (α1 ), . . . , Pγ (αp−1 )).
Theorem 6.7 dim Cp = p, (p 6= 2).
Proof:
Let C be the p × p sub matrix of G obtained by deleting the last
row and by considering columns corresponding to coordinate positions (0, 1), (1, 1)
(2, 1), . . . , (p − 1, 1). In view of Corollary 6.5 it is sufficient to show that rank(C) is
62
p − 1 or p according to the form 4m + 1 or 4m − 1 of p. We observe that C is a
binary circulant matrix, say , C = cir(γ) = cir(c0 , c1 , . . . , cp−1 ); ci ∈ GF (2). Hence, by
Lemma 6.6,
A−1 CA = diag(Pγ (α0 ), Pγ (α1 ), . . . , Pγ (αp−1 ));
where the matrix A, the polynomial Pγ (z) = c0 + c1 z + . . . + cp−1 z p−1 , and the αi ’s for
0 ≤ i ≤ p − 1 are as in Lemma 6.6. If 1 ≤ i ≤ p − 1, Pγ (αi ) 6= 0 and Pγ (α0 ) =
p−1
2
≡
0(mod2) if and only if p is of the form 4m + 1.
Recall that PSL2 (p), the projective special linear group, is the factor group SL2 (p)/ζ,
where SL2 (p) is the special linear group on GF (p) and ζ = {I, −I} with I the 2 × 2
identity matrix. Moreover, PSL2 (p) is generated by the coset of matrices
S=
1 1
0 1
On choosing a coset representative
action on a point in Hp by
a b
c d
(x +
√
and
T =
a b
c d
0 −1
1
0
.
for each member we can define the group
√
√
a(x + δy) + b
√
= x′ + δy ′ .
δy) =
c(x + δy) + d
If p = 4m + 1 then Tiu and Wallace have shown that PSL2 (p) fixes Cp and acts as
a group of automorphism for Cp . The following theorem shows that the result is also
true for primes of the form 4m − 1.
Theorem 6.8 PSL2 (p) fixes Cp and acts transitively on the coordinate positions.
Proof:
Proof of the fact that P SL2 (p) fixes Cp for p = 4m − 1 is similar to the case
√
√
p = 4m + 1 (see[110]). To prove the next part, for given x + δ y and u + δ v in Hp
√
√
we have to show that there exist P ∈ PSL2 (p) such that P (x + δ y) = u + δ v. If
63
P1 =
1 −x
0
1
and P2 =
1 u
0 1
√
√
√
√
then P1 (x + δy) = δy and P2 ( δv) = u + δv.
Thus we need to find Q ∈ PSL2 (p) such that Q(
√
√
δ y) =
δ v. Two cases arise:
Case 1: Both v and y are either quadratic residues
or quadratic
non residues mod
p. Then v = a2 y for some a ∈ GF (p). Let Q =
a
0
,
√
√
then Q( δy) = v δ.
0 a−1
Case 2: Either v is a q.r. and y is a q.n.r. or v is a q.n.r. and y is a q.r. mod p. In
either case v · y · δ is a q.r. mod p and hence v · y · δ = a2 for some a ∈ GF (p). Let
Q=
0
a
a−1 0
√
√
then Q( δy) = v · δ.
Theorem 6.9 Cp is Z4 -linear.
Proof:
It follows from Theorem 2.3 and Remark 6.3.
The Covering Radius R(C) of a linear code C is the least integer R such that spheres
of radius R around the codewords cover the whole space. It is known that R(C) is the
maximum weight of the coset leader. For i = 1, 2, . . . , n and for α ∈ IF 2 let
Cα(i) = {(c1 , c2 , . . . , cn ) ∈ C|ci = α}
and let N (i) = maxx∈IF n2 {
P
x∈IF n
2
d(x, Cα(i) )} with the convention that d(x, Φ) = n;
where Φ is the empty set. The number N (i) is called the Norm of C with respect to
the ith coordinate and N(C) = mini N (i) is called the Norm of the code C. If for some
i, N (i) ≤ 2R + 1, then C is said to be normal and the coordinate i is called acceptable.
The following theorem determines the covering radius of Cp and shows that Cp is normal.
Theorem 6.10 Covering radius of Cp is
p(p−1)
.
2
Moreover Cp is a normal code with
every coordinate acceptable.
Proof:
Observe that N(Cp ) ≤ p(p − 1). Since Cp has no coordinate identically zero,
$
%
p(p − 1)
N(Cp )
≤
.
R(Cp ) ≤
2
2
(6.3)
64
p(p−1)
Let x ∈ IF2
such that its coordinates when divided in p blocks each of length
(p − 1) have a 1 in the first
p−1
2
coordinate positions of each block and zero at other
positions. Then by Remark 6.2 d(x, c) =
(6.3) we get R(Cp ) =
p(p−1)
.
2
p(p−1)
2
for all c ∈ Cp . Thus using Equation
Since N(Cp ) ≤ p(p − 1) < 2R(Cp ) + 1, Cp is normal.
Moreover Since Cp is an even code, N(Cp ) = 2R(Cp ) = p(p − 1)[45]. Hence its every
coordinate is acceptable.
In[66], Janwa has shown that the length n, the minimum distance
d , the dimension
& ' H
k and the covering radius R of a linear code are related by
this to the code Cp we get the following corollary.
Pk
i=1
dH
2i
≤ n−R. Applying
Corollary 6.11 The minimum distance d of an NQR code Cp satisfies the inequality
p
X
i=1
&
'
p(p − 1)
d
≤
i
2
2
The bound given by Corollary 6.11 although poor but is better than the bound
given by Corollary 6.3.
Chapter 7
Conclusions
Anything that won’t sell, I don’t want to invent. Its sale is proof of utility,
and utility is success. . . . Thomas A. Edison (1847-1931)
In the present dissertation, we have studied Simplex Codes of type α and β, first order
Reed Müller code, over Z2s . The concept of 2-dimension has been used extensively to
derive the fundamental properties of these codes. It seems to be an appropriate tool
for studying linear codes over Z2s . The concept of ‘chain condition’ has been extended
in this sense. The method used can be easily extended to study linear codes over Zps .
One will need to suitably extend the definition of φG . Determining the Automorphism
group of these codes and giving a valuable decoding algorithms for these codes can be
an interesting future task. In chapter 5, we have shown that various self-dual codes
over Z4 satisfy the chain condition. This study can be further carried to higher lengths
code over Z2s .
The bound given in Equation (2.10) for Z2 -linear codes seems to be true, in general,
for any linear code over Z2s . But we are neither able to prove it nor provide a counter
example for it, even for the particular case s = 2.
Hensel uplift of NQR codes, studied in Chapter 6, needs further investigation.
65
Bibliography
[1] A. E. Ashikhmin. Generalized hamming weights for Z4 -linear codes. In Proc. of
the 1994 IEEE Int. Symp. Inform. Theory, page 306, 1994.
[2] A. E. Ashikhmin. On generalized hamming weights for galois ring linear codes.
Designs, Codes and Cryptography, 14:107–126, 1998.
[3] A. I. Barbero and J. G. Tena. Weight hierarchy of a product code. IEEE Trans.
Inform. Theory, 41(5):1475–1480, 1995.
[4] http://www.sirbacon.org/toc.html.
[5] L. A. Bassalygo. Supports of a code. Springer Lecture Notes in Computer Science,
948:1–3, 1995.
[6] E. R. Berlekamp. Algebraic Coding Theory. McGraw-Hill, New York, 1968.
[7] I. F. Blake. Codes over certain rings. Inform. Control, 20:396–404, 1972.
[8] I. F. Blake. Codes over integer residue rings. Inform. Control, 29:295–300, 1975.
[9] A. Bonnecaze, E. M. Rains, and P. Solé. 3-colored 5-designs and Z4 -codes.
[10] A. Bonneeaze and I. M. Duursma. Translates of linear codes over Z4 . IEEE
Trans. Inform. Theory, 43(4):1218–1230, 1997.
66
67
[11] A. Bonnecaze, P. Solé, and A. R. Calderbank. Quaternary quadratic residue codes
and unimodular lattices. IEEE Trans. Inform. Theory, 41:366–377, 1995.
[12] A. Bonnecaze, P. Solè, C. Bachoc, and B. Mourrain. Type ii codes over Z4 . IEEE
Trans. Inform. Theory, 43(3):969–976, 1997.
[13] S. Boztas, A. R. Hammons, and P. V. Kumar. 4-phase sequences with nearoptitum correlation properties. IEEE Trans. Inform. Theory, 38(3):1101–1113,
1992.
[14] A. R. Calderbank and G. Mcguire. Construction of a (64, 237, 12) code via galois
rings. Designs, Codes and Cryptography, 10:157–165, 1997.
[15] A. R. Calderbank and N. J. A. Sloane. Modular and p-adic cyclic codes. Designs,
Codes and Cryptography, 6:21–35, 1995.
[16] A. R. Calderbank and N. J. A. Sloane. Double circulant codes over Z4 and even
unimodular lattices. J. Alg. Combin., 6:119–131, 1997.
[17] A. R. Calderbank, W.-C. W. Li, and B. Poonen. A 2-adic approach to the analysis
of cyclic codes. IEEE Trans. Inform. Theory, 43(3):977–986, 1997.
[18] C. Carlet. On Z4 -duality. IEEE Trans. Inform. Theory, 41(5):1487–1494, 1995.
[19] C. Carlet. Z2k -linear codes. IEEE Trans. Info. Theory, 44(4):1543–1547, 1998.
[20] C. Carlet. One weight Z4 -linear code. In Lecture Notes in Computer Science,
1998. (To Appear).
[21] C. Charnes. Hadamard matrices, self-dual codes over the integers modulo 4 and
their gray images. In Lecture Notes in Computer Science, 1998. (To Appear).
68
[22] W. Chen and T. Klove. The weight hierarchies of q-ary codes of dimension 4.
IEEE Trans. Inform. Theory, 42(6):2265–2272, 1996.
[23] W. Chen and T. Klove. Weight hierarchies of linear codes satisfying the chain
condition. Designs, Codes and Cryptography, 11:47–66, 1998.
[24] W. Chen and T. Klove. Weight hierarchies of extremal non chain binary codes
of dimension 4. IEEE Trans. Inform. Theory, 45(1):276–281, 1999.
[25] J. C. Chiang and J. K. Wolf. On channels and codes for the lee metric. Inform.
Control, 19:159–173, 1971.
[26] J. H. Conway and N. J. A. Sloane. Self-dual codes over the integers modulo 4.
Jr. of Comb. Theory, Series A 62:30–45, 1993.
[27] H. Chung. The 2nd generalized hamming weight of double-error-correcting binary
bch codes and their dual. Lecture Notes in Computer Science, 539:118–129, 1991.
[28] P. Delsarte and J. M. Goethals. Alternating bilinear forms over gf (q). J. Comb.
Theory, 19:26–50, 1975.
[29] S. T. Dougherty, P. Gaborit, M. Harada, and P. Solé. Type ii codes over Fq +uFq .
IEEE Trans. Inform. Theory, 45(1):32–45, 1999.
[30] S. B. Encheva and H. E. Jensen. Optimal binary linear codes and Z4 -linearity.
IEEE Trans. Inform. Theory, 42(4):1216–1222, 1996.
[31] S. Encheva and T. Klove. Codes satisfying chain condition. IEEE Trans. Inform.
Theory, 40(1):175–180, 1994.
[32] S. Encheva. On binary linear codes which satisfy the two-way chain condition.
IEEE Trans. Inform. Theory, 42(3):1038–, 1996.
69
[33] J. Fields, P. Gaborit, J. S. Leon, and V. Pless. All self-dual codes of length 15 or
less are known. IEEE Trans. Inform. Theory, 44(1):311–322, 1998.
[34] J. Fields and P. Gaborit. On the non Z4 -linearity of certain good binary codes.
IEEE Trans. Inform. Theory, 45(5):1674–1677, 1999.
[35] R. A. Fisher. The theory of confounding in factorial experiments in relation to
the theory of groups. Ann. Eugenics, 11:341–353, 1942.
[36] R. A. Fisher. A system of confounding for factors with more than two alternatives,
giving completely orthogonal cubes and higher powers. Ann. Eugenics, 12:2283–
2290, 1945.
[37] G. D. Forney. Dimension/length profiles and trellis complexity of linear block
codes. IEEE Trans. Inform. Theory, 40(6):1741–1752, 1994.
[38] G. D. Forney, N. J. A. Sloane, and M. D. Trott. The nordstrom-robinson code is
the binary image of the octacode. In Coding and Quantization:DIMACS/IEEE
Workshop, Amer. Math. Soc., pages 19–26, October 19-21, 1992.
[39] P. Gaborit. Mass formulas for self-dual codes over Z4 and Fq + uFq rings. IEEE
Trans. Inform. Theory, 42(4):1222–1227, 1996.
[40] M. S. Garg. On Optimum Codes and their Covering Radii. PhD thesis, IIT Kanpur, India, 1990.
[41] M. J. E. Golay. Notes on digital coding. Proc. IEEE, 37:657, 1949.
[42] J. M. Goethals. Two dual families of nonlinear binary codes. Electronics Letters,
10:471–472, 1974.
[43] J. M. Goethals. Nonlinear codes defined by quadratic forms over gf (2). Inform.
Control, 31:43–74, 1976.
70
[44] S. W. Golomb and L. R. Welch. Algebraic coding and the lee metric. In Error
Correcting Codes, H.B. Mann Ed. New York Wiley, 1968.
[45] R. L. Graham and N. J. A. Sloane. On the covering radius of codes. IEEE Trans.
Inform. Theory, 31(3):385–401, 1985.
[46] F. Gray.
March 17, 1953. Pulse Code Communication, US Patent 2632058.
[47] M. Greferath and U. Vellbinger. Efficient decoding of Zpk -linear codes. IEEE
Trans. Inform. Theory, 44(3):1288–1291, 1998.
[48] M. Greferath and U. Vellbinger. On the extended error-correcting capabilities of
the quaternary preparta codes. IEEE Trans. Inform. Theory, 44(5):2018–2019,
1998.
[49] J. H. Griesmer. A bound for error-correcting codes. pages 532–542, 1960.
[50] T. A. Gulliver and M. Harada. Double circulant self-dual codes over Z2k . IEEE
Trans. Inform. Theory, 44(7), 1998.
[51] R. W. Hamming. Error detecting and error correcting codes. The Bell System
Tech. Journal, XXIX(2):147–160, 1950.
[52] A. R. Hammons, P. V. Kumar, A. R. Calderbank, N. J. A. Slonae, and P. Solé.
On the apparent duality of the kerdock and preparata codes. Lecture Notes in
Computer Science, 673, 1993.
[53] A. R. Hammons, P. V. Kumar, A. R. Calderbank, N. J. A. Sloane, and P. Solé.
The Z4 -linearity of kerdock, preparata, goethals, and related codes. IEEE Trans.
Inform. Theory, 40(2):301–319, 1994.
71
[54] M. Harada. New extremal type ii codes over Z4 . Designs, Codes and Cryptography, 13:271–284, 1998.
[55] P. Heijnen and R. Pellikaan. Generalized hamming weights of q-ary reed müller
codes. IEEE Trans. Inform. Theory, 44(1):181–196, 1998.
[56] G. A. Helfrich. Weight hierarchy of cyclic codes and their applications, 1991. MS
Thesis, Deptt. of Electrial Engineering, Lehigh University.
[57] T. Helleseth, B. Hove, and K. Yang. Further results on generalized hamming
weights for goethals and preparata codes over Z4 . IEEE Trans. Inform. Theory,
45(4):1255–1258, 1999.
[58] T. Helleseth and P. V. Kumar. The algebraic decoding of the Z4 - linear goethals
code. IEEE Trans. Inform. Theory, 41(6):2040–2048, 1995.
[59] T. Helleseth, T. Klove, and φ. Ytrehus. Generalized hamming weights of linear
codes. IEEE Trans. Inform. Theory, 38(3):1133–1140, 1992.
[60] T. Helleseth, T. Klove, V. I. Levenshtein, and φ. Ytrehus. Bounds on the minimum support weights. IEEE Trans. Inform. Theory, 41(2):432–439, 1995.
[61] T. Helleseth and T. Klove. The weight hierarchies of some product codes. IEEE
trans. Inform. Theory, 42(3):1029–1034, 1996.
[62] F. B. Hergert. On the delsarte-goethals codes and their formal duals. Disc. Math.,
83:249–263, 1990.
[63] X.-D. Hou, J. T. Lahtonen, and S. Koponen. The reed-müller code r(r, m) is not
Z4 -linear for 3 ≤ r ≤ m − 2. IEEE Trans. Inform. Theory, 44(2):798–799, 1998.
[64] W. C. Huffman. Decomposition and extremal type ii codes over Z4 . IEEE Trans.
Inform. Theory, 44(2):800–809, 1998.
72
[65] J. C. Interlando, R. P. Jr., and M. Elia. On the decoding of reed-solomon and bch
codes over integer residue rings. IEEE Trans. Inform. Theory, 43(3):1013–1020,
1997.
[66] H. Janwa. On the optimality and covering radius of some algebraic geometric
codes. In Workshop on Coding Theory, at Institute for Mathematics and Its Applications (IMA), University of Minnesota, July 13-24, 1988.
[67] G. Kabatianski. Generalized hamming weight and a problem in cryptography.
In All-Union winter Schools on Information Theory and Applications, Mtsensk,
Russia, 1992.
[68] P. Kanwar and S. R. Lopez-Permouth. Cyclic codes over integers modulo pm .
Finite Fields and their Applications, 3(4):334–352, 1997.
[69] T. Kasami, T. Tanaka, T. Fujiwara, and S. Lin. On the optimum bit orders with
respect to the state complexity of trellis diagrams for binary linear codes. IEEE
Trans. Inform. Theory, 39:242–245, 1993.
[70] A. M. Kerdock. A class of low-rate nonlinear codes. Inform. Control, 20:182–187,
1972.
[71] M. Klemm. Selbstduale codes über dem ring der ganzen zahlen modulo 4. Arch.
Math., 53:201–207, 1989.
[72] T. Klove. Support weight distribution of linear codes. Disc. Math., 106/107:311–
316, 1992.
[73] T. Klove. Minimum support weights of binary codes. IEEE Trans. Inform. Theory, 39(2):648–654, 1993.
73
[74] P. V. Kumar, T. Helleseth, A. R. Calderbank, and A. R. Hammons. Large family of quaternary sequence with low correlation. IEEE Trans. Inform. Theory,
42:579–592, 1996.
[75] C. Y. Lee. Some properties of nonbinary error-correcting codes. IEEE Trans.
Inform. Theory, 4:77–82, 1958.
[76] R. Lidl and H. Niederreiter. Introduction to Finite Fields and their Applications.
Cambridge Univ. Press, 1994.
[77] J. E. MacDonald. Design methods for maximum minimum-distance errorcorrecting codes. pages 43–57, 1960.
[78] B. R. Macdonald. Finite Rings with Identity. Marcel-Decker, New York, 1974.
[79] F. J. MacWillams and N. J. A. Sloane. Theory of Error-Correcting Codes. North
Holland, Amsterdam, 1977.
[80] F. J. MacWilliams. Error correcting codes for multi-level transmission. pages
281–308, 1961.
[81] J. L. Massey and T. M. Mittelholzer. Convolutions codes over rings. In Proceedings of the Fourth Joint Swedish-USSR Int. Workshop in Inform. Theory,
Sweden, 1989.
[82] E. E. Nemirovskiy. Codes on residue class rings with multi-frequency phase telegraphy. Radiotechnika I electronika, 9:1745–1753, 1984.
[83] A. W. Nordstrom and J. P. Robinson. An optitum nonlinear code. Inform. Control, 11:613–616, 1967.
[84] L. H. Ozarow and A. D. Wyner. Wire-tap channel ii. AT & T Bell Labs Tech.
J., 63:2135–2157, 1984.
74
[85] O. Perrön. Bemerkungen über die verteilung der quadratischen reste. Math. Zeit,
56:122–130, 1952.
[86] V. Pless, J. S. Leon, and J. Fields. All Z4 codes of type ii and length 16 are
known. Jr. Comb. Theory, Series A 78:32–50, 1997.
[87] V. Pless, P. Solé, and Z. Qian. Cyclic self-dual Z4 -codes. Finite Fields and Their
Applications, 3:48–69, 1997.
[88] V. Pless and Z. Qian. Cyclic codes and quadratic residue codes over Z4 . IEEE
Trans. Inform. Theory, 42(5):1594–1600, 1996.
[89] F. P. Preparata. A class of optimum nonlinear double-error-correcting codes.
Inform. Control, 13:378–400, 1968.
[90] E. M. Rains. Bounds for self-dual codes over Z4 . submitted to Fin. Fields Appl.
[91] E. M. Rains and N. J. A. Sloane. The shadow theory of modular and unimodular
lattices. J. Number Theory, 73:359–389, 1998.
[92] E. M. Rains and N. J. A. Sloane. Self-Dual Codes : The Handbook of Coding
Theory. North-Holland, New York, 1998.
[93] E. M. Rains. Optimal self-dual codes over Z4 . Discrete Math., 203:215–228,
1999.
[94] I. Reuven and Y. Be’ery. Generalized hamming weights of nonlinear codes and the
relation to the Z4 -linear representation. IEEE Trans. Inform. Theory, 45(2):713–
720, 1999.
[95] J. Rosenthal and E. V. York. On the generalized hamming weights of convolutional codes. IEEE Trans. Inform. Theory, 43(1):331–335, 1997.
75
[96] R. M. Roth and P. H. Siegel. Lee-metric bch codes and their application to constrained and partial-response channels. IEEE Trans. Inform. Theory, 40(4):1083–
1096, 1994.
[97] C. Satyanarayana. Lee metric codes over integer residue rings. IEEE Trans. Inform. Theory, 25(2):250–254, 1979.
[98] A. Sălăgean-Mandache. On the isometries between Zpk and Zkp . IEEE Trans.
Inform. Theory, 45(6):2146–2148, 1999.
[99] A. G. Shanbhag, P. V. Kumar, and T. Helleseth. Improved binary codes and sequence families from Z4 -linear codes. IEEE Trans. Inform. Theory, 42(5):1582–
1587, 1996.
[100] P. Shankar. On bch codes over arbitary integer rings. IEEE Trans. Inform. Theory, 25(4):480–483, 1979.
[101] C. E. Shannon. A mathematical theory of communication. Bell Sys. Tech. J.,
27:379–423 and 623–656, 1948.
[102] V. Sidorenko, I. Martin, and B. Honary. On the rectangularity of nonlinear block
codes. IEEE Trans. Inform. Theory, 45(2):720–725, 1999.
[103] N. J. A. Sloane. Algebraic coding theory: Recent developments related to the
integers mod 4. In Study of Algebraic Combinatorics (Proceedings Conference on
Algebraic Combinatorics, Kyoto 1993), pages 38–52, 1995.
[104] P. Solè. A quaternary cyclic code, and a family of quadriphase sequence with low
correlation properties. Springer Lecture Notes in Computer Science, 388:193–
201, 1989.
76
[105] G. Soloman and J. J. Stiffler. Algebraically punctured cyclic codes. Inform. Control, 8:170–179, 1965.
[106] E. Spiegel. Codes over Zm . Inform. Control, 35:48–51, 1977.
[107] E. Spiegel. Codes over Zm , revisited. Inform. control, 37:100–104, 1978.
[108] F. W. Sun and H. Leib. Multiple-phase codes for detection without carrier phase
reference. IEEE Trans. Inform. Theory, 44(4):1477–1491, 1998.
[109] B. S. Rajan. Transform Domain Study of Cyclic and Abelian Codes over Residue
Class Integer Rings. PhD thesis, Deptt. of Elec. Engg., IIT Kanpur, Kanpur,
India, 1989.
[110] P. D. Tiu and D. Wallace. Norm quadratic residue codes. IEEE Trans. Inform.
Theory, 40(3):946–949, 1994.
[111] L. G. Tallini and U. Vaccaro. Efficient m-ary balanced codes. Disc. Applied Math.,
92:17–56, 1999.
[112] V. V. Vazirani, H. Saran, and B. S. Rajan. An efficient algorithm for constructing minimal trellises for codes over finite abelian groups. IEEE Trans. Inform.
Theory, 42(6):1839–1854, 1996.
[113] Z. Wan. Quaternary Codes. World Scientific, Singapore, 1997.
[114] S. K. Wasan. On codes over Zm . IEEE Trans. Inform. Theory, 28(1):117–120,
1982.
[115] V. K. Wei. Generalized hamming weights for linear codes. IEEE Trans. Inform.
Theory, 37(5):1412–1418, 1991.
77
[116] V. K. Wei and K. Yang. On the generalized hamming weights of product codes.
IEEE Trans. Inform. Theory, 39(5):1709–1713, 1991.
[117] K. Yang, T. Helleseth, P. V. Kumar, and A. G. Shangbhag. On the weight
hierarchy of kerdock codes over Z4 . IEEE Trans. Inform. Theory, 42(5):1587–
1593, 1996.
[118] K. Yang and T. Helleseth. Two new infinite families of 3-designs from kerdock
codes over Z4 . Designs, Codes and Cryptography, 15:201–214, 1998.
[119] K. Yang and T. Helleseth. On the weight hierarchy of goethals codes over Z4 .
IEEE Trans. Inform. Theory, 44(1):304–307, 1998.