This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution and sharing with colleagues. Other uses, including reproduction and distribution, or selling or licensing copies, or posting to personal, institutional or third party websites are prohibited. In most cases authors are permitted to post their version of the article (e.g. in Word or Tex form) to their personal website or institutional repository. Authors requiring further information regarding Elsevier’s archiving and manuscript policies are encouraged to visit: http://www.elsevier.com/copyright

Author's personal copy

Discrete Mathematics 308 (2008) 4205 – 4211 www.elsevier.com/locate/disc

Good equidistant codes constructed from certain combinatorial designs K. Sinhaa , Z. Wangb , D. Wub,∗,1 a Department of Statistics, Birsa Agricultural University, Ranchi 834006, India b Department of Mathematics, Guangxi Normal University, Guilin 541004, China

Received 24 April 2007; received in revised form 6 August 2007; accepted 8 August 2007 Available online 1 October 2007

Abstract An (n, M, d; q) code is called equidistant code if the Hamming distance between any two codewords is d. It was proved that for any equidistant (n, M, d; q) code, d  nM(q − 1)/(M − 1)q(= dopt , say). A necessary condition for the existence of an optimal equidistant code is that dopt be an integer. If dopt is not an integer, i.e. the equidistant code is not optimal, then the code with d = dopt  is called good equidistant code, which is obviously the best possible one among equidistant codes with parameters n, M and q. In this paper, some constructions of good equidistant codes from balanced arrays and nested BIB designs are described. © 2007 Elsevier B.V. All rights reserved. Keywords: Equidistant code; Good equidistant code; Balanced array; Nested BIB design

1. Introduction It is well-known that combinatorial design theory and coding theory are closely related. Certain combinatorial structures have been used to construct good codes. Such example structures include balanced incomplete block (BIB) designs [22,12], symmetric BIB designs [18,12], resolvable BIB designs [11,7,13], nested BIB designs [14], group divisible designs [8], difference matrix [3], generalized Hadamard matrices [9], balanced bipartite weighing designs [16], etc. The relationship between orthogonal arrays and codes was summarized in [6]. For a good survey on the interaction of designs and codes, the interested reader is referred to [20,21]. In this paper, a code C of length n over an alphabet Fq of size q (or a q-ary code) means a subset C ⊆ Fqn of the set of all n-tuples with components from Fq . The elements in C are the codewords of the code C. The set Fqn becomes a metric space when equipped with the Hamming distance d(x, y) = |{i : xi  = yi , 1i n}|

for x = (x1 , x2 , . . . , xn ), y = (y1 , y2 , . . . , yn ), x, y ∈ Fqn .

An important parameter of a code C is its minimum distance d where d = minx,y∈C,x=y d(x, y). An (n, M, d; q) code represents a q-ary code with length n, size M = |C|, and minimum Hamming distance d. An (n, M, d; q) code is equidistant if the distance between any two codewords is d. ∗ Corresponding author.

E-mail addresses: [email protected], [email protected] (D. Wu). 1 Research supported in part by NSFC (10561002) and Guangxi Science Foundation (0640062).

0012-365X/$ - see front matter © 2007 Elsevier B.V. All rights reserved. doi:10.1016/j.disc.2007.08.022

Author's personal copy

4206

K. Sinha et al. / Discrete Mathematics 308 (2008) 4205 – 4211

Theorem 1.1 (Semakov and Zinoviev [11], Tonchev [19]). For any equidistant (n, M, d; q) code, d nM(q−1)/(M − 1)q, where the equality is achieved if and only if M is a multiple of q and each of the symbols 0, 1, . . . , q − 1 occurs exactly M/q times in each column of the M × n matrix formed by the codewords. In an (n, M, d; q) code, let Aq (n, d) denote the maximum value of M when n, q, d are fixed. A bound for Aq (n, d) is presented in [2]. An equidistant code that achieves the equality in Theorem 1.1 is said to be optimal. Theorem 1.2 (Semakov and Zinoviev [11]). An optimal equidistant (n, M, d; q) code exists if and only if there exists a resolvable BIB design with parameters v = M, k = M/q,  = n − d, r = n. A necessary condition for the existence of an optimal equidistant code is that dopt is an integer. If dopt is not an integer, i.e. the equidistant code is not optimal, then the code with d = dopt  is called good equidistant code, which is obviously the best possible one among equidistant codes with parameters n, M and q. In this paper, we shall consider the problem of constructing good equidistant codes from a combinatorial viewpoint. Since optimal equidistant codes are equivalent to certain resolvable BIB designs, the reader interested in optimal equidistant codes should refer to [5], say, for the results on resolvable BIB designs. We shall mainly concentrate on the construction of good equidistant codes from a design-theoretic perspective. We shall make use of a trivial equivalence between an equidistant code and a new combinatorial array called an equidistant array to construct equidistant codes. Then we describe constructions for equidistant arrays from balanced array and the nested BIB designs defined by Preece [10]. A construction for such nested BIB designs from orthogonal Latin squares is also presented. This in turn gives us one infinite series of good equidistant codes.

2. Equidistant codes and equidistant arrays In this section, we describe a trivial equivalence between an equidistant code and an equidistant array. Let S={e0 , e1 , . . . , es−1 } be a set of s elements, and X be the set of all t-dimensional column vectors x=(x, x, . . . , x)T with x ∈ S. An equidistant array of strength t, denoted by EA(m, n, s, t), over S is an m × n matrix E with entries from S such that in any t × n submatrix E  of E, the values x∈X (x) is a constant independent of the chosen submatrix the number of times the t-vector y = (y1 , y2 , . . . , yt )T , yi ∈ S, 1 i t, occurs as a column in E  . E  , where (y) is  The invariant c = x∈X (x), x = (x, x, . . . , x)T ∈ X, is called the coincidence number of the equidistant array. An orthogonal array OA (t, q, n), with strength t, is an n × q t array of q symbols such that, in any t rows of the array, every one of the possible q t tuples of q symbols occurs in exactly  columns. If  = 1, this array is denoted by OA(t, q, n). A balanced array BA(b, m, s, t){x1 ···xt } is an m × b matrix B with elements belonging to a set {0, 1, . . . , s − 1} of s symbols, m constraints, b assemblies, and strength t, such that every t × b submatrix of B contains the ordered t × 1 column vector (x1 , . . . , xt )T , x1 ···xt times, where x1 ···xt is invariant under any permutation of x1 , . . . , xt . It is easy to see that equidistant arrays are generalizations of orthogonal arrays and balanced arrays. In an orthogonal array of strength t, (y) = (z) for any t-dimensional column vectors y = (y1 , y2 , . . . , yt )T , z = (z1 , z2 , . . . , zt )T , yi , zi ∈ S, 1i t. In a balanced array of strength t, (y) is a constant equal to ((y)) for any t-dimensional column vector y = (y1 , y2 , . . . , yt )T , yi ∈ S, 1i t, and for any permutation  of order t, independent of the chosen t-rowed submatrix. Clearly in both cases, the sum x∈X (x) is a constant independent of the chosen t-rowed submatrix, where x = (x, x, . . . , x)T ∈ X, x ∈ S. Let E be an EA(m, n, s, 2) over S. By identifying the m rows of E as codewords, we obtain an equidistant (n, m, d; s)  code with the Hamming distance d = n − x∈X (x). Conversely, if C is an equidistant (n, M, d; q) code over an alphabet Fq , then the matrix formed by all the codewords of C is clearly an equidistant array EA(M, n, q, 2) over Fq where the sum x∈X (x) = n − d. Summarizing the above, we obtain an equivalence between an equidistant code and an equidistant array. Theorem2.1. An equidistant array EA(m, n, s, 2) over S is equivalent to an equidistant (n, m, d; s) code over S with d = n − x∈X (x), where X = {(x, x)T : x ∈ S}.

Author's personal copy

K. Sinha et al. / Discrete Mathematics 308 (2008) 4205 – 4211

4207

Therefore, in order to construct equidistant codes, we need only to construct their corresponding equidistant arrays. 3. Balanced arrays and equidistant codes In this section, we will give a construction of equidistant codes via balanced arrays. The following result is clear from the definition of a balanced array. Lemma 3.1. If there  exists a BA(b, m, s, 2){x1 x2 } on an s symbol set S, then there exists an equidistant (b, m, d; s) code, where d = b − x∈S xx . In [15], a rectangular design is used to construct balanced arrays. A rectangular design is an arrangement of v = mn treatments in b blocks such that (1) each block contains k distinct treatments, k < v, (2) each treatment occurs in exactly r blocks, (3) the mn treatments are arranged in a rectangle of m rows and n columns such that any two treatments in the same row(column) occur together in 1 (2 ) blocks, respectively, and in 3 blocks otherwise. The following result was stated in [15]. Lemma 3.2. The existence of a rectangular design with parameters v = mn, b, r, k(< m), 1 = 0, 2 , 3 implies the existence of a BA(b, m, n + 1, 2){ii = 2 , 0 i n − 1; ij = 3 , 0 i = j n − 1; in = ni = r − 2 − (n − 1)3 , 0 i n − 1; nn = b − 2nr + n2 + n(n − 1)3 }. The following result was stated in [17]. Lemma 3.3. There exists a rectangular design with parameters v = ms, b = s(s − 1), r = s − 1, k = m, 1 = 2 = 0, 3 = 1, m, n = s, where 2 m p w and s = p w , p being a prime. Taking m = s in Lemma 3.3, and then from Lemmas 3.1 and 3.2, we obtain an equidistant (s(s − 1), s, d; s + 1)  code, where d = b − s−1  x=0 xx − ss = b − s2 − (b − 2sr + s2 + s(s − 1)3 ) = s(s − 1). So, we obtain the following result. Theorem 3.4. If s = p w is a prime power, then there exists an equidistant (s(s − 1), s, s(s − 1); s + 1) code. For the above equidistant (s(s − 1), s, s(s − 1); s + 1) code,       nM(q − 1) s(s − 1)s(s + 1 − 1) s(s − 1)(s + 1) + s dopt  = = = = s(s − 1). (M − 1)q (s − 1)(s + 1) (s + 1) The equidistant code is good. So, we have the following result. Corollary 3.5. If s = p w is a prime power, then there exists a good equidistant (s(s − 1), s, s(s − 1); s + 1) code. 4. Nested BIB designs and equidistant codes 4.1. Nested BIB designs and equidistant arrays In this section, we describe a construction for equidistant arrays from the nested BIB designs introduced to the statistical literature by Preece [10]. Let v, k1 , k2 , 1 , 2 be positive integers such that v k1 > 1 and k2 > 1 divides k1 . A (v; k1 , 1 ; k2 , 2 ) nested BIB design is a triple (V, B1 , B2 ) where (1) V is a v-set of elements called points;

Author's personal copy

4208

K. Sinha et al. / Discrete Mathematics 308 (2008) 4205 – 4211

(2) B1 and B2 are collections of k1 -subsets (called super-blocks) and k2 -subsets (called sub-blocks) of V, respectively, where each super-block of B1 is partitioned into k1 /k2 sub-blocks having k2 elements each such that the resulting collection B1 of sub-blocks coincides with the collection B2 ; and (3) for every pair of distinct points x, y ∈ V, there are 1 super-blocks and 2 sub-blocks containing x and y, respectively. The following combinatorial properties of a (v; k1 , 1 ; k2 , 2 ) nested BIB design can be easily obtained. Lemma 4.1. In a (v; k1 , 1 ; k2 , 2 ) nested BIB design, each point is contained, respectively, in exactly r=

1 (v − 1) 2 (v − 1) = k1 − 1 k2 − 1

super-blocks and sub-blocks, and there are altogether b1 =

1 v(v − 1) k1 (k1 − 1)

super-blocks and b2 =

2 v(v − 1) k2 (k2 − 1)

sub-blocks, where k2 b1 = . k1 b2 Preece’s nested BIB designs can be used to construct equidistant arrays, as the following shows. Theorem 4.2. If there exists a (v; k1 , 1 ; k2 , 2 ) nested BIB design, then there exists an equidistant array EA(v, b1 , 1+ k1 /k2 , 2) with coincidence number c = b1 − 2r + 1 + 2 . Proof. Let (V, B1 , B2 ) be a (v; k1 , 1 ; k2 , 2 ) nested BIB design. Then a v × b1 matrix E = (exw ) is defined as  i if a point x of V occurs in the ith sub-block of the wth super-block of B1 , exw = 0 otherwise. Let E  be any two-rowed submatrix of E corresponding to two points, 2 , from the definition of  say, x and y. Let s = k1 /k a (v; k1 , 1 ; k2 , 2 ) nested BIB design, it is immediately seen that 1  i  s ((i, i)T )=2 and 1  i=j  s ((i, j )T )=   1 − 2 . Since every point of V occurs in precisely r super-blocks in B1 , 1  i  s ((0, i)T ) = 1  i  s ((i, 0)T ) = r − 1 . So the vector (0, 0)T occurs b1 − 2(r − 1 ) − 2 − (1 0 − 2 ) = b1 − 2r + 1 times. Therefore, E is an EA(v, b1 , 1 + k1 /k2 , 2) with coincidence number c = b1 − 2r + 1 + 2 .



4.2. Constructions of nested BIB designs from mutually orthogonal Latin squares A Latin square of order n with entries from an n-set X is an n × n array L in which every cell contains an element of X such that every row of L is a permutation of X and every column of L is a permutation of X. Without loss of generality, we may assume X = {1, 2, . . . , n}. An idempotent Latin square L = (lx,y ) is one in which lx,x = x for all x ∈ X. A symmetric Latin square L = (lx,y ) is one in which lx,y = ly,x for all x, y ∈ X. Two Latin squares L1 and L2 of the same order defined over X and Y, respectively, are orthogonal if for every x ∈ X and for every y ∈ Y , there is a unique cell (i, j ) such that L1 (i, j ) = x and L2 (i, j ) = y. A set of Latin squares of order n, L1 , L2 , . . . , Lm is mutually orthogonal, or a set of m MOLS(n), if for every 1i < j m, Li and Lj are orthogonal. If L1 , L2 , . . . , Lm are further idempotent

Author's personal copy

K. Sinha et al. / Discrete Mathematics 308 (2008) 4205 – 4211

4209

Latin squares, then they are denoted by m idempotent MOLS(n). A self-orthogonal Latin square (SOLS) is a Latin square that is orthogonal to its transpose. A k SOLSSOM(n) is a set {S1 , S2 , . . . , Sk } of self-orthogonal Latin squares, together with a symmetric Latin square M, for which {Si , SiT : 1 i k} ∪ {M} is a set of (2k + 1) MOLS(n). MOLSs and SOLSSOMs have been extensively studied. For example, the following results can be found in [1,4], respectively. em Lemma 4.3 (Abel et al. [1]). If n=p1e1 p2e2 · · · pm where each pi is a prime, then I (n)  min{piei −2 : i =1, 2, . . . , m}, where I (n) is the maximum number of idempotent Latin squares in a set of idempotent MOLS(n).

Lemma 4.4 (Finizio [4]). For any odd prime power q and for any odd integer k q, there exist (k−3)/2 SOLSSOM(q). Now we describe two constructions for nested BIB designs from mutually orthogonal Latin squares. Theorem 4.5. Let k1 and k2 > 1 be two integers such that k2 divides k1 . If there exist (k1 − 2) idempotent MOLS(v), then there exists a (v; k1 , k1 (k1 − 1); k2 , k1 (k2 − 1)) nested BIB design. Proof. Let X = {1, 2, . . . , v}. Take (k1 − 2) idempotent MOLS(v) based on X, A1 = (aij1 ), . . . , Ak1 −2 = (aijk1 −2 ) for

1 i, j v, where 1 aijl v,1l k1 − 2. Let B1 = {{i, j, aij1 , . . . , aijk1 −2 } : 1i, j v, i  = j }. Then divide each super-block of B1 into k1 /k2 mutually spanning disjoint sub-blocks of size k2 to obtain B2 . It can be easily verified from the definition of (k1 − 2) idempotent MOLS(v) that (X, B1 , B2 ) forms a (v; k1 , k1 (k1 − 1); k2 , k1 (k2 − 1)) nested BIB design.  Theorem 4.6. Let k1 and k2 > 1 be two integers such that k2 divides k1 . If there exist (k1 − 3)/2 SOLSSOM(v), where v is an odd integer, then there exists a (v; k1 , k1 (k1 − 1)/2; k2 , k1 (k2 − 1)/2) nested BIB design.

Proof. Let X ={1, 2, . . . , v}. Since v is odd, we take (k1 −3)/2 SOLSSOM(v) based on X, A1 =(aij1 ), . . . , A(k1 −3)/2 = (k −3)/2

(k −3)/2

(k −3)/2

1 1 )=(a 1 )=AT , . . . , B ), B1 =(bij )=(aj i 1 )=AT(k1 −3)/2 , and the symmetric orthogonal (aij 1 (k1 −3)/2 =(bij ji 1 l , c v, 1 l (k −3)/2, and without loss of generality, we may assume that mate C=(cij ), 1i, j v, 1 aijl , bij ij 1

(k −3)/2

aii1 =· · ·=aii 1

(k −3)/2

=bii1 =· · ·=bii 1

(k −3)/2

=cii =i for all i, 1 i v. Let B={{i, j, aij1 , . . ., aij 1

(k −3)/2

1 , . . ., b 1 , bij ij

,

(k −3)/2 1 (k −3)/2 , bij , . . . , bij 1 , cij } cij }:1i, j v, i =j }. Observe that for each cell (i, j ), the k1 -tuple {i, j, aij1 , . . . , aij 1 (k −3)/2 (k −3)/2 (k −3)/2 (k −3)/2 1 = , bj1i , . . . , bj i1 , cj i }, since aij1 = bj1i , . . . , aij 1 = bj i 1 , bij equals the k1 -tuple {j, i, aj1i , . . . , aj i 1 (k −3)/2 (k −3)/2 = aj i 1 , and cij = cj i for all i, j , 1 i, j v, which corresponds to another cell (j, i). Then eliminate aj1i , bij 1

one of these two k1 -tuples from B to obtain B1 , and divide each super-block of B1 into k1 /k2 mutually spanning disjoint sub-blocks of size k2 to obtain B2 . It can be easily verified from the definition of (k1 − 3)/2 SOLSSOM(v) that (X, B1 , B2 ) forms a (v; k1 , k1 (k1 − 1)/2; k2 , k1 (k2 − 1)/2) nested BIB design.  Applying Theorem 4.5 with Lemma 4.3, we obtain the following result: Corollary 4.7. For any prime power q, for any integer k1 q, and for any integer k2 > 1 such that k2 divides k1 , there exists a (q; k1 , k1 (k1 − 1); k2 , k1 (k2 − 1)) nested BIB design. Applying Theorem 4.6 with Lemma 4.4, we obtain the following result: Corollary 4.8. For any odd prime power q, for any odd integer k1 q, and for any integer k2 > 1 such that k2 divides k1 , there exists a (q; k1 , k1 (k1 − 1)/2; k2 , k1 (k2 − 1)/2) nested BIB design. 4.3. Equidistant codes constructed from nested BIB designs In this section, we give a further discussion on the equidistant codes constructed from nested BIB designs.

Author's personal copy

4210

K. Sinha et al. / Discrete Mathematics 308 (2008) 4205 – 4211

By combining Theorems 2.1 and 4.2, we obtain the following result: Theorem 4.9. Let k1 and k2 > 1 be two integers such that k2 divides k1 . If there exists a (v; k1 , 1 ; k2 , 2 ) nested BIB design, then there exists an equidistant (b1 , v, 2r − 1 − 2 ; 1 + k1 /k2 ) code. We use Theorem 4.2 to construct an equidistant (21, 7, 16; 3) code. Before we do this, some notation is needed. Let V be an abelian group, B = {x1 , x2 , . . . , xk } be a subset of V. Define dev B = {B + v : v ∈ V}, where B + v = {x1 + v, x2 + v, . . . , xk + v}. Let V = Z7 , B1 = {dev Bi : 1 i 3}, where B1 = {0, 1, 2, 4}, B2 = {0, 1, 2, 5}, B3 = {0, 2, 1, 4}. Let B2 = {dev Cj : 1 j 6}, where C1 = {0, 1}, C2 = {2, 4}, C3 = {0, 1}, C4 = {2, 5}, C5 = {0, 2}, C6 = {1, 4}. It is easy to check that (V, B1 , B2 ) is a (7; 4, 6; 2, 2) nested BIB design. The following seven codewords from this design form an equidistant (21, 7, 16; 3) code C: 100202110200211002012, 110020211020022100201, 211002021102001210020, 021100202110200121002, 202110000211022012100, 020211020021100201210, 002021102002110020121. Note that for C, dopt  = nM(q − 1)/(M − 1)q = 21 × 7 × (3 − 1)/(7 − 1)3 = 16, which means that C is a good equidistant (21, 7, 16; 3) code. We can show that there is no equidistant (21, 8, 16; 3) code. Otherwise, dopt = nM(q − 1)/(M − 1)q = 21 × 8 × (3 − 1)/(8 − 1)3 = 16 is an integer, and hence the code is optimal. By Theorem 1.1, M = 8 should be a multiple of q = 3, a contradiction. Now we compare d = 2r − 1 − 2 in Theorem 4.9 with dopt in Theorem 1.1. Here dopt − d =

b1 vk 1 /k2 − 2r + 1 + 2 (v − 1)(1 + k1 /k2 )

=

2 (v − 1) k1 − 1 2 v 2 −2 +  2 + 2 (k2 − 1)(k1 + k2 ) k2 − 1 k2 − 1

=

2 (v − k1 − k2 )2 . (k2 − 1)(k1 + k2 )

By Theorem 1.1, the code in Theorem 4.9 is an optimal equidistant code if and only if v=k1 +k2 . When v = k1 +k2 , there is no possibility to obtain any optimal equidistant codes. But if dopt −d < 1, then this code will be a good equidistant code.  Here dopt − d < 1 means 2 (v − k1 − k2 )2 < (k2 − 1)(k1 + k2 ), which implies |v − (k1 + k2 )| < (k2 − 1)(k1 + k2 )/2 .  Therefore, when |v − (k1 + k2 )| < (k2 − 1)(k1  + k2 )/2 , this code is a good equidistant (1 + k1 /k2 )-ary code. √ In Corollary 4.7, 1√ < k2 k1 , 2 = k1 (k2 − 1), (k2 − 1)(k1 + k2 )/2 = (1 + k2 /k1 ). Let q = k1 + k2 + 1, Since √ 1 < (1 + k2 /k1 ) 2, then we obtain the following result. Theorem 4.10. Let q be a prime power, k1 q an integer, k2 > 1 an integer such that k2 divides k1 . If q = k1 + k2 + 1, then there exists a good equidistant (q(q − 1), q, 2k1 q − k1 (k1 + k2 ); 1 + k1 /k2 ) code. Let k > 1 be an integer, k2 = k, k1 = 3k, q = k1 + k2 + 1 = 4k + 1 be a prime power, then from Theorem 4.10, we can obtain a series of good equidistant (4k(4k + 1), 4k + 1, 6k(2k + 1); 4) codes. Similarly, from Corollary 4.8, we obtain the following result. Theorem 4.11. Let q be an odd prime power, k1 q an odd integer, k2 > 1 an integer such that k2 divides k1 . If q = k1 + k2 + 1, then there exists a good equidistant (q(q − 1)/2, q, k1 q − k1 (k1 + k2 )/2; 1 + k1 /k2 ) code. Acknowledgements The authors wish to thank Dr. Y. Miao for his helpful discussions.

Author's personal copy

K. Sinha et al. / Discrete Mathematics 308 (2008) 4205 – 4211

4211

References [1] R.J.R. Abel, A.E. Brouwer, C.J. Colbourn, J.H. Dinitz, Mutually orthogonal Latin squares (MOLS), in: C.J. Colbourn, J.H. Dinitz (Eds.), The CRC Handbook of Combinatorial Designs, CRC Press, Boca Raton, FL, 1996, pp. 111–142. [2] G.T. Bogdanova, A.E. Brouwer, S.A. Kapralov, P.R.J. Ostergard, Error-correcting codes over an alphabet of four elements, Designs Codes Cryptography 23 (2001) 333–342. [3] G.T. Bogdanova, T. Todorov, V.A. Zinoviev, On construction of q-ary equidistant codes, in: Proceedings of the ACCT’2006, Russia, 2006, pp. 31–35. [4] N.J. Finizio, SOLS with a symmetric orthogonal mate (SOLSSOM), in: C.J. Colbourn, J.H. Dinitz (Eds.), The CRC Handbook of Combinatorial Designs, CRC Press, Boca Raton, FL, 1996, pp. 447–452. [5] S.C. Furino, Y. Miao, J. Yin, Frames and Resolvable Designs: Uses, Constructions, and Existence, CRC Press, Boca Raton, FL, 1996. [6] A.S. Hedayat, N.J.A. Sloane, J. Stufken, Orthogonal Arrays, Springer, New York, 1999. [7] S.J. Johnson, S.R. Weller, Resolvable 2-designs for regular low-density parity-check codes, IEEE Trans. Inform. Theory 51 (2003) 1413–1419. [8] S. Kageyama, Y. Miao, Two classes of q-ary codes based on group divisible association schemes, Discrete Math. 195 (1999) 269–276. [9] C. McKanzie, J. Seberry, Maximal q-ary codes and Plotkin’s bound, Ars Combin. 26 (1988) 37–50. [10] D.A. Preece, Nested balanced incomplete block designs, Biometrika 54 (1967) 479–486. [11] N.V. Semakov, V.A. Zinoviev, Equidistant q-ary codes with maximal distance and resolvable balanced incomplete block designs, Problemi Peredatchi Informatsii 4 (1968) 3–10. [12] N.V. Semakov, V.A. Zinoviev, Constant weight codes and tactical configurations, Problems Inform. Transmission 5 (1969) 29–38. [13] N.V. Semakov, V.A. Zinoviev, G.V. Zaitsev, Class of q-ary equidistant codes, Problems Inform. Transmission 5 (1969) 84–87. [14] K. Sinha, A class of q-ary codes, Discrete Math. 126 (1994) 439–440. [15] K. Sinha, V. Dhar, G.M. Saha, S. Kageyama, Balanced arrays of strength two from block designs, J. Combin. Designs 10 (2002) 303–312. [16] K. Sinha, R.K. Mitra, Construction of nested balanced block designs, rectangular designs and q-ary codes, Ann. Combin. 3 (1999) 71–80. [17] K. Sinha, M.K. Singh, S. Kageyama, R.S. Singh, Some series of rectangular designs, J. Statist. Plann. Inference 106 (2002) 39–46. [18] D.R. Stinson, G.H.J. van Rees, The equivalence of certain equidistant binary codes and symmetric BIBDs, Combinatorica 4 (1984) 357–362. [19] V.D. Tonchev, Combinatorial Configurations: Designs, Codes, Graphs, Longman, Wiley, New York, 1988. [20] V.D. Tonchev, Codes, in: C.J. Colbourn, J.H. Dinitz (Eds.), The CRC Handbook of Combinatorial Designs, CRC Press, Boca Raton, FL, 1996, pp. 517–543. [21] V.D. Tonchev, Codes and designs, in: V.S. Pless, W.C. Huffman (Eds.), Handbook of Coding Theory II, North-Holland, Amsterdam, 1998, pp. 1229–1268. [22] B. Vasic, E.M. Kurtas, A.V. Kuznetsov, Kirkman systems and their application in perpendicular magnetic recording, IEEE Trans. Inform. Theory 38 (2002) 1705–1710.

This article appeared in a journal published by Elsevier ...

article (e.g. in Word or Tex form) to their personal website or institutional repository. ... Certain combinatorial structures have been used to construct good codes.

303KB Sizes 2 Downloads 90 Views

Recommend Documents

This article appeared in a journal published by ... - Kenny Coventry
contrasts – e.g., here is this room vs. here in this galaxy”. (Kemmerer, 2006 .... played in Table 14. A 4 (Distance) x 3 (Actor) x 2 (Tool use) x 2 (Addressee.

This article appeared in a journal published by ...
Apr 7, 2009 - Most networks had a linear ND–CC relationship with a minimum CC value of 0.41. Hence .... study site); (C) Arctic animals, Greenland (Olesen, J.M., Elberling, H., ..... Centrality in social networks, conceptual clarification. Soc.

This article appeared in a journal published by ...
Feb 6, 2010 - The ESR (electron spin reso- nance) dating method is ... remains, limiting the application of ESR dating to the calcretes. (assuming that they are ...

This article appeared in a journal published by ...
[8] was time hopping with data modulation accomplished by additional pulse position modulation at the ... many pulse per data symbol. ..... Networks, Inc; 2000.

This article appeared in a journal published by ...
institutional investors, in particular foreign institutional investors .... In 2008, the non-U.S. firms in our sample account for 71% of the world .... Singapore. 53. 59.

This article appeared in a journal published by Elsevier ...
Dec 8, 2011 - We thank BYK Chemie Company, Momentive per- formance materials, Kuraray America ... [15] Seo MK, Park SJ. Bull Korean Chem Soc 2009 ...

This article appeared in a journal published by Elsevier ...
requested token signatures according to the outcome of this monitoring. ...... casts an accusation packet including all digital signatures through the network to ...

This article appeared in a journal published by Elsevier ...
c Sony Computer Science Laboratories, 3-14-13 Higashigotanda, Shinagawa-ku, Tokyo, 141-0022, Japan d Statistics ... Available online 15 July 2011. Keywords .... of D. The stationarity is determined at a conventional significance level of 5%.

This article appeared in a journal published by Elsevier ...
and education use, including for instruction at the authors institution ... Article history: ... tive areas in the STI technology are sloped at 70°–85° in order to.

This article appeared in a journal published by Elsevier ...
Sep 2, 2008 - and education use, including for instruction at the authors institution and sharing ... b Norwegian University of Science and Technology, Norway.

This article appeared in a journal published by Elsevier ...
websites are prohibited. ... article (e.g. in Word or Tex form) to their personal website or institutional ... self in the distorted language, in the lack of social respon-.

This article appeared in a journal published by Elsevier ...
Sep 16, 2009 - article (e.g. in Word or Tex form) to their personal website or .... Note: Data are from the Annual Social and Economic Supplement (March.

This article appeared in a journal published by Elsevier.
and education use, including for instruction at the authors institution ... Interface Nano Technology (HINT), Department of Chemical Engineering, Sungkyunkwan ...

This article appeared in a journal published by Elsevier ...
abstract. The benefits of multisensor fusion have motivated research in this area in recent years. ... bandelet, curvelet, and contourlet transform for image fusion.

This article appeared in a journal published by Elsevier ...
and education use, including for instruction at the authors institution and sharing with colleagues .... 2.4.1. Degree Centrality. Network nodes (actor) which directly linked to a specific node are in the neighborhood of that specific node. The numbe

This article appeared in a journal published by Elsevier ... - Andrea Moro
Sep 16, 2011 - model on a sample of women extracted from the CPS. The model parameters are empirically ... 2 For example, using the 2008 March Current Population Survey (CPS), a representative sample of US workers, ...... not value flexibility (by th

This article appeared in a journal published by Elsevier ...
Aug 9, 2012 - A case study using amphibians. Joseph R. Milanovicha,∗, William E. ... land managers and conservation biologists that need a tool for modeling biodiversity. Species distribu- tion models did project relative species richness well in u

This article appeared in a journal published by Elsevier ...
21 Mar 2011 - The top-down (or temperament) approach emphasizes direct associations .... not report their gender) of typical college age (M = 25.02.42, ... determine the unique variance in life satisfaction explained by. Big Five personality traits c

This article appeared in a journal published by Elsevier ...
Support from research grants MICINN-ECO2009-11857 and. SGR2009-578 ..... the Sussex Energy Group for the Technology and Policy Assessment function of.

This article appeared in a journal published by Elsevier ...
Available online 8 January 2009. This work was presented in parts at ...... The comparison between different phospholipid classes was recently reported using ...

This article appeared in a journal published by Elsevier ...
a High Voltage Laboratory, School of Electrical and Computer Engineering, National Technical University of Athens, 9, Iroon Politechniou Str.,. 15780 Zografou ...

This article appeared in a journal published by Elsevier ...
May 6, 2008 - and the children heard them through headphones. ..... discrimination scores (i.e., those collected for the stimulus pairs straddling the phone-.

This article appeared in a journal published by Elsevier ...
May 9, 2012 - In this section, we describe a broad class of hierarchical generative ...... Upper-left: the best fit of the ANOVA (y-axis) is plotted against the actual observed ...... This section deals with the derivation of the lagged states' poste

This article appeared in a journal published by Elsevier ...
journal homepage: www.elsevier.com/locate/matchemphys. Materials science ... cross-section of individual silver nanoparticles make them ideal candidates for ...