fisher and bose hamming and
play

Fisher and Bose, Hamming and We assume that, with high probability, - PDF document

Coding theory We wish to send words of length n over an alphabet A A with q over a noisy channel where errors can occur. Fisher and Bose, Hamming and We assume that, with high probability,


  1. ✆ ✄ ✁ � ✂ ✝ ✝ ✝ ✁ � � Coding theory We wish to send words of length n over an alphabet � A A with q over a noisy channel where errors can occur. Fisher and Bose, Hamming and We assume that, with high probability, not too many errors occur during transmission of a word. Golay The strategy is to send words from a code C , a Peter J Cameron subset of A n . We require: School of Mathematical Sciences Queen Mary and Westfield College 2 e 1 , we can (a) large minimum distance d : if d Londn E1 4NS correct up to e errors; p.j.cameron@qmw.ac.uk (b) many codewords (subject to (a)): the ☎ n ; transmission rate is log q � C (c) computationally efficient encoding and decoding (subject to (a) and (b)). 1 3 Hamming codes Factorial design R. A. Fisher, The theory of confounding in factorial experiments in relation to the theory of groups, Ann. Eugenics 11 (1942), 341–353. We are investigating n factors which can affect the yield of some process. The i th factor can take any � A i one of a set A i of levels, with q i . R. A. Fisher, A system of confounding for factors with more than two alternatives, giving completely orthogonal cubes and higher powers, Ann. Eugenics We assume that only the interactions of small 12 (1945), 2283–290. numbers of factors affect the yield significantly. We impose the structure of an abelian group on A i , M. J. E. Golay, Notes on digital coding, Proc. IEEE 37 (1949), 657. and test treatment combinations lying in a subgroup B of A 1 ✆ A n . R. W. Hamming, Error detecting and error correcting codes, Bell Systems Tech. J. 29 (1950), 147–160. 2 4

  2. ✆ ✟ ✝ ✝ � ✟ ✝ ✝ ✝ ✁ ☞ ☛ ☎ ✟ � ✟ ✆ ☞ ✆ ☞ ☛ ☎ ✝ ✝ ✝ ✆ ☞ ✁ Comparison Factorial design Design theorists and coding theorists are both looking for subsets C of A 1 ✆ A n with large Let C be the annihilator of B in A ✆ A ✞ n . (Here A ✞ 1 ✞ i is the group of characters of A i ; so C is the set of all minimum distance and large cardinality. characters of A i ✆ A n which are trivial on B .) Coding theorists have n large, all A i of the same size (almost always 2 ), and don’t insist on group structure Elements of C represent combinations of treatments (though it does help to use a linear code). which are confounded in the experiment. (For example, if an element of C has support in A ✠ A ✠ A ✞ k , then the interaction of factors j and k Statisticians have n fairly small, varying alphabet ✞ i ✞ j cannot be distinguished from the main effect of size, and do require group structure. factor i .) Hamming codes satisfy both specifications! 5 7 Hamming codes Factorial design ☛ k . Partition the non-zero vectors in V GF Let V ✡ q We want into equivlence classes, where two vectors are equivalent if one is a non-zero scalar multiple of the (a) Large weight in C so that potentially significant ✡ q k 1 1 ✡ q other. There are ☛ equivalence classes. combinations of factors are not confounded; Choose one vector from each equivalence class, and (b) Few trials (subject to (a)): trials are expensive! ✡ q k 1 1 let H be the k ✡ q ☛ matrix having these This means small B , and so large C : note that vectors as columns. (For simplicity, take all vectors q 1 ✝ q n � B whose first non-zero entry is 1 .) Then any two � C columns of H are linearly independent. (c) simple description which can be explained to The code C with parity check matrix H thus has experimenters and for which results can be analysed minimum weight 3 and so is 1 -error-correcting. This (subject to (a) and (b)). is the Hamming code H ✡ k ✌ q ☛ . 6 8

  3. ✁ ✝ ✁ ✘ � ✁ ✛ ✁ ✘ ✝ ✟ ✝ ✘ ✁ ✙ ✟ ☛ ☞ ✛ ✟ ✟ ✚ ☞ ✟ ✄ ✟ ✄ � ✄ ✚ ✛ ✚ ✎ ✁ ✘ ✘ ✛ � ✁ ☞ ✖ ☛ ✁ ✒ � ✏ ✘ ✄ ☎ ☞ ☛ ✁ ✁ ✎ ✁ � ✘ ✄ ✄ ✄ ✓ ✔ ✜ ✢ ✟ ✟ ✟ ✌ � ✘ ☎ ☞ ✟ ☛ ✟ ✕ ✓ ✁ ✒ ✁ An example Fisher’s Theorem on Minimal Confounding Fisher (1942) proved that: 5 and let the alphabet sizes be 2 ✌ 2 ✌ 2 ✌ 2 ✌ 4 . Let n 3 . A 2 n factorial scheme can be arranged in 2 n Take d ✍ p blocks of 2 p plots each, without confounding either main effects or 2 -factor interactions, provided that n 2 p . The sphere-packing bound gives 2 ✝ 2 ✝ 2 ✝ 2 ✝ 4 Subsequently (1945), he generalized this theorem and proved 8 � C 1 1 1 1 1 3 that: A π n factorial scheme can be arranged in π n ✍ p blocks of π p plots each, without confounding either The Singleton bound gives main effects or 2 -factor interactions, provided that 2 ✝ 2 ✝ 2 8 � C ✑ π p 1 1 n ✑ π D. J. Finney, An Introduction to the Theory of Experimental The Plotkin bound: Design , University of Chicago Press, Chicago, 1960. α 1 1 1 1 3 11 ✎ 3 2 2 2 2 4 4 (Here π is a prime power.) 11 3 ✡ 3 12 . � C so 4 9 11 Coding theory with mixed alphabets C is a code of length n and minimum distance d over ☎ 2 An example 1 alphabets of size q 1 ✌ q n . Let e ✡ d ✗ , and assume that q 1 q n . ✣ 0 ✌ 1 Take A 1 A 4 ✤ (the cyclic group of ✣ 0 order 2 ) and A 5 0 (the ✌ a ✌ b ✌ c ✤ with a b c Sphere-packing bound: Klein group of order 4 ). n ∏ q i i ✙ 1 � C Then C is e k ∑ ∑ ∏ 1 ✡ q i j 00000 ✙ 0 ✙ 1 k i 1 ✎ i k j 11110 0011 a Singleton bound: 1100 a ✒ d ✛ 1 n ∏ � C q i 0101 b ✙ 1 i 1010 b 0110 c Plotkin bound: Let n 1001 c ☎ q i ∑ α ✡ 1 1 ✙ 1 i α then α If d � C d ✡ d ☛ . 10 12

  4. ✟ ☞ ☞ ☞ ✤ ✁ ★ ✧ ✁ Codes and projective spaces Codes and projective spaces (b) The columns of A are a set S of n points in projective space PG 1 ✡ k ✌ q ☛ . Elementary row R. C. Bose, Mathematical theory of the symmetrical operations induce collineations of the projective a 8 (1947), 107–166. factorial design, Sankhy¯ space, while column permutations don’t change S . The set S spans PG 1 ✡ k ✌ q ☛ . R. C. Bose and J. N. Srivastava, On a bound useful in the theory of factorial design and error-correcting So 1 -error-correcting codes (up to equivalence) codes, Ann. Math. Statist. 35 (1964), 408–414. correspond naturally to spanning subsets of projective space (up to collineations). C. Greene, Weight enumeration and the geometry of linear codes, Studies in Applied Math. 55 (1976), The correspondence between codes and projective 119–128. spaces allows many properties to be transferred back and forth: 13 15 Codes and projective spaces 1. The Hamming codes correspond to the entire Codes and projective spaces projective space. The code/projective space connection can be regarded as a generalisation of ✆ n matrix over GF Let A be a k ✡ q ☛ . Assume that no the construction of Hamming codes. two columns are linearly dependent, and that A has rank k . 2. Supports of words of the dual code correspond to complements of hyperplane sections of S . (a) A is the parity check matrix of a ✥ n ✌ n k ✦ code ✣ v ☛ n : Av GF 0 C ✡ q 3. (Bose 1947) MDS codes (those which meet the Singleton bound) correspond to arcs in projective Elementary row operations don’t affect C ; column space. (This, and a bound on the size of arcs in permutations and scalar multiplications replace it by projective planes, are in Bose’s paper on factorial an equivalent code (metric properties are designs.) unaffected). The code C has minimum weight at least 3 , so is 1 -error-correcting. The corresponding 4. (Greene 1976) The weight enumerator of the code factorial design has q k treatments. is a specialisation of the Tutte polynomial of the matroid represented by the matrix. Hence the MacWilliams identities follow from matroid duality. 14 16

  5. ☞ ✁ An application We are given a set of n objects, containing one ‘active pair’. We can test any subset: the test is positive precisely when the subset contains both members of the active pair. How many tests are required to identify the active pair? (This problem arises in PCR tests in genetics: I learned about it from G. Gutin.) 17 An application 2 d 1 . Let H be the 2 d Suppose that n ✆ n parity check matrix of a 2 -error-correcting BCH code. For each row of H , test the sets of positions where 0 s occur and where 1 s occur in that row. From these tests we can determine the syndrome and hence the active pair. The number of tests is 4 d , which is just twice the information-theoretic lower bound. (And, if we get a positive result from a subset, we don’t have to test the complementary subset.) 18

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend