On normal and subnormal q-ary codes
The authors extend to the q-ary case the notions of a normal code, a subnormal code, and the amalgamated direct sum construction, in order to investigate problems related to the covering radius of codes. For example, the authors prove that every nonbinary nontrivial perfect code is absubnormal. They...
Saved in:
Published in | IEEE transactions on information theory Vol. 35; no. 6; pp. 1291 - 1295 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
New York, NY
IEEE
01.11.1989
Institute of Electrical and Electronics Engineers |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The authors extend to the q-ary case the notions of a normal code, a subnormal code, and the amalgamated direct sum construction, in order to investigate problems related to the covering radius of codes. For example, the authors prove that every nonbinary nontrivial perfect code is absubnormal. They also include some linear-programming lower bounds on ternary codes with covering radius 2 or 3.< > |
---|---|
AbstractList | The authors extend to the q-ary case the notions of a normal code, a subnormal code, and the amalgamated direct sum construction, in order to investigate problems related to the covering radius of codes. For example, the authors prove that every nonbinary nontrivial perfect code is absubnormal. They also include some linear-programming lower bounds on ternary codes with covering radius 2 or 3.< > |
Author | Lobstein, A.C. van Wee, G.J.M. |
Author_xml | – sequence: 1 givenname: A.C. surname: Lobstein fullname: Lobstein, A.C. organization: Telecom, Paris, France – sequence: 2 givenname: G.J.M. surname: van Wee fullname: van Wee, G.J.M. |
BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=6928287$$DView record in Pascal Francis |
BookMark | eNo9j01LAzEYhINUsK2CV28LevCSmjffOUqpH1DoRc9Lkn0XVrbZmujBf-_qlp6GYR6GmQWZpSEhIdfAVgDMPYBdScWtOiNzUMpQp5WckTljYKmT0l6QRSkfo5UK-Jzc7lKVhrz3feVTU5XvcHSf1OefKg4Nlkty3vq-4NVRl-T9afO2fqHb3fPr-nFLI2fyiwaJUSLzWgQdnWiEiNxqKQRwbGXABtFY6y3waCBIFoLXnhuulHTaBCWW5H7qjXkoJWNbH3K3H2fUwOq_czXY-v_ciN5N6MGX6Ps2-xS7cuK145ZbM2I3E9Yh4imdKn4BStFV5A |
CODEN | IETTAW |
CitedBy_id | crossref_primary_10_1016_0012_365X_92_90556_U crossref_primary_10_1109_18_59947 crossref_primary_10_1109_18_86975 crossref_primary_10_1016_0012_365X_94_90164_3 crossref_primary_10_1109_18_532916 crossref_primary_10_1109_18_75256 crossref_primary_10_1016_0097_3165_91_90011_5 crossref_primary_10_1109_18_243462 crossref_primary_10_1109_18_79931 crossref_primary_10_1109_18_75253 crossref_primary_10_1016_0166_218X_94_90141_4 crossref_primary_10_1016_0012_365X_91_90028_Z crossref_primary_10_1016_0097_3165_91_90024_B crossref_primary_10_1109_18_79926 crossref_primary_10_1109_18_476339 crossref_primary_10_1007_BF01388486 crossref_primary_10_1080_09720529_2012_10698392 crossref_primary_10_1109_18_108275 crossref_primary_10_1556_sscmath_40_2003_1_2_20 crossref_primary_10_1016_0097_3165_91_90010_E crossref_primary_10_1155_2014_237915 |
Cites_doi | 10.1137/0117123 10.1016/S0021-9800(67)80102-9 10.1109/TIT.1985.1057039 10.1109/18.2632 10.1007/3-540-16767-6_52 10.1109/18.21265 10.1109/18.75253 10.1016/0097-3165(91)90024-B 10.1112/jlms/s1-44.1.60 10.1109/TIT.1986.1057227 10.1137/0608050 10.1016/0097-3165(84)90010-4 10.1007/BF01817562 10.1109/18.2644 |
ContentType | Journal Article |
Copyright | 1990 INIST-CNRS |
Copyright_xml | – notice: 1990 INIST-CNRS |
DBID | IQODW AAYXX CITATION |
DOI | 10.1109/18.45285 |
DatabaseName | Pascal-Francis CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Mathematics Computer Science Applied Sciences |
EISSN | 1557-9654 |
EndPage | 1295 |
ExternalDocumentID | 10_1109_18_45285 6928287 45285 |
GroupedDBID | -~X .DC 0R~ 29I 3EH 4.4 5GY 5VS 6IK 97E AAJGR AASAJ AAYOK ABFSI ABQJQ ABVLG ACGFO ACGFS ACGOD ACIWK AENEX AETEA AETIX AI. AIBXA AKJIK ALLEH ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 E.L EBS EJD F5P HZ~ H~9 IAAWW IBMZZ ICLAB IDIHD IFIPE IFJZH IPLJI JAVBF LAI M43 MS~ O9- OCL P2P PQQKQ RIA RIE RIG RNS RXW TAE TN5 VH1 VJK XFK ABPTK IQODW AAYXX CITATION |
ID | FETCH-LOGICAL-c204t-b4ec4e0a63b6c93d33c28643312ef4bedee788a812c71b40bba6a272554967b53 |
IEDL.DBID | RIE |
ISSN | 0018-9448 |
IngestDate | Thu Sep 26 17:54:58 EDT 2024 Sun Oct 29 17:09:00 EDT 2023 Wed Jun 26 19:25:37 EDT 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 6 |
Keywords | Lower bound Linear programming Ternary system Binary code Code |
Language | English |
License | CC BY 4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c204t-b4ec4e0a63b6c93d33c28643312ef4bedee788a812c71b40bba6a272554967b53 |
PageCount | 5 |
ParticipantIDs | ieee_primary_45285 pascalfrancis_primary_6928287 crossref_primary_10_1109_18_45285 |
PublicationCentury | 1900 |
PublicationDate | 1989-11-01 |
PublicationDateYYYYMMDD | 1989-11-01 |
PublicationDate_xml | – month: 11 year: 1989 text: 1989-11-01 day: 01 |
PublicationDecade | 1980 |
PublicationPlace | New York, NY |
PublicationPlace_xml | – name: New York, NY |
PublicationTitle | IEEE transactions on information theory |
PublicationTitleAbbrev | TIT |
PublicationYear | 1989 |
Publisher | IEEE Institute of Electrical and Electronics Engineers |
Publisher_xml | – name: IEEE – name: Institute of Electrical and Electronics Engineers |
References | ref12 cohen (ref3) 1986 ref15 van wee (ref17) 1988; it 34 ref11 ref2 ref1 kamps (ref10) 1969 ref16 ref8 ref7 ref9 ref4 van laarhoven (ref13) 0 ref6 macwilliams (ref14) 1977 ref5 |
References_xml | – ident: ref16 doi: 10.1137/0117123 – ident: ref11 doi: 10.1016/S0021-9800(67)80102-9 – ident: ref4 doi: 10.1109/TIT.1985.1057039 – year: 1977 ident: ref14 publication-title: The Theory of Error-Correcting Codes contributor: fullname: macwilliams – volume: it 34 start-page: 237 year: 1988 ident: ref17 article-title: Improved sphere bounds on the covering radius of codes publication-title: IEEE Trans Inform Theory doi: 10.1109/18.2632 contributor: fullname: van wee – start-page: 79 year: 1986 ident: ref3 publication-title: Lecture Notes in Computer Science doi: 10.1007/3-540-16767-6_52 contributor: fullname: cohen – ident: ref8 doi: 10.1109/18.21265 – ident: ref7 doi: 10.1109/18.75253 – year: 0 ident: ref13 article-title: New upper bounds for the football pool problem for 6, 7 and 8 matches publication-title: J Combin Theory contributor: fullname: van laarhoven – start-page: 679 year: 1969 ident: ref10 article-title: A covering problem publication-title: Proc Colloq Math Soc Janos Bolyai Hung Combin Theory and Appl contributor: fullname: kamps – ident: ref5 doi: 10.1016/0097-3165(91)90024-B – ident: ref9 doi: 10.1112/jlms/s1-44.1.60 – ident: ref2 doi: 10.1109/TIT.1986.1057227 – ident: ref12 doi: 10.1137/0608050 – ident: ref1 doi: 10.1016/0097-3165(84)90010-4 – ident: ref15 doi: 10.1007/BF01817562 – ident: ref6 doi: 10.1109/18.2644 |
SSID | ssj0014512 |
Score | 1.4701797 |
Snippet | The authors extend to the q-ary case the notions of a normal code, a subnormal code, and the amalgamated direct sum construction, in order to investigate... |
SourceID | crossref pascalfrancis ieee |
SourceType | Aggregation Database Index Database Publisher |
StartPage | 1291 |
SubjectTerms | Applied sciences Coding, codes Error correction codes Exact sciences and technology Galois fields Hamming distance Information, signal and communications theory Linear code Linear programming Mathematics Signal and communications theory Telecommunications and information theory Upper bound |
Title | On normal and subnormal q-ary codes |
URI | https://ieeexplore.ieee.org/document/45285 |
Volume | 35 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT4MwFG7cTnpwbmqcOoPRK4xCKe3RGJfFZHpxyW6kPx4XDdMBB_3rbQsj03jwRmlKyKMv7330fd9D6JYrpQiX0meSCANQcOILRsBnDNMUJ2BSfEtOXjzR-ZI8rpJVK5PjuDAA4IrPILCX7ixfr1Vtf5VNSRKxpId6KecNU6s7LyAJbnTBsXFfgzhamVkc8ilmgVv3I_C4Tiq2DlKUxhR508NiJ7DMBk2HotLpEdp6ktegrmSgvn6pNf7vnY_QYZtfenfNhhiiPShGaLDt3eC1rjxCBztChGa06NRby2N081x4hc1l3zxRaK-sZTv68MXm07Ms-PIELWcPL_dzv22m4KsoJJUvCSgCoaCxpIrHOo5VxKjlS0WQEwkawKBhYeK9SrEkoZSCiig1iINwmsokPkX9Yl3AGfI00DQnJIp0nhiX11xxzTQ1zxSxFliN0fXW0tl7o5mROawR8gyzzFlkjIbWVt18e3Py44N0s5RbZJie_7XoAu27ui_HD7xE_WpTw8QkCpW8cnvkG0Zku0A |
link.rule.ids | 315,783,787,799,27938,27939,55088 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwELWgDMAAtIAoUAiCNW2c2I49IkRVoC1LK3WL_NUFlEKTDPDrsZ00ahEDWxzLUXTx6e7F994BcMeklIgJ4VOBuAEoEPucIu1TCkkMsTYpviUnj8ZkMEXPMzyrZHIcF0Zr7YrPdNdeurN8tZCF_VXWQzikeBvsYJtVlFyt-sQAYVgqg0PjwAZzVEKzMGA9SLtu5Ubocb1UbCUkz4wx5mUXi7XQ0j8sexRlTpHQVpS8dYtcdOX3L73G_731ETioMkzvvtwSTbCl0xY4XHVv8CpnboH9NSlCMxrV-q3ZMbh9Tb3UZrPvHk-VlxWiGn36fPnlWR58dgKm_cfJw8Cv2in4MgxQ7gukJdIBJ5EgkkUqimRIiWVMhXqOhFZaGzzMTcSXMRQoEIITHsYGcyBGYoGjU9BIF6k-A57SJJ4jFIZqjo3TKyaZooqYZ_JIcSjb4GZl6eSjVM1IHNoIWAJp4izSBk1rq3q-utnZ-CD1LGEWG8bnfy26BruDyWiYDJ_GLxdgz1WBObbgJWjky0J3TNqQiyu3X34AQbm-jQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=On+normal+and+subnormal+q-ary+codes&rft.jtitle=IEEE+transactions+on+information+theory&rft.au=Lobstein%2C+A.C.&rft.au=van+Wee%2C+G.J.M.&rft.date=1989-11-01&rft.pub=IEEE&rft.issn=0018-9448&rft.eissn=1557-9654&rft.volume=35&rft.issue=6&rft.spage=1291&rft.epage=1295&rft_id=info:doi/10.1109%2F18.45285&rft.externalDocID=45285 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9448&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9448&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9448&client=summon |