To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Majority decoding is a method of decoding by voting that is simple to implement and is extremely fast. However, only a small class of codes can be majority decoded, and usually these codes are not as good as other codes. Because code performance is usually more important than decoder simplicity, majority decoding is not important in most applications. Nevertheless, the theory of majority-decodable codes provides another well-developed view of the subject of error-control codes. The topic of majority decoding has connections with combinatorics and with the study of finite geometries.
Most known codes that are suitable for majority decoding are cyclic codes or extended cyclic codes. For these codes, the majority decoders can always be implemented as Meggitt decoders and characterized by an especially simple logic tree for examining the syndromes. Thus one can take the pragmatic view and define majority-decodable codes as those cyclic codes for which the Meggitt decoder can be put in a standard simple form. But in order to find these codes, we must travel a winding road.
Reed–Muller codes
Reed–Muller codes are a class of linear codes over GF(2) that are easy to describe and have an elegant structure. They are an example of a code that can be decoded by majority decoding. For these reasons, the Reed–Muller codes are important even though, with some exceptions, their minimum distances are not noteworthy. Each Reed–Muller code can be punctured to give one of the cyclic Reed–Muller codes that were studied in Section 6.7.
Cyclic codes are a subclass of the class of linear codes obtained by imposing an additional strong structural requirement on the codes. Because of this structure, the search for error-control codes has been most successful within the class of cyclic codes. Here the theory of Galois fields has been used as a mathematical searchlight to spot the good codes. Outside the class of cyclic codes, the theory of Galois fields casts a dimmer light. Most of what has been accomplished builds on the ideas developed for cyclic codes.
The cyclic property in itself is not important and cyclic codes do not necessarily have a large minimum distance. Cyclic codes are introduced because their structure is closely related to the strong structure of the Galois fields. This is significant because the underlying Galois-field description of a cyclic code leads to encoding and decoding procedures that are algorithmic and computationally efficient. Algorithmic techniques have important practical applications, in contrast to the tabular decoding techniques that are used for arbitrary linear codes.
This chapter gives a leisurely introduction to cyclic codes as a special class of linear codes. An alternative approach to the topic of cyclic codes, based on the Fourier transform, is given in Chapter 6.
The search for good data-transmission codes has relied, to a large extent, on the powerful and beautiful structures of modern algebra. Many important codes, based on the mathematical structures known as Galois fields, have been discovered. Further, this algebraic framework provides the necessary tools with which to design encoders and decoders. This chapter and Chapter 4 are devoted to developing those topics in algebra that are significant to the theory of data-transmission codes. The treatment is rigorous, but it is limited to material that will be used in later chapters.
Fields of characteristic two
Real numbers form a familiar set of mathematical objects that can be added, subtracted, multiplied, and divided. Similarly, complex numbers form a set of objects that can be added, subtracted, multiplied, and divided. Both of these arithmetic systems are of fundamental importance in engineering disciplines. We will need to develop other, less familiar, arithmetic systems that are useful in the study of data-transmission codes. These new arithmetic systems consist of sets together with operations on the elements of the sets. We shall call the operations “addition,” “subtraction,” “multiplication,” and “division,” although they need not be the same operations as those of elementary arithmetic.
Modern algebraic theory classifies the many arithmetic systems it studies according to their mathematical strength. Later in this chapter, these classifications will be defined formally. For now, we have the following loose definitions.
Abelian group. A set of mathematical objects that can be “added” and “subtracted.”
Ring. A set of mathematical objects that can be “added,” “subtracted,” and “multiplied.”
To encode an infinite stream of data symbols with a block code, the datastream is broken into blocks, each of k data symbols, called datawords. The block code encodes each block of k data symbols into a block of n code symbols, called a codeword. The codewords are concatenated to form an infinite stream of code symbols.
In contrast to a block code is a trellis code. A trellis code also encodes a stream of data symbols into a stream of code symbols. A trellis code divides the datastream into blocks of length k, called dataframes, which are usually much smaller and are encoded into blocks of length n, called codeframes. In both cases, block codes and trellis codes, the datastream is broken into a sequence of blocks or frames, as is the codestream. When using a block code, a single block of the codestream depends only on a single block of the datastream, whereas when using a trellis code, a single frame of the codestream depends on multiple frames of the datastream.
The most important trellis codes are those known as convolutional codes. Convolutional codes are trellis codes that satisfy certain additional linearity and time-invariance properties. Although we introduce the general notion of a trellis code, we will be concerned mostly with the special class of convolutional codes.
Determining the distribution of the number of empty urns after a number of balls have been thrown randomly into the urns is a classical and well understood problem. We study a generalization: Given a finite alphabet of size σ and a word length q, what is the distribution of the number X of words (of length q) that do not occur in a random text of length n+q−1 over the given alphabet? For q=1, X is the number Y of empty urns with σ urns and n balls. For q[ges ]2, X is related to the number Y of empty urns with σq urns and n balls, but the law of X is more complicated because successive words in the text overlap. We show that, perhaps surprisingly, the laws of X and Y are not as different as one might expect, but some problems remain currently open.
The sizes of the cycles and unicyclic components in the random graph $G(n, n/2\pm s)$, where $n^{2/3}\ll s \ll n$, are studied using the language of point processes. This refines several earlier results by different authors. Asymptotic distributions of various random variables are given: these distributions include the gamma distributions with parameters 1/4, 1/2 and 3/4, as well as the Poisson–Dirichlet and GEM distributions with parameters 1/4 and 1/2.
The bond percolation critical probability of the Kagomé lattice is greater than 0.5209 and less than 0.5291. The proof of these bounds uses the substitution method, comparing the percolative behaviour of the Kagomé lattice bond model with that of the exactly solved hexagonal lattice bond model via stochastic ordering.
A proper vertex coloring of a graph is called equitable if the sizes of colour classes differ by at most 1. In this paper, we find the minimum number l=l(d, Δ) such that every d-degenerate graph with maximum degree at most Δ admits an equitable t-colouring for every t[ges ]l when Δ[ges ]27d.
In this paper we prove that, if a collection of sets [Ascr] is union-closed, then the average set size of $\cal A is at least $\frac{1}{2}\log_2 (\vert{\cal A}\vert)$.
A general spectral bound for the sizes of some vertex subsets, which are mutually at a given minimum distance in a graph, is derived. This unifies and improves some previous results. Some applications to the study of certain metric parameters of the graph are then discussed.
It has been shown [2] that if n is odd and m1,…,mt are integers with mi[ges ]3 and [sum ]i=1tmi=|E(Kn)| then Kn can be decomposed as an edge-disjoint union of closed trails of lengths m1,…,mt. This result was later generalized [3] to all sufficiently dense Eulerian graphs G in place of Kn. In this article we consider the corresponding questions for directed graphs. We show that the complete directed graph <?TeX \displaystyle{\mathop{K}^{\raise-2pt\hbox{$\scriptstyle\leftrightarrow$}}}_{n}?> can be decomposed as an edge-disjoint union of directed closed trails of lengths m1,…,mt whenever mi[ges ]2 and <?TeX \sum_{i=1}^t m_{i}=\vert E({\leftrightarrow}_{n})\vert ?>, except for the single case when n=6 and all mi=3. We also show that sufficiently dense Eulerian digraphs can be decomposed in a similar manner, and we prove corresponding results for (undirected) complete multigraphs.
We prove that, for all values of the edge probability $p(n)$, the largest eigenvalue of the random graph $G(n, p)$ satisfies almost surely $\lambda_1(G)=(1+o(1))\max\{\sqrt{\Delta}, np\}$, where Δ is the maximum degree of $G$, and the o(1) term tends to zero as $\max\{\sqrt{\Delta}, np\}$ tends to infinity.