1. Maximum True Burst-Correcting Capability of Fire
Codes, Fire-BCH Codes, and BCH Codes for the
Rosenbloom-Tsfasman Metric
Wei Zhou
Department of Electrical and Computer Engineering
University of California, Davis
Davis, CA 95616, U.S.A.
May 25, 2016
Wei Zhou Exit Seminar 1 / 66
2. Research Topics
1 The true burst-correcting capability of Fire codes
2 Fire-BCH codes
3 BCH codes for the Rosenbloom-Tsfasman metric
Wei Zhou Exit Seminar 2 / 66
3. The true burst-correcting capability of Fire codes
We classify Fire codes based on their parameters.
We derive necessary and sufficient conditions for a Fire code to
correct a burst of a given length.
We give lower and upper bounds for each class of Fire codes.
We construct specific codes that achieve those bounds.
Wei Zhou Exit Seminar 3 / 66
4. Introduction
Communications channels may introduce errors in a localized inter-
val, we call such errors a burst because they occur in consecutive
bits.
Wei Zhou Exit Seminar 4 / 66
5. Introduction
Communications channels may introduce errors in a localized inter-
val, we call such errors a burst because they occur in consecutive
bits.
A binary vector of length n is called a burst of length b if the 1’s are
confined to b, but not less than b, consecutive positions.
Wei Zhou Exit Seminar 4 / 66
6. Burst correcting codes
A code is said to have burst correcting capability of b if it can
correct any error vector which is a burst up to length b.
The burst correcting capability b of an [n, k] linear code must satisfy
the following inequalities:
2b ≤ r Reiger bound
n ≤ 2r−b+1
− 1 Abramson bound
where r = n − k.
For cyclic codes, a simple decoding algorithm, known as burst trap-
ping, can decode all bursts up to their burst correcting capability.
Wei Zhou Exit Seminar 5 / 66
7. Fire codes
A Fire code is a cyclic code generated by
g(x) = (x2b∗−1 + 1)g0(x) over F2, where
g0(x) is an irreducible polynomial, different from x, of degree
m ≥ b∗
, and period n0, n0 2b∗
− 1.
The Fire code has a length of LCM(2b∗
− 1, n0).
The designed burst correcting capability of the code is b∗
.
How about its true burst correcting capability?
Wei Zhou Exit Seminar 6 / 66
8. An interesting observation
b∗ = 2 and g0(x) is an irreducible polynomial of degree 10 and period
1023.
Code length: n = LCM(2b∗
− 1, n0) = 1023.
Redundancy: m + 2b∗
− 1 = 13.
Designed burst correcting capability b∗
= 2.
However, different irreducible polynomials may give different true
burst correcting capability b.
g0(x) b
x10 + x3 + 1 2
x10 + x8 + x3 + x2 + 1 3
x10 + x5 + x3 + x2 + 1 4
Wei Zhou Exit Seminar 7 / 66
9. Problem formulation
Recall n0 is the period of g0(x).
Let h0 = GCD(2b∗
− 1, n0),
Let t = 2m
−1
n0
,
where m is the degree of g0(x) and n0 is its period.
Fire codes with parameters b∗, h0, and t are called (b∗, h0, t)-Fire
code.
Wei Zhou Exit Seminar 8 / 66
10. Problem formulation
Recall n0 is the period of g0(x).
Let h0 = GCD(2b∗
− 1, n0),
Let t = 2m
−1
n0
,
where m is the degree of g0(x) and n0 is its period.
Fire codes with parameters b∗, h0, and t are called (b∗, h0, t)-Fire
code.
Given b∗, h0 and t, what is maximum possible true burst correcting
capability, denoted by bmax(b∗, h0, t), of a (b∗, h0, t)-Fire code?
Wei Zhou Exit Seminar 8 / 66
11. Theorem
The class of (b∗, h0, t)-Fire codes is nonempty if and only if
b∗, h0, and t are positive integers, h0 and t are odd, h0 divides
2b∗ − 1, and
Wei Zhou Exit Seminar 9 / 66
12. Theorem
The class of (b∗, h0, t)-Fire codes is nonempty if and only if
b∗, h0, and t are positive integers, h0 and t are odd, h0 divides
2b∗ − 1, and
ordh0t(2) > ordh0t(2) for any divisor h0 = h0 of 2b∗ − 1 which is
divisible by h0.
If these conditions hold, then there is an infinite number of (b∗, h0, t)-Fire
codes.
Note: orda(2), for an odd positive integer a, is the least positive integer
i such that 2i − 1 is divisible by a.
Wei Zhou Exit Seminar 9 / 66
13. For example, for b∗ = 8, there are four divisors of
2b∗ − 1 = 15 : 1, 3, 5, and 15.
There is an infinite number of (8, 15, 1)-Fire codes since there does
not exist a divisor h0 = h0 of 2b∗
− 1 which is divisible by h0 = 15.
There is no (8, 5, 1)-Fire code since 15 is divisible by h0 = 5 and
ord15(2) = ord5(2) as both equal 4.
Wei Zhou Exit Seminar 10 / 66
14. For example, for b∗ = 8, there are four divisors of
2b∗ − 1 = 15 : 1, 3, 5, and 15.
There is an infinite number of (8, 15, 1)-Fire codes since there does
not exist a divisor h0 = h0 of 2b∗
− 1 which is divisible by h0 = 15.
There is no (8, 5, 1)-Fire code since 15 is divisible by h0 = 5 and
ord15(2) = ord5(2) as both equal 4.
There is an infinite number of (8, 3, 1)-Fire codes since ord15(2) >
ord3(2) = 2 and 15 is the only divisor of 2b∗
−1 = 15 that is divisible
by h0 = 3 and not equal to h0.
There is an infinite number of (8, 1, 1)-Fire codes since ordh (2) >
ord1(2) = 1 for every divisor h of 15 other than 1.
Wei Zhou Exit Seminar 10 / 66
15. Theorem
Let bmax(b∗, h0, t) be the maximum true burst-correcting capability of
(b∗, h0, t)-Fire codes.
bmax(b∗
, h0, t) ≤
2b∗ − 1 − d(b∗, h0), if h0 < 2b∗ − 1,
2b∗ + log2 t , if h0 = 2b∗ − 1.
where d(b∗, h0) is the largest proper divisor of 2b∗ − 1 that is divisible
by h0.
Wei Zhou Exit Seminar 11 / 66
16. Theorem
For primitive g0(x), t = 1, and
bmax(b∗
, h0, 1) ≤
b∗, if h0 = 1,
2b∗ − 2, if 1 < h0 < 2b∗ − 1,
2b∗, if h0 = 2b∗ − 1, (Abramson bound)
Wei Zhou Exit Seminar 12 / 66
17. Some notations
Let v = (v0, v1, . . . , vn−1) be a vector of length n. It can be rep-
resented by the polynomial, v(x) = v0 + v1x + . . . + vn−1xn−1.
We use [f(x)]g(x), [f]g to denote the remainder polynomial obtained
by dividing polynomial f(x) by g(x) = 0, and the remainder obtained
by dividing integer f by g = 0, respectively.
[f(x)]g(x) ≡ f(x) mod g(x), [f]g ≡ f mod g
Let Bb be the set of nonzero polynomials over F2 of degree less than
b with constant 1, i.e.,
Bb = {B(x) ∈ F2[x] : degB(x) < b, B(0) = 1}
Wei Zhou Exit Seminar 13 / 66
18. b-burst correcting cyclic code
A cyclic code generated by g(x) of length n is b-burst correcting iff
it has no nonzero code polynomial of the form
[B1(x) + xl
B2(x)]xn−1,
where B1(x) and B2(x) ∈ Bb.
That means for any polynomial of the form
[B1(x) + xlB2(x)]xn−1, we have
g(x) [B1(x) + xl
B2(x)]xn−1.
Wei Zhou Exit Seminar 14 / 66
19. Theorem
Consider the nontrivial Fire code generated by (x2b∗−1 + 1)g0(x), where
g0(x) is an irreducible polynomial of degree m ≥ b and period n0. The
code is b-burst-correcting if and only if the following is true: If
Wei Zhou Exit Seminar 15 / 66
20. Theorem
Consider the nontrivial Fire code generated by (x2b∗−1 + 1)g0(x), where
g0(x) is an irreducible polynomial of degree m ≥ b and period n0. The
code is b-burst-correcting if and only if the following is true: If
1 B1(x) + xl B2(x) is divisible by x2b∗−1 + 1, where 0 ≤ l < 2b∗ − 1
and B1(x), B2(x) ∈ Bb are distinct polynomials unless l is a
nonzero multiple of h0, and
Wei Zhou Exit Seminar 15 / 66
21. Theorem
Consider the nontrivial Fire code generated by (x2b∗−1 + 1)g0(x), where
g0(x) is an irreducible polynomial of degree m ≥ b and period n0. The
code is b-burst-correcting if and only if the following is true: If
1 B1(x) + xl B2(x) is divisible by x2b∗−1 + 1, where 0 ≤ l < 2b∗ − 1
and B1(x), B2(x) ∈ Bb are distinct polynomials unless l is a
nonzero multiple of h0, and
2 B1(x) + xl0 B2(x) is divisible by g0(x), where 0 ≤ l0 < n0, then
l0 ≡ l (mod h0).
Wei Zhou Exit Seminar 15 / 66
22. Example
Let a Fire code generated by (x2b∗−1 + 1)g0(x) where g0(x) is an
irreducible polynomial of degree m ≥ b∗. Then, the code is a
b∗-burst correcting code. For the code to be (b∗ + 1)-burst
correcting, two requirements are needed.
1 m ≥ b∗ + 1
2 If any of the following incongruences
(1 + xb∗
) + xl0 (1 + xb∗−1
) ≡ 0 (mod g0(x))
(1 + x + xb∗
) + xl0 (1 + xb∗−1
+ xb∗
) ≡ 0 (mod g0(x))
holds for some l0, 0 ≤ l0 < n0, then l0 ≡ b∗ (mod h0).
Wei Zhou Exit Seminar 16 / 66
23. If g0(x) is an irreducible polynomial of degree m and period n0,
then
g0(x) =
m−1
i=0
(x − α2it
),
for some primitive element α ∈ F2m .
Let
p(x) =
m−1
i=0
(x − α2i
).
We say that p(x) is a primitive polynomial associated with g0(x).
Wei Zhou Exit Seminar 17 / 66
24. Lemma
Let f(x) be a nonzero polynomial over F2 and g0(x) is an irreducible
polynomial of degree m and period n0 = (2m − 1)/t. Then, f(x) is
divisible by g0(x), iff f(xt) is divisible by an associated primitive
polynomial p(x).
Wei Zhou Exit Seminar 18 / 66
25. Lemma
Let f(x) be a nonzero polynomial over F2 and g0(x) is an irreducible
polynomial of degree m and period n0 = (2m − 1)/t. Then, f(x) is
divisible by g0(x), iff f(xt) is divisible by an associated primitive
polynomial p(x).
Let l = l0t, then, the following two statements are equivalent:
B1(x) + xl0 B2(x) ≡ 0 (mod g0(x))
B1(xt
) + xl
B2(xt
) ≡ 0 (mod p(x))
Furthermore, l0 ≡ l (mod h0) ⇔ l ≡ tl (mod h) as h = th0.
Wei Zhou Exit Seminar 18 / 66
26. Theorem
Consider the nontrivial Fire code generated by (x2b∗−1 + 1)g0(x), where
g0(x) is an irreducible polynomial of degree m ≥ b and period n0 =
(2m − 1)/t with associated primitive polynomial p(x). The code is b-
burst-correcting if and only if the following is true: If
1 B1(x) + xl B2(x) is divisible by x2b∗−1 + 1, where 0 ≤ l < 2b∗ − 1
and B1(x), B2(x) ∈ Bb are distinct polynomials unless l is a
nonzero multiple of h0, and
Wei Zhou Exit Seminar 19 / 66
27. Theorem
Consider the nontrivial Fire code generated by (x2b∗−1 + 1)g0(x), where
g0(x) is an irreducible polynomial of degree m ≥ b and period n0 =
(2m − 1)/t with associated primitive polynomial p(x). The code is b-
burst-correcting if and only if the following is true: If
1 B1(x) + xl B2(x) is divisible by x2b∗−1 + 1, where 0 ≤ l < 2b∗ − 1
and B1(x), B2(x) ∈ Bb are distinct polynomials unless l is a
nonzero multiple of h0, and
2 B1(xt) + xl B2(xt) is divisible by p(x), where 0 ≤ l < 2m − 1,
then
l ≡ tl (mod h).
Wei Zhou Exit Seminar 19 / 66
28. The AES condition
For each polynomial B(x) ∈ Bb, we define its index, ap(x)(B(x))
with respect to the primitive polynomial p(x) by
B(x) ≡ xap(x)(B(x))
(mod p(x)), 0 ≤ ap(x)(B(x)) < 2m
− 1
For example, ap(x)(1 + x + x3) = 7, where p(x) = 1 + x + x4.
Wei Zhou Exit Seminar 20 / 66
29. The AES condition
For each polynomial B(x) ∈ Bb, we define its index, ap(x)(B(x))
with respect to the primitive polynomial p(x) by
B(x) ≡ xap(x)(B(x))
(mod p(x)), 0 ≤ ap(x)(B(x)) < 2m
− 1
For example, ap(x)(1 + x + x3) = 7, where p(x) = 1 + x + x4.
Then, the following two congruences are equivalent:
B1(xt
) + xl
B2(xt
) ≡ 0 (mod p(x))
xap(x)(B1(xt))
+ xl +ap(x)(B2(xt))
≡ 0 (mod p(x)).
for 0 ≤ l < 2m − 1, which is equivalent to
ap(x)(B1(xt
)) − ap(x)(B2(xt
)) ≡ l (mod 2m
− 1).
We call the integer incongruences corresponding to polynomial
incongruences the Abramson-Elspas-Short (AES) conditions
associated with given b∗, h0, t, and b > b∗.
Wei Zhou Exit Seminar 20 / 66
30. Theorem
Consider the nontrivial Fire code generated by (x2b∗−1 + 1)g0(x), where
g0(x) is an irreducible polynomial of degree m ≥ b and period n0 =
(2m − 1)/t with associated primitive polynomial p(x). The code is b-
burst-correcting if and only if the following is true:
If B1(x) + xl B2(x) is divisible by x2b∗−1 + 1, where
0 ≤ l < 2b∗ − 1 and B1(x), B2(x) ∈ Bb are distinct polynomials
unless l is a nonzero multiple of h0,
then
ap(x)(B1(xt
)) − ap(x)(B2(xt
)) ≡ tl (mod h).
Wei Zhou Exit Seminar 21 / 66
31. We can view the indices of the irreducible polynomials arising from
the incongruences
ap(x)(B1(xt
)) − ap(x)(B2(xt
)) ≡ l t (mod h)
as unknowns.
The incongruences depend on b∗, h0, t and b.
If these incongruences do not have a solution, then there is no
(b∗, h0, t)-Fire code which is b-burst-correcting.
If these incongruences have a solution, then
there is a “good” primitive polynomial, p(x), i.e., the indices with
respect to which satisfy the incongruences.
there is a (b∗
, h0, t)-Fire code which is b-burst-correcting
Wei Zhou Exit Seminar 22 / 66
32. If m is sufficiently large, then there are many primitive polynomials,
p(x), of degree m.
At least one of these primitive polynomials gives indices that satisfy
these incongruences.
By increasing m, there is an infinite number of (b∗, h0, t)-Fire codes
which are b-burst-correcting.
Conclusion: bmax(b∗, h0, t) is the maximum value of b for which the
incongruences have a solution.
Wei Zhou Exit Seminar 23 / 66
33. Example
We derive the AES conditions for previous example for the Fire code
to be (b∗ + 1 = 6)-burst correcting in case of b∗ = 5, h0 = 3, and
t = 1.
ap(x)(1 + x5
) − ap(x)(1 + x4
) ≡ 5 (mod 3)
ap(x)(1 + x + x5
) − ap(x)(1 + x4
+ x5
) ≡ 5 (mod 3)
By factoring the polynomials into a product of irreducible
polynomials and using the fact that ap(x)(B(x)) ≡ i ap(x)(fi(x))
(mod h), where B(x) = Π
i
fi(x), we obtain the AES conditions as
follows:
ap(x)(1 + x + x2
+ x3
+ x4
) ≡ 2 (mod 3)
ap(x)(1 + x2
+ x3
) − ap(x)(1 + x + x3
) ≡ 2 (mod 3)
Wei Zhou Exit Seminar 24 / 66
34. Example - cont.
These two incongruences have precisely 12 solutions modulo three
for ap(x)(1+x+x2 +x3 +x4), ap(x)(1+x2 +x3), ap(x)(1+x+x3).
Next, we look for an irreducible polynomial p(x) of degree m such
that h0 = GCD(2b∗ − 1, 2m − 1) = GCD(9, 2m − 1) = 3, that meets
any one of these solutions.
The irreducible polynomial that meets these solutions gives burst
correcting capability of 6.
g0(x) b
1 + x2 + x3 + x4 + x8 5
1 + x3 + x5 + x6 + x8 6
Wei Zhou Exit Seminar 25 / 66
39. Research Topics
The true burst-correcting capability of Fire codes
Fire-BCH codes
BCH Codes for the Rosenbloom-Tsfasman metric
Wei Zhou Exit Seminar 30 / 66
40. Fire-BCH codes
Develop codes that can work over the compound burst/random error
channel.
A Fire-BCH code is a cyclic code generated by
g(x) = (x2b∗−1 + 1)g0(x) over F2, where
g0(x) co-prime with x2b∗
−1
+ 1.
g0(x) =
v∗
i=1 g1(x)g2(x) . . . gv∗ (x), gi(x) is a distinct irreducible
polynomial of degree m, and period ni for 1 ≤ i ≤ v∗
.
The Fire-BCH code has a length of LCM(2b∗
− 1, n0).
If g0(x) has α, α2, . . . , α2v∗
as 2v∗ consecutive roots, then the code
is guaranteed to correct v∗ random errors in any n0 consecutive
positions.
Wei Zhou Exit Seminar 31 / 66
41. Research Topics
The true burst-correcting capability of Fire codes
Fire-BCH codes
BCH Codes for the Rosenbloom-Tsfasman metric
Wei Zhou Exit Seminar 32 / 66
42. BCH Codes for the Rosenbloom-Tsfasman metric
Reliable-to-unreliable channels and matrix codes
Reed-Solomon and BCH matrix codes
Properties
Cyclic structure of matrix Reed-Solomon codes
Dual codes of matrix Reed-Solomon and BCH codes
Wei Zhou Exit Seminar 33 / 66
43. Reliable-to-unreliable channels
Consider a scenario where we have n parallel q-ary reliable-to-unreliable
channels, W0, W1, . . . , Wn−1. Transmit m symbols on each channel,
totally N = mn q-ary symbols are transmitted.
Wei Zhou Exit Seminar 34 / 66
44. Matrix codes
A q-ary matrix code is a set C, where each codeword is an m × n
q-ary matrix, C = [ci,j], 0 ≤ i < m, 0 ≤ j < n.
The symbols c0,j, c1,j, . . . , c(m−1),j of the j-th column are
transmitted in this order over the j-th channel, Wj.
The RT-weight of C, denoted by wRT (C), of an m × n matrix is
the number of its elements that are nonzero or that lie below a
non-zero element.
Wei Zhou Exit Seminar 35 / 66
45. Matrix codes - cont.
The RT-distance, denoted by dRT (C, C ), between the matrices C
and C of equal size is the number of positions in which the matrices
differ or that lie below positions in which the matrices differ.
The minimum RT-distance, dRT (C), of the matrix code C consisting
of at least two codewords, is the minimum RT-distance between any
two distinct codewords in C.
If m = 1, (minimum) RT-distance is the (minimum) Hamming
distance, and RT-weight is the Hamming weight.
Wei Zhou Exit Seminar 36 / 66
46. Matrix codes - cont.
The RT-distance, denoted by dRT (C, C ), between the matrices C
and C of equal size is the number of positions in which the matrices
differ or that lie below positions in which the matrices differ.
The minimum RT-distance, dRT (C), of the matrix code C consisting
of at least two codewords, is the minimum RT-distance between any
two distinct codewords in C.
If m = 1, (minimum) RT-distance is the (minimum) Hamming
distance, and RT-weight is the Hamming weight.
Let C be a matrix code consisting of M codewords, each is an
m × n q-ary matrix, that has minimum RT-distance dRT . Then,
we say that C is an (m × n, M, dRT )q matrix code.
Wei Zhou Exit Seminar 36 / 66
47. Example
Consider the two matrices
0 0 0
0 1 1
0 1 0
0 0 0
,
0 0 1
1 0 0
0 0 0
0 0 0
.
The first matrix has RT-weight 6 and the second has RT-weight 7.
The RT-distance between them is 10.
Wei Zhou Exit Seminar 37 / 66
48. One-dimensional construction
A one-dimensional (N, M, dH)q code, where N = mn, can be used
as an (m × n, M, dRT )q, where dRT ≥ dH, by arranging each code-
word of length N into an m × n matrix.
We call this construction the one-dimensional construction.
Wei Zhou Exit Seminar 38 / 66
49. One-dimensional construction
A one-dimensional (N, M, dH)q code, where N = mn, can be used
as an (m × n, M, dRT )q, where dRT ≥ dH, by arranging each code-
word of length N into an m × n matrix.
We call this construction the one-dimensional construction.
For one-dimensional code of length 12 and of minimum distance 6
over GF(2),
A non-linear code has only 24 codewords.
A linear code has 16 codewords.
Hence, the one-dimensional constructions yield (4 × 3, M, 6)2 codes
with M ≤ 24.
Wei Zhou Exit Seminar 38 / 66
50. Example
Consider the linear binary matrix code that has 64 codewords
which are obtained as linear combinations of the six matrices:
1 1 1
0 0 0
0 0 0
0 0 0
,
1 1 1
0 1 1
0 0 0
0 0 0
,
1 0 0
0 0 0
0 1 1
0 0 0
,
1 1 1
1 0 0
1 1 1
0 1 1
,
1 1 1
1 1 0
0 0 0
0 0 0
,
1 0 1
0 0 0
1 1 0
0 0 0
.
It can be shown that any nonzero linear combination of the above
six matrices has RT-weight at least 6.
Wei Zhou Exit Seminar 39 / 66
51. Singleton bound
For any (m × n, M, dRT )q matrix code with M ≥ 2, we have
dRT ≤ mn − logq M + 1.
It is the Singleton bound for (m × n, M, dRT )q matrix codes.
Block codes that achieve equality in Singleton bound are called
maximum distance separable (MDS) codes.
Wei Zhou Exit Seminar 40 / 66
52. Galois-Fourier transform (GFT)
Let a(x) = n−1
t=0 atxt be a polynomial over the finite field Fq of
characteristic p such that n is a factor of q − 1.
n is coprime with p.
Let α be an element in Fq of order n. We form the sequence c =
(c0, c1, . . . , cn−1) by evaluating a(x) at consecutive powers of α,
namely, cj = a(αj) for 0 ≤ j < n, i.e.,
cj = a(αj
) =
n−1
t=0
atαjt
.
The sequence c is the Galois-Fourier transform of sequence a.
Wei Zhou Exit Seminar 41 / 66
53. Galois-Fourier transform (GFT) - cont.
The sequence a can be retrieved by taking the inverse Galois-Fourier
transform of the sequence c using the relation
at = (n)−1
p
n−1
j=0
cjα−jt
.
The number of zeros in the sequence c is equal to the number of
distinct roots of a(x) in the set {αj : 0 ≤ j < n}.
Since n−1
j=0 (x−αj) = xn −1, the Hamming weight of c is given by
wH(c) = wH(GFT(a)) = n − deg(GCD(a(x), xn
− 1)).
Wei Zhou Exit Seminar 42 / 66
54. Reed-Solomon codes
The Reed-Solomon code of length n and parameters z and t∗ over
Fq, denoted by RS(n; z, t∗)q, is the set of Galois-Fourier transforms
of all sequences of length n over Fq that have zeros in the z cyclically
consecutive positions t∗, (t∗ + 1)n, . . . , (t∗ + z − 1)n, modulo n, i.e.,
RS(n; z, t∗
)q = {GFT(a0, a1, . . . , an−1) : at ∈ Fq, 0 ≤ t < n,
at∗ = a(t∗+1)n
= · · ·= a(t∗+z−1)n
= 0}.
The Reed-Solomon code is an [n, n − z, z + 1]q code.
Wei Zhou Exit Seminar 43 / 66
55. BCH codes
Let Fq be a subfield of Fq, which is the case iff q is a power of q .
From RS(n; z, t∗)q, we define the BCH code, BCH(n; z, t∗)q , of
length n over Fq to be the set of codewords in the Reed-Solomon
code, RS(n; z, t∗)q, that are over Fq , i.e.,
BCH(n; z, t∗
)q = RS(n; z, t∗
)q ∩ Fn
q
= {GFT(a0, a1, . . . , an−1) ∈ Fn
q : at ∈ Fq,
at∗ = a(t∗+1)n
= · · ·= a(t∗+z−1)n
= 0}.
dimension: ≤ n − z
minimum distance: ≥ z + 1
Wei Zhou Exit Seminar 44 / 66
56. Conjugacy constraint
We can specify the sequences of length n over Fq which have Galois-
Fourier transforms confined over the subfield Fq rather than Fq.
For a sequence a = (a0, a1, . . . , an−1) ∈ Fn
q , its Galois-Fourier trans-
form, GFT(a), is over the subfield Fq if and only if the sequence a
satisfies the so-called q -ary conjugacy constraints:
aq
t = a(tq )n
.
The BCH code is the set of Galois-Fourier transforms of all sequences
over Fq with zeros in cyclically consecutive positions that satisfy the
q -ary conjugacy constraints.
Wei Zhou Exit Seminar 45 / 66
57. Hasse derivative
Let a(x) = N−1
t=0 atxt be a polynomial over the finite field Fq of
characteristic p. For a nonnegative integer i, the i-th Hasse deriva-
tive, a[i](x), of a(x) is defined by
a[i]
(x) =
N−1
t=0
t
i
atxt−i
.
Wei Zhou Exit Seminar 46 / 66
58. Hasse-Galois-Fourier transform
Now suppose that N = pvn where n is a factor of q − 1. Then, Fq
has an element α of order n.
Corresponding to the polynomial a(x) = N−1
t=0 atxt, form a pv × n
matrix, C = [ci,j]0≤i<pv,0≤j<n, where ci,j is the value of the i-th
Hasse derivative of a(x) evaluated at αj, i.e.,
ci,j = a[i]
(αj
) =
N−1
t=0
t
i
atα(t−i)j
.
Wei Zhou Exit Seminar 47 / 66
59. Hasse-Galois-Fourier transform
Now suppose that N = pvn where n is a factor of q − 1. Then, Fq
has an element α of order n.
Corresponding to the polynomial a(x) = N−1
t=0 atxt, form a pv × n
matrix, C = [ci,j]0≤i<pv,0≤j<n, where ci,j is the value of the i-th
Hasse derivative of a(x) evaluated at αj, i.e.,
ci,j = a[i]
(αj
) =
N−1
t=0
t
i
atα(t−i)j
.
The matrix C = [ci,j], obtained by evaluating the polynomial a(x)
and its Hasse derivatives at consecutive powers of α, is the Hasse-
Galois-Fourier transform of the sequence a = (a0, a1, . . . , aN−1) of
length N. We write C = HGFT(a).
Wei Zhou Exit Seminar 47 / 66
60. Theorem
Let a = HGFT−1
(C). Then,
ar+ pv = (n)−1
p
pv−1
i=0
n−1
j=0
(−1)i−r i
r
α(i−r−pv )j
ci,j,
for 0 ≤ r < pv, 0 ≤ < n.
wRT(C) = N − deg(GCD(a(x), xN − 1)).
Wei Zhou Exit Seminar 48 / 66
61. Matrix Reed-Solomon codes
The matrix Reed-Solomon code of size pv ×n and parameters z and
t∗, where 1 ≤ z < pvn and 0 ≤ t∗ < pvn, over Fq, denoted by
RS(pv × n; z, t∗)q, is the set of Hasse-Galois-Fourier transforms of
all sequences of length N = pvn over Fq that have zeros in the z
cyclically consecutive positions t∗, (t∗ + 1)pvn, . . . , (t∗ + z − 1)pvn,
modulo pvn, i.e.,
RS(pv
× n; z, t∗
)q = {HGFT(a0, a1, . . . , apvn−1) : at ∈ Fq,
0 ≤ t < pv
n, at∗ = a(t∗+1)pvn
= · · ·= a(t∗+z−1)pvn
= 0}.
Matrix Reed-Solomon code is a [pv × n, pvn − z, z + 1]q code.
Wei Zhou Exit Seminar 49 / 66
62. Example
We construct a matrix [4 × 3, 8, 5]4 Reed-Solomon code over F4,
RS(4 × 3; 4, 1)4.
Wei Zhou Exit Seminar 50 / 66
63. Example
We construct a matrix [4 × 3, 8, 5]4 Reed-Solomon code over F4,
RS(4 × 3; 4, 1)4.
The codewords in this code are the 48 = 65, 536 matrices over F4
that are the Hasse-Galois-Fourier transforms of the 48 sequences
(a0, a1, . . . , a11) of length 12 over F4 for which a1 = a2 = a3 =
a4 = 0. The Hasse-Galois-Fourier transforms of the eight sequences
(1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0), (0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0),
(0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0), (0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0),
(0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0), (0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0),
(0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0), (0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1),
form a basis of the code composed of the following eight codewords
over F4:
Wei Zhou Exit Seminar 50 / 66
65. Matrix BCH codes
The matrix BCH code of size pv ×n over Fq , denoted by BCH(pv ×
n; z, t∗)q , is the set of codewords in the above Reed-Solomon code,
RS(pv × n; z, t∗)q, that are over Fq .
The matrix BCH code is the subfield subcode of the Reed-Solomon
code given by
BCH(pv
× n; z, t∗
)q = RS(pv
× n; z, t∗
)q ∩ Fpv×n
q
= {HGFT(a0, a1, . . . , apvn−1) ∈ Fpv×n
q :
aj ∈ Fq, 0 ≤ j < pv
n − 1,
at∗ = a(t∗+1)pvn
= · · ·= a(t∗+z−1)pvn
= 0}.
dimension: ≤ pvn − z
minimum RT-distance: ≥ z + 1
Wei Zhou Exit Seminar 52 / 66
66. Theorem
Let a = (a0, a1, . . . , apvn−1) be a sequence over Fq of length n that
divides q − 1. Let u, 0 ≤ u < n, be the inverse of pv modulo n, i.e.,
pvu ≡ 1 mod n. Then, HGFT(a) is over Fq , a subfield of Fq, if and
only if a satisfies the q -ary generalized conjugacy constraints
pv−1
r=0
r
i
aq
r+((i−r)u+ )npv =
pv−1
r=0
r
i
ar+((i−r)u+q )npv ,
for all 0 ≤ i < pv and all 0 ≤ < n.
Wei Zhou Exit Seminar 53 / 66
68. Example
We construct the BCH(4 × 3; 4, 1)2 code over F2 with designed
minimum RT-distance of 5, where pv = 4 and n = 3.
The codewords in the matrix BCH code are precisely all matrices
over F2 which are Hasse-Galois-Fourier transforms of sequences
a = (a0, a1, . . . , a11) over F4 for which a1 = a2 = a3 = a4 = 0.
Wei Zhou Exit Seminar 55 / 66
69. Example
We construct the BCH(4 × 3; 4, 1)2 code over F2 with designed
minimum RT-distance of 5, where pv = 4 and n = 3.
The codewords in the matrix BCH code are precisely all matrices
over F2 which are Hasse-Galois-Fourier transforms of sequences
a = (a0, a1, . . . , a11) over F4 for which a1 = a2 = a3 = a4 = 0.
Combining with the conjugacy constraint, the sequence a over F4
has the form
a = (a0, 0, 0, 0, 0, a5, a6, a7, a5 + a6 + a7, a2
5 + a7, a2
6 + a7, a7)
such that both a7 and a0 + a2
5 + a6 are in F2.
dimension: 6
true minimum RT-distance: 6
Wei Zhou Exit Seminar 55 / 66
70. Cyclic structure of matrix RS code
Theorem
Let [ci,j], 0 ≤ i < pv, 0 ≤ j < n, be the Hasse-Galois-Fourier
transform of the sequence (a0, a1, . . . , aN−1), where N = pvn. Then,
[α−ici,(j−1)n
], 0 ≤ i < pv, 0 ≤ j < n, is the Hasse-Galois-Fourier trans-
form of the sequence (a0, α−1a1, . . . , α−(N−1)aN−1).
Wei Zhou Exit Seminar 56 / 66
71. Cyclic structure of matrix RS code
Theorem
Let [ci,j], 0 ≤ i < pv, 0 ≤ j < n, be the Hasse-Galois-Fourier
transform of the sequence (a0, a1, . . . , aN−1), where N = pvn. Then,
[α−ici,(j−1)n
], 0 ≤ i < pv, 0 ≤ j < n, is the Hasse-Galois-Fourier trans-
form of the sequence (a0, α−1a1, . . . , α−(N−1)aN−1).
Example
Consider the two matrices
C =
α 0 α2
1 1 1
1 α α
0 1 1
and C =
α2 α 0
α2 α2 α2
α2 α α2
1 0 1
.
The matrix C is the matrix cyclic shift of C.
Wei Zhou Exit Seminar 56 / 66
72. Example
C =
α 0 α2
1 1 1
1 α α
0 1 1
and C =
α2 α 0
α2 α2 α2
α2 α α2
1 0 1
.
Notice that
C = HGFT(α, 0, 0, 0, 0, 1, α2
, 1, 0, 0, α, 1),
C = HGFT(α, 0, 0, 0, 0, α, α2
, α2
, 0, 0, 1, α),
and both are codewords in RS(4 × 3; 4, 1)4.
Matrix BCH codes may not have the matrix cyclic shift property.
Wei Zhou Exit Seminar 57 / 66
73. Inner product
Definition
C, C =
m−1
i=0
n−1
j=0
ci,jcm−i−1,j.
The inner product allows for developing a MacWilliams-type
identity for matrix codes.
Wei Zhou Exit Seminar 58 / 66
74. The dual code of a matrix Reed-Solomon code
Theorem
Let C be the RS(pv × n; z, t∗)q code. Then, C⊥ is the
RS(pv × n; pvn − z, (pv − t∗)(pvn))q code.
Wei Zhou Exit Seminar 59 / 66
75. The dual code of a matrix Reed-Solomon code
Theorem
Let C be the RS(pv × n; z, t∗)q code. Then, C⊥ is the
RS(pv × n; pvn − z, (pv − t∗)(pvn))q code.
Example
The dual of RS(4 × 3; 4, 1)4 is RS(4 × 3; 8, 3)4 which consists of all
linear combinations of the four matrices
1 1 1
0 0 0
0 0 0
0 0 0
,
1 α α2
1 1 1
0 0 0
0 0 0
,
1 α2 α
0 0 0
1 1 1
0 0 0
,
1 α2 α
1 α α2
1 1 1
1 α2 α
.
Wei Zhou Exit Seminar 59 / 66
76. The dual code of a matrix BCH code
Let Fq be a subfield of Fq and q = q s.
The trace of an element β ∈ Fq over Fq is given by
Trq (β) = β + βq
+ · · · β(q )s−1
,
which is an element in Fq .
The trace code of C is then
Trq (C) = {(Trq (c0), Trq (c1), . . . , Trq (cn−1)) : (c0, c1, . . . , cn−1) ∈ C}.
and it is a linear code over Fq .
Wei Zhou Exit Seminar 60 / 66
77. The dual code of a matrix BCH code -cont.
The Delsarte Theorem states that
(C|Fq )⊥
= Trq (C⊥
),
i.e., the dual of the subfield subcode of a code is the trace of the
dual of that code.
BCH(pv
× n; z, t∗
)⊥
q = Trq (RS(pv
× n; pv
n − z, (pv
− t∗
)pvn)q).
Wei Zhou Exit Seminar 61 / 66
78. Example
We construct a [3 × 2, 4, 3]4 Reed Solomon matrix code over F4. The
codewords in this code are the 44 = 256 matrices over F4 that are the
Hasse-Galois-Fourier transforms of the 44 sequences (a0, a1, . . . , a5) of
length 6 over F4 for which a4 = a5 = 0. The Hasse-Galois-Fourier
transforms of the four sequences
(1, 0, 0, 0, 0, 0), (0, 1, 0, 0, 0, 0),
(0, 0, 1, 0, 0, 0), (0, 0, 0, 1, 0, 0),
form a basis of the code composed of the following four codewords over
F4:
1 1 1
0 0 0
,
1 α α2
1 1 1
,
1 α2 α
0 0 0
,
1 1 1
1 α2 α
.
Wei Zhou Exit Seminar 62 / 66
80. Example
On the other hand, the dual code of the [3 × 2, 4, 3]4 Reed-Solomon
matrix code has the following 16 codewords,
0 0 0
0 0 0
,
α2 α 1
0 0 0
,
1 α2 α
0 0 0
,
α 1 α2
0 0 0
,
1 α 0
α2 α 1
,
α 0 1
α2 α 1
,
0 1 α
α2 α 1
,
α2 α2 α2
α2 α 1
,
α α2 0
1 α2 α
,
1 1 1
1 α2 α
,
α2 0 α
1 α2 α
,
0 α α2
1 α2 α
,
α2 1 0
α 1 α2 ,
0 α2 1
α 1 α2 ,
α α α
α 1 α2 ,
1 0 α2
α 1 α2 .
Using the fact that Tr(1) = 0, Tr(α) = Tr(α2) = 1, we can see that the
dual of subfield subcode of the [3 × 2, 4, 3]4 Reed-Solomon matrix code
is the trace of dual code of Reed Solomon matrix code.
Wei Zhou Exit Seminar 64 / 66
81. Summary
We study the true burst-correcting capability of Fire codes.
We construct BCH matrix codes and study their properties.
Wei Zhou Exit Seminar 65 / 66