SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
International Journal of Science and Research (IJSR) 
ISSN (Online): 2319-7064 
Impact Factor (2012): 3.358 
A Note on a Subcode of a Linear Q – Ary Code of 
Length N and an Algorithm for Calculating 
Minimum Distance 
Dr. M. Mary Jansi Rani 1, M.Manikandan2 
1, 2Thanthai Hans Roever College, Perambalur, India 
Abstract: This Paper Deals with The Calculation Of Minimum Distance Of A Q-Ary Linear Code Of Length N. The Set Of Code 
Words Having The Left Most Coordinate Position O Forms A Subcode. If C Is An [N, K, D] Code, The Subcode Co So Considered Is Of 
Dimensions K-1. The Coset Leaders In C/Co Give The Method Calculating Minimum Distance. The Method Does Not Make Use Of The 
Known Techniques Using A Parity Check Matrix H. In Phillipe Delsarte “Four Fundametal Parameters Of A Code And Their 
Combinatorial Significance, Information And Control 23, 407 – 438 (1973), The Inner Product Of Two Vectors A And B In n 
ai bi Could Be Interpreted Using A Cyclotomic Extension q F (ξ) Of Fq Via 
T(ai) 
Volume 3 Issue 10, October 2014 
www.ijsr.net 
Licensed Under Creative Commons Attribution CC BY 
q F Is 
Considered Using Group Characters Of A Finite Abelian Group (F, +) Of Order Q Over , The Cyclotomic Field Of Complex Vth Roots 
Of Unity. The Dual Code Is Defined Via The Inner Product <A, B> Of A, B  N, If Reduces To The Classical Concept For Linear 
Codes Over Finite Fields. However, If A = A0 A1 .... An, 
B = B0 B1 ... Bn-1  n 
q F . The Inner Product A, B = 
n-1 
i=0 
Trace Of An Element In q F (ξ) . This Give Get Another Interpretation Of The Inner Product A. B. 
Keywords: Cyclotomic Cosets, Minimum Distance, Co Ordinate Position, Coset Leader, Subcode, Inner Product. 
1. Introduction 
In [1], Phillipe Delsarte Give An Interesting Account Of The 
Form Fundamental Parameters Of A Code (Linear Or Not) 
And Their Combinatorial Significance. While Discussing 
The Distance Distribution (Which Reduces To Weight 
Distribution In The Case Of A Linear Code) Of An [N, M] 
Code 1  M  Qn The Author Introduces An Inner Product 
Of Vectors In Fn Where F Is A Finite Abelian Group Of 
Order Q  2, Via A Group Character  Of F Over , The 
Cyclotomic Field Of Complex Vth Roots Of Unity. The 
Inner Product <A, B> Of N-Tuples A = (A0 A1 ... An-1), B = 
(B0 B1 .... Bn-1) Is Given Interms Of . When The Additive 
Code C Is A Subgroup Of Fn, The Dual Code C1 Is Also An 
Additive Code And Is Defined By, 
=aFn (a,b)=1 for all bFn 
This Duality Is An Involution (In The Sense That (E1) = C) 
And C1 Is Such That C1 Is Isomorphic To The Quotient 
Group 
Fn 
C 
. That Is C1 
Fn 
C 
As Mentioned In [1] The 
Definition Of C1 Agrees With The Classical Concept Over 
Finite Fields. Moreover, For Every A, B, C  F N One Has 
(A, B +C) = (A, B) (A, C) More Over, Any Character Of 
(Fn, T) Can Be Represented In This Manner. 
As We Are Handling A Finite Field Fq, It Will Be Nice If 
We Arrive At An Inner Product Using The Field Structure 
Of Fq, Instead Of The Character  Of A Finite Abelian 
Group. The Following Approach To An Inner Product Via A 
Cyclotomic Extension Of A Finite Field Agrees With The 
Known Definition Of An Inner Product Of Vectors A = (A0 
A ... An-1), B = (B0 B1 .... Bn-1) Belonging To n 
q F .Details Are 
Given In 1 Preliminary. The Aim Of This Note Is To 
Propose An Algorithm For The Calculation Of The 
Minimum Weight Of A Q-Ary Linear Code C Using 
Partition Of The Set Of Code Words Of C. The Method, 
Believed To Be New, Does Not Make Use Of The Known 
Techniques Using A Parity Check Matrix H. A New 
Interpretation Of The Inner Product Of Vectors A And B In 
F n 
q Is Also Investigated. 
2. Preliminaries 
Definition: 1.1 The Trace T (A1a2 .... An) Of (A1a2...An) Is 
Defined To Be 
n-1 
T (A0a1.... An-1) = 
i=0 
= N (A0 + A1 + An-1) 
Example: 1 
If F4 = {0, 1,  ,} 1 + 1 = , 1 +  =  Etc. 
T ( 0  ) Where 0    5 
4 F Is Given By 
T ( 0  ) = 5 ( +  +  + ) 
= 5 ( +  +  + ) 
= 5 ( + 2 +  + 2) 
= 5 (1 +  + 1 + ) 
= 5  0 = 0 
This Makes Eligible For Defining The Inner Product (A, B) 
Of Vectors A, B  n 
q F As Follows. 
Paper ID: SEP14720 102
International Journal of Science and Research (IJSR) 
ISSN (Online): 2319-7064 
Impact Factor (2012): 3.358 
Definition: 1.2 The Inner Product A, B Of A, B  n 
q F Is 
C 
C (T) 
Volume 3 Issue 10, October 2014 
www.ijsr.net 
Licensed Under Creative Commons Attribution CC BY 
Given By 
(A, B) = 
1 T(ai) T(bi) 
n  
n-1 
2 
i=0 
This Agrees With The Usual Inner Product Consider In The 
Context Of Q-Ary Linear Codes. For Each Ai  Fq, T(Ai) = 
N Ai (I = 0, 1, 2 .... N). It Is Obvious That This Is Not The 
Type Of Inner Product Considered Using Group Characters 
In Phillipe Del Sarte [1]. 
Let [Ti] Be The Coset Of C Consisting Of All Vectors In 
n 
q F With Syndrome . Suppose That A Code Word y  
Sent Over A Communication Channel Is Received As 
Vector. In Nearest Neighbour Decoding, We Find Out The 
Vector E Of Smallest Weight Such That T – E  C. It 
Amounts To Finding A Vector E Of Smallest Weight In The 
Coset Containing R Such That R – E  C Ie The Coset 
Leader Of Smallest Weight In The Coset Containing R. This 
Leads To ‘Syndrome Decoding’ Algorithm. 
First Choose A Fixed Parity Check Matrix H. 
Step: 1 For Each Syndrome T  n-12 
q F Choosen A Coset 
Leader Et Of The Coset [T]. Create A Table Pairing The 
Syndrome With The Coset Leader. 
Step:2 After Receiving A Vector R, Compute Its Syndrome 
S Using The Parity Check Matrix H. 
Step:3 R Is Decoded As The Codeword R – E. For Details 
See Huffman And Pless [2]. Our Aim Is To Apply A Similar 
Techniques For Obtaining The Minimum Distanced Of A Q-Ary 
Code Of Length N . 
2. Main Theorem In View Of Sylows First Theorem It Is 
Possible To Pick An [N, K-1] Q-Ary Sub Code Of A Q-Ary 
Code Of Length N And Dimension K. 
Definition: 2.1 Let C Be A Q-Ary Code Of Length N (N  
2) And Dimension K. A Code Words C = C0 C1……. Cn-1 
(Where Ci  Fq, I = 0, 1, 2 ... N-1) Is Said To Have The Left 
Mostcoordinatepositionl0. 
For Example:  01    5 
4 F Has Left-Most Coordinate 
Position , (O, 1, , ) Denoting Elements Of F4. 
Definition: 2.2 Let A = A0 A1 .... An-1, B = B0 B1 ... Bn-1 Be 
Two Code Words In C (Of Dimension K) A And B Are Said 
To Be Equivalent. Written A  B,  If And Only If A And B 
Agree On The Left-Most Coordinate Position. 
Theorem: 1 The Equivalence Class Of Code Words Having 
O In The Left-Most Coordinate Position Forms A Subcode 
Co Of C And Co Has Dimension K – 1 Over Fq. 
Proof When Fq = 0,1,α,α2...αε-2 Where  = Exp 
2πi 
q -1 
  
  
  
The Equivalence Relation Given In Definition 2.2 
Partitions C Into Q Classes. In Fact k 
q CF , Each 
Equivalence Class Contains Qk-1 Code Words. Since When 
The Left Most Coordinate Position Is Fixed, We Get Q 
Classes Due To The Partition. In Partition The Class [0] Has 
Qk-1 Elements Following The Addition Rule Fq, If = O 
A1 A2 ... An-1 And B0 = O B1 B2 ... Bn-1, A0 + B0  [0]. Also 
When A Is In [0], -A Is Also In [0]. 0 = 0 0 0 ....  
[0].Therefore 
([0], +) Is An Abelian Group Of Order , For  Fq, 
A0 = (0 A1 A2 ... An-1) 
= ' ' '  
1 2 n+1 0 a a ...a Where ' 
j a = J Aj  Fq. 
So, [0] Is Closed Under Scalar Multiplication. Thus [0] Is A 
Subspace Of n 
q F And Its Dimension Is (K-1). For A Basis 
Of [0] Can Be Put In 1 – 1 Correspondence With The Basis 
Vectors Of A (K-1)-Dimensional Space. This Complets The 
Proof Of Theorem 1. 
Definition: 2.3 We Define By C(T) The Set Of Codewords 
Of C For Which The Coordinates Are Zero An T. C(T) Is A 
Subcode Of C, That Is When 
T = {1} In Theorem 1. Puncturing C(T) On T Gives A Code 
Of Length N – T Called The Code Shortened On T. If Is 
Denoted By CT. 
Example: 1 A Binary Code Of Length 7 And Having 23 = 8 
Code Words Is Given By, 
G = 0 0 0 0 0 0 01 1 1 0 1 0 0 
0 1 1 1 0 1 0 1 0 0 1 1 1 0 
0 0 1 1 1 0 1 1 0 1 0 0 1 1 
0 1 0 0 1 1 11 1 0 1 0 0 1 
When T = {1}, 
(T) = 0 0 0 0 0 0 0 
0 1 1 1 0 1 0 
0 1 0 0 1 1 1 
0 0 1 1 1 0 1 
It Is A Subcode Of C1, C1 (T) Has A Basis 
{0011101, 0100111} 
{0 0 0 0 0 0 0, 111 0 1 0 0}. 
C1 Is A Binary [7, 3. 4] Code Whereas C1 (T) Is A [7, 2, 4] 
Subcode Of C1. 
Example: 2 A Ternary [4, 2, 3] Code Is A Linear Code 
Over 3 = {0, 1, 2} Where 22  (Mod 3). It Is Denoted By 
C2 And Its Code Words Are 
0 0 0 0 1 0 1 1 2 2 1 0 
0 1 1 2 1 1 2 0 2 0 2 2 
0 2 2 1 1 2 0 2 2 1 0 1 
When T = {1}, 
C2 {T} = 0 0 0 0, 0 1 1 2, 0 2 2 1. 
C2(T) Is A Subcode Of C2 And Having Dimension 1 As 
0 1 1 2 + 0 1 1 2 = 0 2 2 1, 
0 1 1 2 + 0 2 2 1 = 0 0 0 0. 
2 
2 
 {0 0 0 0, 1 0 1 1, 2 0 2 2} 
Let Ai Denote The Number Of Code Words Having Weight 
I In C3. The Weight Enumerator Of C3 Is The Polynomial 
Paper ID: SEP14720 103
International Journal of Science and Research (IJSR) 
ISSN (Online): 2319-7064 
Impact Factor (2012): 3.358 
Volume 3 Issue 10, October 2014 
www.ijsr.net 
Ai x y …….(1) 
Licensed Under Creative Commons Attribution CC BY 
W(X, Y) = 
6 
6-i i 
i=0 
Here, A0 = 1, A1 = A2 = 0, A3 = 12, A4 = 18, A5 = 24 And A6 
= 9 Substituting These Values In 1 We Obtain. W(X, Y) = 
X6 + 12x3 Y3 + 18 X2 Y4 + 24xy5 + 9y6 We Observe That C3 
Is A [6, 3, 3] Quaternary Code. 
Theorem: 2 Given A Q-Ary Code Of The Type [N, K, D] 
There Always Exists A Q-Ary [2n, K, D1] Code With A 
Computable Minimum Distance . 
Proof Let C Be A Q-Ary [N, K, D] Code, Suppose That Co 
Denotes The Subcode Of C Having Codewords In Which 
The Left Most Position O. By Theorem 1, Co Is An [N, K-1, 
D0] Code Where D0  D. Then The Orthogonal Complement 
C/ Co Is An [N, 1, ' 
0 d ] Code Which Is Isomorphic To Fq. 
The Minimum Distance ' 
0 d Is Computable. Then C0  C/C0 
Is A [2n, (K-1)+1, D] Code. Where 
D = Min [Do, ' 
0 d ] D Is Computable. Therefore Given A Q-Ary 
[N, K, D] Code, It Is Always Possible To Find A Q-Ary 
[2n, K, D] Code With Computable D. 
Example When C Is A [6, 3, 3] Quaternary Code, C0 Is A 
[6, 2, 3] Quaternary Code. C/ Co Is A [6, 1, 3] Quaternary 
Code. So Co  C/C0 Is A [12, 3, 3] Quaternary Code. 
3. An Algorithm To Find Minimum Weight Of An [N, K] 
Code 
Theorem: 3 The Algorithm For Calculating The Minimum 
Weight D Of A Q-Ary [N, K] Code Of Length N Consists 
Of The Following Steps. 
Step: 1 Determine The Subcode C0 Of Dimension (K-1) 
Containing Codewords With Left Most Coordinates Position 
O. That Is Lies The Codewords In C0 In A Row. 
Step: 2 Determine The Coset Of C0 By Writing [A] = [C0 + 
A] Where A Will Serve As The Element Containing 1’s And 
0’s For The Abelian Group Of Cosets Of C0 Isomorphic To 
(Fq, +). List The Elements Of The Coset [A] In A Row. 
Step: 3 Determine The Minimum Weight Do Of The Code 
Words In C0. 
Step: 4 Determine The Min Weight ' 
0 d Of The Code 
Words In []. 
Step: 5 Determine The Minimum Of The Values D0, ' 
0 d 
Found Out In Steps 3 And 4. The Minimum Valued Gives 
The Minimum Weight D. (Or Minimum Distance D) Of The 
Code C. 
Proof C0 Is A Subspace Of Dimension K-1 Of The Code C. 
The Quotient Space C/C0 Has Dimension And So It Is 
Isomorphic To Fq. For Non Zero Vector V  n 
q F If  Fq 
(  0) Wt (V) = Wt (V) And So We Have Only To 
Determine The Minimum Weights Code Word In C0 And 
[] . This Completes The Proof Of The Algorithm. 
References 
[1] Carry Huffman And Veva Pless:Fundamentals Of 
Errors –Correctingcodes, Cambridge 
Universitypress(2004) 
[2] Chapter. 1 And 7 Sections 1.2, 1.4, 1.5 And Sections 
7.1, 7.2, 7.3, 7.5 And 7.6. Pp. 2-18 And 252-272. 
[3] T.W. Hungerford: Algebra, Holt, Rinchart And Winston 
Inc 1974.Chap. V, PP. 230 – 306. 
[4] Hill. R (1986) A First Course In Coding Theory Oxford 
University Press. 
[5] F.J.Mawilliams,A.M. Odlyzko, And N.J.A. Sloane : 
Self-Dual Codes Over GF(4)Journalofcombinatorial 
Theory, Series A25, 288-318 (1978). 
[6] Phillipe Delsarte: Four Foundamental Parameters Of A 
Code And Their Combinatorial Significance 
Information & Control 23, 407 – 438 (1973). 
Paper ID: SEP14720 104

Contenu connexe

Tendances

Branch and bound technique
Branch and bound techniqueBranch and bound technique
Branch and bound techniqueishmecse13
 
Finite automata intro
Finite automata introFinite automata intro
Finite automata introlavishka_anuj
 
Crypto cs36 39
Crypto cs36 39Crypto cs36 39
Crypto cs36 39sravanbabu
 
Euclid's Algorithm for Greatest Common Divisor - Time Complexity Analysis
Euclid's Algorithm for Greatest Common Divisor - Time Complexity AnalysisEuclid's Algorithm for Greatest Common Divisor - Time Complexity Analysis
Euclid's Algorithm for Greatest Common Divisor - Time Complexity AnalysisAmrinder Arora
 
Presentation F Sharp
Presentation F Sharp Presentation F Sharp
Presentation F Sharp guestbfe8bf
 
Elliptic Curves and Elliptic Curve Cryptography
Elliptic Curves and Elliptic Curve CryptographyElliptic Curves and Elliptic Curve Cryptography
Elliptic Curves and Elliptic Curve CryptographyMd. Al-Amin Khandaker Nipu
 
An Introduction to ECDSA and it's use in Bitcoin (1)
An Introduction to ECDSA and it's use in Bitcoin (1)An Introduction to ECDSA and it's use in Bitcoin (1)
An Introduction to ECDSA and it's use in Bitcoin (1)Hakeem Hunte
 
Csr2011 june18 09_30_shpilka
Csr2011 june18 09_30_shpilkaCsr2011 june18 09_30_shpilka
Csr2011 june18 09_30_shpilkaCSR2011
 
Pyoneers - IITGN CSE Seminar Presentation
Pyoneers - IITGN CSE Seminar PresentationPyoneers - IITGN CSE Seminar Presentation
Pyoneers - IITGN CSE Seminar PresentationVaidyanathan P. R.
 
Mc ty-logarithms-2009-1
Mc ty-logarithms-2009-1Mc ty-logarithms-2009-1
Mc ty-logarithms-2009-1sheetslibrary
 

Tendances (20)

Unit 3
Unit 3Unit 3
Unit 3
 
Branch and bound technique
Branch and bound techniqueBranch and bound technique
Branch and bound technique
 
Finite automata intro
Finite automata introFinite automata intro
Finite automata intro
 
1 1 number theory
1 1 number theory1 1 number theory
1 1 number theory
 
Galois field
Galois fieldGalois field
Galois field
 
Crypto cs36 39
Crypto cs36 39Crypto cs36 39
Crypto cs36 39
 
Euclid's Algorithm for Greatest Common Divisor - Time Complexity Analysis
Euclid's Algorithm for Greatest Common Divisor - Time Complexity AnalysisEuclid's Algorithm for Greatest Common Divisor - Time Complexity Analysis
Euclid's Algorithm for Greatest Common Divisor - Time Complexity Analysis
 
Lex analysis
Lex analysisLex analysis
Lex analysis
 
Ch08
Ch08Ch08
Ch08
 
Presentation F Sharp
Presentation F Sharp Presentation F Sharp
Presentation F Sharp
 
Elliptic Curves and Elliptic Curve Cryptography
Elliptic Curves and Elliptic Curve CryptographyElliptic Curves and Elliptic Curve Cryptography
Elliptic Curves and Elliptic Curve Cryptography
 
07 boolean algebra
07 boolean algebra07 boolean algebra
07 boolean algebra
 
An Introduction to ECDSA and it's use in Bitcoin (1)
An Introduction to ECDSA and it's use in Bitcoin (1)An Introduction to ECDSA and it's use in Bitcoin (1)
An Introduction to ECDSA and it's use in Bitcoin (1)
 
Flat unit 2
Flat unit 2Flat unit 2
Flat unit 2
 
Csr2011 june18 09_30_shpilka
Csr2011 june18 09_30_shpilkaCsr2011 june18 09_30_shpilka
Csr2011 june18 09_30_shpilka
 
15 predicate
15 predicate15 predicate
15 predicate
 
Pyoneers - IITGN CSE Seminar Presentation
Pyoneers - IITGN CSE Seminar PresentationPyoneers - IITGN CSE Seminar Presentation
Pyoneers - IITGN CSE Seminar Presentation
 
Ca notes
Ca notesCa notes
Ca notes
 
Mc ty-logarithms-2009-1
Mc ty-logarithms-2009-1Mc ty-logarithms-2009-1
Mc ty-logarithms-2009-1
 
Adsa u2 ver 1.0.
Adsa u2 ver 1.0.Adsa u2 ver 1.0.
Adsa u2 ver 1.0.
 

En vedette

En vedette (19)

Lipid Profile of Kashmiri Type 2 Diabetic Patients
Lipid Profile of Kashmiri Type 2 Diabetic PatientsLipid Profile of Kashmiri Type 2 Diabetic Patients
Lipid Profile of Kashmiri Type 2 Diabetic Patients
 
U0 vqmt qzmdy=
U0 vqmt qzmdy=U0 vqmt qzmdy=
U0 vqmt qzmdy=
 
A Repetitive Sparce Matrix Converter with Z-Source Network to having less Cur...
A Repetitive Sparce Matrix Converter with Z-Source Network to having less Cur...A Repetitive Sparce Matrix Converter with Z-Source Network to having less Cur...
A Repetitive Sparce Matrix Converter with Z-Source Network to having less Cur...
 
U0 vqmt qxodk=
U0 vqmt qxodk=U0 vqmt qxodk=
U0 vqmt qxodk=
 
Md iw mtq2mza=
Md iw mtq2mza=Md iw mtq2mza=
Md iw mtq2mza=
 
T0 numtq0ndy=
T0 numtq0ndy=T0 numtq0ndy=
T0 numtq0ndy=
 
U0 vqmtq2o tk=
U0 vqmtq2o tk=U0 vqmtq2o tk=
U0 vqmtq2o tk=
 
T0 numtq0n tk=
T0 numtq0n tk=T0 numtq0n tk=
T0 numtq0n tk=
 
Developing a Democratic Constitutional Framework through a People-Driven Cons...
Developing a Democratic Constitutional Framework through a People-Driven Cons...Developing a Democratic Constitutional Framework through a People-Driven Cons...
Developing a Democratic Constitutional Framework through a People-Driven Cons...
 
Modeling Local Broker Policy Based on Workload Profile in Network Cloud
Modeling Local Broker Policy Based on Workload Profile in Network CloudModeling Local Broker Policy Based on Workload Profile in Network Cloud
Modeling Local Broker Policy Based on Workload Profile in Network Cloud
 
Md iw mtu3mja=
Md iw mtu3mja=Md iw mtu3mja=
Md iw mtu3mja=
 
U0 vqmtq2ota=
U0 vqmtq2ota=U0 vqmtq2ota=
U0 vqmtq2ota=
 
Md iw mtu3mzi=
Md iw mtu3mzi=Md iw mtu3mzi=
Md iw mtu3mzi=
 
U0 vqmtq4na==
U0 vqmtq4na==U0 vqmtq4na==
U0 vqmtq4na==
 
U0 vqmt qyntu=
U0 vqmt qyntu=U0 vqmt qyntu=
U0 vqmt qyntu=
 
A Defence Strategy against Flooding Attack Using Puzzles by Game Theory
A Defence Strategy against Flooding Attack Using Puzzles by Game TheoryA Defence Strategy against Flooding Attack Using Puzzles by Game Theory
A Defence Strategy against Flooding Attack Using Puzzles by Game Theory
 
U0 vqmtq3mde=
U0 vqmtq3mde=U0 vqmtq3mde=
U0 vqmtq3mde=
 
T0 numtq0odq=
T0 numtq0odq=T0 numtq0odq=
T0 numtq0odq=
 
A Case Study of Economic Load Dispatch for a Thermal Power Plant using Partic...
A Case Study of Economic Load Dispatch for a Thermal Power Plant using Partic...A Case Study of Economic Load Dispatch for a Thermal Power Plant using Partic...
A Case Study of Economic Load Dispatch for a Thermal Power Plant using Partic...
 

Similaire à U0 vqmtq3mja=

Application of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding TheoryApplication of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding TheoryIJERA Editor
 
Application of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding TheoryApplication of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding TheoryIJERA Editor
 
Weight enumerators of block codes and the mc williams
Weight  enumerators of block codes and  the mc williamsWeight  enumerators of block codes and  the mc williams
Weight enumerators of block codes and the mc williamsMadhumita Tamhane
 
ON RUN-LENGTH-CONSTRAINED BINARY SEQUENCES
ON RUN-LENGTH-CONSTRAINED BINARY SEQUENCESON RUN-LENGTH-CONSTRAINED BINARY SEQUENCES
ON RUN-LENGTH-CONSTRAINED BINARY SEQUENCESijitjournal
 
ON THE COVERING RADIUS OF CODES OVER Z4 WITH CHINESE EUCLIDEAN WEIGHT
ON THE COVERING RADIUS OF CODES OVER Z4 WITH CHINESE EUCLIDEAN WEIGHTON THE COVERING RADIUS OF CODES OVER Z4 WITH CHINESE EUCLIDEAN WEIGHT
ON THE COVERING RADIUS OF CODES OVER Z4 WITH CHINESE EUCLIDEAN WEIGHTijitjournal
 
SURF 2012 Final Report(1)
SURF 2012 Final Report(1)SURF 2012 Final Report(1)
SURF 2012 Final Report(1)Eric Zhang
 
CHAPTER 02 - Linear codes.ppt
CHAPTER 02 - Linear codes.pptCHAPTER 02 - Linear codes.ppt
CHAPTER 02 - Linear codes.pptdlakmlkfma
 
CHAPTER 02 - Linear codes.ppt
CHAPTER 02 - Linear codes.pptCHAPTER 02 - Linear codes.ppt
CHAPTER 02 - Linear codes.pptdlakmlkfma
 
MATH 270 TEST 3 REVIEW1. Given subspaces H and K of a vect.docx
MATH 270 TEST 3 REVIEW1. Given subspaces H and K of a vect.docxMATH 270 TEST 3 REVIEW1. Given subspaces H and K of a vect.docx
MATH 270 TEST 3 REVIEW1. Given subspaces H and K of a vect.docxwkyra78
 
Succinct Data Structure for Analyzing Document Collection
Succinct Data Structure for Analyzing Document CollectionSuccinct Data Structure for Analyzing Document Collection
Succinct Data Structure for Analyzing Document CollectionPreferred Networks
 
Linear Cryptanalysis Lecture 線形解読法
Linear Cryptanalysis Lecture 線形解読法Linear Cryptanalysis Lecture 線形解読法
Linear Cryptanalysis Lecture 線形解読法Kai Katsumata
 
Application of Module Structure of Algebra in Homomorphic Signal Processing
Application of Module Structure of Algebra in Homomorphic Signal ProcessingApplication of Module Structure of Algebra in Homomorphic Signal Processing
Application of Module Structure of Algebra in Homomorphic Signal Processingijsrd.com
 
Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...
Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...
Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...inventionjournals
 
Proof of Kraft Mc-Millan theorem - nguyen vu hung
Proof of Kraft Mc-Millan theorem - nguyen vu hungProof of Kraft Mc-Millan theorem - nguyen vu hung
Proof of Kraft Mc-Millan theorem - nguyen vu hungVu Hung Nguyen
 
Olimpiade matematika di kanada 2017
Olimpiade matematika di kanada 2017Olimpiade matematika di kanada 2017
Olimpiade matematika di kanada 2017radar radius
 
Automata
AutomataAutomata
AutomataGaditek
 
Linear block coding
Linear block codingLinear block coding
Linear block codingjknm
 

Similaire à U0 vqmtq3mja= (20)

Application of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding TheoryApplication of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding Theory
 
Application of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding TheoryApplication of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding Theory
 
Weight enumerators of block codes and the mc williams
Weight  enumerators of block codes and  the mc williamsWeight  enumerators of block codes and  the mc williams
Weight enumerators of block codes and the mc williams
 
ON RUN-LENGTH-CONSTRAINED BINARY SEQUENCES
ON RUN-LENGTH-CONSTRAINED BINARY SEQUENCESON RUN-LENGTH-CONSTRAINED BINARY SEQUENCES
ON RUN-LENGTH-CONSTRAINED BINARY SEQUENCES
 
ON THE COVERING RADIUS OF CODES OVER Z4 WITH CHINESE EUCLIDEAN WEIGHT
ON THE COVERING RADIUS OF CODES OVER Z4 WITH CHINESE EUCLIDEAN WEIGHTON THE COVERING RADIUS OF CODES OVER Z4 WITH CHINESE EUCLIDEAN WEIGHT
ON THE COVERING RADIUS OF CODES OVER Z4 WITH CHINESE EUCLIDEAN WEIGHT
 
SURF 2012 Final Report(1)
SURF 2012 Final Report(1)SURF 2012 Final Report(1)
SURF 2012 Final Report(1)
 
CHAPTER 02 - Linear codes.ppt
CHAPTER 02 - Linear codes.pptCHAPTER 02 - Linear codes.ppt
CHAPTER 02 - Linear codes.ppt
 
CHAPTER 02 - Linear codes.ppt
CHAPTER 02 - Linear codes.pptCHAPTER 02 - Linear codes.ppt
CHAPTER 02 - Linear codes.ppt
 
MATH 270 TEST 3 REVIEW1. Given subspaces H and K of a vect.docx
MATH 270 TEST 3 REVIEW1. Given subspaces H and K of a vect.docxMATH 270 TEST 3 REVIEW1. Given subspaces H and K of a vect.docx
MATH 270 TEST 3 REVIEW1. Given subspaces H and K of a vect.docx
 
Succinct Data Structure for Analyzing Document Collection
Succinct Data Structure for Analyzing Document CollectionSuccinct Data Structure for Analyzing Document Collection
Succinct Data Structure for Analyzing Document Collection
 
Unit 3
Unit 3Unit 3
Unit 3
 
Unit 3
Unit 3Unit 3
Unit 3
 
Linear Cryptanalysis Lecture 線形解読法
Linear Cryptanalysis Lecture 線形解読法Linear Cryptanalysis Lecture 線形解読法
Linear Cryptanalysis Lecture 線形解読法
 
Application of Module Structure of Algebra in Homomorphic Signal Processing
Application of Module Structure of Algebra in Homomorphic Signal ProcessingApplication of Module Structure of Algebra in Homomorphic Signal Processing
Application of Module Structure of Algebra in Homomorphic Signal Processing
 
Online Signals and Systems Assignment Help
Online Signals and Systems Assignment HelpOnline Signals and Systems Assignment Help
Online Signals and Systems Assignment Help
 
Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...
Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...
Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...
 
Proof of Kraft Mc-Millan theorem - nguyen vu hung
Proof of Kraft Mc-Millan theorem - nguyen vu hungProof of Kraft Mc-Millan theorem - nguyen vu hung
Proof of Kraft Mc-Millan theorem - nguyen vu hung
 
Olimpiade matematika di kanada 2017
Olimpiade matematika di kanada 2017Olimpiade matematika di kanada 2017
Olimpiade matematika di kanada 2017
 
Automata
AutomataAutomata
Automata
 
Linear block coding
Linear block codingLinear block coding
Linear block coding
 

Plus de International Journal of Science and Research (IJSR)

Plus de International Journal of Science and Research (IJSR) (20)

Innovations in the Diagnosis and Treatment of Chronic Heart Failure
Innovations in the Diagnosis and Treatment of Chronic Heart FailureInnovations in the Diagnosis and Treatment of Chronic Heart Failure
Innovations in the Diagnosis and Treatment of Chronic Heart Failure
 
Design and implementation of carrier based sinusoidal pwm (bipolar) inverter
Design and implementation of carrier based sinusoidal pwm (bipolar) inverterDesign and implementation of carrier based sinusoidal pwm (bipolar) inverter
Design and implementation of carrier based sinusoidal pwm (bipolar) inverter
 
Polarization effect of antireflection coating for soi material system
Polarization effect of antireflection coating for soi material systemPolarization effect of antireflection coating for soi material system
Polarization effect of antireflection coating for soi material system
 
Image resolution enhancement via multi surface fitting
Image resolution enhancement via multi surface fittingImage resolution enhancement via multi surface fitting
Image resolution enhancement via multi surface fitting
 
Ad hoc networks technical issues on radio links security &amp; qo s
Ad hoc networks technical issues on radio links security &amp; qo sAd hoc networks technical issues on radio links security &amp; qo s
Ad hoc networks technical issues on radio links security &amp; qo s
 
Microstructure analysis of the carbon nano tubes aluminum composite with diff...
Microstructure analysis of the carbon nano tubes aluminum composite with diff...Microstructure analysis of the carbon nano tubes aluminum composite with diff...
Microstructure analysis of the carbon nano tubes aluminum composite with diff...
 
Improving the life of lm13 using stainless spray ii coating for engine applic...
Improving the life of lm13 using stainless spray ii coating for engine applic...Improving the life of lm13 using stainless spray ii coating for engine applic...
Improving the life of lm13 using stainless spray ii coating for engine applic...
 
An overview on development of aluminium metal matrix composites with hybrid r...
An overview on development of aluminium metal matrix composites with hybrid r...An overview on development of aluminium metal matrix composites with hybrid r...
An overview on development of aluminium metal matrix composites with hybrid r...
 
Pesticide mineralization in water using silver nanoparticles incorporated on ...
Pesticide mineralization in water using silver nanoparticles incorporated on ...Pesticide mineralization in water using silver nanoparticles incorporated on ...
Pesticide mineralization in water using silver nanoparticles incorporated on ...
 
Comparative study on computers operated by eyes and brain
Comparative study on computers operated by eyes and brainComparative study on computers operated by eyes and brain
Comparative study on computers operated by eyes and brain
 
T s eliot and the concept of literary tradition and the importance of allusions
T s eliot and the concept of literary tradition and the importance of allusionsT s eliot and the concept of literary tradition and the importance of allusions
T s eliot and the concept of literary tradition and the importance of allusions
 
Effect of select yogasanas and pranayama practices on selected physiological ...
Effect of select yogasanas and pranayama practices on selected physiological ...Effect of select yogasanas and pranayama practices on selected physiological ...
Effect of select yogasanas and pranayama practices on selected physiological ...
 
Grid computing for load balancing strategies
Grid computing for load balancing strategiesGrid computing for load balancing strategies
Grid computing for load balancing strategies
 
A new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidthA new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidth
 
Main physical causes of climate change and global warming a general overview
Main physical causes of climate change and global warming   a general overviewMain physical causes of climate change and global warming   a general overview
Main physical causes of climate change and global warming a general overview
 
Performance assessment of control loops
Performance assessment of control loopsPerformance assessment of control loops
Performance assessment of control loops
 
Capital market in bangladesh an overview
Capital market in bangladesh an overviewCapital market in bangladesh an overview
Capital market in bangladesh an overview
 
Faster and resourceful multi core web crawling
Faster and resourceful multi core web crawlingFaster and resourceful multi core web crawling
Faster and resourceful multi core web crawling
 
Extended fuzzy c means clustering algorithm in segmentation of noisy images
Extended fuzzy c means clustering algorithm in segmentation of noisy imagesExtended fuzzy c means clustering algorithm in segmentation of noisy images
Extended fuzzy c means clustering algorithm in segmentation of noisy images
 
Parallel generators of pseudo random numbers with control of calculation errors
Parallel generators of pseudo random numbers with control of calculation errorsParallel generators of pseudo random numbers with control of calculation errors
Parallel generators of pseudo random numbers with control of calculation errors
 

U0 vqmtq3mja=

  • 1. International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Impact Factor (2012): 3.358 A Note on a Subcode of a Linear Q – Ary Code of Length N and an Algorithm for Calculating Minimum Distance Dr. M. Mary Jansi Rani 1, M.Manikandan2 1, 2Thanthai Hans Roever College, Perambalur, India Abstract: This Paper Deals with The Calculation Of Minimum Distance Of A Q-Ary Linear Code Of Length N. The Set Of Code Words Having The Left Most Coordinate Position O Forms A Subcode. If C Is An [N, K, D] Code, The Subcode Co So Considered Is Of Dimensions K-1. The Coset Leaders In C/Co Give The Method Calculating Minimum Distance. The Method Does Not Make Use Of The Known Techniques Using A Parity Check Matrix H. In Phillipe Delsarte “Four Fundametal Parameters Of A Code And Their Combinatorial Significance, Information And Control 23, 407 – 438 (1973), The Inner Product Of Two Vectors A And B In n ai bi Could Be Interpreted Using A Cyclotomic Extension q F (ξ) Of Fq Via T(ai) Volume 3 Issue 10, October 2014 www.ijsr.net Licensed Under Creative Commons Attribution CC BY q F Is Considered Using Group Characters Of A Finite Abelian Group (F, +) Of Order Q Over , The Cyclotomic Field Of Complex Vth Roots Of Unity. The Dual Code Is Defined Via The Inner Product <A, B> Of A, B  N, If Reduces To The Classical Concept For Linear Codes Over Finite Fields. However, If A = A0 A1 .... An, B = B0 B1 ... Bn-1  n q F . The Inner Product A, B = n-1 i=0 Trace Of An Element In q F (ξ) . This Give Get Another Interpretation Of The Inner Product A. B. Keywords: Cyclotomic Cosets, Minimum Distance, Co Ordinate Position, Coset Leader, Subcode, Inner Product. 1. Introduction In [1], Phillipe Delsarte Give An Interesting Account Of The Form Fundamental Parameters Of A Code (Linear Or Not) And Their Combinatorial Significance. While Discussing The Distance Distribution (Which Reduces To Weight Distribution In The Case Of A Linear Code) Of An [N, M] Code 1  M  Qn The Author Introduces An Inner Product Of Vectors In Fn Where F Is A Finite Abelian Group Of Order Q  2, Via A Group Character  Of F Over , The Cyclotomic Field Of Complex Vth Roots Of Unity. The Inner Product <A, B> Of N-Tuples A = (A0 A1 ... An-1), B = (B0 B1 .... Bn-1) Is Given Interms Of . When The Additive Code C Is A Subgroup Of Fn, The Dual Code C1 Is Also An Additive Code And Is Defined By, =aFn (a,b)=1 for all bFn This Duality Is An Involution (In The Sense That (E1) = C) And C1 Is Such That C1 Is Isomorphic To The Quotient Group Fn C . That Is C1 Fn C As Mentioned In [1] The Definition Of C1 Agrees With The Classical Concept Over Finite Fields. Moreover, For Every A, B, C  F N One Has (A, B +C) = (A, B) (A, C) More Over, Any Character Of (Fn, T) Can Be Represented In This Manner. As We Are Handling A Finite Field Fq, It Will Be Nice If We Arrive At An Inner Product Using The Field Structure Of Fq, Instead Of The Character  Of A Finite Abelian Group. The Following Approach To An Inner Product Via A Cyclotomic Extension Of A Finite Field Agrees With The Known Definition Of An Inner Product Of Vectors A = (A0 A ... An-1), B = (B0 B1 .... Bn-1) Belonging To n q F .Details Are Given In 1 Preliminary. The Aim Of This Note Is To Propose An Algorithm For The Calculation Of The Minimum Weight Of A Q-Ary Linear Code C Using Partition Of The Set Of Code Words Of C. The Method, Believed To Be New, Does Not Make Use Of The Known Techniques Using A Parity Check Matrix H. A New Interpretation Of The Inner Product Of Vectors A And B In F n q Is Also Investigated. 2. Preliminaries Definition: 1.1 The Trace T (A1a2 .... An) Of (A1a2...An) Is Defined To Be n-1 T (A0a1.... An-1) = i=0 = N (A0 + A1 + An-1) Example: 1 If F4 = {0, 1,  ,} 1 + 1 = , 1 +  =  Etc. T ( 0  ) Where 0    5 4 F Is Given By T ( 0  ) = 5 ( +  +  + ) = 5 ( +  +  + ) = 5 ( + 2 +  + 2) = 5 (1 +  + 1 + ) = 5  0 = 0 This Makes Eligible For Defining The Inner Product (A, B) Of Vectors A, B  n q F As Follows. Paper ID: SEP14720 102
  • 2. International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Impact Factor (2012): 3.358 Definition: 1.2 The Inner Product A, B Of A, B  n q F Is C C (T) Volume 3 Issue 10, October 2014 www.ijsr.net Licensed Under Creative Commons Attribution CC BY Given By (A, B) = 1 T(ai) T(bi) n  n-1 2 i=0 This Agrees With The Usual Inner Product Consider In The Context Of Q-Ary Linear Codes. For Each Ai  Fq, T(Ai) = N Ai (I = 0, 1, 2 .... N). It Is Obvious That This Is Not The Type Of Inner Product Considered Using Group Characters In Phillipe Del Sarte [1]. Let [Ti] Be The Coset Of C Consisting Of All Vectors In n q F With Syndrome . Suppose That A Code Word y  Sent Over A Communication Channel Is Received As Vector. In Nearest Neighbour Decoding, We Find Out The Vector E Of Smallest Weight Such That T – E  C. It Amounts To Finding A Vector E Of Smallest Weight In The Coset Containing R Such That R – E  C Ie The Coset Leader Of Smallest Weight In The Coset Containing R. This Leads To ‘Syndrome Decoding’ Algorithm. First Choose A Fixed Parity Check Matrix H. Step: 1 For Each Syndrome T  n-12 q F Choosen A Coset Leader Et Of The Coset [T]. Create A Table Pairing The Syndrome With The Coset Leader. Step:2 After Receiving A Vector R, Compute Its Syndrome S Using The Parity Check Matrix H. Step:3 R Is Decoded As The Codeword R – E. For Details See Huffman And Pless [2]. Our Aim Is To Apply A Similar Techniques For Obtaining The Minimum Distanced Of A Q-Ary Code Of Length N . 2. Main Theorem In View Of Sylows First Theorem It Is Possible To Pick An [N, K-1] Q-Ary Sub Code Of A Q-Ary Code Of Length N And Dimension K. Definition: 2.1 Let C Be A Q-Ary Code Of Length N (N  2) And Dimension K. A Code Words C = C0 C1……. Cn-1 (Where Ci  Fq, I = 0, 1, 2 ... N-1) Is Said To Have The Left Mostcoordinatepositionl0. For Example:  01    5 4 F Has Left-Most Coordinate Position , (O, 1, , ) Denoting Elements Of F4. Definition: 2.2 Let A = A0 A1 .... An-1, B = B0 B1 ... Bn-1 Be Two Code Words In C (Of Dimension K) A And B Are Said To Be Equivalent. Written A  B,  If And Only If A And B Agree On The Left-Most Coordinate Position. Theorem: 1 The Equivalence Class Of Code Words Having O In The Left-Most Coordinate Position Forms A Subcode Co Of C And Co Has Dimension K – 1 Over Fq. Proof When Fq = 0,1,α,α2...αε-2 Where  = Exp 2πi q -1       The Equivalence Relation Given In Definition 2.2 Partitions C Into Q Classes. In Fact k q CF , Each Equivalence Class Contains Qk-1 Code Words. Since When The Left Most Coordinate Position Is Fixed, We Get Q Classes Due To The Partition. In Partition The Class [0] Has Qk-1 Elements Following The Addition Rule Fq, If = O A1 A2 ... An-1 And B0 = O B1 B2 ... Bn-1, A0 + B0  [0]. Also When A Is In [0], -A Is Also In [0]. 0 = 0 0 0 ....  [0].Therefore ([0], +) Is An Abelian Group Of Order , For  Fq, A0 = (0 A1 A2 ... An-1) = ' ' '  1 2 n+1 0 a a ...a Where ' j a = J Aj  Fq. So, [0] Is Closed Under Scalar Multiplication. Thus [0] Is A Subspace Of n q F And Its Dimension Is (K-1). For A Basis Of [0] Can Be Put In 1 – 1 Correspondence With The Basis Vectors Of A (K-1)-Dimensional Space. This Complets The Proof Of Theorem 1. Definition: 2.3 We Define By C(T) The Set Of Codewords Of C For Which The Coordinates Are Zero An T. C(T) Is A Subcode Of C, That Is When T = {1} In Theorem 1. Puncturing C(T) On T Gives A Code Of Length N – T Called The Code Shortened On T. If Is Denoted By CT. Example: 1 A Binary Code Of Length 7 And Having 23 = 8 Code Words Is Given By, G = 0 0 0 0 0 0 01 1 1 0 1 0 0 0 1 1 1 0 1 0 1 0 0 1 1 1 0 0 0 1 1 1 0 1 1 0 1 0 0 1 1 0 1 0 0 1 1 11 1 0 1 0 0 1 When T = {1}, (T) = 0 0 0 0 0 0 0 0 1 1 1 0 1 0 0 1 0 0 1 1 1 0 0 1 1 1 0 1 It Is A Subcode Of C1, C1 (T) Has A Basis {0011101, 0100111} {0 0 0 0 0 0 0, 111 0 1 0 0}. C1 Is A Binary [7, 3. 4] Code Whereas C1 (T) Is A [7, 2, 4] Subcode Of C1. Example: 2 A Ternary [4, 2, 3] Code Is A Linear Code Over 3 = {0, 1, 2} Where 22  (Mod 3). It Is Denoted By C2 And Its Code Words Are 0 0 0 0 1 0 1 1 2 2 1 0 0 1 1 2 1 1 2 0 2 0 2 2 0 2 2 1 1 2 0 2 2 1 0 1 When T = {1}, C2 {T} = 0 0 0 0, 0 1 1 2, 0 2 2 1. C2(T) Is A Subcode Of C2 And Having Dimension 1 As 0 1 1 2 + 0 1 1 2 = 0 2 2 1, 0 1 1 2 + 0 2 2 1 = 0 0 0 0. 2 2  {0 0 0 0, 1 0 1 1, 2 0 2 2} Let Ai Denote The Number Of Code Words Having Weight I In C3. The Weight Enumerator Of C3 Is The Polynomial Paper ID: SEP14720 103
  • 3. International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Impact Factor (2012): 3.358 Volume 3 Issue 10, October 2014 www.ijsr.net Ai x y …….(1) Licensed Under Creative Commons Attribution CC BY W(X, Y) = 6 6-i i i=0 Here, A0 = 1, A1 = A2 = 0, A3 = 12, A4 = 18, A5 = 24 And A6 = 9 Substituting These Values In 1 We Obtain. W(X, Y) = X6 + 12x3 Y3 + 18 X2 Y4 + 24xy5 + 9y6 We Observe That C3 Is A [6, 3, 3] Quaternary Code. Theorem: 2 Given A Q-Ary Code Of The Type [N, K, D] There Always Exists A Q-Ary [2n, K, D1] Code With A Computable Minimum Distance . Proof Let C Be A Q-Ary [N, K, D] Code, Suppose That Co Denotes The Subcode Of C Having Codewords In Which The Left Most Position O. By Theorem 1, Co Is An [N, K-1, D0] Code Where D0  D. Then The Orthogonal Complement C/ Co Is An [N, 1, ' 0 d ] Code Which Is Isomorphic To Fq. The Minimum Distance ' 0 d Is Computable. Then C0  C/C0 Is A [2n, (K-1)+1, D] Code. Where D = Min [Do, ' 0 d ] D Is Computable. Therefore Given A Q-Ary [N, K, D] Code, It Is Always Possible To Find A Q-Ary [2n, K, D] Code With Computable D. Example When C Is A [6, 3, 3] Quaternary Code, C0 Is A [6, 2, 3] Quaternary Code. C/ Co Is A [6, 1, 3] Quaternary Code. So Co  C/C0 Is A [12, 3, 3] Quaternary Code. 3. An Algorithm To Find Minimum Weight Of An [N, K] Code Theorem: 3 The Algorithm For Calculating The Minimum Weight D Of A Q-Ary [N, K] Code Of Length N Consists Of The Following Steps. Step: 1 Determine The Subcode C0 Of Dimension (K-1) Containing Codewords With Left Most Coordinates Position O. That Is Lies The Codewords In C0 In A Row. Step: 2 Determine The Coset Of C0 By Writing [A] = [C0 + A] Where A Will Serve As The Element Containing 1’s And 0’s For The Abelian Group Of Cosets Of C0 Isomorphic To (Fq, +). List The Elements Of The Coset [A] In A Row. Step: 3 Determine The Minimum Weight Do Of The Code Words In C0. Step: 4 Determine The Min Weight ' 0 d Of The Code Words In []. Step: 5 Determine The Minimum Of The Values D0, ' 0 d Found Out In Steps 3 And 4. The Minimum Valued Gives The Minimum Weight D. (Or Minimum Distance D) Of The Code C. Proof C0 Is A Subspace Of Dimension K-1 Of The Code C. The Quotient Space C/C0 Has Dimension And So It Is Isomorphic To Fq. For Non Zero Vector V  n q F If  Fq (  0) Wt (V) = Wt (V) And So We Have Only To Determine The Minimum Weights Code Word In C0 And [] . This Completes The Proof Of The Algorithm. References [1] Carry Huffman And Veva Pless:Fundamentals Of Errors –Correctingcodes, Cambridge Universitypress(2004) [2] Chapter. 1 And 7 Sections 1.2, 1.4, 1.5 And Sections 7.1, 7.2, 7.3, 7.5 And 7.6. Pp. 2-18 And 252-272. [3] T.W. Hungerford: Algebra, Holt, Rinchart And Winston Inc 1974.Chap. V, PP. 230 – 306. [4] Hill. R (1986) A First Course In Coding Theory Oxford University Press. [5] F.J.Mawilliams,A.M. Odlyzko, And N.J.A. Sloane : Self-Dual Codes Over GF(4)Journalofcombinatorial Theory, Series A25, 288-318 (1978). [6] Phillipe Delsarte: Four Foundamental Parameters Of A Code And Their Combinatorial Significance Information & Control 23, 407 – 438 (1973). Paper ID: SEP14720 104