Dense gray codes in mixed radices
The standard binary reflected Gray code produces a permutation of the sequence of integers (0, 1,…, n − 1), where n is a power of 2, such that the binary representation of each integer in the permuted sequence differs from the binary representation of the preceding integer in exactly one bit. In an earlier paper, we presented two methods to compute binary dense Gray codes, which extend the possible values of n to the set of all positive integers while preserving both the Gray-code property — only one bit changes between each pair of consecutive integers — and the denseness property — the sequence contains exactly the n integers 0 to n − 1. This paper generalizes our method for binary dense Gray codes to arbitrary radices that may be either a single fixed radix for all digits or mixed radices, so that each digit may have a different radix. That is, we show how to produce a permutation of (0, 1, …, n−1) represented in any set of radices, such that the representation of each number differs from the representation of the preceding number in exactly one digit, and the values of these digits differ by exactly 1. We provide a simple formula for this permuation, which we can use to quickly compute a Hamiltonian path for a dynamic array of n nodes, where the nodes are added and deleted in order along the k dimensions of a grid network.
- Research Article
21
- 10.1109/tcomm.2011.022811.100092
- Apr 1, 2011
- IEEE Transactions on Communications
A novel number theoretic transform called Inverse Gray Robust Symmetrical Number System (IGRSNS) is proposed for error control coding in this paper. IGRSNS is obtained by modifying Robust Symmetrical Number System (RSNS) that was proposed earlier, using Inverse Gray code property. Due to ambiguities present in each residue, RSNS has a short dynamic range (DR) compared to that in other number systems. The short DR of RSNS enables it to be effectively used for error detection without the addition of any redundant modulus as in Redundant Residue Number System. Although RSNS has a large redundant range, its detection ability is not optimal due to the Gray code property associated with it. In an attempt to overcome this limitation, we have proposed Inverse Gray coding to be combined with RSNS in increasing its effectiveness in error detection. The resulting IGRSNS thus inherits properties of both RSNS and Gray code. Analysis and simulations show that IGRSNS has a near-optimal error detection ability. The potential of IGRSNS for error correction is also investigated. Further, a novel error correction algorithm using one redundant modulus is proposed. Simulations show that the proposed algorithm performs well under all cases of single bit errors.
- Conference Article
2
- 10.1117/12.169862
- Mar 1, 1994
Projection of coded patterns is a popular method for the acquisition of dense range images. Usually, the binary code or gray code is used for projection patterns. In this paper we investigate the light plane identification error in the two codes. Our main result is that the binary code and gray code have the same error characteristic while the partial gray code is superior to the partial binary code.
- Research Article
36
- 10.1109/18.568706
- May 1, 1997
- IEEE Transactions on Information Theory
This paper describes how 2-adic numbers can be used to analyze the structure of binary cyclic codes and of cyclic codes defined over Z/sub 2(a)/, a/spl ges/2, the ring of integers modulo 2/sup a/. It provides a 2-adic proof of a theorem of McEliece that characterizes the possible Hamming weights that can appear in a binary cyclic code. A generalization of this theorem is derived that applies to cyclic codes over Z/sub 2(a)/ that are obtained from binary cyclic codes by a sequence of Hensel lifts. This generalization characterizes the number of times a residue modulo 2/sup a/ appears as a component of an arbitrary codeword in the cyclic code. The limit of the sequence of Hensel lifts is a universal code defined over the 2-adic integers. This code was first introduced by Calderbank and Sloane (1995), and is the main subject of this paper. Binary cyclic codes and cyclic codes over Z/sub 2(a)/ are obtained from these universal codes by reduction modulo some power of 2. A special case of particular interest is cyclic codes over Z/sub 4/ that are obtained from binary cyclic codes by means of a single Hensel lift. The binary images of such codes under the Gray isometry include the Kerdock, Preparata, and Delsart-Goethals codes. These are nonlinear binary codes that contain more codewords than any linear code presently known. Fundamental understanding of the composition of codewords in cyclic codes over Z/sub 4/ is central to the search for more families of optimal codes. This paper also constructs even unimodular lattices from the Hensel lift of extended binary cyclic codes that are self-dual with all Hamming weights divisible by 4. The Leech lattice arises in this way as do extremal lattices in dimensions 32 through 48.
- Research Article
46
- 10.1109/18.796379
- Jan 1, 1999
- IEEE Transactions on Information Theory
Single-track Gray codes are cyclic Gray codes with codewords of length n, such that all the n tracks which correspond to the n distinct coordinates of the codewords are cyclic shifts of the first track. We investigate the structure of such binary codes and show that there is no such code with 2/sup n/ codewords when n is a power of 2. This implies that the known codes with 2/sup n/-2n codewords. when n is a power of 2, are optimal. This result is then generalized to codes over GF(p), where p is a prime. A subclass of single-track Gray codes, called single-track Gray codes with k-spaced heads, is also defined. All known systematic constructions for single-track Gray codes result in codes from this subclass. We investigate this class and show it has a strong connection with two classes of sequences, the full-order words and the full-order self-dual words. We present an iterative construction for binary single-track Gray codes which are asymptotically optimal if an infinite family of asymptotically optimal seed-codes exists. This construction is based on an effective way to generate a large set of distinct necklaces and a merging method for cyclic Gray codes based on necklaces representatives.
- Conference Article
3
- 10.1117/12.2019753
- May 3, 2013
The paper considers results of design and modeling of continuously logical analog-to-digital converters (ADC) based on current mirrors for image processor and multichannel optical sensor systems with parallel inputs-outputs. For such multichannel serial-parallel analog-to-digital converters (SP ADC) it is needed base photoelectron cells, which are considered in paper. Its have a number of advantages: high speed and reliability, simplicity, small power consumption, high integration level for linear and matrix structures. We show design of the continuously logical ADC of photocurrents and its base digit cells (ABC) and its simulations. We consider CL ADC for Gray and binary codes. Each channel of the structure consists of several base digit cells (ABC) on 20-30 CMOS FETs and one photodiode. The supply voltage of the ABC is 1-3.3V, the range of an input photocurrent is 0.1 – 10μA, the transformation time is 30ns at 5-8 bit binary or Gray codes, power consumption is about 1mW. One channel of ADC with iteration is based on one ABC-3(G) and SHD, and it has only 40 CMOS transistors. The general power consumption of the ADC, in this case, is only 50-100μW, if the maximum input current is 1μA. The CL ADC opens new prospects for realization of linear and matrix image processor and photo-electronic structures with picture operands, which are necessary for neural networks, digital optoelectronic processors, neural-fuzzy controllers, and so forth.
- Research Article
4
- 10.1590/s0001-37652013000300002
- Sep 1, 2013
- Anais da Academia Brasileira de Ciências
For a given binary BCH code Cn of length n = 2 s - 1 generated by a polynomial of degree r there is no binary BCH code of length (n + 1)n generated by a generalized polynomial of degree 2r. However, it does exist a binary cyclic code C (n+1)n of length (n + 1)n such that the binary BCH code Cn is embedded in C (n+1)n . Accordingly a high code rate is attained through a binary cyclic code C (n+1)n for a binary BCH code Cn . Furthermore, an algorithm proposed facilitates in a decoding of a binary BCH code Cn through the decoding of a binary cyclic code C (n+1)n , while the codes Cn and C (n+1)n have the same minimum hamming distance.
- Conference Article
6
- 10.1117/12.2001703
- Jan 3, 2013
The paper considers results of design and simulation of analogue-digital converters (ADC) based on current mirrors for the multi-sensor systems with parallel inputs-outputs. Such ADCs are named us as multichannel serial-parallel analog-to-digital converters based on current mirrors (M SP ADC CM). Compared with usual converters, for example reading, a bit-by-bit equilibration, and so forth, the proposed converters have a number of advantages: high speed and reliability, simplicity, small power consumption, the big degree of integration in linear and matrix structures. We discuss aspects of the design of M SP ADC CM in Gray and binary codes. It is offered, investigated and simulated the 6, 8 and more digit M SP ADC CM in Gray code and binary codes. Each channel of the overall structure consists of several base digit cells (ABC), with options for low power consumption with only one such ABC and analog memory (less than 20 CMOS transistors). Base digit cells (АВС) of such M SP ADC CM, series-pipelined in structures, consist of 20-30 CMOS transistors, one photodiode, have low (1-3.3) V supply voltage, work in current modes with the maximum values of currents (10-40) μA. Therefore such new principles of realization of high-speed low-digital M SP ADC CM have allowing, as shown by simulation experiments, to reach time of transformation less than 20-30ns at 5-8 bits of binary code and Gray code and the power consumption 1-5mW. The quantity of easily cascadable АВС depends on multi-bit ADC, and makes n, and provides quantity of quantization levels equal N=2 n . Such simple structure of M SP ADC CM with low power consumption ≤3÷5mWand supply voltage (3-7)V, and at the same time with good dynamic characteristics (frequency of digitization even for 1.5μm CMOS-technologies is 40 MHz, and can be increased up to 10 times) and accuracy (Δ quantization =156,25nA for I max =10μA ) characteristics are show. The range of optical signals, taking into account sensitivity of modern photo-detectors, can be 20-200 μW. Each channel of ADC, to reach the general power 50-100 μ W for low power consumption, can consist of only one such ABC and analog memory. To implement such serial ADC no more than 40 CMOS transistors are needed. The M SP ADC CM opens new prospects for realization linear and matrix (with picture operands) micro photo-electronic structures which are necessary for neural networks, digital optoelectronic processors, neural-fuzzy controllers, and so forth.
- Conference Article
1
- 10.1109/allerton.2016.7852253
- Sep 1, 2016
The standard binary reflected Gray code gives a sequence of binary numbers in the range 0 to n − 1, where n is a power of 2, such that each number in the sequence differs from the preceding number in only one bit. We present two methods to compute Gray codes containing exactly n numbers in the range 0 to n − 1—that is, a permutation of 〈0, 1, …, n − 1〉 in which each number differs from the preceding number in only one bit—where n is unconstrained. The first method produces a Gray code that is not cyclic: the first and last numbers in the sequence differ in more than one bit. The second method produces a cyclic Gray code if n is even, so that the first and last numbers differ in only one bit, at the expense of a slightly more complicated procedure. Both methods are based on the standard binary reflected Gray code and, as in the binary reflected Gray code, each number in the output sequence can be computed in a constant number of word operations given just its index in the sequence.
- Research Article
2
- 10.1109/lcomm.2019.2956935
- Dec 13, 2019
- IEEE Communications Letters
The conventional parity-check matrix transformation algorithm (PTA) requires matrix inversion to transform matrices of maximum distance separable (MDS) codes. However, such matrix transformation is not always guaranteed for the class of non-MDS codes. Hence, the PTA fails for binary cyclic (BC) codes. To overcome this limitation, we developed a generalized parity-check matrix transformation (GPT) algorithm for binary cyclic codes. The GPT avoids the matrix inversion step of the PTA. It permutes the columns of the parity-check matrix based on the reliability information from the channel. Results show a significant bit error rate (BER) performance gain as compared to the existing PTA. It also presents a reasonable BER performance as compared to the other soft-decision (SD) decoding algorithms. In addition, the decoder functions within a practical decoding time complexity, particularly at the message passing stage.
- Research Article
21
- 10.1109/tit.1966.1053908
- Jul 1, 1966
- IEEE Transactions on Information Theory
The sensitivity of a binary block code to loss of synchronism (misplacement of the "commas" separating codewords) can be characterized by a pair of numbers <tex xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">[s, \delta]</tex> such that any synchronization slip of s bits or less produces an overlap sequence differing from a legitimate codeword in at least <tex xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">\delta</tex> places. This definition is broader than that of comma freedom of index <tex xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">\delta</tex> , which is included as the special case of s equal to the integer part of half the code block length. For codes having the slip-detecting characteristic <tex xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">[s, \delta]</tex> there exists the possibility of implementation to restore synchronism during an interval relatively free from bit errors. It is shown that certain error-correcting binary cyclic block codes can be altered to obtain the characteristic <tex xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">[s, \delta]</tex> by the addition of a fixed binary vector to each codeword prior to transmission. These altered cyclic codes retain the full error-correcting power of the original cyclic codes. An error-detecting/correcting data format providing protection against the acceptance of misframed data is thus obtained without the insertion of special synchronizing sequences into the bit stream.
- Book Chapter
- 10.1007/978-3-319-51103-0_4
- Jan 1, 2017
The important family of binary cyclic codes is explored in this chapter. Starting with cyclotomic cosets, the minimal polynomials are introduced. The Mattson–Solomon polynomial is described and it is shown to be an inverse discrete Fourier transform based on a primitive root of unity. The usefulness of the Mattson–Solomon polynomial in the design of cyclic codes is demonstrated. The relationship between idempotents and the Mattson–Solomon polynomial of a polynomial that has binary coefficients is also described. It is shown how binary cyclic codes may be easily derived from idempotents based on the cyclotomic cosets. It is demonstrated how useful this can be in the design of high-degree non-primitive binary cyclic codes. Several code examples using this construction method are presented. A table listing the complete set of the best binary cyclic codes, having the highest minimum Hamming distance, is included for all code lengths from 129 to 189 bits.
- Research Article
65
- 10.1016/j.jfranklin.2009.02.001
- Feb 27, 2009
- Journal of the Franklin Institute
Constacyclic codes over <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" altimg="si1.gif" overflow="scroll"><mml:msub><mml:mrow><mml:mi>F</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">uF</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math>
- Conference Article
4
- 10.1109/isit.2019.8849354
- Jul 1, 2019
Regenerating code is a class of erasure codes designed for distributed storage systems that can achieve optimal tradeoff between storage and repair bandwidth. Most existing constructions of regenerating codes are based on a finite field with large enough size. Recently, a new construction of regenerating codes over a binary cyclic code was proposed. It was shown that the new construction has lower computational complexity than the construction based on finite fields. This paper generalizes the construction by designing regenerating codes with binary cyclic codes that support more parameters. We show that the proposed coding method can achieve the fundamental tradeoff curve between the storage and repair bandwidth. We also give an example that an existing construction of regenerating codes can be transformed to a regenerating code over a binary cyclic code with less computational complexity. Furthermore, the proposed coding framework has more design space for exact repair constructions of minimum storage regenerating codes.
- Research Article
9
- 10.1109/mpot.2011.2178193
- May 1, 2012
- IEEE Potentials
The gray codes are named after Frank Gray, who patented (U.S. Patent 2 632 058) the use of them in shaft encoders in 1953. Because of the reflection property of the code, sometimes the term Gray code is used to refer to reflected binary codes. The Gray codes are cycling in nature and maintain the unit hamming distance between one code word to the next code word. To visualize the attributes of reflection property, cyclic nature and unit hamming distance of Gray codes, Fig. 1 can be referred to where the binary Gray code patterns G(n) for size n51 to 4 b are depicted.
- Research Article
19
- 10.1137/0119007
- Jul 1, 1970
- SIAM Journal on Applied Mathematics
Introduction. Most encoding and decoding equipment operates in binary symbols, whereas it is often desirable to use a code consisting of symbols from GF(2S); each code symbol is really s binary symbols. This happens, for example, in multilevel transmission; it also happens when the chief function of the code is burst-error correction. The question discussed in this paper is when and how a binary cyclic code of block length s(2s 1) can be mapped in a way onto a cyclic code of block length 2s 1 over GF(2S). Such codes are attractive because they combine the advantages of multilevel efficiency with binary implementation; however the moral of this paper seems to be that we had better look for other ways to achieve this goal. Indeed the natural practical mapping between codes over GF(2) and codes over GF(2S) is mathematically rather unnatural. The image of a cyclic code over GF(2) may easily fail to be a linear space over GF(2S). Thus it is not surprising (although disappointing) that we appear to find only a rather small class of rather poor codes. The only previous published work on this subject known to the writer is due to M. Hanan and F. P. Palermo; these authors discuss a more general form of the same basic question, and arrive at the same basic conclusion. The plan of this paper is as follows: Section 1 describes the mapping p from the vector space over the binary field to the vector space over GF(2s), and gives an explicit form for the inverse mapping. Section 2 gives necessary and sufficient conditions for the image under (p of a binary cyclic code to be a cyclic code over GF(2S), and consequently for the image under p ` of a cyclic code over GF(2S) to be a binary cyclic code. These conditions are essentially the same as those given by Hanan and Palermo, and are definitely unhelpful from a practical point of view. Section 3 describes the class of codes, which can always be mapped back and forth, and shows that the union and intersection of an interlaced code with a mappable code is again mappable. Section 4 shows how to get new mappings from old-specifically, if a(x) is the polynomial of least degree in a mappable cyclic code (the generator polynomial), then the reciprocal polynomial of a(x) is also mappable, and so is the polynomial obtained by reversing the order of the coefficients of a(x). (The mapping function 5p is different in the three cases.) Section 5 describes the one choice of p which we know always works and shows how it works. Section 6 contains several theorems which are useful when looking for mappings; for example, we need consider only noninterlaced codes generated over GF(2s) by polynomials of degree ?s 1. The Appendix contains a series of examples, which hopefully will be useful as illustrations of the text.
- Ask R Discovery
- Chat PDF
AI summaries and top papers from 250M+ research sources.