On the Covering Radius of the Second Order Reed-Muller Code of Length 128

نویسنده

  • Qichun Wang
چکیده

In 1981, Schatz proved that the covering radius of the binary ReedMuller code RM(2, 6) is 18. For RM(2, 7), we only know that its covering radius is between 40 and 44. In this paper, we prove that the covering radius of the binary Reed-Muller code RM(2, 7) is at most 42. Moreover, we give a sufficient and necessary condition for Boolean functions of 7-variable to achieve the second-order nonlinearity 42.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions

Let Rt,n denote the set of t-resilient Boolean functions of n variables. First, we prove that the covering radius of the binary ReedMuller code RM(2, 6) in the sets Rt,6, t = 0, 1, 2 is 16. Second, we show that the covering radius of the binary Reed-Muller code RM(2, 7) in the set R3,7 is 32. We derive a new lower bound for the covering radius of the Reed-Muller code RM(2, n) in the set Rn−4,n....

متن کامل

Further Results on the Covering Radii of the Reed-Muller Codes

Let R(r, m) by the rth order Reed-Muller code of length 2 )n, and let o(r, m) be its covering radius. We obtain the following new results on the covering radius of R(r, m): 1. p(r + 1, m + 2) > 2p(r, m) + 2 if 0 < r < m 2. This improves tile successive use of the known inequalities p(r + 1, m + 2) _> 20 (r + 1, m + 1) and p (r + 1, m + 1) -> O (r, m). 2. P (2, 7) -< 44. Previously best known up...

متن کامل

Steganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images

In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed...

متن کامل

The Covering Radius of Hadamard Codes in Odd Graphs

Sol& P., A. Ghafoor and S.A. Sheikh, The covering radius of Hadamard codes in odd graphs, Discrete Applied Mathe-atics 37/38 (1992) 501-5 10. The use of odd graphs has been proposed as fault-tolerant interconnection networks. The following problem originated in their design: what is the graphical covering radius of an Hadamard code of length 2k1 and siLe 2k1 in the odd graph Ok? Of particular i...

متن کامل

On the covering radius of Reed-Muller codes

Cohen, G.D., S.N. Litsyn, On the covering radius of Reed-Muller codes, Discrete Mathematics 106/107 (1992) 147-155. We present lower and upper bounds on the covering radius of Reed-Muller codes, yielding asymptotical improvements on known results. The lower bound is simply the sphere covering one (not very new). The upper bound is derived from a thorough use of a lemma, the ‘essence of Reed-Mul...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1510.08535  شماره 

صفحات  -

تاریخ انتشار 2015