2009
DOI: 10.1109/tcomm.2009.06.070066
|View full text |Cite
|
Sign up to set email alerts
|

Group-theoretic analysis of cayley-graph-based cycle gf(2p) codes

Abstract: Abstract-Using group theory, we analyze cycle GF(2 p ) codes that use Cayley graphs as their associated graphs. First, we show that through row and column permutations the parity check matrix H can be put in a concatenation form of row-permuted block-diagonal matrices. Encoding utilizing this form can be performed in linear time and in parallel. Second, we derive a rule to determine the nonzero entries of H and present determinate and semi-determinate codes. Our simulations show that the determinate and semi-d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
23
0

Year Published

2010
2010
2014
2014

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 10 publications
(23 citation statements)
references
References 21 publications
(37 reference statements)
0
23
0
Order By: Relevance
“…• First, encoding of nonbinary regular cycle codes can be done in linear time in parallel similar to [13]. This provides a lot of flexibility in the implementation of efficient encoders which is quite desirable especially when the codeword length is large.…”
Section: Properties Of Nonbinary Regular Cycle Codesmentioning
confidence: 99%
See 4 more Smart Citations
“…• First, encoding of nonbinary regular cycle codes can be done in linear time in parallel similar to [13]. This provides a lot of flexibility in the implementation of efficient encoders which is quite desirable especially when the codeword length is large.…”
Section: Properties Of Nonbinary Regular Cycle Codesmentioning
confidence: 99%
“…The design of nonbinary regular cycle codes consists of code structure design and selection of nonzero entries of H. On the code structure design, one can design the code based on known graphs with large girth, such as the Ramanujan and Cayley graphs as done in [6], [13]. Or, one can rely on computer search based algorithms, such as the well-known progressive edge-growth (PEG) algorithm [14].…”
mentioning
confidence: 99%
See 3 more Smart Citations