Intersection Patterns in Optimal Binary (5,3) Doubling Subspace Codes

05/04/2021
βˆ™
by   Anirban Ghatak, et al.
βˆ™
0
βˆ™

Subspace codes are collections of subspaces of a projective space such that any two subspaces satisfy a pairwise minimum distance criterion. Recent results have shown that it is possible to construct optimal (5,3) subspace codes from pairs of partial spreads in the projective space PG(4,q) over the finite field 𝔽_q, termed doubling codes. We have utilized a complete classification of maximal partial line spreads in PG(4,2) in literature to establish the types of the spreads in the doubling code instances obtained from two recent constructions of optimum (5,3)_q codes, restricted to 𝔽_2. Further we present a new characterization of a subclass of binary doubling codes based on the intersection patterns of key subspaces in the pair of constituent spreads.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
βˆ™ 02/27/2018

Optimal subspace codes in PG(4,q)

We investigate subspace codes whose codewords are subspaces of PG(4,q) ...
research
βˆ™ 11/02/2019

The Lattice Structure of Linear Subspace Codes

The projective space P_q(n), i.e. the set of all subspaces of the vector...
research
βˆ™ 08/10/2019

New Constructions of Subspace Codes Using Subsets of MRD codes in Several Blocks

A basic problem for the constant dimension subspace coding is to determi...
research
βˆ™ 05/24/2021

Constructions of Binary Optimal Locally Repairable Codes via Intersection Subspaces

Locally repairable codes (LRCs), which can recover any symbol of a codew...
research
βˆ™ 05/25/2021

Pruned Collapsed Projection-Aggregation Decoding of Reed-Muller Codes

The paper proposes to decode Reed-Muller (RM) codes by projecting onto o...
research
βˆ™ 10/05/2022

Statistical characterization of the chordal product determinant of Grassmannian codes

We consider the chordal product determinant, a measure of the distance b...
research
βˆ™ 09/12/2020

On the security of subspace subcodes of Reed-Solomon codes for public key encryption

This article discusses the security of McEliece-like encryption schemes ...

Please sign up or login with your details

Forgot password? Click here to reset