The search functionality is under construction.
The search functionality is under construction.

Author Search Result

[Author] Fang-Wei FU(17hit)

1-17hit
  • Unique Decoding of Certain Reed-Solomon Codes

    Lin-Zhi SHEN  Fang-Wei FU  Xuan GUANG  

     
    LETTER-Coding Theory

      Vol:
    E98-A No:12
      Page(s):
    2728-2732

    In this paper, we consider the Reed-Solomon codes over Fqm with evaluations in a subfield Fq. By the “virtual extension”, we can embed these codes into homogeneous interleaved Reed-Solomon codes. Based on this property and the collaborative decoding algorithm, a new probabilistic decoding algorithm that can correct errors up to $ rac{m}{m+1}(n-k)$ for these codes is proposed. We show that whether the new decoding algorithm fails or not is only dependent on the error. We also give an upper bound on the failure probability of the new decoding algorithm for the case s=2. The new decoding algorithm has some advantages over some known decoding algorithms.

  • Self-Dual Cyclic Codes over Z4[u]/<u2-1> and Their Applications of Z4-Self-Dual Codes Construction

    Yun GAO   Jian GAO  Fang-Wei FU  

     
    LETTER-Coding Theory

      Vol:
    E101-A No:10
      Page(s):
    1724-1729

    In this paper, we study self-dual cyclic codes of length n over the ring R=Z4[u]/, where n is an odd positive integer. We define a new Gray map φ from R to Z42. It is a bijective map and maintains the self-duality. Furthermore, we give the structures of the generators of cyclic codes and self-dual cyclic codes of odd length n over the ring R. As an application, some self-dual codes of length 2n over Z4 are obtained.

  • Deterministic Constructions of Compressed Sensing Matrices Based on Affine Singular Linear Space over Finite Fields

    Gang WANG  Min-Yao NIU  Jian GAO  Fang-Wei FU  

     
    LETTER-Coding Theory

      Vol:
    E101-A No:11
      Page(s):
    1957-1963

    Compressed sensing theory provides a new approach to acquire data as a sampling technique and makes sure that a sparse signal can be reconstructed from few measurements. The construction of compressed sensing matrices is a main problem in compressed sensing theory (CS). In this paper, the deterministic constructions of compressed sensing matrices based on affine singular linear space over finite fields are presented and a comparison is made with the compressed sensing matrices constructed by DeVore based on polynomials over finite fields. By choosing appropriate parameters, our sparse compressed sensing matrices are superior to the DeVore's matrices. Then we use a new formulation of support recovery to recover the support sets of signals with sparsity no more than k on account of binary compressed sensing matrices satisfying disjunct and inclusive properties.

  • On the Locality and Availability of Linear Codes Based on Finite Geometry

    Lin-Zhi SHEN  Fang-Wei FU  Xuan GUANG  

     
    LETTER-Coding Theory

      Vol:
    E98-A No:11
      Page(s):
    2354-2355

    Linear codes with locality r and availability t have a wide application in distribution storage because they permit local repair and parallel accesses of hot data. In this letter, the locality and availability of some linear codes based on finite geometry are given. According to these results, we give some linear codes that have higher rate than known codes with the same locality and availability.

  • Cooperative Local Repair with Multiple Erasure Tolerance

    Jiyong LU  Xuan GUANG  Linzhi SHEN  Fang-Wei FU  

     
    LETTER-Coding Theory

      Vol:
    E99-A No:3
      Page(s):
    765-769

    In distributed storage systems, codes with lower repair locality are much more desirable due to their superiority in reducing the disk I/O complexity of each repair process. Motivated partially by both codes with information (r,δ1)c locality and codes with cooperative (r,l) locality, we propose the concept of codes with information (r,l,δ) locality in this paper. For a linear code C with information (r,l,δ) locality, values at arbitrary l information coordinates of an information set I can be recovered by connecting any of δ existing pairwise disjoint local repair sets with size no more than r, where a local repair set of l coordinates is defined as the set of some other coordinates by which one can recover the values at these l coordinates. We derive a lower bound on the codeword length n for [n,k,d] linear codes with information (r,l,δ) locality. Furthermore, we indicate its tightness for some special cases. Particularly, some existing results can be deduced from our bound by restriction on parameters.

  • A Class of Optimal One-Coincidence Frequency-Hopping Sequence Sets with Composite Length

    Wenli REN  Fang-Wei FU  Feng WANG  Jian GAO  

     
    LETTER-Communication Theory and Signals

      Vol:
    E100-A No:11
      Page(s):
    2528-2533

    In this letter, we first investigate some new properties of a known power residue frequency-hopping sequence (FHS) set which is established as an optimal one-coincidence frequency-hopping sequence (OC-FHS) set with near-optimal set size. Next, combining the mathematical structure of power residue theory with interleaving technique, we present a new class of optimal OC-FHS set, using the Chinese Remainder Theorem (CRT). As a result, one optimal OC-FHS set with prime length is extended to another optimal OC-FHS set with composite length in which the construction preserves the maximum Hamming correlation (MHC) and the set size as well as the optimality of the Lempel-Greenberger bound.

  • The Average Failure Probabilities of Random Linear Network Coding

    Xuan GUANG  Fang-Wei FU  

     
    PAPER-Coding Theory

      Vol:
    E94-A No:10
      Page(s):
    1991-2001

    In network coding, for the case that the network topology is unknown completely, random linear network coding has been proposed as an acceptable coding technique. In this paper, we define average failure probability of random linear network coding in order to characterize the performance of random network coding, and then analyze this failure probability for different known topological information of network. We obtain several upper bounds on the failure probabilities, and further show that, for some networks, these upper bounds are tight or asymptotically tight. Moreover, if the more topological information of the network is utilized, the better upper bounds are acquired.

  • A Generalized Construction of Asymptotically Optimal Codebooks

    Gang WANG  Min-Yao NIU  You GAO  Fang-Wei FU  

     
    LETTER-Information Theory

      Vol:
    E102-A No:3
      Page(s):
    590-593

    In this letter, as a generalization of Heng's constructions in the paper [9], a construction of codebooks, which meets the Welch bound asymptotically, is proposed. The parameters of codebooks presented in this paper are new in some cases.

  • Some Results on Triple Cyclic Codes over Z4

    Tingting WU   Jian GAO  Fang-Wei FU  

     
    LETTER-Coding Theory

      Vol:
    E99-A No:5
      Page(s):
    998-1004

    Let R=Z4 be the integer ring mod 4 and C be a linear code over R. The code C is called a triple cyclic code of length (r, s, t) over R if the set of its coordinates can be partitioned into three parts so that any cyclic shift of the coordinates of the three parts leaves the code invariant. These codes can be viewed as R[x]-submodules of R[x]/×R[x]/×R[x]/. In this paper, we determine the generator polynomials and the minimum generating sets of this kind of codes.

  • A Generalized Construction of Codebook Asymptotically Meeting the Welch Bound

    Gang WANG  Min-Yao NIU  Jian GAO  Fang-Wei FU  

     
    LETTER-Coding Theory

      Vol:
    E102-A No:5
      Page(s):
    732-737

    In this letter, as a generalization of Luo et al.'s constructions, a construction of codebook, which meets the Welch bound asymptotically, is proposed. The parameters of codebook presented in this paper are new in some cases.

  • The Failure Probabilities of Random Linear Network Coding at Sink Nodes

    Dan LI  Xuan GUANG  Fang-Wei FU  

     
    LETTER-Information Theory

      Vol:
    E99-A No:6
      Page(s):
    1255-1259

    In the paradigm of network coding, when the network topology information cannot be utilized completely, random linear network coding (RLNC) is proposed as a feasible coding scheme. But since RLNC neither considers the global network topology nor coordinates codings between different nodes, it may not achieve the best possible performance of network coding. Hence, the performance analysis of RLNC is very important for both theoretical research and practical applications. Motivated by a fact that different network topology information can be available for different network communication problems, we study and obtain several upper and lower bounds on the failure probability at sink nodes depending on different network topology information in this paper, which is also the kernel to discuss some other types of network failure probabilities. In addition, we show that the obtained upper bounds are tight, the obtained lower bound is asymptotically tight, and we give the worst cases for different scenarios.

  • Linear Codes and (1+uv)-Constacyclic Codes over R[v]/(v2+v)

    Jian GAO  Fang-Wei FU  

     
    LETTER-Coding Theory

      Vol:
    E98-A No:4
      Page(s):
    1044-1048

    In this short correspondence, (1+uv)-constacyclic codes over the finite non-chain ring R[v]/(v2+v) are investigated, where R=F2+uF2 with u2=0. Some structural properties of this class of constacyclic codes are studied. Further, some optimal binary linear codes are obtained from these constacyclic codes.

  • Some Results on Generalized Quasi-Cyclic Codes over $mathbb{F}_q+umathbb{F}_q$

    Jian GAO  Fang-Wei FU  Linzhi SHEN  Wenli REN  

     
    LETTER-Coding Theory

      Vol:
    E97-A No:4
      Page(s):
    1005-1011

    Generalized quasi-cyclic (GQC) codes with arbitrary lengths over the ring $mathbb{F}_{q}+umathbb{F}_{q}$, where u2=0, q=pn, n a positive integer and p a prime number, are investigated. By the Chinese Remainder Theorem, structural properties and the decomposition of GQC codes are given. For 1-generator GQC codes, minimum generating sets and lower bounds on the minimum distance are given.

  • Multiple Impossible Differential Cryptanalysis on Reduced FOX

    Xinran LI  Fang-Wei FU  Xuan GUANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E98-A No:3
      Page(s):
    906-911

    FOX is a family of block ciphers published in 2004 and is famous for its provable security to cryptanalysis. In this paper, we present multiple 4-round impossible differentials and several new results of impossible differential attacks on 5,6,7-round FOX64 and 5-round FOX128 with the multiple differentials and the new early abort technique which shall reduce the data complexity and the time complexity respectively. In terms of the data complexity and the time complexity, our results are better than any of the previously known attacks.

  • Probabilistic Secret Sharing Schemes for Multipartite Access Structures

    Xianfang WANG  Fang-Wei FU  Xuan GUANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E99-A No:4
      Page(s):
    856-862

    In this paper, we construct ideal and probabilistic secret sharing schemes for some multipartite access structures, including the General Hierarchical Access Structure and Compartmented Access Structures. We devise an ideal scheme which implements the general hierarchical access structure. For the compartmented access structures, we consider three special access structures. We propose ideal and probabilistic schemes for these three compartmented access structures by bivariate interpolation.

  • On The Average Partial Hamming Correlation of Frequency-Hopping Sequences

    Wenli REN  Fang-Wei FU  Zhengchun ZHOU  

     
    LETTER-Communication Theory and Signals

      Vol:
    E96-A No:5
      Page(s):
    1010-1013

    The average Hamming correlation is an important performance indicator of frequency-hopping sequences (FHSs). In this letter, the average partial Hamming correlation (APHC) properties of FHSs are discussed. Firstly, the theoretical bound on the average partial Hamming correlation of FHSs is established. It works for any correlation window with length 1≤ω≤υ, where υ is the sequence period, and generalizes the bound developed by Peng et al which is valid only when ω=υ. A sufficient and necessary condition for a set of FHSs having optimal APHC for any correlation window is then given. Finally, sets of FHSs with optimal APHC are presented.

  • Two Classes of 1-Resilient Prime-Variable Rotation Symmetric Boolean Functions

    Lei SUN  Fang-Wei FU  Xuan GUANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E100-A No:3
      Page(s):
    902-907

    Recent research has shown that the class of rotation symmetric Boolean functions is beneficial to cryptographics. In this paper, for an odd prime p, two sufficient conditions for p-variable rotation symmetric Boolean functions to be 1-resilient are obtained, and then several concrete constructions satisfying the conditions are presented. This is the first time that resilient rotation symmetric Boolean functions have been systematically constructed. In particular, we construct a class of 2-resilient rotation symmetric Boolean functions when p=2m+1 for m ≥ 4. Moreover, several classes of 1-order correlation immune rotation symmetric Boolean functions are also got.