Next Article in Journal
Comparative Analysis of Machine Learning Models for Predicting Student Success in Online Programming Courses: A Study Based on LMS Data and External Factors
Previous Article in Journal
Existence and Stability for Fractional Differential Equations with a ψ–Hilfer Fractional Derivative in the Caputo Sense
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Lifted Codes with Construction of Echelon-Ferrers for Constant Dimension Codes

School of Computer Science and Artificial Intelligence and Aliyun School of Big Data, Changzhou University, Changzhou 213100, China
*
Author to whom correspondence should be addressed.
Mathematics 2024, 12(20), 3270; https://doi.org/10.3390/math12203270
Submission received: 13 September 2024 / Revised: 9 October 2024 / Accepted: 16 October 2024 / Published: 18 October 2024

Abstract

:
Finding the highest possible cardinality, A q ( n , d ; k ) , of the set of k-dimensional subspaces in F q n , also known as codewords, is a fundamental problem in constant dimension codes (CDCs). CDCs find applications in a number of domains, including distributed storage, cryptography, and random linear network coding. The goal of recent research papers has been to establish A q ( n , d ; k ) . We further improved the echelon-Ferrers construction with an algorithm, and enhanced the inserting construction by swapping specified columns of the generator matrix to obtain new lower bounds.

1. Introduction

Assume that F q is a finite field with q elements. The set of all k-dimensional subspaces of a F q -vector space V is denoted by G q ( k , n ) . In vector space F q n , the projective space over the finite field F q of order n, represented as P q ( n ) , often includes all of the subspaces. These subspaces constitute a metric space when combined. Together, and the defining metric is the subspace distance. It is described as
d S ( U , W ) = dim ( U + W ) dim ( U W ) = 2 · dim ( U + W ) dim ( U ) dim ( W ) .
CDCs are a special class of subspace codes with important applications in network coding, especially in random network coding. In recent years, network coding has garnered significant attention as an innovative method for transmitting data over networks. It is extensively used in distributed storage systems, peer-to-peer networks, social networks, wireless communication networks, and other types of networks. In random network coding, conventional error-correcting code techniques may not be adequate due to the unpredictability of network topologies. The ability of CDCs to preserve vector space properties makes them an effective tool for addressing this issue.
Since Köetter and Kschischang [1] first introduced subspace codes, there has been extensive research on them [2,3,4,5,6,7,8]. Heinlein et al. [9] provide more details regarding their theoretical foundation. Additionally, the most recent bounds on constant dimension codes and subspace codes can be found there.
To create CDCs, rank metric codes (RMCs), specifically maximum rank distance (MRD) codes, are employed. One technique for creating CDCs using rank metric codes is the lifting construction [1], which forms a subspace by concatenating an identity matrix with a matrix of RMCs. In the context of random linear network coding, lifted MRD codes can produce asymptotically optimal CDCs and can be decoded effectively. Etzion and Silberstein [10] introduced a new family of Ferrers diagram RMCs to generalize the lifted MRD code architecture, which they called the multilevel construction.
Today, there are primarily two approaches used to build CDCs in conjunction with parallel linkage construction. The first technique is called parallel multilevel construction [11]. Another approach is the block inserting construction, initially introduced in [12]. CDCs built using matrix blocks are inserted into the parallel linkage construction through the block inserting construction.
In [13], MinYao Niu proposed a new method for constructing constant dimension codes. The parallel linkage construction can incorporate the constant dimension codes derived from this method.
In [14], Xianmang He presented a construction for subspace codes of constant dimension that involves the insertion of a composite structure made up of an MRD code and its sub-codes, providing some improved lower bounds over previous results.
Building CDCs is a useful application of lifting Ferrers diagram codes. Furthermore, the discovery of linkage construction enables the creation of a large number of CDCs. In [15], Fagang Li derived some new CDC lower bounds for small parameters by combining the two construction techniques.
In [16], Troha introduced a construction called the linkage construction from Corollary 39 in [17]. This construction involves joining two CDCs of shorter length and results in the establishment of a lower bound for the following CDCs.
A q ( n , d , k ) A q ( m , d , k ) q max { n m , k } ( min { n m , k } 1 2 d + 1 ) + A q ( n m + k d 2 , d , k ) ,
where k m n d 2 .
In this paper, we are inspired by [13,18]. The linkage construction and insertion construction have been effectively improved. The paper is structured as follows: In Section 1, we review some fundamental concepts of CDC. In Section 2, we introduce effective methods for constructing CDCs, including parallel linkage construction, Ferrers diagram construction, and sub-code construction. The main part of this article is in Section 3, where we first propose an improved algorithm based on the greedy algorithm that yields a better set of identification vectors. We then describe an insertion construction method by swapping specific columns of the generator matrix. Using our approach, we derive several new lower bounds.

2. Preliminaries

2.1. Rank-Metric Codes

Over the field F q , let F q m × be a m × matrices space. The rank-metric is defined as follows for any two distinct matrices  A , B F q m × :
d R ( A , B ) : = rank ( A B ) .
A rank-metric code is a subset of F q m × with the rank-metric. We can refer to a rank-metric code as linear rank-metric code if it is a linear subspace of F q m × . Clearly, the rank-distance of a rank-metric code C is defined as
d R ( C ) : = min { d R ( A , B ) : A , B C , A B } .
We know that the upper bound of its cardinality is q max { m , } · ( min { m , } d + 1 ) . A rank-metric code attaining this bound is called an MRD code (see [19,20]). A linear MRD code with distanced d is denoted by Q ( q , m , n , d ) , and its cardinality is denoted by a ( q , m , n , d ) . Additionally, if the rank of each codewords is at most r, we use the notation Q ( q , m , n , d ; r ) to represent it, and we refer to it as a rank-restricted RMC (RRMC). Its cardinality is usually denoted by a ( q , m , n , d ; r ) .
Lemma 1 
([19]). Let Q ( q , m , n , d ) ( m n ) is a linear MRD code with rank distance n . Its rank distribution is given by
A r Q ( q , m , n , d ) = n r i = 0 r d ( 1 ) i q i 2 r i q q m ( n d + 1 ) q m ( n + i r ) 1 ,
where d r n , A r ( Q ( q , m , n , d ) ) representing the cardinality of codewords in Q ( q , m , n , d ) with rank r.

2.2. Ferrers Diagram Maximum Rank Distance Codes

Let X be a k-dimensional subspace within a space F q n . Its structure can be described by a generating matrix whose rows span the bases of X. This generator matrix can be transformed into a unique row-reduced echelon matrix E ( X ) using Gaussian elimination. Moreover, we define an identifying vector v ( X ) , which is labeled with 1 at each pivot position in E ( X ) , and is located in the space F 2 n . The space G q ( k , n ) can be classified into n k distinct classes based on these identifying vectors, with each class having the same identifying vector.
To transform the subspace X into the Ferrers diagram form F ( X ) , a series of operations is applied to E ( X ) . First, any leading zeros in the rows to the left of the pivots are removed. Second, the pivot column is removed, and the remaining entries are shifted to the right. The Ferrers diagram of X, denoted F X , is the resulting processed matrix. F X and F ( X ) are closely related, and  F X can be obtained by replacing the entries of F ( X ) with dots.
For example, if the generator matrix of a 4-dimensional subspace X in the space F 2 9 is reduced to a row-reduced echelon form, the corresponding Ferrers diagram of X can be easily constructed by applying the aforementioned procedures.
E ( X ) = 1 1 0 0 1 0 0 0 1 0 0 1 1 0 0 0 1 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 1 1 .
Subsequently, the identifying vector representing X is designated as v ( X ) = 101001010 . Furthermore, F X is recorded as the Ferrers table form of X, which is
1 0 1 0 0 1 0 0 0 1 0 1 .
And F ( X ) is recorded as the Ferrers diagrams form of X, which is
.
Definition 1 
([21]). Assume that v 1 and v 2 are two vectors of length n, v i [ j ] represents the j-th component in the vector v i , ( i = 1 , 2 , j = 1 , 2 , , n ) , The Hamming distance
d H ( v 1 , v 2 ) = i = 1 n N ( v 1 [ j ] v 2 [ j ] )
for v 1 , v 2 F q n , when v 1 [ j ] v 2 [ j ] , N ( v 1 [ j ] v 2 [ j ] ) = 1 .
Lemma 2 
([10]). Let X , Y P q ( n ) , v ( X ) , v ( Y ) is identifying vector of X , Y , then
d S ( X , Y ) d H ( v ( X ) , v ( Y ) ) ,
Definition 2 
([10]). Let F be a Ferrers diagram, where the rightmost column contains m points and the topmost row contains ℓ points. A linear rank-metric code associated with a Ferrers diagram F is called a Ferrers diagram rank metric code (FDRM) if it satisfies the following condition: For any code word M in C F , if M is not in some term of F , then the value of that term must be zero. Moreover, for any nonzero code word A, if its rank is no less than δ, the dimension of C F is d i m . Based on these conditions, we represent the FDRM code C F as the [ F , d i m , δ ] FDRM code.
Lemma 3 
([10]). Let F be a Ferrers diagram, it has ℓ points in the first row, and m points in the last column, and  C F F q m × is an FDRM code, and it meets the following conditions: A C F { 0 } , rank ( A ) δ . Then | C F | q min i { w i } , where w i represents the number of points in the F that are neither in the first i row nor in the rightmost δ 1 i column, where i ranges from 0 to δ 1 .
Lemma 4 
([10]). Let C F F q k × ( n k ) be an [ F , d i m , δ ] FDRM code, then the lifted FDRM code C F is an ( n , q d i m , 2 δ , k ) q CDC.
In order to construct an ( n , M , 2 δ , k ) q CDC on G q ( k , n ) , we first screen out a subset C F 2 n , which has two key properties. Firstly, the weight is equal to k for any vector; secondly is that these vectors have a minimum Hamming distance of 2 δ . Then we treat these vectors in C as identifying vectors, and for each identifying vector, we construct a corresponding [ F , d i m , δ ] FDRM code. According to Lemmas 2 and 3, these lifted FDRM codes are combined to form an ( n , M , 2 δ , k ) q CDC. The structural design on which this construction method is based, which is commonly called multilevel construction (see [10,17]).

2.3. Linkage Construction

Given some matrices M F q k × m , the row space of M over F q are expressed as the rs ( M ) .
Definition 3 
([16]). Let M F q k × m be a set of matrices, if rank ( M j ) = k , M j M and r s ( M j 1 ) r s ( M j 2 ) for any two different matrices M j 1 , M j 2 M , we denoted it as an SC-representing set. Then the set { r s ( M ) : M M } is CDC, and we denoted it by C ( M ) .
Lemma 5 
([22]). Let n 1 k and n 2 k , Q 1 is an ( k , n k , d 2 ) q MRD code, Q 2 is a ( k , n k , d 2 ; k d 2 ) q RRMC code. Then C 1 C 2 is an ( n , N , d , k ) q CDC, where
C 1 : = { rs ( I k | Q 1 ) | Q 1 Q 1 } , C 2 : = { rs ( Q 2 | I k ) | Q 2 Q 2 } .
Lemma 6 
([15]). Let n 1 k , n 2 k , n 1 + n 2 = n , U be an SC-representation set of ( n 1 , N 1 , d , k ) q CDC with cardinality N 1 , and  R be a ( q , k , n 2 , d 2 ) linear rank metric code with cardinality N R . Assume that the identifying vectors v j V S with length n and weight k satisfy the following conditions.
(a) For each v j , the number of o n e s in the last n 2 positions is more than or equal to d 2 .
(b) The Hamming distance of two different identifying vectors is more than or equal to d.
Let C F j F q k × ( n k ) be an [ F j , ρ j , δ = d 2 ] FDRM code, with the corresponding identifying vector v j , C F j are lifted FDRM code of C F j . Define C : = A B as the subspace code of length n, where
A : = { rs ( U | R ) | U U , R R } , B : = j C F j .
Then C : = A B is an ( n , N , d , k ) q CDC with N = N 1 N R + j | C F j | .

2.4. Sub-Codes Construction

Lemma 7 
([23]). The sub-codes construction can be described as follows: Let n 1 , n 2 , a 1 , a 2 , b 1 , b 2 be positive integers such that n 1 + n 2 = n , a 1 + a 2 = k , and  b 1 +   b 2 d 2 . For  i = 1 , 2 , assume M i r is a q , a i , n i , d 2 MRD code, where r = 1 , 2 , , s , s = m i n a ( q , a 1 , n 1 a 1 , b 1 ) a ( q , a 1 , n 1 a 1 , d 2 ) , a ( q , a 2 , n 2 a 2 , b 2 ) a q , a 2 , n 2 a 2 , d 2 . For any M M i r 1 and M M i r 2 (where 1 r 1 , r 2 s , and  M M ) , we know that when r 1 = r 2 , rank ( M M ) d 2 , and when r 1 r 2 , rank ( M M ) b i . Then D = r = 1 s D r is an ( n , | D | , d , k ) q CDC, where D r consists of subspaces of the form:
I a 1 | M 1 O 1 O 2 I a 2 | M 2 ,
M 1 M 1 r , M 2 M 2 r . I a i is the identity matrix of size a i × a i , and  O 1 , O 2 are zero matrices of size a 1 × n 2 and a 2 × n 1 .
Lemma 8 
([14]). Suppose n 1 , n 2 , a 1 , a 2 are positive integers such that n 1 + n 2 = n , a 1 + a 2 = k and n i k , d 2 a i n i d 2 , for  i = 1 , 2 , M 1 r and M 2 r be as defined above. Let M 3 be an ( a 1 , n 2 a 2 , d 2 ) q MRD code. Then C 3 = r = 1 s C r is an ( n , d , k ) q CDC with
C r = r s I a 1 M 1 O 1 M 3 O 2 O 3 I a 2 M 2 ,
where M 1 M 1 r , M 2 M 2 r for 1 r s , and M 3 M 3 , O 1 , O 2 , O 3 are zero matrices with O 1 = O a 1 × a 2 , O 2 = O a 2 × a 1 , O 3 = O a 2 × ( m 1 a 1 ) .

3. Main Results

In this section, we first propose Algorithm 1, which incorporates the construction method from Lemma 6. With the help of this algorithm, we obtain improved new lower bounds for linkage construction and echelon-Ferrers constructions. Then, inspired by [13], we refine the insertion construction by swapping specific columns of the generator matrix, and as a result, we derive several new lower bounds.  
Algorithm 1: Modified greedy algorithm
Mathematics 12 03270 i001

3.1. Algorithm

Regarding recent improvements in the echelon-Ferrers construction, we refer to [18]. As for improvements in linkage construction, determining the optimal parameters for a new set of identifying vectors is a challenging problem. In this part, we use an improved algorithm based on a greedy approach to obtain a better set of identifying vectors, denoted by V S .
We made a minor enhancement to the greedy algorithm, focusing on selecting the identifying vectors with the maximum and second maximum dimensions as the best candidates. That is, we randomly added the identifying vectors from m a x and m a x 1 to the set V S until the set V n was empty. Finally, after repeated experiments, we selected the final result.
Corollary 1.
A 2 ( 14 , 4 ; 4 ) 1259181405 and A q ( 14 , 4 ; 4 ) q 30 + q 26 + q 25 + 3 q 24 + 2 q 23 + 3 q 22 + q 21 + q 20 + 2 q 18 + 2 q 16 + 3 q 15 + 5 q 14 + 6 q 12 + 7 q 11 + 9 q 10 + 7 q 9 + 8 q 8 + 5 q 7 + 3 q 6 + q 4 + q 3 + q 2 + 1 for q 2 .
Proof. 
Let n 1 = 8 , n 2 = 6 , and  C F j be lifted FDRM code corresponding to the identifying vector in Table A1, by Lemma 6, so we have A q ( 14 , 4 ; 4 ) A q ( 8 , 4 ; 4 ) q 18 + q 18 + 2 q 16 + 3 q 15 + 5 q 14 + 6 q 12 + 7 q 11 + 9 q 10 + 7 q 9 + 8 q 8 + 5 q 7 + 3 q 6 + q 4 + q 3 + q 2 + 1 , it is known that A 2 ( 8 , 4 ; 4 ) 4801 and A q ( 8 , 4 ; 4 ) q 12 + q 2 ( q 2 + 1 ) 2 ( q 2 + q + 1 ) + 1 for q 2 . The result is obviously valid.    □
The best known lower bound is given in [24], i.e.,  A 2 ( 14 , 4 ; 4 ) 1259181253 for q = 2 . Our result is above it.
Corollary 2.
A 2 ( 18 , 4 ; 4 ) 5158164361445 and A q ( 18 , 4 ; 4 ) A q ( 12 , 4 ; 4 ) q 18 + q 22 + 2 q 20 + 3 q 19 + 5 q 18 + 6 q 16 + 7 q 15 + 10 q 14 + 6 q 13 + 12 q 12 + 9 q 11 + 8 q 10 + q 9 + 5 q 8 + 2 q 7 + 3 q 6 + 2 q 4 + q 2 + 1 for q 2 .
Proof. 
Let n 1 = 12 , n 2 = 6 , and  C F j be lifted FDRM code corresponding to identifying vector in Table A2, by Lemma 6 and A 2 ( 12 , 4 ; 4 ) 19676797 . The result is obviously valid.    □
The best known lower bound is given in [24], i.e.,  A 2 ( 18 , 4 ; 4 ) 5158164354661 for q = 2 . Our result is above it.

3.2. Construction

Niu et al. presented an improved inserting construction by exchanging some specified columns of the generator matrix of the CDC in [13]. Based on this, we have enhanced the column-swapping procedure.
Proposition 1.
Let v i V d be a vector with length n 1 a 1 + a 2 and weight a 2 , where n 1 a 1 = a 2 = d 1 , and the number of ones in the last a 2 positions of v i is at least d 2 , the Hamming distance between distinct vectors in V d is at least d. Then, the set V d contains at least d 1 distinct vectors.
Next, we explain Proposition 1 using Algorithm 2.    
Algorithm 2:  g e t V d
  Input: d
  Output: target vector set V d
  1
Construct an alternative element set: V contains all vectors with length n = 2 ( d 1 ) and weight d 1 , and the number of o n e s in the last d 1 positions is at least d 2
  2
Select a vector, and if its Hamming distance from other vectors in V d is at least d, add it to V d
  3
Repeat step 2 until V is empty.
We present a portion of the results here. When d = 4 , 6 and 8, as shown in Table 1.
Theorem 1.
Using the notation from Lemma 6, n 1 = n 2 = k , k d , M 3 is an ( a 1 , n 2 a 2 , d 2 ; a 1 d + 1 ) q RRMC code. Let C i r be obtained by swapping columns M 1 O 3 and O 1 I a 2 of C r , and v ( C i r ) = 1 1 a 1 v i n 1 a 1 + a 2 0 0 n 2 a 2 , v i V d . Then C 3 : = i = 1 d 1 r = 1 s C i r is an ( n , | C 3 | , d , k ) q CDC with | C 3 | = i = 1 d 1 r = 1 s | C i r | .
Proof. 
From a 1 + a 2 = k , it is easy to see that the codewords of C 3 form a k-dimensional subspace of F q n . The minimum subspace distance of C 3 is at least d, as proven from two aspects:
Let the sets W 3 and W 3 be the distinct codewords of and C i 1 r and C i 2 r .
W 3 = r s ( G 3 ) , G 3 = I a 1 P S M 3 0 2 Q T M 2 ,
W 3 = r s G 3 , G 3 = I a 1 P S M 3 0 2 Q T M 2 ,
  • where M 1 , M 1 M 1 r , M 2 , M 2 M 2 r , M 3 , M 3 M 3 .
I. If i 1 = i 2 , that is, the positions of the swapped columns are the same, this is equivalent to proving that C i r are CDCs for 1 i d 1 .
d S W 3 , W 3 = 2 rank I a 1 P S M 3 O 2 Q T M 2 I a 1 P S M 3 O 2 Q T M 2 2 k , = 2 rank I a 1 M 1 O 1 M 3 O 2 O 3 I a 2 M 2 I a 1 M 1 O 1 M 3 O 2 O 3 I a 2 M 2 2 k , = 2 rank I a 1 M 1 O 1 M 3 O a 1 M 1 M 1 O 1 M 3 M 3 O 2 O 3 I a 2 M 2 O 2 O 3 O a 2 M 2 M 2 2 k .
There are the following three cases.
(1) if M 3 M 3 then rank G 5 G 5 a 1 + a 2 + rank M 3 M 3 k + d 2 .
(2) if M 3 = M 3 , r = r , M 1 , M 1 M 1 r , M 2 , M 2 M 2 r , that is M 1 M 1 or M 2 M 2 , then rank G 5 G 5 = a 1 + a 2 + rank M 1 M 1 + rank M 2 M 2 k + d 2 .
(3) if M 3 = M 3 , r r , M 1 M 1 r , M 1 M 1 r , M 2 M 2 r , M 2 M 2 r , M 1 M 1 , M 2 M 2 . then rank G 5 G 5 = a 1 + a 2 + rank M 1 M 1 + rank M 2 M 2 = a 1 + a 2 + b 1 + b 2 k + d 2 .
II. If i 1 i 2 , that is the positions of the swapped columns are different, this is equivalent to proving that the subspace distance between C i 1 r and C i 2 r is at least d for i 1 i 2 .
It easy to see that d H G 3 , G 3 = d H v i 1 , v i 2 d . By Lemma 2, d S ( v ( C i 1 r ) , v ( C i 2 r ) ) d .
Hence, C 3 is an ( n , | C 3 | , d , k ) q CDC with | C 3 | =   i = 1 d 1 r = 1 s | C i r | .
Example 1.
Let n 1 = n 2 = k = 12 , d = 6 , a 1 = 7 , a 2 = 5 , b 1 = 1 , b 2 = 2 . By Theorem 1, we take M 1 M 1 r and M 2 M 2 r , where M 1 r is an ( q , 7 , 5 , 3 ) MRD code, M 2 r is an ( q , 5 , 7 , 3 ) MRD code, 1 r s , s = m i n a ( q , a 1 , n 1 a 1 , b 1 ) a q , a 1 , n 1 a 1 , d 2 , a ( q , a 2 , n 2 a 2 , b 2 ) a q , a 2 , n 2 a 2 , d 2 , and M 3 is a q , 7 , 7 , 3 ; 2 RRMC code. The following are the generator matrices of C i r for 1 i 5 . Then C 4 = r = 1 5 i = 1 s C i r is an ( n , | C 4 | , d , k ) q CDC.
Mathematics 12 03270 i002
Theorem 2.
With the same notations as Theorem 1. Let C 1 and C 2 be as in Lemma 5, and C 3 as in Theorem 1. Then C : = C 1 C 2 C 3 is an ( n , | C | , d , k ) q CDC with | C | = | C 1 | + | C 2 | + | C 3 | .
Proof. 
Let W 1 C 1 , W 2 C 2 , W 3 C 3 , and W 1 = r s ( G 1 ) , G 1 = r s ( I k | Q 1 ) ,
W 2 = r s ( G 2 ) , G 2 = r s ( Q 2 | I k ) ,
W 3 = r s ( G 3 ) , G 3 = r s I a 1 P S M 3 O 2 Q T M 2 ,
  • where Q 1 Q 1 , Q 2 Q 2 , M 1 M 1 r , M 2 M 2 r , and M 3 M 3 .
The proof is composed of two parts:
I. The subspace distance between CDCs C 1 and C 3 is at least d.
It is easy to see that the identifying vector corresponding to W 1 is v ( G 1 ) = ( 1 1 k 0 0 n k ) . by V d and n 1 = n 2 = k , it follows that v ( G 3 ) has at least d 2 ones in the last k position, and at most k d 2 ones in the first k position. Then d H ( v ( G 1 ) , v ( G 3 ) ) k ( k d 2 ) + d 2 = d . Therefore, by Lemma 2, we have d S ( C 1 , C 3 ) d H ( v ( G 1 ) , v ( G 3 ) ) d .
II. The subspace distance between CDCs C 2 and C 3 is at least d.
dim ( W 2 + W 3 ) = rank B I k I a 1 P S M 3 O 2 Q T M 2 = rank I k B S M 3 I a 1 P T M 2 0 2 Q .
rank S M 3 T M 2 rank ( S | M 3 ) + rank ( T | M 2 ) rank ( S ) + rank ( M 3 ) + a 2 d 2 1 + rank ( M 3 ) + a 2 d 2 1 + a 1 d + 1 + a 2 = k d 2 ,
where rank ( S ) d 2 1 because there is at most d 2 1 non-zero columns in S. Then, dim ( W 2 W 3 ) k d 2 . Let W 2 = r s ( I k | B ) , W 3 = r s S M 3 I a 1 P T M 2 O 2 T , we have
d S ( W 2 , W 3 ) = 2 dim ( W 2 + W 3 ) 2 k = 2 dim ( W 2 + W 3 ) 2 k = 2 k 2 dim ( W 2 W 3 ) .
Hence, we can obtain d S ( W 2 , W 3 ) = 2 k 2 dim ( W 2 W 3 ) d .
Combining all the aforementioned discussions, we arrive at the conclusion that C : = C 1 C 2 C 3 is an ( n , | C | , d , k ) q CDC with | C | = | C 1 | + | C 2 | + | C 3 | . □
Corollary 3.
By Theorem 2, we have
A q ( n , d , k ) | C 1 | + | C 2 | + | C 3 | = a ( q , k , n k , d 2 ) + a ( q , k , n k , d 2 ; k d 2 ) + ( d 1 ) · s · a ( q , a 1 , n 2 a 2 , d 2 ) · a ( q , a 2 , n 2 a 2 , d 2 ) · a ( q , a 2 , n 2 a 2 , d 2 ; a 1 d + 1 ) .
Corollary 4.
For d = 6 and d 1 = 1 , d 2 = 2 , we have
A q ( 14 , 6 , 7 ) q 35 + ( 1 + r = 3 4 A r Q ( q , 7 , 7 , 3 ) + 5 q 12 ) .
A q ( 16 , 6 , 8 ) q 48 + ( 1 + r = 3 5 A r Q ( q , 8 , 8 , 3 ) + 5 q 15 ) .
A q ( 18 , 6 , 9 ) q 63 + ( 1 + r = 3 6 A r Q ( q , 9 , 9 , 3 ) + 5 q 25 ) .
Example 2.
By Corollary 4, we have
A 2 ( 14 , 6 , 7 ) 34532258504 ,
A 5 ( 16 , 6 , 8 ) 3552716061446350546877864809763610 ,
A 9 ( 18 , 6 , 9 ) 1310020512493866349004817889700802603385869505242199741941650 ,
  • which improve the lower bounds in [13].

4. Conclusions

This paper presents two improved construction methods for CDCs. First, we propose an enhanced algorithm that combines linkage structures and echelon-Ferrers designs, improving the lower bounds of A 2 ( 14 , 4 ; 4 ) and A 2 ( 18 , 4 ; 4 ) . Secondly, we enhance the inserting construction through column transformations of the generator matrix and obtain new lower bounds for A 2 ( 14 , 6 ; 7 ) , A 5 ( 16 , 6 ; 8 ) , and A 9 ( 18 , 6 ; 9 ) . We hope that these construction methods and the algorithms for computing identifying vectors will provide inspiration for the construction of other CDCs.

Author Contributions

Funding acquisition, Y.N.; methodology, Y.N.; supervision, Y.N.; writing—original draft, X.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China (No. 12301665), the Basic Science (Natural Science) Research Projects of Universities in Jiangsu Province under Grant Agreement (No. 22KJB110009), and Applied Basic Research Support Project of Changzhou Science and Technology (No. CJ20235031).

Data Availability Statement

Data are contained within the article.

Acknowledgments

The authors would like to thank the referees and editors for their very useful suggestions, which significantly improved this paper.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
CDCConstant dimension code
RMCRank metric code
MRDMaximum rank distance
RRMCRank-restricted RMC

Appendix A

Table A1. Construction for A q ( 14 , 4 , 4 ) .
Table A1. Construction for A q ( 14 , 4 , 4 ) .
Identifying VectorDimension Identifying VectorDimension
11100000011000018310000011001100011
20011000011000016320001010010000110
31010000010100016330000100110010010
4000011001100001434001010000010019
5011000000110001535100000101000019
6011000001001001536001000100010108
7010100001010001537000110000001109
8100100001001001438100010000001018
9101000000101001439010001000100019
10100100000110001440001100000000118
11110000000011001441100001000010018
12001100000011001242010100000001019
13100010001000101243000100011000109
14000000111100001244000101000010109
15010100000100101245001000100100018
16000010101010001246000000110011008
17010010000101001247001000011000018
18000101000101001148010001000001108
19001001001000101149100000100001107
20000110000100011050010000100010017
21010010001000011151000100010010016
22000001011010001152001000010001106
23010000101000101053000011000000116
24000011000011001054001001000001017
25000010010110001055100000010100017
26001010000100101156100000010010107
27000001101001001157000000001110013
28010010000010101058000000110000114
29110000000000111059000000001101102
30100001000100101060000000000011110
Table A2. Construction for A q ( 18 , 4 , 4 ) .
Table A2. Construction for A q ( 18 , 4 , 4 ) .
Identifying VectorDimension Identifying VectorDimension
1110000000000110000224301000001000010000112
2101000000000101000204401000010000000101012
3001100000000110000204501010000000000010113
4010100000000101000194600100100000001000113
5100100000000100100184700000011000000110012
6110000000000001100184800101000000000100113
7100100000000011000184900010010000001000112
8101000000000010100185000100100000000101013
9011000000000011000195100000000101010100012
10011000000000100100195200000000001111000012
11000011000000110000185310000001000000011010
12100010000000100010165400100000010010001011
13000110000000010100165500001100000000001110
14001100000000001100165600000000011001100011
15000010100000101000165700100010000000011011
16010100000000010010165810000000100000101010
17000000110000110000165910000001000001000111
18000110000000100001156000000010100001001011
19000001100000011000156100000000010110100011
20100001000000010010146200000000100101100010
21110000000000000011146300000000110000110010
22000110000000001010146400010001000000100110
23010001000000010100156510000010000000100111
24010001000000100010156600000010010001010011
25100001000000100001146700000001010001001010
26000001010000101000156800000000011010010011
27010010000000010001146900000000100110010010
2800001001000001100014700010000100000001019
2900010010000010001014710000000010100100018
3000001100000000110014720000010010000001018
3100101000000001001015730000000100100010108
3200001001000010010014740000001100000000118
3300000110000010010015750000000000110011008
3400000000110011000014760000000010100001107
3500010100000000011012770000000011000000116
3600100010000010000113780000001000100001016
3700000001100010001012790000000001010100017
3801000100000000100112800000000001010001106
3910001000000000010112810000000000001111004
4000110000000000001112820000000000110000114
4101001000000000011013830000000000001100112
4200000001100001010012840000000000000011110

References

  1. Koetter, R.; Kschischang, F.R. Coding for errors and erasures in random network coding. IEEE Trans. Inf. Theory 2008, 54, 3579–3591. [Google Scholar] [CrossRef]
  2. Etzion, T.; Silberstein, N. Codes and designs related to lifted MRD codes. IEEE Trans. Inf. Theory 2013, 59, 1004–1017. [Google Scholar] [CrossRef]
  3. Tao, F.; Kurz, S.; Liu, S. Bounds for the multilevel construction. arXiv 2020, arXiv:2011.06937. [Google Scholar]
  4. Heinlein, D.; Kurz, S. Coset construction for subspace codes. IEEE Trans. Inf. Theory 2017, 63, 7651–7660. [Google Scholar] [CrossRef]
  5. Kurz, S. The interplay of different metrics for the construction of constant dimension codes. Adv. Math. Commun. 2023, 17, 152–171. [Google Scholar] [CrossRef]
  6. Niu, Y.; Yue, Q.; Huang, D. New constant dimension subspace codes from generalized inserting construction. IEEE Commun. Lett. 2021, 25, 1066–1069. [Google Scholar] [CrossRef]
  7. Niu, Y.; Yue, Q.; Huang, D. New constant dimension subspace codes from parallel linkage construction and multilevel construction. Cryptogr. Commun. 2022, 14, 201–214. [Google Scholar] [CrossRef]
  8. Zhu, C.; Wang, Q.; Xie, Y.; Xu, S. Multiview latent space learning with progressively fine-tuned deep features for unsupervised domain adaptation. Inf. Sci. 2024, 662, 120223. [Google Scholar] [CrossRef]
  9. Heinlein, D.; Kiermaier, M.; Kurz, S.; Wassermann, A. Tables of subspace codes. arXiv 2016, arXiv:1601.02864. [Google Scholar]
  10. Etzion, T.; Silberstein, N. Error-correcting codes in projective spaces via rank-metric codes and Ferrers diagrams. IEEE Trans. Inf. Theory 2009, 55, 2909–2919. [Google Scholar] [CrossRef]
  11. Lao, H.; Chen, H. New constant dimension subspace codes from multilevel linkage construction. Adv. Math. Commun. 2022, 18, 956–966. [Google Scholar] [CrossRef]
  12. Lao, H.; Chen, H.; Tan, X. New constant dimension subspace codes from block inserting constructions. Cryptogr. Commun. 2022, 14, 87–99. [Google Scholar] [CrossRef]
  13. Niu, M.; Xiao, J.; Gao, Y. New constructions of constant dimension codes by improved inserting construction. Appl. Math. Comput. 2023, 446, 127885. [Google Scholar] [CrossRef]
  14. He, X.; Chen, Y.; Zhang, Z.; Zhou, K. New Construction for Constant Dimension Subspace Codes via a Composite Structure. IEEE Commun. Lett. 2021, 25, 1422–1426. [Google Scholar] [CrossRef]
  15. Li, F. Construction of constant dimension subspace codes by modifying linkage construction. IEEE Trans. Inf. Theory 2020, 66, 2760–2764. [Google Scholar] [CrossRef]
  16. Gluesing-Luerssen, H.; Troha, C. Construction of subspace codes through linkage. Adv. Math. Commun. 2016, 10, 525–540. [Google Scholar] [CrossRef]
  17. Silberstein, N.; Trautmann, A.L. Subspace codes based on graph matchings, Ferrers diagrams, and pending blocks. IEEE Trans. Inf. Theory 2015, 61, 3937–3953. [Google Scholar] [CrossRef]
  18. He, X.; Chen, Y.; Zhang, Z. Improving the linkage construction with echelon-Ferrers for constant-dimension codes. IEEE Commun. Lett. 2020, 24, 1875–1879. [Google Scholar] [CrossRef]
  19. Delsarte, P. Bilinear forms over a finite field, with applications to coding theory. J. Comb. Theory A 1978, 25, 226–241. [Google Scholar] [CrossRef]
  20. Gabidulin, E.M. Theory of codes with maximum rank distance. Problemy Peredachi Informatsii. Probl. Peredachi Informatsii 1985, 21, 3–16. [Google Scholar]
  21. Berlekamp, E.R. Introduction to Coding Theory; Springer: Vienna, Austria, 1970; pp. 5–11. [Google Scholar]
  22. Xu, L.; Chen, H. New constant-dimension subspace codes from maximum rank distance codes. IEEE Trans. Inf. Theory 2018, 64, 6315–6319. [Google Scholar] [CrossRef]
  23. Cossidente, A.; Kurz, S.; Marino, G.; Pavese, F. Combining subspace codes. Adv. Math. Commun. 2023, 17, 536–550. [Google Scholar] [CrossRef]
  24. Kurz, S. Lifted codes and the multilevel construction for constant dimension codes. arXiv 2020, arXiv:2004.14241. [Google Scholar]
Table 1. Identifying vector set V d .
Table 1. Identifying vector set V d .
d V d
4 v 1 = 100011 v 2 = 001110
v 3 = 010101
6 v 1 = 0101011001 v 2 = 0001110110
v 3 = 1010010011 v 4 = 0110001110
v 5 = 1000101101
8 v 1 = 01101001001011 v 2 = 10100100101101
v 3 = 01000111011100 v 4 = 00110011100110
v 5 = 11010000010111 v 6 = 10001010111010
v 7 = 00011101110001
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Niu, Y.; Wang, X. Lifted Codes with Construction of Echelon-Ferrers for Constant Dimension Codes. Mathematics 2024, 12, 3270. https://doi.org/10.3390/math12203270

AMA Style

Niu Y, Wang X. Lifted Codes with Construction of Echelon-Ferrers for Constant Dimension Codes. Mathematics. 2024; 12(20):3270. https://doi.org/10.3390/math12203270

Chicago/Turabian Style

Niu, Yongfeng, and Xuan Wang. 2024. "Lifted Codes with Construction of Echelon-Ferrers for Constant Dimension Codes" Mathematics 12, no. 20: 3270. https://doi.org/10.3390/math12203270

APA Style

Niu, Y., & Wang, X. (2024). Lifted Codes with Construction of Echelon-Ferrers for Constant Dimension Codes. Mathematics, 12(20), 3270. https://doi.org/10.3390/math12203270

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop