Professional Documents
Culture Documents
Abstract- An optical orthogonal code (OOC) is a collection performance are not the same, and so considering only codes
of binary sequences with good auto- and cross-correlation prop- for which the constraints are identical may lead to a suboptimal
erties; they were defined by Salehi and others as a means of code. Bounds on such OOC’s are derived and techniques for
obtaining code-division multiple access on optical networks. Up to
now, all work on OOC’s have assumed that the constraint placed constructing them are described.
on the autocorrelation and that placed on the cross-correlation Finally, OOC’s with unequal auto- and cross-correlation
are the same. In this paper we consider codes for which the two constraints may be viewed as constant-weight unequal error
constraints are not equal. Specifically, we develop bounds on the protection (UEP) codes; therefore, we interpret the bounds and
size of such OOC’s and demonstrate construction techniques for constructions in that context.
building them. The results demonstrate that a significant increase
in the code size is possible by letting the autocorrelation constraint
exceed the cross-correlation constraint. These results suggest that 11. BACKGROUND
AND MOTIVATION
for a given performance requirement the optimal OOC may be
one with unequal constraints. In this section we briefly review previous work on optical
This paper also views OOC’s with unequal auto- and cross- orthogonal codes and indicate why the problem considered in
correlation constraints as constant-weight unequal error pro- this paper is important.
tection (UEP) codes with two levels of protection. The bounds
derived are interpreted from this viewpoint.
A. Definitions and Past Work
Index Terms-Code-division multiple access, optical networks,
constant-weight codes, unequal error protection codes, spread- What follows is the definition of an OOC given by Salehi
spectrum systems. et al. [3].
Definition: An ( n , w, A,, A,) optical orthogonal code C is
a collection of binary n-tuples, each of Hamming weight w ,
I. INTRODUCTION such that the following two properties hold:
Authorized licensed use limited to: Politecnico di Torino. Downloaded on May 04,2010 at 15:47:32 UTC from IEEE Xplore. Restrictions apply.
YANG AND FUJA: OPTICAL ORTHOGONAL CODES 91
Authorized licensed use limited to: Politecnico di Torino. Downloaded on May 04,2010 at 15:47:32 UTC from IEEE Xplore. Restrictions apply.
98 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 41, NO. 1, JANUARY 1995
whose (2, j)th element is given by Proof: The elements of Rz indicate the relative delay
between every pair of 1’s in z. Therefore, Rz contains
+
X 1 repeated elements if and only there exist two sequences
{io, i l , . . . , Z ~ }and {i;, zi,...,zL} such that for all j =
0, l , . . . , X
(Note: The subscript addition above and in the definition of xa3= xal = 1 and i, - i: = I-* # 0.
Mz, below is all modulo-w-denoted “U.”) 3
For any z E (0, 1)“ and any integer X ( 1 5 X 5 w - 1) let But this is true if and only if xtzt+.r* 2 X + 1.
M z , be the set of integer A-tuples given by Q.E.D.
ir io iz
Lemma2: Let z = [ z 0 , ~ l , . . . , x , - 1 ] and y =
[yo, y1, . . . , yn-l] be binary n-tuples. Then the inequality
i,-1 1
t=O
where tz = [to, t l , . . . , t w - l ] .
1 tor m = [ao, a l ; . . , a x - l ]
+
is in Mz,x if and only if
there exists a sequence of X 1 distinct integers--call them
i o ,i l , . . . ,ix-such that
There are at most w(”,’) vectors in M z , x ; there are xaJ= 1 , forj=0, l,-..,X
(“l’) ways to pick the i l ’ s and w ways to pick the j’s. If
and
every such selection yields a different vector then IMz, X I =
w ( ~ ; ’ ) ;otherwise IMz,xl < w(”;’). i3+1-i3=a,, forj=O,l,...,X-l .
Example: Let z = [1001100010000]. Then
Therefore, Mz, nMy, = 0 if and only if it is impossible to
tz = [to, ti, t 2 , t3] = [3, 1, 4, 51. + +
“line up” X 1 binary 1’s in z with X 1 binary 1’s in y with
cyclic shifts-i.e., if and only if xtytB7 5 A. Q.E.D.
Furthermore Lemma 3: Let z = [ZO, 5 1 , . . . , z,-1] be a binary n-tuple.
Then the inequality
t=O
A. An Upper Bound
In this section we use the lemmas above to provide an upper
n-1
bound on @(n,w ,A,, Xc).
First consider the case Xa = Xc = A; the bound we derive
C:
I:t
3 :
tCBir is identical to one in [3] derived from the Johnson bound for
t=O
constant weight error-correcting codes; it is rederived here to
holds for all 1 5 T 5 n - 1 if and only if no component of illustrate the approach that will be taken in the proof of the
Rz appears more than X times. new bounds.
Authorized licensed use limited to: Politecnico di Torino. Downloaded on May 04,2010 at 15:47:32 UTC from IEEE Xplore. Restrictions apply.
YANG AND FUJA OPTICAL ORTHOGONAL CODES 99
Theorem 1: [Johnson Bound] The following inequality We note also that Theorem 2 is only a generalization of
holds: the Johnson bound for A = 1; for A 2 2 the bound on
( n - I)(. - 2 ) . . . ( n - A) @(n, w, A, A) obtained by setting m = 0 in Theorem 2 is
@(n,w, A, A) I . weaker than the bound in Theorem 1.
w(w - 1).. . (w - A)
Proof: Let C be an optimal ( n ,w, A, A) OOC-i.e., B. Lower Bounds
IC) = @(n, w, A, A). From Lemma 3 we know that for every
z E C the set Mz, consists of w( ");' distinct integer A- In [3], [6] a lower bound on @(n,w, A, A,) was derived
for odd prime n. Subsequently, Wei [7] derived an alternate
tuples. Furthermore, from Lemma 2 we know that for z,y E
lower bound-again for odd prime n. In what follows we use
C, z # y, the sets Mz, and My, are disjoint. Therefore,
the general approach of Wei [7] to bound @(n,w, A, A,) for
the union of M z , x as z varies over all z E C consists of
A, # A, and any n.
@(n, w, A, A) .w ( w;l) distinct integer A-tuples. However, if
Theorem 3:
[ao,al,...,ax-1] E M z , x t h e n a o + a l + . . . + a x - l 5 n-1.
The number of ways to select A positive ai's that sum to no
more than n - 1 is just the number of compositions of n with
A + 1 positive parts-and that is equal to ( We have
thus shown that where
q n , w, A, A ) . w ('";I) I (y)
which was to be proven. Q.E.D.
Our next goal is to bound @(n,w, A, A,) for A, > A., To
do so we first need a preliminary lemma.
Lemma 4: Let z E C, where C is an ( n , w, A m, A) +
optical orthogonal code. (Assume m 2 0 is an integer.) Then
IMz,xl 2
U("
A+m
.
x ')
Proof: See Appendix I.
if x = 0;
Theorem 2: Let m be a nonnegative integer. Then
@(n,w, A
- 1)(n - 2 ) . . . (n - A)(A + m )
+ m, A) I ( nw(w .
a(x) = { otherwise
1)(w 2 ) . . . (w - A)
- - and
Proofi Let C be an ( n , w, A+m, A) OOC such that (CI=
+
@(n, w, A m, A). By Lemma 4,for any z E C , IMz,xJ2
w( "i')/(m+A). Furthermore, by Lemma 2 Mz, and My, Proof: As in [3], [6], the proof consists of demonstrating
are disjoint for z,y E C and z # y; therefore, IMz, I summed that A is an upper bound on the number of binary n-tuples
up over all hz E C cannot exceed the total number of integer that violate the autocorrelation constraint and B is an upper
A-tuples that are "allowable" as elements of ME,A-a number bo.und on the number of binary n-tuples that violate the cross-
shown in the proof of Theorem 1 to be ( Hence correlation constraint for a given binary n-tuple z.The result
follows from an application of the greedy algorithm. The
validity of B as an upper bound was demonstrated in [31, [61.
Thus the proof consists of demonstrating that there are at most
A binary n-tuples that violate the autocorrelation constraint.
2 @(n,w, A + m, A ) . -(" x l)
A proof of this is given in Appendix 11.
C. Asymptotic Bounds
m+A
which was to be proven. Q.E.D. In this section we examine how the cardinality of an opti-
Examining Theorem 2, we find (for instance) that the upper mal ( n , w, A, A,) optical orthogonal code behaves for large
bound on @(n, w, A, 1) is A times greater than the analogous blocklength. The goal is to see how quickly the parameters w,
bound on @(n,w, 1, 1). Note also that a trivial upper bound A, and A, should grow the blocklength n in an (n, w, A, A,)
on @(n,w, A +
m, A) is given by any upper bound on ooc.
@(n, w, A +m, A +
m ) . For "typical" OOC values-i.e., Lemma 5: Let A, be a positive integer, and let p and q be a
n >> w-an upper bound derived this way will be looser than nonnegative constants such that p > (A, +
q)/(A, +
1).Then
the bound in Theorem 2. For instance, considering (n, w, 2 , 1) lim
n-00 @(n,TanP1, [pnq], A,) =O
OOC's, the bound in Theorem 2 is tighter than the Johnson
bound for ( n ,w, 2, 2) codes provided n > 2w - 2. for any positive real a and p.
Authorized licensed use limited to: Politecnico di Torino. Downloaded on May 04,2010 at 15:47:32 UTC from IEEE Xplore. Restrictions apply.
100 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 41, NO. 1, JANUARY 1995
5
( n - 1).’ . ( n - A,)(pnq 1) + s, = min { d ( f ( z ) , f(y)) : z,Y E (0, and z, # yt}.
c y n p ( c y n p - 1) . . . (cynp - A,)
Note that the separation vector is associated with the en-
coder rather than the code-i.e., the image of the encoder. It
is possible that a code may have multiple separation vectors
associated with it4orresponding to different encoders for the
same code.
Let f ( . ) be an encoder with separation vector s =
Since by assumption A, + q - p(A, +1) < 0 we have the [so, 5 - 1 , . . . , S k - 1 1 . Suppose a message k-tuple z is used to
desired result. Q.E.D. select a codeword f(z) E C which is then transmitted over
Lemma 6: Let A, and A, be positive integers, and let p be a a noisy channel. Minimum-distance decoding will correctly
positive constant such that p < min (A,/(2A, + 3 ) , A,/(2AC+ recover the ith bit of the message provided no more than
3 ) ) . Then t, = [(s, - 1)/1] errors occur during transmission. A code
with an encoder whose separation vector has the property that
lim @ ( n ,[anp],A, A,) = cc t, # t, for some i and j is called an unequal error protection
n-03
(UEP) code.
for any positive real a. There is a substantial body of literature on UEP codes.
Proof: See Appendix 111. (See [8]-[ 111 for references.) However, there has been no
Consider the case A, = A, = 1. Lemma 5 indicates that investigation of constant weight UEP codes.
if the codeword weight grows faster than % /, there are no An (n, w, A,, A,) OOC with A, > A, can be used to
codewords for large n. Lemma 6 suggests if the weight grows construct a constant-weight UEP code. Suppose you have such
slower than n1/5there is no limit to the number of codewords an OOC with cardinality M . Now consider the error control
that can be found. code consisting of all the n-tuples of the OOC and all their
Finally, we demonstrate that when the auto- and cross- cyclic shifts. The resulting code has nM codewords of weight
correlation constraints are growing like nk for a constant k , we w. Furthermore, such a code consists of M “clouds,” where
are guaranteed the existence of codes provided the codeword two codewords belong to the same cloud if and only if they
weight grows no faster than fi. are cyclic shifts of one another. The distance between any
Lemma 7: Let p , q , and r be constants 0 < p , q , r < 1. two codewords within the same cloud is at least 2(w - A,);
Then if p < 1/2 the distance between any two codewords from two different
clouds is at least 2(w - A,).
So, consider the following encoder. Take IC2 = [log, M J
message bits and use them to pick a cloud; then take kl =
for any positive real cy, p, and y. [log, nJ message bits and use them to pick an n-tuple from
Proof: See Appendix 111. within the chosen cloud. Any two messages that differ in the
first k2 bits will have codewords that differ in at least 2(w-A,)
positions; any two messages that differ in the last kl bits will
I v . OOC’S AS CONSTANT-WEIGHT have codewords that differ in at least 2(w - A,) positions.
UNEQUALERRORPROTECTION CODES Therefore, we have described an encoder for an ( n . kl kp) +
In this section we briefly describe the connection between code with separation vector
( n ,w, A,, A,) optical orthogonal codes and unequal error s = (2(w - A,), . ,2(w - A,), 2(w - A,), . . . , 2 ( w - A), .)
‘ ’
protection (UEP) code with two levels of protection. \
+ /
-
a mapping f : (0, l}’” + (0, l}”. The message z E there exists a weight-w (n, k1 k 2 ) error control code with
(0, l}‘“is represented by the codeword f(z) E (0, l}”. separation vector
If min ( d ( f ( z ) , f(y)) : z,y E (0, l}k, z # y} 2 2t 1 then+ ,p, PJ‘.,g:
3 = 1% Q , ’ . ’ , c y ,
we say the code is t-error correcting. (Here, d ( c 1 , c2) is the
Hamming distance between the n-tuples c1 and c2.) k2 ki
Authorized licensed use limited to: Politecnico di Torino. Downloaded on May 04,2010 at 15:47:32 UTC from IEEE Xplore. Restrictions apply.
101
YANG AND FUJA: OPTICAL ORTHOGONAL CODES
A. Construction I
70 -
This method is a variation on the technique proposed by
Wilson [13] to construct ( n ,W , 1, 1) codes. We begin with
the case w = 5, and then generalize the technique.
An ( n ,5, 2, 1) OOC: Let n be a prime number such that
60 -
+
n = 12t 1 for integer t. Let Q be a primitive element of
the field G F ( n ) such that a4 = cy3t - 1 and ar = 2, where q
and r are integers that are nonzero modulo-3 and are distinct
50 -
modulo-3.
- Then we can construct an ( n , 5 , 2, 1) OOC C with car-
dinality (CI = t as follows. The ith codeword z, contains
40 -
a “1” in positions 0, a3’, c ~ ~ c~ ~+ ~~ and ~~ +, agt+”
~ ~ ,and
a “0” everywhere else. This holds for i = 0, 1, -
1. (Note: We say that the code consists of the “blocks”
30 - {[o, Q3t+3z, a6t+3z a9t+32 1: 2 = 0 , 1 , . . , t - l}.)
1
‘
Authorized licensed use limited to: Politecnico di Torino. Downloaded on May 04,2010 at 15:47:32 UTC from IEEE Xplore. Restrictions apply.
102 'IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 41, NO. 1, JANUARY 1995
Authorized licensed use limited to: Politecnico di Torino. Downloaded on May 04,2010 at 15:47:32 UTC from IEEE Xplore. Restrictions apply.
~
TABLE I
OF ( n , ILL 2 , 1) OOC’s CONSTRUCTED
THECARLHNALITY USINGTHE TECHNIQUE
OF SECTION
V-A
TABLE I1
OF ( 7 1 , ILL 2, 1 ) OOC’s CONSTRUCTED
THECARDINALITY USINGTHE TECHNIQUE
OF SECTION
V-B
{[l,11, 30, 401, [12, 16, 25, 291, [lo, 13, 28, 311, [3, 4, 37, (for even w) as well as ones with 2(n- 1)/(w2- 1)codewords
381, [7, 18, 23, 34]}-i.e., the codewords are (for odd w).
These constructions also illustrate the point made in Section
2 0 = [01000000000100000000000000000010000000001]
11-B that, for some blocklengths, codes with A, # A, may
51 = [00000000000010001000000001000100000000000] be preferable to codes with equal constraints. Comparing
5 2 = [00000000001001000000000000001001000000000] an ( n ,w, 1, 1) code with an ( n ,w + 1, 2, 1) code, recall
5 3 = [OOO 1100000000000000000000000000000000 11001 from Section 11-B that the performance figures of merit for
the ( n ,w + l , 2, 1) code dominate those of the ( n ,w, 1, 1)
2 4 = [00000001000000000010000100000000001000000].
code. Yet we have just shown it is possible to construct an
Note that, from Theorem 2, a(41,4, 2, 1) 5 2 . 40/12 = (71, w + l , 2, 1) code with either Z ( n - l ) / ( ~ + l ) ~codewords
+
6.66, so we cannot say for sure if this code is optimal; there (for even w + 1) or 2(n - l)/w(w 2) codewords (for odd
may be a (41, 4, 2 , 1) code with six codewords. w+l); but Theorem 1 tells us it is impossible to construct an
Tables I and I1 show the parameters of some ( n , w, 2, 1) ( n , w, 1, 1) code with more than (n-l)/(w(wl)) codewords.
OOC’s that can be contructed using the approaches outlined Therefore, for w 2 6 the ( n ,w + 1, 2, 1) codes offer better
above. Also included is the upper bound on @(n,w, 2, 1) performance and more codewords than any ( n ,w, 1, 1) code.
derived in Theorem 2. Theorem 2 tells us it is impossible As a simple example, from Table I1 we see that it is possible
to construct an ( n ,w, 2, 1) OOC with more than 2 ( n - to construct a (1801, 9, 2, 1) OOC with 45 codewords. But
l)/(w(w - 1)) codewords; the methods above tell us how to construct an (1801, 8, 1, 1) code the Johnson bound tells
to construct ( n ,w, 2, 1) OOC’s with 2(n - l ) / w 2 codewords us it is impossible to have more than 32 codewords.
Authorized licensed use limited to: Politecnico di Torino. Downloaded on May 04,2010 at 15:47:32 UTC from IEEE Xplore. Restrictions apply.
VI. SUMMARY APPENDIXI1
In this paper we derived new bounds on the number of users We now prove that the number A in Theorem 4 is an upper
that can be supported on an optical network employing code- bound on the number of binary n-tuples of weight w with
division multiple access with binary signature sequences; in autocorrelation exceeding A,.
addition we presented a number of new methods for designing Associate the w-set S = {sl, s2, . . . , s,} with the biary
codes with good auto- and cross-correlation properties. Unlike n-tuple containing ones in positions s1, s 2 , ’ . . , s, and zeroes
previous work in this area, we considered the possibility everywhere else. We wish to (over) count the number of w-
that the auto- and cross-correlation constraints might not be sets associated with n-tuples that violate the autocorrelation
identical; indeed, the bounds and the constructions suggest constraint.
that it may sometimes be preferable to use such “asymmetric” Fix S to be a positive integer. Then a “chain”
OOC’s. Among the constructions presented, we note that { i o , i l , . . . ,i,} is a set of integers modulo-n where
the ( n , w, 2 , 1) codes are near-optimal; their cardinaltiy is i, = i,-l + 6 for 1 5 j 5 z; the length of this chain
2 ( n - 1)/w2 and we have demonstrated that it is impossible is 1 + z. By convention, a cycle (i.e., io = i, + 6) is
to get more than 2(n - 1)/(w2 - w)codewords. +
considered a chain of length z 1 with an arbitrary starting
We also noted the relationship between OOC’s with unequal point. A maximal chain is one not contained in another chain.
constraints and constant-weight unequal error protection codes Now suppose the w-set S = {SI, s 2 , . . . , s,} can be
with two levels of protection; we noted that the lower bound partitioned into c maximal chains whose lengths are 1+21, 1+
we derived for OOC’s could be interpreted as a lower bound +
5 2 , . .. ,1 z,. Then clearly
on the achievability of such UEP codes.
C
w =c + cza.
APPENDIXI i=l
Lemma 4: Let z E C, where C is an ( n ,w, X m, A)+ Realize that the w-set S is specified exactly by:
optical orthogonal code. (Assume m 2 0 is an integer.) Then
1) The value S upon which the partitioning chains are
based.
2 ) The number c of maximal chains into which it can be
, A I -
partitioned.
X+m . 3) The lengths of the maximal chains-i.e., X I , 5 2 , . . . , x C .
4) The chain “heads”-i.e., the starting point of each chain.
Proof: Let
The autocorrelation of the n-tuple associated with S after S
cyclic shifts is w - c + N , where N is the number of chains that
+
are cycles. This is because a cycle of length 2, 1 adds 2 , 1 +
to the autocorrelation, whereas a noncyclic chain of length
2, + 1 adds only z,. Our approach, therefore, will be to count
Define a function f : Z -+ 2’ by the number of w-sets with the property that w - c N > A,; +
in doing so we will let S vary from 1 to Ln/2].(For 6 > n/2
r in 2,
we shall have already counted the associated w-sets with
6/ = n - 6.)
Once n, w, and S are fixed, the only way a chain can be
a cycle is if Slkn for some integer k . Furthermore, if Slkn
+
but 6 n then there is some other value 6’ such that 6/16 and
S’ln and the cycle associated with S is identical to a cycle
associated with 6’. Therefore, in looking for cycles we need
where tZ = [to, tl,...,t,-l] . only look at values of S that divide n; when S n we will not
So Mz, is exactly the image of f ( . ) ; to prove the lemma find any cycles that have not already been accounted for.
+
it is sufficient to show that f(.) maps at most m X elements So how many cycles can there be? Each cycle “uses up”
of Zto the same element of Mz A; then we will have shown n/S of the w ones; therefore, there can be anywhere from
I M Z , ~ I2 lxl/(m + +
A) = w ( ” f l ) / ( ~ m). zero to Lw6/nJ cycles-i.e., 0 5 N 5 LwS/nJ.
Now define a function f : Z + 2 such that g ( i ) is the sum So, suppose we have fixed n, w, 6,and N . We are now
of the components of f(i)-i.e., if f(i)= [ao, a l , . . . ,ax-I] going to specify the chains. How many ways are there to pick
+ + +
then g ( i ) = a0 a1 . . . ax-1. Obviously, if f(i)= f($) c nonnegative integers 5 1 , 5 2 , . . . , z, such that z1 5 2+ +
then g ( i ) = g ( ” ) so to prove the lemma it is sufficient to + +
. . . 2, = w - c and w - c N > A,. Note that c must be
+
show that g ( . ) maps at most m X elements of Z to the same at least [wS/nl; this is because the smallest number of chains
integer. For each j E Z the integer g ( i ) is a component of Rz, is caused by making each chain as large as possible, and the
and we know no component of RZ can be repeated more than largest chain is a cycle. Thus c is smallest when there are
+
X m times by Lemma 1. Therefore, the function g ( . ) is (at LwS/n] cycles and (possibly) one “leftover” noncyclic chain
+
most) ( m A)-to-one and the Lemma holds. Q.E.D. for a total of [w6/nl chains.
Authorized licensed use limited to: Politecnico di Torino. Downloaded on May 04,2010 at 15:47:32 UTC from IEEE Xplore. Restrictions apply.
YANG AND FUJA: OPTICAL ORTHOGONAL CODES 105
where REFERENCES
[I] J. A. Salehi, “Code division multiple access techniques in optical fiber
networks-part I: Fundamental principles,” ZEEEE Trans. Commun., pp.
824-833, Aug. 1989.
121 J. A. Salehi and C. A. Brackett, “Code division multiple access tech-
and niques in optical fiber networks-paxt 11: Systems performance analysis,”
IEEE Trans. Commun., pp. 834-850, Aug. 1989.
[3] F. R. K. Chung, J. A. Salehi, and V. K. Wei, “Optical orthogonal codes:
Design, analysis, and applications,” IEEE Trans. Inform. Theory, vol.
35, pp. 595-604, May 1989.
[4] H. Chung and P. V. Kumar, “Optical orthogonal codes-new bounds
Let w = LanP]. Then for n sufficiently large-more and an optimal construction,” IEEE Trans. Inform. Theory, vol. 36, pp.
866-873, July 1990.
precisely, for n such that 0 < anp - 1 < n-the following [5] N. Q. A, L. Gyorfi, and J. Massey, “Constructions of binary constant-
inequality holds: weight cyclic codes and cyclically permutable codes,” IEEE Trans.
Inform. Theory, vol. 38, pp. 94G949, May 1992.
1
[6] F. R. K. Chang, J. A. Salehi, and V. K. Wei, “Correction to optical
(:) $[I-
a2n2p
n-anP+l
orthogonal codes: Design, analysis, and applications,” ZEEE Trans.
Znform. Theory, vol. 3 8 , p. 1429, July 1992.
n” [7] V. K. Wei, private communication, Jan. 1992.
= -
W!
+ (low order terms) [8] B. Masnick and J. Wolf, “On linear unequal error protection codes,”
ZEEE Trans. Inform. Theory, vol. IT-13, pp. 6 W 6 0 7 , Oct. 1967.
[9] W. J. V. Gils, “Two topics on linear unequal error protection codes:
where we have made use of the fact that p < 1/2 by Bounds on their length and cyclic code classes,” IEEE Trans. Inform.
assumption. Similarly, for n sufficiently large we can show Theory, vol. IT-29, pp. 866-876, Nov. 1983.
Authorized licensed use limited to: Politecnico di Torino. Downloaded on May 04,2010 at 15:47:32 UTC from IEEE Xplore. Restrictions apply.
I06 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 41, NO. 1, JANUARY 1995
[IO] M. C. Lin and S. Lin, “Cyclic uequal error protection codes constructed messages,” Probl. Pered. Inform., vol. 15, pp. 4 0 4 9 , July-Sept. 1979.
from cyclic codes of composite length,” IEEE Trans. Inform. Theory, [ 131 R. M. Wilson, “Cyclotomy and difference families in elementary abelian
vol. 34, pp. 867-871, July 1988. groups,” J. Number Theory, vol. 4, pp. 1 7 4 7 , 1972.
[ I 11 R. H. Morelos-Zaragoza, “Multi-level error correcting codes,” Ph.D. [ 141 H. Hanani, “The existence and constructions of balanced incomplete
dissertation, Univ. of Hawaii, May 1992. block designs,” Ann. Marh. Sfarisr., vol. 32, pp. 361-386, 1961.
[121 L. A. Bassalygo, V. A. Zinovev, V. V. Zyablov, M. S. Pisker, and G . [15] R. C. Bose, “On the construction of balanced incomplete block design,”
S. Poltyrev, “Bounds for codes with uequal protection of two sets of Ann. Eugenics, vol. 9, pp. 353-399, 1939.
Authorized licensed use limited to: Politecnico di Torino. Downloaded on May 04,2010 at 15:47:32 UTC from IEEE Xplore. Restrictions apply.