Reed–Muller code

From HandWiki
Short description: Error-correcting codes used in wireless communication
Reed-Muller code RM(r,m)
Named afterIrving S. Reed and David E. Muller
Classification
TypeLinear block code
Block length[math]\displaystyle{ 2^m }[/math]
Message length[math]\displaystyle{ k=\sum_{i=0}^r \binom{m}{i} }[/math]
Rate[math]\displaystyle{ k/2^m }[/math]
Distance[math]\displaystyle{ 2^{m-r} }[/math]
Alphabet size[math]\displaystyle{ 2 }[/math]
Notation[math]\displaystyle{ [2^m,k,2^{m-r}]_2 }[/math]-code

Reed–Muller codes are error-correcting codes that are used in wireless communications applications, particularly in deep-space communication.[1] Moreover, the proposed 5G standard[2] relies on the closely related polar codes[3] for error correction in the control channel. Due to their favorable theoretical and mathematical properties, Reed–Muller codes have also been extensively studied in theoretical computer science.

Reed–Muller codes generalize the Reed–Solomon codes and the Walsh–Hadamard code. Reed–Muller codes are linear block codes that are locally testable, locally decodable, and list decodable. These properties make them particularly useful in the design of probabilistically checkable proofs.

Traditional Reed–Muller codes are binary codes, which means that messages and codewords are binary strings. When r and m are integers with 0 ≤ rm, the Reed–Muller code with parameters r and m is denoted as RM(rm). When asked to encode a message consisting of k bits, where [math]\displaystyle{ \textstyle k=\sum_{i=0}^r \binom{m}{i} }[/math] holds, the RM(rm) code produces a codeword consisting of 2m bits.

Reed–Muller codes are named after David E. Muller, who discovered the codes in 1954,[4] and Irving S. Reed, who proposed the first efficient decoding algorithm.[5]

Description using low-degree polynomials

Reed–Muller codes can be described in several different (but ultimately equivalent) ways. The description that is based on low-degree polynomials is quite elegant and particularly suited for their application as locally testable codes and locally decodable codes.[6]

Encoder

A block code can have one or more encoding functions [math]\displaystyle{ C:\{0,1\}^k\to\{0,1\}^{n} }[/math] that map messages [math]\displaystyle{ x\in\{0,1\}^k }[/math] to codewords [math]\displaystyle{ C(x)\in\{0,1\}^{n} }[/math]. The Reed–Muller code RM(r, m) has message length [math]\displaystyle{ \textstyle k=\sum_{i=0}^r \binom{m}{i} }[/math] and block length [math]\displaystyle{ \textstyle n=2^m }[/math]. One way to define an encoding for this code is based on the evaluation of multilinear polynomials with m variables and total degree r. Every multilinear polynomial over the finite field with two elements can be written as follows: [math]\displaystyle{ p_c(Z_1,\dots,Z_m) = \sum_{\underset{|S|\le r}{S\subseteq\{1,\dots,m\}}} c_S\cdot \prod_{i\in S} Z_i\,. }[/math] The [math]\displaystyle{ Z_1,\dots,Z_m }[/math] are the variables of the polynomial, and the values [math]\displaystyle{ c_S\in\{0,1\} }[/math] are the coefficients of the polynomial. Since there are exactly [math]\displaystyle{ k }[/math] coefficients, the message [math]\displaystyle{ x\in\{0,1\}^k }[/math] consists of [math]\displaystyle{ k }[/math] values that can be used as these coefficients. In this way, each message [math]\displaystyle{ x }[/math] gives rise to a unique polynomial [math]\displaystyle{ p_x }[/math] in m variables. To construct the codeword [math]\displaystyle{ C(x) }[/math], the encoder evaluates [math]\displaystyle{ p_x }[/math] at all evaluation points [math]\displaystyle{ a\in\{0,1\}^m }[/math], where it interprets the sum as addition modulo two in order to obtain a bit [math]\displaystyle{ (p_x(a)\bmod 2) \in \{0,1\} }[/math]. That is, the encoding function is defined via[math]\displaystyle{ C(x) = \left(p_x(a)\bmod 2\right)_{a\in\{0,1\}^m}\,. }[/math]

The fact that the codeword [math]\displaystyle{ C(x) }[/math] suffices to uniquely reconstruct [math]\displaystyle{ x }[/math] follows from Lagrange interpolation, which states that the coefficients of a polynomial are uniquely determined when sufficiently many evaluation points are given. Since [math]\displaystyle{ C(0)=0 }[/math] and [math]\displaystyle{ C(x+y)=C(x)+C(y) \bmod 2 }[/math] holds for all messages [math]\displaystyle{ x,y\in\{0,1\}^k }[/math], the function [math]\displaystyle{ C }[/math] is a linear map. Thus the Reed–Muller code is a linear code.

Example

For the code RM(2, 4), the parameters are as follows:

[math]\displaystyle{ \begin{align} r&=2\\ m&=4\\ k&=\textstyle\binom{4}{2}+\binom{4}{1}+\binom{4}{0}= 6+4+1=11\\ n&=2^m=16\\ \end{align} }[/math]

Let [math]\displaystyle{ C:\{0,1\}^{11}\to\{0,1\}^{16} }[/math] be the encoding function just defined. To encode the string x = 1 1010 010101 of length 11, the encoder first constructs the polynomial [math]\displaystyle{ p_x }[/math] in 4 variables:[math]\displaystyle{ \begin{align} p_x(Z_1,Z_2,Z_3,Z_4) &= 1 + (1\cdot Z_1 + 0\cdot Z_2 + 1\cdot Z_3 + 0\cdot Z_4) + (0\cdot Z_1 Z_2 + 1\cdot Z_1Z_3 + 0\cdot Z_1Z_4 + 1\cdot Z_2Z_3 + 0\cdot Z_2Z_4+ 1\cdot Z_3Z_4)\\ &=1+Z_1+Z_3+Z_1Z_3+Z_2Z_3+Z_3Z_4 \end{align} }[/math]Then it evaluates this polynomial at all 16 evaluation points (0101 means [math]\displaystyle{ Z_1=0, Z_2=1, Z_3=0, Z_4=1) }[/math]: [math]\displaystyle{ p_x(0000)= 1,\; p_x(0001)= 1,\; p_x(0010)= 0,\; p_x(0011)= 1,\; }[/math]

[math]\displaystyle{ p_x(0100)= 1,\; p_x(0101)= 1,\; p_x(0110)= 1,\; p_x(0111)= 0,\; }[/math]

[math]\displaystyle{ p_x(1000)= 0,\; p_x(1001)= 0,\; p_x(1010)= 0,\; p_x(1011)= 1,\; }[/math]

[math]\displaystyle{ p_x(1100)= 0,\; p_x(1101)= 0,\; p_x(1110)= 1,\; p_x(1111)= 0\,. }[/math]As a result, C(1 1010 010101) = 1101 1110 0001 0010 holds.

Decoder

As was already mentioned, Lagrange interpolation can be used to efficiently retrieve the message from a codeword. However, a decoder needs to work even if the codeword has been corrupted in a few positions, that is, when the received word is different from any codeword. In this case, a local decoding procedure can help.

The algorithm from Reed is based on the following property: you start from the code word, that is a sequence of evaluation points from an unknown polynomial [math]\displaystyle{ p_x }[/math] of [math]\displaystyle{ {\mathbb F}_2[X_1,X_2,...,X_m] }[/math] of degree at most [math]\displaystyle{ r }[/math] that you want to find. The sequence may contains any number of errors up to [math]\displaystyle{ 2^{m-r-1}-1 }[/math] included.

If you consider a monomial [math]\displaystyle{ \mu }[/math] of the highest degree [math]\displaystyle{ d }[/math] in [math]\displaystyle{ p_x }[/math] and sum all the evaluation points of the polynomial where all variables in [math]\displaystyle{ \mu }[/math] have the values 0 or 1, and all the other variables have value 0, you get the value of the coefficient (0 or 1) of [math]\displaystyle{ \mu }[/math] in [math]\displaystyle{ p_x }[/math] (There are [math]\displaystyle{ 2^d }[/math] such points). This is due to the fact that all lower monomial divisors of [math]\displaystyle{ \mu }[/math] appears an even number of time in the sum, and only [math]\displaystyle{ \mu }[/math] appears once.

To take into account the possibility of errors, you can also remark that you can fix the value of other variables to any value. So instead of doing the sum only once for other variables not in [math]\displaystyle{ \mu }[/math] with 0 value, you do it [math]\displaystyle{ 2^{m-d} }[/math] times for each fixed valuations of the other variables. If there is no error, all those sums should be equals to the value of the coefficient searched. The algorithm consists here to take the majority of the answers as the value searched. If the minority is larger than the maximum number of errors possible, the decoding step fails knowing there are too many errors in the input code.

Once a coefficient is computed, if it's 1, update the code to remove the monomial [math]\displaystyle{ \mu }[/math] from the input code and continue to next monomial, in reverse order of their degree.

Example

Let's consider the previous example and start from the code. With [math]\displaystyle{ r=2, m=4 }[/math] we can fix at most 1 error in the code. Consider the input code as 1101 1110 0001 0110 (this is the previous code with one error).

We know the degree of the polynomial [math]\displaystyle{ p_x }[/math] is at most [math]\displaystyle{ r=2 }[/math], we start by searching for monomial of degree 2.

  • [math]\displaystyle{ \mu=X_3X_4 }[/math]
    • we start by looking for evaluation points with [math]\displaystyle{ X_1=0, X_2=0, X_3\in\{0,1\}, X_4\in\{0,1\} }[/math]. In the code this is: 1101 1110 0001 0110. The first sum is 1 (odd number of 1).
    • we look for evaluation points with [math]\displaystyle{ X_1=0, X_2=1, X_3\in\{0,1\}, X_4\in\{0,1\} }[/math]. In the code this is: 1101 1110 0001 0110. The second sum is 1.
    • we look for evaluation points with [math]\displaystyle{ X_1=1, X_2=0, X_3\in\{0,1\}, X_4\in\{0,1\} }[/math]. In the code this is: 1101 1110 0001 0110. The third sum is 1.
    • we look for evaluation points with [math]\displaystyle{ X_1=1, X_2=1, X_3\in\{0,1\}, X_4\in\{0,1\} }[/math]. In the code this is: 1101 1110 0001 0110. The third sum is 0 (even number of 1).

The four sums don't agree (so we know there is an error), but the minority report is not larger than the maximum number of error allowed (1), so we take the majority and the coefficient of [math]\displaystyle{ \mu }[/math] is 1.

We remove [math]\displaystyle{ \mu }[/math] from the code before continue : code : 1101 1110 0001 0110, valuation of [math]\displaystyle{ \mu }[/math] is 0001000100010001, the new code is 1100 1111 0000 0111

  • [math]\displaystyle{ \mu=X_2X_4 }[/math]
    • 1100 1111 0000 0111. Sum is 0
    • 1100 1111 0000 0111. Sum is 0
    • 1100 1111 0000 0111. Sum is 1
    • 1100 1111 0000 0111. Sum is 0

One error detected, coefficient is 0, no change to current code.

  • [math]\displaystyle{ \mu=X_1X_4 }[/math]
    • 1100 1111 0000 0111. Sum is 0
    • 1100 1111 0000 0111. Sum is 0
    • 1100 1111 0000 0111. Sum is 1
    • 1100 1111 0000 0111. Sum is 0

One error detected, coefficient is 0, no change to current code.

  • [math]\displaystyle{ \mu=X_2X_3 }[/math]
    • 1100 1111 0000 0111. Sum is 1
    • 1100 1111 0000 0111. Sum is 1
    • 1100 1111 0000 0111. Sum is 1
    • 1100 1111 0000 0111. Sum is 0

One error detected, coefficient is 1, valuation of [math]\displaystyle{ \mu }[/math] is 0000 0011 0000 0011, current code is now 1100 1100 0000 0100.

  • [math]\displaystyle{ \mu=X_1X_3 }[/math]
    • 1100 1100 0000 0100. Sum is 1
    • 1100 1100 0000 0100. Sum is 1
    • 1100 1100 0000 0100. Sum is 1
    • 1100 1100 0000 0100. Sum is 0

One error detected, coefficient is 1, valuation of [math]\displaystyle{ \mu }[/math] is 0000 0000 0011 0011, current code is now 1100 1100 0011 0111.

  • [math]\displaystyle{ \mu=X_1X_2 }[/math]
    • 1100 1100 0011 0111. Sum is 0
    • 1100 1100 0011 0111. Sum is 1
    • 1100 1100 0011 0111. Sum is 0
    • 1100 1100 0011 0111. Sum is 0

One error detected, coefficient is 0, no change to current code. We know now all coefficient of degree 2 for the polynomial, we can start mononials of degree 1. Notice that for each next degree, there are twice as much sums, and each sums is half smaller.

  • [math]\displaystyle{ \mu=X_4 }[/math]
    • 1100 1100 0011 0111. Sum is 0
    • 1100 1100 0011 0111. Sum is 0
    • 1100 1100 0011 0111. Sum is 0
    • 1100 1100 0011 0111. Sum is 0
    • 1100 1100 0011 0111. Sum is 0
    • 1100 1100 0011 0111. Sum is 0
    • 1100 1100 0011 0111. Sum is 1
    • 1100 1100 0011 0111. Sum is 0

One error detected, coefficient is 0, no change to current code.

  • [math]\displaystyle{ \mu=X_3 }[/math]
    • 1100 1100 0011 0111. Sum is 1
    • 1100 1100 0011 0111. Sum is 1
    • 1100 1100 0011 0111. Sum is 1
    • 1100 1100 0011 0111. Sum is 1
    • 1100 1100 0011 0111. Sum is 1
    • 1100 1100 0011 0111. Sum is 1
    • 1100 1100 0011 0111. Sum is 1
    • 1100 1100 0011 0111. Sum is 0

One error detected, coefficient is 1, valuation of [math]\displaystyle{ \mu }[/math] is 0011 0011 0011 0011, current code is now 1111 1111 0000 0100.

Then we'll find 0 for [math]\displaystyle{ \mu=X_2 }[/math], 1 for [math]\displaystyle{ \mu=X_1 }[/math] and the current code become 1111 1111 1111 1011.

For the degree 0, we have 16 sums of only 1 bit. The minority is still of size 1, and we found [math]\displaystyle{ p_x=1+X_1+X_3+X_1X_3+X_2X_3+X_3X_4 }[/math] and the corresponding initial word 1 1010 010101

Generalization to larger alphabets via low-degree polynomials

Using low-degree polynomials over a finite field [math]\displaystyle{ \mathbb F }[/math] of size [math]\displaystyle{ q }[/math], it is possible to extend the definition of Reed–Muller codes to alphabets of size [math]\displaystyle{ q }[/math]. Let [math]\displaystyle{ m }[/math] and [math]\displaystyle{ d }[/math] be positive integers, where [math]\displaystyle{ m }[/math] should be thought of as larger than [math]\displaystyle{ d }[/math]. To encode a message [math]\displaystyle{ x\in\mathbb F^k }[/math] of width [math]\displaystyle{ k=\textstyle\binom{m+d}{m} }[/math], the message is again interpreted as an [math]\displaystyle{ m }[/math]-variate polynomial [math]\displaystyle{ p_x }[/math] of total degree at most [math]\displaystyle{ d }[/math] and with coefficient from [math]\displaystyle{ \mathbb F }[/math]. Such a polynomial indeed has [math]\displaystyle{ \textstyle\binom{m+d}{m} }[/math] coefficients. The Reed–Muller encoding of [math]\displaystyle{ x }[/math] is the list of all evaluations of [math]\displaystyle{ p_x(a) }[/math] over all [math]\displaystyle{ a\in\mathbb F^m }[/math]. Thus the block length is [math]\displaystyle{ n=q^m }[/math].

Description using a generator matrix

A generator matrix for a Reed–Muller code RM(r, m) of length N = 2m can be constructed as follows. Let us write the set of all m-dimensional binary vectors as:

[math]\displaystyle{ X = \mathbb{F}_2^m = \{ x_1, \ldots, x_{N} \}. }[/math]

We define in N-dimensional space [math]\displaystyle{ \mathbb{F}_2^N }[/math] the indicator vectors

[math]\displaystyle{ \mathbb{I}_A \in \mathbb{F}_2^N }[/math]

on subsets [math]\displaystyle{ A \subset X }[/math] by:

[math]\displaystyle{ \left( \mathbb{I}_A \right)_i = \begin{cases} 1 & \mbox{ if } x_i \in A \\ 0 & \mbox{ otherwise} \\ \end{cases} }[/math]

together with, also in [math]\displaystyle{ \mathbb{F}_2^N }[/math], the binary operation

[math]\displaystyle{ w \wedge z = (w_1 \cdot z_1, \ldots , w_N \cdot z_N ), }[/math]

referred to as the wedge product (not to be confused with the wedge product defined in exterior algebra). Here, [math]\displaystyle{ w=(w_1,w_2,\ldots,w_N) }[/math] and [math]\displaystyle{ z=(z_1,z_2,\ldots, z_N) }[/math] are points in [math]\displaystyle{ \mathbb{F}_2^N }[/math] (N-dimensional binary vectors), and the operation [math]\displaystyle{ \cdot }[/math] is the usual multiplication in the field [math]\displaystyle{ \mathbb{F}_2 }[/math].

[math]\displaystyle{ \mathbb{F}_2^m }[/math] is an m-dimensional vector space over the field [math]\displaystyle{ \mathbb{F}_2 }[/math], so it is possible to write

[math]\displaystyle{ (\mathbb{F}_2)^m = \{ (y_m, \ldots , y_1) \mid y_i \in \mathbb{F}_2 \} . }[/math]

We define in N-dimensional space [math]\displaystyle{ \mathbb{F}_2^N }[/math] the following vectors with length [math]\displaystyle{ N: v_0 = (1,1,\ldots,1) }[/math] and

[math]\displaystyle{ v_i = \mathbb{I}_{ H_i } , }[/math]

where 1 ≤ i ≤ m and the Hi are hyperplanes in [math]\displaystyle{ (\mathbb{F}_2)^m }[/math] (with dimension m − 1):

[math]\displaystyle{ H_i = \{ y \in ( \mathbb{F}_2 ) ^m \mid y_i = 0 \} . }[/math]

The generator matrix

The Reed–Muller RM(r, m) code of order r and length N = 2m is the code generated by v0 and the wedge products of up to r of the vi, 1 ≤ im (where by convention a wedge product of fewer than one vector is the identity for the operation). In other words, we can build a generator matrix for the RM(r, m) code, using vectors and their wedge product permutations up to r at a time [math]\displaystyle{ {v_0, v_1, \ldots, v_n, \ldots, (v_{i_1} \wedge v_{i_2}), \ldots (v_{i_1} \wedge v_{i_2} \ldots \wedge v_{i_r})} }[/math], as the rows of the generator matrix, where 1 ≤ ikm.

Example 1

Let m = 3. Then N = 8, and

[math]\displaystyle{ X = \mathbb{F}_2^3 = \{ (0,0,0), (0,0,1), (0,1,0) \ldots, (1,1,1) \}, }[/math]

and

[math]\displaystyle{ \begin{align} v_0 & = (1,1,1,1,1,1,1,1) \\[2pt] v_1 & = (1,0,1,0,1,0,1,0) \\[2pt] v_2 & = (1,1,0,0,1,1,0,0) \\[2pt] v_3 & = (1,1,1,1,0,0,0,0). \end{align} }[/math]

The RM(1,3) code is generated by the set

[math]\displaystyle{ \{ v_0, v_1, v_2, v_3 \},\, }[/math]

or more explicitly by the rows of the matrix:

[math]\displaystyle{ \begin{pmatrix} 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 \\ 1 & 0 & 1 & 0 & 1 & 0 & 1 & 0 \\ 1 & 1 & 0 & 0 & 1 & 1 & 0 & 0 \\ 1 & 1 & 1 & 1 & 0 & 0 & 0 & 0 \end{pmatrix} }[/math]

Example 2

The RM(2,3) code is generated by the set:

[math]\displaystyle{ \{ v_0, v_1, v_2, v_3, v_1 \wedge v_2, v_1 \wedge v_3, v_2 \wedge v_3 \} }[/math]

or more explicitly by the rows of the matrix:

[math]\displaystyle{ \begin{pmatrix} 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 \\ 1 & 0 & 1 & 0 & 1 & 0 & 1 & 0 \\ 1 & 1 & 0 & 0 & 1 & 1 & 0 & 0 \\ 1 & 1 & 1 & 1 & 0 & 0 & 0 & 0 \\ 1 & 0 & 0 & 0 & 1 & 0 & 0 & 0 \\ 1 & 0 & 1 & 0 & 0 & 0 & 0 & 0 \\ 1 & 1 & 0 & 0 & 0 & 0 & 0 & 0 \\ \end{pmatrix} }[/math]

Properties

The following properties hold:

  1. The set of all possible wedge products of up to m of the vi form a basis for [math]\displaystyle{ \mathbb{F}_2^N }[/math].
  2. The RM (r, m) code has rank
    [math]\displaystyle{ \sum_{s=0}^r {m \choose s}. }[/math]
  3. RM (r, m) = RM (r, m − 1) | RM (r − 1, m − 1) where '|' denotes the bar product of two codes.
  4. RM (r, m) has minimum Hamming weight 2mr.

Proof

  1. There are
    [math]\displaystyle{ \sum_{s=0}^m { m \choose s } = 2^m = N }[/math]

    such vectors and [math]\displaystyle{ \mathbb{F}_2^N }[/math] have dimension N so it is sufficient to check that the N vectors span; equivalently it is sufficient to check that [math]\displaystyle{ \mathrm{RM}(m, m) = \mathbb{F}_2^N }[/math].

    Let x be a binary vector of length m, an element of X. Let (x)i denote the ith element of x. Define

    [math]\displaystyle{ y_i = \begin{cases} v_i & \text{ if } (x)_i = 0 \\ v_0+v_i & \text{ if } (x)_i = 1 \\ \end{cases} }[/math]

    where 1 ≤ im.

    Then [math]\displaystyle{ \mathbb{I}_{ \{ x \} } = y_1 \wedge \cdots \wedge y_m }[/math]

    Expansion via the distributivity of the wedge product gives [math]\displaystyle{ \mathbb{I}_{ \{ x \} } \in \mathrm{RM}(m,m) }[/math]. Then since the vectors [math]\displaystyle{ \{ \mathbb{I}_{ \{ x \} } \mid x \in X \} }[/math] span [math]\displaystyle{ \mathbb{F}_2^N }[/math] we have [math]\displaystyle{ \mathrm{RM}(m,n)=\mathbb{F}_2^N }[/math].
  2. By 1, all such wedge products must be linearly independent, so the rank of RM(r, m) must simply be the number of such vectors.
  3. Omitted.
  4. By induction.
    The RM(0, m) code is the repetition code of length N =2m and weight N = 2m−0 = 2mr. By 1 [math]\displaystyle{ \mathrm{RM}(m,n)=\mathbb{F}_2^n }[/math] and has weight 1 = 20 = 2mr.
    The article bar product (coding theory) gives a proof that the weight of the bar product of two codes C1 , C2 is given by
    [math]\displaystyle{ \min \{ 2w(C_1), w(C_2) \} }[/math]
    If 0 < r < m and if
    1. RM(r,m − 1) has weight 2m−1−r
    2. RM(r − 1,m − 1) has weight 2m−1−(r−1) = 2mr
    then the bar product has weight
    [math]\displaystyle{ \min \{ 2 \times 2^{m-1-r}, 2^{m-r} \} = 2^{m-r} . }[/math]

Decoding RM codes

RM(r, m) codes can be decoded using majority logic decoding. The basic idea of majority logic decoding is to build several checksums for each received code word element. Since each of the different checksums must all have the same value (i.e. the value of the message word element weight), we can use a majority logic decoding to decipher the value of the message word element. Once each order of the polynomial is decoded, the received word is modified accordingly by removing the corresponding codewords weighted by the decoded message contributions, up to the present stage. So for a rth order RM code, we have to decode iteratively r+1, times before we arrive at the final received code-word. Also, the values of the message bits are calculated through this scheme; finally we can calculate the codeword by multiplying the message word (just decoded) with the generator matrix.

One clue if the decoding succeeded, is to have an all-zero modified received word, at the end of (r + 1)-stage decoding through the majority logic decoding. This technique was proposed by Irving S. Reed, and is more general when applied to other finite geometry codes.

Description using a recursive construction

A Reed–Muller code RM(r,m) exists for any integers [math]\displaystyle{ m \ge 0 }[/math] and [math]\displaystyle{ 0 \le r \le m }[/math]. RM(m, m) is defined as the universe ([math]\displaystyle{ 2^m,2^m,1 }[/math]) code. RM(−1,m) is defined as the trivial code ([math]\displaystyle{ 2^m,0,\infty }[/math]). The remaining RM codes may be constructed from these elementary codes using the length-doubling construction

[math]\displaystyle{ \mathrm{RM}(r,m) = \{(\mathbf{u},\mathbf{u}+\mathbf{v})\mid\mathbf{u} \in \mathrm{RM}(r,m-1),\mathbf{v} \in \mathrm{RM}(r-1,m-1)\}. }[/math]

From this construction, RM(r,m) is a binary linear block code (n, k, d) with length n = 2m, dimension [math]\displaystyle{ k(r,m)=k(r,m-1)+k(r-1,m-1) }[/math] and minimum distance [math]\displaystyle{ d = 2^{m-r} }[/math] for [math]\displaystyle{ r \ge 0 }[/math]. The dual code to RM(r,m) is RM(m-r-1,m). This shows that repetition and SPC codes are duals, biorthogonal and extended Hamming codes are duals and that codes with k = n/2 are self-dual.

Special cases of Reed–Muller codes

Table of all RM(r,m) codes for m≤5

All RM(rm) codes with [math]\displaystyle{ 0\le m\le 5 }[/math] and alphabet size 2 are displayed here, annotated with the standard [n,k,d] coding theory notation for block codes. The code RM(rm) is a [math]\displaystyle{ \textstyle [2^m,k,2^{m-r}]_2 }[/math]-code, that is, it is a linear code over a binary alphabet, has block length [math]\displaystyle{ \textstyle 2^m }[/math], message length (or dimension) k, and minimum distance [math]\displaystyle{ \textstyle 2^{m-r} }[/math].

0 1 2 3 4 5 m
RM(m,m)
(2m, 2m, 1)
universe codes
RM(5,5)
(32,32,1)
RM(4,4)
(16,16,1)
RM(m − 1, m)
(2m, 2m−1, 2)
SPC codes
RM(3,3)
(8,8,1)
RM(4,5)
(32,31,2)
RM(2,2)
(4,4,1)
RM(3,4)
(16,15,2)
RM(m − 2, m)
(2m, 2mm−1, 4)
extended Hamming codes
RM(1,1)
(2,2,1)
RM(2,3)
(8,7,2)
RM(3,5)
(32,26,4)
RM(0,0)
(1,1,1)
RM(1,2)
(4,3,2)
RM(2,4)
(16,11,4)
RM(0,1)
(2,1,2)
RM(1,3)
(8,4,4)
RM(2,5)
(32,16,8)
RM(r, m=2r+1)
(22r+1, 22r, 2r+1)
self-dual codes
RM(−1,0)
(1,0,[math]\displaystyle{ \infty }[/math])
RM(0,2)
(4,1,4)
RM(1,4)
(16,5,8)
RM(−1,1)
(2,0,[math]\displaystyle{ \infty }[/math])
RM(0,3)
(8,1,8)
RM(1,5)
(32,6,16)
RM(−1,2)
(4,0,[math]\displaystyle{ \infty }[/math])
RM(0,4)
(16,1,16)
RM(1,m)
(2m, m+1, 2m−1)
punctured Hadamard codes
RM(−1,3)
(8,0,[math]\displaystyle{ \infty }[/math])
RM(0,5)
(32,1,32)
RM(−1,4)
(16,0,[math]\displaystyle{ \infty }[/math])
RM(0,m)
(2m, 1, 2m)
repetition codes
RM(−1,5)
(32,0,[math]\displaystyle{ \infty }[/math])
RM(−1,m)
(2m, 0, ∞)
trivial codes

Properties of RM(r,m) codes for r≤1 or r≥m-1

  • RM(0, m) codes are repetition codes of length N = 2m, rate [math]\displaystyle{ {R=\tfrac{1}{N}} }[/math] and minimum distance [math]\displaystyle{ d_\min = N }[/math].
  • RM(1, m) codes are parity check codes of length N = 2m, rate [math]\displaystyle{ R=\tfrac{m+1}{N} }[/math] and minimum distance [math]\displaystyle{ d_\min = \tfrac{N}{2} }[/math].
  • RM(m − 1, m) codes are single parity check codes of length N = 2m, rate [math]\displaystyle{ R=\tfrac{N-1}{N} }[/math] and minimum distance [math]\displaystyle{ d_\min = 2 }[/math].
  • RM(m − 2, m) codes are the family of extended Hamming codes of length N = 2m with minimum distance [math]\displaystyle{ d_\min = 4 }[/math].[7]

References

  1. Massey, James L. (1992), "Deep-space communications and coding: A marriage made in heaven" (in en), Advanced Methods for Satellite and Deep Space Communications, Lecture Notes in Control and Information Sciences, 182, Springer-Verlag, pp. 1–17, doi:10.1007/bfb0036046, ISBN 978-3540558514 pdf
  2. "3GPP RAN1 meeting #87 final report". 3GPP. http://www.3gpp.org/ftp/tsg_ran/WG1_RL1/TSGR1_87/Report/Final_Minutes_report_RAN1%2387_v100.zip. Retrieved 31 August 2017. 
  3. Arikan, Erdal (2009). "Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels - IEEE Journals & Magazine" (in en-US). IEEE Transactions on Information Theory 55 (7): 3051–3073. doi:10.1109/TIT.2009.2021379. 
  4. Muller, David E. (1954). "Application of Boolean algebra to switching circuit design and to error detection" (in en-US). Transactions of the I.R.E. Professional Group on Electronic Computers EC-3 (3): 6–12. doi:10.1109/irepgelc.1954.6499441. ISSN 2168-1740. 
  5. Reed, Irving S. (1954). "A class of multiple-error-correcting codes and the decoding scheme" (in en-US). Transactions of the IRE Professional Group on Information Theory 4 (4): 38–49. doi:10.1109/tit.1954.1057465. ISSN 2168-2690. 
  6. Prahladh Harsha et al., Limits of Approximation Algorithms: PCPs and Unique Games (DIMACS Tutorial Lecture Notes), Section 5.2.1.
  7. Trellis and Turbo Coding, C. Schlegel & L. Perez, Wiley Interscience, 2004, p149.

Further reading

External links