-
Towards Weight Distribution-Aware Polar Codes
Authors:
Mohammad Rowshan,
Vlad-Florin Dragoi
Abstract:
Polar codes are constructed based on the reliability of sub-channels resulting from the polarization effect. However, this information-theoretic construction approach leads to a poor weight distribution. To address this issue, pre-transformed polar codes, such as CRC-polar codes and PAC codes, have been employed. In this paper, we focus on the structure of polar codes without applying any pre-tran…
▽ More
Polar codes are constructed based on the reliability of sub-channels resulting from the polarization effect. However, this information-theoretic construction approach leads to a poor weight distribution. To address this issue, pre-transformed polar codes, such as CRC-polar codes and PAC codes, have been employed. In this paper, we focus on the structure of polar codes without applying any pre-transformations and explore methods, guided by the weight-contribution partial order, to design polar-like codes with enhanced weight distribution, notably without employing any search or optimization algorithms. Numerical results demonstrate improvement over a range of codes both with and without pre-transformation.
△ Less
Submitted 18 June, 2025;
originally announced June 2025.
-
On Weight Enumeration and Structure Characterization of Polar Codes via Group Actions
Authors:
Vlad-Florin Dragoi,
Mohammad Rowshan
Abstract:
In this article, we provide a complete characterization of codewords in polar codes with weights less than twice the minimum distance, using the group action of the lower triangular affine (LTA) group. We derive a closed-form formula for the enumeration of such codewords. Furthermore, we introduce an enhanced partial order based on weight contributions, offering refined tools for code design. Our…
▽ More
In this article, we provide a complete characterization of codewords in polar codes with weights less than twice the minimum distance, using the group action of the lower triangular affine (LTA) group. We derive a closed-form formula for the enumeration of such codewords. Furthermore, we introduce an enhanced partial order based on weight contributions, offering refined tools for code design. Our results extend previous work on Type II codewords to a full description of Type I codewords and offer new insights into the algebraic structure underlying decreasing monomial codes, including polar and Reed-Muller codes.
△ Less
Submitted 29 April, 2025; v1 submitted 28 April, 2025;
originally announced April 2025.
-
Weight Structure of Low/High-Rate Polar Codes and Its Applications
Authors:
Mohammad Rowshan,
Vlad-Florin Drăgoi,
Jinhong Yuan
Abstract:
The structure of a linear block code is pivotal in defining fundamental properties, particularly weight distribution, and code design. In this study, we characterize the Type II structure of polar codewords with weights less than twice the minimum weight $w_{min}$, utilizing the lower triangular affine (LTA) transform. We present a closed-form formula for their enumeration. Leveraging this structu…
▽ More
The structure of a linear block code is pivotal in defining fundamental properties, particularly weight distribution, and code design. In this study, we characterize the Type II structure of polar codewords with weights less than twice the minimum weight $w_{min}$, utilizing the lower triangular affine (LTA) transform. We present a closed-form formula for their enumeration. Leveraging this structure and additionally characterizing the structure of weight $2w_{min}$, we ascertain the complete weight distribution of low-rate and, through the utilization of dual codes properties, high-rate polar codes, subcodes of Reed--Muller (RM) codes, and RMxPolar codes. Furthermore, we introduce a partial order based on the weight distribution and briefly explore its properties and applications in code construction and analysis.
△ Less
Submitted 19 February, 2024;
originally announced February 2024.
-
On the Closed-form Weight Enumeration of Polar Codes: 1.5$d$-weight Codewords
Authors:
Mohammad Rowshan,
Vlad-Florin Drăgoi,
Jinhong Yuan
Abstract:
The weight distribution of error correction codes is a critical determinant of their error-correcting performance, making enumeration of utmost importance. In the case of polar codes, the minimum weight $\wm$ (which is equal to minimum distance $d$) is the only weight for which an explicit enumerator formula is currently available. Having closed-form weight enumerators for polar codewords with wei…
▽ More
The weight distribution of error correction codes is a critical determinant of their error-correcting performance, making enumeration of utmost importance. In the case of polar codes, the minimum weight $\wm$ (which is equal to minimum distance $d$) is the only weight for which an explicit enumerator formula is currently available. Having closed-form weight enumerators for polar codewords with weights greater than the minimum weight not only simplifies the enumeration process but also provides valuable insights towards constructing better polar-like codes. In this paper, we contribute towards understanding the algebraic structure underlying higher weights by analyzing Minkowski sums of orbits. Our approach builds upon the lower triangular affine (LTA) group of decreasing monomial codes. Specifically, we propose a closed-form expression for the enumeration of codewords with weight $1.5\wm$. Our simulations demonstrate the potential for extending this method to higher weights.
△ Less
Submitted 4 May, 2023;
originally announced May 2023.
-
Fast Methods for Ranking Synthetic BECs
Authors:
Hsin-Po Wang,
Vlad-Florin Drăgoi
Abstract:
We gather existing methods that are used to compare and rank the BECs synthesized by a polar code constructor, compare them, and propose new methods that compare synthetic BECs faster.
We gather existing methods that are used to compare and rank the BECs synthesized by a polar code constructor, compare them, and propose new methods that compare synthetic BECs faster.
△ Less
Submitted 23 April, 2023;
originally announced April 2023.
-
Consecutive k-out-of-n:F Systems Have Unbounded Roots
Authors:
Marilena Jianu,
Leonard Daus,
Vlad-Florin Dragoi,
Valeriu Beiu
Abstract:
This article is studying the roots of the reliability polynomials of linear consecutive-\textit{k}-out-of-\textit{n}:\textit{F} systems. We are able to prove that these roots are unbounded in the complex plane, for any fixed $k\ge2$. In the particular case $k=2$, we show that the reliability polynomials have only real roots and highlight the closure of these roots by establishing their explicit fo…
▽ More
This article is studying the roots of the reliability polynomials of linear consecutive-\textit{k}-out-of-\textit{n}:\textit{F} systems. We are able to prove that these roots are unbounded in the complex plane, for any fixed $k\ge2$. In the particular case $k=2$, we show that the reliability polynomials have only real roots and highlight the closure of these roots by establishing their explicit formulas. We also point out that in this case, for any fixed \textit{n} the nonzero roots of the reliability polynomial are distinct numbers.
△ Less
Submitted 9 August, 2022;
originally announced August 2022.
-
Generalized Inverse Based Decoding
Authors:
Ferucio Laurentiu Tiplea,
Vlad-Florin Dragoi
Abstract:
The concept of Generalized Inverse based Decoding (GID) is introduced, as an algebraic framework for the syndrome decoding problem (SDP) and low weight codeword problem (LWP). The framework has ground on two characterizations by generalized inverses (GIs), one for the null space of a matrix and the other for the solution space of a system of linear equations over a finite field. Generic GID solver…
▽ More
The concept of Generalized Inverse based Decoding (GID) is introduced, as an algebraic framework for the syndrome decoding problem (SDP) and low weight codeword problem (LWP). The framework has ground on two characterizations by generalized inverses (GIs), one for the null space of a matrix and the other for the solution space of a system of linear equations over a finite field. Generic GID solvers are proposed for SDP and LWP. It is shown that information set decoding (ISD) algorithms, such as Prange, Lee-Brickell, Leon, and Stern's algorithms, are particular cases of GID solvers. All of them search GIs or elements of the null space under various specific strategies. However, as the paper shows the ISD variants do not search through the entire space, while our solvers do even when they use just one Gaussian elimination. Apart from these, our GID framework clearly shows how each ISD algorithm, except for Prange's solution, can be used as an SDP or LWP solver. A tight reduction from our problems, viewed as optimization problems, to the MIN-SAT problem is also provided. Experimental results show a very good behavior of the GID solvers. The domain of easy weights can be reached by a very few iterations and even enlarged.
△ Less
Submitted 17 February, 2022;
originally announced February 2022.
-
Generalized Convexity Properties and Shape Based Approximation in Networks Reliability
Authors:
Gabriela Cristescu,
Vlad-Florin Dragoi,
Sorin-Horatiu Hoara
Abstract:
Some properties of generalized convexity for sets and for functions are identified in case of the reliability polynomials of two dual minimal networks. A method of approximating the reliability polynomials of two dual minimal network is developed based on their mutual complementarity properties. The approximating objects are from the class of quadratic spline functions, constructed based both on i…
▽ More
Some properties of generalized convexity for sets and for functions are identified in case of the reliability polynomials of two dual minimal networks. A method of approximating the reliability polynomials of two dual minimal network is developed based on their mutual complementarity properties. The approximating objects are from the class of quadratic spline functions, constructed based both on interpolation conditions and on shape knowledge. It is proved that the approximant objects preserve the shape properties of the exact reliability polynomials. Numerical examples and simulations show the performance of the algorithm, both in terms of low complexity, small error and shape preserving. Possibilities of increasing the accuracy of approximation are discussed.
△ Less
Submitted 12 November, 2021;
originally announced November 2021.
-
Bhattacharyya parameter of monomials codes for the Binary Erasure Channel: from pointwise to average reliability
Authors:
Vlad-Florin Dragoi,
Gabriela Cristescu
Abstract:
Monomial codes were recently equipped with partial order relations, fact that allowed researchers to discover structural properties and efficient algorithm for constructing polar codes. Here, we refine the existing order relations in the particular case of Binary Erasure Channel. The new order relation takes us closer to the ultimate order relation induced by the pointwise evaluation of the Bhatta…
▽ More
Monomial codes were recently equipped with partial order relations, fact that allowed researchers to discover structural properties and efficient algorithm for constructing polar codes. Here, we refine the existing order relations in the particular case of Binary Erasure Channel. The new order relation takes us closer to the ultimate order relation induced by the pointwise evaluation of the Bhattacharyya parameter of the synthetic channels. The best we can hope for is still a partial order relation. To overcome this issue we appeal to related technique from network theory. Reliability network theory was recently used in the context of polar coding and more generally in connection with decreasing monomial codes. In this article, we investigate how the concept of average reliability is applied for polar codes designed for the binary erasure channel. Instead of minimizing the error probability of the synthetic channels, for a particular value of the erasure parameter p, our codes minimize the average error probability of the synthetic channels. By means of basic network theory results we determine a closed formula for the average reliability of a particular synthetic channel, that recently gain the attention of researchers.
△ Less
Submitted 19 March, 2021;
originally announced March 2021.
-
On recursively defined combinatorial classes and labelled trees
Authors:
Ali Chouria,
Vlad-Florin Drǎgoi,
Jean-Gabriel Luque
Abstract:
We define and prove isomorphisms between three combinatorial classes involving labeled trees. We also give an alternative proof by means of generating functions.
We define and prove isomorphisms between three combinatorial classes involving labeled trees. We also give an alternative proof by means of generating functions.
△ Less
Submitted 10 April, 2020; v1 submitted 8 April, 2020;
originally announced April 2020.
-
Tight Bounds on the Coeffcients of Consecutive $k$-out-of-$n$:$F$ Systems
Authors:
Vlad-Florin Drăgoi,
Simon R. Cowell,
Valeriu Beiu
Abstract:
In this paper we compute the coefficients of the reliability polynomial of a consecutive-$k$-out-of-$n$:$F$ system, in Bernstein basis, using the generalized Pascal coefficients. Based on well-known combinatorial properties of the generalized Pascal triangle we determine simple closed formulae for the reliability polynomial of a consecutive system for particular ranges of $k$. Moreover, for the re…
▽ More
In this paper we compute the coefficients of the reliability polynomial of a consecutive-$k$-out-of-$n$:$F$ system, in Bernstein basis, using the generalized Pascal coefficients. Based on well-known combinatorial properties of the generalized Pascal triangle we determine simple closed formulae for the reliability polynomial of a consecutive system for particular ranges of $k$. Moreover, for the remaining ranges of $k$ (where we were not able to determine simple closed formulae), we establish easy to calculate sharp bounds for the reliability polynomial of a consecutive system.
△ Less
Submitted 27 March, 2020;
originally announced March 2020.
-
Cubic spline approximation of the reliability polynomials of two dual hammock networks
Authors:
Gabriela Cristescu,
Vlad-Florin Drăgoi
Abstract:
The property of preserving the convexity and concavity of the Bernstein polynomial and of the Bézier curves is used to generate a method of approximating the reliability polynomial of a hammock network. The mutual behaviour of the reliability polynomials of two dual hammock networks is used to generate a system of constraints since the initial information is not enough for using a classical approx…
▽ More
The property of preserving the convexity and concavity of the Bernstein polynomial and of the Bézier curves is used to generate a method of approximating the reliability polynomial of a hammock network. The mutual behaviour of the reliability polynomials of two dual hammock networks is used to generate a system of constraints since the initial information is not enough for using a classical approximation scheme. A cubic spline function is constructed to generate approximations of the coefficients of the two reliability polynomials. As consequence, an approximation algorithm is described and tested through simulations on hammocks with known reliability, comparing the results with the results of approximations attempts from literature.
△ Less
Submitted 6 December, 2019;
originally announced December 2019.
-
Fast Reliability Ranking of Matchstick Minimal Networks
Authors:
Vlad-Florin Dragoi,
Valeriu Beiu
Abstract:
In this article, we take a closer look at the reliability of large minimal networks constructed by repeated compositions of the simplest possible networks. For a given number of devices $n=2^m$ we define the set of all the possible compositions of series and parallel networks of two devices. We then define several partial orders over this set and study their properties. As far as we know the ranki…
▽ More
In this article, we take a closer look at the reliability of large minimal networks constructed by repeated compositions of the simplest possible networks. For a given number of devices $n=2^m$ we define the set of all the possible compositions of series and parallel networks of two devices. We then define several partial orders over this set and study their properties. As far as we know the ranking problem has not been addressed before in this context, and this article establishes the first results in this direction. The usual approach when dealing with reliability of two-terminal networks is to determine existence or non-existence of uniformly most reliable networks. The problem of ranking two-terminal networks is thus more complex, but by restricting our study to the set of compositions we manage to determine and demonstrate the existence of a poset.
△ Less
Submitted 4 November, 2019;
originally announced November 2019.
-
Cryptanalysis of a public key encryption scheme based on QC-LDPC and QC-MDPC codes
Authors:
Vlad Dragoi,
Hervé Talé Kalachi
Abstract:
This letter presents a cryptanalysis of the modified McEliece cryptosystem recently proposed by Moufek, Guenda and Gulliver [24]. The system is based on the juxtaposition of quasi-cyclic LDPC and quasi-cyclic MDPC codes. The idea of our attack is to find an alternative permutation matrix together with an equivalent LDPC code which allow the decoding of any cipher-text with a very high probability.…
▽ More
This letter presents a cryptanalysis of the modified McEliece cryptosystem recently proposed by Moufek, Guenda and Gulliver [24]. The system is based on the juxtaposition of quasi-cyclic LDPC and quasi-cyclic MDPC codes. The idea of our attack is to find an alternative permutation matrix together with an equivalent LDPC code which allow the decoding of any cipher-text with a very high probability. We also apply a recent technique to determine weak keys [4] for this scheme. The results show that the probability of weak keys is high enough that this variant can be ruled out as a possible secure encryption scheme.
△ Less
Submitted 6 December, 2017;
originally announced December 2017.
-
Algebraic Properties of Polar Codes From a New Polynomial Formalism
Authors:
Magali Bardet,
Vlad Dragoi,
Ayoub Otmani,
Jean-Pierre Tillich
Abstract:
Polar codes form a very powerful family of codes with a low complexity decoding algorithm that attain many information theoretic limits in error correction and source coding. These codes are closely related to Reed-Muller codes because both can be described with the same algebraic formalism, namely they are generated by evaluations of monomials. However, finding the right set of generating monomia…
▽ More
Polar codes form a very powerful family of codes with a low complexity decoding algorithm that attain many information theoretic limits in error correction and source coding. These codes are closely related to Reed-Muller codes because both can be described with the same algebraic formalism, namely they are generated by evaluations of monomials. However, finding the right set of generating monomials for a polar code which optimises the decoding performances is a hard task and channel dependent. The purpose of this paper is to reveal some universal properties of these monomials. We will namely prove that there is a way to define a nontrivial (partial) order on monomials so that the monomials generating a polar code devised fo a binary-input symmetric channel always form a decreasing set.
This property turns out to have rather deep consequences on the structure of the polar code. Indeed, the permutation group of a decreasing monomial code contains a large group called lower triangular affine group. Furthermore, the codewords of minimum weight correspond exactly to the orbits of the minimum weight codewords that are obtained from (evaluations) of monomials of the generating set. In particular, it gives an efficient way of counting the number of minimum weight codewords of a decreasing monomial code and henceforth of a polar code.
△ Less
Submitted 18 February, 2016; v1 submitted 22 January, 2016;
originally announced January 2016.