• Keine Ergebnisse gefunden

For constant dimension codes that contain a lifted MRD code, Theorem 10 gives an upper bound which is tighter than the Johnson bound of Theorem 7. In [5] two infinite series of constructions have been given where the code sizes exceed the MRD bound of Theorem 10 for q = 2,d= 4, andk= 3. Given the data available from [23] we mention that, besidesd= 4,k= 3, the only other case where the MRD bound was superseded is A2(8,4; 4)≥4801 >4797, see [10]. Next, we show that ford= 4 andk= 3 the MRD bound can be superseded for all field sizes q if v is large enough. For the limit of the achievable ratio we obtain:

Proposition 10. For q≥3 we have lim

v→∞

Aq(v,4;3) q2v−6+hv−3

2 i

q

≥1 +2q13. Proof. For q≥2, [25, Theorem 4] gives

Aq(7,4; 3)≥q8+q5+q4+q2−q ≥q8+q5+q4. With this, we conclude

Aq(v0,4; 3)≥Aq(7,4; 3)·q2v0−14+Aq(v0−6,4; 3)≥q2v0−10· q4+q+ 1 from Corollary 4 choosingm= 7. Applying Proposition 6 withs= 3 gives

Aq(v0+ 3l,4; 3)≥q6lAq(v0,4; 3) +q6l−1

q6−1 ≥q6lAq(v0,4; 3) forv0 ∈ {12,13,14}, so that Aq(v,4; 3)≥q2v−10· q4+q+ 1

for all v≥12.

From Lemma 5 we conclude

v→∞lim

q2v−6+v−3

2

q

q2v−10 =q4+ (1/q; 1/q)2= q3(q4−q3−q2+q+ 1) (q−1)2(q+ 1) . Since

q4+q+ 1

/q3(q4−q3−q2+q+ 1)

(q−1)2(q+ 1) = 1 + 1

q3 − q+ 1

q2(q4−q3−q2+q+ 1), the statement follows for q≥3.

For q = 2 the estimations of the proof of Proposition 10 are too crude in order to obtain a factor larger than one. However, for the binary case better codes with moderate dimensions of the ambient space have been found by computer searches – with the prescription of automorphisms as the main ingredient in order to reduce the computational complexity, see e.g. [31].

Proposition 11. For v≥19 we have A2(v,4;3)

22v−6+hv−3 2

i

2

≥1.3056.

Proof. Applying Proposition 6 withs= 3 and usingA2(4,4; 3)≥0 givesA2(v0+3l,4; 3)≥ A2(v0,4; 3)·26l for all v0 ≥6 and l≥0, so that

A2(v0+ 3l,4; 3) 22(v0+3l)−6+h

(v0+3l)−3 2

i

2

≥ A2(v0,4; 3)

7

3 ·22v0−7 . (9)

Using A2(7,4; 3) ≥ 333 [23], A2(8,4; 3) ≥ 1326 [10], A2(9,4; 3) ≥ 5986 [10], and A2(13,4; 3) = 1597245 [9] we apply Corollary 4 with m= 13 to obtain lower bounds for A2(v0,4; 3) with 19≤v0 ≤21. For these values of v0 the minimum of the right hand side of Inequality (9) is attained atv0 = 20 with value 1.3056442377.

Note that the application of Proposition 6 was used in a rather crude estimation in the proof of Proposition 11. Actually, we do not use the codewords generated by the codewords of cdcC2 in Theorem 18, so that we might have applied [38, Theorem 37]

directly for this part of the proof – similarly for Proposition 10, which then allows to consider just one instead ofs= 3starters. In the latter part of the proof of Proposition 11 the use of Corollary 4 is essential in order to obtain large codes for medium sized dimensions of the ambient space fromA2(13,4; 3) = 1597245 and relatively good lower bounds for small dimensions. This is a relative typical behavior of Corollary 4 and Proposition 6, i.e., the first few applications yield a significant improvement which quickly bottoms out – in a certain sense. As columnbklb of Table 3 suggests, we may slightly improve upon the value stated in Proposition 11 by some fine-tuning effecting the omitted less significant digits.

v bklb mrdb bkub lold lnew ea

6 77 71 77 65 65

7 333 291 381 257 265 301

8 1326 1179 1493 1033 1101 1117

9 5986 4747 6205 4929 4929 4852

10 23870 19051 24698 21313 21313 18924

11 97526 76331 99718 85249 85257 79306

12 385515 305579 398385 383105 383105 309667

13 1597245 1222827 1597245 1532417 1532425 1287958

14 6241665 4892331 6387029 6241665 6241665 4970117

15 24966665 19571371 25562941 24966657 24966665 20560924 16 102223681 78289579 102243962 102223681 102223681 79608330 17 408894729 313166507 409035142 408894721 408894729

18 1635578957 1252682411 1636109361 1635578889 1635578957

19 6542315853 5010762411 6544674621 6542315597 6542315853 5200895489 Table 1: Lower and upper bounds for A2(v,4; 3).

In Tables 1, 2, and 3 we compare the sizes of different constructions with the LMRD and the best known upper bound. Herebklb and bkub stand for best known lower and upper bound respectively. The values of Theorem 10 are given in columnmrdb. Applying Theorem 17 and Theorem 18 to the best known codes give the columns lold andlnew, respectively. The results obtained in [5] are stated in column ea. The achieved ratio between the mentioned constructions and the MRD bound can be found in Table 3. Since differences partially are beyond the given accuracy, we give absolute numbers in Table 1.

Note that the values in columnbklb of Table 3 show that Proposition 11 is also valid forv≥16, while we have a smaller ratio forv <16. The relative advantage over lifted MRD codes is displayed in Table 2.

v bklb mrdb bkub lold lnew ea

6 1.203125 1.109375 1.203125 1.015625 1.015625

7 1.300781 1.136719 1.488281 1.003906 1.035156 1.175781 8 1.294922 1.151367 1.458008 1.008789 1.075195 1.090820 9 1.461426 1.158936 1.514893 1.203369 1.203369 1.184570 10 1.456909 1.162781 1.507446 1.300842 1.300842 1.155029 11 1.488129 1.164719 1.521576 1.300797 1.300919 1.210114 12 1.470623 1.165691 1.519718 1.461430 1.461430 1.181286 13 1.523252 1.166179 1.523252 1.461427 1.461434 1.228292 14 1.488129 1.166423 1.522786 1.488129 1.488129 1.184968 15 1.488129 1.166545 1.52367 1.488129 1.488129 1.225527 16 1.523252 1.166606 1.523554 1.523252 1.523252 1.186257 17 1.523252 1.166636 1.523775 1.523252 1.523252

18 1.523252 1.166651 1.523746 1.523252 1.523252

19 1.523252 1.166659 1.523801 1.523252 1.523252 1.210928

Table 2: Lower and upper bounds for A2(v,4; 3) divided by the size of a corresponding lifted MRD code.

To conclude this section, we remark that an application of Corollary 4 with 2k≤m≤ v−k using a lifted MRD in the cdcC1 cannot generate a code that exceeds the MRD bound of Theorem 10.

Lemma 6. Using the notation of Theorem 18, letk≤min{v1−k, v2−k+d/2}, Cr a linear MRD code,dr=d1/2, andC1 contains a lifted MRD code (in

h

Fvq1

k

i

). Then, the codes constructed in Theorem 18 contain a lifted MRD code (in

h

Fvq1+v2−k+d/2

k

i ).

Proof. Let {τ−1(Ik×k|M) :M ∈R} ⊆C1 be the lifted MRD code in C1. Since R is a (k×(v1−k), d1/2)q MRD code, we have #R = q(v1−k)(k−d1/2+1). The first set of the

construction contains

−1(Ik×k|M |A) :M ∈R, A∈Cr}

in which {(M |A) : M ∈ R, A ∈ Cr} forms a (k×(v1+v2 −2k+d/2), N, dr)q rank metric code of sizeN =q(v1+v2−2k+d/2)(k−dr+1), hence it is a maximum rank metric code.

v bklb mrdb bkub lold lnew ea

6 1.084507 1.0 1.084507 0.915493 0.915493

7 1.144330 1.0 1.309278 0.883162 0.910653 1.034364 8 1.124682 1.0 1.266327 0.876166 0.933842 0.947413 9 1.261007 1.0 1.307141 1.038340 1.038340 1.022119 10 1.252953 1.0 1.296415 1.118734 1.118734 0.993334 11 1.277672 1.0 1.306389 1.116833 1.116938 1.038975 12 1.261589 1.0 1.303705 1.253702 1.253702 1.013378 13 1.306190 1.0 1.306190 1.253176 1.253182 1.053263 14 1.275806 1.0 1.305519 1.275806 1.275806 1.015900 15 1.275673 1.0 1.306140 1.275672 1.275673 1.050561 16 1.305712 1.0 1.305972 1.305712 1.305712 1.016845 17 1.305678 1.0 1.306127 1.305678 1.305678

18 1.305661 1.0 1.306085 1.305661 1.305661

19 1.305653 1.0 1.306124 1.305653 1.305653 1.037945

Table 3: Lower and upper bounds for A2(v,4; 3) divided by the corresponding MRD bound.

7 Conclusion

In this paper we have considered the maximal sizes of constant dimension codes. With respect to constructive lower bounds we have improved the so-called linkage construction, which then yields the best known codes for many parameters, see Footnote 2. With respect to upper bounds there is a rather clear picture. The explicit Corollary 2, which refers back to bounds for partial spreads, is the best known parametric bound in the case ofd6= 2 min{k, v−k}, while Theorem 8 or the linear programming method may possibly yield improvements. Since Theorem 8 implies the Johnson bound and so Corollary 2, it would be worthwhile to study whether it can be strictly sharper than Theorem 7 for d6= 2 min{k, v−k} at all. Compared to Corollary 2, the only two known improvements are given for the specific parameters from Theorem 9 and Proposition 5. In the case of partial spreads we have reported the current state-of-the-art mentioning that further improvements are far from being unlikely.

In general we have shown that the ratio between the best-known lower and upper bound is strictly larger than 0.577576 for all parameters. The bottleneck is formed by the parametersq = 2,d= 4, andk=bv/2c, where no known method can properly improve that factor, see Footnote 2 for the linkage construction. Ford= 4,k= 3 and general

field sizes q we have applied the improved linkage construction in order to show that Aq(v, d;k) is by a factor, depending on q, larger than the MRD bound for sufficiently large dimensions v.

Acknowledgement

The authors would like to thank Harout Aydinian for providing an enlarged proof of Theorem 8, Natalia Silberstein for explaining the restriction 3k≤v in [38, Corollary 39], Heide Gluesing-Luerssen for clarifying the independent origin of the linkage construction, and Alfred Wassermann for discussions about the asymptotic results of Frankl and R¨odl.

References

[1] E. Agrell, A. Vardy, and K. Zeger. Upper bounds for constant-weight codes. IEEE Transactions on Information Theory, 46(7):2373–2395, 2000.

[2] R. Ahlswede and H. Aydinian. On error control codes for random network coding. In Network Coding, Theory, and Applications, 2009. NetCod’09. Workshop on, pages 68–73. IEEE, 2009.

[3] R. Ahlswede, H. K. Aydinian, and L. H. Khachatrian. On perfect codes and related concepts. Designs, Codes and Cryptography, 22(3):221–237, 2001.

[4] R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung. Network information flow.

IEEE Transactions on Information Theory, 46(4):1204–1216, 2000.

[5] J. Ai, T. Honold, and H. Liu. The expurgation-augmentation method for constructing good plane subspace codes. arXiv preprint 1601.01502, 2016.

[6] C. Bachoc, A. Passuello, and F. Vallentin. Bounds for projective codes from semidefinite programming. Advances in Mathematics of Communications, 7(2):127–

145, 2013.

[7] A. Beutelspacher. Partial spreads in finite projective spaces and partial designs.

Mathematische Zeitschrift, 145(3):211–229, 1975.

[8] S. R. Blackburn and T. Etzion. The asymptotic behavior of grassmannian codes.

IEEE Transactions on Information Theory, 58(10):6605–6609, 2012.

[9] M. Braun, T. Etzion, P. R. J. ¨Osterg˚ard, A. Vardy, and A. Wassermann. Existence ofq-analogs of steiner systems. Forum of Mathematics, Pi, 4, 2016.

[10] M. Braun, P. R. J. ¨Osterg˚ard, and A. Wassermann. New lower bounds for binary constant-dimension subspace codes. Experimental Mathematics, 0(0):1–5, 0.

[11] P. Delsarte. An algebraic approach to the association schemes of coding theory. PhD thesis, Philips Research Laboratories, 1973.

[12] P. Delsarte. Hahn polynomials, discrete harmonics, andt-designs. SIAM Journal on Applied Mathematics, 34(1):157–166, 1978.

[13] D. Drake and J. Freeman. Partialt-spreads and group constructible (s, r, µ)-nets.

Journal of Geometry, 13(2):210–216, 1979.

[14] S. El-Zanati, H. Jordon, G. Seelinger, P. Sissokho, and L. Spence. The maximum size of a partial 3-spread in a finite vector space overGF(2). Designs, Codes and Cryptography, 54(2):101–107, 2010.

[15] T. Etzion and N. Silberstein. Error-correcting codes in projective spaces via rank-metric codes and Ferrers diagrams. IEEE Transactions on Information Theory, 55(7):2909–2919, 2009.

[16] T. Etzion and N. Silberstein. Codes and designs related to lifted MRD codes. IEEE Transactions on Information Theory, 59(2):1004–1017, 2013.

[17] T. Etzion and A. Vardy. Error-correcting codes in projective space. IEEE Transac-tions on Information Theory, 57(2):1165–1173, 2011.

[18] P. Frankl and V. R¨odl. Near perfect coverings in graphs and hypergraphs. European Journal of Combinatorics, 6(4):317–326, 1985.

[19] P. Frankl and R. M. Wilson. The Erd˝os-Ko-Rado theorem for vector spaces. Journal of Combinatorial Theory, Series A, 43(2):228–236, 1986.

[20] E. Gabidulin. Theory of codes with maximum rank distance. Problemy Peredachi Informatsii, 21(1):3–16, 1985.

[21] H. Gluesing-Luerssen, K. Morrison, and C. Troha. Cyclic orbit codes and stabilizer subfields. Advances in Mathematics of Communications, 9(2):177–197, 2015.

[22] H. Gluesing-Luerssen and C. Troha. Construction of subspace codes through linkage.

Advances in Mathematics of Communications, 10(3):525–540, 2016.

[23] D. Heinlein, M. Kiermaier, S. Kurz, and A. Wassermann. Tables of subspace codes.

arXiv preprint 1601.02864, 2016.

[24] D. Heinlein and S. Kurz. A new upper bound for subspace codes. arXiv preprint 1703.08712, 2017.

[25] T. Honold and M. Kiermaier. On putativeq-analogues of the Fano plane and related combinatorial structures. InDynamical systems, number theory and applications, pages 141–175. World Sci. Publ., Hackensack, NJ, 2016.

[26] T. Honold, M. Kiermaier, and S. Kurz. Optimal binary subspace codes of length 6, constant dimension 3 and minimum subspace distance 4. InTopics in finite fields, volume 632 ofContemp. Math., pages 157–176. Amer. Math. Soc., Providence, RI, 2015.

[27] T. Honold, M. Kiermaier, and S. Kurz. Partial spreads and vector space partitions.

arXiv preprint 1611.06328, 2016.

[28] S. Johnson. A new upper bound for error-correcting codes. IRE Transactions on Information Theory, 8(3):203–207, 1962.

[29] A. Khaleghi, D. Silva, and F. Kschischang. Subspace codes. In IMA International Conference on Cryptography and Coding, pages 1–21. Springer, 2009.

[30] M. Kiermaier, S. Kurz, and A. Wassermann. The order of the automorphism group of a binaryq-analog of the fano plane is at most two. Designs, Codes and Cryptography, to appear.

[31] A. Kohnert and S. Kurz. Construction of large constant dimension codes with a prescribed minimum distance. InMathematical methods in computer science, volume 5393 ofLecture Notes in Computer Science, pages 31–42. Springer, Berlin, 2008.

[32] R. K¨otter and F. R. Kschischang. Coding for errors and erasures in random network coding. IEEE Transactions on Information Theory, 54(8):3579–3591, 2008.

[33] S. Kurz. Packing vector spaces into vector spaces. The Australasian Journal of Combinatorics, 68(1):122–130, 2017.

[34] S. Kurz. Improved upper bounds for partial spreads. Designs, Codes and Cryptogra-phy, to appear.

[35] F. J. MacWilliams and N. J. A. Sloane. The theory of error-correcting codes. II.

North-Holland Publishing Co., Amsterdam-New York-Oxford, 1977. North-Holland Mathematical Library, Vol. 16.

[36] E. N˘astase and P. Sissokho. The maximum size of a partial spread in a finite projective space. arXiv preprint 1605.04824, 2016.

[37] B. Segre. Teoria di galois, fibrazioni proiettive e geometrie non desarguesiane. Annali di Matematica Pura ed Applicata, 64(1):1–76, 1964.

[38] N. Silberstein and A.-L. Trautmann. Subspace codes based on graph matchings, ferrers diagrams, and pending blocks. IEEE Transactions on Information Theory, 61(7):3937–3953, 2015.

[39] D. Silva, F. Kschischang, and R. K¨otter. A rank-metric approach to error control in random network coding.IEEE Transactions on Information Theory, 54(9):3951–3967, 2008.

[40] D. Silva and F. R. Kschischang. On metrics for error correction in network coding.

IEEE Transactions on Information Theory, 55(12):5479–5490, 2009.

[41] V. D. Tonchev. Codes and designs. Handbook of coding theory, 2:1229–1267, 1998.

[42] H. Wang, C. Xing, and R. Safavi-Naini. Linear authentication codes: bounds and constructions. IEEE Transactions on Information Theory, 49(4):866–872, 2003.

[43] S.-T. Xia and F.-W. Fu. Johnson type bounds on constant dimension codes.Designs, Codes and Cryptography, 50(2):163–172, 2009.