Abstract
An (n, d, k)-mapping f is a mapping from binary vectors of length n to permutations of length n + k such that for all x, y \(\in\) {0,1}n, d H (f(x), f(y)) ≥ d H (x, y) + d, if d H (x, y) ≤ (n + k) − d and d H (f(x), f(y)) = n + k, if d H (x, y) > (n + k) − d. In this paper, we construct an (n,3,2)-mapping for any positive integer n ≥ 6. An (n, r)-permutation array is a permutation array of length n and any two permutations of which have Hamming distance at least r. Let P(n, r) denote the maximum size of an (n, r)-permutation array and A(n, r) denote the same setting for binary codes. Applying (n,3,2)-mappings to the design of permutation array, we can construct an efficient permutation array (easy to encode and decode) with better code rate than previous results [Chang (2005). IEEE Trans inf theory 51:359–365, Chang et al. (2003). IEEE Trans Inf Theory 49:1054–1059; Huang et al. (submitted)]. More precisely, we obtain that, for n ≥ 8, P(n, r) ≥ A(n − 2, r − 3) > A(n − 1,r − 2) = A(n, r − 1) when n is even and P(n, r) ≥ A(n − 2, r − 3) = A(n − 1, r − 2) > A(n, r − 1) when n is odd. This improves the best bound A(n − 1,r − 2) so far [Huang et al. (submitted)] for n ≥ 8.
Similar content being viewed by others
References
JC Chang (2005) ArticleTitleDistance-increasing mappings from binary vectors to permutations IEEE Trans Inf Theory 51 359–363 Occurrence Handle10.1109/TIT.2004.839527
JC Chang RJ Chen T Kløve SC Tsai (2003) ArticleTitleDistance-preserving mappings from binary vectors to permutations IEEE Trans Inf Theory 49 1054–1059 Occurrence Handle1063.94105 Occurrence Handle10.1109/TIT.2003.809507
CJ Colbourn T Kløve ACH Ling (2004) ArticleTitlePermutation arrays for powerline communication and mutually orthogonal latin squares IEEE Trans Inf Theory 50 1289–1291 Occurrence Handle10.1109/TIT.2004.828150
C Ding FW Fu T Kløve VK Wei (2002) ArticleTitleConstruction of permutation arrays IEEE Trans Inf Theory 48 977–980 Occurrence Handle1061.05016 Occurrence Handle10.1109/18.992812
M Deza SA Vanstone (1978) ArticleTitleBounds on permutation arrays J Stat Planning Inference 2 197–209 Occurrence Handle0384.05026 Occurrence Handle498191 Occurrence Handle10.1016/0378-3758(78)90008-3
FW Fu T Kløve (2004) ArticleTitleTwo constructions of permutation arrays IEEE Trans Inf Theory 50 881–883 Occurrence Handle10.1109/TIT.2004.826659
Ferreira HC, Vinck AJH (2000) Inference cancellation with permutation trellis arrays. Proc. IEEE Vehicular Technology Conf., 2401–2407
K Lee (2004) ArticleTitleNew distance-preserving maps of odd length IEEE Trans Inf Theory 50 2539–2543 Occurrence Handle10.1109/TIT.2004.834742
H Tarnanen (1999) ArticleTitleUpper bounds on permutation codes via linear programming Europ J Combin 20 101–114 Occurrence Handle0915.94010 Occurrence Handle1669620 Occurrence Handle10.1006/eujc.1998.0272
AJH Vinck (2000) ArticleTitleCoded modulation for powerline communications AEÜ Int J Elecron Commun 54 45–49
Vinck AJH, Häring J (2000) Coding and modulation for power-line communications. In: Proc. Int. Symp. Power Line Communication, Limerick, Ireland, pp 5–7
Vinck AJH, Häring J, Wadayama T (2000) Coded M-FSK for power-line communications. In: Proc. IEEE Int. Symp. Information Theory, Sorrento, Italy, p 137
T Wadayama AJH Vinck (2001) ArticleTitleA multilevel construction of permutation codes IEICE Trans Fundamentals Electron., Commun Comp Sci 84 2518–2522
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by R.C. Mullin.
The work was supported in part by the National Science Council of Taiwan under contract NSC-93-2213-E-009-117
Rights and permissions
About this article
Cite this article
Huang, YY., Tsai, SC. & Wu, HL. On the Construction of Permutation Arrays via Mappings from Binary Vectors to Permutations. Des Codes Crypt 40, 139–155 (2006). https://doi.org/10.1007/s10623-006-0003-9
Received:
Revised:
Accepted:
Issue Date:
DOI: https://doi.org/10.1007/s10623-006-0003-9