Skip to main content
Log in

On the Construction of Permutation Arrays via Mappings from Binary Vectors to Permutations

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

An (n, d, k)-mapping f is a mapping from binary vectors of length n to permutations of length n + k such that for all x, y \(\in\) {0,1}n, d H (f(x), f(y)) ≥  d H (x, y) + d, if d H (x, y) ≤  (n + k) − d and d H (f(x), f(y))  =  n + k, if d H (x, y) > (n + k) − d. In this paper, we construct an (n,3,2)-mapping for any positive integer n ≥  6. An (n, r)-permutation array is a permutation array of length n and any two permutations of which have Hamming distance at least r. Let P(n, r) denote the maximum size of an (n, r)-permutation array and A(n, r) denote the same setting for binary codes. Applying (n,3,2)-mappings to the design of permutation array, we can construct an efficient permutation array (easy to encode and decode) with better code rate than previous results [Chang (2005). IEEE Trans inf theory 51:359–365, Chang et al. (2003). IEEE Trans Inf Theory 49:1054–1059; Huang et al. (submitted)]. More precisely, we obtain that, for n ≥  8, P(n, r) ≥  A(n − 2, r − 3) > A(n − 1,r − 2) = A(n, r − 1) when n is even and P(n, r) ≥  A(n − 2, r − 3) = A(n − 1, r − 2) > A(n, r − 1) when n is odd. This improves the best bound A(n − 1,r − 2) so far [Huang et al. (submitted)] for n ≥  8.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. JC Chang (2005) ArticleTitleDistance-increasing mappings from binary vectors to permutations IEEE Trans Inf Theory 51 359–363 Occurrence Handle10.1109/TIT.2004.839527

    Article  Google Scholar 

  2. JC Chang RJ Chen T Kløve SC Tsai (2003) ArticleTitleDistance-preserving mappings from binary vectors to permutations IEEE Trans Inf Theory 49 1054–1059 Occurrence Handle1063.94105 Occurrence Handle10.1109/TIT.2003.809507

    Article  MATH  Google Scholar 

  3. CJ Colbourn T Kløve ACH Ling (2004) ArticleTitlePermutation arrays for powerline communication and mutually orthogonal latin squares IEEE Trans Inf Theory 50 1289–1291 Occurrence Handle10.1109/TIT.2004.828150

    Article  Google Scholar 

  4. C Ding FW Fu T Kløve VK Wei (2002) ArticleTitleConstruction of permutation arrays IEEE Trans Inf Theory 48 977–980 Occurrence Handle1061.05016 Occurrence Handle10.1109/18.992812

    Article  MATH  Google Scholar 

  5. M Deza SA Vanstone (1978) ArticleTitleBounds on permutation arrays J Stat Planning Inference 2 197–209 Occurrence Handle0384.05026 Occurrence Handle498191 Occurrence Handle10.1016/0378-3758(78)90008-3

    Article  MATH  MathSciNet  Google Scholar 

  6. FW Fu T Kløve (2004) ArticleTitleTwo constructions of permutation arrays IEEE Trans Inf Theory 50 881–883 Occurrence Handle10.1109/TIT.2004.826659

    Article  Google Scholar 

  7. Ferreira HC, Vinck AJH (2000) Inference cancellation with permutation trellis arrays. Proc. IEEE Vehicular Technology Conf., 2401–2407

  8. K Lee (2004) ArticleTitleNew distance-preserving maps of odd length IEEE Trans Inf Theory 50 2539–2543 Occurrence Handle10.1109/TIT.2004.834742

    Article  Google Scholar 

  9. H Tarnanen (1999) ArticleTitleUpper bounds on permutation codes via linear programming Europ J Combin 20 101–114 Occurrence Handle0915.94010 Occurrence Handle1669620 Occurrence Handle10.1006/eujc.1998.0272

    Article  MATH  MathSciNet  Google Scholar 

  10. AJH Vinck (2000) ArticleTitleCoded modulation for powerline communications AEÜ Int J Elecron Commun 54 45–49

    Google Scholar 

  11. Vinck AJH, Häring J (2000) Coding and modulation for power-line communications. In: Proc. Int. Symp. Power Line Communication, Limerick, Ireland, pp 5–7

  12. Vinck AJH, Häring J, Wadayama T (2000) Coded M-FSK for power-line communications. In: Proc. IEEE Int. Symp. Information Theory, Sorrento, Italy, p 137

  13. T Wadayama AJH Vinck (2001) ArticleTitleA multilevel construction of permutation codes IEICE Trans Fundamentals Electron., Commun Comp Sci 84 2518–2522

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shi-Chun Tsai.

Additional information

Communicated by R.C. Mullin.

The work was supported in part by the National Science Council of Taiwan under contract NSC-93-2213-E-009-117

Rights and permissions

Reprints and permissions

About this article

Cite this article

Huang, YY., Tsai, SC. & Wu, HL. On the Construction of Permutation Arrays via Mappings from Binary Vectors to Permutations. Des Codes Crypt 40, 139–155 (2006). https://doi.org/10.1007/s10623-006-0003-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10623-006-0003-9

Keywords

AMS Classification

Navigation