Home Restriction conditions on PL(7, 2) codes (3 ≤ |𝓖i| ≤ 7)
Article Open Access

Restriction conditions on PL(7, 2) codes (3 ≤ |𝓖i| ≤ 7)

  • Catarina N. Cruz EMAIL logo and Ana M. ďAzevedo Breda
Published/Copyright: April 2, 2018

Abstract

The Golomb-Welch conjecture states that there is no perfect r-error correcting Lee code of word length n over ℤ for n ≥ 3 and r ≥ 2. This problem has received great attention due to its importance in applications in several areas beyond mathematics and computer sciences. Many results on this subject have been achieved, however the conjecture is only solved for some particular values of n and r, namely: 3 ≤ n ≤ 5 and r ≥ 2; n = 6 and r = 2. Here we give an important contribution for the case n = 7 and r = 2, establishing cardinality restrictions on codeword sets.

MSC 2010: 05B40; 05E99

1 Introduction

Problems involving space tilings are common in coding theory. In fact, special types of tilings can be regarded as error correcting codes which are essential on correct transmission of information over a noisy channel, see [1, 2].

In this paper we deal with tilings of ℤn by Lee spheres, where n is a positive integer number. The study of these tilings was introduced by Golomb and Welch, see [1, 3], where they related these tilings with error correcting codes considering the center of a Lee sphere as a codeword and the other elements of the sphere as words which are decoded by the central codeword. When a Lee sphere of radius r tiles the n-dimensional space, the set of all centers of the Lee spheres, that is, the set of all codewords, produces a perfect r-error correcting Lee code of word length n, which will be denoted by PL(n, r) code. The interest in Lee codes has been increasing due to their several applications, see, for instance, [4, 5, 6, 7].

The question “for what values of n and r does the n-dimensional Lee sphere of radius r tile a n-dimensional space?” was formulated by Golomb and Welch in [1], where they proved: (i) n-dimensional Lee sphere of radius 1 tiles the n-dimensional space for any positive integer n; (ii) for each r ≥ 1, there exists a tiling of the n-dimensional space by Lee spheres of radius r for n = 1, 2. In other words, there exist PL(n, 1), PL(1, r) and PL(2, r) codes for any positive integer numbers n and r, respectively. These codes have been extensively studied by other authors, see, for instance, Stein and Szabó [8].

According to Golomb and Welch, it seems that there is no PL(n, r) code for other values of n and r, that is:

Conjecture (Golomb-Welch)

There is no PL(n, r) code forn ≥ 3 andr ≥ 2.

There exists an extensive literature on the subject, however the Golomb-Welch conjecture is still far from being solved. Actually, the conjecture is proved for 3 ≤ n ≤ 5 and r ≥ 2, see [9, 10, 11], and for n = 6 and r = 2, see [12]. The difficulty to prove the conjecture has led some authors to consider special types of PL(n, r) codes, such as linear and periodic ones, see [13, 14, 15]. It should be pointed out that Horak and Grosek, in [13], have proved, using a new approach, the nonexistence of linear PL(n, 2) codes for 7 ≤ n ≤ 12.

As stated previously, a Lee sphere of radius 1 tiles the n-dimensional space for any positive integer n. It seems that the most difficult cases of the Golomb-Welch conjecture are those in which r = 2. Following an intuitive and geometric reasoning, it seems that the bigger is the radius of the Lee sphere the more difficult is to tile the space with this sphere.

Here we will give a contribution for the case n = 7 and r = 2 presenting a possible strategy to prove the non-existence of PL(7, 2) codes. We believe that this strategy will allow us, in the future, to get the proof of the non-existence of such codes. Our strategy does not use computational methods and is faithful to the geometric idea of the problem. By contradiction, we consider the existence of a PL(7, 2) code and it is assumed that O = (0,…,0) is a codeword. Since O covers all words W ∈ ℤn which are distant two or less units from it, we focus our attention on the codewords which cover all words which are distant three units from O. Our idea is mostly based in cardinality restrictions on subsets of these codewords, being a natural adaptation of the one given by Horak in [12].

The next sections are organized as follows. In Section 2 some definitions, terminology and notation are given. Section 3 is devoted to the establishment of necessary conditions for the existence of PL(n, 2) codes for any positive integer n ≥ 7. Necessary conditions for the existence of PL(7, 2) codes are given in Section 4.

2 Definitions and notation

In this section we introduce some definitions and notation. The notation follows the one used by Horak [12].

Let (𝓢, μ) be a metric space, where 𝓢 is a nonempty set and μ a metric on 𝓢. Any subset 𝓜 of 𝓢 satisfying |𝓜| ≥ 2 is a code. The elements of 𝓢 are called words and, in particular, the elements of a code 𝓜 are called codewords.

A sphere centered at W ∈ 𝓢 with radius r, denoted by S(W, r), is defined as follows

S(W,r)={VS:μ(V,W)r}.

If W ∈ 𝓜 and VS(W, r), with VW, then we say that the codewordWcovers the wordV.

Definition 2.1

A code 𝓜 is a perfect r-error correcting code if:

  1. S(W, r) ∩ S(V, r) = ∅ for any two distinct codewordsW and V in 𝓜;

  2. W∈𝓜S(W, r) = 𝓢.

In other words, 𝓜 is a perfect r-error correcting code if the spheres of radius r centered at codewords of 𝓜 form a partition of 𝓢. Equivalently, 𝓜 is a perfect r-error correcting code if the spheres of radius r centered at codewords of 𝓜 tile 𝓢.

When a code 𝓜 satisfies the condition i) in Definition 2.1, we say that 𝓜 is a r-error correcting code.

We are interested in dealing with metric spaces (ℤn, μL), where ℤn is the n-fold Cartesian product of the set of the integer numbers, with n a positive integer number, and μL is the Lee metric, that is, for any W, V ∈ ℤn, with W = (w1,…,wn) and V = (v1,…,vn), the Lee distance between W and V, shortly μL(W, V), is given by

μL(W,V)=i=1n|wivi|.

If 𝓜 ⊂ ℤn is a perfect r-error correcting code of (ℤn, μL), then 𝓜 is called a perfectr-error correcting Lee code of word lengthnover ℤ, shortly a PL(n,r) code.

We detach the following necessary and sufficient condition on the Lee distance between two words to avoid superposition of spheres centered at them: Given W, V ∈ ℤn, with WV, and r a positive integer number, S(W, r) ∩ S(V, r) = ∅ if and only ifμL(W, V) ≥ 2r + 1.

Having in mind the Golomb-Welch conjecture, our aim is to give a contribution for the proof of the non-existence of PL(7, 2) codes. Our strategy is based on the assumption that their existence will bring strong cardinality restrictions on the cardinality of same codeword sets that we must identify and control.

Let us assume the existence of a PL(n, 2) code 𝓜 ⊂ ℤn, n ≥ 7, and suppose, without loss of generality, that O ∈ 𝓜, with O = (0,…,0). Thus, all words W ∈ ℤn such that μL(W, O) ≤ 2 are covered by the codeword O. Taking into account Definition 2.1, for each word W ∈ ℤn satisfying μL(W, O) = 3 there exists a unique codeword V ∈ 𝓜 such that μL(W, V) ≤ 2. The conditions for the existence of PL(n, 2) codes derive essentially from the analysis of the codewords which cover all words W ∈ ℤn which are distant three units from O.

Let W ∈ ℤn such that μL(W, O) = 3. Then, W = (w1,…,wn) is of one and only one of the types:

  1. [±3], if there exists i ∈ {1,…,n} so that |wi| = 3 and wj = 0 for all j ∈ {1,…,n} ∖ {i};

  2. [±2, ±1], if |wi| = 2 and |wj| = 1 for some i, j ∈ {1,…,n}, and wk = 0 for all k ∈ {1,…,n} ∖ {i, j};

  3. [±13], if |wi| = |wj| = |wk| = 1 for some i, j, k ∈ {1,…,n}, and wl = 0 for all l ∈ {1,…,n} ∖ {i, j, k}.

Let 𝓣 ⊂ 𝓜 be the set of the codewords which cover all the words W ∈ ℤn satisfying μL(W, O) = 3. Any codeword V ∈ 𝓣 is such that μL(V, O) = 5. In fact, since O and V are codewords in 𝓜, to avoid superposition between them we must impose μL(V, O) ≥ 2 × 2 + 1 = 5. On the other hand, if we suppose μL(V, O) ≥ 6, then for W such that μL(W, O) = 3 we get μL(V, W) ≥ 3.

Following the same idea used in the characterization of the words which are distant three units from O, we conclude that V ∈ 𝓣 is of one and only one of the types: [±5], [±4, ±1], [±3, ±2], [±3, ±12], [±22, ±1], [±2, ±13] and [±15]. We will denote the subsets of 𝓣 containing codewords of each one of these types by, respectively, 𝓐, 𝓑, 𝓒, 𝓓, 𝓔, 𝓕 and 𝓖. Furthermore, we set a = |𝓐|, b = |𝓑|, c = |𝓒|, d = |𝓓|, e = |𝓔|, f = |𝓕| and g = |𝓖|, where |𝓐| denotes the cardinality of the set 𝓐 and so on.

Consider

I={+1,+2,,+n,1,2,,n}

the set of signed coordinates. Let W, V ∈ ℤn, with W = (w1,…,wn) and V = (v1,…,vn). If iw|i| > 0 for i ∈ 𝓘, then i and w|i| have the same sign. If iw|i| > 0 and iv|i| > 0, with i ∈ 𝓘, then the |i|-th coordinates of W and V have the same sign and we say that W and V are sign equivalent in the |i|-th coordinate.

Let 𝓗 ⊂ ℤn. For i1, i2,…,ip ∈ 𝓘, with pn and |i1|, |i2|,…,|ip| pairwise distinct, 𝓗i1i2ip will denote the following set:

{WH:i1w|i1|>0i2w|i2|>0ipw|ip|>0}.

Given a positive integer number k and i ∈ 𝓘, Hi(k) will denote:

{WH:iw|i|>0|w|i||=k}.

These sets are called index subsets of 𝓗. We note that, it makes no sense to consider 𝓗ij for i = j or i = −j, so, in the rest of the document, when we write 𝓗i1i2ip, with 𝓗 ⊂ ℤn and i1, i2,…,ip ∈ 𝓘, we assume |i1|, |i2|,…,|ip| pairwise distinct.

Consider W ∈ 𝓖. Since the codewords of 𝓖 are of type [±15], there are i, j, k, l, m ∈ 𝓘 such that W ∈ 𝓖ijklm, where iw|i|, jw|j|, kw|k|, lw|l|, mw|m| > 0 and |w|i|| = |w|j|| = |w|k|| = |w|l|| = |w|m|| = 1. In this case i, j, k, l and m characterize the index distribution of W ∈ 𝓖. If we consider W ∈ 𝓕, since the codewords of 𝓕 are of type [±2, ±13], there exist i, j, k, l ∈ 𝓘 so that W ∈ 𝓕ijkl, more precisely, WFi(2)Fj(1)Fk(1)Fl(1), where iw|i|, jw|j|, kw|k|, lw|l| > 0, |w|i|| = 2 and |w|j|| = |w|k|| = |w|l|| = 1, being characterized the index value distribution of W.

3 PL(n, 2) codes

In this section some necessary conditions for the existence of PL(n, 2) codes, for n ≥ 7, are given.

Let 𝓜 ⊂ ℤn be a PL(n, 2) code, with n ≥ 7. Suppose that O = (0,…,0) is a codeword of 𝓜. Assume that 𝓣 ⊂ 𝓜 is the set of the codewords which cover all the words W ∈ ℤn satisfying μL(W, O) = 3. We have characterized in the previous section a partition of 𝓣 formed by the sets 𝓐, 𝓑, 𝓒, 𝓓, 𝓔, 𝓕 and 𝓖, composed, respectively, by codewords of types [±5], [±4, ±1], [±3, ±2], [±3, ±12], [±22, ±1], [±2, ±13] and [±15].

We note that, the words of types:

  1. [±3] must be covered by codewords of 𝓐 ∪ 𝓑 ∪ 𝓒 ∪ 𝓓;

  2. [±2, ±1] must be covered by codewords of 𝓑 ∪ 𝓒 ∪ 𝓓 ∪ 𝓔 ∪ 𝓕;

  3. [±13] must be covered by codewords of 𝓓 ∪ 𝓔 ∪ 𝓕 ∪ 𝓖.

Let W ∈ ℤn such that W = (w1, …, wn) and μL(W, O) = 3. Suppose that W is a word of type [±2, ±1]. Thus, there are i, j ∈ 𝓘, with |i| ≠ |j|, such that, iw|i|, jw|j| > 0, |w|i|| = 2 and |w|j|| = 1. In these conditions we must impose, for instance, |Di(3)Dj(1)|1, otherwise, there are V, VDi(3)Dj(1), with VV′, covering the same word W, contradicting the definition of PL(n, 2) code. In fact, supposing VDi(3)Dj(1)Dk(1) and VDi(3)Dj(1)Dl(1), we would have μL(V, W) = |v|i|w|i|| + |v|k|w|k|| = 2 and μL(V′, W) = |v|i|w|i||+|v|l|w|l||=2. Having in view the word W similar conditions can be deduced to another sets of codewords, such as |(Di(3)Dj(1))(Ei(2)Ej)|1.

Taking into account the words of each one of the types [±3], [±2, ±1] and [±13], and considering the sets of codewords that can cover them, we get the following lemmas.

Lemma 3.1

For eachi ∈ 𝓘, |AiBi(4)Ci(3)Di(3)|=1.

Proof

For each i ∈ 𝓘 there exists a word W ∈ ℤn of type [±3], with W = (w1, …, wn), satisfying iw|i| > 0 and |w|i|| = 3. This word W must be covered by a codeword V ∈ 𝓐∪𝓑∪𝓒∪𝓓, in particular, VAiBi(4)Ci(3)Di(3). Thus, we conclude that |AiBi(4)Ci(3)Di(3)|1. If, by contradiction, we assume |AiBi(4)Ci(3)Di(3)|2, then there are two distinct codewords V and V′ in AiBi(4)Ci(3)Di(3) satisfying μL(V, W) ≤ 2 and μL(V′, W) ≤ 2, which contradicts the definition of PL(n, 2) code.  □

Lemma 3.2

For each i, j ∈ 𝓘, with |i| ≠ |j|,

|Bi(4)Bj(1)|+|CiCj|+|Di(3)Dj(1)|+|Ei(2)Ej|+|Fi(2)Fj(1)|=1.

Proof

For each i, j ∈ 𝓘, with |i| ≠ |j|, there exists a word W ∈ ℤn of type [±2, ±1], with W = (w1, …, wn), satisfying iw|i|, jw|j| > 0, |w|i|| = 2 and |w|j|| = 1. This word must be covered by a codeword V ∈ 𝓑∪𝓒∪𝓓∪𝓔∪𝓕, in particular, V(Bi(4)Bj(1))(CiCj)(Di(3)Dj(1))(Ei(2)Ej)(Fi(2)Fj(1)). Consequently, taking into account that 𝓑, 𝓒, 𝓓, 𝓔 and 𝓕 are disjoint sets,

|Bi(4)Bj(1)|+|CiCj|+|Di(3)Dj(1)|+|Ei(2)Ej|+|Fi(2)Fj(1)|1.

If, by contradiction, we suppose

|Bi(4)Bj(1)|+|CiCj|+|Di(3)Dj(1)|+|Ei(2)Ej|+|Fi(2)Fj(1)|2,

then, there are distinct codewords V and V′ satisfying

V,V(Bi(4)Bj(1))(CiCj)(Di(3)Dj(1))(Ei(2)Ej)(Fi(2)Fj(1)).

Consequently, μL(V, W) ≤ 2 and μL(V′, W) ≤ 2, which contradicts the definition of perfect 2-error correcting code.  □

Lemma 3.3

For each i, j, k ∈ 𝓘, with |i|, |j| and |k| pairwise distinct,

|DijkEijkFijkGijk|=1.

Proof

For each i, j, k ∈ 𝓘, with |i|, |j| and |k| pairwise distinct, there is a word W ∈ ℤn of type [±13], with W = (w1, …, wn), such that, iw|i|, jw|j|, kw|k| > 0 and |w|i|| = |w|j|| = |w|k|| = 1. This word must be covered by a codeword V ∈ 𝓓ijk ∪ 𝓔ijk ∪ 𝓕ijk ∪ 𝓖ijk, therefore |𝓓ijk ∪ 𝓔ijk ∪ 𝓕ijk ∪ 𝓖ijk| ≥ 1. If, by contradiction, we suppose that |𝓓ijk ∪ 𝓔ijk ∪ 𝓕ijk ∪ 𝓖ijk| ≥ 2, then there are distinct codewords V, V′ ∈ 𝓓ijk ∪ 𝓔ijk ∪ 𝓕ijk ∪ 𝓖ijk and, consequently, μL(V, W) ≤ 2 and μL(V′, W) ≤ 2, contradicting the definition of PL(n, 2) code.  □

Taking into account the number of words of each one of the types [±3], [±2, ±1] and [±13], and considering the type of codewords which cover them, Horak has deduced in [12] the following proposition involving the parameters a = |𝓐|, b = |𝓑|, c = |𝓒|, d = |𝓓|, e = |𝓔|, f = |𝓕| and g = |𝓖|.

Proposition 3.4

The parametersa, b, c, d, e, f and g satisfy the system of equations

a+b+c+d=2nb+2c+2d+4e+3f=8n2d+e+4f+10g=8n3.

There exist many nonnegative integer solutions for this system of equations. However, we are interested in determining “good” solutions, that is, solutions which do not contradict the definition of perfect 2-error correcting Lee code.

We may relate the cardinality of each set 𝓐, 𝓑, 𝓒, 𝓓, 𝓔, 𝓕 and 𝓖 with the cardinality of their index subsets. Taking into account, for instance, the set 𝓖, since the codewords of 𝓖 are of type [±15], we get

g=15iI|Gi|.

Besides, for i ∈ 𝓘,

|Gi|=14jI{i,i}|Gij|.

Analogous equalities for the other subsets of 𝓣 may be derived.

The analysis of the solutions for the system of equations presented in Proposition 3.4 will be focused essentially in the study of the cardinality of the index subsets of 𝓐, 𝓑, 𝓒, 𝓓, 𝓔, 𝓕 and 𝓖.

Looking at the words of type [±13], Horak proved in [12] the following proposition in which a relation between the cardinality of index subsets of 𝓓, 𝓔, 𝓕 and 𝓖 is given.

Proposition 3.5

For each i, j ∈ 𝓘, |i| ≠ |j|,

|DijEij|+2|Fij|+3|Gij|=2(n2).

4 Conditions for the existence of PL(7, 2) codes

In this section we concentrate our attention on the search of necessary conditions for the existence of PL(7, 2) codes.

Let us suppose that 𝓜 ⊂ ℤ7 is a PL(7, 2) code, with O = (0, …, 0) a codeword of 𝓜. By Proposition 3.4, the parameters a, b, c, d, e, f and g satisfy:

a+b+c+d=14b+2c+2d+4e+3f=168d+e+4f+10g=280.

As we have said before, there are many nonnegative integer solutions for this system of equations, however we are only interested in those which do not contradict the definition of a perfect 2-error correcting Lee code. Since, g = |𝓖| is the variable with highest coefficient in the system and the codewords of 𝓖 are the ones which have more nonzero coordinates, a particular attention to the set 𝓖, more precisely, to the subsets 𝓖i, for i ∈ 𝓘, will be given.

In [16], the following theorem which restricts the variation of |𝓖i|, for any i ∈ 𝓘, was established.

Theorem 4.1

For eachi ∈ 𝓘, 3 ≤ |𝓖i| ≤ 8.

This theorem restricts the variation of g, in fact, since

g=15iI|Gi|,

taking into account that 3 ≤ |𝓖i| ≤ 8 for all i ∈ 𝓘 and that |𝓘| = 14, we conclude that the solutions which do not contradict the definition of PL(7, 2) code must satisfy

9g22.

Our strategy to prove the non-existence of PL(7, 2) codes relies on restricting more and more the variation of |𝓖i|, for any i ∈ 𝓘, more precisely, limiting more and more the variation of g.

In the following subsection we prove that |𝓖i| ≠ 8 for all i ∈ 𝓘.

4.1 Proof of |𝓖i| ≠ 8 for any i ∈ 𝓘

We will prove that |𝓖i| ≠ 8 for any i ∈ 𝓘 by contradiction. Let us suppose that there exists i ∈ 𝓘 such that |𝓖i| = 8. Thus, since

|Gi|=14ωI{i,i}|Giω|,

we get

8=14ωI{i,i}|Giω|.

Consequently,

ωI{i,i}|Giω|=32.(1)

From Proposition 3.5 it follows that |𝓖| ≤ 3 for all ω ∈ 𝓘 ∖ {i, –i}. Particular attention will be given to the elements ω ∈ 𝓘 ∖ {i, –i} such that |𝓖iω| = 3 or |𝓖iω| = 2.

Throughout this subsection 𝓙 and 𝓚 will denote the following sets:

J={jI{i,i}:|Gij|=3}

and

K={kI{i,i}:|Gik|=2}.

We begin by characterizing partially the index distribution of the codewords w1, …, W8 ∈ 𝓖i.

Proposition 4.2

If |𝓖i| = 8, i ∈ 𝓘, then 𝓘 ∖ {i, –i} = 𝓙 ∪ 𝓚, with |𝓙| = 8 and |𝓚| = 4. The partial index distribution of the codewordsw1, …, W8 ∈ 𝓖isatisfies:

Table 1
W1ik1xy
W2ik2xy
w3ik5x
W4ik4xy
W5iksxy
W6ik6x
W7ik7y
W8ik8y

wherex, –x, y, –y ∈ 𝓙 and k1, …, k8 ∈ 𝓚. Consequently, for allW ∈ 𝓖ithere exists a unique elementk ∈ 𝓚 such thatW ∈ 𝓖ik.

Proof

Let i ∈ 𝓘 such that |𝓖i| = 8. In these conditions, (1) is satisfied. By Proposition 3.5, for any ω ∈ 𝓘 ∖ {i, –i} we get |𝓖| ≤ 3. As |𝓘 ∖ {i, –i}| = 12, taking into account (1) we conclude that there are, at least, eight elements ω ∈ 𝓘 ∖ {i, –i} satisfying |𝓖| = 3. We have just concluded that |𝓙| ≥ 8.

Let us consider

L={lI{i,i}:|Gil|2}.

Observing that, 𝓙 ∪ 𝓛 = 𝓘 ∖ {i, –i}, 𝓙 ∩ 𝓛 = ∅, |𝓘 ∖ {i, –i}| = 12 and |𝓙| ≥ 8, then |𝓛| ≤ 4. Thus, there are, at most, four distinct elements j ∈ 𝓙 such that –j ∈ 𝓛. Since |𝓙| ≥ 8, there exist x, y ∈ 𝓙, distinct, such that –x, –y ∈ 𝓙. Then, let us consider x, –x, y, –y ∈ 𝓙.

By definition of 𝓙, |𝓖ix| = |𝓖i,–x| = |𝓖iy| = |𝓖i, –y| = 3. Taking into account Lemma 3.3, the partial index distribution of the codewords w1, …, W8 ∈ 𝓖i must satisfy the conditions presented in the Table 2, in which W1 ∈ 𝓖ixy, W2 ∈ 𝓖i,x,–y and so on.

Table 2

Partial index distribution of the codewords of 𝓖i.

W1ixy
W2ixy
W3ix
W4ixy
W5ixy
W6ix
W7iy
W8iy

Looking at W1 ∈ 𝓖ixy, there are α, β ∈ 𝓘 ∖ {i, –i, x, –x, y, –y} such that W1 ∈ 𝓖ixyαβ. Suppose that α,β ∈ 𝓙, that is, |𝓖| = |𝓖| = 3. Talking into account Lemma 3.3, |𝓖ixα| = |𝓖iyα| = |𝓖ixβ| = |𝓖iyβ| = 1. Besides, 𝓖ixα = 𝓖iyα = 𝓖ixβ = 𝓖iyβ = {W1}. Since |𝓖| = 3, taking into account Table 2 and Lemma 3.3, 𝓖 ∖ {W1} ⊂ {W5, W6, W8} and 𝓖 ∖ {W1} ⊂ {W5, W6, W8}. As |𝓖 ∖ {W1}| = |𝓖 ∖ {W1}| = 2, there exists W ∈ {W5, W6, W8} such that W ∈ 𝓖iαβ, which contradicts Lemma 3.3 since W, W1 ∈ 𝓖iαβ. Therefore, there exists l1 ∈ 𝓛 so that W1 ∈ 𝓖ixyl1. Similarly, there are l2, l4, l5 ∈ 𝓛 such that W2 ∈ 𝓖i,x,–y,l2, W4 ∈ 𝓖i,–x,y,l4 and W5 ∈ 𝓖i,–x,–y,l5.

Let us consider W3 ∈ 𝓖ix. Having in view w1, W2 ∈ 𝓖ix and Lemma 3.3, there are α, β, γ ∈ 𝓘∖{i,–i,x,–x,y,–y} so that W3 ∈ 𝓖ixαβγ. Assume that {α, β, γ} ⊂ 𝓙. Then, |𝓖| = |𝓖| = |!𝓖| = 3. Accordingly, considering Lemma 3.3, we get |𝓖ixα| = |𝓖ixβ| = |𝓖ixγ| = 1 and, as a consequence, 𝓖ixα = 𝓖ixβ = 𝓖ixγ = {W3}. Taking into account Table 2 and Lemma 3.3, we obtain: 𝓖 ∖ {W3\\} ⊂ {W4,…,W8}; 𝓖iβ ∖ {W3} ⊂ {W4,…,W8}; 𝓖 ∖ {W3} ⊂ {W4,…,W8}. Since |𝓖 ∖ {W3}| = |𝓖iβ ∖ {W3}| = |𝓖 ∖ {W3}| = 2 and |{W4,…,W8}| = 5, there exists W ∈ {W4,…,W8} such that W ∈ 𝓖iεθ for ε, θ ∈ {α, β, γ}, which contradicts Lemma 3.3 since W, W3 ∈ 𝓖iεθ. Thus, there exists l3 ∈ 𝓛 such that W3 ∈ 𝓖ixl3. Likewise, there are l6, l7, l8 ∈ 𝓛 such that W6 ∈ 𝓖i,–x,l6, W7 ∈ 𝓖iyl7 and W8 ∈ 𝓖i,–y,l8.

Therefore, for all W ∈ 𝓖i there exists l ∈ 𝓛 such that W ∈ 𝓖il.

By definition of 𝓛, |𝓖il| ≤ 2 for all l ∈ 𝓛. We have concluded before that |𝓛| ≤ 4. Since for any W ∈ 𝓖i there exists l ∈ 𝓛 such that W ∈ 𝓖il and |𝓖i| = 8, we must impose |𝓛| = 4 and |𝓖il| = 2 for any l ∈ 𝓛. That is, 𝓚 = {k ∈ 𝓘 {i, −i} : |𝓖ik| = 2} is such that |𝓚| = 4. Consequently, for each W ∈ 𝓖i there exists a unique element k ∈ 𝓚 such that W ∈ 𝓖ik. Furthermore, |𝓙| = 8, 𝓘 {i, −i} = 𝓙 ∪ 𝓚 and the partial index distribution of the codewords of 𝓖i satisfies the conditions which are given in the statement of this proposition. □

The following result characterizes in more detail the set 𝓚 and, consequently, the set 𝓙.

Proposition 4.3

Ifk ∈ 𝓚, thenk ∈ 𝓚.

Proof

We are assuming |𝓖i| = 8 for i ∈ 𝓘. The partial index distribution of the codewords W 1, …,W8 ∈ 𝓖i satisfies the conditions enunciated in Proposition 4.2. We recall that, from this proposition it follows that 𝓘 \{i, −i} = 𝓙 ∪ 𝓚, with |𝓙| = 8 and |𝓚| = 4. Furthermore, {x, −x, y, −y} ⊂ 𝓙 and {k1, …, k8} = 𝓚.

Let us consider 𝓝 = 𝓙 {x, −x, y, −y} = {α, β, γ, δ}. We note that,

I{i,i}={k1,,k8}{x,x,y,y}{α,β,γ,δ}.

By Proposition 4.2, for each W ∈ 𝓖i there exists a unique element k ∈ 𝓚 such that W ∈ 𝓖ik. On the other hand, since |𝓖ij| = 3 for all j ∈ 𝓙, we have identified all codewords of 𝓖ix, 𝓖i, −x, 𝓖iy and 𝓖i, −y}. Thus, to characterize completely the index distribution of all codewords of 𝓖i we must fill in with elements of 𝓝 the empty entries of the table presented in Proposition 4.2.

Consider W1, W2, W3 ∈ 𝓖ix, see table in Proposition 4.2. Taking into account Lemma 3.3, the index distribution of the codewords of 𝓖ix must satisfy the conditions in Table 3.

Table 3

Partial index distribution of the codewords of 𝓖i.

W1ik1xyα
W2ik2xyβ
W3ik3xγδ
W4ik4xy
W5ik5xy
W6ik6x
W7ik7y
W8ik8y

Let us now consider the codeword W4 ∈ 𝓖i, k4, −x, y. Having in mind Lemma 3.3 we conclude that W4 ∉ 𝓖α, otherwise we would get W1,W4 ∈ 𝓖iyα. Suppose that W4 ∈ 𝓖β. In these conditions, W4, W2 ∈ 𝓖, with W4 ∈ 𝓖i,k4,−x,y,β and W2 ∈ 𝓖i,k2,x,−y,β. Since |𝓖| = 3 (β ∈ 𝓙), there exists W ∈ 𝓖i\{W1, W2, W3, W4} such that W ∈ 𝓖. By Table 3 we verify that W ∈ 𝓖i,β,−x ∪ 𝓖iβy ∪ 𝓖i,β,−y. Consequently, taking into account W2 and W4, |𝓖iβz| ≥ 2 for some z ∈ {−x, y, −y}, contradicting Lemma 3.3.

Therefore, W4 ∈ 𝓖γ ∪ 𝓖δ. By a similar reasoning, we are led to the conclusion that W5 ∈ 𝓖γ ∪ 𝓖δ.

We are assuming W3 ∈ 𝓖ik3xγδ. As k3 ∈ 𝓚, by definition of 𝓚 we get |𝓖ik3| = 2 . Thus, there exists k ∈ {k1, …, k8}\{k3} such that k = k3. We note that, k3k1, k2, otherwise Lemma 3.3 is contradicted. Since W4, W5 ∈ 𝓖γ ∪ 𝓖δ, taking into account Lemma 3.3 we conclude that k3k4, k5. Therefore, k ∈ {k6, k7, k8}. If k3 = k7, then Lemma 3.3 forces W7 ∈ 𝓖ik7yαβ, which is a contradiction, since W1, W7 ∈ 𝓖iyα. Then, k3k7. By a similar reasoning we may conclude that k3k8. Consequently, k3 = k6 and, applying once again Lemma 3.3, we must impose W6 ∈ 𝓖i,k3,−x,α,β.

Note that |𝓖| = |𝓖| = 3. Since W4, W5 ∈ 𝓖γ ∪ 𝓖δ, we must obligate W7, W8 ∈ 𝓖α ∪ 𝓖β. Considering W1 and W2, Lemma 3.3 leads us to conclude that W7 ∈ 𝓖β and W8 ∈ 𝓖α.

Accordingly, the partial index distribution of the codewords of 𝓖i satisfies:

Table 4

Partial index distribution of the codewords of 𝓖i.

W1ik1xyα
W2ik2xyβ
W3ik3xγδ
W4ik4xy
W5ik5xy
W6ik6xαβ
W7ik7yβ
W8ik8yα

Note that, as |𝓖| = |𝓖| = 3, the four empty entries of this table must be filled in with γ and δ. Thus, W4, W5, W7, W8 ∈ 𝓖γ ∪ 𝓖δ.

Consider the elements of 𝓚. By the analysis of the entries of the previous table, to avoid the contradiction of Lemma 3.3, one should have k1 = k5, k2 = k4 and k7 = k8. That is, 𝓚 = {k1, k2, k3, k7} and the codewords of 𝓖i are characterize as it is presented in Table 5.

Table 5

Partial index distribution of the codewords of 𝓖i.

W1ik1xyα
W2ik2xyβ
W3ik3xγδ
W4ik2xy
W5ik1xy
W6ik3xαβ
W7ik7yβ
W8ik7yα

We intend to show that if k ∈ 𝓚, then −k ∈ 𝓚. Let us focus our attention on k3 ∈ 𝓚. We have concluded before that W3, W6 ∈ 𝓖ik3, with W3 ∈ 𝓖ik3xγδ and W6 ∈ 𝓖i,k3,−x,α,β. In these conditions, −k3 ∈ 𝓘 \({i,−i,x, −x,y,−y} ∪ 𝓝). That is, −k3 ∈ 𝓘\({i,−i} ∪ 𝓙). Since 𝓘 = {i, −i} ∪ 𝓙 ∪ 𝓚, then −k3 ∈ 𝓚.

Looking at the codewords W7, W8 ∈ 𝓖ik7, we get W7 ∈ 𝓖γ and W8 ∈ 𝓖δ, or, W7 ∈ 𝓖δ and W8 ∈ 𝓖γ. In both cases −k7 ∈ 𝓘\({i, −i} ∪ 𝓙), accordingly −k7 ∈ 𝓚.

Now, 𝓚 = {k1, k2, k3, k7} and −k3,-k7 ∈ 𝓚. Either k3 ≠−k7 or k3 = −k7.

If k3 ≠ −k7, then −k ∈ 𝓚 for all k ∈ 𝓚.

If k3 = −k7 and k1 = −k2, then −k ∈ 𝓚 for all k ∈ 𝓚.

Assume that k3 = −k7 and k1 ≠ −k2. By this assumption it follows that −k1, −k2 ∈ 𝓝 = {α, β, γ, δ}. Thus, there are ε1, ε2 ∈ 𝓝 so that −k1 = ε1, −k2 = ε2 and the remaining elements of 𝓝, ε3 and ε4, satisfy ε3 = −ε4. As W1 ∈ 𝓖ik1xyα, then −k1 ∈ {β, γ, δ}. On the other hand, since W2 ∈ 𝓖i,k2,x,−y,β, then −k2 ∈ {α,γ,δ}. We note that, as k1k2, then −k1 ≠ −k2.

If −k1 = β and −k2 = α, then γ = −δ, which is a contradiction since W3 ∈ 𝓖ik3xγδ.

If −k1 = β and −k2 = γ, then α = −δ. Analyzing Table 5 and taking into account that W4 ∈ 𝓖γ ∪ 𝓖δ, we conclude that W4 ∈ 𝓖i,k2,−x,y,δ. Consequently, having in mind Lemma 3.3, W5 ∈ 𝓖i,k1,−x,−y,γ, W7 ∈ 𝓖ik7yβγ and W8 ∈ 𝓖i,k7,−y,α,δ, which is not possible since we are supposing α = −δ.

If −k1 = β and −k2 = δ, then α = −γ. Consequently, W8 ∈ 𝓖i,k7,−y,α,δ, W7 ∈ 𝓖ik7yβγ and W4 ∈ 𝓖i,k2,−x,y,δ. We get a contradiction since, by hypothesis, −k2 = δ.

Combining all possibilities for −k1 ∈ {β, γ, δ} and −k2 ∈ {α, γ, δ}, by a similar reasoning we get always a contradiction. Therefore, −k ∈ 𝓚 for all k ∈ 𝓚.  □

From Proposition 4.2 we get 𝓘\{i, −i} = 𝓙 ∪ 𝓚. We have just seen that, if k ∈ 𝓚 then −k ∈ 𝓚. So, if j ∈ 𝓙 then −j ∈ 𝓙.

Until this moment we have focused our attention on the characterization of the codewords of 𝓖i. The two following propositions arise from the analysis of other type of codewords, in particular, codewords of 𝓓 ∪ 𝓔 ∪ 𝓕.

Proposition 4.4

If |𝓖i| = 8, i ∈ 𝓘, then |𝓕i| = 0.

Proof

Let |𝓖i| = 8 for i ∈ 𝓘. Suppose, by contradiction, that |𝓕i| > 0. Let U ∈ 𝓕i. Since the codewords of 𝓕 are of type [±2, ±13], there exist $u1, u2, u3 ∈ 𝓘 {i, −i}, with |u1|, |u2| and |u3| pairwise distinct, such that U ∈ 𝓕iu1u2u3.

By Proposition 4.2, 𝓘\{i, −i} = 𝓙 ∪ 𝓚, therefore u1, u2, u3 ∈ 𝓙 ∪ 𝓚. Recall that |𝓖ij| = 3 for any j ∈ 𝓙. Then, by Proposition 3.5 one has |𝓕ij| = 0 for all j ∈ 𝓙. Consequently, u1, u2, u3 ∈ 𝓚. From Proposition 4.2 it follows that |𝓚| = 4 and, taking into account Proposition 4.3, −k ∈ 𝓚 for all k ∈ 𝓚. Thus, is not possible to have u1, u2, u3 ∈ 𝓚 satisfying |u1|, |u2| and |u3| pairwise distinct, contradicting our assumption.□

Proposition 4.5

For allj ∈ 𝓙, |𝓓ij ∪ 𝓔ij| = 1. For allk ∈ 𝓚, |𝓓ik ∪ 𝓔ik| = 4. Furthermore, ifk ∈ 𝓚, the codewordsU1, U2, U3, U4 ∈ 𝓓ik ∪ 𝓔ikare such thatU1 ∈ 𝓓iku1 ∪ 𝓔iku1, U2 ∈ 𝓓iku2 ∪ 𝓔iku2, U3 ∈ 𝓓iku3 ∪ 𝓔iku3 and U4 ∈ 𝓓iku4 ∪ 𝓔iku4, with u1, u2 ∈ 𝓙, u1u2, andu3, u4 ∈ 𝓚 {k, −k}, withu3 = −u4.

Proof

From Proposition 3.5 we get

|DiωEiω|+2|Fiω|+3|Giω|=10(2)

for all ω ∈ 𝓘\{i, −i}. By Proposition 4.4 we know that |𝓕i| = 0 and, consequently, |𝓕| = 0 for all ω ∈ 𝓘\{i, −i}. As |𝓖ij| = 3 for any j ∈ 𝓙, from (2) we obtain |𝓓ij ∪ 𝓔ij| = 1 for all j ∈ 𝓙. Considering again (2), we conclude that |𝓓ik ∪ 𝓔ik| = 4 for each k ∈ 𝓚, since |𝓖ik| = 2 for all k ∈ 𝓚.

Let k ∈ 𝓚. Then, there exist V1, V2 ∈ 𝓖ik and U1, …, U4 ∈ 𝓓ik ∪ 𝓔ik. We note that, the codewords of 𝓓 are of type [±3,±12] and the codewords of 𝓔 are of type [±22, ±1]. Thus, there are v1, …, v6, u1, …, u4 in 𝓘 {i, −i, k, −k} such that:

Table 6

Index distribution of the codewords of 𝓖ik ∪ 𝓓ik ∪ 𝓔ik.

V1ikv1v2v3
V2ikv4v5v6
U1iku1
U2iku2
U3iku3
U4iku4

It should be pointed out that, by Lemma 3.3, v1, …, v6, u1, …, u4 must be pairwise distinct. Therefore, {v1, …, v6, u1, …, u4} = 𝓘 {i, −i, k, −k}. By Proposition 4.2, 𝓘 {i, −i} = 𝓙 ∪ 𝓚, with |𝓙| = 8 and |𝓚| = 4. Furthermore, from Proposition 4.2, −k ∈ 𝓚. Then, {v1, …, v6, u1, …, u4} = 𝓙 ∪ 𝓚 {k, −k}. Since V1,V2 ∈ 𝓖ik, with k ∈ 𝓚, taking into account Proposition 4.2 we must impose {v1, …, v6} ⊂ 𝓙. Consequently, without loss of generality, u1, u2 ∈ 𝓙 and u3, u4 ∈ 𝓚 {k, −k}. Considering Proposition 4.2 we conclude that u3 = −u4. □

We are now able to establish the main result of this paper.

Theorem 4.6

For anyi ∈ 𝓘, |𝓖i| ≠ 8.

Proof

By contradiction, consider i ∈ 𝓘 such that |𝓖i| = 8.

From Proposition 4.2 we have |𝓚| = 4, so let k be an element of 𝓚. By Proposition 4.5, there exist U1, …, U4 ∈ 𝓓ik ∪ 𝓔ik whose index distribution satisfies the conditions presented in Table 7, where u, −u ∈ 𝓚\{k, −k} and j1, j2 ∈ 𝓙, with j1j2. We note that, in these conditions, 𝓚 = {k, −k, u, −u}.

Table 7

Index distribution of the codewords of 𝓓ik ∪ 𝓔ik.

U1ikU
U2iku
U3ikj1
U4ikj2

Let us denote by 𝓗 the set of words of type [±2, ±1]. Consider the words P1, P2 ∈ 𝓗 such that P1Hi(2)Hj1(1)

and P2Hi(2)Hj2(1) . The index distribution of the codewords of 𝓓ik ∪ 𝓔ik and the index value distribution of the words P1 and P2 are represented in the following table:

Table 8

Index distribution of U1, …, U4 ∈ 𝓓ik ∪ 𝓔ik and index value distribution of P1, P2 ∈ 𝓗i.

ikuuj1j2
U1xxx
U2xxx
U3xxx
U4xxx
P1±2±l
P2±2±l

By definition of perfect 2-error correcting Lee code, for each P ∈ {P1, P2} there exists a unique codeword V ∈ 𝓣 such that μL(P, V) ≤ 2. Taking into account the type of words of 𝓗 as well as the fact of |𝓕i| = 0 (see Proposition 4.4), each word PqHi(2)Hjq, with jq ∈ 𝓘\{i, −i}, is covered by a unique codeword

Vq(Bi(4)Bjq(1))Cijq(Di(3)Djq(1))(Ei(2)Ejq).(3)

Thus, we may consider U3 and U4 as possible codewords to cover P1 and P2, respectively.

Suppose that P1 is covered by U3 and P2 is covered by U4. Then, we must impose

U3(Di(3)Dk(1)Dj1(1))(Ei(2)EkEj1)

and

U4(Di(3)Dk(1)Dj2(1))(Ei(2)EkEj2),

which contradicts Lemma 3.2, since U3,U4(Di(3)Dk(1))(Ei(2)Ek).

Therefore, either P1 is not covered by U3 or P2 is not covered by U4.

Without loss of generality, let us assume that P1 is not covered by U3. Note that, U3 ∈ 𝓓ikj1 ∪ 𝓔ikj1. As j1 ∈ 𝓙, by Proposition 4.5 we get |𝓓ij1 ∪ 𝓔ij1| = 1. Consequently, 𝓓ij1 ∪ 𝓔ij1 = {U3. Since we are assuming that U3 does not cover P1, considering (3), P1 is covered by a codeword V1 satisfying V1(Bi(4)Bj1(1))Cij1.

Next, we will analyze, separately, the hypotheses:

  1. V1Bi(4)Bj1(1);

  2. V1 ∈ 𝓒ij1.

  1. Assume that P1 is covered by V1Bi(4)Bj1(1).

    Assuming that P1 is covered by V1Bi(4)Bj1(1), by Lemma 3.1 we conclude |Bi(4){V1}Ci(3)Di(3)|=0. Consequently, if U ∈ {U1,…,U4 is such that U ∈ 𝓓, then UDi(1). Furthermore, P2 must be covered by

    V2(Ci(2)Cj2(3))(Ei(2)Ej2).

    If V2Ei(2) ∩ 𝓔j2, since j2 ∈ 𝓙 we conclude, by Proposition 4.5, that V2 = U4. Having in mind U1, U2 and U3, see Table 8, if U ∈ {U1, U2, U3} is such that U ∈ 𝓔, then UEi(1), otherwise, U, U4Ei(2) ∩ 𝓔k, contradicting Lemma 3.2. Therefore, since we have concluded before that {U1, U2, U3} ∩ Di(3) = ∅, we get U1, U2, U3Di(1)Ei(1). Taking into account the index distribution of U1 and U2, we must have U1Du(3)orU2Du(3), otherwise we get U1, U2(Di(1)Dk(3))(Ei(1)Ek(2)), contradicting, once again, Lemma 3.2.

    If V2Ci(2)Cj2(3), to avoid the contradiction of Lemma 3.2 we must impose U4Dk(3). Consequently, considering again Lemma 3.2, U1, U2, U3Dk(1)Ek(1). We recall that, we have seen before that {U1, U2, U3} ∩ Di(3)=. Thus, in these conditions, U1Du(3)orU2Du(3), otherwise, U1, U2Ei(2)Ek(1), contradicting again Lemma 3.2.

    Therefore, in both cases, supposing V2Ei(2)Ej2orV2Ci(2)Cj2(3), we conclude that U1Du(3) or U2Du(3).

    Suppose, without loss of generality, that U1Du(3). As u ∈ 𝓚, by Proposition 4.5 there are U5, U6 ∈ 𝓓iu∪𝓔iu satisfying U5 ∈ 𝓓iuj3 ∪ 𝓔iuj3 and U6 ∈ 𝓓iuj4 ∪ 𝓔iuj4, with j3, j4 ∈ 𝓙 distinct. Note that, j1,…,j4 ∈ 𝓙 are pairwise distinct, since by Proposition 4.5 we have |𝓓ij ∪ 𝓔ij| = 1 for all j ∈ 𝓙.

    Let us consider P3Hi(2)Hj3(1)andP4Hi(2)Hj4(1).Table 9 summarizes the conditions that the index distribution, and, in some cases, the index value distribution, of the codewords and words described until now, must satisfy.

    Table 9

    Index conditions on 𝓑i ∪ 𝓓i ∪ 𝓔i and on 4 words of type [±2, ±1].

    ikuuj1j2j3j4
    U1±1±1±3
    U2xxx
    U3xxx
    U4xxx
    P1±2±1
    P2±2±1
    V1±4±1
    U5xxx
    U6xxx
    P3±2±1
    P4±2±1

    Taking into account the words P3 and P4 we may conclude, as we have concluded before for P1 and P2, that either P3 is not covered by U5 or P4 is not covered by U6. In fact, if U5 covers P3 and U6 covers P4, then U5, U6(Di(3)Du(1))(Ei(2)Eu), contradicting Lemma 3.2. Let us assume, without loss of generality, that P3 is not covered by U5. By Proposition 4.5 it follows that |𝓓ij3 ∪ 𝓔ij3| = 1. Consequently, 𝓓ij3 ∪ 𝓔ij3 = {U5}. As a consequence of the assumption V1Bi(4)Bj1(1) we get |Bi(4){V1}Ci(3)Di(3)|=0. Thus, under these conditions and taking into account (3), P3 must be covered by a codeword V3 satisfying V3Ci(2)Cj3(3). Consequently, U5Du(3), otherwise, U5(Di(1)Dj3(3))(Ei(2)Ej3)(EiEj3(2)) and contradicts with the codeword V3Lemma 3.2. However, U1, U5Du(3), contradicting Lemma 3.1.

    Accordingly, P1 can not be covered by the codeword V1Bi(4)Bj1(1).

  2. Assume thatP1is covered byV1 ∈ 𝓒ij1.

    Since V1 ∈ 𝓒, then V1 is a codeword of type [±3, ±2]. According with what is being supposed, V1Ci(3)Cj1(2)orV1Ci(2)Cj1(3). Consider U3 ∈ 𝓓ikj1 ∪ 𝓔ikj1. In order to have Lemma 3.2 fulfilled we must force U3Di(1)Dk(3)Dj1(1). Schematically, we get Table 10.

    Table 10

    Index distribution on 𝓒i ∪ 𝓓i ∪ 𝓔i and on 2 words of type [±2, ±1].

    ikuuj1j2
    U1xxx
    U2xxx
    U3±1±3±1
    U4xxx
    P1±2±1
    P2±2±1
    V1xx

    Taking into account U3, by Lemma 3.2 we must have U1, U2, U4Dk(1)Ek(1). Besides, U1Du(3)orU2Du(3), otherwise, U1, U2(Di(3)Dk(1))(Ei(2)Ek(1)), contradicting Lemma 3.2.

    Let us assume, without loss of generality, that U1Du(3),

    Proceeding as in the previous case, we will consider U5 ∈ 𝓓iuj3 ∪ 𝓔iuj3 and U6 ∈ 𝓓iuj4 ∪ 𝓔iuj4, with j3, j4 ∈ 𝓙 and distinct. We will consider also P3Hi(2)Hj3(1) and P4Hi(2)Hj4(1). Gathering the information obtained so far, one has the index distribution presented in Table 11.

    Table 11

    Index distribution on 𝓒i ∪ 𝓓i ∪ 𝓔i and on 4 words of type [±2, ±1].

    ikuuj1j2j3j4
    U1±1±1±3
    U2xxx
    U3±1±3±1
    U4xxx
    P1±2±1
    P2±2±1
    V1xx
    U5xxx
    U6xxx
    P3±2±1
    P4±2±1

    As seen in the previous case, either U5 does not cover P3 or U6 does not cover P4. Assume, without loss of generality, that P3 is not covered by U5. By Proposition 4.5 we get 𝓓ij3 ∪ 𝓔ij3 = {U5}. Therefore, considering (3), P3 must be covered by a codeword V3(Bi(4)Bj3(1)) ∪ 𝓒ij3. If V3 ∈ 𝓒ij3, then, by Lemma 3.2, we must impose U5Du(3) and, consequently, | Du(3)| ≥ 2, contradicting Lemma 3.1. Accordingly, V3(Bi(4)Bj3(1)).

    Taking into account Lemma 3.1, |Bi(4){V3}Ci(3)Di(3)|=0. Thus, by (3) we may conclude that P4 must be covered by a codeword

    V4(Ci(2)Cj4(3))(Ei(2)Ej4).

    Note that, if V4Ci(2)Cj4(3), then, by Lemma 3.2, U6Du(3) implying | Du(3)| ≥ 2 and contradicting Lemma 3.1. Thus, V4Ei(2)Ej4. By Proposition 4.5, |𝓓ij4 ∪ 𝓔ij4| = 1 leading to 𝓓ij4 ∪ 𝓔ij4 = {U6 and, consequently, V4 = U6. Since U1Di(1)Dk(1)Du(3), taking into account Lemma 3.2, we must force U6Ei(2)Eu(1)Ej4(2). The index distribution, and, in some cases the index value distribution, of the codewords and words which we are dealing with are presented in Table 12.

    Table 12

    Index distribution on 𝓑i ∪ 𝓒i ∪ 𝓓i ∪ 𝓔i and on 4 words of type [±2, ±1].

    ikuuj1j2j3j4
    U1±1±1±3
    U2xxx
    U3±1±3±1
    U4xxx
    P1±2±1
    P2±2±1
    V1xx
    U5xxx
    U6±2±1±2
    P3±2±1
    P4±2±1
    V3±4±1

    Let us now focus our attention on –u ∈ 𝓚. By Proposition 4.5, there are codewords U7, U8 ∈ 𝓓i,–u ∪ 𝓔i,–u, so that, U7 ∈ 𝓓i,–u,j5 ∪ 𝓔i,–u,j5 and U8 ∈ 𝓓i,–u,j6 ∪ 𝓔i,–u,j6, with j5, j6 ∈ 𝓙 distinct. Note that, by Proposition 4.5, |𝓓ij ∪ 𝓔ij| = 1 for all j ∈ 𝓙, and so j1,…,j6 are pairwise distinct. Taking into account the existence of the words P5Hi(2)Hj5(1) and P6Hi(2)Hj6(1), we obtain the index distribution presented schematically in Table 13.

    Table 13

    Index distribution on 𝓑i ∪ 𝓒i ∪ 𝓓i ∪ 𝓔i and on 6 words of type [±2, ±1].

    ikuuj1j2j3j4j5j6
    U1±1±1±1
    U2xxx
    U3±1±1±1
    U4xxx
    P1±2±1
    P2±2±1
    V1xx
    U5xxx
    U6±2±1±2
    P3±2±1
    P4±2±1
    V3±4±1
    U7xxx
    U8xxx
    P5±2±1
    P6±2±1

    By a similar reasoning to the one done with the words P1, P2, P3, P4Hi(2), we conclude that either P5 is not covered by U7 or P6 is not covered by U8. Let us assume, without loss of generality, that U7 does not cover P5. Then, considering (3) we are lead to conclude that P5 must be covered by a codeword

    P5(Bi(4)Bj5(1))(Cij5).

    As V3Bi(4)Bj3(1), by Lemma 3.1, P5Ci(2)Cj5(3). Consequently, taking into account Lemma 3.2, we must force U7Du(3).

    Focus our attention on the codeword U2 ∈ 𝓓i,k,–u ∪ 𝓔i,k,–u. Having in mind the index value distribution of the codewords V3, U3 and U7 and considering Lemma 3.1, we conclude that U2 ∈ 𝓔i. Consequently, either U2 ∈ 𝓔iEk(2) or U2 ∈ 𝓔iEu(2). If U2 ∈ 𝓔iEk(2), then the index value distribution of U2 and U3 contradicts Lemma 3.2. If U2 ∈ 𝓔iEu(2), the index value distribution of U2 and U7 contradicts also Lemma 3.2.

    In both hypotheses, P1 covered by V1Bi(4)Bj1(1) or P1 covered by V1 ∈ 𝓒ij1, we get a contradiction.  □

We have proved in [16] that for each i ∈ 𝓘, 3 ≤ |𝓖i| ≤ 8. From last theorem it follows immediately:

Corollary 4.7

For anyi ∈ 𝓘, 3 ≤ |𝓖i| ≤ 7.

Since g = |𝓖| = 15iI|Gi|, the required solutions for the system of equations presented in Proposition 3.4 must satisfy 9 ≤ g ≤ 19. As we have said before, our strategy to prove the non-existence of PL(7, 2) codes consists in getting a minimum range for the variation of |𝓖i|, with i ∈ 𝓘, and consequently to reduce the number of solutions for the referred system of equations.

We have already started working on the analysis of other values for |𝓖i|, with i ∈ 𝓘, which brings increased difficulties, imposing new strategies and techniques. It seems that our intuition on the new strategy to be applied (from now on) for the proving of the non-existence of PL(7, 2) codes will be successful.

Acknowledgement

This work was partially supported by Portuguese funds through CIDMA (Center for Research and Development in Mathematics and Applications) and FCT (Foundation for Science and Technology) within project UID/MAT/04106/2013.

References

[1] Golomb S.W., Welch L.R., Perfect codes in the Lee metric and the packing of polyominoes, SIAM J. Appl. Math., 1970, 18, 302-317.10.1137/0118025Search in Google Scholar

[2] Lee C.Y., Some properties of nonbinary error-correcting codes, IRE Trans. Inf. Theory, 1958, 4, 72-82.10.1109/TIT.1958.1057446Search in Google Scholar

[3] Golomb S.W., Welch L.R., Algebraic coding and the Lee metric, In: Error Correcting Codes, Wiley, New York, 1968, 175-189.Search in Google Scholar

[4] Barg A., Mazumdar A., Codes in permutations and error correction for rank modulation, IEEE Trans. Inf. Theory, 2010, 56(7), 3158-3165.10.1109/TIT.2010.2048455Search in Google Scholar

[5] Blaum M., Bruck J., Vardy A., Interleaving schemes for multidimensional cluster errors, IEEE Trans. Inf. Theory, 1998, 44, 730-743.10.1109/18.661516Search in Google Scholar

[6] Etzion T., Yaakobi E., Error-correction of multidimensional bursts, IEEE Trans. Inf. Theory, 2009, 55, 961-976.10.1109/TIT.2008.2011520Search in Google Scholar

[7] Roth R.M., Siegel P.H., Lee-metric BCH codes and their application to constrained and partial-response channels, IEEE Trans. Inf. Theory, 1994, 40, 1083-1096.10.1109/18.335966Search in Google Scholar

[8] Stein S., Szabó S., Algebra and Tiling: Homomorphisms in the Service of Geometry, In: Carus Mathematical Monographs, Vol. 25, Mathematical Association of America, 1994.10.5948/UPO9781614440246Search in Google Scholar

[9] Gravier S., Mollard M., Payan CH., On the nonexistence of three-dimensional tiling in the Lee metric, European J. Combinatorics, 1998, 19, 567-572.10.1006/eujc.1998.0211Search in Google Scholar

[10] Horak P., Tilings in Lee metric, European J. Combinatorics, 2009, 30, 480-489.10.1016/j.ejc.2008.04.007Search in Google Scholar

[11] Špacapan S., Non-existence of face-to-face four dimensional tiling in the Lee metric, European J. Combinatorics, 2007, 28, 127-133.10.1016/j.ejc.2005.08.003Search in Google Scholar

[12] Horak P., On perfect Lee codes, Discrete Mathematics, 2009, 309, 5551-5561.10.1016/j.disc.2008.03.019Search in Google Scholar

[13] Horak P., Grosek O., A new approach towards the Golomb-Welch conjecture, European J. Combinatorics, 2014, 38, 12-22.10.1016/j.ejc.2013.10.010Search in Google Scholar

[14] Post K. A., Nonexistence theorem on perfect Lee codes over large alphabets, Inf. Control, 1975, 29, 369-380.10.1016/S0019-9958(75)80005-2Search in Google Scholar

[15] Špacapan S., Optimal Lee-type local structures in Cartesian products of cycles and paths, SIAM J. Discrete Mathematics, 2007, 21, 750-762.10.1137/040621387Search in Google Scholar

[16] Cruz C.N., D’azevedo Breda A. M., Some insights about PL(7, 2) codes, In: ATINER’S Conference Paper Series, No: MAT2013-0476 (7th Annual International Conference on Mathematics, June 2013, Athens, Greece), Athens Institute for Education and Research, 2013.Search in Google Scholar

Received: 2016-08-26
Accepted: 2018-02-09
Published Online: 2018-04-02

© 2018 Cruz and ďAzevedo Breda, published by De Gruyter

This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.

Articles in the same Issue

  1. Regular Articles
  2. Algebraic proofs for shallow water bi–Hamiltonian systems for three cocycle of the semi-direct product of Kac–Moody and Virasoro Lie algebras
  3. On a viscous two-fluid channel flow including evaporation
  4. Generation of pseudo-random numbers with the use of inverse chaotic transformation
  5. Singular Cauchy problem for the general Euler-Poisson-Darboux equation
  6. Ternary and n-ary f-distributive structures
  7. On the fine Simpson moduli spaces of 1-dimensional sheaves supported on plane quartics
  8. Evaluation of integrals with hypergeometric and logarithmic functions
  9. Bounded solutions of self-adjoint second order linear difference equations with periodic coeffients
  10. Oscillation of first order linear differential equations with several non-monotone delays
  11. Existence and regularity of mild solutions in some interpolation spaces for functional partial differential equations with nonlocal initial conditions
  12. The log-concavity of the q-derangement numbers of type B
  13. Generalized state maps and states on pseudo equality algebras
  14. Monotone subsequence via ultrapower
  15. Note on group irregularity strength of disconnected graphs
  16. On the security of the Courtois-Finiasz-Sendrier signature
  17. A further study on ordered regular equivalence relations in ordered semihypergroups
  18. On the structure vector field of a real hypersurface in complex quadric
  19. Rank relations between a {0, 1}-matrix and its complement
  20. Lie n superderivations and generalized Lie n superderivations of superalgebras
  21. Time parallelization scheme with an adaptive time step size for solving stiff initial value problems
  22. Stability problems and numerical integration on the Lie group SO(3) × R3 × R3
  23. On some fixed point results for (s, p, α)-contractive mappings in b-metric-like spaces and applications to integral equations
  24. On algebraic characterization of SSC of the Jahangir’s graph 𝓙n,m
  25. A greedy algorithm for interval greedoids
  26. On nonlinear evolution equation of second order in Banach spaces
  27. A primal-dual approach of weak vector equilibrium problems
  28. On new strong versions of Browder type theorems
  29. A Geršgorin-type eigenvalue localization set with n parameters for stochastic matrices
  30. Restriction conditions on PL(7, 2) codes (3 ≤ |𝓖i| ≤ 7)
  31. Singular integrals with variable kernel and fractional differentiation in homogeneous Morrey-Herz-type Hardy spaces with variable exponents
  32. Introduction to disoriented knot theory
  33. Restricted triangulation on circulant graphs
  34. Boundedness control sets for linear systems on Lie groups
  35. Chen’s inequalities for submanifolds in (κ, μ)-contact space form with a semi-symmetric metric connection
  36. Disjointed sum of products by a novel technique of orthogonalizing ORing
  37. A parametric linearizing approach for quadratically inequality constrained quadratic programs
  38. Generalizations of Steffensen’s inequality via the extension of Montgomery identity
  39. Vector fields satisfying the barycenter property
  40. On the freeness of hypersurface arrangements consisting of hyperplanes and spheres
  41. Biderivations of the higher rank Witt algebra without anti-symmetric condition
  42. Some remarks on spectra of nuclear operators
  43. Recursive interpolating sequences
  44. Involutory biquandles and singular knots and links
  45. Constacyclic codes over 𝔽pm[u1, u2,⋯,uk]/〈 ui2 = ui, uiuj = ujui
  46. Topological entropy for positively weak measure expansive shadowable maps
  47. Oscillation and non-oscillation of half-linear differential equations with coeffcients determined by functions having mean values
  48. On 𝓠-regular semigroups
  49. One kind power mean of the hybrid Gauss sums
  50. A reduced space branch and bound algorithm for a class of sum of ratios problems
  51. Some recurrence formulas for the Hermite polynomials and their squares
  52. A relaxed block splitting preconditioner for complex symmetric indefinite linear systems
  53. On f - prime radical in ordered semigroups
  54. Positive solutions of semipositone singular fractional differential systems with a parameter and integral boundary conditions
  55. Disjoint hypercyclicity equals disjoint supercyclicity for families of Taylor-type operators
  56. A stochastic differential game of low carbon technology sharing in collaborative innovation system of superior enterprises and inferior enterprises under uncertain environment
  57. Dynamic behavior analysis of a prey-predator model with ratio-dependent Monod-Haldane functional response
  58. The points and diameters of quantales
  59. Directed colimits of some flatness properties and purity of epimorphisms in S-posets
  60. Super (a, d)-H-antimagic labeling of subdivided graphs
  61. On the power sum problem of Lucas polynomials and its divisible property
  62. Existence of solutions for a shear thickening fluid-particle system with non-Newtonian potential
  63. On generalized P-reducible Finsler manifolds
  64. On Banach and Kuratowski Theorem, K-Lusin sets and strong sequences
  65. On the boundedness of square function generated by the Bessel differential operator in weighted Lebesque Lp,α spaces
  66. On the different kinds of separability of the space of Borel functions
  67. Curves in the Lorentz-Minkowski plane: elasticae, catenaries and grim-reapers
  68. Functional analysis method for the M/G/1 queueing model with single working vacation
  69. Existence of asymptotically periodic solutions for semilinear evolution equations with nonlocal initial conditions
  70. The existence of solutions to certain type of nonlinear difference-differential equations
  71. Domination in 4-regular Knödel graphs
  72. Stepanov-like pseudo almost periodic functions on time scales and applications to dynamic equations with delay
  73. Algebras of right ample semigroups
  74. Random attractors for stochastic retarded reaction-diffusion equations with multiplicative white noise on unbounded domains
  75. Nontrivial periodic solutions to delay difference equations via Morse theory
  76. A note on the three-way generalization of the Jordan canonical form
  77. On some varieties of ai-semirings satisfying xp+1x
  78. Abstract-valued Orlicz spaces of range-varying type
  79. On the recursive properties of one kind hybrid power mean involving two-term exponential sums and Gauss sums
  80. Arithmetic of generalized Dedekind sums and their modularity
  81. Multipreconditioned GMRES for simulating stochastic automata networks
  82. Regularization and error estimates for an inverse heat problem under the conformable derivative
  83. Transitivity of the εm-relation on (m-idempotent) hyperrings
  84. Learning Bayesian networks based on bi-velocity discrete particle swarm optimization with mutation operator
  85. Simultaneous prediction in the generalized linear model
  86. Two asymptotic expansions for gamma function developed by Windschitl’s formula
  87. State maps on semihoops
  88. 𝓜𝓝-convergence and lim-inf𝓜-convergence in partially ordered sets
  89. Stability and convergence of a local discontinuous Galerkin finite element method for the general Lax equation
  90. New topology in residuated lattices
  91. Optimality and duality in set-valued optimization utilizing limit sets
  92. An improved Schwarz Lemma at the boundary
  93. Initial layer problem of the Boussinesq system for Rayleigh-Bénard convection with infinite Prandtl number limit
  94. Toeplitz matrices whose elements are coefficients of Bazilevič functions
  95. Epi-mild normality
  96. Nonlinear elastic beam problems with the parameter near resonance
  97. Orlicz difference bodies
  98. The Picard group of Brauer-Severi varieties
  99. Galoisian and qualitative approaches to linear Polyanin-Zaitsev vector fields
  100. Weak group inverse
  101. Infinite growth of solutions of second order complex differential equation
  102. Semi-Hurewicz-Type properties in ditopological texture spaces
  103. Chaos and bifurcation in the controlled chaotic system
  104. Translatability and translatable semigroups
  105. Sharp bounds for partition dimension of generalized Möbius ladders
  106. Uniqueness theorems for L-functions in the extended Selberg class
  107. An effective algorithm for globally solving quadratic programs using parametric linearization technique
  108. Bounds of Strong EMT Strength for certain Subdivision of Star and Bistar
  109. On categorical aspects of S -quantales
  110. On the algebraicity of coefficients of half-integral weight mock modular forms
  111. Dunkl analogue of Szász-mirakjan operators of blending type
  112. Majorization, “useful” Csiszár divergence and “useful” Zipf-Mandelbrot law
  113. Global stability of a distributed delayed viral model with general incidence rate
  114. Analyzing a generalized pest-natural enemy model with nonlinear impulsive control
  115. Boundary value problems of a discrete generalized beam equation via variational methods
  116. Common fixed point theorem of six self-mappings in Menger spaces using (CLRST) property
  117. Periodic and subharmonic solutions for a 2nth-order p-Laplacian difference equation containing both advances and retardations
  118. Spectrum of free-form Sudoku graphs
  119. Regularity of fuzzy convergence spaces
  120. The well-posedness of solution to a compressible non-Newtonian fluid with self-gravitational potential
  121. On further refinements for Young inequalities
  122. Pretty good state transfer on 1-sum of star graphs
  123. On a conjecture about generalized Q-recurrence
  124. Univariate approximating schemes and their non-tensor product generalization
  125. Multi-term fractional differential equations with nonlocal boundary conditions
  126. Homoclinic and heteroclinic solutions to a hepatitis C evolution model
  127. Regularity of one-sided multilinear fractional maximal functions
  128. Galois connections between sets of paths and closure operators in simple graphs
  129. KGSA: A Gravitational Search Algorithm for Multimodal Optimization based on K-Means Niching Technique and a Novel Elitism Strategy
  130. θ-type Calderón-Zygmund Operators and Commutators in Variable Exponents Herz space
  131. An integral that counts the zeros of a function
  132. On rough sets induced by fuzzy relations approach in semigroups
  133. Computational uncertainty quantification for random non-autonomous second order linear differential equations via adapted gPC: a comparative case study with random Fröbenius method and Monte Carlo simulation
  134. The fourth order strongly noncanonical operators
  135. Topical Issue on Cyber-security Mathematics
  136. Review of Cryptographic Schemes applied to Remote Electronic Voting systems: remaining challenges and the upcoming post-quantum paradigm
  137. Linearity in decimation-based generators: an improved cryptanalysis on the shrinking generator
  138. On dynamic network security: A random decentering algorithm on graphs
Downloaded on 3.10.2025 from https://www.degruyterbrill.com/document/doi/10.1515/math-2018-0027/html?lang=en&srsltid=AfmBOorH8SSBbE2k_3AKu7K1NtMfL3Yo-JKTrhMYb-9oe7ac0y4RUaXS
Scroll to top button