Coding theory | Error detection and correction

Hadamard code

The Hadamard code is an error-correcting code named after Jacques Hadamard that is used for error detection and correction when transmitting messages over very noisy or unreliable channels. In 1971, the code was used to transmit photos of Mars back to Earth from the NASA space probe Mariner 9. Because of its unique mathematical properties, the Hadamard code is not only used by engineers, but also intensely studied in coding theory, mathematics, and theoretical computer science.The Hadamard code is also known under the names Walsh code, Walsh family, and Walsh–Hadamard code in recognition of the American mathematician Joseph Leonard Walsh. The Hadamard code is an example of a linear code of length over a binary alphabet.Unfortunately, this term is somewhat ambiguous as some references assume a message length while others assume a message length of .In this article, the first case is called the Hadamard code while the second is called the augmented Hadamard code. The Hadamard code is unique in that each non-zero codeword has a Hamming weight of exactly , which implies that the distance of the code is also .In standard coding theory notation for block codes, the Hadamard code is a -code, that is, it is a linear code over a binary alphabet, has block length , message length (or dimension) , and minimum distance .The block length is very large compared to the message length, but on the other hand, errors can be corrected even in extremely noisy conditions. The augmented Hadamard code is a slightly improved version of the Hadamard code; it is a -code and thus has a slightly better rate while maintaining the relative distance of , and is thus preferred in practical applications.In communication theory, this is simply called the Hadamard code and it is the same as the first order Reed–Muller code over the binary alphabet. Normally, Hadamard codes are based on Sylvester's construction of Hadamard matrices, but the term “Hadamard code” is also used to refer to codes constructed from arbitrary Hadamard matrices, which are not necessarily of Sylvester type.In general, such a code is not linear.Such codes were first constructed by Raj Chandra Bose and Sharadchandra Shankar Shrikhande in 1959.If n is the size of the Hadamard matrix, the code has parameters , meaning it is a not-necessarily-linear binary code with 2n codewords of block length n and minimal distance n/2. The construction and decoding scheme described below apply for general n, but the property of linearity and the identification with Reed–Muller codes require that n be a power of 2 and that the Hadamard matrix be equivalent to the matrix constructed by Sylvester's method. The Hadamard code is a locally decodable code, which provides a way to recover parts of the original message with high probability, while only looking at a small fraction of the received word. This gives rise to applications in computational complexity theory and particularly in the design of probabilistically checkable proofs.Since the relative distance of the Hadamard code is 1/2, normally one can only hope to recover from at most a 1/4 fraction of error. Using list decoding, however, it is possible to compute a short list of possible candidate messages as long as fewer than of the bits in the received word have been corrupted. In code-division multiple access (CDMA) communication, the Hadamard code is referred to as Walsh Code, and is used to define individual communication channels. It is usual in the CDMA literature to refer to codewords as “codes”. Each user will use a different codeword, or “code”, to modulate their signal. Because Walsh codewords are mathematically orthogonal, a Walsh-encoded signal appears as random noise to a CDMA capable mobile terminal, unless that terminal uses the same codeword as the one used to encode the incoming signal. (Wikipedia).

Hadamard code
Video thumbnail

The BuShou of HanZi :彳

A brief description of the BuShou of 彳.

From playlist The BuShou of HanZi

Video thumbnail

Lec 20 | MIT 6.451 Principles of Digital Communication II, Spring 2005

The Sum-Product Algorithm View the complete course: http://ocw.mit.edu/6-451S05 License: Creative Commons BY-NC-SA More information at http://ocw.mit.edu/terms More courses at http://ocw.mit.edu

From playlist MIT 6.451 Principles of Digital Communication II

Video thumbnail

Deutsch Jozsa Algorithm - Quantum Computer Programming w/ Qiskit p.3

Exploring our first quantum algorithm, the Deutsch-Jozsa algorithm. Quantum Playlist: Part 1: https://www.youtube.com/watch?v=aPCZcv-5qfA&list=PLQVvvaa0QuDc79w6NcGB0pnoJBgaKdfrW&index=2 Text-based tutorial and sample code: https://pythonprogramming.net/Deutsch-jozsa-hadamard-quantum-comp

From playlist Quantum Computer Programming w/ Qiskit

Video thumbnail

Basic Tensor Arithmetic (The Hadamard Product) — Topic 12 of Machine Learning Foundations

In this video from my Machine Learning Foundations series, I demonstrate basic tensor arithmetic (including the Hadamard product) through hands-on code demos in NumPy, TensorFlow, and PyTorch. There are eight subjects covered comprehensively in the ML Foundations series and this video is

From playlist Linear Algebra for Machine Learning

Video thumbnail

Finding and Solving the Hadamard Population Conjecture

We describe our process for finding and solving the Hadamard Population conjecture. This conjecture is for all v, for all w, fht(v) dot-product fht(w) = n * population(v intersect w), where v and w are binary vectors and n is the length of all vectors. This is a submission to the #SoME2 co

From playlist Summer of Math Exposition 2 videos

Video thumbnail

The BuShou of HanZi :禾

A brief description of the BuShou of 禾.

From playlist The BuShou of HanZi

Video thumbnail

The BuShou of HanZi :囗

A brief description of the BuShou of 囗.

From playlist The BuShou of HanZi

Video thumbnail

Open Source Quantum Computing: Write Your Own Quantum Programs

Quantum computers are not just science fiction anymore, with many companies building increasingly more powerful quantum computers. While, concepts in quantum computing have been around for over 30 years, but it hasn't been generally accessible until recently. Despite this quantum computing

From playlist Quantum Computing

Video thumbnail

Quantum computation (Lecture 03) by Peter Young

ORGANIZERS : Abhishek Dhar and Sanjib Sabhapandit DATE : 27 June 2018 to 13 July 2018 VENUE : Ramanujan Lecture Hall, ICTS Bangalore This advanced level school is the ninth in the series. This is a pedagogical school, aimed at bridging the gap between masters-level courses and topics

From playlist Bangalore School on Statistical Physics - IX (2018)

Video thumbnail

Mathematics in Cryptograhy - Toni Bluher

Women and Mathematics - 2018 More videos on http://video.ias.edu

From playlist Mathematics

Video thumbnail

Anne Broadbent - Information-Theoretic Quantum Cryptography Part 1 of 2 - IPAM at UCLA

Recorded 27 July 2022. Anne Broadbent of the University of Ottawa presents "Information-Theoretic Quantum Cryptography" at IPAM's Graduate Summer School Post-quantum and Quantum Cryptography. Abstract: These lectures are an introduction to the interplay between quantum information and cryp

From playlist 2022 Graduate Summer School on Post-quantum and Quantum Cryptography

Video thumbnail

The quantum computers are coming - talk

Many people may not know it, but we live in a time where the first quantum computers have been created - and they're pretty damn cool. Why? Because while regular bits are limited to only two boring values, QBITs can take near infinite values and operate singularly or in harmony with each o

From playlist Talks

Video thumbnail

Dakshita Khurana - Weakening Assumptions in Quantum Cryptography IV.b Part 2 of 2 - IPAM at UCLA

Recorded 29 July 2022. Dakshita Khurana of the University of Illinois at Urbana-Champaign presents "Weakening Assumptions in Quantum Cryptography IV.b" at IPAM's Graduate Summer School Post-quantum and Quantum Cryptography. Abstract: We will discuss how quantum information can be used to r

From playlist 2022 Graduate Summer School on Post-quantum and Quantum Cryptography

Related pages

Hamming weight | Communication channel | Coding theory | Hamming distance | Vector space | Finite field | Theoretical computer science | James Joseph Sylvester | Sharadchandra Shankar Shrikhande | Parity-check matrix | Linear code | Hamming code | List decoding | Block code | Mathematics | Reed–Muller code | Repetition code | Standard basis | Fast Fourier transform | Raj Chandra Bose | Dual code | Computational complexity theory | Jacques Hadamard | Hadamard matrix | Error detection and correction