CONTACT:  

Ari Dwi Hartanto,    ari@ugm.ac.id       Department of Mathematics, Universitas Gadjah Mada, Sleman, 

D.I. Yogyakarta 55281, Indonesia  

 

       The article can be accessed here. https://doi.org/10.15642/mantik.2021.7.1.1-8  

Binary Cyclic Pearson Codes  
 

 

Ari Dwi Hartanto1*, Al. Sutjijana2 

1,2Department of Mathematics, Universitas Gadjah Mada, Yogyakarta, Indonesia 

 

 

 

Article history: 

Received Sep 2, 2019 

Revised Feb 4, 2021 

Accepted Mar 3, 2021 

 

 

Kata Kunci:  

Jarak Pearson, Kode 

Pearson, Kode siklis 

 

Abstrak. Fenomena gain atau offset yang tidak terduga pada sistem 

komunikasi dan media penyimpan data modern seperti media 

penyimpanan berjenis optik (CD) dan memori non-volatile (flash) 

merupakan gangguan yang serius. Permasalahan ini dapat ditangani 

dengan mengaplikasikan jarak Pearson pada detektor error pada 

sistem tersebut karena jarak Pearson menawarkan kekebalan terhadap 

gain dan offset yang tidak menentu. Jarak ini hanya dapat digunakan 

pada suatu himpunan codewords tertentu, yaitu himpunan 

Pearson/kode Pearson. Salah satu contoh kode Pearson dapat 

ditemukan di kelas kode T-constrained. Dalam paper ini, diberikan 

kode 2-constrained biner dengan sifat siklis. Konstruksi kode ini 

diadopsi dari konstruksi pada kode siklis, akan tetapi kode yang 

dihasilkan tidak dapat dipandang sebagai kode siklik. 

 

Keywords:  

Pearson distance, 

Pearson code, Cyclic 

code 

 

 

Abstract. The phenomena of unknown gain or offset on 

communication systems and modern storage such as optical data 

storage and non-volatile memory (flash) becomes a serious problem. 

This problem can be handled by Pearson distance applied to the 

detector because it offers immunity to gain and offset mismatch. This 

distance can only be used for a specific set of codewords, called 

Pearson codes. An interesting example of Pearson code can be found 

in the T-constrained code class. In this paper, we present binary 2-

constrained codes with the cyclic property. The construction of this 

code is adopted from cyclic codes, but it cannot be considered as 

cyclic codes 

  

 

How to cite: 

A. D. Hartanto and Al. Sutjijana, โ€œBinary Cyclic Pearson Codesโ€, J. Mat. Mantik, vol. 7, no. 1, 

pp. 1-8, May 2021. 

 

  

Jurnal Matematika MANTIK 

Vol. 7, No. 1, May 2021, pp. 1-8 

 

ISSN: 2527-3159 (print) 2527-3167 (online) 

mailto:ari@ugm.ac.id
https://doi.org/10.15642/mantik.2021.7.1.1-8
http://u.lipi.go.id/1458103791


Jurnal Matematika MANTIK 

Vol. 7, No. 1, May 2021, pp. 1-8 

2 

 

1. Introduction 

Based on [1] and [2], gain and/or offset mismatch often occur on modern storages and 

communication channels. In non-volatile memories, for instance: a flash memory, the data 

is stored in a floating gate. It can leak away from the floating gate and affects a shift of the 

offset. In optical disc media, the signal retrieved by the sensor depends on the dimensions 

of the written features and the quality of the light path. The quality of the light path usually 

occurs because of fingerprints and scratches on the disc surface. These lead to gain and 

offset mismatch of the retrieved signal. Regarding this problem, Weber et.al. [3] presented 

a system code which involves the Person distance. 

Pearson distance is resistant to gain and offset mismatch, so it can be an alternative to 

the Euclidean distance for improving the error performance of noisy channels with 

unknown gain and offset. Unfortunately, Pearson distance cannot be used for arbitrary sets 

of codewords, but it can only be used for a Pearson set/Pearson code, a set of codewords 

with special properties. Weber, Swart, and Immink [3] stated that one of the known Pearson 

code is ๐‘‡(๐‘›, ๐‘ž). This code is a member of the T-constrained code class which consists of 
sequences in which each of T pre-determined reference symbols appears at least once ([1], 

[3], [4]). 

Let ๐ถ โŠ† ๐‘„๐‘›  be a q-ary code of length n, where ๐‘„ = {0,1, โ‹ฏ , ๐‘ž โˆ’ 1} is the code 
alphabet of size ๐‘ž โ‰ฅ 2. The alphabet symbols in codebook C will not be treated as elements 
of ๐‘๐‘ž, but as just integers. The reader should be careful that this situation will be different 

when we discuss linear codes in this paper. 

Weber, Swart, and Immink ([3], [5]) presented two coding procedures, i.e. fixed-to-

fixed (FF) and variable-to-fixed (VF) length coding schemes which are special codes of 

๐‘‡(๐‘›, ๐‘ž). We present another special code of ๐‘‡(๐‘›, ๐‘ž), that is Binary Cyclic Pearson Codes. 
We focus on how to construct the Pearson codes C in which the codewords have cyclic 

property, that is, if (๐‘Ž0, ๐‘Ž1, โ‹ฏ , ๐‘Ž๐‘›โˆ’1) โˆˆ ๐ถ then (๐‘Ž๐‘›โˆ’1, ๐‘Ž0, ๐‘Ž1, โ‹ฏ , ๐‘Ž๐‘›โˆ’2) โˆˆ ๐ถ. Our idea is 
taking the similar way of cyclic code construction (see [6] and [7]) for constructing a cyclic 

Pearson code. Cyclic code is one of the most important classes of linear codes. The cyclic 

codes have a rich algebraic structure and can be efficiently implemented using simple shift 

registers [8]. Although the cyclic codes possess algebraic structure, we do not emphasize 

algebraic structure on the binary cyclic Pearson codes. We only concern on the set of 

codewords that have cyclic property and satisfy the axioms of Pearson code. We investigate 

whether it can be constructed and the simple encoding scheme with a generator matrix can 

be built in a similar way on the simple encoding scheme of cyclic codes. 

The rest of this paper is organized as follows. We start our presentation with a brief 

introduction to Pearson Distance, Pearson codes, and T-constrained codes in Section 2. In 

Section 3, we give a brief exposition of the cyclic codes, and then present binary cyclic 

Pearson codes. Finally, we draw some conclusions in Section 4. 

 

2. Preliminaries 

We first introduce a necessary notation used in this paper. For simplicity, we use the 

shorthand notation ๐›ผ๐’– + ๐›ฝ = (๐›ผ๐‘ข1 + ๐›ฝ, ๐›ผ๐‘ข2 + ๐›ฝ, โ‹ฏ , ๐›ผ๐‘ข๐‘› + ๐›ฝ) as described in [3]. The 
bold letter indicates a vector that can mean either a message word or a codeword. Suppose 

a codeword c is sent, and then a vector ๐’“ = ๐‘Ž(๐’„ + ๐’—) + ๐‘ is received, where ๐‘Ž, ๐‘ โˆˆ ๐‘…, ๐‘Ž >
0, and ๐‘ฃ = (๐‘ฃ1, โ‹ฏ , ๐‘ฃ๐‘›) , ๐‘ฃ๐‘– โˆˆ ๐‘…. The real numbers a and b are called gain and offset, 
respectively, and the entries of vector ๐‘ฃ are noise sample from a zero-mean Gaussian 
distribution. The gain and offset will not affect sent codewords if we use Pearson distance 

detection ([9], [10]). 

The following is the Pearson distance that is a well-known concept in statistics. Let ๐’™ 
be a vector in ๐‘…๐‘›. Define: 



Ari Dwi Hartanto, Al. Sutjijana 

Binary Cyclic Pearson Codes 

3 

๐’™ =
1

๐‘›
โˆ‘ ๐‘ฅ๐‘–

๐‘›

๐‘–=1

, 

and 

๐œŽ๐‘ฅ
2 = โˆ‘(๐‘ฅ๐‘– โˆ’ ๐’™)

2

๐‘›

๐‘–=1

. 

The Pearson correlation coefficient of x and y is defined by 

๐œŒ๐‘ฅ,๐‘ฆ =
โˆ‘ (๐‘ฅ๐‘– โˆ’ ๐’™)

๐‘›
๐‘–=1 (๐‘ฆ๐‘– โˆ’ ๐’š)

๐œŽ๐‘ฅ ๐œŽ๐‘ฆ
. 

Next, the Pearson distance is defined as follow: 

๐›ฟ(๐’™, ๐’š) = 1 โˆ’ ๐œŒ๐‘ฅ,๐‘ฆ . 

To know the bound of ๐›ฟ(๐’™, ๐’š), we first note that โˆ’1 โ‰ค ๐œŒ๐‘ฅ,๐‘ฆ โ‰ค 1. This implies that 0 โ‰ค

๐›ฟ(๐’™, ๐’š) โ‰ค 2. 
By nearest neighbour decoding, a received vector will be decoded to the codeword 

closest to it, with respect to Pearson distance. If we have a received vector r, the minimum 

Pearson distance detector outputs the codeword: 

๐’„๐ŸŽ =๐‘Ž๐‘Ÿ๐‘” ๐‘Ž๐‘Ÿ๐‘” ๐‘š๐‘–๐‘›
๐‘โˆˆ๐‘†

 ๐›ฟ(๐’“, ๐’„), 

where S is the codebook. 

 

We can observe that for all ๐›ผ, ๐›ฝ โˆˆ ๐‘…, ๐›ผ > 0, we have ๐œŒ
๐‘ฅ,๐›ผ๐‘ฆ+๐›ฝ

= ๐œŒ๐‘ฅ,๐‘ฆ . The equation 

implies that ๐›ฟ(๐’™, ๐›ผ๐’š + ๐›ฝ) = ๐›ฟ(๐’™, ๐’š). It means that the Pearson distance is invariant under 
translation and scale. As a result, the minimum Pearson distance detector is immune to gain 

and offset mismatch. However, this arises a weakness. We cannot use the minimum 

Pearson distance detector for arbitrary codebooks because it cannot distinguish between 

vector x and ๐’š = ๐›ผ๐’™ + ๐›ฝ where ๐›ผ, ๐›ฝ โˆˆ ๐‘…, ๐›ผ > 0, (๐›ผ, ๐›ฝ) โ‰  (1,0), or mathematically, it can 
be written as 

๐›ฟ(๐’“, ๐’™) = ๐›ฟ(๐’“, ๐’š) 
if ๐’š = ๐›ผ๐’™ + ๐›ฝ, for all ๐›ผ, ๐›ฝ โˆˆ ๐‘… with ๐›ผ > 0 and (๐›ผ, ๐›ฝ) โ‰  (1,0). Because of this fact, our 

codebook C should has property that if ๐’„ โˆˆ ๐ถ then ๐›ผ๐’„ + ๐›ฝ โˆ‰ ๐ถ for all ๐›ผ, ๐›ฝ โˆˆ ๐‘… with ๐›ผ > 0 
and (๐›ผ, ๐›ฝ) โ‰  (1,0). Moreover, another property that has to be satisfied by codebook C is 
that vectors in the form of ๐’™ = (๐‘Ž, ๐‘Ž, โ‹ฏ , ๐‘Ž) is not allowed in the codebook C since the 
vectors will lead to an undefined Pearson correlation coefficient. 

 

Definition 1. Let C be a nonempty subset of ๐‘„๐‘›. The set C is called Pearson code (or 
Pearson set) if it satisfies the following properties: 

a. If ๐’„ โˆˆ ๐ถ then ๐›ผ๐’„ + ๐›ฝ โˆ‰ ๐ถ for all ๐›ผ, ๐›ฝ โˆˆ ๐‘… with ๐›ผ > 0 and (๐›ผ, ๐›ฝ) โ‰  (1,0).  
b. ๐’™ = (๐‘Ž, ๐‘Ž, โ‹ฏ , ๐‘Ž) โˆ‰ ๐ถ for all ๐‘Ž โˆˆ ๐‘….  

 

To have an example of Pearson codes, we first give a description of T-constrained codes. 

Let ๐‘‡ be an integer with 1 โ‰ค ๐‘‡ < ๐‘ž and reference symbols ๐‘Ž1, โ‹ฏ , ๐‘Ž๐‘‡  be element of ๐‘„.  A 
T-constrained code [1], denoted by ๐‘†๐‘ž,๐‘›(๐‘Ž1, โ‹ฏ , ๐‘Ž๐‘‡ ),  consist of all q-ary codewords of 

length n, (๐‘ฅ1, โ‹ฏ , ๐‘ฅ๐‘› ), such that 
#{๐‘–: ๐‘ฅ๐‘– = ๐‘—} > 0 ๐‘“๐‘œ๐‘Ÿ ๐‘’๐‘Ž๐‘โ„Ž ๐‘— โˆˆ {๐‘Ž1, โ‹ฏ , ๐‘Ž๐‘‡ }. 

Note that not all T-constrained codes are Pearson codes. For ๐‘‡ = 2, we can see that both 2-
constrained code ๐‘†๐‘ž,๐‘›(0,1) and ๐‘†๐‘ž,๐‘›(0, ๐‘ž โˆ’ 1) are Pearson codes, but for ๐‘ž โ‰ฅ 5, ๐‘†๐‘ž,๐‘›(0,2) 

is not a Pearson code since it does not meet the first property of Pearson code. 

We now focus to discuss the specific case, that is the T-constrained code ๐‘†๐‘ž,๐‘›(0,1). 

This code is Pearson codes, and will be denoted by ๐‘‡(๐‘›, ๐‘ž) as in [3]. Weber, Swart, and 
Immink [3] proposed easy coding procedures, i.e., fixed-to-fixed (FF) and variable-to-fixed 

(VF) length coding schemes, denoted by ๐‘‡๐น๐น(๐‘›, ๐‘ž) and ๐‘‡๐‘‰๐น (๐‘›, ๐‘ž), respectively. The simple 



Jurnal Matematika MANTIK 

Vol. 7, No. 1, May 2021, pp. 1-8 

4 

 

FF scheme is to fill the first ๐‘› โˆ’ 2 positions in the codeword c with information symbols 
and to fill the last two symbols for reference purpose, i.e., ๐‘๐‘›โˆ’1 = 0 and ๐‘๐‘› = 1. For VF 
schemes, it can be described as follows. 

a. Take ๐‘› โˆ’ 2 information from the q-ary source, and then set these as (๐‘1, ๐‘2, โ‹ฏ , ๐‘๐‘›โˆ’2). 
b. If there exists ๐‘–, 1 โ‰ค ๐‘– โ‰ค ๐‘› โˆ’ 2, such that ๐‘๐‘– = 0, then choose ๐‘๐‘›โˆ’1 to be a new 

information symbol, otherwise set ๐‘๐‘›โˆ’1 = 0. 
c. If there exists ๐‘–, 1 โ‰ค ๐‘– โ‰ค ๐‘› โˆ’ 1,  such that ๐‘๐‘– = 1, then choose ๐‘๐‘› to be a new 

information symbol, otherwise set ๐‘๐‘› = 1. 
The resulted codewords from both schemes are in ๐‘‡(๐‘›, ๐‘ž) since it contains at least one 
symbol 0 and at least one symbol 1. 

 

3. Cyclic Pearson Codes 

In this section, we intend to construct cyclic Pearson codes by using similar ways as 

construction of cyclic codes. Let F be a finite field of order q, and ๐‘‰๐‘› (๐น) = {(๐‘ฅ1๐‘ฅ2 โ‹ฏ ๐‘ฅ๐‘› ) โˆฃ
๐‘ฅ๐‘– , โ‹ฏ , ๐‘ฅ๐‘› โˆˆ ๐น} be a vector space over F. A nonempty subset C of ๐‘‰๐‘›(๐น) is called cyclic 
code if it is a subspace and every (๐‘Ž1๐‘Ž2 โ‹ฏ ๐‘Ž๐‘›โˆ’1๐‘Ž๐‘›) โˆˆ ๐ถ implies (๐‘Ž๐‘›๐‘Ž1๐‘Ž2 โ‹ฏ ๐‘Ž๐‘›โˆ’1) โˆˆ ๐ถ.  
Cyclic codes can be constructed by ring polynomial approach. 

Clearly, ๐‘‰๐‘›(๐น) is an abelian group under vector addition, but it is not a ring since we 
have not had a multiplication between any two vectors yet. In order to have multiplication 

operation such that ๐‘‰๐‘› (๐น) is a ring, the easiest way is to associate vectors in ๐‘‰๐‘›(๐น) with 
polynomials in ๐น[๐‘ฅ], that is, if ๐’‚ = (๐‘Ž0๐‘Ž1 โ‹ฏ ๐‘Ž๐‘›โˆ’1) โˆˆ ๐‘‰๐‘› (๐น),  then let 

๐‘Ž(๐‘ฅ) = ๐‘Ž0 + ๐‘Ž1 + โ‹ฏ + ๐‘Ž๐‘›โˆ’1๐‘ฅ
๐‘›โˆ’1. 

We select the polynomial ๐‘“(๐‘ฅ) = ๐‘ฅ๐‘› โˆ’ 1 โˆˆ ๐น[๐‘ฅ] to have a quotient ring ๐น[๐‘ฅ]/โŸจ๐‘“(๐‘ฅ)โŸฉ.  
For all ๐’‚, ๐’ƒ โˆˆ ๐‘‰๐‘›(๐น), let ๐‘Ž(๐‘ฅ)๐‘(๐‘ฅ) = ๐‘ฃ(๐‘ฅ) where ๐‘ฃ(๐‘ฅ) is the polynomial of least degree in 
the equivalence class [๐‘Ž(๐‘ฅ)๐‘(๐‘ฅ)] of ๐น[๐‘ฅ]/โŸจ๐‘“(๐‘ฅ)โŸฉ. Note that ๐‘ฃ(๐‘ฅ) is the remainder 
polynomial when ๐‘Ž(๐‘ฅ)๐‘(๐‘ฅ) is divided by ๐‘“(๐‘ฅ),  and it is a polynomial of degree at most 
๐‘› โˆ’ 1 over F, which is associated with an element of ๐‘‰๐‘›(๐น). In conclusion, now we have 
multiplication between any two vectors in ๐‘‰๐‘›(๐น) which is defined by this way, and with 
the association between the vectors and polynomials, we can essentially think of ๐‘‰๐‘› (๐น) and 
๐น[๐‘ฅ]/โŸจ๐‘“(๐‘ฅ)โŸฉ interchangeable. Moreover, we can prove that ๐‘‰๐‘›(๐น) is a ring. 

To have cyclic property of vectors, the choice of the polynomial ๐‘“(๐‘ฅ) = ๐‘ฅ๐‘› โˆ’ 1 is 
most suitable. Multiplication a polynomial ๐‘ฃ(๐‘ฅ) in ๐น[๐‘ฅ]/โŸจ๐‘“(๐‘ฅ)โŸฉ by x corresponds to a 
cyclic shift of v. This results in a fundamental theorem in cyclic codes presented as follows. 

A nonempty subset C of ๐‘‰๐‘› (๐น) is a cyclic code if only if the set of polynomials I associated 
with C is an ideal in the ring ๐น[๐‘ฅ]/โŸจ๐‘ฅ๐‘› โˆ’ 1โŸฉ. This property helps us in constructing cyclic 
codes. In fact, there is a unique monic polynomial of least degree that generates a nonzero 

ideal I of ๐น[๐‘ฅ]/โŸจ๐‘ฅ๐‘› โˆ’ 1โŸฉ, i.e., a monic polynomial divisor of ๐‘“(๐‘ฅ) = ๐‘ฅ๐‘› โˆ’ 1.  Thus, there 
is a 1 โˆ’ 1 correspondence between cyclic codes in ๐‘‰๐‘› (๐น) and monic polynomials ๐‘”(๐‘ฅ) โˆˆ
๐น[๐‘ฅ] that divide ๐‘“(๐‘ฅ). 

A monic polynomial ๐‘”(๐‘ฅ) divisor of ๐‘“(๐‘ฅ) = ๐‘ฅ๐‘› โˆ’ 1 over F having degree ๐‘› โˆ’ ๐‘˜ will 
become the generator for a cyclic code C of dimension k in ๐‘‰๐‘› (๐น). The encoder encodes 
the message polynomial ๐‘Ž(๐‘ฅ) (of degree less than or equal to ๐‘˜ โˆ’ 1) to the codeword 
๐‘Ž(๐‘ฅ)๐‘”(๐‘ฅ) โˆˆ ๐น[๐‘ฅ]/โŸจ๐‘“(๐‘ฅ)โŸฉ. Thus, the generator matrix for cyclic code C is given in terms of 
๐‘”(๐‘ฅ) by 

๐บ = [

๐‘”(๐‘ฅ)
๐‘ฅ๐‘”(๐‘ฅ)

โ‹ฎ
๐‘ฅ๐‘˜โˆ’1๐‘”(๐‘ฅ)

]. 

Note that G is a matrix of ๐‘˜ ร— ๐‘› where the ๐‘–๐‘กโ„Ž row of G, 2 โ‰ค ๐‘– โ‰ค ๐‘˜, is the ๐‘– โˆ’ 1 right shifts 
of the first row of G. 



Ari Dwi Hartanto, Al. Sutjijana 

Binary Cyclic Pearson Codes 

5 

We now turn our discussion to Pearson codes. For simplicity, sometimes we will write 

a vector in ๐‘‰๐‘›(๐น) or in codes C in the form ๐‘Ž0๐‘Ž1 โ‹ฏ ๐‘Ž๐‘› instead of (๐‘Ž0, ๐‘Ž1, โ‹ฏ , ๐‘Ž๐‘›). We note 
that the cyclic codes C are not Pearson codes since 00 โ‹ฏ 0 belongs to C. We observe some 
nonempty subsets of cyclic code C such that it is Pearson codes. In case our discussion is 

in Pearson code, we treat the information symbols of codewords as real numbers instead of 

elements of a finite field. 

In order to find a nonempty subset of cyclic codes C such that it is a Pearson code, 

clearly, we should eliminate the zero vector from C since it breaks the second axiom of the 

definition of Pearson codes. We should observe whether there exist other elements having 

form ๐‘Ž๐‘Ž โ‹ฏ ๐‘Ž in C. Let us see a (7,4)-cyclic code over ๐‘2 generated by ๐‘”(๐‘ฅ) = 1 + ๐‘ฅ + ๐‘ฅ
3. 

The generator matrix of code C is 

๐บ = [1 + ๐‘ฅ + ๐‘ฅ3 ๐‘ฅ + ๐‘ฅ2 + ๐‘ฅ4 ๐‘ฅ2 + ๐‘ฅ3 + ๐‘ฅ5 ๐‘ฅ3 + ๐‘ฅ4 + ๐‘ฅ6 ]
= [1 1 0 1 0 0 0 0 1 1 0 1 0 0 0 0 1 1 0 1 0 0 0 0 1 1 0 1 ]. 

The message ๐’Ž = 1011 is encoded to be codeword ๐’„ = ๐’Ž๐บ = 1111111 โˆˆ ๐ถ. Such 
codeword must be omitted from C. It means that if our observation is in (๐‘›, ๐‘˜)-cyclic codes, 
we have to make attention for messages from which codewords having form ๐‘Ž๐‘Ž โ‹ฏ ๐‘Ž. We 
note that such messages are the polynomials which are quotient of division โ„Ž(๐‘ฅ) = ๐‘Ÿ +
๐‘Ÿ๐‘ฅ + โ‹ฏ + ๐‘Ÿ๐‘ฅ๐‘›โˆ’1, where ๐‘Ÿ โˆˆ ๐น, by the generator polynomial ๐‘”(๐‘ฅ) in ๐น[๐‘ฅ]/โŸจ๐‘ฅ๐‘› โˆ’ 1โŸฉ. 

Clearly, if c is a codeword of (๐‘›, ๐‘˜)-cyclic code ๐ถ over finite field F, then ๐›ผ๐‘ +
(1๐น, 1๐น , โ‹ฏ , 1๐น) must be element of C, for all ๐›ผ โˆˆ ๐‘. This does not meet the first axiom of 
the definition of Pearson codes. Now we go on a specific case, that is (๐‘›, ๐‘˜)-cyclic code ๐ถ 
over finite field ๐‘2. In this case, we have a good result. We note that ๐ถ โˆ’ {00 โ‹ฏ 0,11 โ‹ฏ 1)} 
is a 2-constrained code ๐‘†2,๐‘›(0,1) if we treat the information symbols of codewords in C as 

real numbers. In conclusion, we obtain that the code ๐‘ƒ = ๐ถ โˆ’ {00 โ‹ฏ 0,11 โ‹ฏ 1} is a Pearson 
code, and we call this code the binary cyclic Pearson codes. 

For a simple encoding scheme, we intend to use the generator matrix, but we face a 

problem when the message word is the zero vector. We should give a special treatment for 

this message word. First, we need to limit n to an even positive integer. We correspond the 

zero vector with the codeword 1010 โ‹ฏ 10. Since 1010 โ‹ฏ 10 is a codeword, 0101 โ‹ฏ 01 
must be considered as a codeword. We correspond 0101 โ‹ฏ 01 with a message word 
๐‘Ž0๐‘Ž1 โ‹ฏ ๐‘Ž๐‘˜โˆ’1 such that ๐‘Ž0๐‘Ž1 โ‹ฏ ๐‘Ž๐‘˜โˆ’1๐บ = 111 โ‹ฏ 1. Unfortunately, we cannot guarantee that 
such a message word will exist. In order to guarantee the existence of such a message word, 

the polynomial โ„Ž(๐‘ฅ) = 1 + ๐‘ฅ + โ‹ฏ + ๐‘ฅ๐‘›โˆ’1 must be divisible by the generator polynomial 
๐‘”(๐‘ฅ). By this condition, we have ๐‘Ž0 + ๐‘Ž1๐‘ฅ + โ‹ฏ + ๐‘Ž๐‘˜โˆ’1๐‘ฅ

๐‘˜โˆ’1 is โ„Ž(๐‘ฅ)/๐‘”(๐‘ฅ).  Next, we 
should be careful if 1010 โ‹ฏ 10 belongs to (๐‘›, ๐‘˜)-cyclic code C. It should not be allowed 
since we have corresponded 1010 โ‹ฏ 10 with message word 000 โ‹ฏ 0. 

 
Table 1.  Some generator polynomials of binary cyclic Pearson codes 

n k Generator Polynomial 

2 1 ๐‘”(๐‘ฅ) = 1 + ๐‘ฅ 

4 1 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)
3 

6 5 ๐‘”(๐‘ฅ) = 1 + ๐‘ฅ  

 3 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)(1 + ๐‘ฅ + ๐‘ฅ
2) 

 1 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)(1 + ๐‘ฅ + ๐‘ฅ
2)2 

8 1 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)7  

10 9 ๐‘”(๐‘ฅ) = 1 + ๐‘ฅ  

 5 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)(1 + ๐‘ฅ + ๐‘ฅ
2 + ๐‘ฅ 3 + ๐‘ฅ 4) 

 1 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)(1 + ๐‘ฅ + ๐‘ฅ
2 + ๐‘ฅ 3 + ๐‘ฅ 4)2 



Jurnal Matematika MANTIK 

Vol. 7, No. 1, May 2021, pp. 1-8 

6 

 

 
Table 1.  Some generator polynomials of binary cyclic Pearson codes (continued) 

n k Generator Polynomial 

12 9 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)3 

 7 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)3(1 + ๐‘ฅ + ๐‘ฅ 2) 

 5 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)3(1 + ๐‘ฅ + ๐‘ฅ 2)2 

 3 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)3(1 + ๐‘ฅ + ๐‘ฅ 2)3 

 1 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)3(1 + ๐‘ฅ + ๐‘ฅ 2)4 

 

Based on the explanation above, not all (๐‘›, ๐‘˜)-cyclic codes over ๐‘2 can be used for 
constructing a binary cyclic Pearson code. As summary, the following conditions must be 

held in order that (๐‘›, ๐‘˜)-cyclic codes over ๐‘2 can be taken for constructing a binary cyclic 
Pearson code: 

a. n is even. 

b. The polynomial โ„Ž(๐‘ฅ) = 1 + ๐‘ฅ + โ‹ฏ + ๐‘ฅ๐‘›โˆ’1 is divisible by the generator polynomial 
๐‘”(๐‘ฅ). 

c. The polynomial 1 + ๐‘ฅ2 + ๐‘ฅ4 + โ‹ฏ + ๐‘ฅ๐‘›โˆ’2 is not divisible by the generator polynomial 
๐‘”(๐‘ฅ).  

 

By using MAGMA (Computational Algebra System) (see [11]), we observe all possibility 

of (๐‘›, ๐‘˜)-cyclic codes over ๐‘2, for ๐‘› = 2,4, โ‹ฏ ,12, that meets three conditions above. Table 
1 gives all generator polynomials of binary cyclic Pearson codes for ๐‘› = 2,4, โ‹ฏ ,12. 
Example 1. Consider ๐‘› = 6, ๐‘‰6(๐‘2), and ๐‘“(๐‘ฅ) = ๐‘ฅ

6 โˆ’ 1. We take polynomial ๐‘”(๐‘ฅ) = 1 +
๐‘ฅ as a generator of the binary cyclic Pearson code, so we have a generator matrix: 

๐บ = [1 1 0 0 0 0 0 1 1 0 0 0 0 0 1 1 0 0 0 0 0 1 1 0 0 0 0 0 1 1 ]. 
We divide 1 + ๐‘ฅ + ๐‘ฅ2 + ๐‘ฅ3 + ๐‘ฅ4 + ๐‘ฅ5 by ๐‘”(๐‘ฅ), and we have 1 + ๐‘ฅ2 + ๐‘ฅ4 as a result. 
Then, the message words 00000 and 10101 are encoded to the codewords 101010 and 

010101, respectively. For all ๐’Ž โˆˆ ๐‘‰5(๐‘2) โˆ’ {00000,10101},  m is encoded to codeword 
๐’Ž๐บ. Therefore, the binary cyclic Pearson code of length ๐‘› = 6 and with generator ๐‘”(๐‘ฅ) =
1 + ๐‘ฅ is 

๐‘ƒ = {๐’Ž๐บ โˆฃ  ๐’Ž โˆˆ ๐‘‰5(๐‘2) โˆ’ {00000,10101}} โˆช ๐‘ƒ0, 
where ๐‘ƒ0 = {101010,010101}. 
 

4. Conclusions 

A binary cyclic code of even length usually has a small Hamming distance. Some of 

the Hamming distances of cyclic codes can be seen on Table 2. A code with small distance 

can be said as a bad code because it can only detect and correct small errors. However, it 

does not mean that the code is always useless. As we explained above, an even length of 

code become one of the sufficient conditions for constructing a binary cyclic Pearson code. 

Therefore, some of cyclic codes of even length are needed for binary cyclic Pearson codes. 

In this paper we have investigated binary cyclic Pearson codes for ๐‘› = 2,4,6,8,10,12,  
and the result is that the binary cyclic Pearson codes exist for each of these n. We have not 

yet investigated codes of even length generally. Our conjecture is the binary cyclic Pearson 

codes exist for all even positive integer n. 

 
  



Ari Dwi Hartanto, Al. Sutjijana 

Binary Cyclic Pearson Codes 

7 

Table 2.  Some generators of (๐‘›, ๐‘˜, ๐‘‘)-cyclic codes and its compatibility for binary cyclic Pearson 
codes (BCPC) 

n k Generator Polynomial d 
Compatibility of generator 

for BCPC 

2 1 ๐‘”(๐‘ฅ) = 1 + ๐‘ฅ 2 yes 

4 3 ๐‘”(๐‘ฅ) = 1 + ๐‘ฅ 2 no 

2 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)2 2 no 

1 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)3 4 yes 

6 5 ๐‘”(๐‘ฅ) = 1 + ๐‘ฅ 2 yes 

4 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)2 2 no 

4 ๐‘”(๐‘ฅ) = 1 + ๐‘ฅ + ๐‘ฅ 2 2 no 

2 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ + ๐‘ฅ 2)2 3 no 

3 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)(1 + ๐‘ฅ + ๐‘ฅ 2) 2 yes 

2 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)2(1 + ๐‘ฅ + ๐‘ฅ 2) 4 no 

1 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)(1 + ๐‘ฅ + ๐‘ฅ 2)2 6 yes 

8 7 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ) 2 no 

6 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)2 2 no 

5 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)3 2 no 

4 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)4 2 no 

3 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)5 4 no 

2 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)6 4 no 

1 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)7 8 yes 

10 9 ๐‘”(๐‘ฅ) = 1 + ๐‘ฅ 2 yes 

8 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)2 2 no 

6 ๐‘”(๐‘ฅ) = 1 + ๐‘ฅ + ๐‘ฅ 2 + ๐‘ฅ 3 + ๐‘ฅ 4 2 no 

2 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ + ๐‘ฅ 2 + ๐‘ฅ 3 + ๐‘ฅ 4)2 5 no 

5 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)(1 + ๐‘ฅ + ๐‘ฅ 2 + ๐‘ฅ 3 + ๐‘ฅ 4) 2 yes 

4 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)2(1 + ๐‘ฅ + ๐‘ฅ 2 + ๐‘ฅ 3 + ๐‘ฅ 4) 4 no 

1 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)(1 + ๐‘ฅ + ๐‘ฅ 2 + ๐‘ฅ 3 + ๐‘ฅ 4)2 10 yes 

12 11 ๐‘”(๐‘ฅ) = 1 + ๐‘ฅ 2 no 

 10 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)2 2 no 

9 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)3 2 yes 

8 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)4 2 no 

10 ๐‘”(๐‘ฅ) = 1 + ๐‘ฅ + ๐‘ฅ 2 2 no 

8 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ + ๐‘ฅ 2)2 2 no 

6 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ + ๐‘ฅ 2)3 3 no 

4 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ + ๐‘ฅ 2)4 3 no 

9 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)(1 + ๐‘ฅ + ๐‘ฅ 2) 2 no 

7 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)(1 + ๐‘ฅ + ๐‘ฅ 2)2 2 no 

5 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)(1 + ๐‘ฅ + ๐‘ฅ 2)3 4 no 

3 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)(1 + ๐‘ฅ + ๐‘ฅ 2)4 6 no 

8 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)2(1 + ๐‘ฅ + ๐‘ฅ 2) 2 no 

6 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)2(1 + ๐‘ฅ + ๐‘ฅ 2)2 2 no 

 

  



Jurnal Matematika MANTIK 

Vol. 7, No. 1, May 2021, pp. 1-8 

8 

 

Table 2.  Some generators of (๐‘›, ๐‘˜, ๐‘‘)-cyclic codes and its compatibility for binary cyclic Pearson 
codes (BCPC) (continued) 

n k Generator Polynomial d 
Compatibility of generator 

for BCPC 

12 4 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)2(1 + ๐‘ฅ + ๐‘ฅ 2)3 4 no 

 2 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)2(1 + ๐‘ฅ + ๐‘ฅ 2)4 6 no 

7 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)3(1 + ๐‘ฅ + ๐‘ฅ 2) 4 yes 

5 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)3(1 + ๐‘ฅ + ๐‘ฅ 2)2 4 yes 

3 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)3(1 + ๐‘ฅ + ๐‘ฅ 2)3 4 yes 

1 ๐‘”(๐‘ฅ) = (1 + ๐‘ฅ)3(1 + ๐‘ฅ + ๐‘ฅ 2)4 12 yes 

 

Acknowledgement 

We thanks to Jos Weber from Delft University of Technology (TU Delft) for the 

discussion and his papers shared with us. 

 

References 

 

[1] K. A. S. Immink and J. H. Weber, โ€œMinimum pearson distance detection for 

multilevel channels with gain and/or offset mismatch,โ€ IEEE Trans. Inf. Theory, vol. 

60, no. 10, pp. 5966โ€“5974, 2014, doi: 10.1109/TIT.2014.2342744. 

[2] F. Sala, K. A. S. Immink, and L. Dolecek, โ€œError Control Schemes for Modern Flash 

Memories,โ€ IEEE Consum. Electron., vol. 4, no. 1, pp. 66โ€“73, 2015. 

[3] J. H. Weber, K. A. S. Immink, and S. R. Blackburn, โ€œPearson codes,โ€ IEEE Trans. 

Inf. Theory, vol. 62, no. 1, pp. 131โ€“135, 2016, doi: 10.1109/TIT.2015.2490219. 

[4] K. A. S. Immink and J. H. Weber, โ€œHybrid Minimum Pearson and Euclidean 

Distance Detection,โ€ IEEE Trans. Commun., vol. 63, no. 9, pp. 3290โ€“3298, 2015, 

doi: 10.1109/TCOMM.2015.2458319. 

[5] J. H. Weber, T. G. Swart, and K. A. S. Immink, โ€œSimple systematic Pearson coding,โ€ 

IEEE Int. Symp. Inf. Theory - Proc., vol. 2016-Augus, pp. 385โ€“389, 2016, doi: 

10.1109/ISIT.2016.7541326. 

[6] S. A. Vanstone and P. C. Oorschot, An Introduction to Error Correcting Codes with 

Applications. Springer US, 1989. 

[7] S. Ling and C. Xing, Coding Theory. Cambridge University Press, 2004. 

[8] A. Betten, M. Braun, H. Fripertinger, A. Kerber, A. Kohnert, and A. Wassermann, 

Error-Correcting Linear Codes. Springer Berlin Heidelberg, 2006. 

[9] K. A. S. Immink, โ€œCoding schemes for multi-level channels with unknown gain 

and/or offset,โ€ IEEE Int. Symp. Inf. Theory - Proc., pp. 709โ€“713, 2013, doi: 

10.1109/ISIT.2013.6620318. 

[10] K. A. S. Immink, โ€œCoding schemes for multi-level Flash memories that are 

intrinsically resistant against unknown gain and/or offset using reference symbols,โ€ 

Electron. Lett., vol. 50, no. 1, pp. 20โ€“22, 2014, doi: 10.1049/el.2013.3558. 

[11] MAGMA Handbook, โ€http://magma.maths.usyd.edu.au/magma/handbook/ 

(accessed Nov. 05, 2018).