Next Article in Journal
An Operation Reduction Using Fast Computation of an Iteration-Based Simulation Method with Microsimulation-Semi-Symbolic Analysis
Previous Article in Journal
An Entropic Model for the Assessment of Streamwise Velocity Dip in Wide Open Channels
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

The Fractality of Polar and Reed–Muller Codes †

by
Bernhard C. Geiger
Signal Processing and Speech Communication Laboratory, Graz University of Technology, 8010 Graz, Austria
This paper is an extended version of our paper published in the 2015 NEWCOM# Emerging Topics in Modulation and CodingWorkshop and in the 2016 International Zürich Seminar on Communications, Zurich, Switzerland, 2–4 March 2016.
Entropy 2018, 20(1), 70; https://doi.org/10.3390/e20010070
Submission received: 16 October 2017 / Revised: 10 January 2018 / Accepted: 15 January 2018 / Published: 17 January 2018
(This article belongs to the Section Information Theory, Probability and Statistics)

Abstract

:
The generator matrices of polar codes and Reed–Muller codes are submatrices of the Kronecker product of a lower-triangular binary square matrix. For polar codes, the submatrix is generated by selecting rows according to their Bhattacharyya parameter, which is related to the error probability of sequential decoding. For Reed–Muller codes, the submatrix is generated by selecting rows according to their Hamming weight. In this work, we investigate the properties of the index sets selecting those rows, in the limit as the blocklength tends to infinity. We compute the Lebesgue measure and the Hausdorff dimension of these sets. We furthermore show that these sets are finely structured and self-similar in a well-defined sense, i.e., they have properties that are common to fractals.

1. Introduction

In his book on fractal geometry, Falconer characterizes a set F as a fractal if it has some of the following properties [1] (p. xxviii):
  • F has a fine structure, i.e., there is detail on arbitrarily small scales
  • F does not admit a description in traditional geometrical language, neither locally nor globally; it is irregular in some sense
  • F has some form of self-similarity, at least approximate or statistical
  • The fractal dimension of F exceeds its topological dimension
  • F is defined in a simple, often recursive way
In this work, we investigate whether polar codes and Reed–Muller are fractal in above sense. For a blocklength of 2 n , these codes are based on the n-fold Kronecker product G ( n ) : = F n , where
F : = 1 0 1 1
i.e., on a simple, recursive operation. Based on this, it has long been suspected that Kronecker product-based codes possess a fractal nature. For example, the authors of [2] observed that G ( n ) , when converted to a picture, resembles the Sierpinski triangle. In a personal communication [3], Abbe expressed his suspicion that the set of “good” polarized channels is fractal. Nevertheless, to the best of the author’s knowledge, a definite statement regarding this fractal nature has not been presented yet.
A rate- K / 2 n Kronecker product-based code is uniquely defined by a set F of K indices: Its generator matrix is the submatrix of G ( n ) consisting of the rows indexed by F . Letting F index the K rows of G ( n ) with the largest Hamming weight defines a Reed–Muller code. Alternatively, one can fix the order r of a Reed–Muller code, which defines F as the index set of all rows with a Hamming weight at least as large as r (see Section 4). For polar codes, the rows of G ( n ) can be interpreted as a communication channels. Then, a rate- K / 2 n polar code is defined by the set F indexing the K channels with the lowest Bhattacharyya parameters [4] (the “good” channels, see Section 2).
Although the sets F are important for the construction of polar and Reed–Muller codes, surprisingly little is known about their fractal properties. Recently, Renes, Sutter, and Hassani stated conditions under which the good (bad) channels derived from one binary-input memoryless channel are also good (bad) for another channel [5]. Moreover, the authors of [6,7] observed the self-similar structure of F by showing that polar and Reed–Muller codes are decreasing monomial codes.
In this paper, we analyze the fractal properties of F for polar codes (Section 3) and Reed–Muller codes (Section 5). In contrast to [6,7], we study the properties of F for infinite blocklengths, i.e., for n . Specifically, we compute the Hausdorff dimension of F , show that it is self-similar, and that it has detail on arbitrarily small scales (e.g., F is symmetric and dense in some well-defined containing set). Each of these results is relatively easy to obtain once appropriate definitions have been put in place. Taken as a whole, however, they paint an interesting picture and make a convincing point for the claim that polar and Reed–Muller codes are fractal.
The presented results will improve our understanding of polar and Reed–Muller codes, even though we have to admit that their practical implication (e.g., in code construction) still eludes us. Nevertheless, our results may apply in areas beyond channel coding: Arıkan’s polarization technique was used to polarize Rényi information dimension [8] and to construct high-girth matrices [9]. Moreover, Nasser showed that a sufficient and necessary condition for a binary operation to be polarizing is that it is uniformity preserving and that its inverse is strongly ergodic [10,11]. We are convinced that fractality carries over to these applications as well and that an analysis similar to ours can deepen understanding.
Since we consider the case n , the set F indexes a subset of Ω : = { 0 , 1 } , the set of infinite binary sequences. We let b : = ( b 1 b 2 ) Ω and abbreviate b n : = ( b 1 b 2 b n ) . Let b ¯ : = ( b ¯ 1 b ¯ 2 ) where b ¯ i : = 1 b i . Let furthermore ( Ω , A , P ) be a probability space with A the Borel field generated by the cylinder sets S ( b n ) : = { w Ω : w 1 = b 1 , , w n = b n } and P a probability measure satisfying P ( S ( b n ) ) = 1 / 2 n . In the following, we represent every infinite binary sequence b Ω by a point in the unit interval [ 0 , 1 ] . The mapping between Ω and [ 0 , 1 ] is given by
f ( b ) : = n = 1 b n 2 n .
Lemma 1
([12] (Exercises 7–10, p. 80)). Let B [ 0 , 1 ] be the Borel σ-algebra on [ 0 , 1 ] and let λ be the Lebesgue measure. Let furthermore D : = [ 0 , 1 ] { p / 2 n : p Z , n N } denote the set of dyadic rationals in the unit interval. Then, the function f : ( Ω , A ) ( [ 0 , 1 ] , B [ 0 , 1 ] ) in (2) satisfies the following properties:
1. 
f is measurable
2. 
f is bijective on Ω \ f 1 ( D )
3. 
for all I B [ 0 , 1 ] , P ( f 1 ( I ) ) = λ ( I )
Example 1.
Lemma 1 states that f is not injective in general. The reason is that dyadic rationals have a non-unique binary expansion. For example, f maps both b = ( 01111111 ) and b = ( 10000000 ) to 0.5 , where we call the latter binary expansion terminating.

2. Preliminaries for Polar Codes

Let W : { 0 , 1 } Y be a binary-input memoryless channel with finite output alphabet Y , (symmetric) capacity 0 I ( W ) 1 , and with Bhattacharyya parameter
Z ( W ) : = y Y W ( y | 0 ) W ( y | 1 ) .
It can be shown using [13] (Proposition 1) that Z ( W ) = 0 I ( W ) = 1 and Z ( W ) = 1 I ( W ) = 0 . We say that the channel W is symmetric if there exists a permutation π : Y Y such that π 1 = π and, for every y Y , W ( y | 0 ) = W ( π ( y ) | 1 ) .
Arıkan’s polarization technique [13] combines and splits two channel uses of W into one use of a “worse” channel
W 2 0 ( y 1 2 | u 1 ) : = 1 2 u 2 W ( y 1 | u 1 u 2 ) W ( y 2 | u 2 )
and one use of a “better” channel
W 2 1 ( y 1 2 , u 1 | u 2 ) : = 1 2 W ( y 1 | u 1 u 2 ) W ( y 2 | u 2 )
where u 1 , u 2 { 0 , 1 } and y 1 , y 2 Y . The combining operation encodes two input bits by F in (1); transmitting them via two channel uses of W creates a vector channel. This vector channel can then be split into the two virtual binary-input memoryless channels indicated in (4) and (5). The better (worse) channel obtained by polarization has a larger (smaller) capacity than the original channel W, i.e., I ( W 2 0 ) I ( W ) I ( W 2 1 ) —the inequalities are strict if 0 < I ( W ) < 1 . The sum capacity equals two times the capacity of the original channel, i.e., I ( W 2 0 ) + I ( W 2 1 ) = 2 I ( W ) [13] (Proposition 4). Similarly, polarization has an effect on the Bhattacharyya parameter:
Lemma 2 (Bounds on the Bhattacharyya Parameter).
Z ( W 2 1 ) = g 1 ( Z ( W ) ) : = Z 2 ( W ) Z ( W )
Z ( W ) Z ( W ) 2 Z 2 ( W ) = : h 0 ( Z ( W ) ) Z ( W 2 0 ) ( a ) g 0 ( Z ( W ) ) : = 2 Z ( W ) Z 2 ( W )
with equality in ( a ) if W is a binary erasure channel (BEC).
Proof. 
The equality and inequality in (6) follow from [13] (Proposition 7) and the fact that Z ( W ) 1 , respectively. The inequalities in (7) follow from the fact that Z ( W ) 1 , from [14] (Lemma 20), and from [13] (Proposition 7). The last inequality becomes an equality if W is a BEC [13] (Proposition 7). ☐
For larger blocklengths 2 n , n > 1 , we apply the polarization procedure recursively and obtain, for b n { 0 , 1 } n ,
W 2 n b n , W 2 n b n W 2 n + 1 b n 0 , W 2 n + 1 b n 1
where b n 0 and b n 1 denote the sequences of zeros and ones obtained by appending 0 and 1 to b n , respectively. Note that the functions g 1 , g 0 , and h 0 from Lemma 2 are non-negative and non-decreasing and map the unit interval onto itself. Hence, the inequalities in (7) are preserved under composition:
Z ( W 2 n b n ) p b n ( Z ( W ) ) : = g b n ( g b n 1 ( g b 1 ( Z ( W ) ) ) )
Z ( W 2 n b n ) q b n ( Z ( W ) ) : = h b n ( h b n 1 ( h b 1 ( Z ( W ) ) ) )
where h 1 g 1 .
Applying this recursive polarization infinitely often leads to a situation in which almost all channels are either perfect or useless, i.e., either I ( W b ) = 1 or I ( W b ) = 0 for b { 0 , 1 } . This is the assertion of Arıkan’s polarization theorem:
Proposition 1
([13] (Proposition 10)). With probability one, the limit RV I ( b ) : = I ( W b ) takes values in the set { 0 , 1 } : P ( I = 1 ) = I ( W ) and P ( I = 0 ) = 1 I ( W ) .
If we stop the polarization procedure at a finite blocklength 2 n for n large enough, then still most of the resulting 2 n channels are either almost perfect or almost useless (i.e., the channel capacities are close to one or to zero). The idea of polar coding is to transmit data only on those channels that are almost perfect. The generator matrix of a blocklength- 2 n polar code is thus the submatrix of G ( n ) consisting of rows indexed by F , where F contains the indices corresponding to the K virtual channels with the largest capacities. Determining this set F is inherently difficult, since (whenever W is not a BEC) the cardinality of the output alphabet increases exponentially in 2 n [15] (Chapter 3.3), [16] (p. 36). Tal and Vardy proposed an approximate construction method based on reducing the output alphabet and showing that the resulting channels are either upgraded or degraded w.r.t. the channel of interest [17] (see also Korada’s PhD thesis [16] (Definition 1.7 & Lemma 1.8)). These upgrading/degrading properties are important tools in our proofs.
Definition 1 (Channel Upgrading and Degrading).
A channel W : { 0 , 1 } Z is degraded w.r.t. the channel W (short: W W ) if there exists a channel Q : Y Z such that
W ( z | u ) = y Y W ( y | u ) Q ( z | y ) .
A channel W + : { 0 , 1 } Z is upgraded w.r.t. the channel W (short: W + W ) if there exists a channel P : Z Y such that
W ( y | u ) = z Z W + ( z | u ) P ( y | z ) .
Moreover, W + W if and only if W W + .
Upgraded (degraded) channels remains upgraded (degraded) during polarization:
Lemma 3
([16] (Lemma 4.7) & [17] (Lemmas 3 & 5)). Suppose that W W W + . Then,
I ( W ) I ( W ) I ( W + ) Z ( W ) Z ( W ) Z ( W + ) ( W ) 2 1 W 2 1 ( W + ) 2 1 ( W ) 2 0 W 2 0 ( W + ) 2 0 .
Lemma 4
([15] (p. 9) & [6] (Lemma 3)). W W 2 1 . If W is symmetric, then W 2 0 W W 2 1 .
Proof. 
By choosing
P ( y | y 1 2 , u 1 ) = 1 , if y = y 2 0 , else .
one can show that W W 2 1 . To show that also W 2 0 W for symmetric channels, take [6] (Lemma 3)
Q ( y 1 2 | y ) = 1 2 W ( y 2 | 0 ) if y 1 = y 1 2 W ( y 2 | 1 ) if y 1 = π ( y ) 0 else .
 ☐

3. Fractal Properties of the Sets of Good and Bad Channels

We next investigate the behavior of the set F as we let the blocklength tend to infinity, i.e., as n . This set indexes all sequences b for which we obtain I ( W b ) = 1 . With the help of (2), we map these sequences to a subset of the unit interval, which we will call the set of good channels.
Definition 2 (The Good and the Bad Channels).
Let G denote the set of good channels, i.e.,
x G b f 1 ( x ) : I ( W b ) = 1 .
Let B denote the set of bad channels, i.e.,
x B b f 1 ( x ) : I ( W b ) = 0 .
If I ( W ) = 0 , then all polarized channels are useless and we have B = [ 0 , 1 ] . Similarly, if I ( W ) = 1 , then all polarized channels are perfect and we have G = [ 0 , 1 ] . We hence assume throughout this section that the channel W is nontrivial, i.e., that 0 < I ( W ) < 1 .
Proposition 2 (Denseness).
G B = D , i.e., the good and bad channels are dense in the unit interval. Moreover, G \ D and B \ D are dense in [ 0 , 1 ] .
Proof. 
See Appendix A. ☐
It is not really surprising that G and B are not disjoint; this is a direct consequence of the fact that f is not injective. It is not obvious, however, that the intersection exhausts the set on which f is non-injective. A consequence of this proposition is that there is no interval that contains only good channels. This has implications for code construction techniques. Indeed, the authors of [18,19] suggest that, for a polar code of a given blocklength, one may stop polarizing channels at shorter blocklengths and use copies of these channels rather than their polarization. For example, they suggest to use the channels ( W 2 n b n , W 2 n b n ) rather than the channels ( W 2 n + 1 b n 0 , W 2 n + 1 b n 1 ) if I ( W 2 n b n ) is sufficiently large. Such a procedure can be justified if further polarizing W 2 n b n to the desired blocklength will lead to including all channels polarized from W 2 n b n in the code. Such a justification can never appear for polar codes with unbounded blocklength: Stopping polarizing at a given blocklength 2 n for a given polarization sequence and using copies of the resulting channel W 2 n b n is equivalent to including a dyadic interval in the index set. This dyadic interval contains, by Proposition 2, bad channels, which shows that this choice is suboptimal.
Proposition 3 (Symmetry).
There exists a function ϑ, defined for almost all values in [ 0 , 1 ] , that is independent of W and satisfies 0 ϑ ( x ) 1 and ϑ ( 1 x ) = 1 ϑ ( x ) . Let x [ 0 , 1 ] be such that ϑ ( x ) is defined. Then, ϑ ( x ) > Z ( W ) implies x G . If W is a BEC, then ϑ ( x ) < Z ( W ) implies x B .
Proof. 
See Appendix B. ☐
Proposition 3 has two implications. The first implication concerns the alignment of the sets G and G for two different channels W and W . Specifically, it is connected to the question whether Z ( W ) Z ( W ) implies G G . In general, the answer is negative [5]. Indeed, it may happen that for some b Ω , we have I ( W b ) = 1 despite Z ( W ) > ϑ ( f ( b ) ) , i.e., that the polarized channel turns out to be good even though the sufficient condition from Proposition 3 is not fulfilled. Such a situation cannot occur for BECs, as Proposition 3 shows. Hence, the set of good channels for a BEC is also good for any binary-input memoryless channel with a smaller Bhattacharyya parameter [20].
The second implication is that, at least for BECs, the sets G and B are symmetric. Indeed, if ϑ ( x ) Z ( W ) , then x G implies 1 x B . This symmetry is visible in the polar fractal that we display in Figure 1.
It is possible to define ϑ for x D . We know from Proposition 2 that dyadic rationals are both good and bad, hence setting ϑ ( x ) = 1 for every x D leads to D G . (The fact that also D B is not captured by nor in conflict with this setting.) The question whether the function ϑ can be defined for x Q \ D is more interesting. In this case, the binary expansion is unique and recurring, i.e., there is a length-k sequence a k { 0 , 1 } k such that f ( b n a k a k a k ) = x for some b n { 0 , 1 } n . It is straightforward to show that for every non-trivial sequence a k (i.e., a k contains zeros and ones), p a k is from [ 0 , 1 ] to [ 0 , 1 ] , non-negative, and non-decreasing with vanishing derivatives at 0 and 1. Since this ensures that p a k ( z ) < z for z close to zero and p a k ( z ) > z for z close to one, the operation z i + 1 = p a k ( z i ) constitutes an iterated function system with attracting fixed points at z = 0 and z = 1 . Note further that, since p a k corresponds to the recurring part of the binary expansion of x, Z ( W b n a k a k ) will be bounded from above by the value to which this iterated function system converges after being initialized with Z ( W 2 n b n ) . To show that Proposition 3 holds for x Q \ D requires showing that p a k intersects the identity function only once on ( 0 , 1 ) , i.e., that there is no attracting fixed point on this open interval. We leave this problem for future investigation.
Example 2.
Let x = 2 / 3 , hence f 1 ( x ) = 101010101 . We determine the fixed points of the iterated function system corresponding to one period of the recurring sequence, i.e, the fixed points of p 10 ( z ) = 2 z 2 z 4 . These are given by the roots of p 10 ( z ) z , which are z = 0 , z = 1 , and z = ( ± 5 1 ) / 2 . One of these latter nontrivial roots lies outside [ 0 , 1 ] and is hence irrelevant. The remaining root determines the threshold, ϑ ( 2 / 3 ) = ( 5 1 ) / 2 .
Now suppose that W is a BEC with Bhattacharyya parameter Z ( W ) = ϑ ( 2 / 3 ) . Since ϑ ( 2 / 3 ) is a fixed point, we get Z ( W f 1 ( 2 / 3 ) ) = Z ( W ) { 0 , 1 } . This illustrates that Proposition 1 holds only almost surely.
Proposition 4 (Lebesgue Measure & Hausdorff Dimension).
G is a Borel set and has Lebesgue measure λ ( G ) = I ( W ) . B is a Borel set and has Lebesgue measure λ ( B ) = 1 I ( W ) . Therefore, the Hausdorff dimensions of G and B satisfy d ( G ) = d ( B ) = 1 .
Proof. 
See Appendix C. ☐
Loosely speaking, the Lebesgue measure of G is the asymptotic equivalent of the rate of the “infinite-blocklength” polar code for the channel W. The fact that λ ( G ) = I ( W ) states that the rate approaches the symmetric capacity of W. A positive Lebesgue measure and a Hausdorff dimension equal to one are not indicators of fractality.
The last fractal property we consider is self-similarity. As Falconer notes [1] (p. xxviii), self-similarity often occurs only approximately. What we show in the following proposition is that the set G is quasi self-similar. Along the same lines, the quasi self-similarity of B can be shown.
Proposition 5 (Self-Similarity).
Let G n ( k ) : = G [ ( k 1 ) 2 n , k 2 n ] for k = 1 , , 2 n . G = G 0 ( 1 ) is quasi self-similar in the sense that, for all n and all k, G n ( k ) = G n + 1 ( 2 k 1 ) G n + 1 ( 2 k ) is quasi self-similar to its right half:
G n ( k ) 2 G n + 1 ( 2 k ) k 2 n
If W is symmetric, G n ( k ) is quasi self-similar:
2 G n + 1 ( 2 k 1 ) ( k 1 ) 2 n G n ( k ) 2 G n + 1 ( 2 k ) k 2 n
Proof. 
See Appendix D. ☐
In other words, at least for a symmetric channel, G is composed of two similar copies of itself (see Figure 1). The self-similarity is closely related to the fact that polar codes are decreasing monomial codes [6] (Theorem 1).
Example 3.
We want to determine whether 1 / 3 G for a given BEC W. This question translates the questions whether 1 / 6 G 1 ( 1 ) and whether 2 / 3 G 1 ( 2 ) . Along the lines of Example 2, we obtain ϑ ( 1 / 6 ) 0.214 , ϑ ( 1 / 3 ) 0.382 , and ϑ ( 2 / 3 ) 0.618 , i.e., ϑ ( 1 / 6 ) < ϑ ( 1 / 3 ) < ϑ ( 2 / 3 ) . Since W is a BEC, we can connect this with Proposition 3 and thus obtain the inclusion indicated in Proposition 5.

4. Preliminaries for Reed–Muller Codes

An order-r, length- 2 n Reed–Muller code is defined by having a generator matrix G R M ( r , n ) composed of all length- 2 n sequences with a Hamming weight larger than 2 n r . For example, we have G R M ( n , n ) = G ( n ) , while G R M ( 0 , n ) is a single row vector containing only ones (length- 2 n repetition code). To make this more precise, let w ( b n ) = i = 1 n b i be the Hamming weight of b n { 0 , 1 } n and let s i ( n ) be the i-th row of G ( n ) . Then, the generator matrix G R M ( r , n ) of an order-r, length- 2 n Reed–Muller code consists of the rows of G ( n ) indexed by [4]
F = { i { 1 , , 2 n } : w ( s i ( n ) ) 2 n r } .
To analyze the effect of doubling the block length, note that
G ( n + 1 ) : = G ( n ) 0 G ( n ) G ( n ) .
Assume that we indicate the rows of G ( n ) by a sequence of binary numbers, i.e., let the i-th row be indexed by h n ( b n ) : = 2 n l = 1 n b l 2 l . Furthermore, let 0 b n and 1 b n denote the sequences of zeros and ones obtained by prepending 0 and 1 to b n , respectively. Clearly, h n + 1 ( 0 b n ) = h n ( b n ) and h n + 1 ( 1 b n ) = h n ( b n ) + 2 n . Combining this with (21) yields
w ( s h n + 1 ( 0 b n ) ( n + 1 ) ) = w ( s h n ( b n ) ( n ) ) w ( s h n + 1 ( 1 b n ) ( n + 1 ) ) = 2 w ( s h n ( b n ) ( n ) ) .
Defining G ( 0 ) : = 1 , we thus get
w ( s h n ( b n ) ( n ) ) = 2 w ( b n )
and
F = h n { b n { 0 , 1 } n : 2 w ( b n ) 2 n r } .
In Section 5, we will analyze the properties of F in the limit as n tends to infinity. An important ingredient in our proofs is the concept of normal numbers.
Definition 3 (Normal Numbers).
A number x [ 0 , 1 ] is called simply normal to base 2( x N ) if and only if
b f 1 ( x ) : lim n w ( b n ) n = 1 2 .
In general, a number is simply normal to base M if the fraction of its digits used in its M-ary expansion is 1 / M . A number is called normal if this property not only holds for digits, but also for subsequences: a number is normal in base M if, for each k 1 , the fraction of each length-k sequences used in its M-ary expansion is 1 / M k . It immediately follows that a normal number is simply normal. The converse is in general not true:
Example 4.
Let x = 1 / 3 , hence b = 010101 . x is simply normal to base 2, but not normal (since the sequences 00 and 11 never occur). Let x = 1 / 7 , hence b = 001001001 . x is neither normal nor simply normal. Let x D , hence b is either terminating ( lim n w ( b n ) / n = 0 ) or non-terminating ( lim n w ( b n ) / n = 1 ). Dyadic rationals are not simply normal.
Lemma 5
(Borel’s Law of Large Numbers, cf. [21] (Corollary 8.1, p. 70)). Almost all numbers in [ 0 , 1 ] are simply normal, i.e.,
λ ( N ) = 1 .
Despite this result, there are uncountably many numbers in the unit interval which are not normal. Moreover, the set of numbers that are not normal is superfractal, i.e., it has a Hausdorff dimension equal to one although it has zero Lebesgue measure [22].

5. Fractal Properties of the Set of Heavy Codewords

If we let n tend to infinity, the definition of F in (23) becomes problematic. Rather than looking at order-r, length- 2 n Reed–Muller codes, we investigate order- ( 1 ρ ) n , length- 2 n codes, where we assume that ρ n is integer. In other words, we assume that the threshold for the Hamming weight increases linearly with the blocklength. This gives rise to the definition of heavy codewords:
Definition 4 (The Heavy Codewords).
Let H ( ρ ) denote the set of ρ-heavy codewords, i.e.,
x H ( ρ ) b f 1 ( x ) : lim   inf n 2 w ( b n ) 2 n ρ 1 .
Loosely speaking, the set of heavy codewords corresponds to those rows of G ( n ) that asymptotically have a fractional Hamming weight larger than a given threshold.
Example 5.
H ( 1 ) = { 1 } . This follows from the fact that 1 is the only number in the unit interval with a binary expansion consisting only of ones. H ( 0 ) = [ 0 , 1 ] . This follows from the fact that w ( b n ) 0 .
Proposition 6 (Denseness).
For all ρ [ 0 , 1 ) , D H ( ρ ) . Moreover, for ρ ( 0 , 1 ) , H ( ρ ) \ D and its complement are dense in [ 0 , 1 ] .
Similarly as for polar codes, also Reed–Muller codes are such that no interval is contained in either H ( ρ ) or its complement (unless in the trivial cases H ( 0 ) and H ( 1 ) ). This is again in contrast with the intuition one obtains for Reed–Muller code with finite blocklength. Suppose we fix n to be even and set r = n / 2 , i.e., we require that at least one half of the bits in b n are one. The matrix G ( n ) resembles a Sierpinski triangle, as depicted in [2] (Figure 2). In our notation, the set F indexes none of the first 2 n / 2 1 rows of G ( n ) , since they cannot have sufficient Hamming weight. Consequently, the transition as n creates complications that are not present for finite n, and one needs to depart from intuition based on these finite-blocklength considerations.
Proof. 
See Appendix E. ☐
Proposition 7 (Lebesgue Measure & Hausdorff Dimension).
H ( ρ ) is Lebesgue measurable and has Lebesgue measure
λ ( H ( ρ ) ) = 1 , if ρ < 1 / 2 0 , if ρ 1 / 2 .
The Hausdorff dimension satisfies
d ( H ( ρ ) ) = 1 , if ρ 1 / 2 h 2 ( ρ ) , if ρ > 1 / 2
where h 2 ( x ) : = x log 2 x ( 1 x ) log 2 ( 1 x ) .
Proof. 
See Appendix F. ☐
Loosely speaking, the Lebesgue measure of H ( ρ ) is the asymptotic equivalent of the rate of the fractional order- ρ Reed–Muller code. As we showed in Proposition 4, the Lebesgue measure of G is equal to the symmetric capacity of W. In contrast, the set H ( ρ ) does not depend on W. Rather, Proposition 7 suggests that the order parameter ρ induces a phase transition for the rate of Reed–Muller codes: If ρ < 1 / 2 , the “infinite-blocklength” Reed–Muller code consists of almost all (in the sense of Lebesgue measure) possible binary sequences. In contrast, if ρ 1 / 2 , the “infinite-blocklength” Reed–Muller code consists of almost no codewords (again, in the sense of Lebesgue measure).
Let us briefly consider the case ρ = 1 / 2 . For this case, Proposition 7 states that H ( ρ ) is a Lebesgue null set that has a Hausdorff dimension equal to 1. Thus, the set H ( 1 / 2 ) is a superfractal. Unfortunately, we were not able to give an exact expression for the Hausdorff dimension of H ( ρ ) for ρ > 1 / 2 . While the set of all non-normal numbers is superfractal, we are not sure if this holds also for the specific proper subset H ( ρ ) .
The sets G and B exhibit self-similarity, i.e., detailed structure on every scale (cf. Figure 1). We next show that also H ( ρ ) is self-similar. At least for H ( 0 ) and H ( 1 ) (cf. Example 5) this is as trivial as the self-similarity of a point or a line. For ρ ( 0 , 1 ) this self-similarity is more interesting, and related to the fact that Reed–Muller codes are decreasing monomial codes [6] (Proposition 2).
Proposition 8 (Self-Similarity).
Let H n ( ρ , k ) : = H ( ρ ) [ ( k 1 ) 2 n , k 2 n ] for k = 1 , , 2 n . H ( ρ ) = H 0 ( ρ , 1 ) is quasi self-similar in the sense that, for all n and all k, H n ( ρ , k ) = H n + 1 ( ρ , 2 k 1 ) H n + 1 ( ρ , 2 k ) is quasi self-similar:
2 H n + 1 ( ρ , 2 k 1 ) ( k 1 ) 2 n H n ( ρ , k ) 2 H n + 1 ( ρ , 2 k ) k 2 n .
Proof. 
See Appendix G. ☐

6. Discussion and Outlook

That Kronecker product-based codes possess fractal properties has long been suspected. The present manuscript contains several results that back this suspicion with solid mathematical analyses. Specifically, we assumed that the blocklength tends to infinity and investigated the properties of the set G of virtual channels that are perfect and the set H ( ρ ) of codewords that have a fractional Hamming weight no less than ρ . Since both polar codes and Reed–Muller codes are obtained by a simple, recursive procedure, it remains to investigate whether the sets G and H ( ρ ) satisfy any of the following properties [1] (p. xxviii):
  • The set has a fine structure, i.e., there is detail on arbitrarily small scales;
  • It does not admit a description in traditional geometrical language, neither locally nor globally; it is irregular in some sense;
  • It has some form of self-similarity, at least approximate or statistical;
  • The fractal dimension of the set exceeds its topological dimension.
Indeed, the sets G and H ( ρ ) possess a fine structure in the sense that they are dense in the unit interval, but that also their complements are dense in the unit interval (cf. Propositions 2 and 6). Therefore, at an arbitrarily small scale, the sets G and H ( ρ ) admit no simple description in geometrical language. Both of these sets are self-similar in a specific sense, as we outlined in Propositions 5 and 8. Finally, while G has a fractal dimension of one (cf. Proposition 4), the set H ( ρ ) has, for a certain range of ρ , a positive (fractional?) Hausdorff dimension despite being a Lebesgue null set. This result, which we proved in Proposition 7, is one of the defining properties of a fractal set.
One reviewer pointed out that our definition of H ( ρ ) can be complemented by a different one. Specifically, while H ( ρ ) indexes the codewords with a fractional Hamming weight not smaller than ρ , one could define a set H ( R ) indexing the codewords of a Reed–Muller code with rate R. In other words, while H ( ρ ) is parameterized via the fractional order of the code, H ( R ) is parameterized via its rate. We expect that the Lebesgue measure of the (adequately defined) set H ( R ) should be R and that, thus, its Hausdorff dimension equals one. An appropriate definition of H ( R ) is tied to the set F of a rate-R, length- 2 n Reed–Muller code (such as is our Definition 4). Since finding such a definition has so far eluded us, we postpone this investigation to future work.
Another obvious extension of our work are non-binary polar and Reed–Muller codes. For example, consider an × matrix with entries from { 0 , , q 1 } , where q is prime. One can show that this matrix is polarizing as long as it is not upper-triangular [15] (Theorem 5.2). We believe that our analysis can be replicated by considering the -ary expansion of real numbers in [ 0 , 1 ] . Along the same lines, it would be interesting to examine the properties of q-ary Reed–Muller codes, e.g., [23,24].

Supplementary Materials

Supplementary material are available online at www.mdpi.com/1099-4300/20/1/70/s1.

Acknowledgments

The author thanks Emmanuel Abbe, Princeton University, and Hamed Hassani, University of Pennsylvania, for fruitful discussions and suggesting material. The author is particularly indebted to Jean-Pierre Tillich, French Institute for Research in Computer Science and Automation (INRIA), for helpful suggestions and generalizing Proposition 5. The author is also indebted anonymous reviewers pointing to a missing step in the proof of Proposition 4 and for extending Proposition 2. This work was supported by TU Graz Open Access Publishing Fund, by the Erwin Schrödinger Fellowship J 3765 of the Austrian Science Fund, and by the German Ministry of Education and Research in the framework of an Alexander von Humboldt Professorship.

Conflicts of Interest

The author declares no conflict of interest.

Appendix A. Proof of Proposition 2

That G B D follows from the fact that only dyadic rationals have a non-unique binary expansion. In particular, the preimage of x D consists of two elements, namely
b : = ( b n 0000000 )
and
b : = ( b n 1 b ¯ n 1111111 ) .
By the properties of polarization and with the assumption that 0 < I ( W ) < 1 , we have that 0 < I ( W 2 n b n 1 b ¯ n ) , I ( W 2 n b n ) < 1 , and hence also 0 < Z ( W 2 n b n 1 b ¯ n ) , Z ( W 2 n b n ) < 1 . Moreover, it follows from Lemma 2 and (9) that
Z ( W b ) lim Z ( W 2 n b n 1 b ¯ n ) 2 = 0
from which we obtain I ( W b ) = 1 and x G . Similarly, with Lemma 2 and (10) we obtain
Z ( W b ) lim 1 1 Z 2 ( W 2 n b n ) 2 = 1 .
Hence, I ( W b ) = 0 and x B . Since this holds for every x D , we have that G B = D .
The proof that G \ D and B \ D are dense in [ 0 , 1 ] follows along similar lines. Specifically, we show that between every dyadic rational we can find rational numbers x , x Q \ D such that x G and x B . To this end, fix x 1 = p / 2 n and x 2 = ( p + 1 ) / 2 n . Let further b n be the terminating binary expansion of x 1 , i.e., f ( b n 000 ) = x 1 .
Let a k be such that a 1 = = a k 1 = 1 and a k = 0 . We can bound the polynomial p a k from above:
p a k ( z ) = 2 z 2 k 1 z 2 k 2 z 2 k 1
The bound crosses z at z = 0 and at z * = 2 1 / ( 2 k 1 1 ) , where z * can be made arbitrarily close to one for k sufficiently large. Now let z i + 1 = p a k ( z i ) , where z 0 = Z ( W 2 n b n ) . It follows that Z ( W b n a k a k a k ) lim i z i . However, z i 0 if z 0 < z * , hence if k is sufficiently large such that this holds, then Z ( W b n a k a k a k ) 0 . Thus, I ( W b n a k a k a k ) = 1 and x = f ( b n a k a k a k ) G .
Recall that a ¯ k is such that a ¯ 1 = = a ¯ k 1 = 0 and a ¯ k = 1 . We next bound the polynomial q a ¯ k from below:
q a ¯ k ( z ) = 1 ( 1 z 2 ) 2 k 1 1 e 2 k 1 z 2
which intersects z at z = 0 , at some root z * that can be made arbitrarily close to zero for k sufficiently large, and at some root z < 1 that tends to one if k becomes large. Note further that the slope of q a ¯ k equals 2 k z ( 1 z 2 ) 2 k 1 1 . By setting k sufficiently large, one can guarantee that this slope is smaller than one on the interval [ z , 1 ] . Now let z i + 1 = q a ¯ k ( z i ) , where z 0 = Z ( W 2 n b n ) . Suppose further that we have chosen k sufficiently large such that z 0 > z * and that the slope of q a ¯ k is smaller than one on the interval [ z , 1 ] . We know that q a ¯ k ( z ) > z on the interval ( z * , z ) , since this is the case for the lower bound in (A5). However, since the slope of q a ¯ k is smaller than one on the interval [ z , 1 ] and since q a ¯ k intersects z at one, there can be no further intersection between q a ¯ k and z on the interval [ z , 1 ] . Hence, q a ¯ k ( z ) > z on the interval ( z * , 1 ] , and z i 1 since z 0 > z * . Since furthermore Z ( W b n a ¯ k a ¯ k a ¯ k ) lim i z i , we obtain Z ( W b n a ¯ k a ¯ k a ¯ k ) 1 . Thus, I ( W b n a ¯ k a ¯ k a ¯ k ) = 0 and x = f ( b n a ¯ k a ¯ k a ¯ k ) B .
Since both f ( b n a k a k a k ) and f ( b n a ¯ k a ¯ k a ¯ k ) are in the interval ( x 1 , x 2 ) , this shows that between every two dyadic rationals, there are numbers x and x that are good and bad. This proves that G \ D and B \ D are dense in [ 0 , 1 ] .

Appendix B. Proof of Proposition 3

Lemma A1
([25] (Lemma 11)). For P -almost every realization b Ω , there exists a point θ ( b ) [ 0 , 1 ] such that
lim n p b n ( z ) = 0 , z [ 0 , θ ( b ) ) 1 , z ( θ ( b ) , 1 ] .
Furthermore, the thus constructed RV θ is uniformly distributed on [ 0 , 1 ] .
It can be easily verified that g i ( 1 z ) = 1 g 1 i ( z ) for i = 0 , 1 . Hence,
p b n ( z ) = g b n ( g b n 1 ( g b 2 ( g b 1 ( z ) ) ) ) = g b n ( g b n 1 ( g b 2 ( 1 g b ¯ 1 ( 1 z ) ) ) ) = g b n ( g b n 1 ( 1 g b ¯ 2 ( g b ¯ 1 ( 1 z ) ) ) ) = 1 g b ¯ n ( g b ¯ n 1 ( g b ¯ 2 ( g b ¯ 1 ( 1 z ) ) ) ) = 1 p b ¯ n ( 1 z ) .
Now suppose that b f 1 ( D ) and that θ ( b ) is defined. If 0 z < θ ( b ) , then 1 θ ( b ) < 1 z 1 . Since, by Lemma A1, 0 z < θ ( b ) implies p b n ( z ) 0 and p b ¯ n ( 1 z ) 1 , we get θ ( b ¯ ) = 1 θ ( b ) . Now set ϑ ( f ( b ) ) : = θ ( b ) . Since b + b ¯ = 11111 , it follows from the linearity of f that f ( b ) + f ( b ¯ ) = f ( b + b ¯ ) = 1 , i.e., if x D has binary expansion b, then 1 x has binary expansion b ¯ . Therefore, for all x D for which θ ( f 1 ( x ) ) is defined, we have ϑ ( 1 x ) = 1 ϑ ( x ) .
Recall that, by Lemma 2, we have
Z ( W 2 n b n ) p b n ( Z ( W ) ) = g b n ( g b n 1 ( g b 1 ( Z ( W ) ) ) ) .
If Z ( W ) < ϑ ( x ) , then by Lemma A1, Z ( W b ) lim n p b n ( Z ( W ) ) = 0 and x G . If W is a BEC, then (A7) holds with equality. Thus, by Lemma A1, if Z ( W ) > ϑ ( x ) , then Z ( W b ) = lim n p b n ( Z ( W ) ) = 1 and x B .

Appendix C. Proof of Proposition 4

For the proof we utilize properties of f derived in the proof of [26] (Theorem 2.1, p. 7). Specifically, let E Ω be the set of all binary sequences with infinitely many zeros, i.e., E contains the binary expansion of all numbers x [ 0 , 1 ] \ D and the terminating binary expansions of all numbers x D . Since Ω \ E is countable, E is a Borel set. The function f restricted to E, f : E [ 0 , 1 ] , is bijective and measurable (since f is measurable by Lemma 1). Finally, the inverse function f 1 : [ 0 , 1 ] E is measurable, i.e., for all A A , A E , we have f ( A ) B [ 0 , 1 ] .
The set E contains all binary sequences except for non-terminating expansions of dyadic rationals, which lead to good channels by the proof of Proposition 2. Thus, we have
{ b Ω : I ( W b ) = 0 } E = { b Ω : I ( W b ) = 0 } .
Since this set has probability 1 I ( W ) by Proposition 1, it is a Borel set (otherwise, it would not be measurable). However, since f ( { b E : I ( W b ) = 0 } ) = B , it follows that B is a Borel set of [ 0 , 1 ] . That G is a Borel set can be shown along similar lines, with E containing all binary sequences with infinitely many ones.
Every Borel set is Lebesgue measurable. To evaluate the Lebesgue measure of B , note that
f 1 ( B ) = { b Ω : I ( W b ) = 0 } f 1 ( D ) .
Since B B [ 0 , 1 ] , we get from Lemma 1 that λ ( B ) = P ( f 1 ( B ) ) . By the monotonicity and countable subadditivity of measures, we have
P ( { b Ω : I ( W b ) = 0 } ) P ( f 1 ( B ) ) P ( { b Ω : I ( W b ) = 0 } ) + P ( f 1 ( D ) ) = λ ( D ) = 0 .
Hence, by Proposition 1, λ ( B ) = P ( { b Ω : I ( W b ) = 0 } ) = 1 I ( W ) . The proof for the set of good channels follows along the same lines.
Since the one-dimensional Hausdorff measure of a Borel set equals its Lebesgue measure [1] (Equation (3.4), p. 45), it immediately follows that G and B have a Hausdorff dimension equal to one.

Appendix D. Proof of Proposition 5

Since the dyadic rationals are self-similar and since D G from Proposition 2, one has for all n and k,
G n ( k ) D = 2 G n + 1 ( 2 k ) D k 2 n .
We now treat those values in [ 0 , 1 ] that are not dyadic rationals. If b k n = ( b 1 b 2 b n ) is the terminating binary expansion of ( k 1 ) 2 n , every value in [ ( k 1 ) 2 n , k 2 n ] has a binary expansion b k n a for some a Ω , where b n = 1 if and only if ( k 1 ) is odd. Similarly, and since ( 2 k 1 ) is always odd, every value in [ ( 2 k 1 ) 2 n 1 , k 2 n ] has a binary expansion b k n 1 a for some a Ω . Assume that a = a . Then, by Lemmas 3 and 4, W b k n a W b k n 1 a for all a. Hence, if f ( b k n a ) G n ( k ) , then f ( b k n 1 a ) G n + 1 ( 2 k ) . It remains to show that 2 f ( b k n 1 a ) f ( b k + 1 n ) = f ( b k n a ) :
f ( b k n a ) + f ( b k + 1 n ) = f ( b k n ) + 2 n f ( a ) + f ( b k + 1 n ) = ( k 1 ) 2 n + 2 n f ( a ) + k 2 n = ( 2 k 1 ) 2 n + 2 n f ( a ) = 2 ( 2 k 1 ) 2 n 1 + 2 × 2 n 1 f ( a ) = 2 f ( b k n 1 ) + 2 × 2 n 1 f ( a ) = 2 f ( b k n 1 a )
Proof for Symmetric Channels.
Since ( 2 k 2 ) is always even, every value in [ ( 2 k 2 ) 2 n 1 , ( 2 k 1 ) 2 n 1 ] has a binary expansion b k n 0 a for some a Ω . Then, by Lemmas 3 and 4, W b k n 0 a W b k n a for all a. Hence, if f ( b k n 0 a ) G n + 1 ( 2 k ) , then f ( b k n a ) G n ( k ) . It remains to show that 2 f ( b k n 0 a ) f ( b k n ) = f ( b k n a ) :
f ( b k n a ) + f ( b k n ) = f ( b k n ) + 2 n f ( a ) + f ( b k n ) = ( k 1 ) 2 n + 2 n f ( a ) + ( k 1 ) 2 n = ( 2 k 2 ) 2 n + 2 n f ( a ) = 2 ( 2 k 2 ) 2 n 1 + 2 × 2 n 1 f ( a ) = 2 f ( b k n 0 ) + 2 × 2 n 1 f ( a ) = 2 f ( b k n 0 a )

Appendix E. Proof of Proposition 6

Note that in Definition 4 we can take the binary logarithm on both sides of the inequality to get the condition
x H ( ρ ) b f 1 ( x ) : lim   inf n   w ( b n ) n ρ 0 .
We first show that D H ( ρ ) for every ρ [ 0 , 1 ) . To this end, consider the non-terminating expansion of x D , i.e., there is a b k { 0 , 1 } k such that f ( b k 1111 ) = x . Hence, w ( b n ) n k for n k and, for ρ < 1 ,
lim   inf n   w ( b n ) n ρ lim n n ( 1 ρ ) k = .
We next show that also H ( ρ ) \ D is dense in [ 0 , 1 ] for ρ < 1 . We do so by showing that between any two dyadic rationals x 1 = p / 2 n and x 2 = ( p + 1 ) / 2 n , there exists a rational number x Q \ D that is in H ( ρ ) . Let b be the terminating binary expansion of x 1 , i.e., f ( b 000 ) = x 1 . Furthermore, let a k be such that a 1 = = a k 1 = 1 and a k = 0 . We set b = b a k a k a k and get f ( b ) ( x 1 , x 2 ) . One can show that w ( b n ) n 1 n k . Hence, choosing k > 1 / ( 1 ρ ) , ρ < 1 , leads to
lim   inf n   w ( b n ) n ρ lim n n 1 1 k ρ k 1 = .
This proves that x H ( ρ ) if ρ < 1 , from which follows that H ( ρ ) \ D is dense in [ 0 , 1 ] .
We finally show that the there exists a non-dyadic rational number x ( x 1 , x 2 ) such that x H ( ρ ) . From this follows that also the complement of H ( ρ ) \ D is dense in [ 0 , 1 ] . To this end, let a ¯ k be such that a ¯ 1 = = a ¯ k 1 = 0 and a ¯ k = 1 . Set b = b a ¯ k a ¯ k a ¯ k . One can show that w ( b n ) n k + k + 1 . Hence, choosing k > 1 / ρ , ρ > 0 , leads to
lim   inf n   w ( b n ) n ρ lim n n 1 k ρ + k + 1 = .
Therefore, x H ( ρ ) if ρ > 0 .

Appendix F. Proof of Proposition 7

By Example 4, dyadic rationals are not simply normal, hence let N [ 0 , 1 ] \ D be the set of simply normal numbers in [ 0 , 1 ] . Note that f is bijective on N by Lemma 1. We furthermore have λ ( N ) = 1 , hence [ 0 , 1 ] \ N is a Lebesgue null set (both N and its complement are measurable). Every subset of a Lebesgue null set is a Lebesgue null set and, a fortiori, Lebesgue measurable.
By Lemma 5 we have
b f 1 ( N ) : w ( b n ) = 1 2 n + o ( n ) .
Fix ρ . Then,
lim   inf n   w ( b n ) n ρ = lim n n 1 2 ρ + o ( n ) .
If ρ < 1 / 2 , then this limit diverges to infinity, and hence N H ( ρ ) . Thus, [ 0 , 1 ] \ H ( ρ ) is a subset of [ 0 , 1 ] \ N , hence measurable, from which measurability of H ( ρ ) follows. Since λ ( N ) = 1 , we have λ ( H ( ρ ) ) = 1 . If ρ > 1 / 2 , the limit diverges to minus infinity, and hence N ¬ H ( ρ ) . Thus, H ( ρ ) [ 0 , 1 ] \ N , from which λ ( H ( ρ ) ) = 0 follows.
Now let ρ = 1 / 2 . We define a random variable B on our probability space, such that for all b Ω , B ( b ) = b . B is a sequence of independent, identically distributed Bernoulli-1/2 random variables, i.e., for all i we have P ( B i = 1 ) = P ( B i = 0 ) = 1 / 2 . We now evaluate
P lim   inf n   w ( B n ) n 2 0 .
Consider the simple random walk S n : = w ( B n ) n 2 . Let N 0 ( n ) be the number of zero crossings of the sequence S 1 , , S n and let N 0 ( n , b ) be the number of zero crossings corresponding to the realization b Ω . The event lim   inf n w ( b n ) n 2 0 can only happen if the realization of S n corresponding to b has only finitely many zero crossings, i.e.,
{ b Ω : lim   inf n   w ( b n ) n 2 0 } { b Ω : R N 0 : lim n N 0 ( n , b ) R } = R = 0 { b Ω : lim n N 0 ( n , b ) R } = R = 0 lim   inf n { b Ω : N 0 ( n , b ) R }
and hence
P { b Ω : lim   inf n   w ( b n ) n 2 0 } R = 0 P ( lim   inf n { b Ω : N 0 ( n , b ) R } ) R = 0 lim n P ( N 0 ( n ) R )
where the second inequality is due to Fatou’s lemma [27] (Lemma 1.28, p. 23).
With [28] (Chapter III.5, p. 84)
P ( N 0 ( n ) = R ) = 2 P ( S 2 n + 1 = 2 R + 1 )
we get
P ( N 0 ( n ) R ) = 2 r = 0 R P ( S 2 n + 1 = 2 r + 1 ) = ( a ) 2 r = 0 R 2 n + 1 n r 2 2 n 1 2 2 n r = 0 R 2 n + 2 n + 1 = 2 2 n ( R + 1 ) 2 n + 2 n + 1 ( b ) 2 2 n ( R + 1 ) e 2 2 n + 2 1 ( n + 1 ) π = 4 e ( R + 1 ) ( n + 1 ) π
where ( a ) is [28] (Equation (2.2), p. 75) and ( b ) is due to Stirling’s approximation [29] (Equation (6.1.38), p. 257). Since this probability tends to zero as n , we have by (A19)
P lim   inf n   w ( B n ) n 2 0 = 0 .
Since the set inside the probability measure is thus measurable, we can apply the same reasoning as in the proof of Proposition 4 to argue that H ( 1 / 2 ) is Lebesgue measurable. We then obtain λ ( H ( 1 / 2 ) ) = 0 which completes the proof for the Lebesgue measure.
We now turn to the proof of the Hausdorff dimension. For ρ < 1 / 2 , H ( ρ ) has full Lebesgue measure. Since every Lebesgue measurable set has a Borel subset with the same Lebesgue measure, and since Hausdorff dimension is monotonic, we have d ( H ( ρ ) ) = 1 for ρ < 1 / 2 .
For ρ 1 / 2 , we define
N ˜ ξ : = x [ 0 , 1 ] : b f 1 ( x ) : lim n w ( b n ) n = ξ
for some ξ ( 0 , 1 ) . Note that N ˜ 1 / 2 = N . By [30] (cf. [21] (Chapter 8) for further notes), the Hausdorff dimension of this set is given by (Interestingly, in Eggleston’s paper, the dimension was not connected to entropy; it was submitted earlier in the same year as Shannon’s Mathematical Theory of Communication was published).
d ( N ˜ p ) = h 2 ( ξ ) .
Reasoning as in the proof for the Lebesgue measure, N ˜ ξ H ( ρ ) if ξ > ρ and N ˜ p H ( ρ ) if ξ < ρ . As a consequence,
n = 1 N ˜ ρ + 1 / n H ( ρ ) .
For a countable sequence of sets A n , Hausdorff dimension satisfies [1] (p. 49)
d ( n = 1 A n ) = sup n 1 d ( A n )
and hence, by the monotonicity of Hausdorff dimension [1] (p. 48),
d ( H ( ρ ) ) sup n 1 h 2 ( ρ + 1 / n ) = h 2 ( ρ )
where the last equality follows from the fact that the binary entropy function decreases with increasing ρ for ρ 1 / 2 . In particular, for ρ = 1 / 2 , d ( H ( ρ ) ) = 1 . This completes the proof.

Appendix G. Proof of Proposition 8

The proof follows along the lines of the proof of Proposition 5. Let again b k n be the terminating expansion of ( k 1 ) 2 n and let a Ω . The connections between the sequences b : = b k n a , b : = b k n 0 a , and b + : = b k n 1 a have been established above. To prove the theorem, we have to show that
lim   inf m   w ( b m ) ρ m 0
lim   inf m   w ( b m ) ρ m 0
lim   inf m   w ( b + m ) ρ m 0 .
This is obtained by
lim   inf m   w ( b m ) ρ m = w ( b k n 0 ) ρ ( n + 1 ) + lim   inf m   w ( a m ) ρ m = w ( b k n ) ρ n ρ + lim   inf m   w ( a m ) ρ m w ( b k n ) ρ n + lim   inf m   w ( a m ) ρ m w ( b k n ) ρ n + ( 1 ρ ) + lim   inf m   w ( a m ) ρ m
         = w ( b k n 1 ) ρ ( n + 1 ) + lim   inf m   w ( a m ) ρ m
where (A30) equals (A28) and where (A31) equals (A29). The inequalities yield the desired result.

References

  1. Falconer, K. Fractal Geometry: Mathematical Foundations and Applications, 3rd ed.; John Wiley & Sons: Chichester, UK, 2014. [Google Scholar]
  2. Kahraman, S.; Viterbo, E.; Çelebi, M.E. Folded Tree Maximum-Likelihood Decoder for Kronecker Product-based Codes. In Proceedings of the Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, 2–4 October 2013; pp. 629–636. [Google Scholar]
  3. Abbe, E.; (Princeton University, Princeton, NJ, USA). Personal communication, 2011.
  4. Arıkan, E. A Performance Comparison of Polar Codes and Reed–Muller Codes. IEEE Commun. Lett. 2008, 12, 447–449. [Google Scholar] [CrossRef] [Green Version]
  5. Renes, J.M.; Sutter, D.; Hassani, S.H. Alignment of Polarized Sets. In Proceedings of the 2015 IEEE International Symposium on Information Theory (ISIT), Hong Kong, China, 14–19 June 2015; pp. 2446–2450. [Google Scholar]
  6. Bardet, M.; Dragoi, V.; Otmani, A.; Tillich, J.P. Algebraic Properties of Polar Codes From a New Polynomial Formalism. arXiv, 2016; arXiv:1601.06215v2. [Google Scholar]
  7. Bardet, M.; Dragoi, V.; Otmani, A.; Tillich, J.P. Algebraic properties of polar codes from a new polynomial formalism. In Proceedings of the IEEE International Symposium on Information Theory (ISIT), Barcelona, Spain, 10–15 July 2016; pp. 230–234. [Google Scholar]
  8. Haghighatshoar, S.; Abbe, E. Polarization of the Rényi information dimension for single and multi terminal analog compression. In Proceedings of the 2013 IEEE International Symposium on Information Theory Proceedings (ISIT), Istanbul, Turkey, 7–12 July 2013; pp. 779–783. [Google Scholar]
  9. Abbe, E.; Wigderson, Y. High-Girth matrices and polarization. In Proceedings of the IEEE International Symposium on Information Theory Proceedings (ISIT), Hong Kong, China, 14–19 June 2015; pp. 2461–2465. [Google Scholar]
  10. Nasser, R. An Ergodic Theory of Binary Operations—Part I: Key Properties. IEEE Trans. Inf. Theory 2016, 62, 6931–6952. [Google Scholar] [CrossRef]
  11. Nasser, R. An Ergodic Theory of Binary Operations—Part II: Applications to Polarization. IEEE Trans. Inf. Theory 2017, 63, 1063–1083. [Google Scholar] [CrossRef]
  12. Taylor, M. Measure Theory and Integration; Graduate Studies In Mathematics Series 76; American Mathematical Society: Providence, RI, USA, 2006. [Google Scholar]
  13. Arıkan, E. Channel polarization: A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels. IEEE Trans. Inf. Theory 2009, 55, 3051–3073. [Google Scholar] [CrossRef] [Green Version]
  14. Korada, S.B.; Urbanke, R.L. Polar Codes are Optimal for Lossy Source Coding. IEEE Trans. Inf. Theory 2010, 56, 1751–1768. [Google Scholar] [CrossRef]
  15. Şaşoğlu, E. Polarization and Polar Codes. Found. Trends Commun. Inf. Theory 2011, 8, 259–381. [Google Scholar] [CrossRef]
  16. Korada, S.B. Polar Codes for Channel and Source Coding. Ph.D. Thesis, École Polytechnique Fédérale de Lausanne, Lausanne, Switzerland, 2009. [Google Scholar]
  17. Tal, I.; Vardy, A. How to Construct Polar Codes. IEEE Trans. Inf. Theory 2013, 59, 6562–6582. [Google Scholar] [CrossRef]
  18. El-Khamy, M.; Mahdavifar, H.; Feygin, G.; Lee, J.; Kang, I. Relaxed channel polarization for reduced complexity polar coding. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), New Orleans, LA, USA, 9–12 March 2015; pp. 207–212. [Google Scholar]
  19. El-Khamy, M.; Mahdavifar, H.; Feygin, G.; Lee, J.; Kang, I. Relaxed Polar Codes. IEEE Trans. Inf. Theory 2017, 63, 1986–2000. [Google Scholar] [CrossRef]
  20. Hassani, S.H.; Korada, S.; Urbanke, R. The compound capacity of polar codes. In Proceedings of the Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, 30 September–2 October 2009; pp. 16–21. [Google Scholar]
  21. Kuipers, I.; Niederreiter, H. Uniform Distribution of Sequences; John Wiley & Sons: New York, NY, USA, 1974. [Google Scholar]
  22. Albeverio, S.; Pratsuivytyi, M.; Torbin, G. Topological and fractal properties of real numbers which are not normal. Bull. Sci. Math. 2005, 129, 615–630. [Google Scholar] [CrossRef]
  23. Kasami, T.; Lin, S.; Peterson, W. New generalizations of the Reed–Muller codes–I: Primitive codes. IEEE Trans. Inf. Theory 1968, 14, 189–199. [Google Scholar] [CrossRef]
  24. Delsarte, P.; Goethals, J.; Williams, F.M. On generalized Reed–Muller codes and their relatives. Inf. Control 1970, 16, 403–442. [Google Scholar] [CrossRef]
  25. Hassani, S.H.; Alishahi, K.; Urbanke, R.L. Finite-Length Scaling for Polar Codes. IEEE Trans. Inf. Theory 2014, 60, 5875–5898. [Google Scholar] [CrossRef]
  26. Parthasarathy, K.R. Probability Measures on Metric Spaces; Academic Press: New York, NY, USA, 1967. [Google Scholar]
  27. Rudin, W. Real and Complex Analysis, 3rd ed.; McGraw-Hill: New York, NY, USA, 1987. [Google Scholar]
  28. Feller, W. An Introduction to Probability Theory and Its Applications, 3rd ed.; John Wiley & Sons: New York, NY, USA, 1968; Volume 1. [Google Scholar]
  29. Abramowitz, M.; Stegun, I.A. (Eds.) Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables, 9th ed.; Dover Publications: New York, NY, USA, 1972. [Google Scholar]
  30. Eggleston, H.G. The Fractional Dimension of a Set defined by decimal properties. Q. J. Math. 1949, os-20, 31–36. [Google Scholar] [CrossRef]
Figure 1. The polar fractal. The center plot shows the thresholds ϑ ( x ) for a finite set of values x [ 0 , 1 ] ; the bottom and the top plots show thresholds for equally many values in the sets [ 0 , 0.5 ] and [ 0.5 , 1 ] , respectively. One can observe how the thresholds are ordered, i.e., thresholds in the top plot exceed those in the center plot, which exceed those in the bottom plot. For a binary erasure channel (BEC) W, the indicator function of G is obtained by setting each value in the plot to one (zero) if the Bhattacharyya parameter Z ( W ) is smaller (larger) than the threshold. Note that this plot illustrates the behavior of G in the limit n . Note further that the figure illustrates the symmetry of ϑ ( x ) claimed in Proposition 3. The MATLAB code to generate these thresholds is available as Supplementary Material.
Figure 1. The polar fractal. The center plot shows the thresholds ϑ ( x ) for a finite set of values x [ 0 , 1 ] ; the bottom and the top plots show thresholds for equally many values in the sets [ 0 , 0.5 ] and [ 0.5 , 1 ] , respectively. One can observe how the thresholds are ordered, i.e., thresholds in the top plot exceed those in the center plot, which exceed those in the bottom plot. For a binary erasure channel (BEC) W, the indicator function of G is obtained by setting each value in the plot to one (zero) if the Bhattacharyya parameter Z ( W ) is smaller (larger) than the threshold. Note that this plot illustrates the behavior of G in the limit n . Note further that the figure illustrates the symmetry of ϑ ( x ) claimed in Proposition 3. The MATLAB code to generate these thresholds is available as Supplementary Material.
Entropy 20 00070 g001

Share and Cite

MDPI and ACS Style

Geiger, B.C. The Fractality of Polar and Reed–Muller Codes. Entropy 2018, 20, 70. https://doi.org/10.3390/e20010070

AMA Style

Geiger BC. The Fractality of Polar and Reed–Muller Codes. Entropy. 2018; 20(1):70. https://doi.org/10.3390/e20010070

Chicago/Turabian Style

Geiger, Bernhard C. 2018. "The Fractality of Polar and Reed–Muller Codes" Entropy 20, no. 1: 70. https://doi.org/10.3390/e20010070

APA Style

Geiger, B. C. (2018). The Fractality of Polar and Reed–Muller Codes. Entropy, 20(1), 70. https://doi.org/10.3390/e20010070

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop