• No results found

More on the minimum distance of cyclic codes

N/A
N/A
Protected

Academic year: 2021

Share "More on the minimum distance of cyclic codes"

Copied!
4
0
0

Bezig met laden.... (Bekijk nu de volledige tekst)

Hele tekst

(1)

More on the minimum distance of cyclic codes

Citation for published version (APA):

Rooij, de, P. J. N., & van Lint, J. H. (1991). More on the minimum distance of cyclic codes. IEEE Transactions on

Information Theory, 37(1), 187-189. https://doi.org/10.1109/18.61137

DOI:

10.1109/18.61137

Document status and date:

Published: 01/01/1991

Document Version:

Publisher’s PDF, also known as Version of Record (includes final page, issue and volume numbers)

Please check the document version of this publication:

• A submitted manuscript is the version of the article upon submission and before peer-review. There can be

important differences between the submitted version and the official published version of record. People

interested in the research are advised to contact the author for the final version of the publication, or visit the

DOI to the publisher's website.

• The final author version and the galley proof are versions of the publication after peer review.

• The final published version features the final layout of the paper including the volume, issue and page

numbers.

Link to publication

General rights

Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain

• You may freely distribute the URL identifying the publication in the public portal.

If the publication is distributed under the terms of Article 25fa of the Dutch Copyright Act, indicated by the “Taverne” license above, please follow below link for the End User Agreement:

www.tue.nl/taverne Take down policy

If you believe that this document breaches copyright please contact us at: openaccess@tue.nl

providing details and we will investigate your claim.

(2)

IEEE TRANSACTIONS ON I N F O R M A T I O N THEORY. VOL. 37. N O . I , J A N U A R Y 1991 187

[3] J . H. Conway and N. J. A. Sloane, “Soft decoding techniques for codes and lattices. including the Golay code and the Leech lattice,” IEEE Truris. Itiform. Theory, vol. IT-32. no. 1, pp. 41-50. Jan. 1986. [4] G. D. Forney, Jr., “Coset codes 11: Binary lattices and related

codes.” IEEE Tram. Inform. Theon. vol. IT-34, n o . 5. pp. 1152-1 187, Sept. 1988.

[5] A. D. Abbaszadeh and C. K. Rushforth. “VLSI implementation of a maximum likelihood decoder for the Golay (24,12) code,” IEEE J . Select. Areus Comm., vol. SAC-6, pp. 558-565, 1988.

[6] J. Snyders and Y. Be’ery, “Maximum likelihood soft decoding of binary blocks codes and decoders for the Golay codes.” IEEE Trutis. Itzform. Theory, vol. 35, no. 5, pp, 963-975. Sept. 1989. [7] Y . Be‘ery and J . Snyders, “ A recursive Hadamard Transform opti-

mal soft-decision decoding algorithm”. SIAM J . Algehruic und Dis- crete Methods, vol. 8, pp. 778-789, 1987.

[8] R . H . Deng and M. A. Herro, “DC-free coset codes,” IEEE Trum. Inform. Theory. vol. 34, no. 4. pp. 786-792, July 1988.

[9] F. J . MacWilliams and N. J. A. Sloane, The Theory of Error Corrc,cting Codes. Amsterdam, The Netherlands: North-Holland, 1977.

[IO] E. R. Berlekamp. Algehruic Coding Theory. New York: McGraw- Hill. 1968.

[ I l l -, “Coding theory and the Mathieu groups,’’ Iriforrn. Contr., [I21 -, personal communication.

[I31 R. E. Blahut, Theory wid Pructice of Error Control Codes. Reading, MA: Addison-Wesley, 1983.

[I41 S. Harari, “A polynomial time algorithm for finding minimum weight codewords in a linear code,” IEEE I t i f . S y m p . Inform.

Tlreory, Brighton, England, June 1985.

[I51 J . S. Leon, “Computing automorphism groups of error-correcting codes,” IEEE Truns. Inform. Themy. vol. IT-28, no. 3, pp. 496-511, May 1982.

[I61 F. J . MacWilliams and J. Seery, “ T h e weight distributions of some minimal cyclic codes,” IEEE Trans. Inform. Theory. vol. IT-27, no. 6, p. 796. Nov. 1981.

(171 S. E. Tavares, P. E. Allard, and S. S. Shiva, “On the decomposition of cyclic codes into cyclic classes.” Inforni. Contr., vol. 18, pp. 342-354, 1971.

[IX] A. Vardy, J . Snyders, and Y. Be’ery, “Bounds on the dimension of codes and subcodes with prescribed contraction index,” Lineur Algehru Appl.. to appear. 1990.

vol. 18, pp. 40-64, 1971.

More on the Minimum Distance of Cyclic Codes

P. J.

N.

de Rooij and J. H. van Lint

Abstrad-It was recently shown that the so-called Jensen bound is generally weaker than the product method and the shifting method introduced by van Lint and Wilson. We show that the minimum distance of the two cyclic codes of length 65 for which it is known that the product method does not produce the desired result can be proved using Jensen’s method with some adaptations.

Index Terms-Minimum distance, 2-D-cyclic code, concatenated code, shifting.

I. I N IRODUCTION

In 1986 a new method for calculating the minimum distance of cyclic codes was developed by J. H. van Lint and R. M. Wilson [4]. Their paper contained two related methods: a ma-

Manuscript received December 18. 1989.

P. J . N. d e Rooij i5 with PTT Research Neher Lab. P.O. Box 421,

2260AK. Leidschendam. The Netherlands.

J . H . van Lint is with the Department of Mathematics and Computing Science. Eindhoven University o f Technology. P.O. Box 513. 5600MB. Eindhoven. The Netherlands.

IEEE Log Number 90392Yl.

trix-product method and a method called “shifting.” Previous

bounds, such as the BCH bound, the Hartmann-Tzeng bound and the method developed by Roos are all special eases of this method. It turned out that the minimum distance of all cyclic codes of length

<

63 (all codes in that paper are binary codes) with two exceptions can be determined using this method. The number o f cyclic codes of length 63 is exceedingly large, and it is still not clear how many of them can be handled by this method. For the codes of length 65, i t was shown by M. H. M. Smid [7] that again all but two of these codes can be handled by the product method. The first purpose of this correspondence is to determine the minimum distance of these two exceptional codes (for which presently only computer searches have established the minimum distance).

In 1985 J. M. Jensen [3] developed another method for calculating the minimum distance of cyclic codes based on the idea of Berlekamp and Justesen of representing these codes as two-dimensional cyclic codes. Jensen’s method was recently ana- lyzed by the first author in his master’s thesis [6] with the rather disappointing result that the method is usually weaker than shifting. (However, the amount of computation required for shifting is often quite large.) The second purpose of this corre- spondence is to show that, with some extra tricks, Jensen’s method is strong enough to handle the two cyclic codes of length 65 that could not be done by the product method. Clearly, it is not of great importance to consider two isolated examples of length 65, but the method of this correspondence can be used in many other situations e.g., for Blokh-Zyablov codes [ 2 ] . Hence,

explaining the methods that we use in our examples in Section I11 is our main goal.

In the following, we shall use terminology, notation, and results from the paper by Jensen on the structure of cyclic codes. We assume that the reader is familiar with that paper and also with the product method. In Section I1 we only briefly review what we shall need in the sequel.

11. D E F I N I T I O N S

Let G be an Abelian group of order nN that is the direct

product of two cyclic subgroups G., and G,. of order n resp.

N,

that is, G = G, x G,. contains (w.1.o.g.) the elements ( x ’ y ’ l 0 5

i

<

n A 0 5 j

<

N),

( i ‘ 7 = y = 1). Furthermore let q be a prime power and gcd(nN, q ) = 1.

Definition 2.1: The group algebra F<,G is the ring (with unity)

consisting of all (formal) polynomials n - l N - I

c ( x , y ) = c,,x‘yi, where c,) E F ,

I = ( ] I = ( )

Definition 2.2: A 2-D cyclic code of size n by

N

over the alphabet F(, is an ideal in F</G.

We represent a codeword by the corresponding polynomial or by the n X N matrix J J C , ~ ) ) . We shall not distinguish between

these notations.

If gcd(n,

N )

= 1 , then the Chinese remainder theorem shows

that every element x‘y’ is a power of Z = x y ; so, Z is a

generator of G. Thus G is cyclic.

Using this, the following can be derived (cf. [l]).

Theorem 2.3: If gcd(n, N ) = 1 and G and q are as above, The converse is true as well.

Theorem 2.4: A cyclic code of length n N , with gcd(n, N ) = 1 is 2-D cyclic.

In the following, . p i will denote a minimal cyclic code and we shall use the symbol 8 , for the idempotent of this codc. It is well then a 2-D cyclic code t in F<,G is cyclic.

(3)

188 IEEE TRANSACTIONS ON INFORMATION THEORY. VOL.. 37. NO. I, JANUARY I Y Y I

known that the code is isomorphic to the field of the same cardinality. Berlekamp and Justcsen have shown [ l ] that the concatenation of a minimal cyclic inner code ( 0 , ) of dimension k over F, and a cyclic outer code @, over F,h is (2-D) cyclic.

We denote this concatenation by ( 0 , ) 0 M,. For thc mapping

from a word in the inner code to the corresponding letter in the outer code, we choose the isomorphism

4 % :

( 0 , ) + F<,h given by

4 , ( a ( x ) ) = a ( @ , ) , where

p,

is a nonzero of the codc. Denote the inverse of

4 ,

as I),.

Notice that I),(I) is equal to the idempotent 0 , ( x ) of the inner code. Denote the mapping from a word in .&, to a matrix in ( 0 , ) 0 . @ , as

Vr,;

denote the inverse mapping as

a,.

(Vr,

is an injective homomorphism F,hG,. + F,G.)

Jensen has shown that a 2-D cyclic code in FcIG can be decomposed in a unique way into the direct sum of such concatenated codes

( e , )

0 9,. (For proofs see [3].) Before we

give this theorem, we introduce some notation. We have several inner codes ( 0 , ) now; so, we have several fields F,h too. From

now on we will denote the field F,h corresponding to .J%% by F,.

Let 0, = 9,(1). Then (0,) = T,(F5Gv). Jensen's result is as follows.

Theorem 2.5: Let 8

c

F<,G be a 2-D cyclic code. Then the

following holds:

1) d = @ , e l < with 8 , = d . O , c ( @ , ) and I = { s l 8 , # 0 } ;

2)

4

= ( 0 , ) 0

.g,,

where .@, =

a,(<).

In this way we can construct a 2-D cyclic code too, as follows

from the next theorem.

Theorem 2.6: Let there be given a number of minimal cyclic

codes ( 0 , ) of dimension k , in F,G, and cyclic codes

d,

in the rclatcd fields F , , s E I. Then

d

= C3, E , ( 0 , ) 0 24, is a 2-D cyclic code of dimension

E,

E ,k;dim(M,j.

We can easily derive a lower bound on the minimum distance of a (2-D) cyclic code from the decomposition into concatenated codes. Denote the minimum distances of the composing codes as

Take a word C E 8 of minimum weight, say c = E , E l c , , where c , E ( 0 , ) 0 &S. Now let 1 = max{s E l l c , # 0). Now c has at least d 2 / nonzero columns. Each of these columns is an

element of

a,=,.

, < / ( 0 , ) ; so, each of them has weight at least

d , / . With this we find the following theorem.

Theorem 2.7: Let 6 = C3,F,(0,)0.G8, with .H\cF,G,. for all s E 1. Then the minimum distance d of d7 satisfies:

d 2 min { dl,d2,11 E I). (1) The value of d found in this theorem still depends on the ordering of the idempotents

e,,

i.e., the ordering of the indices s as elements of I. We find the maximal value using the ordering of the 0, that satisfies d,, ~ d , , I . . . I d,?,, ,,,,, where s,,,

denotes max(s1s E I } . When applying Theorem 2.7 we will al- ways assume that the composing codes are ordered in this way. From now on we choose as index for a primitive idempotent 0, the smallest value of s satisfying

e ( @ ' )

f 0. So in this nota- tion, if p' is an nth root of unity and k is the smallest positive integer such that s q h

=

s(mod n ) , then 0,(x) is the idempotent of the code with generator g ( x ) = ( x " - I ) / [ ( x -

p ' ) . ( x

-

p w ) . . . ( x - p w h - '

11.

We will not renumber explicitly if we use

Theorem 2.7. Finally, we introduce the Jensen bound. Definirion 2.8: The Jensrn hound is the estimate for the

minimum distance of a cyclic code of length nN found by using Theorem 2.6 and Theorem 2.7.

The value of the Jensen bound depends on the choice of II and N (given n N ) , not on the choice of Z , the primitive riNth

root of unity a , or the

p,.

Finally, the following thcorcm gives a correspondence between the nonzeros of a 2-D cyclic code consisting of one concatenated code only, and thc nonzeros of its inner and outcr code. For a proof see [ 5 ] , Chapter 18.

Theorem 2.9: A pair ( P , y ) of an nth and an Nth root of unity is a nonzero of the 2-D cyclic code (0,)o .d if and only if

p

= p:' and y = f', where

p ,

is the nonzero of 0, that is used in the definition of

4 \ ,

and y, is a nonzero of .&.

Thc nonzeros of a 2-D cyclic code can bc found by taking the union of the nonzeros of its components.

111. APPLICA-IION OF T I I L J m s m BOUND

The Jenscn bound is based on thc fact that any nonzero column in a matrix, representing a codeword of a 2-D cyclic code, has weight at least equal to the minimum distance of the inner code. Let us call such a column with minimal positive weight a "light" column and a column with larger weight "hear y." Clearly, a stronger assertion than Theorem 2.7 can be made if one can show that in the representation of codewords of minimal weight, heavy columns must occur. As an introduction to our method we give the following example.

Example 3. I : Lct

p

be a primitive fifth root of unity in F , , . In our notation of Section 11,

PI = p .

Let 0 , be the primitive idempotent of the binary even weight code of length 5 (i.e., the code consisting of all the words of even weight) and let .@, be a cyclic code over FI,. Then the minimum distance of the code

t

= ( 0 , ) 0 93, is equal to 2.d(.%,) if and only if there is a word

b of minimum weight in M I such that none of its symbols is in

{1,p;..,p4).

In order to prove this, we first observe that there are only five words of weight 4 in ( 0 , ) and all other nonzero words have weight 2. The five heavy words are x ' 0 , , i = 0;

.

.,4. Furthermore I),(l) = 0 , and

I ) , ( p ' )

= x ' 0 , . From this it immedi- ately follows that a letter

p ' ,

i = 0 ; . .,4, results in a column

of weight 4, and all other nonzero letters (field elements of

F;"h that are not fifth roots of unity) give rise to a column of

weight 2.

Remark: We have in fact shown that the weight of a word

I ) , ( b ) in ( 0 , ) o

a,

is 4.l(ilb: = 1}1+2.l{ilb;'f. 0, 1)l.

We now treat cyclic codes of length 65. In the notation of Section 11, we take n = 5 , N = 13. The two minimal cyclic codes of length 5 are the repetition code ( O , , ) , isomorphic to F , , and

the even weight code

( e , ) ,

isomorphic to F , , . Let y be a primitive 13th root of unity in an extension field of F16. The minimal cyclic codes of length 13 over F , , are the codes M , - ,

with y ' as a nonzero ( i = 0,1,2,4,7; the only binary cyclic codes of length 13 are the repetition code and the even weight code. We denote a primitive element of F , , by

5

and we define the trace function tr: F , ,

-

F4 by

t r ( v ) :=

v

+

v J ,

(v

E F l h ) .

Furthermore, if c = ( c , , ; . .,cIZ), then we shall write t r ( c ) for the word with coordinates tr(c,).

Let cy be a primitive 65th root of unity (in F p ) . The minimal polynomial of a' is denoted by m , . We have x"'-1 =

m , l m l m 3 m 5 m , m 1 1 m 1 3 . We take p = cy13, y = a i .

The two cyclic codes of length 65 for which the method of van Lint and Wilson does not work have generators

m , , m , m , m , m , , and m O m l m , m l 3 . By computer search the min- imum distances of these codes were found to be 16, respectively 10. We shall now prove, using Jensen's method, that the mini- mum distances are at least this large (equality is easily estab- lished since in the proofs we find codewords of the specified weights).

Example 3.2: Let t, = ( m , , m , m 5 m , m l , 3 ) . The nonzeros of

6 , are the zeros of m , m , , . We claim that 6, = ( 0 , ) o ( M i @

(4)

I t L t TRANSACTIONS ON INFOKMATION THEOKY. V O L 17. N O I . J A N U A R Y I Y Y I 189

include By’ =CY’.’, a zero of mil, and p y x = a zcro of m 3 .

Since the concatcnatcd code has dimension 4 . ( 3

+

3 ) = 24 = d i m ( J / ) , we see that the concatenated code indeed equals 6’.

The outer code

.A,

= M i Cl3 M i has as zeros {y’li = 0,1,3,4,9,lO,I2). Observe that this set is closed under the mapping x + xJ; so the generator is a polynomial over F4. The zero set contains A B , whcrc A = ( y O , y I } , B ={y‘li = 0,3,9,12}. Hcncc by Theorem 3 (Roos) of [4] we havc d , 2 6. It is perhaps interesting to observe that the Jensen bound can be used to show that equality holds. For this purpose we use the binary cyclic code of length 39 with generator m , m 3 m I 3 . This codc has the subfield subcode of

.A,

ovcr F4 as its outer code. The code of length 39 has minimum distance 12 and from the Jensen bound we find that the distance is at least 2d(.%,) = 2 d 2 . Hence

d , = 6.

We now apply the Jensen bound to 6,. Since the minimum distance d , of

( e , )

is 2, we find d 2 2 . 6 = 12. The argument of Example 3.1 (Remark) shows that we can prove that d 2 16 by showing that a word b of weight 6 in .#, has at least two heavy letters and that a word b of weight 7 has at least one heavy letter. Notice that the heavy letters are p‘ =

t3‘,

0 I i

<

5 .

Case 1: Let w t ( b ) = 7 . Le! S : = ( 1 5 j 5 , j 1 0 ) ~ F l h . Note that S = F:. We shall write o =

5’.

The mapping tr maps .@, to its subfield subcode over FJ. This is in fact a quadratic residue code o f length 13 over F4. The nonzero elements of F , , occur in the sets [ ‘ S O I i < 4). The nonzero clcments of F I , with trace 0 form the sct S . Since w t ( b ) = 7, there must be two nonzero symbols in b corresponding to the same value of i. By consider- ing a suitable multiple of b, we may assume that this is i = 0. It follows that t r ( b ) has weight I 5 , which implies that t r ( b ) = 0.

So all seven nonzero symbols of b must be in S . Since the sum of these seven symbols is 0, all three elements of S must occur. From this we see that any word of weight 7 has as its nonzero symbols all three elements of one of the sets ( I S , and exactly one of these elements is heavy.

C u e 2: Let w t ( b ) = 6. By a suitable multiplication we can see to it that at least one nonzero coordinate is in S. By the same argument as above, this implies that t r ( b ) = 0, i.e., all nonzero symbols are in S. Now we are done if we can show that each element of S occurs twice. Since the sum of the nonzero symbols is 0, the only other possibilities are the following.

All nonzero symbols are the same. In this case there

would be a word of weight 6 in the subcode over F Z , but this code is (0). So this is impossible.

Two symbols of S occur, one twice and the other four

times. In that case .MI contains a word h ( y ) of the form h ( Y ) = W P l ( Y )

+

W 2 P d Y

1,

with p , ( y ) = I + y ’ , p ~ ( y ) = y “ + ) , ” + y ‘ + y ‘ ‘ . If we write

h ( Y > := W ’ P , ( Y >

+

W P ? ( Y ) ,

then h ( y ) is in the quadratic residuecode with zeros

(y’li= 0,2,5,6,7,8,11) and hence h ( y ) h ( y ) must be 0.

However,

h( Y >$( Y ) = P ? ( Y )

+

PI( Y > P 2 (

r

>

+

P; ( Y

>

>

a sum of 14 powers of y , namely, y ’ with

j = 0 , 2 i , 2 ~ , 2 h , 2 c , 2 d , a , h , c , ~ , u

+

i , h

+

i , c

+

i , d

+

i .

Since these powers must add up to 0, each exponent must occur an even number of times. I t is a simple cxercisc to show that this is impossiblc (without loss of generality one can assume that i = I ; the second occur- rence of 0 forces N = - 1; since 2 i = 2, we may assume

h = 2, etc.). So again we have an impossibility.

Ex-uniple 3.3: Let 6, = ( m , , m l m , m 1 3 ) . We shall show that the minimum distance of this code is at least IO. The nonzeros of 8’ are those of 6, and also the zeros of m , ( x ) , i.e., all 13th roots of unity # 1 (powers of y ) . Hencc

where M is the even weight code of length 13. So the matrices

of the last component in the direct sum have columns of zeros and an even number of columns with five ones (i.e., only ones). We saw in Example 3.2 that the matrices of ( 0 , ) 0

a,

have

I ) six columns, exactly two of which are heavy; 2) seven columns, at least two of which are light; 3) or at least eight nonzero columns.

In Case 1) adding a matrix of ( 0 , ) ) M can change a heavy

column into one of weight I , whereas a light column can keep weight 2 or get weight 3. So we obtain a word with weight at least 2 . 1 + 4 . 2 = 10.

In Case 2) we find a matrix of weight at least 5 . 1

+

3

+

2 = 10, since not all seven columns can be altered.

The only way to find a matrix of weight

<

10 in case (3) is from a word b in 6, with eight heavy columns. If this were

possible, then without loss of generality two of these heavy columns would correspond to the symbol 1 , the only heavy

symbol with trace 0. As before, t r ( b ) = O is impossible and

therefore t r ( b ) is a word of weight 6 in the code @, with all its nonzero elements equal to o or w 2 . We saw in Example 3.2 that such words d o not exist.

IV. CONCLUSION

Our methods show that the Jensen bound can be a powerful tool for the analysis of cyclic codes if it is possible to obtain information on the distribution of symbols in low-weight code- words of codes over extensions of F , . In his paper Jensen gives several examples of codes that are better than BCH codes. For all of them, the bound as given in Definition 2.8 is used for the analysis. So, it is possible that an extension of his ideas by the methods of Example 3.2 could yield even better codes.

The first author has applied the ideas of this correspondence to several other binary cyclic codes. For those codes, shifting also yields the minimum distance but it was often much easier to use the concatenated structure.

REFERENCIS

[ l ] E. R. Berlekamp and J. Justesen, “Some long cyclic linear binary codes are not so bad,” IEEE Trans. Inform. Theory, vol. IT-20, no. 3, pp. 351-356, May 1974.

[2] E. L. Blokh and V. V. Zyablov, “Coding of generalized concatenated codes,” Probl. Itiforni. Trans., vol. 10. no. 3, pp. 218-222, 1974. [ 3 ] J . M. Jensen, “The concatenated structure of cyclic and Abelian

codes,” IEEE Tram. Iti,forni. Theoty, vol. IT-31, no. 6, pp. 788-793, Nov. 1985.

[4] J . H. van Lint and R. M. Wilson, “On the minimum distance of cyclic codes,” IEEE Truns. Inform. Theory, vol. IT-32, no. 1, pp. 23-39, Jan. 1986.

[SI F. J. McWilliams and N. J. A. Sloane, The Theory of Error-Correcring Codes. New York: North-Holland, 1981.

[6] P. J . N. de Rooij, “On the use of the 2-D cyclic structure of cyclic codes. Master’s thesis. Eindhoven Univ. of Technol. 1989 (available on request).

171 M. Smid, “Binaire cvclische codes van lengte 65,” Technical Univ.

. .

Referenties

GERELATEERDE DOCUMENTEN

Omdat bij puntemissie in een korte tijd een relatief grote hoeveelheid middel in het water komt, zijn puntemissies meer verant- woordelijk voor piekconcentraties in op-

Op het moment dat er minder grondstof wordt afgebroken dan mogelijk is, zijn de resultaten niet meer betrouwbaar.. Vocht is ook een belangrijk aspect bij de afbraak

Wat er wordt beoordeeld en welke criteria daarbij aan de orde zijn, wordt bepaald door het motief voor de evaluatie en het actorperspectief van waaruit de beoordeling

Bij 4 of minder punten is de kans op schade groot en is het raadzaam andere om - standigheden te kiezen om het risico te verkleinen. Tabel 3 (rechts): Bij 6 of meer punten is de kans

Omdat John niet aanwezig kon zijn doet Ruud verslag.. namens de redactie

De uitgestrektheid van het gebied met miocene afzettingen waarin deze opgra- vingslokatie is gelegen, is beperkt en geheel omringd door oligocene afzet- tingen.. Het is een van de

Voor leden van de Association des geologues du bassin de Paris kost het FF. Voor niet-leden kost

Dat laatste hebben Yves van Kempen en Anthony Mertens gedaan in hun overzicht van het Nederlandse proza van de laatste vijf jaar in Het literair