scholarly journals Upper bounds on the length function for covering codes with covering radius $ R $ and codimension $ tR+1 $

2022 ◽  
Vol 0 (0) ◽  
pp. 0
Author(s):  
Alexander A. Davydov ◽  
Stefano Marcugini ◽  
Fernanda Pambianco

<p style='text-indent:20px;'>The length function <inline-formula><tex-math id="M3">\begin{document}$ \ell_q(r,R) $\end{document}</tex-math></inline-formula> is the smallest length of a <inline-formula><tex-math id="M4">\begin{document}$ q $\end{document}</tex-math></inline-formula>-ary linear code with codimension (redundancy) <inline-formula><tex-math id="M5">\begin{document}$ r $\end{document}</tex-math></inline-formula> and covering radius <inline-formula><tex-math id="M6">\begin{document}$ R $\end{document}</tex-math></inline-formula>. In this work, new upper bounds on <inline-formula><tex-math id="M7">\begin{document}$ \ell_q(tR+1,R) $\end{document}</tex-math></inline-formula> are obtained in the following forms:</p><p style='text-indent:20px;'><disp-formula> <label/> <tex-math id="FE1"> \begin{document}$ \begin{equation*} \begin{split} &amp;(a)\; \ell_q(r,R)\le cq^{(r-R)/R}\cdot\sqrt[R]{\ln q},\; R\ge3,\; r = tR+1,\; t\ge1,\\ &amp;\phantom{(a)\; } q\;{\rm{ is \;an\; arbitrary \;prime\; power}},\; c{\rm{ \;is\; independent \;of\; }}q. \end{split} \end{equation*} $\end{document} </tex-math></disp-formula></p><p style='text-indent:20px;'><disp-formula> <label/> <tex-math id="FE2"> \begin{document}$ \begin{equation*} \begin{split} &amp;(b)\; \ell_q(r,R)&lt; 3.43Rq^{(r-R)/R}\cdot\sqrt[R]{\ln q},\; R\ge3,\; r = tR+1,\; t\ge1,\\ &amp;\phantom{(b)\; } q\;{\rm{ is \;an\; arbitrary\; prime \;power}},\; q\;{\rm{ is \;large\; enough}}. \end{split} \end{equation*} $\end{document} </tex-math></disp-formula></p><p style='text-indent:20px;'>In the literature, for <inline-formula><tex-math id="M8">\begin{document}$ q = (q')^R $\end{document}</tex-math></inline-formula> with <inline-formula><tex-math id="M9">\begin{document}$ q' $\end{document}</tex-math></inline-formula> a prime power, smaller upper bounds are known; however, when <inline-formula><tex-math id="M10">\begin{document}$ q $\end{document}</tex-math></inline-formula> is an arbitrary prime power, the bounds of this paper are better than the known ones.</p><p style='text-indent:20px;'>For <inline-formula><tex-math id="M11">\begin{document}$ t = 1 $\end{document}</tex-math></inline-formula>, we use a one-to-one correspondence between <inline-formula><tex-math id="M12">\begin{document}$ [n,n-(R+1)]_qR $\end{document}</tex-math></inline-formula> codes and <inline-formula><tex-math id="M13">\begin{document}$ (R-1) $\end{document}</tex-math></inline-formula>-saturating <inline-formula><tex-math id="M14">\begin{document}$ n $\end{document}</tex-math></inline-formula>-sets in the projective space <inline-formula><tex-math id="M15">\begin{document}$ \mathrm{PG}(R,q) $\end{document}</tex-math></inline-formula>. A new construction of such saturating sets providing sets of small size is proposed. Then the <inline-formula><tex-math id="M16">\begin{document}$ [n,n-(R+1)]_qR $\end{document}</tex-math></inline-formula> codes, obtained by geometrical methods, are taken as the starting ones in the lift-constructions (so-called "<inline-formula><tex-math id="M17">\begin{document}$ q^m $\end{document}</tex-math></inline-formula>-concatenating constructions") for covering codes to obtain infinite families of codes with growing codimension <inline-formula><tex-math id="M18">\begin{document}$ r = tR+1 $\end{document}</tex-math></inline-formula>, <inline-formula><tex-math id="M19">\begin{document}$ t\ge1 $\end{document}</tex-math></inline-formula>.</p>

2000 ◽  
Vol 11 (3) ◽  
pp. 261-264 ◽  
Author(s):  
Tricia S. Clement ◽  
Thomas R. Zentall

We tested the hypothesis that pigeons could use a cognitively efficient coding strategy by training them on a conditional discrimination (delayed symbolic matching) in which one alternative was correct following the presentation of one sample (one-to-one), whereas the other alternative was correct following the presentation of any one of four other samples (many-to-one). When retention intervals of different durations were inserted between the offset of the sample and the onset of the choice stimuli, divergent retention functions were found. With increasing retention interval, matching accuracy on trials involving any of the many-to-one samples was increasingly better than matching accuracy on trials involving the one-to-one sample. Furthermore, following this test, pigeons treated a novel sample as if it had been one of the many-to-one samples. The data suggest that rather than learning each of the five sample-comparison associations independently, the pigeons developed a cognitively efficient single-code/default coding strategy.


Author(s):  
J. Prabu ◽  
J. Mahalakshmi ◽  
C. Durairajan ◽  
S. Santhakumar

In this paper, we have constructed some new codes from [Formula: see text]-Simplex code called unit [Formula: see text]-Simplex code. In particular, we find the parameters of these codes and have proved that it is a [Formula: see text] [Formula: see text]-linear code, where [Formula: see text] and [Formula: see text] is a smallest prime divisor of [Formula: see text]. When rank [Formula: see text] and [Formula: see text] is a prime power, we have given the weight distribution of unit [Formula: see text]-Simplex code. For the rank [Formula: see text] we obtain the partial weight distribution of unit [Formula: see text]-Simplex code when [Formula: see text] is a prime power. Further, we derive the weight distribution of unit [Formula: see text]-Simplex code for the rank [Formula: see text] [Formula: see text].


2021 ◽  
Vol 35 (12) ◽  
pp. 1471-1476
Author(s):  
Houssem Bouchekara ◽  
Mostafa Smail ◽  
Mohamed Javaid ◽  
Sami Shamsah

An Enhanced version of the Salp Swarm Algorithm (SSA) referred to as (ESSA) is proposed in this paper for the optimization design of electromagnetic devices. The ESSA has the same structure as of the SSA with some modifications in order to enhance its performance for the optimization design of EMDs. In the ESSA, the leader salp does not move around the best position with a fraction of the distance between the lower and upper bounds as in the SAA; rather, a modified mechanism is used. The performance of the proposed algorithm is tested on the widely used Loney’s solenoid and TEAM Workshop Problem 22 design problems. The obtained results show that the proposed algorithm is much better than the initial one. Furthermore, a comparison with other well-known algorithms revealed that the proposed algorithm is very competitive for the optimization design of electromagnetic devices.


Author(s):  
Rajesh Prasad

Word matching problem is to find all the exact occurrences of a pattern P[0...m-1] in the text T[0...n-1], where P neither contains any white space nor preceded and followed by space. In the parameterized word matching problem, a given word P[0...m-1] is said to match with a sub-word t of the text T[0...n-1], if there exists a one-to-one correspondence between the symbols of P and the symbols of t. Exact Word Matching (EWM) problem has been previously solved by partitioning the text into number of tables in the pre-processing phase and then applying either brute force approach or fast hashing during the searching process. This paper presents an extension of EWM problem for parameterized word matching. It first split the text into number of tables in the pre-processing phase and then applying prev-encoding and bit-parallelism technique, Parameterized Shift-Or (PSO) during the searching phase. Experimental results show that this technique performs better than PSO.


1991 ◽  
Vol 37 (3) ◽  
pp. 660-664 ◽  
Author(s):  
P.R.J. Ostergard
Keyword(s):  

Author(s):  
Teeramet Inchaisri ◽  
Jirayu Phuto ◽  
Chakkrid Klin-Eam

In this paper, we focus on the algebraic structure of left negacyclic codes of length [Formula: see text] over the finite non-commutative chain ring [Formula: see text] where [Formula: see text] is an automorphism on [Formula: see text]. After that, the number of codewords of all left negacyclic codes is obtained. For each left negacyclic code, we also obtain the structure of its right dual code. In the remaining result, the number of distinct left negacyclic codes is given. Finally, a one-to-one correspondence between left negacyclic and left [Formula: see text]-constacyclic codes of length [Formula: see text] over [Formula: see text] is constructed via ring isomorphism, which carries over the results regarding left negacyclic codes corresponding to left [Formula: see text]-constacyclic codes of length [Formula: see text] over [Formula: see text] where [Formula: see text] is a nonzero element of the field [Formula: see text] such that [Formula: see text].


2016 ◽  
Vol 30 (4) ◽  
pp. 622-639 ◽  
Author(s):  
Gaofeng Da ◽  
Maochao Xu ◽  
Shouhuai Xu

In this paper, we propose a novel method for constructing upper bounds of the quasi-stationary distribution of SIS processes. Using this method, we obtain an upper bound that is better than the state-of-the-art upper bound. Moreover, we prove that the fixed point map Φ [7] actually preserves the equilibrium reversed hazard rate order under a certain condition. This allows us to further improve the upper bound. Some numerical results are presented to illustrate the results.


2015 ◽  
Vol 07 (03) ◽  
pp. 1550030
Author(s):  
C. Durairajan ◽  
J. Mahalakshmi ◽  
P. Chella Pandian

In this paper, we have defined ℤq-linear code and constructed some new codes. In particular, we have introduced the concept of ℤq-Simplex codes and proved that it is a [Formula: see text]-linear code for any integer q ≥ 2 and k ≥ 3 where p is the least order element in ℤq. We have given the weight distribution of ℤq-Simplex codes of dimension 2 when q is a prime power and when q is a product of distinct primes.


Sign in / Sign up

Export Citation Format

Share Document