More on codes for combinatorial composite DNA

IF 1.4 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS
Zuo Ye, Omer Sabary, Ryan Gabrys, Eitan Yaakobi, Ohad Elishco
{"title":"More on codes for combinatorial composite DNA","authors":"Zuo Ye, Omer Sabary, Ryan Gabrys, Eitan Yaakobi, Ohad Elishco","doi":"10.1007/s10623-025-01634-8","DOIUrl":null,"url":null,"abstract":"<p>In this paper, we focus on constructing unique-decodable and list-decodable codes for the recently studied (<i>t</i>, <i>e</i>)-composite-asymmetric error-correcting codes ((<i>t</i>, <i>e</i>)-CAECCs). Let <span>\\(\\mathcal {X}\\)</span> be an <span>\\(m \\times n\\)</span> binary matrix in which each row has Hamming weight <i>w</i>. If at most <i>t</i> rows of <span>\\(\\mathcal {X}\\)</span> contain errors, and in each erroneous row, there are at most <i>e</i> occurrences of <span>\\(1 \\rightarrow 0\\)</span> errors, we say that a (<i>t</i>, <i>e</i>)-composite-asymmetric error occurs in <span>\\(\\mathcal {X}\\)</span>. For general values of <i>m</i>, <i>n</i>, <i>w</i>, <i>t</i>, and <i>e</i>, we propose new constructions of (<i>t</i>, <i>e</i>)-CAECCs with redundancy at most <span>\\((t-1)\\log (m) + O(1)\\)</span>, where <i>O</i>(1) is independent of the code length <i>m</i>. In particular, this yields a class of (2, <i>e</i>)-CAECCs that are optimal in terms of redundancy. When <i>m</i> is a prime power, the redundancy can be further reduced to <span>\\((t-1)\\log (m) - O(\\log (m))\\)</span>. To further increase the code size, we introduce a combinatorial object called a weak <span>\\(B_e\\)</span>-set. When <span>\\(e = w\\)</span>, we present an efficient encoding and decoding method for our codes. Finally, we explore potential improvements by relaxing the requirement of unique decoding to list-decoding. We show that when the list size is <i>t</i>! or an exponential function of <i>t</i>, there exist list-decodable (<i>t</i>, <i>e</i>)-CAECCs with constant redundancy. When the list size is two, we construct list-decodable (3, 2)-CAECCs with redundancy <span>\\(\\log (m) + O(1)\\)</span>.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"1 1","pages":""},"PeriodicalIF":1.4000,"publicationDate":"2025-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Designs, Codes and Cryptography","FirstCategoryId":"100","ListUrlMain":"https://doi.org/10.1007/s10623-025-01634-8","RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0

Abstract

In this paper, we focus on constructing unique-decodable and list-decodable codes for the recently studied (te)-composite-asymmetric error-correcting codes ((te)-CAECCs). Let \(\mathcal {X}\) be an \(m \times n\) binary matrix in which each row has Hamming weight w. If at most t rows of \(\mathcal {X}\) contain errors, and in each erroneous row, there are at most e occurrences of \(1 \rightarrow 0\) errors, we say that a (te)-composite-asymmetric error occurs in \(\mathcal {X}\). For general values of mnwt, and e, we propose new constructions of (te)-CAECCs with redundancy at most \((t-1)\log (m) + O(1)\), where O(1) is independent of the code length m. In particular, this yields a class of (2, e)-CAECCs that are optimal in terms of redundancy. When m is a prime power, the redundancy can be further reduced to \((t-1)\log (m) - O(\log (m))\). To further increase the code size, we introduce a combinatorial object called a weak \(B_e\)-set. When \(e = w\), we present an efficient encoding and decoding method for our codes. Finally, we explore potential improvements by relaxing the requirement of unique decoding to list-decoding. We show that when the list size is t! or an exponential function of t, there exist list-decodable (te)-CAECCs with constant redundancy. When the list size is two, we construct list-decodable (3, 2)-CAECCs with redundancy \(\log (m) + O(1)\).

更多关于组合复合DNA的代码
本文主要研究了(t, e)-复合非对称纠错码((t, e)-CAECCs)的唯一可解码码和列表可解码码。设\(\mathcal {X}\)是一个\(m \times n\)二元矩阵,其中每一行都有汉明权值w。如果\(\mathcal {X}\)中最多t行包含错误,并且在每个错误行中,最多e次出现\(1 \rightarrow 0\)错误,我们说\(\mathcal {X}\)中出现了一个(t, e)-复合-不对称错误。对于m, n, w, t和e的一般值,我们提出了冗余度最多为\((t-1)\log (m) + O(1)\)的(t, e)-CAECCs的新结构,其中O(1)与代码长度m无关。特别是,这产生了一类冗余度最优的(2,e)-CAECCs。当m为素数幂时,冗余可进一步简化为\((t-1)\log (m) - O(\log (m))\)。为了进一步增加代码大小,我们引入了一个称为弱\(B_e\) -set的组合对象。当\(e = w\),我们提出了一个有效的编码和解码方法为我们的代码。最后,我们探讨了将唯一解码的要求放宽到列表解码的潜在改进。当列表大小为t!或t的指数函数,则存在具有常冗余的list- decoable (t, e)-CAECCs。当列表大小为2时,我们构建具有冗余\(\log (m) + O(1)\)的列表可解码(3,2)- caecc。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Designs, Codes and Cryptography
Designs, Codes and Cryptography 工程技术-计算机:理论方法
CiteScore
2.80
自引率
12.50%
发文量
157
审稿时长
16.5 months
期刊介绍: Designs, Codes and Cryptography is an archival peer-reviewed technical journal publishing original research papers in the designated areas. There is a great deal of activity in design theory, coding theory and cryptography, including a substantial amount of research which brings together more than one of the subjects. While many journals exist for each of the individual areas, few encourage the interaction of the disciplines. The journal was founded to meet the needs of mathematicians, engineers and computer scientists working in these areas, whose interests extend beyond the bounds of any one of the individual disciplines. The journal provides a forum for high quality research in its three areas, with papers touching more than one of the areas especially welcome. The journal also considers high quality submissions in the closely related areas of finite fields and finite geometries, which provide important tools for both the construction and the actual application of designs, codes and cryptographic systems. In particular, it includes (mostly theoretical) papers on computational aspects of finite fields. It also considers topics in sequence design, which frequently admit equivalent formulations in the journal’s main areas. Designs, Codes and Cryptography is mathematically oriented, emphasizing the algebraic and geometric aspects of the areas it covers. The journal considers high quality papers of both a theoretical and a practical nature, provided they contain a substantial amount of mathematics.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信