-
On $(n,σ)-$equivalence relation between skew constacyclic codes
Authors:
Hassan Ou-azzou,
Mustapha Najmeddine,
Nuh Aydin
Abstract:
In this paper we generalize the notion of $n$-equivalence relation introduced by Chen et al. in \cite{Chen2014} to classify constacyclic codes of length $n$ over a finite field $\mathbb{F}_q$, where $q=p^r$ is a prime power, to the case of skew constacyclic codes without derivation. We call this relation $(n,σ)$-equivalence relation, where $n$ is the length of the code and $ σ$ is an automorphism…
▽ More
In this paper we generalize the notion of $n$-equivalence relation introduced by Chen et al. in \cite{Chen2014} to classify constacyclic codes of length $n$ over a finite field $\mathbb{F}_q$, where $q=p^r$ is a prime power, to the case of skew constacyclic codes without derivation. We call this relation $(n,σ)$-equivalence relation, where $n$ is the length of the code and $ σ$ is an automorphism of the finite field. We compute the number of $(n,σ)$-equivalence classes, and we give conditions on $ λ$ and $μ$ for which $(σ, λ)$-constacyclic codes and $(σ, λ)$-constacyclic codes are equivalent with respect to our $(n,σ)$-equivalence relation. Under some conditions on $n$ and $q$ we prove that skew constacyclic codes are equivalent to cyclic codes. We also prove that when $q$ is even and $σ$ is the Frobenius autmorphism, skew constacyclic codes of length $n$ are equivalent to cyclic codes when $\gcd(n,r)=1$. Finally we give some examples as applications of the theory developed here.
△ Less
Submitted 29 November, 2023; v1 submitted 29 November, 2023;
originally announced November 2023.
-
A New Hybrid Cryptosystem Involving DNA,Rabin, One Time Pad and Fiestel
Authors:
Sara Benatmane,
Nuh Aydin,
Behloul Djilali,
Prokash Barman
Abstract:
Information security is a crucial need in the modern world. Data security is a real concern, and many customers and organizations need to protect their sensitive information from unauthorized parties and attackers. In previous years, numerous cryptographic schemes have been proposed. DNA cryptography is a new and develo** field that combines the computational and biological worlds. DNA cryptogra…
▽ More
Information security is a crucial need in the modern world. Data security is a real concern, and many customers and organizations need to protect their sensitive information from unauthorized parties and attackers. In previous years, numerous cryptographic schemes have been proposed. DNA cryptography is a new and develo** field that combines the computational and biological worlds. DNA cryptography is intriguing due to its high storage capacity, secure data transport, and massive parallel computing. In this paper, a new combination is proposed that offers good security by combining DNA, the Rabin algorithm, one time pad, and a structure inspired by Fiestel. This algorithm employs two keys. The first key is a DNA OTP key which is used for only one secure communication session. The second key, which combines the public and private keys, is a Rabin key. Additionally, by using a Feistel inspired scheme and randomness provided by DNA, the ciphertext is made harder to obtain without the private key.
△ Less
Submitted 18 July, 2023;
originally announced July 2023.
-
An Updated Database of $\mathbb{Z}_4$ Codes
Authors:
Nuh Aydin,
Yiang Lu,
Vishad R. Onta
Abstract:
Research on codes over finite rings has intensified since the discovery in 1994 of the fact that some best binary non-linear codes can be obtained as images of $\mathbb{Z}_4$-linear codes. Codes over many different finite rings has been a subject of much research in coding theory after this discovery. Many of these rings are extensions of $\mathbb{Z}_4$. As a result, an online database of…
▽ More
Research on codes over finite rings has intensified since the discovery in 1994 of the fact that some best binary non-linear codes can be obtained as images of $\mathbb{Z}_4$-linear codes. Codes over many different finite rings has been a subject of much research in coding theory after this discovery. Many of these rings are extensions of $\mathbb{Z}_4$. As a result, an online database of $\mathbb{Z}_4$ was created in 2008. The URL of the original database on $\mathbb{Z}_4$ codes has recently changed. The purpose of this paper is to introduce the new, updated database of $\mathbb{Z}_4$ codes. We have made major updates to the database by adding 8701 new linear codes over $\mathbb{Z}_4$. These codes have been found through exhaustive computer searches on cyclic codes and by an implementation of the ASR search algorithm that has been remarkably fruitful to obtain new linear codes from the class of quasi-cyclic (QC) and quasi-twisted (QT) codes over finite fields. We made modifications to the ASR algorithm to make it work over $\mathbb{Z}_4$. The initial database contained few codes that were not free. We have added a large number of non-free codes. In fact, of the 8701 codes we have added, 7631 of them are non-free.
△ Less
Submitted 14 August, 2022;
originally announced August 2022.
-
Applications of Convolutional Codes to DNA Codes and Error-Correction
Authors:
Paridhi Latawa,
Nuh Aydin
Abstract:
Convolutional codes are error-correcting linear codes that utilize shift registers to encode. These codes have an arbitrary block size and they can incorporate both past and current information bits. DNA codes represent DNA sequences and are defined as sets of words comprised of the alphabet A, C, T, G satisfying certain mathematical bounds and constraints. The application of convolutional code mo…
▽ More
Convolutional codes are error-correcting linear codes that utilize shift registers to encode. These codes have an arbitrary block size and they can incorporate both past and current information bits. DNA codes represent DNA sequences and are defined as sets of words comprised of the alphabet A, C, T, G satisfying certain mathematical bounds and constraints. The application of convolutional code models to DNA codes is a growing field of biocomputation. As opposed to block codes, convolutional codes factor in nearby information bits, which makes them an optimal model for representing biological phenomena. This study explores the properties of both convolutional codes and DNA codes, as well as how convolutional codes are applied to DNA codes. It also proposes revisions to improve a current convolutional code model for DNA sequences.
△ Less
Submitted 7 November, 2021;
originally announced November 2021.
-
Differentially Private Linear Optimization for Multi-Party Resource Sharing
Authors:
Utku Karaca,
Nursen Aydin,
Sinan Yildirim,
S. Ilker Birbil
Abstract:
This study examines a resource-sharing problem involving multiple parties that agree to use a set of capacities together. We start with modeling the whole problem as a mathematical program, where all parties are required to exchange information to obtain the optimal objective function value. This information bears private data from each party in terms of coefficients used in the mathematical progr…
▽ More
This study examines a resource-sharing problem involving multiple parties that agree to use a set of capacities together. We start with modeling the whole problem as a mathematical program, where all parties are required to exchange information to obtain the optimal objective function value. This information bears private data from each party in terms of coefficients used in the mathematical program. Moreover, the parties also consider the individual optimal solutions as private. In this setting, the concern for the parties is the privacy of their data and their optimal allocations. We propose a two-step approach to meet the privacy requirements of the parties. In the first step, we obtain a reformulated model that is amenable to a decomposition scheme. Although this scheme eliminates almost all data exchanges, it does not provide a formal privacy guarantee. In the second step, we provide this guarantee with a locally differentially private algorithm, which does not need a trusted aggregator, at the expense of deviating slightly from the optimality. We provide bounds on this deviation and discuss the consequences of these theoretical results. We also propose a novel modification to increase the efficiency of the algorithm in terms of reducing the theoretical optimality gap. The study ends with a numerical experiment on a planning problem that demonstrates an application of the proposed approach. As we work with a general linear optimization model, our analysis and discussion can be used in different application areas including production planning, logistics, and revenue management.
△ Less
Submitted 4 January, 2024; v1 submitted 20 October, 2021;
originally announced October 2021.
-
A Generalization of the ASR Search Algorithm to 2-Generator Quasi-Twisted Codes
Authors:
Dev Akre,
Nuh Aydin,
Matthew J. Harrington,
Saurav R. Pandey
Abstract:
One of the main goals of coding theory is to construct codes with best possible parameters and properties. A special class of codes called quasi-twisted (QT) codes is well-known to produce codes with good parameters. Most of the work on QT codes has been over the 1-generator case. In this work, we focus on 2-generator QT codes and generalize the ASR algorithm that has been very effective to produc…
▽ More
One of the main goals of coding theory is to construct codes with best possible parameters and properties. A special class of codes called quasi-twisted (QT) codes is well-known to produce codes with good parameters. Most of the work on QT codes has been over the 1-generator case. In this work, we focus on 2-generator QT codes and generalize the ASR algorithm that has been very effective to produce new linear codes from 1-generator QT codes. Moreover, we also generalize a recent algorithm to test equivalence of cyclic codes to constacyclic codes. This algorithm makes the ASR search even more effective. As a result of implementing our algorithm, we have found 103 QT codes that are new among the class of QT codes. Additionally, most of these codes possess the following additional properties: a) they have the same parameters as best known linear codes, and b) many of the have additional desired properties such as being LCD and dual-containing. Further, we have also found a binary 2-generator QT code that is new (record breaking) among all binary linear codes and its extension yields another record breaking binary linear code.
△ Less
Submitted 20 August, 2021;
originally announced August 2021.
-
Additive Polycyclic Codes over $\mathbb{F}_{4}$ Induced by Binary Vectors and Some Optimal Codes
Authors:
Arezoo Soufi Karbaski,
Taher Abualrub,
Nuh Aydin,
Peihan Liu
Abstract:
In this paper we study the structure and properties of additive right and left polycyclic codes induced by a binary vector $a$ in $\mathbb{F}_{2}^{n}.$ We find the generator polynomials and the cardinality of these codes. We also study different duals for these codes. In particular, we show that if $C$ is a right polycyclic code induced by a vector $a\in \mathbb{F}_{2}^{n}$, then the Hermitian dua…
▽ More
In this paper we study the structure and properties of additive right and left polycyclic codes induced by a binary vector $a$ in $\mathbb{F}_{2}^{n}.$ We find the generator polynomials and the cardinality of these codes. We also study different duals for these codes. In particular, we show that if $C$ is a right polycyclic code induced by a vector $a\in \mathbb{F}_{2}^{n}$, then the Hermitian dual of $C$ is a sequential code induced by $a.$ As an application of these codes, we present examples of additive right polycyclic codes over $\mathbb{F}_{4}$ with more codewords than comparable optimal linear codes as well as optimal binary linear codes and optimal quantum codes obtained from additive right polycyclic codes over $\mathbb{F}_{4}.$
△ Less
Submitted 20 August, 2021;
originally announced August 2021.
-
A Generalization of Cyclic Code Equivalence Algorithm to Constacyclic Codes
Authors:
Dev Akre,
Nuh Aydin,
Matthew J. Harrington,
Saurav Pandey
Abstract:
Recently, a new algorithm to test equivalence of two cyclic codes has been introduced which is efficient and produced useful results. In this work, we generalize this algorithm to constacyclic codes. As an application of the algorithm we found many constacyclic codes with good parameters and properties. In particular, we found 23 new codes that improve the minimum distances of BKLCs.
Recently, a new algorithm to test equivalence of two cyclic codes has been introduced which is efficient and produced useful results. In this work, we generalize this algorithm to constacyclic codes. As an application of the algorithm we found many constacyclic codes with good parameters and properties. In particular, we found 23 new codes that improve the minimum distances of BKLCs.
△ Less
Submitted 19 August, 2021;
originally announced August 2021.
-
New Binary and Ternary Quasi-Cyclic Codes with Good Properties
Authors:
Dev Akre,
Nuh Aydin,
Matthew J. Harrington,
Saurav R. Pandey
Abstract:
One of the most important and challenging problems in coding theory is to construct codes with best possible parameters and properties. The class of quasi-cyclic (QC) codes is known to be fertile to produce such codes. Focusing on QC codes over the binary field, we have found 113 binary QC codes that are new among the class of QC codes using an implementation of a fast cyclic partitioning algorith…
▽ More
One of the most important and challenging problems in coding theory is to construct codes with best possible parameters and properties. The class of quasi-cyclic (QC) codes is known to be fertile to produce such codes. Focusing on QC codes over the binary field, we have found 113 binary QC codes that are new among the class of QC codes using an implementation of a fast cyclic partitioning algorithm and the highly effective ASR algorithm. Moreover, these codes have the following additional properties: a) they have the same parameters as best known linear codes, and b) many of the have additional desired properties such as being reversible, LCD, self-orthogonal or dual-containing. Additionally, we present an algorithm for the generation of new codes from QC codes using ConstructionX, and introduce 35 new record breaking linear codes produced from this method.
△ Less
Submitted 15 August, 2021;
originally announced August 2021.
-
A Database of Quantum Codes
Authors:
Nuh Aydin,
Peihan Liu,
Bryan Yoshino
Abstract:
Quantum error correcting codes (QECC) is becoming an increasingly important branch of coding theory. For classical block codes, a \href{codetables.de} {comprehensive database of best known codes} exists which is available online at \cite{codetables}. The same database contains data on best known quantum codes as well, but only for the binary field. There has been an increased interest in quantum c…
▽ More
Quantum error correcting codes (QECC) is becoming an increasingly important branch of coding theory. For classical block codes, a \href{codetables.de} {comprehensive database of best known codes} exists which is available online at \cite{codetables}. The same database contains data on best known quantum codes as well, but only for the binary field. There has been an increased interest in quantum codes over larger fields with many papers reporting such codes in the literature. However, to the best of our knowledge, there is no database of best known quantum codes for most fields. We established a new database of QECC that includes codes over $\mathbb{F}_{q^2}$ for $q\leq 29$. We also present several methods of constructing quantum codes from classical codes based on the CSS construction. We have found dozens of new quantum codes that improve the previously known parameters and also hundreds new quantum codes that did not exist in the literature.
△ Less
Submitted 8 August, 2021;
originally announced August 2021.
-
A New Algorithm for Equivalence of Cyclic Codes and Its Applications
Authors:
Nuh Aydin,
R. Oliver VandenBerg
Abstract:
Cyclic codes are among the most important families of codes in coding theory for both theoretical and practical reasons. Despite their prominence and intensive research on cyclic codes for over a half century, there are still open problems related to cyclic codes. In this work, we use recent results on the equivalence of cyclic codes to create a more efficient algorithm to partition cyclic codes b…
▽ More
Cyclic codes are among the most important families of codes in coding theory for both theoretical and practical reasons. Despite their prominence and intensive research on cyclic codes for over a half century, there are still open problems related to cyclic codes. In this work, we use recent results on the equivalence of cyclic codes to create a more efficient algorithm to partition cyclic codes by equivalence based on cyclotomic cosets. This algorithm is then implemented to carry out computer searches for both cyclic codes and quasi-cyclic (QC) codes with good parameters. We also generalize these results to repeated-root cases. We have found several new linear codes that are cyclic or QC as an application of the new approach, as well as more desirable constructions for linear codes with best known parameters. With the additional new codes obtained through standard constructions, we have found a total of 14 new linear codes.
△ Less
Submitted 30 June, 2021;
originally announced July 2021.
-
Polycyclic Codes Associated with Trinomials: Good Codes and Open Questions
Authors:
Nuh Aydin,
Peihan Liu,
Bryan Yoshino
Abstract:
Polycyclic codes are a generalization of cyclic and constacyclic codes. Even though they have been known since 1972 and received some attention more recently, there have not been many studies on polycyclic codes. This paper presents an in-depth investigation of polycyclic codes associated with trinomials. Our results include a number of facts about trinomials, some properties of polycyclic codes,…
▽ More
Polycyclic codes are a generalization of cyclic and constacyclic codes. Even though they have been known since 1972 and received some attention more recently, there have not been many studies on polycyclic codes. This paper presents an in-depth investigation of polycyclic codes associated with trinomials. Our results include a number of facts about trinomials, some properties of polycyclic codes, and many new quantum codes derived from polycyclic codes. We also state several conjectures about polynomials and polycyclic codes. Hence, we show useful features of polycyclic codes and present some open problems related to them.
△ Less
Submitted 22 June, 2021;
originally announced June 2021.
-
Masking Primal and Dual Models for Data Privacy in Network Revenue Management
Authors:
Utku Karaca,
S. Ilker Birbil,
Nursen Aydin,
Gizem Mullaoglu
Abstract:
We study a collaborative revenue management problem where multiple decentralized parties agree to share some of their capacities. This collaboration is performed by constructing a large mathematical programming model available to all parties. The parties then use the solution of this model in their own capacity control systems. In this setting, however, the major concern for the parties is the pri…
▽ More
We study a collaborative revenue management problem where multiple decentralized parties agree to share some of their capacities. This collaboration is performed by constructing a large mathematical programming model available to all parties. The parties then use the solution of this model in their own capacity control systems. In this setting, however, the major concern for the parties is the privacy of their input data along with their individual optimal solutions. We first reformulate a general linear programming model that can be used for a wide-range of network revenue management problems. Then, we address the data-privacy concern of the reformulated model and propose an approach based on solving an equivalent data-private model constructed with input masking via random transformations. Our main result shows that after solving the data-private model, each party can safely access only its own optimal capacity control decisions. We also discuss the security of the transformed problem in the considered multi-party setting. We conduct simulation experiments to support our results and evaluate the computational efficiency of the proposed data-private model. Our work provides an analytical approach and insights on how to manage shared resources in a network problem while ensuring data privacy. Constructing and solving the collaborative network problem requires information exchange between parties which may not be possible in practice. Including data-privacy in decentralized collaborative network revenue management problems with capacity sharing is new to the literature and relevant to practice.
△ Less
Submitted 29 December, 2021; v1 submitted 14 February, 2021;
originally announced February 2021.
-
Decision and Feature Level Fusion of Deep Features Extracted from Public COVID-19 Data-sets
Authors:
Hamza Osman Ilhan,
Gorkem Serbes,
Nizamettin Aydin
Abstract:
The Coronavirus (COVID-19), which is an infectious pulmonary disorder, has affected millions of people and has been declared as a global pandemic by the WHO. Due to highly contagious nature of COVID-19 and its high possibility of causing severe conditions in the patients, the development of rapid and accurate diagnostic tools have gained importance. The real-time reverse transcription-polymerize c…
▽ More
The Coronavirus (COVID-19), which is an infectious pulmonary disorder, has affected millions of people and has been declared as a global pandemic by the WHO. Due to highly contagious nature of COVID-19 and its high possibility of causing severe conditions in the patients, the development of rapid and accurate diagnostic tools have gained importance. The real-time reverse transcription-polymerize chain reaction (RT-PCR) is used to detect the presence of Coronavirus RNA by using the mucus and saliva mixture samples. But, RT-PCR suffers from having low-sensitivity especially in the early stage. Therefore, the usage of chest radiography has been increasing in the early diagnosis of COVID-19 due to its fast imaging speed, significantly low cost and low dosage exposure of radiation. In our study, a computer-aided diagnosis system for X-ray images based on convolutional neural networks (CNNs), which can be used by radiologists as a supporting tool in COVID-19 detection, has been proposed. Deep feature sets extracted by using CNNs were concatenated for feature level fusion and fed to multiple classifiers in terms of decision level fusion idea with the aim of discriminating COVID-19, pneumonia and no-finding classes. In the decision level fusion idea, a majority voting scheme was applied to the resultant decisions of classifiers. The obtained accuracy values and confusion matrix based evaluation criteria were presented for three progressively created data-sets. The aspects of the proposed method that are superior to existing COVID-19 detection studies have been discussed and the fusion performance of proposed approach was validated visually by using Class Activation Map** technique. The experimental results show that the proposed approach has attained high COVID-19 detection performance that was proven by its comparable accuracy and superior precision/recall values with the existing studies.
△ Less
Submitted 17 November, 2020;
originally announced November 2020.
-
Good Classical and Quantum Codes from Multi-Twisted Codes
Authors:
Nuh Aydin,
Thomas Guidotti,
Peihan Liu
Abstract:
Multi-twisted (MT) codes were introduced as a generalization of quasi-twisted (QT) codes. QT codes have been known to contain many good codes. In this work, we show that codes with good parameters and desirable properties can be obtained from MT codes. These include best known and optimal classical codes with additional properties such as reversibility and self-duality, and new and best known non-…
▽ More
Multi-twisted (MT) codes were introduced as a generalization of quasi-twisted (QT) codes. QT codes have been known to contain many good codes. In this work, we show that codes with good parameters and desirable properties can be obtained from MT codes. These include best known and optimal classical codes with additional properties such as reversibility and self-duality, and new and best known non-binary quantum codes obtained from special cases MT codes. Often times best known quantum codes in the literature are obtained indirectly by considering extension rings. Our constructions have the advantage that we obtain these codes by more direct and simpler methods. Additionally, we found theoretical results about binomials over finite fields that are useful in our search.
△ Less
Submitted 16 August, 2020;
originally announced August 2020.
-
New Linear Codes as Quasi-Twisted Codes from Long Constacyclic Codes
Authors:
Nuh Aydin,
Thomas Guidotti,
Peihan Liu
Abstract:
One of the most important and challenging problems in coding theory is to determine the optimal values of the parameters of a linear code and to explicitly construct codes with optimal parameters, or as close to the optimal values as possible. The class of quasi-twisted (QT) codes has been very promising in this regard. Over the past few decades various search algorithms to construct QT codes with…
▽ More
One of the most important and challenging problems in coding theory is to determine the optimal values of the parameters of a linear code and to explicitly construct codes with optimal parameters, or as close to the optimal values as possible. The class of quasi-twisted (QT) codes has been very promising in this regard. Over the past few decades various search algorithms to construct QT codes with better parameters have been employed. Most of these algorithms (such as ASR) start by joining constacyclic codes of smaller lengths to obtain QT codes of longer lengths. There has been an algorithm that works in the opposite way that constructs shorter QT codes from long constacyclic codes. We modified and generalized this algorithm and obtained new linear codes via its implementation. We also observe that the new algorithm is related to the ASR algorithm.
△ Less
Submitted 1 July, 2020;
originally announced July 2020.
-
$\mathbb{Z}_{q}(\mathbb{Z}_{q}+u\mathbb{Z}_{q})$-Linear Skew Constacyclic Codes
Authors:
Ahlem Melakhessou,
Nuh Aydin,
Kenza Guenda
Abstract:
In this paper, we study skew constacyclic codes over the ring $\mathbb{Z}_{q}R$ where $R=\mathbb{Z}_{q}+u\mathbb{Z}_{q}$, $q=p^{s}$ for a prime $p$ and $u^{2}=0$. We give the definition of these codes as subsets of the ring $\mathbb{Z}_{q}^αR^β$. Some structural properties of the skew polynomial ring $ R[x,θ]$ are discussed, where $ θ$ is an automorphism of $R$. We describe the generator polynomia…
▽ More
In this paper, we study skew constacyclic codes over the ring $\mathbb{Z}_{q}R$ where $R=\mathbb{Z}_{q}+u\mathbb{Z}_{q}$, $q=p^{s}$ for a prime $p$ and $u^{2}=0$. We give the definition of these codes as subsets of the ring $\mathbb{Z}_{q}^αR^β$. Some structural properties of the skew polynomial ring $ R[x,θ]$ are discussed, where $ θ$ is an automorphism of $R$. We describe the generator polynomials of skew constacyclic codes over $ R $ and $\mathbb{Z}_{q}R$. Using Gray images of skew constacyclic codes over $\mathbb{Z}_{q}R$ we obtained some new linear codes over $\mathbb{Z}_4$. Further, we have generalized these codes to double skew constacyclic codes over $\mathbb{Z}_{q}R$.
△ Less
Submitted 13 October, 2018; v1 submitted 25 March, 2018;
originally announced March 2018.
-
Skew cyclic codes over $\mathbb{F}_{p}+u\mathbb{F}_{p}$
Authors:
Reza Dastbasteh,
Seyyed Hamed Mousavi,
Taher Abualrub,
Nuh Aydin,
Javad Haghighat
Abstract:
In this paper, we study skew cyclic codes with arbitrary length over the ring $R=\mathbb{F}_{p}+u\mathbb{F}_{p}$ where $p$ is an odd prime and $% u^{2}=0$. We characterize all skew cyclic codes of length $n$ as left $% R[x;θ]$-submodules of $R_{n}=R[x;θ]/\langle x^{n}-1\rangle $. We find all generator polynomials for these codes and describe their minimal spanning sets. Moreover, an encoding and d…
▽ More
In this paper, we study skew cyclic codes with arbitrary length over the ring $R=\mathbb{F}_{p}+u\mathbb{F}_{p}$ where $p$ is an odd prime and $% u^{2}=0$. We characterize all skew cyclic codes of length $n$ as left $% R[x;θ]$-submodules of $R_{n}=R[x;θ]/\langle x^{n}-1\rangle $. We find all generator polynomials for these codes and describe their minimal spanning sets. Moreover, an encoding and decoding algorithm is presented for skew cyclic codes over the ring $R$. Finally, based on the theory we developed in this paper, we provide examples of codes with good parameters over $F_{p}$ with different odd prime $p.$ In fact, example 25 in our paper is a new ternary code in the class of quasi-twisted codes. The other examples we provided are examples of optimal codes.
△ Less
Submitted 20 December, 2017;
originally announced December 2017.
-
A Generalization of Quasi-twisted Codes: Multi-twisted codes
Authors:
Nuh Aydin,
Ajdin Halilovic
Abstract:
Cyclic codes and their various generalizations, such as quasi-twisted (QT) codes, have a special place in algebraic coding theory. Among other things, many of the best-known or optimal codes have been obtained from these classes. In this work we introduce a new generalization of QT codes that we call multi-twisted (MT) codes and study some of their basic properties. Presenting several methods of c…
▽ More
Cyclic codes and their various generalizations, such as quasi-twisted (QT) codes, have a special place in algebraic coding theory. Among other things, many of the best-known or optimal codes have been obtained from these classes. In this work we introduce a new generalization of QT codes that we call multi-twisted (MT) codes and study some of their basic properties. Presenting several methods of constructing codes in this class and obtaining bounds on the minimum distances, we show that there exist codes with good parameters in this class that cannot be obtained as QT or constacyclic codes. This suggests that considering this larger class in computer searches is promising for constructing codes with better parameters than currently best-known linear codes. Working with this new class of codes motivated us to consider a problem about binomials over finite fields and to discover a result that is interesting in its own right.
△ Less
Submitted 4 January, 2017;
originally announced January 2017.
-
Time value of extra information against its timely value
Authors:
N. Serhan Aydin
Abstract:
We introduce an interactive market setup with sequential auctions where agents receive variegated signals with a known deadline. The effects of differential information and mutual learning on the allocation of overall profit \& loss (P\&L) and the pace of price discovery are analysed. We characterise the signal-based expected P\&L of agents based on explicit formulae for the directional quality of…
▽ More
We introduce an interactive market setup with sequential auctions where agents receive variegated signals with a known deadline. The effects of differential information and mutual learning on the allocation of overall profit \& loss (P\&L) and the pace of price discovery are analysed. We characterise the signal-based expected P\&L of agents based on explicit formulae for the directional quality of the trading signal, and study the optimal trading pattern using dynamic programming and provided that there is a common anticipation by agents of gains from trade. We find evidence in favour of exploiting new information whenever it arrives, and market efficiency. Brief extensions of the problem to risk-adjusted gains as well as risk-averse agents are provided. We then introduce the `information-adjusted risk premium' and recover the signal-based equilibrium price as the weighted average of the signal-based individual prices with respect to the risk-aversion levels.
△ Less
Submitted 13 October, 2016;
originally announced October 2016.
-
On constacyclic codes over $\mathbb{Z}_4[u]/\langle u^2-1\rangle$ and their Gray images
Authors:
Minjia Shi,
Liqing Qian,
Lin Sok,
Nuh Aydin,
Patrick Solé
Abstract:
We first define a new Gray map from $R=\mathbb{Z}_4+u\mathbb{Z}_4$ to $\mathbb{Z}^{2}_{4}$, where $u^2=1$ and study $(1+2u)$-constacyclic codes over $R$. Also of interest are some properties of $(1+2u)$-constacyclic codes over $R$. Considering their $\mathbb{Z}_4$ images, we prove that the Gray images of $(1+2u)$-constacyclic codes of length $n$ over $R$ are cyclic codes of length $2n$ over…
▽ More
We first define a new Gray map from $R=\mathbb{Z}_4+u\mathbb{Z}_4$ to $\mathbb{Z}^{2}_{4}$, where $u^2=1$ and study $(1+2u)$-constacyclic codes over $R$. Also of interest are some properties of $(1+2u)$-constacyclic codes over $R$. Considering their $\mathbb{Z}_4$ images, we prove that the Gray images of $(1+2u)$-constacyclic codes of length $n$ over $R$ are cyclic codes of length $2n$ over $\mathbb{Z}_4$. In many cases the latter codes have better parameters than those in the online database of Aydin and Asamov. We also give a corrected version of a table of new cyclic $R$-codes published by Özen et al. in Finite Fields and Their Applications, {\bf 38}, (2016) 27-39.
△ Less
Submitted 25 December, 2016; v1 submitted 2 August, 2016;
originally announced August 2016.
-
A Database of $\mathbb{Z}_4$ Codes
Authors:
Nuh Aydin,
Tsvetan Asamov
Abstract:
There has been much research on codes over $\mathbb{Z}_4$, sometimes called quaternary codes, for over a decade. Yet, no database is available for best known quaternary codes. This work introduces a new database for quaternary codes. It also presents a new search algorithm called genetic code search (GCS), as well as new quaternary codes obtained by existing and new search methods.
There has been much research on codes over $\mathbb{Z}_4$, sometimes called quaternary codes, for over a decade. Yet, no database is available for best known quaternary codes. This work introduces a new database for quaternary codes. It also presents a new search algorithm called genetic code search (GCS), as well as new quaternary codes obtained by existing and new search methods.
△ Less
Submitted 13 May, 2015;
originally announced May 2015.
-
On Isodual Cyclic Codes over Finite Fields and Finite Chain Rings: Monomial Equivalence
Authors:
Aicha Batoul,
Kenza Guenda,
T. Aaron Gulliver,
Nuh Aydin
Abstract:
This paper present the construction cyclic isodual codes over finite fields and finite chain rings. These codes are monomially equivalent to their dual. Conditions are given for the existence of cyclic isodual codes. In addition, the concept of duadic codes over finite fields is extended to finite chain rings. Several constructions of isodual cyclic codes and self-dual codes are given.
This paper present the construction cyclic isodual codes over finite fields and finite chain rings. These codes are monomially equivalent to their dual. Conditions are given for the existence of cyclic isodual codes. In addition, the concept of duadic codes over finite fields is extended to finite chain rings. Several constructions of isodual cyclic codes and self-dual codes are given.
△ Less
Submitted 15 August, 2016; v1 submitted 7 March, 2013;
originally announced March 2013.
-
Energy-Optimal Scheduling in Low Duty Cycle Sensor Networks
Authors:
Nursen Aydin,
Mehmet Karaca,
Ozgur Ercetin
Abstract:
Energy consumption of a wireless sensor node mainly depends on the amount of time the node spends in each of the high power active (e.g., transmit, receive) and low power sleep modes. It has been well established that in order to prolong node's lifetime the duty-cycle of the node should be low. However, low power sleep modes usually have low current draw but high energy cost while switching to the…
▽ More
Energy consumption of a wireless sensor node mainly depends on the amount of time the node spends in each of the high power active (e.g., transmit, receive) and low power sleep modes. It has been well established that in order to prolong node's lifetime the duty-cycle of the node should be low. However, low power sleep modes usually have low current draw but high energy cost while switching to the active mode with a higher current draw. In this work, we investigate a MaxWeightlike opportunistic sleep-active scheduling algorithm that takes into account time- varying channel and traffic conditions. We show that our algorithm is energy optimal in the sense that the proposed ESS algorithm can achieve an energy consumption which is arbitrarily close to the global minimum solution. Simulation studies are provided to confirm the theoretical results.
△ Less
Submitted 22 March, 2011; v1 submitted 18 March, 2011;
originally announced March 2011.
-
On the Construction of Skew Quasi-Cyclic Codes
Authors:
Taher Abualrub,
Ali Ghrayeb,
Nuh Aydin,
Irfan Siap
Abstract:
In this paper we study a special type of quasi-cyclic (QC) codes called skew QC codes. This set of codes is constructed using a non-commutative ring called the skew polynomial rings $F[x;θ]$. After a brief description of the skew polynomial ring $F[x;θ]$ it is shown that skew QC codes are left submodules of the ring $R_{s}^{l}=(F[x;θ]/(x^{s}-1))^{l}.$ The notions of generator and parity-check po…
▽ More
In this paper we study a special type of quasi-cyclic (QC) codes called skew QC codes. This set of codes is constructed using a non-commutative ring called the skew polynomial rings $F[x;θ]$. After a brief description of the skew polynomial ring $F[x;θ]$ it is shown that skew QC codes are left submodules of the ring $R_{s}^{l}=(F[x;θ]/(x^{s}-1))^{l}.$ The notions of generator and parity-check polynomials are given. We also introduce the notion of similar polynomials in the ring $F[x;θ]$ and show that parity-check polynomials for skew QC codes are unique up to similarity. Our search results lead to the construction of several new codes with Hamming distances exceeding the Hamming distances of the previously best known linear codes with comparable parameters.
△ Less
Submitted 13 September, 2008;
originally announced September 2008.