-
Deterministic Identification Codes for Fading Channels
Authors:
Ilya Vorobyev,
Christian Deppe,
Holger Boche
Abstract:
Many communication applications incorporate event-triggered behavior, where the conventional Shannon capacity may not effectively gauge performance. Consequently, we advocate for the concept of identification capacity as a more suitable metric for assessing these systems. We consider deterministic identification codes for the Gaussian AWGN, the slow fading, and the fast fading channels with power…
▽ More
Many communication applications incorporate event-triggered behavior, where the conventional Shannon capacity may not effectively gauge performance. Consequently, we advocate for the concept of identification capacity as a more suitable metric for assessing these systems. We consider deterministic identification codes for the Gaussian AWGN, the slow fading, and the fast fading channels with power constraints. We prove lower bounds on capacities for the slow and the fast fading channels with side information for a wide range of fading distributions. Additionally, we present the code construction with efficient encoding which achieves the lower bound on capacity both for the slow and the fast fading channels. At last, we prove the same lower bound on the capacity of the fast fading channel without side information, i.e. the same lower bound holds even when the receiver doesn't know the fading coefficients. As a result we show that compared with Shannon's message transmission paradigm we achieved completely different capacity scaling for deterministic identification codes for all relevant fading channels.
△ Less
Submitted 8 May, 2024; v1 submitted 3 April, 2024;
originally announced April 2024.
-
Efficient Combinatorial Group Testing: Bridging the Gap between Union-Free and Disjunctive Codes
Authors:
Daniil Goshkoder,
Nikita Polyanskii,
Ilya Vorobyev
Abstract:
This work focuses on non-adaptive group testing, with a primary goal of efficiently identifying a set of at most $d$ defective elements among a given set of elements using the fewest possible number of tests. Non-adaptive combinatorial group testing often employs disjunctive codes and union-free codes. This paper discusses union-free codes with fast decoding (UFFD codes), a recently introduced cla…
▽ More
This work focuses on non-adaptive group testing, with a primary goal of efficiently identifying a set of at most $d$ defective elements among a given set of elements using the fewest possible number of tests. Non-adaptive combinatorial group testing often employs disjunctive codes and union-free codes. This paper discusses union-free codes with fast decoding (UFFD codes), a recently introduced class of union-free codes that combine the best of both worlds -- the linear complexity decoding of disjunctive codes and the fewest number of tests of union-free codes. In our study, we distinguish two subclasses of these codes -- one subclass, denoted as $(=d)$-UFFD codes, can be used when the number of defectives $d$ is a priori known, whereas $(\le d)$-UFFD codes works for any subset of at most $d$ defectives. Previous studies have established a lower bound on the rate of these codes for $d=2$. Our contribution lies in deriving new lower bounds on the rate for both $(=d)$- and $(\le d)$-UFFD codes for an arbitrary number $d \ge 2$ of defectives. Our results show that for $d\to\infty$, the rate of $(=d)$-UFFD codes is twice as large as the best-known lower bound on the rate of $d$-disjunctive codes. In addition, the rate of $(\le d)$-UFFD code is shown to be better than the known lower bound on the rate of $d$-disjunctive codes for small values of $d$.
△ Less
Submitted 29 January, 2024;
originally announced January 2024.
-
Correcting One Error in Non-Binary Channels with Feedback
Authors:
Ilya Vorobyev,
Vladimir Lebedev,
Alexey Lebedev
Abstract:
In this paper, the problem of correction of a single error in $q$-ary symmetric channel with noiseless feedback is considered. We propose an algorithm to construct codes with feedback inductively. For all prime power $q$ we prove that two instances of feedback are sufficient to transmit over the $q$-ary symmetric channel the same number of messages as in the case of complete feedback. Our other co…
▽ More
In this paper, the problem of correction of a single error in $q$-ary symmetric channel with noiseless feedback is considered. We propose an algorithm to construct codes with feedback inductively. For all prime power $q$ we prove that two instances of feedback are sufficient to transmit over the $q$-ary symmetric channel the same number of messages as in the case of complete feedback. Our other contribution is the construction of codes with one-time feedback with the same parameters as Hamming codes for $q$ that is not a prime power. We also construct single-error-correcting codes with one-time feedback of size $q^{n-2}$ for arbitrary $q$ and $n\leq q+1$, which can be seen as an analog for Reed-Solomon codes.
△ Less
Submitted 11 May, 2023;
originally announced May 2023.
-
Codes Correcting a Single Long Duplication Error
Authors:
Daniil Goshkoder,
Nikita Polyanskii,
Ilya Vorobyev
Abstract:
We consider the problem of constructing a code capable of correcting a single long tandem duplication error of variable length. As the main contribution of this paper, we present a $q$-ary efficiently encodable code of length $n+1$ and redundancy $1$ that can correct a single duplication of length at least $K=4\cdot\lceil \log_q n\rceil +1$. The complexity of encoding is $O(\frac{n^2}{\log n})$ an…
▽ More
We consider the problem of constructing a code capable of correcting a single long tandem duplication error of variable length. As the main contribution of this paper, we present a $q$-ary efficiently encodable code of length $n+1$ and redundancy $1$ that can correct a single duplication of length at least $K=4\cdot\lceil \log_q n\rceil +1$. The complexity of encoding is $O(\frac{n^2}{\log n})$ and the complexity of decoding is $O(n)$. We also present a $q$-ary non-efficient code of length $n+1$ correcting single long duplication of length at least $K = \lceil \log_q n\rceil +φ(n)$, where $φ(n)\rightarrow{\infty}$ as $n\rightarrow{\infty}$. This code has redundancy less than $1$ for sufficiently large $n$. Moreover, we show that in the class of codes correcting a single long duplication with redundancy $1$, the value $K$ in our constructions is order-optimal.
△ Less
Submitted 24 April, 2023;
originally announced April 2023.
-
Secure Codes with List Decoding
Authors:
Yujie Gu,
Ilya Vorobyev,
Ying Miao
Abstract:
In this paper we consider combinatorial secure codes in traitor tracing for protecting copyright of multimedia content. First, we introduce a new notion of secure codes with list decoding (SCLDs) for collusion-resistant multimedia fingerprinting, which includes many existing types of fingerprinting codes as special cases. Next, we build efficient identifying algorithms for SCLDs with complete trac…
▽ More
In this paper we consider combinatorial secure codes in traitor tracing for protecting copyright of multimedia content. First, we introduce a new notion of secure codes with list decoding (SCLDs) for collusion-resistant multimedia fingerprinting, which includes many existing types of fingerprinting codes as special cases. Next, we build efficient identifying algorithms for SCLDs with complete traceability and establish bounds on its largest possible code rate. In comparison with the existing fingerprinting codes, it is shown that SCLDs have not only much more efficient traceability than separable codes but also a much larger code rate than frameproof codes. As a byproduct, new bounds on the largest code rate of binary separable codes are established as well. Furthermore, a two-stage dynamic traitor tracing framework is proposed for multimedia fingerprinting in the dynamic scenario, which could not only efficiently achieve the complete traceability but also provide a much larger capacity than the static scenario.
△ Less
Submitted 5 February, 2023;
originally announced February 2023.
-
Correcting one error in channels with feedback
Authors:
Ilya Vorobyev,
Alexey Lebedev,
Vladimir Lebedev,
Christian Deppe
Abstract:
We address the problem of correcting a single error in an arbitrary discrete memoryless channel with error-free instantaneous feedback. For the case of a one-time feedback, we propose a method for constructing optimal transmission strategies. The obtained result allows us to prove that for a binary channel, two feedbacks are sufficient to transmit the same number of messages as in the case of comp…
▽ More
We address the problem of correcting a single error in an arbitrary discrete memoryless channel with error-free instantaneous feedback. For the case of a one-time feedback, we propose a method for constructing optimal transmission strategies. The obtained result allows us to prove that for a binary channel, two feedbacks are sufficient to transmit the same number of messages as in the case of complete feedback. We also apply the developed techniques to a binary asymmetric channel to construct transmission strategies for small lengths.
△ Less
Submitted 4 January, 2023;
originally announced January 2023.
-
Letter of Intent: the NA60+ experiment
Authors:
C. Ahdida,
G. Alocco,
F. Antinori,
M. Arba,
M. Aresti,
R. Arnaldi,
A. Baratto Roldan,
S. Beole,
A. Beraudo,
J. Bernhard,
L. Bianchi,
M. Borysova,
S. Bressler,
S. Bufalino,
E. Casula,
C. Cicalo,
S. Coli,
P. Cortese,
A. Dainese,
H. Danielsson,
A. De Falco,
K. Dehmelt,
A. Drees,
A. Ferretti,
F. Fionda
, et al. (37 additional authors not shown)
Abstract:
We propose a new fixed-target experiment for the study of electromagnetic and hard probes of the Quark-Gluon Plasma (QGP) in heavy-ion collisions at the CERN SPS. The experiment aims at performing measurements of the dimuon spectrum from threshold up to the charmonium region, and of hadronic decays of charm and strange hadrons. It is based on a muon spectrometer, which includes a toroidal magnet a…
▽ More
We propose a new fixed-target experiment for the study of electromagnetic and hard probes of the Quark-Gluon Plasma (QGP) in heavy-ion collisions at the CERN SPS. The experiment aims at performing measurements of the dimuon spectrum from threshold up to the charmonium region, and of hadronic decays of charm and strange hadrons. It is based on a muon spectrometer, which includes a toroidal magnet and six planes of tracking detectors, coupled to a vertex spectrometer, equipped with Si MAPS immersed in a dipole field. High luminosity is an essential requirement for the experiment, with the goal of taking data with 10$^6$ incident ions/s, at collision energies ranging from $\sqrt{s_{\rm NN}} = 6.3$ GeV ($E_{\rm lab}= 20$ A GeV) to top SPS energy ($\sqrt{s_{\rm NN}} = 17.3$ GeV, $E_{\rm lab}= 158$ A GeV). This document presents the physics motivation, the foreseen experimental set-up including integration and radioprotection studies, the current detector choices together with the status of the corresponding R&D, and the outcome of physics performance studies. A preliminary cost evaluation is also carried out.
△ Less
Submitted 29 December, 2022;
originally announced December 2022.
-
Note on generalized group testing
Authors:
Ilya Vorobyev
Abstract:
In this note, we present a new adaptive algorithm for generalized group testing, which is asymptotically optimal if $d=o(\log_2|E|)$, $E$ is a set of potentially contaminated sets, $d$ is a maximal size of elements of $E$. Also, we design a 3-stage algorithm, which is asymptotically optimal for $d=2$.
In this note, we present a new adaptive algorithm for generalized group testing, which is asymptotically optimal if $d=o(\log_2|E|)$, $E$ is a set of potentially contaminated sets, $d$ is a maximal size of elements of $E$. Also, we design a 3-stage algorithm, which is asymptotically optimal for $d=2$.
△ Less
Submitted 8 November, 2022;
originally announced November 2022.
-
Non-adaptive and two-stage coding over the Z-channel
Authors:
Alexey Lebedev,
Ilya Vorobyev,
Vladimir Lebedev,
Christian Deppe
Abstract:
In this paper, we developed new coding strategies for the Z-channel. In particular, we look at the case with two-stage encoding. In this case, the encoder uses noiseless feedback once and adjusts the further encoding strategy based on the previous partial output of the channel. Nevertheless, the developed codes improve the known results with full feedback for small length and 1 error. A tool for t…
▽ More
In this paper, we developed new coding strategies for the Z-channel. In particular, we look at the case with two-stage encoding. In this case, the encoder uses noiseless feedback once and adjusts the further encoding strategy based on the previous partial output of the channel. Nevertheless, the developed codes improve the known results with full feedback for small length and 1 error. A tool for the two-stage strategy is the development of a new optimality condition for non-adaptive codes.
△ Less
Submitted 8 September, 2022; v1 submitted 31 January, 2022;
originally announced February 2022.
-
Reevaluation of the cosmic antideuteron flux from cosmic-ray interactions and from exotic sources
Authors:
Laura Šerkšnytė,
Stephan Königstorfer,
Philip von Doetinchem,
Laura Fabbietti,
Diego Mauricio Gomez-Coral,
Johannes Herms,
Alejandro Ibarra,
Thomas Pöschl,
Anirvan Shukla,
Andrew Strong,
Ivan Vorobyev
Abstract:
Cosmic-ray antideuterons could be a key for the discovery of exotic phenomena in our Galaxy, such as dark-matter annihilations or primordial black hole evaporation. Unfortunately the theoretical predictions of the antideuteron flux at Earth are plagued with uncertainties from the mechanism of antideuteron production and propagation in the Galaxy. We present the most up-to-date calculation of the a…
▽ More
Cosmic-ray antideuterons could be a key for the discovery of exotic phenomena in our Galaxy, such as dark-matter annihilations or primordial black hole evaporation. Unfortunately the theoretical predictions of the antideuteron flux at Earth are plagued with uncertainties from the mechanism of antideuteron production and propagation in the Galaxy. We present the most up-to-date calculation of the antideuteron fluxes from cosmic-ray collisions with the interstellar medium and from exotic processes. We include for the first time the antideuteron inelastic interaction cross section recently measured by the ALICE collaboration to account for the loss of antideuterons during propagation. In order to bracket the uncertainty in the expected fluxes, we consider several state-of-the-art models of antideuteron production and of cosmic-ray propagation.
△ Less
Submitted 6 April, 2022; v1 submitted 3 January, 2022;
originally announced January 2022.
-
Lifted Reed-Solomon Codes and Lifted Multiplicity Codes
Authors:
Lukas Holzbaur,
Rina Polyanskaya,
Nikita Polyanskii,
Ilya Vorobyev,
Eitan Yaakobi
Abstract:
Lifted Reed-Solomon and multiplicity codes are classes of codes, constructed from specific sets of $m$-variate polynomials. These codes allow for the design of high-rate codes that can recover every codeword or information symbol from many disjoint sets. Recently, the underlying approaches have been combined for the bi-variate case to construct lifted multiplicity codes, a generalization of lifted…
▽ More
Lifted Reed-Solomon and multiplicity codes are classes of codes, constructed from specific sets of $m$-variate polynomials. These codes allow for the design of high-rate codes that can recover every codeword or information symbol from many disjoint sets. Recently, the underlying approaches have been combined for the bi-variate case to construct lifted multiplicity codes, a generalization of lifted codes that can offer further rate improvements. We continue the study of these codes by first establishing new lower bounds on the rate of lifted Reed-Solomon codes for any number of variables $m$, which improve upon the known bounds for any $m\ge 4$. Next, we use these results to provide lower bounds on the rate and distance of lifted multiplicity codes obtained from polynomials in an arbitrary number of variables, which improve upon the known results for any $m\ge 3$.
Specifically, we investigate a subcode of a lifted multiplicity code formed by the linear span of $m$-variate monomials whose restriction to an arbitrary line in $\mathbb{F}_q^m$ is equivalent to a low-degree univariate polynomial. We find the tight asymptotic behavior of the fraction of such monomials when the number of variables $m$ is fixed and the alphabet size $q=2^\ell$ is large. Using these results, we give a new explicit construction of batch codes utilizing lifted Reed-Solomon codes. For some parameter regimes, these codes have a better trade-off between parameters than previously known batch codes. Further, we show that lifted multiplicity codes have a better trade-off between redundancy and the number of disjoint recovering sets for every codeword or information symbol than previously known constructions, thereby providing the best known PIR codes for some parameter regimes. Additionally, we present a new local self-correction algorithm for lifted multiplicity codes.
△ Less
Submitted 11 October, 2021; v1 submitted 5 October, 2021;
originally announced October 2021.
-
Fast Decoding of Union-free Codes
Authors:
Ilya Vorobyev
Abstract:
Union-free codes and disjunctive codes are two combinatorial structures, which are used in nonadaptive group testing to find a set of $d$ defective elements among $n$ samples by carrying out the minimal number of tests $t$. It is known that union-free codes have a larger rate, whereas disjunctive codes provide a more efficient decoding algorithm. In this paper we introduce a new family of codes fo…
▽ More
Union-free codes and disjunctive codes are two combinatorial structures, which are used in nonadaptive group testing to find a set of $d$ defective elements among $n$ samples by carrying out the minimal number of tests $t$. It is known that union-free codes have a larger rate, whereas disjunctive codes provide a more efficient decoding algorithm. In this paper we introduce a new family of codes for nonadaptive group testing with fast decoding. The rate of these codes is larger than the rate of disjunctive codes, while the decoding algorithm has the same complexity. In addition, we derive a lower bound on the rate of new codes for the case of $d=2$ defectives, which is significantly better than the bound for disjunctive codes and almost as good as the bound for union-free codes.
△ Less
Submitted 12 January, 2022; v1 submitted 30 August, 2021;
originally announced August 2021.
-
Complete Traceability Multimedia Fingerprinting Codes Resistant to Averaging Attack and Adversarial Noise with Optimal Rate
Authors:
Ilya Vorobyev
Abstract:
In this paper we consider complete traceability multimedia fingerprinting codes resistant to averaging attacks and adversarial noise. Recently it was shown that there are no such codes for the case of an arbitrary linear attack. However, for the case of averaging attacks complete traceability multimedia fingerprinting codes of exponential cardinality resistant to constant adversarial noise were co…
▽ More
In this paper we consider complete traceability multimedia fingerprinting codes resistant to averaging attacks and adversarial noise. Recently it was shown that there are no such codes for the case of an arbitrary linear attack. However, for the case of averaging attacks complete traceability multimedia fingerprinting codes of exponential cardinality resistant to constant adversarial noise were constructed in 2020 by Egorova et al. We continue this work and provide an improved lower bound on the rate of these codes.
△ Less
Submitted 23 August, 2022; v1 submitted 20 August, 2021;
originally announced August 2021.
-
Optimal Codes Correcting Localized Deletions
Authors:
Rawad Bitar,
Serge Kas Hanna,
Nikita Polyanskii,
Ilya Vorobyev
Abstract:
We consider the problem of constructing codes that can correct deletions that are localized within a certain part of the codeword that is unknown a priori. Namely, the model that we study is when at most $k$ deletions occur in a window of size $k$, where the positions of the deletions within this window are not necessarily consecutive. Localized deletions are thus a generalization of burst deletio…
▽ More
We consider the problem of constructing codes that can correct deletions that are localized within a certain part of the codeword that is unknown a priori. Namely, the model that we study is when at most $k$ deletions occur in a window of size $k$, where the positions of the deletions within this window are not necessarily consecutive. Localized deletions are thus a generalization of burst deletions that occur in consecutive positions. We present novel explicit codes that are efficiently encodable and decodable and can correct up to $k$ localized deletions. Furthermore, these codes have $\log n+\mathcal{O}(k \log^2 (k\log n))$ redundancy, where $n$ is the length of the information message, which is asymptotically optimal in $n$ for $k=o(\log n/(\log \log n)^2)$.
△ Less
Submitted 5 May, 2021;
originally announced May 2021.
-
Wiener index and graphs, almost half of whose vertices satisfy Šoltés property
Authors:
Margarita Akhmejanova,
Konstantin Olmezov,
Aleksei Volostnov,
Ilya Vorobyev,
Konstantin Vorob'ev,
Yury Yarovikov
Abstract:
The Wiener index $W(G)$ of a connected graph $G$ is a sum of distances between all pairs of vertices of $G$. In 1991, Šoltés formulated the problem of finding all graphs $G$ such that for every vertex $v$ the equation $W(G)=W(G-v)$ holds. The cycle $C_{11}$ is the only known graph with this property. In this paper we consider the following relaxation of the original problem: find a graph with a la…
▽ More
The Wiener index $W(G)$ of a connected graph $G$ is a sum of distances between all pairs of vertices of $G$. In 1991, Šoltés formulated the problem of finding all graphs $G$ such that for every vertex $v$ the equation $W(G)=W(G-v)$ holds. The cycle $C_{11}$ is the only known graph with this property. In this paper we consider the following relaxation of the original problem: find a graph with a large proportion of vertices such that removing any one of them does not change the Wiener index of a graph. As the main result, we build an infinite series of graphs with the proportion of such vertices tending to $\frac{1}{2}$.
△ Less
Submitted 15 August, 2021; v1 submitted 16 December, 2020;
originally announced December 2020.
-
Feedback Insertion-Deletion Codes
Authors:
Georg Maringer,
Nikita Polyanskii,
Ilya Vorobyev,
Lorenz Welter
Abstract:
In this paper, a new problem of transmitting information over the adversarial insertion-deletion channel with feedback is introduced. Suppose that the encoder transmits $n$ binary symbols one-by-one over a channel, in which some symbols can be deleted and some additional symbols can be inserted. After each transmission, the encoder is notified about the insertions or deletions that have occurred w…
▽ More
In this paper, a new problem of transmitting information over the adversarial insertion-deletion channel with feedback is introduced. Suppose that the encoder transmits $n$ binary symbols one-by-one over a channel, in which some symbols can be deleted and some additional symbols can be inserted. After each transmission, the encoder is notified about the insertions or deletions that have occurred within the previous transmission and the encoding strategy can be adapted accordingly. The goal is to design an encoder that is able to transmit error-free as much information as possible under the assumption that the total number of deletions and insertions is limited by $τn$, $0<τ<1$. We show how this problem can be reduced to the problem of transmitting messages over the substitution channel. Thereby, the maximal asymptotic rate of feedback insertion-deletion codes is completely established. The maximal asymptotic rate for the adversarial substitution channel has been partially determined by Berlekamp and later finished by Zigangirov. However, the analysis of the lower bound by Zigangirov is quite complicated. We revisit Zigangirov's result and present a more elaborate version of his proof.
△ Less
Submitted 10 January, 2022; v1 submitted 29 October, 2020;
originally announced October 2020.
-
Lifted Multiplicity Codes
Authors:
Lukas Holzbaur,
Rina Polyanskaya,
Nikita Polyanskii,
Ilya Vorobyev,
Eitan Yaakobi
Abstract:
Lifted Reed-Solomon codes and multiplicity codes are two classes of evaluation codes that allow for the design of high-rate codes that can recover every codeword or information symbol from many disjoint sets. Recently, the underlying approaches have been combined to construct lifted bi-variate multiplicity codes, that can further improve on the rate. We continue the study of these codes by providi…
▽ More
Lifted Reed-Solomon codes and multiplicity codes are two classes of evaluation codes that allow for the design of high-rate codes that can recover every codeword or information symbol from many disjoint sets. Recently, the underlying approaches have been combined to construct lifted bi-variate multiplicity codes, that can further improve on the rate. We continue the study of these codes by providing lower bounds on the rate and distance for lifted multiplicity codes obtained from polynomials in an arbitrary number of variables. Specifically, we investigate a subcode of a lifted multiplicity code formed by the linear span of $m$-variate monomials whose restriction to an arbitrary line in $\mathbb{F}_q^m$ is equivalent to a low-degree uni-variate polynomial. We find the tight asymptotic behavior of the fraction of such monomials when the number of variables $m$ is fixed and the alphabet size $q=2^\ell$ is large. For some parameter regimes, lifted multiplicity codes are then shown to have a better trade-off between redundancy and the number of disjoint recovering sets for every codeword or information symbol than previously known constructions. Additionally, we present a local self-correction algorithm for lifted multiplicity codes.
△ Less
Submitted 29 October, 2020; v1 submitted 11 August, 2020;
originally announced August 2020.
-
Almost Affinely Disjoint Subspaces
Authors:
Hedongliang Liu,
Nikita Polyanskii,
Ilya Vorobyev,
Antonia Wachter-Zeh
Abstract:
In this work, we introduce a natural notion concerning finite vector spaces. A family of $k$-dimensional subspaces of $\mathbb{F}_q^n$, which forms a partial spread, is called almost affinely disjoint if any $(k+1)$-dimensional subspace containing a subspace from the family non-trivially intersects with only a few subspaces from the family. The central question discussed in the paper is the polyno…
▽ More
In this work, we introduce a natural notion concerning finite vector spaces. A family of $k$-dimensional subspaces of $\mathbb{F}_q^n$, which forms a partial spread, is called almost affinely disjoint if any $(k+1)$-dimensional subspace containing a subspace from the family non-trivially intersects with only a few subspaces from the family. The central question discussed in the paper is the polynomial growth (in $q$) of the maximal cardinality of these families given the parameters $k$ and $n$. For the cases $k=1$ and $k=2$, optimal families are constructed. For other settings, we find lower and upper bounds on the polynomial growth. Additionally, some connections with problems in coding theory are shown.
△ Less
Submitted 27 June, 2021; v1 submitted 3 July, 2020;
originally announced July 2020.
-
Lifted Reed-Solomon Codes with Application to Batch Codes
Authors:
Lukas Holzbaur,
Rina Polyanskaya,
Nikita Polyanskii,
Ilya Vorobyev
Abstract:
Guo, Kopparty and Sudan have initiated the study of error-correcting codes derived by lifting of affine-invariant codes. Lifted Reed-Solomon (RS) codes are defined as the evaluation of polynomials in a vector space over a field by requiring their restriction to every line in the space to be a codeword of the RS code. In this paper, we investigate lifted RS codes and discuss their application to ba…
▽ More
Guo, Kopparty and Sudan have initiated the study of error-correcting codes derived by lifting of affine-invariant codes. Lifted Reed-Solomon (RS) codes are defined as the evaluation of polynomials in a vector space over a field by requiring their restriction to every line in the space to be a codeword of the RS code. In this paper, we investigate lifted RS codes and discuss their application to batch codes, a notion introduced in the context of private information retrieval and load-balancing in distributed storage systems. First, we improve the estimate of the code rate of lifted RS codes for lifting parameter $m\ge 3$ and large field size. Second, a new explicit construction of batch codes utilizing lifted RS codes is proposed. For some parameter regimes, our codes have a better trade-off between parameters than previously known batch codes.
△ Less
Submitted 4 February, 2020; v1 submitted 31 January, 2020;
originally announced January 2020.
-
Optimal Multistage Group Testing Algorithm for 3 Defectives
Authors:
Ilya Vorobyev
Abstract:
Group testing is a well-known search problem that consists in detecting of $s$ defective members of a set of $t$ samples by carrying out tests on properly chosen subsets of samples. In classical group testing the goal is to find all defective elements by using the minimal possible number of tests in the worst case. In this work, a multistage group testing problem is considered. Our goal is to cons…
▽ More
Group testing is a well-known search problem that consists in detecting of $s$ defective members of a set of $t$ samples by carrying out tests on properly chosen subsets of samples. In classical group testing the goal is to find all defective elements by using the minimal possible number of tests in the worst case. In this work, a multistage group testing problem is considered. Our goal is to construct a multistage search procedure, having asymptotically the same number of tests as the optimal adaptive algorithm. We propose a new approach to designing multistage algorithms, which allows us to construct a 5-stage algorithm for finding 3 defectives with the optimal number $3\log_2t(1+o(1))$ of tests.
△ Less
Submitted 15 May, 2020; v1 submitted 22 January, 2020;
originally announced January 2020.
-
Duplication with transposition distance to the root for $q$-ary strings
Authors:
Nikita Polyanskii,
Ilya Vorobyev
Abstract:
We study the duplication with transposition distance between strings of length $n$ over a $q$-ary alphabet and their roots. In other words, we investigate the number of duplication operations of the form $x = (abcd) \to y = (abcbd)$, where $x$ and $y$ are strings and $a$, $b$, $c$ and $d$ are their substrings, needed to get a $q$-ary string of length $n$ starting from the set of strings without du…
▽ More
We study the duplication with transposition distance between strings of length $n$ over a $q$-ary alphabet and their roots. In other words, we investigate the number of duplication operations of the form $x = (abcd) \to y = (abcbd)$, where $x$ and $y$ are strings and $a$, $b$, $c$ and $d$ are their substrings, needed to get a $q$-ary string of length $n$ starting from the set of strings without duplications. For exact duplication, we prove that the maximal distance between a string of length at most $n$ and its root has the asymptotic order $n/\log n$. For approximate duplication, where a $β$-fraction of symbols may be duplicated incorrectly, we show that the maximal distance has a sharp transition from the order $n/\log n$ to $\log n$ at $β=(q-1)/q$. The motivation for this problem comes from genomics, where such duplications represent a special kind of mutation and the distance between a given biological sequence and its root is the smallest number of transposition mutations required to generate the sequence.
△ Less
Submitted 17 January, 2020;
originally announced January 2020.
-
A next-generation LHC heavy-ion experiment
Authors:
D. Adamová,
G. Aglieri Rinella,
M. Agnello,
Z. Ahammed,
D. Aleksandrov,
A. Alici,
A. Alkin,
T. Alt,
I. Altsybeev,
D. Andreou,
A. Andronic,
F. Antinori,
P. Antonioli,
H. Appelshäuser,
R. Arnaldi,
I. C. Arsene,
M. Arslandok,
R. Averbeck,
M. D. Azmi,
X. Bai,
R. Bailhache,
R. Bala,
L. Barioglio,
G. G. Barnaföldi,
L. S. Barnby
, et al. (374 additional authors not shown)
Abstract:
The present document discusses plans for a compact, next-generation multi-purpose detector at the LHC as a follow-up to the present ALICE experiment. The aim is to build a nearly massless barrel detector consisting of truly cylindrical layers based on curved wafer-scale ultra-thin silicon sensors with MAPS technology, featuring an unprecedented low material budget of 0.05% X$_0$ per layer, with th…
▽ More
The present document discusses plans for a compact, next-generation multi-purpose detector at the LHC as a follow-up to the present ALICE experiment. The aim is to build a nearly massless barrel detector consisting of truly cylindrical layers based on curved wafer-scale ultra-thin silicon sensors with MAPS technology, featuring an unprecedented low material budget of 0.05% X$_0$ per layer, with the innermost layers possibly positioned inside the beam pipe. In addition to superior tracking and vertexing capabilities over a wide momentum range down to a few tens of MeV/$c$, the detector will provide particle identification via time-of-flight determination with about 20~ps resolution. In addition, electron and photon identification will be performed in a separate shower detector. The proposed detector is conceived for studies of pp, pA and AA collisions at luminosities a factor of 20 to 50 times higher than possible with the upgraded ALICE detector, enabling a rich physics program ranging from measurements with electromagnetic probes at ultra-low transverse momenta to precision physics in the charm and beauty sector.
△ Less
Submitted 2 May, 2019; v1 submitted 31 January, 2019;
originally announced February 2019.
-
Constructions of Batch Codes via Finite Geometry
Authors:
Nikita Polyanskii,
Ilya Vorobyev
Abstract:
A primitive $k$-batch code encodes a string $x$ of length $n$ into string $y$ of length $N$, such that each multiset of $k$ symbols from $x$ has $k$ mutually disjoint recovering sets from $y$. We develop new explicit and random coding constructions of linear primitive batch codes based on finite geometry. In some parameter regimes, our proposed codes have lower redundancy than previously known bat…
▽ More
A primitive $k$-batch code encodes a string $x$ of length $n$ into string $y$ of length $N$, such that each multiset of $k$ symbols from $x$ has $k$ mutually disjoint recovering sets from $y$. We develop new explicit and random coding constructions of linear primitive batch codes based on finite geometry. In some parameter regimes, our proposed codes have lower redundancy than previously known batch codes.
△ Less
Submitted 20 January, 2019;
originally announced January 2019.
-
A New Algorithm for Two-Stage Group Testing
Authors:
Ilya Vorobyev
Abstract:
Group testing is a well-known search problem that consists in detecting of $s$ defective members of a set of $t$ samples by carrying out tests on properly chosen subsets of samples. In classical group testing the goal is to find all defective elements by using the minimal possible number of tests in the worst case. In this work, two-stage group testing is considered. Using the hypergraph approach…
▽ More
Group testing is a well-known search problem that consists in detecting of $s$ defective members of a set of $t$ samples by carrying out tests on properly chosen subsets of samples. In classical group testing the goal is to find all defective elements by using the minimal possible number of tests in the worst case. In this work, two-stage group testing is considered. Using the hypergraph approach we design a new search algorithm, which allows improving the known results for fixed $s$ and $t\to\infty$. For the case $s=2$ this algorithm achieves information-theoretic lower bound $2\log_2t(1+o(1))$ on the number of tests in the worst case. Also, the problem of finding $m$ out of $s$ defectives is considered.
△ Less
Submitted 30 April, 2019; v1 submitted 20 January, 2019;
originally announced January 2019.
-
On capacities of the two-user union channel with complete feedback
Authors:
Zilin Jiang,
Nikita Polyanskii,
Ilya Vorobyev
Abstract:
The exact values of the optimal symmetric rate point in the Cover--Leung capacity region of the two-user union channel with complete feedback were determined by Willems when the size of the input alphabet is 2, and by Vinck, Hoeks and Post when the size is at least 6. We complete this line of research when the size of the input alphabet is 3, 4 or 5. The proof hinges on the technical lemma that co…
▽ More
The exact values of the optimal symmetric rate point in the Cover--Leung capacity region of the two-user union channel with complete feedback were determined by Willems when the size of the input alphabet is 2, and by Vinck, Hoeks and Post when the size is at least 6. We complete this line of research when the size of the input alphabet is 3, 4 or 5. The proof hinges on the technical lemma that concerns the maximal joint entropy of two independent random variables in terms of their probability of equality. For the zero-error capacity region, using superposition coding, we provide a practical near-optimal communication scheme which improves all the previous explicit constructions.
△ Less
Submitted 5 December, 2018; v1 submitted 23 April, 2018;
originally announced April 2018.
-
Online Calibration of the TPC Drift Time in the ALICE High Level Trigger
Authors:
David Rohr,
Mikolaj Krzewicki,
Chiara Zampolli,
Jens Wiechula,
Sergey Gorbunov,
Alex Chauvin,
Ivan Vorobyev,
Steffen Weber,
Kai Schweda,
Volker Lindenstruth
Abstract:
ALICE (A Large Ion Collider Experiment) is one of four major experiments at the Large Hadron Collider (LHC) at CERN. The High Level Trigger (HLT) is a compute cluster, which reconstructs collisions as recorded by the ALICE detector in real-time. It employs a custom online data-transport framework to distribute data and workload among the compute nodes.
ALICE employs subdetectors sensitive to env…
▽ More
ALICE (A Large Ion Collider Experiment) is one of four major experiments at the Large Hadron Collider (LHC) at CERN. The High Level Trigger (HLT) is a compute cluster, which reconstructs collisions as recorded by the ALICE detector in real-time. It employs a custom online data-transport framework to distribute data and workload among the compute nodes.
ALICE employs subdetectors sensitive to environmental conditions such as pressure and temperature, e.g. the Time Projection Chamber (TPC). A precise reconstruction of particle trajectories requires the calibration of these detectors. Performing the calibration in real time in the HLT improves the online reconstructions and renders certain offline calibration steps obsolete speeding up offline physics analysis. For LHC Run 3, starting in 2020 when data reduction will rely on reconstructed data, online calibration becomes a necessity. Reconstructed particle trajectories build the basis for the calibration making a fast online-tracking mandatory. The main detectors used for this purpose are the TPC and ITS (Inner Tracking System). Reconstructing the trajectories in the TPC is the most compute-intense step.
We present several improvements to the ALICE High Level Trigger developed to facilitate online calibration. The main new development for online calibration is a wrapper that can run ALICE offline analysis and calibration tasks inside the HLT. On top of that, we have added asynchronous processing capabilities to support long-running calibration tasks in the HLT framework, which runs event-synchronously otherwise. In order to improve the resiliency, an isolated process performs the asynchronous operations such that even a fatal error does not disturb data taking. We have complemented the original loop-free HLT chain with ZeroMQ data-transfer components. [...]
△ Less
Submitted 26 December, 2017;
originally announced December 2017.
-
Floor Scale Modulo Lifting for QC-LDPC codes
Authors:
Nikita Polyanskii,
Vasiliy Usatyuk,
Ilya Vorobyev
Abstract:
In the given paper we present a novel approach for constructing a QC-LDPC code of smaller length by lifting a given QC-LDPC code. The proposed method can be considered as a generalization of floor lifting. Also we prove several probabilistic statements concerning a theoretical improvement of the method with respect to the number of small cycles. Making some offline calculation of scale parameter i…
▽ More
In the given paper we present a novel approach for constructing a QC-LDPC code of smaller length by lifting a given QC-LDPC code. The proposed method can be considered as a generalization of floor lifting. Also we prove several probabilistic statements concerning a theoretical improvement of the method with respect to the number of small cycles. Making some offline calculation of scale parameter it is possible to construct a sequence of QC-LDPC codes with different circulant sizes generated from a single exponent matrix using only floor and scale operations. The only parameter we store in memory is a constant needed for scaling.
△ Less
Submitted 4 February, 2017; v1 submitted 25 January, 2017;
originally announced January 2017.
-
Hypothesis Test for Bounds on the Size of Random Defective Set
Authors:
A. G. D'yachkov,
N. A. Polyanskii,
V. Yu. Shchukin,
I. V. Vorobyev
Abstract:
The conventional model of disjunctive group testing assumes that there are several defective elements (or defectives) among a large population, and a group test yields the positive response if and only if the testing group contains at least one defective element. The basic problem is to find all defectives using a minimal possible number of group tests. However, when the number of defectives is un…
▽ More
The conventional model of disjunctive group testing assumes that there are several defective elements (or defectives) among a large population, and a group test yields the positive response if and only if the testing group contains at least one defective element. The basic problem is to find all defectives using a minimal possible number of group tests. However, when the number of defectives is unknown there arises an additional problem, namely: how to estimate the random number of defective elements. n this paper, we concentrate on testing the hypothesis $H_0$: the number of defectives $\le s_1$ against the alternative hypothesis $H_1$: the number of defectives $\ge s_2$. We introduce a new decoding algorithm based on the comparison of the number of tests having positive responses with an appropriate fixed threshold. For some asymptotic regimes on $s_1$ and $s_2$, the proposed algorithm is shown to be order-optimal. Additionally, our simulation results verify the advantages of the proposed algorithm such as low complexity and a small error probability compared with known algorithms.
△ Less
Submitted 19 August, 2019; v1 submitted 22 January, 2017;
originally announced January 2017.
-
Separable Codes for the Symmetric Multiple-Access Channel
Authors:
A. G. Dyachkov,
N. Polyanskii,
V. Shchukin,
I. Vorobyev
Abstract:
A binary matrix is called an s-separable code for the disjunctive multiple-access channel (disj-MAC) if Boolean sums of sets of s columns are all distinct. The well-known issue of the combinatorial coding theory is to obtain upper and lower bounds on the rate of s-separable codes for disj-MAC. In our paper, we generalize the problem and discuss upper and lower bounds on the rate of q-ary s-separab…
▽ More
A binary matrix is called an s-separable code for the disjunctive multiple-access channel (disj-MAC) if Boolean sums of sets of s columns are all distinct. The well-known issue of the combinatorial coding theory is to obtain upper and lower bounds on the rate of s-separable codes for disj-MAC. In our paper, we generalize the problem and discuss upper and lower bounds on the rate of q-ary s-separable codes for models of noiseless symmetric MAC, i.e., when at each time instant the output signal of MAC is a symmetric function of its s input signals.
△ Less
Submitted 2 August, 2018; v1 submitted 21 January, 2017;
originally announced January 2017.
-
On a Hypergraph Approach to Multistage Group Testing Problems
Authors:
A. G. D'yachkov,
I. V. Vorobyev,
N. A. Polyanskii,
V. Yu. Shchukin
Abstract:
Group testing is a well known search problem that consists in detecting up to $s$ defective elements of the set $[t]=\{1,\ldots,t\}$ by carrying out tests on properly chosen subsets of $[t]$. In classical group testing the goal is to find all defective elements by using the minimal possible number of tests. In this paper we consider multistage group testing. We propose a general idea how to use a…
▽ More
Group testing is a well known search problem that consists in detecting up to $s$ defective elements of the set $[t]=\{1,\ldots,t\}$ by carrying out tests on properly chosen subsets of $[t]$. In classical group testing the goal is to find all defective elements by using the minimal possible number of tests. In this paper we consider multistage group testing. We propose a general idea how to use a hypergraph approach to searching defects. For the case $s=2$, we design an explicit construction, which makes use of $2\log_2t(1+o(1))$ tests in the worst case and consists of $4$ stages.
△ Less
Submitted 2 July, 2016;
originally announced July 2016.
-
Adaptive Learning a Hidden Hypergraph
Authors:
A. G. D'yachkov,
I. V. Vorobyev,
N. A. Polyanskii,
V. Yu. Shchukin
Abstract:
Learning a hidden hypergraph is a natural generalization of the classical group testing problem that consists in detecting unknown hypergraph $H_{un}=H(V,E)$ by carrying out edge-detecting tests. In the given paper we focus our attention only on a specific family $\mathcal{F}(t,s,\ell)$ of localized hypergraphs for which the total number of vertices $|V| = t$, the number of edges $|E|\le s$,…
▽ More
Learning a hidden hypergraph is a natural generalization of the classical group testing problem that consists in detecting unknown hypergraph $H_{un}=H(V,E)$ by carrying out edge-detecting tests. In the given paper we focus our attention only on a specific family $\mathcal{F}(t,s,\ell)$ of localized hypergraphs for which the total number of vertices $|V| = t$, the number of edges $|E|\le s$, $s\ll t$, and the cardinality of any edge $|e|\le\ell$, $\ell\ll t$. Our goal is to identify all edges of $H_{un}\in \mathcal{F}(t,s,\ell)$ by using the minimal number of tests. We provide an adaptive algorithm that matches the information theory bound, i.e., the total number of tests of the algorithm in the worst case is at most $s\ell\log_2 t(1+o(1))$.
△ Less
Submitted 2 July, 2016;
originally announced July 2016.
-
Threshold Decoding for Disjunctive Group Testing
Authors:
A. G. D'yachkov,
I. V. Vorobyev,
N. A. Polyanskii,
V. Yu. Shchukin
Abstract:
Let $1 \le s < t$, $N \ge 1$ be integers and a complex electronic circuit of size $t$ is said to be an $s$-active, $\; s \ll t$, and can work as a system block if not more than $s$ elements of the circuit are defective. Otherwise, the circuit is said to be an $s$-defective and should be replaced by a similar $s$-active circuit. Suppose that there exists a possibility to run $N$ non-adaptive group…
▽ More
Let $1 \le s < t$, $N \ge 1$ be integers and a complex electronic circuit of size $t$ is said to be an $s$-active, $\; s \ll t$, and can work as a system block if not more than $s$ elements of the circuit are defective. Otherwise, the circuit is said to be an $s$-defective and should be replaced by a similar $s$-active circuit. Suppose that there exists a possibility to run $N$ non-adaptive group tests to check the $s$-activity of the circuit. As usual, we say that a (disjunctive) group test yields the positive response if the group contains at least one defective element. Along with the conventional decoding algorithm based on disjunctive $s$-codes, we consider a threshold decision rule with the minimal possible decoding complexity, which is based on the simple comparison of a fixed threshold $T$, $1 \le T \le N - 1$, with the number of positive responses $p$, $0 \le p \le N$. For the both of decoding algorithms we discuss upper bounds on the $α$-level of significance of the statistical test for the null hypothesis $\left\{ H_0 \,:\, \text{the circuit is $s$-active} \right\}$ verse the alternative hypothesis $\left\{ H_1 \,:\, \text{the circuit is $s$-defective} \right\}$.
△ Less
Submitted 2 July, 2016;
originally announced July 2016.
-
A simple construction of cover-free $(s,\ell)$-code with certain constant weight
Authors:
A. G. D'yachkov,
I. V. Vorobyev,
N. A. Polyanskii,
V. Yu. Shchukin
Abstract:
We give a method of constructing a cover-free $(s, \ell)$-code. For $k > s$, our construction yields a $ {{n \choose s} \choose \ell}\times {n \choose k}$ cover-free $(s, \ell)$-code with a constant column weight.
We give a method of constructing a cover-free $(s, \ell)$-code. For $k > s$, our construction yields a $ {{n \choose s} \choose \ell}\times {n \choose k}$ cover-free $(s, \ell)$-code with a constant column weight.
△ Less
Submitted 22 May, 2016;
originally announced May 2016.
-
Bounds on the rate of disjunctive codes (in Russian)
Authors:
A. G. Dyachkov,
N. Polyanskii,
V. Shchukin,
I. Vorobyev
Abstract:
A binary code is called a superimposed cover-free $(s,\ell)$-code if the code is identified by the incidence matrix of a family of finite sets in which no intersection of $\ell$ sets is covered by the union of $s$ others. A binary code is called a superimposed list-decoding $s_L$-code if the code is identified by the incidence matrix of a family of finite sets in which the union of any $s$ sets ca…
▽ More
A binary code is called a superimposed cover-free $(s,\ell)$-code if the code is identified by the incidence matrix of a family of finite sets in which no intersection of $\ell$ sets is covered by the union of $s$ others. A binary code is called a superimposed list-decoding $s_L$-code if the code is identified by the incidence matrix of a family of finite sets in which the union of any $s$ sets can cover not more than $L-1$ other sets of the family. For $L=\ell=1$, both of the definitions coincide and the corresponding binary code is called a superimposed $s$-code. Our aim is to obtain new lower and upper bounds on the rate of the given codes. In particular, we derive lower bounds on the rates of a superimposed cover-free $(s,\ell)$-code and list-decoding $s_L$-code based on the ensemble of constant weight binary codes. Also, we establish an upper bound on the rate of superimposed list-decoding $s_L$-code.
△ Less
Submitted 17 May, 2016;
originally announced May 2016.
-
Threshold Disjunctive Codes
Authors:
A. G. D'yachkov,
I. V. Vorobyev,
N. A. Polyanskii,
V. Yu. Shchukin
Abstract:
Let $1 \le s < t$, $N \ge 1$ be integers and a complex electronic circuit of size $t$ is said to be an $s$-active, $\; s \ll t$, and can work as a system block if not more than $s$ elements of the circuit are defective. Otherwise, the circuit is said to be an $s$-defective and should be substituted for the similar $s$-active circuit. Suppose that there exists a possibility to check the $s$-activit…
▽ More
Let $1 \le s < t$, $N \ge 1$ be integers and a complex electronic circuit of size $t$ is said to be an $s$-active, $\; s \ll t$, and can work as a system block if not more than $s$ elements of the circuit are defective. Otherwise, the circuit is said to be an $s$-defective and should be substituted for the similar $s$-active circuit. Suppose that there exists a possibility to check the $s$-activity of the circuit using $N$ non-adaptive group tests identified by a conventional disjunctive $s$-code $X$ of size~$t$ and length~$N$. As usually, we say that any group test yields the positive response if the group contains at least one defective element. In this case, there is no any interest to look for the defective elements. We need to decide on the number of the defective elements in the circuit without knowing the code~$X$. In addition, the decision has the minimal possible complexity because it is based on the simple comparison of a fixed threshold $T$, $0 \le T \le N - 1$, with the number of positive responses $p$, $0 \le p \le N$, obtained after carrying out $N$ non-adaptive tests prescribed by the disjunctive $s$-code~$X$. For the introduced group testing problem, a new class of the well-known disjunctive $s$-codes called the threshold disjunctive $s$-codes is defined. The aim of our paper is to discuss both some constructions of suboptimal threshold disjunctive $s$-codes and the best random coding bounds on the rate of threshold disjunctive $s$-codes.
△ Less
Submitted 25 January, 2016;
originally announced January 2016.
-
On Multistage Learning a Hidden Hypergraph
Authors:
A. G. D'yachkov,
I. V. Vorobyev,
N. A. Polyanskii,
V. Yu. Shchukin
Abstract:
Learning a hidden hypergraph is a natural generalization of the classical group testing problem that consists in detecting unknown hypergraph $H_{un}=H(V,E)$ by carrying out edge-detecting tests. In the given paper we focus our attention only on a specific family $F(t,s,\ell)$ of localized hypergraphs for which the total number of vertices $|V| = t$, the number of edges $|E|\le s$, $s\ll t$, and t…
▽ More
Learning a hidden hypergraph is a natural generalization of the classical group testing problem that consists in detecting unknown hypergraph $H_{un}=H(V,E)$ by carrying out edge-detecting tests. In the given paper we focus our attention only on a specific family $F(t,s,\ell)$ of localized hypergraphs for which the total number of vertices $|V| = t$, the number of edges $|E|\le s$, $s\ll t$, and the cardinality of any edge $|e|\le\ell$, $\ell\ll t$. Our goal is to identify all edges of $H_{un}\in F(t,s,\ell)$ by using the minimal number of tests. We develop an adaptive algorithm that matches the information theory bound, i.e., the total number of tests of the algorithm in the worst case is at most $s\ell\log_2 t(1+o(1))$. We also discuss a probabilistic generalization of the problem.
△ Less
Submitted 17 May, 2016; v1 submitted 25 January, 2016;
originally announced January 2016.
-
On a Hypergraph Approach to Multistage Group Testing Problems
Authors:
A. G. D'yachkov,
I. V. Vorobyev,
N. A. Polyanskii,
V. Yu. Shchukin
Abstract:
Group testing is a well known search problem that consists in detecting up to $s$ defective elements of the set $[t]=\{1,\ldots,t\}$ by carrying out tests on properly chosen subsets of $[t]$. In classical group testing the goal is to find all defective elements by using the minimal possible number of tests. In this paper we consider multistage group testing. We propose a general idea how to use a…
▽ More
Group testing is a well known search problem that consists in detecting up to $s$ defective elements of the set $[t]=\{1,\ldots,t\}$ by carrying out tests on properly chosen subsets of $[t]$. In classical group testing the goal is to find all defective elements by using the minimal possible number of tests. In this paper we consider multistage group testing. We propose a general idea how to use a hypergraph approach to searching defects. For the case $s=2$, we design an explicit construction, which makes use of $2\log_2t(1+o(1))$ tests in the worst case and consists of $4$ stages. For the general case $s>2$, we provide an explicit construction, which uses $(2s-1)\log_2t(1+o(1))$ tests and consists of $2s-1$ rounds.
△ Less
Submitted 25 January, 2016;
originally announced January 2016.
-
Almost Cover-Free Codes and Designs
Authors:
Arkadii D'yachkov,
Ilya Vorobyev,
Nikita Polyanskii,
Vladislav Shchukin
Abstract:
An $s$-subset of codewords of a binary code $X$ is said to be an {\em $(s,\ell)$-bad} in $X$ if the code $X$ contains a subset of other $\ell$ codewords such that the conjunction of the $\ell$ codewords is covered by the disjunctive sum of the $s$ codewords. Otherwise, the $s$-subset of codewords of $X$ is said to be an {\em $(s,\ell)$-good} in~$X$.mA binary code $X$ is said to be a cover-free…
▽ More
An $s$-subset of codewords of a binary code $X$ is said to be an {\em $(s,\ell)$-bad} in $X$ if the code $X$ contains a subset of other $\ell$ codewords such that the conjunction of the $\ell$ codewords is covered by the disjunctive sum of the $s$ codewords. Otherwise, the $s$-subset of codewords of $X$ is said to be an {\em $(s,\ell)$-good} in~$X$.mA binary code $X$ is said to be a cover-free $(s,\ell)$-code if the code $X$ does not contain $(s,\ell)$-bad subsets. In this paper, we introduce a natural {\em probabilistic} generalization of cover-free $(s,\ell)$-codes, namely: a binary code is said to be an almost cover-free $(s,\ell)$-code if {\em almost all} $s$-subsets of its codewords are $(s,\ell)$-good. We discuss the concept of almost cover-free $(s,\ell)$-codes arising in combinatorial group testing problems connected with the nonadaptive search of defective supersets (complexes). We develop a random coding method based on the ensemble of binary constant weight codes to obtain lower bounds on the capacity of such codes.
△ Less
Submitted 25 March, 2015; v1 submitted 30 October, 2014;
originally announced October 2014.
-
Symmetric Disjunctive List-Decoding Codes
Authors:
Arkadii D'yachkov,
Ilya Vorobyev,
Nikita Polyanskii,
Vladislav Shchukin
Abstract:
A binary code is said to be a disjunctive list-decoding $s_L$-code (LD $s_L$-code), $s \ge 2$, $L \ge 1$, if the code is identified by the incidence matrix of a family of finite sets in which the union (or disjunctive sum) of any $s$ sets can cover not more than $L-1$ other sets of the family. In this paper, we consider a similar class of binary codes which are based on a {\em symmetric disjunctiv…
▽ More
A binary code is said to be a disjunctive list-decoding $s_L$-code (LD $s_L$-code), $s \ge 2$, $L \ge 1$, if the code is identified by the incidence matrix of a family of finite sets in which the union (or disjunctive sum) of any $s$ sets can cover not more than $L-1$ other sets of the family. In this paper, we consider a similar class of binary codes which are based on a {\em symmetric disjunctive sum} (SDS) of binary symbols. By definition, the symmetric disjunctive sum (SDS) takes values from the ternary alphabet $\{0, 1, *\}$, where the symbol~$*$ denotes "erasure". Namely: SDS is equal to $0$ ($1$) if all its binary symbols are equal to $0$ ($1$), otherwise SDS is equal to~$*$. List decoding codes for symmetric disjunctive sum are said to be {\em symmetric disjunctive list-decoding $s_L$-codes} (SLD $s_L$-codes). In the given paper, we remind some applications of SLD $s_L$-codes which motivate the concept of symmetric disjunctive sum. We refine the known relations between parameters of LD $s_L$-codes and SLD $s_L$-codes. For the ensemble of binary constant-weight codes we develop a random coding method to obtain lower bounds on the rate of these codes. Our lower bounds improve the known random coding bounds obtained up to now using the ensemble with independent symbols of codewords.
△ Less
Submitted 29 March, 2015; v1 submitted 30 October, 2014;
originally announced October 2014.
-
Almost Disjunctive List-Decoding Codes
Authors:
A. G. Dyachkov,
I. V. Vorobyev,
N. A. Polyanskii,
V. Yu. Shchukin
Abstract:
A binary code is said to be a disjunctive list-decoding $s_L$-code, $s\ge1$, $L\ge1$, (briefly, LD $s_L$-code) if the code is identified by the incidence matrix of a family of finite sets in which the union of any $s$ sets can cover not more than $L-1$ other sets of the family. In this paper, we introduce a natural {\em probabilistic} generalization of LD $s_L$-code when the code is said to be an…
▽ More
A binary code is said to be a disjunctive list-decoding $s_L$-code, $s\ge1$, $L\ge1$, (briefly, LD $s_L$-code) if the code is identified by the incidence matrix of a family of finite sets in which the union of any $s$ sets can cover not more than $L-1$ other sets of the family. In this paper, we introduce a natural {\em probabilistic} generalization of LD $s_L$-code when the code is said to be an almost disjunctive LD $s_L$-code if the unions of {\em almost all} $s$ sets satisfy the given condition. We develop a random coding method based on the ensemble of binary constant-weight codes to obtain lower bounds on the capacity and error probability exponent of such codes. For the considered ensemble our lower bounds are asymptotically tight.
△ Less
Submitted 9 July, 2014;
originally announced July 2014.
-
Bounds on the rate of superimposed codes
Authors:
Arkady D'yachkov,
Ilya Vorobyev,
Nikita Polianskii,
Vladislav Shchukin
Abstract:
A binary code is called a superimposed cover-free $(s,\ell)$-code if the code is identified by the incidence matrix of a family of finite sets in which no intersection of $\ell$ sets is covered by the union of $s$ others. A binary code is called a superimposed list-decoding $s_L$-code if the code is identified by the incidence matrix of a family of finite sets in which the union of any $s$ sets ca…
▽ More
A binary code is called a superimposed cover-free $(s,\ell)$-code if the code is identified by the incidence matrix of a family of finite sets in which no intersection of $\ell$ sets is covered by the union of $s$ others. A binary code is called a superimposed list-decoding $s_L$-code if the code is identified by the incidence matrix of a family of finite sets in which the union of any $s$ sets can cover not more than $L-1$ other sets of the family. For $L=\ell=1$, both of the definitions coincide and the corresponding binary code is called a superimposed $s$-code. Our aim is to obtain new lower and upper bounds on the rate of given codes. The most interesting result is a lower bound on the rate of superimposed cover-free $(s,\ell)$-code based on the ensemble of constant-weight binary codes. If parameter $\ell\ge1$ is fixed and $s\to\infty$, then the ratio of this lower bound to the best known upper bound converges to the limit $2\,e^{-2}=0,271$. For the classical case $\ell=1$ and $s\ge2$, the given Statement means that our recurrent upper bound on the rate of superimposed $s$-codes obtained in 1982 is attained to within a constant factor $a$, $0,271\le a\le1$
△ Less
Submitted 17 May, 2016; v1 submitted 30 December, 2013;
originally announced January 2014.
-
Search for Two-Particle Muon Decay to Positron and Goldstone Massless Boson (FAMILON)
Authors:
V. A. Andreev,
V. S. Demidov,
E. V. Demidova,
V. N. Duginov,
Yu. V. Elkin,
V. A. Gordeev,
K. I. Gritsai,
S. A. Gustov,
V. G. Ivochkin,
E. M. Karasev,
M. Yu. Khlopov,
E. N. Komarov,
S. V. Kosianenko,
A. G. Krivshich,
M. P. Levchenko,
T. N. Mamedov,
I. V. Mirokhin,
V. G. Olshevsky,
Yu. A. Scheglov,
G. V. Scherbakov,
A. Yu. Sokolov,
Yu. P. Schkurenko,
A. V. Stoykov,
S. I. Vorobyev,
A. A. Zhdanov
, et al. (1 additional authors not shown)
Abstract:
The experimental test of possible expansion for the Higgs sector is proposed. The lepton family violation will be studied. To reach this goal we are going to carry out the search for the scalar Goldstone boson in the neutrinoless muon decay mu+ to e+ and alpha. The asymmetry of the muon decay near the high energy edge of Michel spectrum is to be measured. To examine previous TRIUMF data the expe…
▽ More
The experimental test of possible expansion for the Higgs sector is proposed. The lepton family violation will be studied. To reach this goal we are going to carry out the search for the scalar Goldstone boson in the neutrinoless muon decay mu+ to e+ and alpha. The asymmetry of the muon decay near the high energy edge of Michel spectrum is to be measured. To examine previous TRIUMF data the experiment FAMILON is prepared at the surface muon beam of JINR (Dubna) accelerator. The setup consist of the precision magnetic spectrometer and the device for muSR - analysis.
△ Less
Submitted 28 December, 2006;
originally announced December 2006.