-
Addressing the Elephant in the Room: Robust Animal Re-Identification with Unsupervised Part-Based Feature Alignment
Authors:
Yingxue Yu,
Vidit Vidit,
Andrey Davydov,
Martin Engilberge,
Pascal Fua
Abstract:
Animal Re-ID is crucial for wildlife conservation, yet it faces unique challenges compared to person Re-ID. First, the scarcity and lack of diversity in datasets lead to background-biased models. Second, animal Re-ID depends on subtle, species-specific cues, further complicated by variations in pose, background, and lighting. This study addresses background biases by proposing a method to systemat…
▽ More
Animal Re-ID is crucial for wildlife conservation, yet it faces unique challenges compared to person Re-ID. First, the scarcity and lack of diversity in datasets lead to background-biased models. Second, animal Re-ID depends on subtle, species-specific cues, further complicated by variations in pose, background, and lighting. This study addresses background biases by proposing a method to systematically remove backgrounds in both training and evaluation phases. And unlike prior works that depend on pose annotations, our approach utilizes an unsupervised technique for feature alignment across body parts and pose variations, enhancing practicality. Our method achieves superior results on three key animal Re-ID datasets: ATRW, YakReID-103, and ELPephants.
△ Less
Submitted 22 May, 2024;
originally announced May 2024.
-
CLOAF: CoLlisiOn-Aware Human Flow
Authors:
Andrey Davydov,
Martin Engilberge,
Mathieu Salzmann,
Pascal Fua
Abstract:
Even the best current algorithms for estimating body 3D shape and pose yield results that include body self-intersections. In this paper, we present CLOAF, which exploits the diffeomorphic nature of Ordinary Differential Equations to eliminate such self-intersections while still imposing body shape constraints. We show that, unlike earlier approaches to addressing this issue, ours completely elimi…
▽ More
Even the best current algorithms for estimating body 3D shape and pose yield results that include body self-intersections. In this paper, we present CLOAF, which exploits the diffeomorphic nature of Ordinary Differential Equations to eliminate such self-intersections while still imposing body shape constraints. We show that, unlike earlier approaches to addressing this issue, ours completely eliminates the self-intersections without compromising the accuracy of the reconstructions. Being differentiable, CLOAF can be used to fine-tune pose and shape estimation baselines to improve their overall performance and eliminate self-intersections in their predictions. Furthermore, we demonstrate how our CLOAF strategy can be applied to practically any motion field induced by the user. CLOAF also makes it possible to edit motion to interact with the environment without worrying about potential collision or loss of body-shape prior.
△ Less
Submitted 13 March, 2024;
originally announced March 2024.
-
Learning Neural Contracting Dynamics: Extended Linearization and Global Guarantees
Authors:
Sean Jaffe,
Alexander Davydov,
Deniz Lapsekili,
Ambuj Singh,
Francesco Bullo
Abstract:
Global stability and robustness guarantees in learned dynamical systems are essential to ensure well-behavedness of the systems in the face of uncertainty. We present Extended Linearized Contracting Dynamics (ELCD), the first neural network-based dynamical system with global contractivity guarantees in arbitrary metrics. The key feature of ELCD is a parametrization of the extended linearization of…
▽ More
Global stability and robustness guarantees in learned dynamical systems are essential to ensure well-behavedness of the systems in the face of uncertainty. We present Extended Linearized Contracting Dynamics (ELCD), the first neural network-based dynamical system with global contractivity guarantees in arbitrary metrics. The key feature of ELCD is a parametrization of the extended linearization of the nonlinear vector field. In its most basic form, ELCD is guaranteed to be (i) globally exponentially stable, (ii) equilibrium contracting, and (iii) globally contracting with respect to some metric. To allow for contraction with respect to more general metrics in the data space, we train diffeomorphisms between the data space and a latent space and enforce contractivity in the latent space, which ensures global contractivity in the data space. We demonstrate the performance of ELCD on the high dimensional LASA, multi-link pendulum, and Rosenbrock datasets.
△ Less
Submitted 29 May, 2024; v1 submitted 12 February, 2024;
originally announced February 2024.
-
Using Motion Cues to Supervise Single-Frame Body Pose and Shape Estimation in Low Data Regimes
Authors:
Andrey Davydov,
Alexey Sidnev,
Artsiom Sanakoyeu,
Yuhua Chen,
Mathieu Salzmann,
Pascal Fua
Abstract:
When enough annotated training data is available, supervised deep-learning algorithms excel at estimating human body pose and shape using a single camera. The effects of too little such data being available can be mitigated by using other information sources, such as databases of body shapes, to learn priors. Unfortunately, such sources are not always available either. We show that, in such cases,…
▽ More
When enough annotated training data is available, supervised deep-learning algorithms excel at estimating human body pose and shape using a single camera. The effects of too little such data being available can be mitigated by using other information sources, such as databases of body shapes, to learn priors. Unfortunately, such sources are not always available either. We show that, in such cases, easy-to-obtain unannotated videos can be used instead to provide the required supervisory signals. Given a trained model using too little annotated data, we compute poses in consecutive frames along with the optical flow between them. We then enforce consistency between the image optical flow and the one that can be inferred from the change in pose from one frame to the next. This provides enough additional supervision to effectively refine the network weights and to perform on par with methods trained using far more annotated data.
△ Less
Submitted 5 February, 2024;
originally announced February 2024.
-
New bounds for covering codes of radius 3 and codimension 3t+1
Authors:
Alexander A. Davydov,
Stefano Marcugini,
Fernanda Pambianco
Abstract:
The smallest possible length of a $q$-ary linear code of covering radius $R$ and codimension (redundancy) $r$ is called the length function and is denoted by $\ell_q(r,R)$. In this work, for $q$ \emph{an arbitrary prime power}, we obtain the following new constructive upper bounds on $\ell_q(3t+1,3)$:…
▽ More
The smallest possible length of a $q$-ary linear code of covering radius $R$ and codimension (redundancy) $r$ is called the length function and is denoted by $\ell_q(r,R)$. In this work, for $q$ \emph{an arbitrary prime power}, we obtain the following new constructive upper bounds on $\ell_q(3t+1,3)$:
$\ell_q(r,3)\lessapprox \sqrt[3]{k}\cdot q^{(r-3)/3}\cdot\sqrt[3]{\ln q},~r=3t+1, ~t\ge1, ~ q\ge\lceil\mathcal{W}(k)\rceil, 18 <k\le20.339,~\mathcal{W}(k)\text{ is a decreasing function of }k ;$
$\ell_q(r,3)\lessapprox \sqrt[3]{18}\cdot q^{(r-3)/3}\cdot\sqrt[3]{\ln q},~r=3t+1,~t\ge1,~ q\text{ large enough}.$
For $t = 1$, we use a one-to-one correspondence between codes of covering radius 3 and codimension 4, and 2-saturating sets in the projective space $\mathrm{PG}(3,q)$. A new construction providing sets of small size is proposed. The codes, obtained by geometrical methods, are taken as the starting ones in the lift-constructions (so-called ``$q^m$-concatenating constructions'') to obtain infinite families of codes with radius 3 and growing codimension $r = 3t + 1$, $t\ge1$. The new bounds are essentially better than the known ones.
△ Less
Submitted 19 May, 2023;
originally announced May 2023.
-
Robust Training and Verification of Implicit Neural Networks: A Non-Euclidean Contractive Approach
Authors:
Saber Jafarpour,
Alexander Davydov,
Matthew Abate,
Francesco Bullo,
Samuel Coogan
Abstract:
This paper proposes a theoretical and computational framework for training and robustness verification of implicit neural networks based upon non-Euclidean contraction theory. The basic idea is to cast the robustness analysis of a neural network as a reachability problem and use (i) the $\ell_{\infty}$-norm input-output Lipschitz constant and (ii) the tight inclusion function of the network to ove…
▽ More
This paper proposes a theoretical and computational framework for training and robustness verification of implicit neural networks based upon non-Euclidean contraction theory. The basic idea is to cast the robustness analysis of a neural network as a reachability problem and use (i) the $\ell_{\infty}$-norm input-output Lipschitz constant and (ii) the tight inclusion function of the network to over-approximate its reachable sets. First, for a given implicit neural network, we use $\ell_{\infty}$-matrix measures to propose sufficient conditions for its well-posedness, design an iterative algorithm to compute its fixed points, and provide upper bounds for its $\ell_\infty$-norm input-output Lipschitz constant. Second, we introduce a related embedded network and show that the embedded network can be used to provide an $\ell_\infty$-norm box over-approximation of the reachable sets of the original network. Moreover, we use the embedded network to design an iterative algorithm for computing the upper bounds of the original system's tight inclusion function. Third, we use the upper bounds of the Lipschitz constants and the upper bounds of the tight inclusion functions to design two algorithms for the training and robustness verification of implicit neural networks. Finally, we apply our algorithms to train implicit neural networks on the MNIST dataset and compare the robustness of our models with the models trained via existing approaches in the literature.
△ Less
Submitted 7 August, 2022;
originally announced August 2022.
-
Comparative Analysis of Interval Reachability for Robust Implicit and Feedforward Neural Networks
Authors:
Alexander Davydov,
Saber Jafarpour,
Matthew Abate,
Francesco Bullo,
Samuel Coogan
Abstract:
We use interval reachability analysis to obtain robustness guarantees for implicit neural networks (INNs). INNs are a class of implicit learning models that use implicit equations as layers and have been shown to exhibit several notable benefits over traditional deep neural networks. We first establish that tight inclusion functions of neural networks, which provide the tightest rectangular over-a…
▽ More
We use interval reachability analysis to obtain robustness guarantees for implicit neural networks (INNs). INNs are a class of implicit learning models that use implicit equations as layers and have been shown to exhibit several notable benefits over traditional deep neural networks. We first establish that tight inclusion functions of neural networks, which provide the tightest rectangular over-approximation of an input-output map, lead to sharper robustness guarantees than the well-studied robustness measures of local Lipschitz constants. Like Lipschitz constants, tight inclusions functions are computationally challenging to obtain, and we thus propose using mixed monotonicity and contraction theory to obtain computationally efficient estimates of tight inclusion functions for INNs. We show that our approach performs at least as well as, and generally better than, applying state-of-the-art interval bound propagation methods to INNs. We design a novel optimization problem for training robust INNs and we provide empirical evidence that suitably-trained INNs can be more robust than comparably-trained feedforward networks.
△ Less
Submitted 31 March, 2022;
originally announced April 2022.
-
Robustness Certificates for Implicit Neural Networks: A Mixed Monotone Contractive Approach
Authors:
Saber Jafarpour,
Matthew Abate,
Alexander Davydov,
Francesco Bullo,
Samuel Coogan
Abstract:
Implicit neural networks are a general class of learning models that replace the layers in traditional feedforward models with implicit algebraic equations. Compared to traditional learning models, implicit networks offer competitive performance and reduced memory consumption. However, they can remain brittle with respect to input adversarial perturbations.
This paper proposes a theoretical and…
▽ More
Implicit neural networks are a general class of learning models that replace the layers in traditional feedforward models with implicit algebraic equations. Compared to traditional learning models, implicit networks offer competitive performance and reduced memory consumption. However, they can remain brittle with respect to input adversarial perturbations.
This paper proposes a theoretical and computational framework for robustness verification of implicit neural networks; our framework blends together mixed monotone systems theory and contraction theory. First, given an implicit neural network, we introduce a related embedded network and show that, given an $\ell_\infty$-norm box constraint on the input, the embedded network provides an $\ell_\infty$-norm box overapproximation for the output of the given network. Second, using $\ell_{\infty}$-matrix measures, we propose sufficient conditions for well-posedness of both the original and embedded system and design an iterative algorithm to compute the $\ell_{\infty}$-norm box robustness margins for reachability and classification problems. Third, of independent value, we propose a novel relative classifier variable that leads to tighter bounds on the certified adversarial robustness in classification problems. Finally, we perform numerical simulations on a Non-Euclidean Monotone Operator Network (NEMON) trained on the MNIST dataset. In these simulations, we compare the accuracy and run time of our mixed monotone contractive approach with the existing robustness verification approaches in the literature for estimating the certified adversarial robustness.
△ Less
Submitted 9 December, 2021;
originally announced December 2021.
-
Adversarial Parametric Pose Prior
Authors:
Andrey Davydov,
Anastasia Remizova,
Victor Constantin,
Sina Honari,
Mathieu Salzmann,
Pascal Fua
Abstract:
The Skinned Multi-Person Linear (SMPL) model can represent a human body by map** pose and shape parameters to body meshes. This has been shown to facilitate inferring 3D human pose and shape from images via different learning models. However, not all pose and shape parameter values yield physically-plausible or even realistic body meshes. In other words, SMPL is under-constrained and may thus le…
▽ More
The Skinned Multi-Person Linear (SMPL) model can represent a human body by map** pose and shape parameters to body meshes. This has been shown to facilitate inferring 3D human pose and shape from images via different learning models. However, not all pose and shape parameter values yield physically-plausible or even realistic body meshes. In other words, SMPL is under-constrained and may thus lead to invalid results when used to reconstruct humans from images, either by directly optimizing its parameters, or by learning a map** from the image to these parameters.
In this paper, we therefore learn a prior that restricts the SMPL parameters to values that produce realistic poses via adversarial training. We show that our learned prior covers the diversity of the real-data distribution, facilitates optimization for 3D reconstruction from 2D keypoints, and yields better pose estimates when used for regression from images. We found that the prior based on spherical distribution gets the best results. Furthermore, in all these tasks, it outperforms the state-of-the-art VAE-based approach to constraining the SMPL parameters.
△ Less
Submitted 8 December, 2021;
originally announced December 2021.
-
Upper bounds on the length function for covering codes with covering radius $R$ and codimension $tR+1$
Authors:
Alexander A. Davydov,
Stefano Marcugini,
Fernanda Pambianco
Abstract:
The length function $\ell_q(r,R)$ is the smallest length of a $ q $-ary linear code with codimension (redundancy) $r$ and covering radius $R$. In this work, new upper bounds on $\ell_q(tR+1,R)$ are obtained in the following forms: \begin{equation*} \begin{split}
&(a)~\ell_q(r,R)\le cq^{(r-R)/R}\cdot\sqrt[R]{\ln q},~ R\ge3,~r=tR+1,~t\ge1,
&\phantom{(a)~} q\text{ is an arbitrary prime power},~c\…
▽ More
The length function $\ell_q(r,R)$ is the smallest length of a $ q $-ary linear code with codimension (redundancy) $r$ and covering radius $R$. In this work, new upper bounds on $\ell_q(tR+1,R)$ are obtained in the following forms: \begin{equation*} \begin{split}
&(a)~\ell_q(r,R)\le cq^{(r-R)/R}\cdot\sqrt[R]{\ln q},~ R\ge3,~r=tR+1,~t\ge1,
&\phantom{(a)~} q\text{ is an arbitrary prime power},~c\text{ is independent of }q.
\end{split} \end{equation*} \begin{equation*} \begin{split}
&(b)~\ell_q(r,R)< 3.43Rq^{(r-R)/R}\cdot\sqrt[R]{\ln q},~ R\ge3,~r=tR+1,~t\ge1,
&\phantom{(b)~} q\text{ is an arbitrary prime power},~q\text{ is large enough}.
\end{split} \end{equation*} In the literature, for $q=(q')^R$ with $q'$ a prime power, smaller upper bounds are known; however, when $q$ is an arbitrary prime power, the bounds of this paper are better than the known ones.
For $t=1$, we use a one-to-one correspondence between $[n,n-(R+1)]_qR$ codes and $(R-1)$-saturating $n$-sets in the projective space $\mathrm{PG}(R,q)$. A new construction of such saturating sets providing sets of small size is proposed. Then the $[n,n-(R+1)]_qR$ codes, obtained by geometrical methods, are taken as the starting ones in the lift-constructions (so-called "$q^m$-concatenating constructions") for covering codes to obtain infinite families of codes with growing codimension $r=tR+1$, $t\ge1$.
△ Less
Submitted 29 November, 2021; v1 submitted 31 August, 2021;
originally announced August 2021.
-
Robust Implicit Networks via Non-Euclidean Contractions
Authors:
Saber Jafarpour,
Alexander Davydov,
Anton V. Proskurnikov,
Francesco Bullo
Abstract:
Implicit neural networks, a.k.a., deep equilibrium networks, are a class of implicit-depth learning models where function evaluation is performed by solving a fixed point equation. They generalize classic feedforward models and are equivalent to infinite-depth weight-tied feedforward networks. While implicit models show improved accuracy and significant reduction in memory consumption, they can su…
▽ More
Implicit neural networks, a.k.a., deep equilibrium networks, are a class of implicit-depth learning models where function evaluation is performed by solving a fixed point equation. They generalize classic feedforward models and are equivalent to infinite-depth weight-tied feedforward networks. While implicit models show improved accuracy and significant reduction in memory consumption, they can suffer from ill-posedness and convergence instability.
This paper provides a new framework, which we call Non-Euclidean Monotone Operator Network (NEMON), to design well-posed and robust implicit neural networks based upon contraction theory for the non-Euclidean norm $\ell_{\infty}$. Our framework includes (i) a novel condition for well-posedness based on one-sided Lipschitz constants, (ii) an average iteration for computing fixed-points, and (iii) explicit estimates on input-output Lipschitz constants. Additionally, we design a training problem with the well-posedness condition and the average iteration as constraints and, to achieve robust models, with the input-output Lipschitz constant as a regularizer. Our $\ell_{\infty}$ well-posedness condition leads to a larger polytopic training search space than existing conditions and our average iteration enjoys accelerated convergence. Finally, we evaluate our framework in image classification through the MNIST and the CIFAR-10 datasets. Our numerical results demonstrate improved accuracy and robustness of the implicit models with smaller input-output Lipschitz bounds. Code is available at https://github.com/davydovalexander/Non-Euclidean_Mon_Op_Net.
△ Less
Submitted 25 January, 2022; v1 submitted 6 June, 2021;
originally announced June 2021.
-
On the weight distribution of the cosets of MDS codes
Authors:
Alexander A. Davydov,
Stefano Marcugini,
Fernanda Pambianco
Abstract:
The weight distribution of the cosets of maximum distance separable (MDS) codes is considered. In 1990, P.G. Bonneau proposed a relation to obtain the full weight distribution of a coset of an MDS code with minimum distance $d$ using the known numbers of vectors of weights $\le d-2$ in this coset. In this paper, the Bonneau formula is transformed into a more structured and convenient form. The new…
▽ More
The weight distribution of the cosets of maximum distance separable (MDS) codes is considered. In 1990, P.G. Bonneau proposed a relation to obtain the full weight distribution of a coset of an MDS code with minimum distance $d$ using the known numbers of vectors of weights $\le d-2$ in this coset. In this paper, the Bonneau formula is transformed into a more structured and convenient form. The new version of the formula allows to consider effectively cosets of distinct weights $W$. (The weight $W$ of a coset is the smallest Hamming weight of any vector in the coset.) For each of the considered $W$ or regions of $W$, special relations more simple than the general ones are obtained. For the MDS code cosets of weight $W=1$ and weight $W=d-1$ we obtain formulas of the weight distributions depending only on the code parameters. This proves that all the cosets of weight $W=1$ (as well as $W=d-1$) have the same weight distribution. The cosets of weight $W=2$ or $W=d-2$ may have different weight distributions; in this case, we proved that the distributions are symmetrical in some sense. The weight distributions of the cosets of MDS codes corresponding to arcs in the projective plane $\mathrm{PG}(2,q)$ are also considered. For MDS codes of covering radius $R=d-1$ we obtain the number of the weight $W=d-1$ cosets and their weight distribution that gives rise to a certain classification of the so-called deep holes. We show that any MDS code of covering radius $R=d-1$ is an almost perfect multiple covering of the farthest-off points (deep holes); moreover, it corresponds to an optimal multiple saturating set in the projective space $\mathrm{PG}(N,q)$.
△ Less
Submitted 30 June, 2021; v1 submitted 29 January, 2021;
originally announced January 2021.
-
On cosets weight distributions of the doubly-extended Reed-Solomon codes of codimension 4
Authors:
Alexander A. Davydov,
Stefano Marcugini,
Fernanda Pambianco
Abstract:
We consider the $[q+1,q-3,5]_q3$ generalized doubly-extended Reed-Solomon code of codimension $4$ as the code associated with the twisted cubic in the projective space $\mathrm{PG}(3,q)$. Basing on the point-plane incidence matrix of $\mathrm{PG}(3,q)$, we obtain the number of weight 3 vectors in all the cosets of the considered code. This allows us to classify the cosets by their weight distribut…
▽ More
We consider the $[q+1,q-3,5]_q3$ generalized doubly-extended Reed-Solomon code of codimension $4$ as the code associated with the twisted cubic in the projective space $\mathrm{PG}(3,q)$. Basing on the point-plane incidence matrix of $\mathrm{PG}(3,q)$, we obtain the number of weight 3 vectors in all the cosets of the considered code. This allows us to classify the cosets by their weight distributions and to obtain these distributions. The weight of a coset is the smallest Hamming weight of any vector in the coset. For the cosets of equal weight having distinct weight distributions, we prove that the difference between the $w$-th components, $3<w\le q+1$, of the distributions is uniquely determined by the difference between the $3$-rd components. This implies an interesting (and in some sense unexpected) symmetry of the obtained distributions.
△ Less
Submitted 22 February, 2021; v1 submitted 17 July, 2020;
originally announced July 2020.
-
On integral weight spectra of the MDS codes cosets of weight 1, 2, and 3
Authors:
Alexander A. Davydov,
Stefano Marcugini,
Fernanda Pambianco
Abstract:
The weight of a coset of a code is the smallest Hamming weight of any vector in the coset. For a linear code of length $n$, we call integral weight spectrum the overall numbers of weight $w$ vectors, $0\le w\le n$, in all the cosets of a fixed weight. For maximum distance separable (MDS) codes, we obtained new convenient formulas of integral weight spectra of cosets of weight 1 and 2. Also, we giv…
▽ More
The weight of a coset of a code is the smallest Hamming weight of any vector in the coset. For a linear code of length $n$, we call integral weight spectrum the overall numbers of weight $w$ vectors, $0\le w\le n$, in all the cosets of a fixed weight. For maximum distance separable (MDS) codes, we obtained new convenient formulas of integral weight spectra of cosets of weight 1 and 2. Also, we give the spectra for the weight 3 cosets of MDS codes with minimum distance $5$ and covering radius $3$.
△ Less
Submitted 15 July, 2020; v1 submitted 5 July, 2020;
originally announced July 2020.
-
Tables, bounds and graphics of short linear codes with covering radius 3 and codimension 4 and 5
Authors:
Daniele Bartoli,
Alexander A. Davydov,
Stefano Marcugini,
Fernanda Pambianco
Abstract:
The length function $\ell_q(r,R)$ is the smallest length of a $q$-ary linear code of codimension (redundancy) $r$ and covering radius $R$. The $d$-length function $\ell_q(r,R,d)$ is the smallest length of a $q$-ary linear code with codimension $r$, covering radius $R$, and minimum distance $d$. By computer search in wide regions of $q$, we obtained following short codes of covering radius $R=3$:…
▽ More
The length function $\ell_q(r,R)$ is the smallest length of a $q$-ary linear code of codimension (redundancy) $r$ and covering radius $R$. The $d$-length function $\ell_q(r,R,d)$ is the smallest length of a $q$-ary linear code with codimension $r$, covering radius $R$, and minimum distance $d$. By computer search in wide regions of $q$, we obtained following short codes of covering radius $R=3$: $[n,n-4,5]_q3$ quasi-perfect MDS codes, $[n,n-5,5]_q3$ quasi-perfect Almost MDS codes, and $[n,n-5,3]_q3$ codes. In computer search, we use the step-by-step leximatrix and inverse leximatrix algorithms to obtain parity check matrices of codes. The new codes imply the following new upper bounds (called lexi-bounds) on the length and $d$-length functions: $$\ell_q(4,3)\le\ell_q(4,3,5)<2.8\sqrt[3]{\ln q}\cdot q^{(4-3)/3}=2.8\sqrt[3]{\ln q}\cdot\sqrt[3]{q}=2.8\sqrt[3]{q\ln q}~\text{for}~11\le q\le7057;$$ $$\ell_q(5,3)\le\ell_q(5,3,5)<3\sqrt[3]{\ln q}\cdot q^{(5-3)/3}=3\sqrt[3]{\ln q}\cdot\sqrt[3]{q^2}=3\sqrt[3]{q^2\ln q}~~\text{ for }~37\le q\le839.$$ Moreover, we improve the lexi-bounds, applying randomized greedy algorithms, and show that $$\ell_q(4,3)\le \ell_q(4,3,5)< 2.61\sqrt[3]{q\ln q}~\text{ if }~13\le q\le4373;$$ $$\ell_q(4,3)\le \ell_q(4,3,5)< 2.65\sqrt[3]{q\ln q}~\text{ if }~4373<q\le7057;$$ $$\ell_q(5,3)<2.785\sqrt[3]{q^2\ln q}~\text{ if }~11\le q\le401;$$ $$\ell_q(5,3)\le\ell_q(5,3,5)<2.884\sqrt[3]{q^2\ln q}~\text{ if }~401<q\le839.$$ The codes, obtained in this paper by leximatrix and inverse leximatrix algorithms, provide new upper bounds (called density lexi-bounds) on the smallest covering density $μ_q(r,R)$ of a $q$-ary linear code of codimension $r$ and covering radius $R$: $$μ_q(4,3)<3.3\cdot\ln q~~\text{ for }~11\le q\le7057;$$ $$μ_q(5,3)<4.2\cdot\ln q~~\text{ for }~37\le q\le839.$$
△ Less
Submitted 14 June, 2020; v1 submitted 19 December, 2017;
originally announced December 2017.
-
Upper bounds on the smallest size of a complete cap in $\mathrm{PG}(N,q)$, $N\ge3$, under a certain probabilistic conjecture
Authors:
Alexander A. Davydov,
Giorgio Faina,
Stefano Marcugini,
Fernanda Pambianco
Abstract:
In the projective space $\mathrm{PG}(N,q)$ over the Galois field of order $q$, $N\ge3$, an iterative step-by-step construction of complete caps by adding a new point on every step is considered. It is proved that uncovered points are evenly placed on the space. A natural conjecture on an estimate of the number of new covered points on every step is done. For a part of the iterative process, this e…
▽ More
In the projective space $\mathrm{PG}(N,q)$ over the Galois field of order $q$, $N\ge3$, an iterative step-by-step construction of complete caps by adding a new point on every step is considered. It is proved that uncovered points are evenly placed on the space. A natural conjecture on an estimate of the number of new covered points on every step is done. For a part of the iterative process, this estimate is proved rigorously. Under the conjecture mentioned, new upper bounds on the smallest size $t_{2}(N,q)$ of a complete cap in $\mathrm{PG}(N,q)$ are obtained, in particular, \begin{align*} t_{2}(N,q)<\frac{\sqrt{q^{N+1}}}{q-1}\left(\sqrt{(N+1)\ln q}+1\right)+2\thicksim q^\frac{N-1}{2}\sqrt{(N+1)\ln q},\quad N\ge3. \end{align*} A connection with the Birthday problem is noted. The effectiveness of the new bounds is illustrated by comparison with sizes of complete caps obtained by computer in wide regions of $q$.
△ Less
Submitted 6 June, 2017;
originally announced June 2017.
-
Weight Spectrum of Quasi-Perfect Binary Codes with Distance 4
Authors:
Valentine B. Afanassiev,
Alexander A. Davydov
Abstract:
We consider the weight spectrum of a class of quasi-perfect binary linear codes with code distance 4. For example, extended Hamming code and Panchenko code are the known members of this class. Also, it is known that in many cases Panchenko code has the minimal number of weight 4 codewords. We give exact recursive formulas for the weight spectrum of quasi-perfect codes and their dual codes. As an e…
▽ More
We consider the weight spectrum of a class of quasi-perfect binary linear codes with code distance 4. For example, extended Hamming code and Panchenko code are the known members of this class. Also, it is known that in many cases Panchenko code has the minimal number of weight 4 codewords. We give exact recursive formulas for the weight spectrum of quasi-perfect codes and their dual codes. As an example of application of the weight spectrum we derive a lower estimate for the conditional probability of correction of erasure patterns of high weights (equal to or greater than code distance).
△ Less
Submitted 12 June, 2017; v1 submitted 12 March, 2017;
originally announced March 2017.
-
Upper bounds on the smallest size of a saturating set in projective planes and spaces of even dimension
Authors:
Daniele Bartoli,
Alexander Davydov,
Massimo Giulietti,
Stefano Marcugini,
Fernanda Pambianco
Abstract:
In a projective plane $Π_{q}$ (not necessarily Desarguesian) of order $q$, a point subset $\mathcal{S}$ is saturating (or dense) if any point of $Π_{q}\setminus \mathcal{S}$ is collinear with two points in $\mathcal{S}$. Modifying an approach of [31], we proved the following upper bound on the smallest size $s(2,q)$ of a saturating set in $Π_{q}$: \begin{equation*} s(2,q)\leq \sqrt{(q+1)\left(3\ln…
▽ More
In a projective plane $Π_{q}$ (not necessarily Desarguesian) of order $q$, a point subset $\mathcal{S}$ is saturating (or dense) if any point of $Π_{q}\setminus \mathcal{S}$ is collinear with two points in $\mathcal{S}$. Modifying an approach of [31], we proved the following upper bound on the smallest size $s(2,q)$ of a saturating set in $Π_{q}$: \begin{equation*} s(2,q)\leq \sqrt{(q+1)\left(3\ln q+\ln\ln q +\ln\frac{3}{4}\right)}+\sqrt{\frac{q}{3\ln q}}+3. \end{equation*} The bound holds for all q, not necessarily large.
By using inductive constructions, upper bounds on the smallest size of a saturating set in the projective space $\mathrm{PG}(N,q)$ with even dimension $N$ are obtained.
All the results are also stated in terms of linear covering codes.
△ Less
Submitted 25 February, 2017;
originally announced February 2017.
-
Tables of parameters of symmetric configurations $v_{k}$
Authors:
Alexander A. Davydov,
Giorgio Faina,
Massimo Giulietti,
Stefano Marcugini,
Fernanda Pambianco
Abstract:
Tables of the currently known parameters of symmetric configurations are given. Formulas for parameters of the known infinite families of symmetric configurations are presented as well. The results of the recent paper [18] are used. This work can be viewed as an appendix to [18], in the sense that the tables given here cover a much larger set of parameters.
Tables of the currently known parameters of symmetric configurations are given. Formulas for parameters of the known infinite families of symmetric configurations are presented as well. The results of the recent paper [18] are used. This work can be viewed as an appendix to [18], in the sense that the tables given here cover a much larger set of parameters.
△ Less
Submitted 23 September, 2014; v1 submitted 13 December, 2013;
originally announced December 2013.
-
Signal and Image Processing with Sinlets
Authors:
Alexander Y. Davydov
Abstract:
This paper presents a new family of localized orthonormal bases - sinlets - which are well suited for both signal and image processing and analysis. One-dimensional sinlets are related to specific solutions of the time-dependent harmonic oscillator equation. By construction, each sinlet is infinitely differentiable and has a well-defined and smooth instantaneous frequency known in analytical form.…
▽ More
This paper presents a new family of localized orthonormal bases - sinlets - which are well suited for both signal and image processing and analysis. One-dimensional sinlets are related to specific solutions of the time-dependent harmonic oscillator equation. By construction, each sinlet is infinitely differentiable and has a well-defined and smooth instantaneous frequency known in analytical form. For square-integrable transient signals with infinite support, one-dimensional sinlet basis provides an advantageous alternative to the Fourier transform by rendering accurate signal representation via a countable set of real-valued coefficients. The properties of sinlets make them suitable for analyzing many real-world signals whose frequency content changes with time including radar and sonar waveforms, music, speech, biological echolocation sounds, biomedical signals, seismic acoustic waves, and signals employed in wireless communication systems. One-dimensional sinlet bases can be used to construct two- and higher-dimensional bases with variety of potential applications including image analysis and representation.
△ Less
Submitted 17 September, 2012; v1 submitted 4 June, 2012;
originally announced June 2012.
-
Upper bounds on the smallest size of a complete arc in the plane PG(2,q)
Authors:
Daniele Bartoli,
Alexander A. Davydov,
Giorgio Faina,
Stefano Marcugini,
Fernanda Pambianco
Abstract:
New upper bounds on the smallest size t_{2}(2,q) of a complete arc in the projective plane PG(2,q) are obtained for q <= 9109. From these new bounds it follows that for q <= 2621 and q = 2659,2663,2683,2693,2753,2801, the relation t_{2}(2,q) < 4.5\sqrt{q} holds. Also, for q <= 5399 and q = 5413,5417,5419,5441,5443,5471,5483,5501,5521, we have t_{2}(2,q) < 4.8\sqrt{q}. Finally, for q <= 9067 it hol…
▽ More
New upper bounds on the smallest size t_{2}(2,q) of a complete arc in the projective plane PG(2,q) are obtained for q <= 9109. From these new bounds it follows that for q <= 2621 and q = 2659,2663,2683,2693,2753,2801, the relation t_{2}(2,q) < 4.5\sqrt{q} holds. Also, for q <= 5399 and q = 5413,5417,5419,5441,5443,5471,5483,5501,5521, we have t_{2}(2,q) < 4.8\sqrt{q}. Finally, for q <= 9067 it holds that t_{2}(2,q) < 5\sqrt{q}. The new upper bounds are obtained by finding new small complete arcs with the help of a computer search using randomized greedy algorithms.
△ Less
Submitted 14 November, 2011;
originally announced November 2011.
-
A Probabilistic Attack on NP-complete Problems
Authors:
Alexander Y. Davydov
Abstract:
Using the probability theory-based approach, this paper reveals the equivalence of an arbitrary NP-complete problem to a problem of checking whether a level set of a specifically constructed harmonic cost function (with all diagonal entries of its Hessian matrix equal to zero) intersects with a unit hypercube in many-dimensional Euclidean space. This connection suggests the possibility that method…
▽ More
Using the probability theory-based approach, this paper reveals the equivalence of an arbitrary NP-complete problem to a problem of checking whether a level set of a specifically constructed harmonic cost function (with all diagonal entries of its Hessian matrix equal to zero) intersects with a unit hypercube in many-dimensional Euclidean space. This connection suggests the possibility that methods of continuous mathematics can provide crucial insights into the most intriguing open questions in modern complexity theory.
△ Less
Submitted 2 August, 2012; v1 submitted 30 June, 2011;
originally announced July 2011.
-
On sizes of complete arcs in PG(2,q)
Authors:
Daniele Bartoli,
Alexander A. Davydov,
Giorgio Faina,
Stefano Marcugini,
Fernanda Pambianco
Abstract:
New upper bounds on the smallest size t_{2}(2,q) of a complete arc in the projective plane PG(2,q) are obtained for 853 <= q <= 4561 and q\in T1\cup T2 where T1={173,181,193,229,243,257,271,277,293,343,373,409,443,449,457, 461,463,467,479,487,491,499,529,563,569,571,577,587,593,599,601,607,613,617,619,631, 641,661,673,677,683,691, 709}, T2={4597,4703,4723,4733,4789,4799,4813,4831,5003,5347,5641,58…
▽ More
New upper bounds on the smallest size t_{2}(2,q) of a complete arc in the projective plane PG(2,q) are obtained for 853 <= q <= 4561 and q\in T1\cup T2 where T1={173,181,193,229,243,257,271,277,293,343,373,409,443,449,457, 461,463,467,479,487,491,499,529,563,569,571,577,587,593,599,601,607,613,617,619,631, 641,661,673,677,683,691, 709}, T2={4597,4703,4723,4733,4789,4799,4813,4831,5003,5347,5641,5843,6011,8192}. From these new bounds it follows that for q <= 2593 and q=2693,2753, the relation t_{2}(2,q) < 4.5\sqrt{q} holds. Also, for q <= 4561 we have t_{2}(2,q) < 4.75\sqrt{q}. It is showed that for 23 <= q <= 4561 and q\in T2\cup {2^{14},2^{15},2^{18}}, the inequality t_{2}(2,q) < \sqrt{q}ln^{0.75}q is true. Moreover, the results obtained allow us to conjecture that this estimate holds for all q >= 23. The new upper bounds are obtained by finding new small complete arcs with the help of a computer search using randomized greedy algorithms. Also new constructions of complete arcs are proposed. These constructions form families of k-arcs in PG(2,q) containing arcs of all sizes k in a region k_{min} <= k <= k_{max} where k_{min} is of order q/3 or q/4 while k_{max} has order q/2. The completeness of the arcs obtained by the new constructions is proved for q <= 1367 and 2003 <= q <= 2063. There is reason to suppose that the arcs are complete for all q > 1367. New sizes of complete arcs in PG(2,q) are presented for 169 <= q <= 349 and q=1013,2003.
△ Less
Submitted 23 May, 2011; v1 submitted 15 November, 2010;
originally announced November 2010.
-
Some combinatorial aspects of constructing bipartite-graph codes
Authors:
Alexander A. Davydov,
Massimo Giulietti,
Stefano Marcugini,
Fernanda Pambianco
Abstract:
We propose geometrical methods for constructing square 01-matrices with the same number n of units in every row and column, and such that any two rows of the matrix contain at most one unit in common. These matrices are equivalent to n-regular bipartite graphs without 4-cycles, and therefore can be used for the construction of efficient bipartite-graph codes such that both the classes of its ver…
▽ More
We propose geometrical methods for constructing square 01-matrices with the same number n of units in every row and column, and such that any two rows of the matrix contain at most one unit in common. These matrices are equivalent to n-regular bipartite graphs without 4-cycles, and therefore can be used for the construction of efficient bipartite-graph codes such that both the classes of its vertices are associated with local constraints. We significantly extend the region of parameters m,n for which there exist an n-regular bipartite graph with 2m vertices and without 4-cycles. In that way we essentially increase the region of lengths and rates of the corresponding bipartite-graph codes. Many new matrices are either circulant or consist of circulant submatrices: this provides code parity-check matrices consisting of circulant submatrices, and hence quasi-cyclic bipartite-graph codes with simple implementation.
△ Less
Submitted 30 September, 2009;
originally announced September 2009.