-
Function-Correcting $b$-symbol Codes for Locally $(λ, ρ,b)$-Functions
Authors:
Gyanendra K. Verma,
Anamika Singh,
Abhay Kumar Singh
Abstract:
The family of functions plays a central role in the design and effectiveness of function-correcting codes. By focusing on a well-defined family of functions, function-correcting codes can be constructed with minimal length while still ensuring full error detection or correction within that family. In this paper, we explore locally ($λ,ρ$)-functions and develop function-correcting codes using these…
▽ More
The family of functions plays a central role in the design and effectiveness of function-correcting codes. By focusing on a well-defined family of functions, function-correcting codes can be constructed with minimal length while still ensuring full error detection or correction within that family. In this paper, we explore locally ($λ,ρ$)-functions and develop function-correcting codes using these functions for $b$-symbol read channels. We establish the recurrence relation between the optimal redundancy of $(f,t)$ -function-correcting codes for the $(b+1)$-read and $b$-read channels. We establish an upper bound on the redundancy of general locally ($λ,ρ$, $b$)-function-correcting codes by linking it to the minimum achievable length of $b$-symbol error-correcting codes and traditional Hamming-metric codes, given a fixed number of codewords and a specified minimum distance. Specifically, we present explicit upper bounds for the classes of ($4,2t,b$)-local functions and ($2^b,2t,b$)-local functions. Additionally, for the case where $b=1$, we show that a ($3,2t,1$)-local function achieves the optimal redundancy of $3t$ under certain conditions. Moreover, we explicitly investigate locality and redundancy for the weight distribution function.
△ Less
Submitted 14 May, 2025;
originally announced May 2025.
-
Linear Complementary Pairs of Quasi-Cyclic and Quasi-Twisted Codes
Authors:
Kanat Abdukhalikov,
Duy Ho,
San Ling,
Gyanendra K. Verma
Abstract:
In this paper, we provide a polynomial characterization of linear complementary pairs of quasi-cyclic and quasi-twisted codes of index 2. We also give several examples of linear complementary pairs of quasi-cyclic and quasi-twisted codes with (almost) optimal security parameters.
In this paper, we provide a polynomial characterization of linear complementary pairs of quasi-cyclic and quasi-twisted codes of index 2. We also give several examples of linear complementary pairs of quasi-cyclic and quasi-twisted codes with (almost) optimal security parameters.
△ Less
Submitted 21 April, 2025;
originally announced April 2025.
-
Code size constraints in b-symbol read channels: A bound analysis
Authors:
Gyanendra K. Verma,
Nupur Patanker,
Abhay Kumar Singh
Abstract:
In classical coding theory, error-correcting codes are designed to protect against errors occurring at individual symbol positions in a codeword. However, in practical storage and communication systems, errors often affect multiple adjacent symbols rather than single symbols independently. To address this, symbol-pair read channels were introduced \cite{Yuval2011}, and later generalized to $b$-sym…
▽ More
In classical coding theory, error-correcting codes are designed to protect against errors occurring at individual symbol positions in a codeword. However, in practical storage and communication systems, errors often affect multiple adjacent symbols rather than single symbols independently. To address this, symbol-pair read channels were introduced \cite{Yuval2011}, and later generalized to $b$-symbol read channels \cite{yaakobi2016} to better model such error patterns. $b$-Symbol read channels generalize symbol-pair read channels to account for clustered errors in modern storage and communication systems. By developing bounds and efficient codes, researchers improve data reliability in applications such as storage devices, wireless networks, and DNA-based storage. Given integers $q$, $n$, $d$, and $b \geq 2$, let $A_b(n,d,q)$ denote the largest possible code size for which there exists a $q$-ary code of length $n$ with minimum $b$-symbol distance at least $d$. In \cite{chen2022}, various upper and lower bounds on $A_b(n,d,q)$ are given for $b=2$. In this paper, we generalize some of these bounds to the $b$-symbol read channels for $b>2$ and present several new bounds on $A_b(n,d,q)$. In particular, we establish the linear programming bound, a recurrence relation on $A_b(n,d,q)$, the Johnson bound (even), the restricted Johnson bound, the Gilbert-Varshamov-type bound, and the Elias bound for the metric of symbols $b$, $b\geq 2$. Furthermore, we provide examples demonstrating that the Gilbert-Varshamov bound we establish offers a stronger lower bound than the one presented in \cite{Song2018}. Additionally, we introduce an alternative approach to deriving the Sphere-packing and Plotkin bounds.
△ Less
Submitted 22 April, 2025; v1 submitted 14 April, 2025;
originally announced April 2025.
-
Linear complementary dual quasi-cyclic codes of index 2
Authors:
Kanat Abdukhalikov,
Duy Ho,
San Ling,
Gyanendra K. Verma
Abstract:
We provide a polynomial approach to investigate linear complementary dual (LCD) quasi-cyclic codes over finite fields. We establish necessary and sufficient conditions for LCD quasi-cyclic codes of index 2 with respect to the Euclidean, Hermitian, and symplectic inner products. As a consequence of these characterizations, we derive necessary and sufficient conditions for LCD one-generator quasi-cy…
▽ More
We provide a polynomial approach to investigate linear complementary dual (LCD) quasi-cyclic codes over finite fields. We establish necessary and sufficient conditions for LCD quasi-cyclic codes of index 2 with respect to the Euclidean, Hermitian, and symplectic inner products. As a consequence of these characterizations, we derive necessary and sufficient conditions for LCD one-generator quasi-cyclic codes.
△ Less
Submitted 12 April, 2025;
originally announced April 2025.
-
Applications and Challenges of AI and Microscopy in Life Science Research: A Review
Authors:
Himanshu Buckchash,
Gyanendra Kumar Verma,
Dilip K. Prasad
Abstract:
The complexity of human biology and its intricate systems holds immense potential for advancing human health, disease treatment, and scientific discovery. However, traditional manual methods for studying biological interactions are often constrained by the sheer volume and complexity of biological data. Artificial Intelligence (AI), with its proven ability to analyze vast datasets, offers a transf…
▽ More
The complexity of human biology and its intricate systems holds immense potential for advancing human health, disease treatment, and scientific discovery. However, traditional manual methods for studying biological interactions are often constrained by the sheer volume and complexity of biological data. Artificial Intelligence (AI), with its proven ability to analyze vast datasets, offers a transformative approach to addressing these challenges. This paper explores the intersection of AI and microscopy in life sciences, emphasizing their potential applications and associated challenges. We provide a detailed review of how various biological systems can benefit from AI, highlighting the types of data and labeling requirements unique to this domain. Particular attention is given to microscopy data, exploring the specific AI techniques required to process and interpret this information. By addressing challenges such as data heterogeneity and annotation scarcity, we outline potential solutions and emerging trends in the field. Written primarily from an AI perspective, this paper aims to serve as a valuable resource for researchers working at the intersection of AI, microscopy, and biology. It summarizes current advancements, key insights, and open problems, fostering an understanding that encourages interdisciplinary collaborations. By offering a comprehensive yet concise synthesis of the field, this paper aspires to catalyze innovation, promote cross-disciplinary engagement, and accelerate the adoption of AI in life science research.
△ Less
Submitted 22 January, 2025;
originally announced January 2025.
-
Quantum-Secure Certificate-Less Conditional Privacy-Preserving Authentication for VANET
Authors:
Girraj Kumar Verma,
Nahida Majeed Wani,
Prosanta Gope
Abstract:
Vehicular Ad-hoc Networks (VANETs) marked a pronounced change in the Intelligent Transport System and Smart Cities through seamless vehicle communication to intensify safety and efficacy. However, a few authentication schemes have been devised in the literature to ensure the authenticity of the source and information in the post-quantum era. The most popular base for such construction is lattice-b…
▽ More
Vehicular Ad-hoc Networks (VANETs) marked a pronounced change in the Intelligent Transport System and Smart Cities through seamless vehicle communication to intensify safety and efficacy. However, a few authentication schemes have been devised in the literature to ensure the authenticity of the source and information in the post-quantum era. The most popular base for such construction is lattice-based cryptography. However, existing lattice-based authentication schemes fall short of addressing the potential challenges of the leakage of the master secret key and key-escrow problem. By ingeniously addressing both issues, the paper proposes the \emph{first} quantum secure authentication scheme to eliminate the flaws while maintaining the system's overall efficiency intact. Compared to the state-of-the-art schemes, the provable security and overall performance assessment highlight the suitability of the proposed approach.
△ Less
Submitted 20 March, 2024;
originally announced March 2024.
-
Additive complementary dual codes over $\mathbb{F}_{q^2}$
Authors:
Gyanendra K. Verma,
R. K. Sharma
Abstract:
Shi et al. [Additive complementary dual codes over F4. Designs, Codes and Cryptography, 2022.] studied additive codes over the finite field F4 with respect to trace Hermitian and trace Euclidean inner products. In this article, we define additive codes of length n over finite field Fq2 as additive subgroups of Fn q2 where q is a prime power. We associate an additive code with a matrix called a gen…
▽ More
Shi et al. [Additive complementary dual codes over F4. Designs, Codes and Cryptography, 2022.] studied additive codes over the finite field F4 with respect to trace Hermitian and trace Euclidean inner products. In this article, we define additive codes of length n over finite field Fq2 as additive subgroups of Fn q2 where q is a prime power. We associate an additive code with a matrix called a generator matrix. We characterize trace Euclidean ACD and trace Hermitian ACD codes in terms of generator matrices over the finite field Fq2 . Also, we construct these codes over Fq2 from linear LCD codes over Fq.
△ Less
Submitted 5 October, 2023; v1 submitted 23 February, 2023;
originally announced February 2023.
-
Construction Methods for Galois LCD codes over Finite Fields
Authors:
Gyanendra K. Verma,
Astha Agrawal,
R. K. Sharma
Abstract:
In this article, first we present a method for constructing many Hermitian LCD codes from a given Hermitian LCD code, and then provide several methods which utilize either a given [n, k, d] linear code or a given [n, k, d] Galois LCD code to construct new Galois LCD codes with different parameters. Using these construction methods, we construct several new [n, k, d] ternary LCD codes with better p…
▽ More
In this article, first we present a method for constructing many Hermitian LCD codes from a given Hermitian LCD code, and then provide several methods which utilize either a given [n, k, d] linear code or a given [n, k, d] Galois LCD code to construct new Galois LCD codes with different parameters. Using these construction methods, we construct several new [n, k, d] ternary LCD codes with better parameters for $26\leq n \leq 40$, and $21 \leq k \leq 30$. Also, optimal 2-Galois LCD codes over $\mathbb{F}_{2^3}$ for code length, $1 \leq n \leq 15$ have been obtained. Finally, we extend some previously known results to the $σ$-inner product from Euclidean inner product.
△ Less
Submitted 5 October, 2023; v1 submitted 16 August, 2022;
originally announced August 2022.
-
Galois LCD Codes Over Fq + uFq + vFq + uvFq
Authors:
Astha Agrawal,
Gyanendra K. Verma,
R. K. Sharma
Abstract:
In \cite{anote}, Wu and Shi studied $ l $-Galois LCD codes over finite chain ring $\mathcal{R}=\mathbb{F}_q+u\mathbb{F}_q$, where $u^2=0$ and $ q=p^e$ for some prime $p$ and positive integer $e$. In this work, we extend the results to the finite non chain ring $ \mathcal{R} =\mathbb{F}_q+u\mathbb{F}_q+v\mathbb{F}_q+uv\mathbb{F}_q$, where $u^2=u,v^2=v $ and $ uv=vu $. We define a correspondence bet…
▽ More
In \cite{anote}, Wu and Shi studied $ l $-Galois LCD codes over finite chain ring $\mathcal{R}=\mathbb{F}_q+u\mathbb{F}_q$, where $u^2=0$ and $ q=p^e$ for some prime $p$ and positive integer $e$. In this work, we extend the results to the finite non chain ring $ \mathcal{R} =\mathbb{F}_q+u\mathbb{F}_q+v\mathbb{F}_q+uv\mathbb{F}_q$, where $u^2=u,v^2=v $ and $ uv=vu $. We define a correspondence between $ l $-Galois dual of linear codes over $ \mathcal{R} $ and $ l $-Galois dual of its component codes over $ \mathbb{F}_q .$ Further, we construct Euclidean LCD and $ l $-Galois LCD codes from linear code over $ \mathcal{R} $. This consequently leads us to prove that any linear code over $ \mathcal{R} $ is equivalent to Euclidean ($ q>3 $) and $ l $-Galois LCD ($0<l<e$, and $p^{e-l}+1\mid p^e-1$) code over $ \mathcal{R} .$ Finally, we investigate MDS codes over $ \mathcal{R} .$
△ Less
Submitted 17 June, 2022;
originally announced June 2022.