This summary provides the key details about the document in 3 sentences:
The document discusses covering radii of DNA codes over the ring N with respect to Lee distance. It gives lower and upper bounds on the covering radius for various repetition DNA codes, Simplex DNA codes of types α and β, and MacDonald DNA codes over N. Specific covering radii are determined for repetition codes, block repetition codes, and Simplex DNA codes of types α and β. Bounds are also provided on the covering radius of MacDonald DNA codes over N.
ON THE COVERING RADIUS OF CODES OVER Z4 WITH CHINESE EUCLIDEAN WEIGHTijitjournal
In this paper, we give lower and upper bounds on the covering radius of codes over the ring Z4 with respect to chinese euclidean distance. We also determine the covering radius of various Repetition codes, Simplex codes Type α and Type β and give bounds on the covering radius for MacDonald codes of both types over Z4
On the Covering Radius of Codes Over Z6 ijitjournal
In this correspondence, we give lower and upper bounds on the covering radius of codes over the finite
ring Z6 with respect to different distances such as Hamming, Lee, Euclidean and Chinese Euclidean. We
also determine the covering radius of various Block Repetition Codes over Z6
New data structures and algorithms for \\post-processing large data sets and ...Alexander Litvinenko
In this work, we describe advanced numerical tools for working with multivariate functions and for
the analysis of large data sets. These tools will drastically reduce the required computing time and the
storage cost, and, therefore, will allow us to consider much larger data sets or ner meshes. Covariance
matrices are crucial in spatio-temporal statistical tasks, but are often very expensive to compute and
store, especially in 3D. Therefore, we approximate covariance functions by cheap surrogates in a
low-rank tensor format. We apply the Tucker and canonical tensor decompositions to a family of
Matern- and Slater-type functions with varying parameters and demonstrate numerically that their
approximations exhibit exponentially fast convergence. We prove the exponential convergence of the
Tucker and canonical approximations in tensor rank parameters. Several statistical operations are
performed in this low-rank tensor format, including evaluating the conditional covariance matrix,
spatially averaged estimation variance, computing a quadratic form, determinant, trace, loglikelihood,
inverse, and Cholesky decomposition of a large covariance matrix. Low-rank tensor approximations
reduce the computing and storage costs essentially. For example, the storage cost is reduced from an
exponential O(nd) to a linear scaling O(drn), where d is the spatial dimension, n is the number of
mesh points in one direction, and r is the tensor rank. Prerequisites for applicability of the proposed
techniques are the assumptions that the data, locations, and measurements lie on a tensor (axesparallel)
grid and that the covariance function depends on a distance,...
ON RUN-LENGTH-CONSTRAINED BINARY SEQUENCESijitjournal
A class of binary sequences, constrained with respect to the length of zero runs, is considered.
For such sequences, termed (d, k)-sequences, new combinatorial and computational results
are established. Explicit expressions for enumerating (d, k)-sequences of finite length are
obtained. Efficient computational procedures for calculating the capacity of a (d, k)-code are
given. A simple method for constructing a near-optimal (d, k)-code is proposed. Illustrative
numerical examples demonstrate further the theoretical results.
Weight enumerators of block codes and the mc williamsMadhumita Tamhane
Best possible error control codes of a certain rate and block length can be adjudged depending on bounds such that no codes can exist beyond the bounds and codes are sure to exist within the bounds. This presentation gives composition structure of Block codes and the probability of decoding error and of decoding failure.Mac William's Identities is relationship between weight distribution of a linear code and weight distribution of its dual code, which hold for any linear code and are based on vector space structure of linear codes and on the fact that dual code of a code is the orthogonal compliment of the code...
Joint blind calibration and time-delay estimation for multiband rangingTarik Kazaz
In this presentation, we focus on the problem of blind joint calibration of multiband transceivers and time-delay (TD) estimation of multipath channels. We show that this problem can be formulated as a particular case of covariance matching. Although this problem is severely ill-posed, prior information about radio-frequency chain distortions and multipath channel sparsity is used for regularization. This approach leads to a biconvex optimization problem, which is formulated as a rank-constrained linear system and solved by a simple group Lasso algorithm.
% This method is general and can be also applied for calibration of sensors arrays and in direction of arrival estimation.
Numerical experiments show that the proposed algorithm provides better calibration and higher resolution for TD estimation than current state-of-the-art methods.
The Estimation for the Eigenvalue of Quaternion Doubly Stochastic Matrices us...ijtsrd
The purpose of this paper is to locate and estimate the eigen values of quaternion doubly stochastic matrices. We present several estimation theorems about the eigen values of quaternion doubly stochastic matrices. Mean while, we obtain the distribution theorem for the eigen values of tensor products of two quaternion doubly stochastic matrices. We will conclude the paper with the distribution for the eigen values of generalized quaternion doubly stochastic matrices. Dr. Gunasekaran K | Mrs. Seethadevi R ""The Estimation for the Eigenvalue of Quaternion Doubly Stochastic Matrices using Gerschgorin Balls"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd22860.pdf
Paper URL: https://www.ijtsrd.com/mathemetics/other/22860/the-estimation-for-the-eigenvalue-of-quaternion-doubly-stochastic-matrices-using-gerschgorin-balls/dr-gunasekaran-k
Computing f-Divergences and Distances of\\ High-Dimensional Probability Densi...Alexander Litvinenko
Talk presented on SIAM IS 2022 conference.
Very often, in the course of uncertainty quantification tasks or
data analysis, one has to deal with high-dimensional random variables (RVs)
(with values in $\Rd$). Just like any other RV,
a high-dimensional RV can be described by its probability density (\pdf) and/or
by the corresponding probability characteristic functions (\pcf),
or a more general representation as
a function of other, known, random variables.
Here the interest is mainly to compute characterisations like the entropy, the Kullback-Leibler, or more general
$f$-divergences. These are all computed from the \pdf, which is often not available directly,
and it is a computational challenge to even represent it in a numerically
feasible fashion in case the dimension $d$ is even moderately large. It
is an even stronger numerical challenge to then actually compute said characterisations
in the high-dimensional case.
In this regard, in order to achieve a computationally feasible task, we propose
to approximate density by a low-rank tensor.
ON THE COVERING RADIUS OF CODES OVER Z4 WITH CHINESE EUCLIDEAN WEIGHTijitjournal
In this paper, we give lower and upper bounds on the covering radius of codes over the ring Z4 with respect to chinese euclidean distance. We also determine the covering radius of various Repetition codes, Simplex codes Type α and Type β and give bounds on the covering radius for MacDonald codes of both types over Z4
On the Covering Radius of Codes Over Z6 ijitjournal
In this correspondence, we give lower and upper bounds on the covering radius of codes over the finite
ring Z6 with respect to different distances such as Hamming, Lee, Euclidean and Chinese Euclidean. We
also determine the covering radius of various Block Repetition Codes over Z6
New data structures and algorithms for \\post-processing large data sets and ...Alexander Litvinenko
In this work, we describe advanced numerical tools for working with multivariate functions and for
the analysis of large data sets. These tools will drastically reduce the required computing time and the
storage cost, and, therefore, will allow us to consider much larger data sets or ner meshes. Covariance
matrices are crucial in spatio-temporal statistical tasks, but are often very expensive to compute and
store, especially in 3D. Therefore, we approximate covariance functions by cheap surrogates in a
low-rank tensor format. We apply the Tucker and canonical tensor decompositions to a family of
Matern- and Slater-type functions with varying parameters and demonstrate numerically that their
approximations exhibit exponentially fast convergence. We prove the exponential convergence of the
Tucker and canonical approximations in tensor rank parameters. Several statistical operations are
performed in this low-rank tensor format, including evaluating the conditional covariance matrix,
spatially averaged estimation variance, computing a quadratic form, determinant, trace, loglikelihood,
inverse, and Cholesky decomposition of a large covariance matrix. Low-rank tensor approximations
reduce the computing and storage costs essentially. For example, the storage cost is reduced from an
exponential O(nd) to a linear scaling O(drn), where d is the spatial dimension, n is the number of
mesh points in one direction, and r is the tensor rank. Prerequisites for applicability of the proposed
techniques are the assumptions that the data, locations, and measurements lie on a tensor (axesparallel)
grid and that the covariance function depends on a distance,...
ON RUN-LENGTH-CONSTRAINED BINARY SEQUENCESijitjournal
A class of binary sequences, constrained with respect to the length of zero runs, is considered.
For such sequences, termed (d, k)-sequences, new combinatorial and computational results
are established. Explicit expressions for enumerating (d, k)-sequences of finite length are
obtained. Efficient computational procedures for calculating the capacity of a (d, k)-code are
given. A simple method for constructing a near-optimal (d, k)-code is proposed. Illustrative
numerical examples demonstrate further the theoretical results.
Weight enumerators of block codes and the mc williamsMadhumita Tamhane
Best possible error control codes of a certain rate and block length can be adjudged depending on bounds such that no codes can exist beyond the bounds and codes are sure to exist within the bounds. This presentation gives composition structure of Block codes and the probability of decoding error and of decoding failure.Mac William's Identities is relationship between weight distribution of a linear code and weight distribution of its dual code, which hold for any linear code and are based on vector space structure of linear codes and on the fact that dual code of a code is the orthogonal compliment of the code...
Joint blind calibration and time-delay estimation for multiband rangingTarik Kazaz
In this presentation, we focus on the problem of blind joint calibration of multiband transceivers and time-delay (TD) estimation of multipath channels. We show that this problem can be formulated as a particular case of covariance matching. Although this problem is severely ill-posed, prior information about radio-frequency chain distortions and multipath channel sparsity is used for regularization. This approach leads to a biconvex optimization problem, which is formulated as a rank-constrained linear system and solved by a simple group Lasso algorithm.
% This method is general and can be also applied for calibration of sensors arrays and in direction of arrival estimation.
Numerical experiments show that the proposed algorithm provides better calibration and higher resolution for TD estimation than current state-of-the-art methods.
The Estimation for the Eigenvalue of Quaternion Doubly Stochastic Matrices us...ijtsrd
The purpose of this paper is to locate and estimate the eigen values of quaternion doubly stochastic matrices. We present several estimation theorems about the eigen values of quaternion doubly stochastic matrices. Mean while, we obtain the distribution theorem for the eigen values of tensor products of two quaternion doubly stochastic matrices. We will conclude the paper with the distribution for the eigen values of generalized quaternion doubly stochastic matrices. Dr. Gunasekaran K | Mrs. Seethadevi R ""The Estimation for the Eigenvalue of Quaternion Doubly Stochastic Matrices using Gerschgorin Balls"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd22860.pdf
Paper URL: https://www.ijtsrd.com/mathemetics/other/22860/the-estimation-for-the-eigenvalue-of-quaternion-doubly-stochastic-matrices-using-gerschgorin-balls/dr-gunasekaran-k
Computing f-Divergences and Distances of\\ High-Dimensional Probability Densi...Alexander Litvinenko
Talk presented on SIAM IS 2022 conference.
Very often, in the course of uncertainty quantification tasks or
data analysis, one has to deal with high-dimensional random variables (RVs)
(with values in $\Rd$). Just like any other RV,
a high-dimensional RV can be described by its probability density (\pdf) and/or
by the corresponding probability characteristic functions (\pcf),
or a more general representation as
a function of other, known, random variables.
Here the interest is mainly to compute characterisations like the entropy, the Kullback-Leibler, or more general
$f$-divergences. These are all computed from the \pdf, which is often not available directly,
and it is a computational challenge to even represent it in a numerically
feasible fashion in case the dimension $d$ is even moderately large. It
is an even stronger numerical challenge to then actually compute said characterisations
in the high-dimensional case.
In this regard, in order to achieve a computationally feasible task, we propose
to approximate density by a low-rank tensor.
1. Motivation: why do we need low-rank tensors
2. Tensors of the second order (matrices)
3. CP, Tucker and tensor train tensor formats
4. Many classical kernels have (or can be approximated in ) low-rank tensor format
5. Post processing: Computation of mean, variance, level sets, frequency
Mimo radar detection in compound gaussian clutter using orthogonal discrete f...ijma
This paper proposes orthogonal Discrete Frequency Coding Space Time Waveforms (DFCSTW) for
Multiple Input and Multiple Output (MIMO) radar detection in compound Gaussian clutter. The proposed
orthogonal waveforms are designed considering the position and angle of the transmitting antenna when
viewed from origin. These orthogonally optimized show good resolution in spikier clutter with Generalized
Likelihood Ratio Test (GLRT) detector. The simulation results show that this waveform provides better
detection performance in spikier Clutter.
ABSTRACT: In this paper, we proposed a new identification algorithm based on Kolmogorov–Zurbenko Periodogram (KZP) to separate motions in spatial motion image data. The concept of directional periodogram is utilized to sample the wave field and collect information of motion scales and directions. KZ Periodogram enables us detecting precise dominate frequency information of spatial waves covered by highly background noises. The computation of directional periodogram filters out most of the noise effects, and the procedure is robust for missing and fraud spikes caused by noise and measurement errors. This design is critical for the closure-based clustering method to find cluster structures of potential parameter solutions in the parameter space. An example based on simulation data is given to demonstrate the four steps in the procedure of this method. Related functions are implemented in our recent published R package {kzfs}.
Low rank tensor approximation of probability density and characteristic funct...Alexander Litvinenko
Very often one has to deal with high-dimensional random variables (RVs). A high-dimensional RV can be described by its probability density (\pdf) and/or by the corresponding probability characteristic functions (\pcf), or by a function representation. Here the interest is mainly to compute characterisations like the entropy, or
relations between two distributions, like their Kullback-Leibler divergence, or more general measures such as $f$-divergences,
among others. These are all computed from the \pdf, which is often not available directly, and it is a computational challenge to even represent it in a numerically feasible fashion in case the dimension $d$ is even moderately large. It is an even stronger numerical challenge to then actually compute said characterisations in the high-dimensional case.
In this regard, in order to achieve a computationally feasible task, we propose to represent the density by a high order tensor product, and approximate this in a low-rank format.
I am Emmanuel Ibrahim. I love exploring new topics. Academic writing seemed an interesting option for me. After working for many years with liveexamhelper.com, I have assisted many students with their Digital Communication exams. I can proudly say, each student I have served is happy with the quality of the exam help that I have provided. I have acquired my bachelors from University of Leeds, UK.
Tenser Product of Representation for the Group CnIJERA Editor
The main objective of this paper is to compute the tenser product of representation for the group Cn. Also
algorithms designed and implemented in the construction of the main program designated for the determination
of the tenser product of representation for the group Cn including a flow-diagram of the main program. Some
algorithms are followed by simple examples for illustration.
A MODIFIED DIRECTIONAL WEIGHTED CASCADED-MASK MEDIAN FILTER FOR REMOVAL OF RA...cscpconf
In this paper a Modified Directional Weighted Cascaded-Mask Median (MDWCMM) filter has
been proposed, which is based on three different sized cascaded filtering windows. The
differences between the current pixel and its neighbors aligned with four main directions. A
direction index is used for each edge aligned with a given direction. Then, the minimum of these
four direction indexes is used for impulse detection for each and every masking window.
Depending on the minimum direction indexes among the three windows one window is selected.
The filtering is done on this selected window. Extensive simulations showed that the MDWCMM
filter provides good performances of suppressing impulse with low noise level as well as for highly corrupted images from both gray level and colored benchmarked images.
RESOLVING CYCLIC AMBIGUITIES AND INCREASING ACCURACY AND RESOLUTION IN DOA ES...csandit
A method to resolve cyclic ambiguities and increase the accuracy and the resolution in the
direction-of-arrival (DOA) estimation using the Estimation of Signal Parameters via Rotational
Invariance Technique (ESPRIT)algorithm is proposed. It is based on rotating the array and
sampling the received signal at multiple positions. Using this approach, the gain in accuracy
and resolution is addressed as function of the mean and variance of the DOA. Simulations
results are provided as a means of verifying this analysis.
1. Motivation: why do we need low-rank tensors
2. Tensors of the second order (matrices)
3. CP, Tucker and tensor train tensor formats
4. Many classical kernels have (or can be approximated in ) low-rank tensor format
5. Post processing: Computation of mean, variance, level sets, frequency
Mimo radar detection in compound gaussian clutter using orthogonal discrete f...ijma
This paper proposes orthogonal Discrete Frequency Coding Space Time Waveforms (DFCSTW) for
Multiple Input and Multiple Output (MIMO) radar detection in compound Gaussian clutter. The proposed
orthogonal waveforms are designed considering the position and angle of the transmitting antenna when
viewed from origin. These orthogonally optimized show good resolution in spikier clutter with Generalized
Likelihood Ratio Test (GLRT) detector. The simulation results show that this waveform provides better
detection performance in spikier Clutter.
ABSTRACT: In this paper, we proposed a new identification algorithm based on Kolmogorov–Zurbenko Periodogram (KZP) to separate motions in spatial motion image data. The concept of directional periodogram is utilized to sample the wave field and collect information of motion scales and directions. KZ Periodogram enables us detecting precise dominate frequency information of spatial waves covered by highly background noises. The computation of directional periodogram filters out most of the noise effects, and the procedure is robust for missing and fraud spikes caused by noise and measurement errors. This design is critical for the closure-based clustering method to find cluster structures of potential parameter solutions in the parameter space. An example based on simulation data is given to demonstrate the four steps in the procedure of this method. Related functions are implemented in our recent published R package {kzfs}.
Low rank tensor approximation of probability density and characteristic funct...Alexander Litvinenko
Very often one has to deal with high-dimensional random variables (RVs). A high-dimensional RV can be described by its probability density (\pdf) and/or by the corresponding probability characteristic functions (\pcf), or by a function representation. Here the interest is mainly to compute characterisations like the entropy, or
relations between two distributions, like their Kullback-Leibler divergence, or more general measures such as $f$-divergences,
among others. These are all computed from the \pdf, which is often not available directly, and it is a computational challenge to even represent it in a numerically feasible fashion in case the dimension $d$ is even moderately large. It is an even stronger numerical challenge to then actually compute said characterisations in the high-dimensional case.
In this regard, in order to achieve a computationally feasible task, we propose to represent the density by a high order tensor product, and approximate this in a low-rank format.
I am Emmanuel Ibrahim. I love exploring new topics. Academic writing seemed an interesting option for me. After working for many years with liveexamhelper.com, I have assisted many students with their Digital Communication exams. I can proudly say, each student I have served is happy with the quality of the exam help that I have provided. I have acquired my bachelors from University of Leeds, UK.
Tenser Product of Representation for the Group CnIJERA Editor
The main objective of this paper is to compute the tenser product of representation for the group Cn. Also
algorithms designed and implemented in the construction of the main program designated for the determination
of the tenser product of representation for the group Cn including a flow-diagram of the main program. Some
algorithms are followed by simple examples for illustration.
A MODIFIED DIRECTIONAL WEIGHTED CASCADED-MASK MEDIAN FILTER FOR REMOVAL OF RA...cscpconf
In this paper a Modified Directional Weighted Cascaded-Mask Median (MDWCMM) filter has
been proposed, which is based on three different sized cascaded filtering windows. The
differences between the current pixel and its neighbors aligned with four main directions. A
direction index is used for each edge aligned with a given direction. Then, the minimum of these
four direction indexes is used for impulse detection for each and every masking window.
Depending on the minimum direction indexes among the three windows one window is selected.
The filtering is done on this selected window. Extensive simulations showed that the MDWCMM
filter provides good performances of suppressing impulse with low noise level as well as for highly corrupted images from both gray level and colored benchmarked images.
RESOLVING CYCLIC AMBIGUITIES AND INCREASING ACCURACY AND RESOLUTION IN DOA ES...csandit
A method to resolve cyclic ambiguities and increase the accuracy and the resolution in the
direction-of-arrival (DOA) estimation using the Estimation of Signal Parameters via Rotational
Invariance Technique (ESPRIT)algorithm is proposed. It is based on rotating the array and
sampling the received signal at multiple positions. Using this approach, the gain in accuracy
and resolution is addressed as function of the mean and variance of the DOA. Simulations
results are provided as a means of verifying this analysis.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Home assignment II on Spectroscopy 2024 Answers.pdf
AJMS_476_23.pdf
1. www.ajms.in
RESEARCH ARTICLE
On the Covering Radius of DNA Code Over N
*P. Chella Pandian
Department of Mathematics, Srimad Andavan Arts and Science College (A),
Tiruchirappalli, Taminadu, India
Corresponding Email: chellapandianpc@gmail.com
Received: 12-04-2023; Revised: 28-04-2023; Accepted: 08-05-2023
ABSTRACT
In this paper, lower bound and upper bound on the covering radius of DNAcodes over N with
respect to lee distance are given. Also determine the covering radius of various Repetition
DNA codes, Simplex DNA code Type α and Simplex DNA code Type β and bounds on the
covering radius for MacDonald DNA codes of both types over N.
Keyword: DNA Code, Finite Ring, Covering Radius, Simplex Codes.
(2010) Mathematical Subject Classification: 94B25, 94B05, 11H31, 11H71.
INTRODUCTION
In, DNA is found naturally as a double stranded molecule, with a form similar to a twisted ladder. The
backbone of the DNA helix is an alternating chain of sugars and phosphates, while the association
between the two strands is variant combinations of the four nitrogenous bases adenine (A), thymine (T),
guanine (G) and cytosine (C). The two ends of the strand are distinct and are conventionally denoted as 3’
end and 5’ end. Two strands of DNA can form (under suitable conditions) a double strand if the respective
bases are Watson- Crick[17] complements of each other - A matches with T and C matches with G, also
3’ end matches with 5’ end.
The problem of designing DNA codes (sets of words of fixed length n over the alphabets { A, C, G, T }
that satisfy certain combinatorial constraints has applications for reliably storing and retrieving
information in synthetic DNA strands. These codes can be used in particular for DNA computing [1] or as
molecular bar-codes.
There are many researchers doing research on code over finite rings. In particular, codes over Z4 received
much attention [2, 3, 4, 9, 11, 15, 16, 5]. The covering radiuses of binary linear codes were studied [4, 5].
Recently the covering radius of codes over Z4 has been investigated with various distances [12]. In 1999,
Sole et.al gave many upper and lower bounds on the covering radius of a code over Z4 with different
distances. In [14, 5], the covering radius of some particular codes over Z4 have been investigated.
In this paper, investigate the covering radius of the Simplex DNA codes of both types and MacDonald
DNA codes and repetition DNA codes over N. Also generalized some of the known bounds in [2]
2. On the Covering Radius of DNA Code Over N
98
AJMS/Apr-Jun 2023/Volume 7/Issue 2
Preliminary
Coding theory has several applications in Genetics and Bio engineering. The problem of designing DNA
codes (sets of that words of fixed length n over the alphabet N = { A, C, G, T} that satisfy certain
combinatorial constraints) has applications for reliably storing and retrieving information in synthetic
DNA strands.
A DNA code of length n is a set of code words (x1, x2,…. , xn) with
xi∈ {A,C,G,T}=N
(representing the
four nucleotides in DNA). Use a hat to denote the Watson-Crick complements of a nucleotide, so A
matches with T and C matches with G.
The DNA codes are sets of words of fixed length n over the alphabet N and it follows the map
A→0,C→
1,T→2 and G→3 . Therefore the problem of the DNA codes is corresponding to the
problem of the Z4-linear codes. These transpositions do not affect the GC-weight of the code word (the
number of entries that are C or G). In my work, by using the above map in Z4 with lee weight, so obtain
the covering radius for repetition DNA codes .
Let d = (d1, d2, ··· , dn) ∈ N
n
and n be its length. Let b be an element of {A, C, G, T }.
For all d = (d1, d2, ··· , dn) ∈ N
n
, define the weight of d at b tobe
wb(d) = |{i|xi = b}|.
A DNA linear code C of length n over N is an additive subgroup of Nn. An element of C is called a DNA
code word of C and a generator matrix of C is a matrix whose rows generate C. In [12], the Lee weight
w(x) of a vector x is 0 if xi = 0; 1 if xi = 1, 3 and 2 if xi = 2. A linear Gray map φ from N4→Z2
2
is defined
by φ(x + 2y) = (y, x + y), for all x + 2y in N. The image φ(C), of a linear code C over N of length n by the
Gray map is a binary code of length 2n with same cardinality [15].
Any DNA linear code C over N is equivalent to a code with Generator Matrix(GM) of the form
2D
2I
B
A
I
=
GM
1
k
k
0
0
Where A, B and D are matrices over N. Then the DNA code C contains all DNA code words [v0, v1] GM,
where v0 is a vector of length k1 over N and v1 is a vector of length k2 over Z2. Thus C contains a total of
4k1
2k2
code words. The parameters of C are given [n, 4k1
2k2
, d], where d represents the minimum lee
distance of C.
A DNA linear code C over N of length n, 2-dimension k, minimum lee distance d is called an [n, k, dl] or
simply an [n, k, d] code. In this paper, define the covering radius of dna codes over N with respect to lee
distance and in particular study the covering radius of Simplex DNA codes of type α and type β namely,
Sα and Sβ and their MacDonald DNA codes and repetition DNA codes over N. Section 2 contains basic
results for the covering radius of DNA codes over N. Section 3 determines the covering radius of
different types of repetition DNA codes. Section 4 determines the covering radius of Simplex DNA codes
and finally section 5 determines the bounds on the covering radius of MacDonald DNA codes.
3. On the Covering Radius of DNA Code Over N
99
AJMS/Apr-Jun 2023/Volume 7/Issue 2
Covering Radius of Repetition DNA Codes
Let d be a lee distance of a DNA code C over N. Thus, the covering radius of C:
The following result of Mattson [6] is useful for computing covering radius of codes over rings
generalized easily from codes over finite fields.
Proposition 3.1 If C0 and C1 are codes over R generated by matrices GM0 and GM1 respectively and if C
is the code generated by
A
GM
GM
=
GM
0
1
0
then rd (C) ≤ rd(C0) + rd(C1) and the covering radius of D (concatenation of C0 and C1 ) satisfy the
following rd (D) ≥ rd (C0) + rd (C1), for all distances d over N.
A q-ary repetition code C over a finite field Fq = {α0 = 0, α1 = 1, α2 , α3 , . . . , αq−1 } is an [n, 1, n] code
C= {α}
| α∈ (Fq)where α= ( α,α,⋯ ,α) . The covering radius of C is
⌈
n(q− 1)
q
⌉
[11]. Using this, it can
be seen easily that the covering radius of block of size n repetition code [n(q-1),1,n(q-1)] generated by
is
⌈
n(q− 1)2
q
⌉
, since it will be equivalent to a repetition code of length (q−1)n.
Consider the repetition dna code over N. There are two types of them of length n vi
1. Cytosine repetition code Cβ : [n, 1, n] generated by GMβ=
[CC⋯C
⏞
n
]
2. Thymine repetition code Cα : (n, 2, 2n) generated by GMα =
[TT⋯T
⏞
n
]
Theorem 3.2 Let Cβ and Cα be the dna code of type β and α type in generator
matrices GMβ and GMα . Then,
⌊n
2⌋ ≤ r (Cα ) ≤ n and r(Cβ) =n.
4. On the Covering Radius of DNA Code Over N
100
AJMS/Apr-Jun 2023/Volume 7/Issue 2
Proof.
Let x= AA⋯ A
⏞
⌊n
2⌋
TT⋯T
⏞
⌈n
2⌉
and the code of C = {A A · · · A, T T · · · T } is generated by
[T T …. T] is an [n, 1, 2n] code. Then, d(x, A A … A) = wt(x - A A … A) =
⌊n
2⌋ and
d(x, T T...T) = wt(x - T T … T) =
⌈n
2⌉. Therefore, d(x, Cα) = min{
⌊n
2⌋,
⌈n
2⌉}. Thus, by definition of covering
radius
r (Cα)⩾⌈n
2⌉ (3.1)
Let x be any word in Nn
. Let us take x has ω0 coordinates as 0’s, ω1 , coordinates as 1’s,
ω2 coordinates as 2’s, ω3 coordinates as 3’s, then ω0 + ω1 + ω2 + ω3 = n. Since Cα = {AA
· · · A, T T · · · T} and lee weight of N : A is 0, C and G is 1 and T is 2.
Therefore, d(x, AA · · · A) = n − ω0 + ω2 and
d(x, T T · · · T ) = n − ω2 +ω0 .
Thus d(x, Cα ) = min {n − ω0 + ω2 , n − ω2 + ω0 } and hence, d (x, Cα) ≤ n = n. (3.2)
Hence, from the Equation (3.1) and (3.2), so
⌈n
2⌉≤ r (Cα) ≤ n. Now, obtain the covering
radius of Cβ covering with respect to the lee weight.
Then d(x, AA · · · A) = n − ω0 + ω2,
d(x, CC · · · C) = n − ω1 + ω3,
d(x, T T · · · T ) = n − ω2 + ω0 and
d(x, GG · · · G) = n − ω3 + ω1, for any x ∈ Nn
.
This implies d(x, Cβ ) = min{n − ω0 + ω2, n − ω1 + ω3 , n − ω2 + ω0 , n − ω3 + ω1 } = n
and hence r(Cβ ) ≤ n.
Let x= AA⋯ A
⏞
t
CC⋯ C
⏞
t
TT⋯ T
⏞
t
GG⋯G
⏞
n−3t
, where
t=
⌊n
4⌋ . Then d(x, AA · · · A) = n,
d(x, CC · · · C) = 2n − 4t, d(x, T T · · · T ) = n and d(x, GG · · · G) = 4t. Therefore
r(Cβ) ≥ min{2n, 2n − 4t, 4t} ≥ n.
Block Repetition Code
Let GM=[CC⋯C
⏞
n
TT⋯T
⏞
n
GG⋯G
⏞
n
] be a generator matrix of N in each block of repetition code length is
n. Then, the parameters of Block Repetition Code(BRC) is [3n, 1, 4n]. The code of BRC = {c0 = A · · ·
AA · · · AA · · · A, c1 = C · · · C T · · · T G · · · G, c2 = T · · · T A · · · AT · · · T, c3 = G · · · GT · · · T
C · · · C}, dimension of BRC is 1 and lee weight is 4n. Note that, the block repetition code has constant
lee weight is 4n. Obtain, the following
Theorem 3.3 r(BRC3n
) = 3n.
Proof.
5. On the Covering Radius of DNA Code Over N
101
AJMS/Apr-Jun 2023/Volume 7/Issue 2
Let x = AA · · · A ∈ N3n
. Then, d(x, BRC3n
) = 3n. Hence by definition,
r( BRC3n
) ≥ 3n.
Let x = (u|v|w) ∈ N3n
with u, v and w have compositions (r 0 , r1 , r2 , r3 ) ,(s0 , s1 , s2 , s3 )
and (t0 , t1 , t2 , t3 ) respectively such that
∑
i= 0
3
ri = ∑
i= 0
3
si =n= ∑
i= 0
3
ti
.
Then,
d(x, c0 ) = 3n − r0 + r2 − s0 + s2− t0 +t2 ,
d(x, c1 ) = 3n − r 1 + r3− s2 + s0 − t3 + t1 ,
d(x, c2 ) = 3n − r2 + r0 − s0 + s2 − t2 + t0 and
d(x, c3 ) = 3n − r3 + r1 − s2 + s0 − t1 + t3.
Thus,
d(x, BRC3n
) = min{3n − r0 + r2 − s0 + s2− t0 +t2 ,3n − r 1 + r3− s2 + s0 − t3 + t1 ,
3n − r2 + r0 − s0 + s2 − t2 + t0 , 3n − r3 + r1 − s2 + s0 − t1 +t3.}
d(x, BRC3n
) ≤ 3n and hence, r (BRC3n
) ≤ 3n.
Define a two block repetition dna code over N of each of length is n and the parameters of
two block repetition cod BRC2n
: [2n, 1, 2n] is generated by
GM=[CC⋯C
⏞
n
TT⋯T
⏞
n
] . Use the above and obtain a following
Theorem 3.4 r(BRC2n
) = 2n.
Let GM=[CC⋯C
⏞
m
TT⋯T
⏞
n
]be the generalized generator matrix for two different block repetition dna
code of length are m and n respectively. In the parameters of two different block repetition code
(BRCm+n
) are [m + n, 1, min{2m, m + n}] and Theorem 3.4 can be easily generalized for two different
length using similar arguments to the following.
Theorem 3.5 r(BRCm+n
) = m + n.
Simplex DNA Code of Type α and Type β over N
In ref.[3] has been studied of Quaternary simplex codes of type α and type β. Type α Simplex code Sk
α
is
a linear dna code over N with parameters[4k
, k] and an inductive generator matrix given by
GMk
α
= (4.1)
with GM1
α
= [A(0) C(1) T (2) G(3)]. Type simplex code Sk
β
is a punctured version of Sk
α
with
parameters [2k−1
, (2k
− 1), k] and an inductive generator matrix given by
(4.2)
GMk
β
= (4.3)
6. On the Covering Radius of DNA Code Over N
102
AJMS/Apr-Jun 2023/Volume 7/Issue 2
and for k > 2, where GMk−1
α
is the generator matrix of Sk−1
α
. For details the reader is ref. to [3].
Type α code with minimum lee weight is 4.
Theorem 4.1 r(Sk
α
) ≤ 22k
+ 1.
Proof.
Let x = CC · · · C ∈ Nn
. By equation(4.1), the result of Mattson for finite rings and using
Theorem 3.3, then r(Sk
α
)≤r(Sk−1
α
)+<
(CC⋯C
⏞
2
2(k− 1)
TT⋯T
⏞
2
2(k− 1)
GG⋯ G
⏞
2
2(k− 1)
)>
= r(Sk−1
α
)+ 3.22(k−1)
= 3.22(k−1
) + 3.22(k−2)
+ 3.22(k−3)
+ . . . + 3.2 2.1
+ r (S1
α
)
r (Sk
α
) ≤ 22k
+ 1 (since r(S1
α
) = 5) .
Theorem 4.2 r(Sk
β
) ≤ 2k(2k
− 1) − 1.
Proof.
By equation (4.3), Proposition 3.1 and Theorem 3.5, thus
r(Sk
β
) ≤ r (Sk−1
β
)+<
(CC⋯C
⏞
4
(k− 1)
TT⋯T
⏞
2
(2k− 3)
− 2
(k− 2)
)>
= r(Sk−1
β
)+ 2(2k−2)
+ 2(2k−3)
− 2(k−2)
≤ 2( 2(2k−2)
+ 2(2k−4)
+ . . . + 24
) + 2(2(2k−3)
+ 2(2k−5)
+ . . . + 23
) −
2( 2(k−2)
+ 2(k−3)
+ . . . + 2) + r(S2
β
)
r(Sk
β
) ≤2k-1
(2k
- 1)-1, (since r(S2
β
) = 5).
MacDonald DNA Codes of Type α and β Over N
The q-ary MacDonald code Mk,t(q) over the finite field Fq is a unique [(qk –
qt
)/(q -1), k, qk-1
-qt-1
] code
in which every non-zero codeword has weight either qk−1
or qk−1
− qt−1
[10]. In [13], he studied the
covering radius of MacDonald codes over a finite field. In fact, he has given many exact values for
smaller dimension. In [8], authors have defined the MacDonald codes over a ring using the generator
matrices of simplex codes. For 2 ≤ t ≤ k − 1, let GMk,t
α
be the matrix obtained from GMk
α
by deleting
columns corresponding to the columns of GMt
α
.
That is, GMk,t
α
= [GMk,
α
0 /(GMt,
α
) ] (5.1)
and let GMk,t
β
be the matrix obtained from GMk
β
by deleting columns corresponding to the columns of
GMt
β
.
That is, GMk,t
β
= [GMk
β
0 /(GMt
β
) ] (5.2)
where [AB] denotes the matrix obtained from the matrix A by deleting the columns of the matrix B
and 0 is a (k − t) × 22t
((k − t) × 2t−1
(2t − 1)) . The code generated by the matrix GMk,t
α
is called code of
type α and the code generated by the matrix GMk,t
β
is called Macdonald code of type β. The type α
code is denoted by Mk,t
α
and the type β code is denoted by Mk,t
β
. The Mk,t
α
code is
[4k
− 4t
, k] code over N and Mk,t
β
is a [(2k−1
− 2t−1
)( 2k
+ 2t
− 1) , k] code over N. In fact, these codes
7. On the Covering Radius of DNA Code Over N
103
AJMS/Apr-Jun 2023/Volume 7/Issue 2
are punctured code of Sk
α
and Sk
β
respectively. Next Theorem gives a basic bound on the covering
radius of above Macdonald codes.
Theorem 5.1 r(Mk,t
α
)≤ 22k
− 22r
+ r(Mr,t
α
), for t < r ≤ k.
Proof.
In equation(5.1), Proposition 3.1 and Theorem 3.3, thus
r(Mk,t
α
) ≤ r(Sk−1
α
)+<
(CC⋯C
⏞
2
2(k− 1)
TT⋯T
⏞
2
2(k− 1)
GG⋯ G
⏞
2
2(k− 1)
)>
= 3.4k−1
+ r(Mk−1,t
α
), for k ≥ r > t.
≤ 3.4k−1
+ 3.4k−2
+ · · · + 3.4r
+ r(Mr,t
α
), for k ≥ r > t.
r(Mk,t
α
) ≤ 22k
− 22r
+ r(Mr,t
α
), for k ≥ r > t.
Theorem 5.2 r(Mk,t
β
) ≤ 2(k−1)
(2k
− 1) + 2(r−1)
(1 − 2r
) + r(Mr,t
β
) , for t < r ≤ k.
Proof.
Using Proposition 3.1, Theorem 3.5 and in equation(5.2), obtain
r(Mk,t
β
) ≤ r (Mk−1,t
β
)+<
(CC⋯C
⏞
4
(k− 1)
TT⋯T
⏞
2
(2k− 3)
− 2
(k− 2)
)>
r(Mk,t
β
) ≤ 2(k−1)
(2k
− 1) + 2(r−1)
(1 − 2r
) + r(Mr,t
β
) , for t < r ≤ k.
REFERENCES
1. Adleman M. L., Molecular computation of solutions to combinatorial problems,
Science 265, 1021-1024(1994).
2. Aoki T., Gaborit P., Harada M., Ozeki M. and Sol’e P., On the covering radius of Z4
Codes and their lattices, IEEE Trans. Inform. Theory, vol. 45, no. 6, pp. 2162-
2168(1999).
3. Bhandari M. C., Gupta M. K. and Lal A. K., On Z 4 Simplex codes and their gray images,
Applied Algebra, Algebraic Algorithms and Error- Correcting Codes, AAECC- 13,
Lecture Notes in Computer Science 1719, 170-180(1999).
4. Bonnecaze A., Sol’e, P., Bachoc, C. and Mourrain B., Type II codes over Z4 , IEEE Trans.
Inform. Theory, 43, 969-976(1997).
5. Chella Pandian P., On the Covering Radius of Some Codes Over R, International Journal
of Research in Applied, Natural and Social Sciences, Vol. 2, No. 1, pp.61-70(2014).
6. Cohen G. D., Karpovsky, M. G., Mattson, H. F. and Schatz J. R., Covering radius- Survey
and recent results, IEEE Trans. Inform. Theory, vol.31, no. 3, pp. 328-343(1985).
8. On the Covering Radius of DNA Code Over N
104
AJMS/Apr-Jun 2023/Volume 7/Issue 2
7. Cohen C., Lobstein, A. and Sloane N. J. A., Further Results on the Covering Radius of
codes, IEEE Trans. Inform. Theory, vol. 32, no. 5, pp. 680-694(1986).
8. Colbourn C. J. and Gupta M. K., On quaternary MacDonald codes, Proc. Information
Technology:Coding and Computing (ITCC), pp. 212- 215 April(2003).
9. Conway J. H. and Sloane N. J. A., 1993, Self-dual codes over the integers modulo 4,
Journal of Combin. Theory Ser. A 62, 30-45(1993).
10. Dodunekov S. and Simonis, J., Codes and projective multisets, The Electronic Journal of
Communications 5 R37(1998).
11. Dougherty S. T., Harada M. and Sol’e P., Shadow codes over Z4 Finite Fields and Their
Appl. (to appear).
12. Gupta M. K., David G. Glynn and Aaron Gulliver T., On Senary Simplex Codes. Lecture
Notes in Computer Science.
13. Durairajan C., On Covering Codes and Covering Radius of Some Optimal Codes, Ph. D.
Thesis, Department of Mathematics, IIT Kanpur (1996).
14. Gupta M. K and Durairajan C., On the Covering Radius of some Modular Codes. Journal
of Advances in Mathematics of Computations 8(2), 9, 2014.
15. Hammons A. R., Kumar P. V., Calderbank A. R., Sloane N. J. A. and Sol’e P., The Z4 -
linearity of kerdock, preparata, goethals, and related codes, IEEE Trans. Inform. Theory,
40, 301-319 (1994).
16. Harada M., New extremal Type II codes over Z 4 . Des. Codes and Cryptogr. 13, 271-284
(1998).
17. Watson D. J. and Crick C. H. F., A structure for deoxyribose nucleic acid, Nature, vol. 25,
pp. 737-738, 1953.