Pub Date : 2022-08-08DOI: 10.1007/s00200-022-00570-7
Katsusuke Nabeshima, Shinichi Tajima
We consider Noetherian operators in the context of symbolic computation. Upon utilizing the theory of holonomic ({mathcal D})-modules, we present a new method for computing Noetherian operators associated to a zero-dimensional ideal. An effective algorithm that consists mainly of linear algebra techniques is proposed for computing them. Moreover, as applications, new computation methods of polynomial ideals are discussed by utilizing the Noetherian operators.
{"title":"Effective algorithm for computing Noetherian operators of zero-dimensional ideals","authors":"Katsusuke Nabeshima, Shinichi Tajima","doi":"10.1007/s00200-022-00570-7","DOIUrl":"10.1007/s00200-022-00570-7","url":null,"abstract":"<div><p>We consider Noetherian operators in the context of symbolic computation. Upon utilizing the theory of holonomic <span>({mathcal D})</span>-modules, we present a new method for computing Noetherian operators associated to a zero-dimensional ideal. An effective algorithm that consists mainly of linear algebra techniques is proposed for computing them. Moreover, as applications, new computation methods of polynomial ideals are discussed by utilizing the Noetherian operators.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2022-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44198290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-06DOI: 10.1007/s00200-022-00575-2
Augustine Musukwa, Massimiliano Sala, Irene Villa, Marco Zaninelli
The weight, balancedness and nonlinearity are important properties of Boolean functions, but they can be difficult to determine in general. In this paper, we study how to compute them for two classes of functions where these problems are more tractable. In particular, we study functions of degree three and the so-called “splitting” functions. The latter are functions that can be written as the sum of two functions defined over disjoint sets of variables. We show how, for splitting functions, studying these properties reduces to the study of simpler functions. We provide then a procedure to compute the weight of a cubic Boolean function. We show computationally that, for a cubic Boolean function with limited number of terms, this procedure is on average significantly more efficient than some other methods.
{"title":"On cryptographic properties of cubic and splitting Boolean functions","authors":"Augustine Musukwa, Massimiliano Sala, Irene Villa, Marco Zaninelli","doi":"10.1007/s00200-022-00575-2","DOIUrl":"10.1007/s00200-022-00575-2","url":null,"abstract":"<div><p>The weight, balancedness and nonlinearity are important properties of Boolean functions, but they can be difficult to determine in general. In this paper, we study how to compute them for two classes of functions where these problems are more tractable. In particular, we study functions of degree three and the so-called “splitting” functions. The latter are functions that can be written as the sum of two functions defined over disjoint sets of variables. We show how, for splitting functions, studying these properties reduces to the study of simpler functions. We provide then a procedure to compute the weight of a cubic Boolean function. We show computationally that, for a cubic Boolean function with limited number of terms, this procedure is on average significantly more efficient than some other methods.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00200-022-00575-2.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42127920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.1007/s00200-022-00574-3
Mitra Jalali, Reza Nikandish
In this paper, using Gallai’s Theorem and the notion of strong resolving graph, we determine the strong metric dimension in annihilating-ideal graph of commutative rings. For reduced rings, an explicit formula is given and for non-reduced rings, under some conditions, strong metric dimension is computed.
{"title":"Strong metric dimension in annihilating-ideal graph of commutative rings","authors":"Mitra Jalali, Reza Nikandish","doi":"10.1007/s00200-022-00574-3","DOIUrl":"10.1007/s00200-022-00574-3","url":null,"abstract":"<div><p>In this paper, using Gallai’s Theorem and the notion of strong resolving graph, we determine the strong metric dimension in annihilating-ideal graph of commutative rings. For reduced rings, an explicit formula is given and for non-reduced rings, under some conditions, strong metric dimension is computed.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47121791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-20DOI: 10.1007/s00200-022-00571-6
Tsuyoshi Miezaki, Hiroyuki Nakasora
Let C be an extremal Type III or IV code and (D_{w}) be the support design of C for weight w. We introduce the numbers, (delta (C)) and s(C), as follows: (delta (C)) is the largest integer t such that, for all weights, (D_{w}) is a t-design; s(C) denotes the largest integer t such that w exists and (D_{w}) is a t-design. Herein, we consider the possible values of (delta (C)) and s(C).
让 C 是极值类型 III 或 IV 码,(D_{w}) 是 C 对于权重 w 的支持设计。我们引入数字 (delta (C)) 和 s(C) 如下:(delta(C))是指对于所有权重,(D_{w})是一个t设计的最大整数t;s(C)表示w存在且(D_{w})是一个t设计的最大整数t。在这里,我们考虑了 (delta (C)) 和 s(C) 的可能值。
{"title":"On the support t-designs of extremal Type III and IV codes","authors":"Tsuyoshi Miezaki, Hiroyuki Nakasora","doi":"10.1007/s00200-022-00571-6","DOIUrl":"10.1007/s00200-022-00571-6","url":null,"abstract":"<div><p>Let <i>C</i> be an extremal Type III or IV code and <span>(D_{w})</span> be the support design of <i>C</i> for weight <i>w</i>. We introduce the numbers, <span>(delta (C))</span> and <i>s</i>(<i>C</i>), as follows: <span>(delta (C))</span> is the largest integer <i>t</i> such that, for all weights, <span>(D_{w})</span> is a <i>t</i>-design; <i>s</i>(<i>C</i>) denotes the largest integer <i>t</i> such that <i>w</i> exists and <span>(D_{w})</span> is a <i>t</i>-design. Herein, we consider the possible values of <span>(delta (C))</span> and <i>s</i>(<i>C</i>).</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47484961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-14DOI: 10.1007/s00200-022-00568-1
Hai Q. Dinh, Pramod Kumar Kewat, Nilay Kumar Mondal
Maximum distance separable (MDS) codes have the highest possible error-correcting capability among codes with the same length and size. Let (gamma ) be nonzero in (mathbb {F}_{2^m}.) We consider all cyclic and ((1+ugamma ))-constacyclic codes of length (2^s) over (mathbb {F}_{2^m}+umathbb {F}_{2^m}) with their Lee distance and investigate all the cases whether the corresponding Gray images are MDS by giving an analogue of the Singleton bound for codes over (mathbb {F}_{2^m}+umathbb {F}_{2^m}) with the Lee distance through Gray map.
{"title":"Maximum distance separable repeated-root constacyclic codes over (mathbb {F}_{2^m}+umathbb {F}_{2^m}) with respect to the Lee distance","authors":"Hai Q. Dinh, Pramod Kumar Kewat, Nilay Kumar Mondal","doi":"10.1007/s00200-022-00568-1","DOIUrl":"10.1007/s00200-022-00568-1","url":null,"abstract":"<div><p>Maximum distance separable (MDS) codes have the highest possible error-correcting capability among codes with the same length and size. Let <span>(gamma )</span> be nonzero in <span>(mathbb {F}_{2^m}.)</span> We consider all cyclic and <span>((1+ugamma ))</span>-constacyclic codes of length <span>(2^s)</span> over <span>(mathbb {F}_{2^m}+umathbb {F}_{2^m})</span> with their Lee distance and investigate all the cases whether the corresponding Gray images are MDS by giving an analogue of the Singleton bound for codes over <span>(mathbb {F}_{2^m}+umathbb {F}_{2^m})</span> with the Lee distance through Gray map.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47364548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-14DOI: 10.1007/s00200-022-00565-4
Jakub Vašíček, Raffaele Vitolo
We describe software for symbolic computations that we developed in order to find Hamiltonian operators for Witten–Dijkgraaf–Verlinde–Verlinde (WDVV) equations, and verify their compatibility. The computation involves nonlocal (integro-differential) operators, for which specific canonical forms and algorithms have been used.
{"title":"WDVV equations: symbolic computations of Hamiltonian operators","authors":"Jakub Vašíček, Raffaele Vitolo","doi":"10.1007/s00200-022-00565-4","DOIUrl":"10.1007/s00200-022-00565-4","url":null,"abstract":"<div><p>We describe software for symbolic computations that we developed in order to find Hamiltonian operators for Witten–Dijkgraaf–Verlinde–Verlinde (WDVV) equations, and verify their compatibility. The computation involves nonlocal (integro-differential) operators, for which specific canonical forms and algorithms have been used.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2022-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00200-022-00565-4.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49642862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this work we define and study binary codes (C_{q,k}) and (overline{C_{q,k}}) obtained from neighborhood designs of Paley-type bipartite graphs P(q, k) and their complements, respectively for q an odd prime. We prove that for some values of q and k the codes ({C}_{q,k}) are self-dual and the codes (overline{C_{q,k}}) are self-orthogonal. Most of these codes tend to be with optimal or near optimal parameters. Next, we extend the codes (C_{q,k}) to get doubly even self dual codes and find that most of these codes are extremal.
{"title":"Construction of self dual codes from graphs","authors":"Nazahet Fellah, Kenza Guenda, Ferruh Özbudak, Padmapani Seneviratne","doi":"10.1007/s00200-022-00567-2","DOIUrl":"10.1007/s00200-022-00567-2","url":null,"abstract":"<div><p>In this work we define and study binary codes <span>(C_{q,k})</span> and <span>(overline{C_{q,k}})</span> obtained from neighborhood designs of Paley-type bipartite graphs <i>P</i>(<i>q</i>, <i>k</i>) and their complements, respectively for <i>q</i> an odd prime. We prove that for some values of <i>q</i> and <i>k</i> the codes <span>({C}_{q,k})</span> are self-dual and the codes <span>(overline{C_{q,k}})</span> are self-orthogonal. Most of these codes tend to be with optimal or near optimal parameters. Next, we extend the codes <span>(C_{q,k})</span> to get doubly even self dual codes and find that most of these codes are extremal.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42704749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-09DOI: 10.1007/s00200-022-00572-5
{"title":"Best Paper Award in Memory of Jacques Calmet","authors":"","doi":"10.1007/s00200-022-00572-5","DOIUrl":"10.1007/s00200-022-00572-5","url":null,"abstract":"","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2022-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50016423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-25DOI: 10.1007/s00200-022-00569-0
Amir Hashemi, Matthias Orth, Werner M. Seiler
Complementary decompositions of monomial ideals—also known as Stanley decompositions—play an important role in many places in commutative algebra. In this article, we discuss and compare several algorithms for their computation. This includes a classical recursive one, an algorithm already proposed by Janet and a construction proposed by Hironaka in his work on idealistic exponents. We relate Janet’s algorithm to the Janet tree of the Janet basis and extend this idea to Janet-like bases to obtain an optimised algorithm. We show that Hironaka’s construction terminates, if and only if the monomial ideal is quasi-stable. Furthermore, we show that in this case the algorithm of Janet determines the same decomposition more efficiently. Finally, we briefly discuss how these results can be used for the computation of primary and irreducible decompositions.
{"title":"Complementary decompositions of monomial ideals and involutive bases","authors":"Amir Hashemi, Matthias Orth, Werner M. Seiler","doi":"10.1007/s00200-022-00569-0","DOIUrl":"10.1007/s00200-022-00569-0","url":null,"abstract":"<div><p>Complementary decompositions of monomial ideals—also known as Stanley decompositions—play an important role in many places in commutative algebra. In this article, we discuss and compare several algorithms for their computation. This includes a classical recursive one, an algorithm already proposed by Janet and a construction proposed by Hironaka in his work on idealistic exponents. We relate Janet’s algorithm to the Janet tree of the Janet basis and extend this idea to Janet-like bases to obtain an optimised algorithm. We show that Hironaka’s construction terminates, if and only if the monomial ideal is quasi-stable. Furthermore, we show that in this case the algorithm of Janet determines the same decomposition more efficiently. Finally, we briefly discuss how these results can be used for the computation of primary and irreducible decompositions.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2022-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00200-022-00569-0.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44107487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-25DOI: 10.1007/s00200-022-00561-8
Arrieta A Eddie, Heeralal Janwa
Linear codes with few weights have applications in cryptography, association schemes, designs, strongly regular graphs, finite group theory, finite geometries, and secret sharing schemes, among other disciplines. Two-weight linear codes are particularly interesting because they are closely related to objects in different areas of mathematics such as strongly regular graphs, 3-rank permutation groups, ovals, and arcs. There exist techniques to construct linear codes with few weights, for example, the systematic exposition by Calderbank and Kantor (Bull Lond Math Soc 18(2):97–122, 1986). Ding et al., (World Sci, pp 119–124, 2008) and (IEEE Trans Inf Theory 61(11):5835–5842, 2015) constructed few-weight codes using the trace function and Tonchev et al. (Algorithms, 12(8), 2019) generalized Ding’s construction. In this paper, we present an elementary way to get two- and three-weight codes from simplex codes and antipodal linear codes. An interesting application is the construction of uniformly packed linear codes from two-weight codes and quaternary quasi-perfect linear codes from three-weight codes.
具有少量权重的线性码在密码学、关联方案、设计、强正则图、有限群论、有限几何和秘密共享方案以及其他学科中都有应用。双权重线性码特别有趣,因为它们与不同数学领域的对象密切相关,例如强正则图、3秩置换群、椭圆和圆弧。目前已有构造少权线性码的技术,如Calderbank和Kantor (Bull lang Math Soc 18(2):97 - 122,1986)的系统论述。Ding et al., (World Sci, pp 119-124, 2008)和(IEEE Trans Inf Theory 61(11): 5835-5842, 2015)使用跟踪函数构建了少权码,Tonchev et al. (Algorithms, 12(8), 2019)推广了Ding的构造。本文给出了从单纯形码和对映线性码中得到二权码和三权码的一种基本方法。一个有趣的应用是由二权码构造均匀填充线性码和由三权码构造四元拟完美线性码。
{"title":"A new construction of two-, three- and few-weight codes via our GU codes and their applications","authors":"Arrieta A Eddie, Heeralal Janwa","doi":"10.1007/s00200-022-00561-8","DOIUrl":"10.1007/s00200-022-00561-8","url":null,"abstract":"<div><p>Linear codes with few weights have applications in cryptography, association schemes, designs, strongly regular graphs, finite group theory, finite geometries, and secret sharing schemes, among other disciplines. Two-weight linear codes are particularly interesting because they are closely related to objects in different areas of mathematics such as strongly regular graphs, 3-rank permutation groups, ovals, and arcs. There exist techniques to construct linear codes with few weights, for example, the systematic exposition by Calderbank and Kantor (Bull Lond Math Soc 18(2):97–122, 1986). Ding et al., (World Sci, pp 119–124, 2008) and (IEEE Trans Inf Theory 61(11):5835–5842, 2015) constructed few-weight codes using the trace function and Tonchev et al. (Algorithms, 12(8), 2019) generalized Ding’s construction. In this paper, we present an elementary way to get two- and three-weight codes from simplex codes and antipodal linear codes. An interesting application is the construction of uniformly packed linear codes from two-weight codes and quaternary quasi-perfect linear codes from three-weight codes.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2022-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48402416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}