13 research outputs found

    Coding for Trace Reconstruction over Multiple Channels with Vanishing Deletion Probabilities

    Full text link
    Motivated by DNA-based storage applications, we study the problem of reconstructing a coded sequence from multiple traces. We consider the model where the traces are outputs of independent deletion channels, where each channel deletes each bit of the input codeword x∈{0,1}n\mathbf{x} \in \{0,1\}^n independently with probability pp. We focus on the regime where the deletion probability pβ†’0p \to 0 when nβ†’βˆžn\to \infty. Our main contribution is designing a novel code for trace reconstruction that allows reconstructing a coded sequence efficiently from a constant number of traces. We provide theoretical results on the performance of our code in addition to simulation results where we compare the performance of our code to other reconstruction techniques in terms of the edit distance error.Comment: This is the full version of the short paper accepted at ISIT 202

    Optimal k-Deletion Correcting Codes

    Get PDF
    Levenshtein introduced the problem of constructing k-deletion correcting codes in 1966, proved that the optimal redundancy of those codes is O(k log N), and proposed an optimal redundancy single-deletion correcting code (using the so-called VT construction). However, the problem of constructing optimal redundancy k-deletion correcting codes remained open. Our key contribution is a solution to this longstanding open problem. We present a k-deletion correcting code that has redundancy 8k log n+ o(log n) and encoding/decoding algorithms of complexity O(n^(2k+1)) for constant k

    t-Deletion-s-Insertion-Burst Correcting Codes

    Full text link
    Motivated by applications in DNA-based storage and communication systems, we study deletion and insertion errors simultaneously in a burst. In particular, we study a type of error named tt-deletion-ss-insertion-burst ((t,s)(t,s)-burst for short) which is a generalization of the (2,1)(2,1)-burst error proposed by Schoeny {\it et. al}. Such an error deletes tt consecutive symbols and inserts an arbitrary sequence of length ss at the same coordinate. We provide a sphere-packing upper bound on the size of binary codes that can correct a (t,s)(t,s)-burst error, showing that the redundancy of such codes is at least log⁑n+tβˆ’1\log n+t-1. For tβ‰₯2st\geq 2s, an explicit construction of binary (t,s)(t,s)-burst correcting codes with redundancy log⁑n+(tβˆ’sβˆ’1)log⁑log⁑n+O(1)\log n+(t-s-1)\log\log n+O(1) is given. In particular, we construct a binary (3,1)(3,1)-burst correcting code with redundancy at most log⁑n+9\log n+9, which is optimal up to a constant.Comment: Part of this work (the (t,1)-burst model) was presented at ISIT2022. This full version has been submitted to IEEE-IT in August 202

    Improved constructions of permutation and multi-permutation codes correcting a burst of stable deletions

    Full text link
    Permutation codes and multi-permutation codes have been widely considered due to their various applications, especially in flash memory. In this paper, we consider permutation codes and multi-permutation codes against a burst of stable deletions. In particular, we propose a construction of permutation codes correcting a burst stable deletion of length ss, with redundancy log⁑n+2log⁑log⁑n+O(1)\log n+ 2\log \log n+O(1). Compared to the previous known results, our improvement relies on a different strategy to retrieve the missing symbol on the first row of the array representation of a permutation. We also generalize our constructions for multi-permutations and the variable length burst model. Furthermore, we propose a linear-time encoder with optimal redundancy for single stable deletion correcting permutation codes.Comment: Accepted for publication in IEEE Trans. Inf. Theor
    corecore