Processing math: 100%
Research article

Partially balanced network designs and graph codes generation

  • Received: 23 June 2021 Accepted: 28 October 2021 Published: 12 November 2021
  • MSC : 05B30, 0570, 94A60, 94A62

  • Partial balanced incomplete block designs have a wide range of applications in many areas. Such designs provide advantages over fully balanced incomplete block designs as they allow for designs with a low number of blocks and different associations. This paper introduces a class of partially balanced incomplete designs. We call it partially balanced network designs (PBNDs). The fundamentals and properties of PBNDs are studied. We are concerned with modeling PBNDs as graph designs. Some direct constructions of small PBNDs and generalized PBNDs are introduced. Besides that, we show that our modeling yields an effective utilization of PNBDs in constructing graph codes. Here, we are interested in constructing graph codes from bipartite graphs. We have proved that these codes have good characteristics for error detection and correction. In the end, the paper introduces a novel technique for generating new codes from already constructed codes. This technique results in increasing the ability to correct errors.

    Citation: A. El-Mesady, Y. S. Hamed, M. S. Mohamed, H. Shabana. Partially balanced network designs and graph codes generation[J]. AIMS Mathematics, 2022, 7(2): 2393-2412. doi: 10.3934/math.2022135

    Related Papers:

    [1] Ekaterina Kldiashvili, Archil Burduli, Gocha Ghortlishvili . Application of Digital Imaging for Cytopathology under Conditions of Georgia. AIMS Medical Science, 2015, 2(3): 186-199. doi: 10.3934/medsci.2015.3.186
    [2] Tamás Micsik, Göran Elmberger, Anders Mikael Bergquist, László Fónyad . Experiences with an International Digital Slide Based Telepathology System for Routine Sign-out between Sweden and Hungary. AIMS Medical Science, 2015, 2(2): 79-89. doi: 10.3934/medsci.2015.2.79
    [3] Sanjay Konakondla, Steven A. Toms . Cerebral Connectivity and High-grade Gliomas: Evolving Concepts of Eloquent Brain in Surgery for Glioma. AIMS Medical Science, 2017, 4(1): 52-70. doi: 10.3934/medsci.2017.1.52
    [4] Joy Qi En Chia, Li Lian Wong, Kevin Yi-Lwern Yap . Quality evaluation of digital voice assistants for diabetes management. AIMS Medical Science, 2023, 10(1): 80-106. doi: 10.3934/medsci.2023008
    [5] Adel Razek . Augmented therapeutic tutoring in diligent image-assisted robotic interventions. AIMS Medical Science, 2024, 11(2): 210-219. doi: 10.3934/medsci.2024016
    [6] Belgüzar Kara, Elif Gökçe Tenekeci, Şeref Demirkaya . Factors Associated With Sleep Quality in Patients With Multiple Sclerosis. AIMS Medical Science, 2016, 3(2): 203-212. doi: 10.3934/medsci.2016.2.203
    [7] Jonathan Kissi, Daniel Kwame Kwansah Quansah, Jonathan Aseye Nutakor, Alex Boadi Dankyi, Yvette Adu-Gyamfi . Telehealth during COVID-19 pandemic era: a systematic review. AIMS Medical Science, 2022, 9(1): 81-97. doi: 10.3934/medsci.2022008
    [8] Vanessa Kai Lin Chua, Li Lian Wong, Kevin Yi-Lwern Yap . Quality evaluation of digital voice assistants for the management of mental health conditions. AIMS Medical Science, 2022, 9(4): 512-530. doi: 10.3934/medsci.2022028
    [9] Van Tuan Nguyen, Anh Tuan Tran, Nguyen Quyen Le, Thi Huong Nguyen . The features of computed tomography and digital subtraction angiography images of ruptured cerebral arteriovenous malformation. AIMS Medical Science, 2021, 8(2): 105-115. doi: 10.3934/medsci.2021011
    [10] Ilige Hage, Ramsey Hamade . Automatic Detection of Cortical Bones Haversian Osteonal Boundaries. AIMS Medical Science, 2015, 2(4): 328-346. doi: 10.3934/medsci.2015.4.328
  • Partial balanced incomplete block designs have a wide range of applications in many areas. Such designs provide advantages over fully balanced incomplete block designs as they allow for designs with a low number of blocks and different associations. This paper introduces a class of partially balanced incomplete designs. We call it partially balanced network designs (PBNDs). The fundamentals and properties of PBNDs are studied. We are concerned with modeling PBNDs as graph designs. Some direct constructions of small PBNDs and generalized PBNDs are introduced. Besides that, we show that our modeling yields an effective utilization of PNBDs in constructing graph codes. Here, we are interested in constructing graph codes from bipartite graphs. We have proved that these codes have good characteristics for error detection and correction. In the end, the paper introduces a novel technique for generating new codes from already constructed codes. This technique results in increasing the ability to correct errors.



    Diophantine equation is a classical problem in number theory. Let [α] denote the integer part of the real number α and N be a sufficiently large integer. In 1933, Segal [27,28] firstly studied additive problems with non-integer degrees, and proved that there exists a k0(c)>0 such that the Diophantine equation

    [xc1]+[xc2]++[xck]=N (1.1)

    is solvable for k>k0(c), where c>1 is not an integer. Later, Deshouillers [5] improved Segal's bound of k0(c) to 6c3(logc+14) with c>12. Further Arkhilov and Zhitkov [1] refined Deshouillers's result to 22c2(logc+4) with c>12. Afterwards, many results of various Diophantine equations were established (e.g., see [7,10,14,16,17,18,19,21,25,41,42]). In particular, Laporta [17] in 1999 showed that the equation

    [pc1]+[pc2]=N (1.2)

    is solvable in primes p1, p2 provided that 1<c<1716 and N is sufficiently large. Recently, the range of c in (1.2) was enlarged to 1<c<1411 by Zhu [40]. Kumchev [15] showed that the equation

    [mc]+[pc]=N (1.3)

    is solved for almost all N provided that 1<c<1615, where m is an integer and p is a prime. Afterwards, the range of c in (1.3) was enlarged to 1<c<1711 by Balanzario, Garaev and Zuazua [3].

    In 1995, Laporta and Tolev [18] considered the equation

    [pc1]+[pc2]+[pc3]=N (1.4)

    with prime variables p1,p2,p3. Denote the weighted number of solutions of Eq (1.4) by

    R(N)=[pc1]+[pc2]+[pc3]=N(logp1)(logp2)(logp3). (1.5)

    They established the following asymptotic formula

    R(N)=Γ3(1+1c)Γ(3c)N3c1+O(N3c1exp(log13δN))

    for any 0<δ<13 and 1<c<1716. Afterwards, the range of c was enlarged to 1<c<1211 by Kumchev and Nedeva [16], to 1<c<258235 by Zhai and Cao [39], and to 1<c<137119 by Cai [4].

    In this paper, we first show a more general result related to (1.5) by proving the following theorem.

    Theorem 1.1. Let N be a sufficiently large integer. Then for 1<c<3+3κλ3κ+2, we have

    R(N)=Γ3(1+1c)Γ(3c)N3c1+O(N3c1exp(log13δN)) (1.6)

    for any 0<δ<13, where (κ,λ) is an exponent pair, and the implied constant in the Osymbol depends only on c.

    Choosing (κ,λ)=BA2BABABABAB(0,1)=(81242,132242) in Theorem 1.1, we can immediately get the following corollary, which further improves the result of Cai [4].

    Corollary 1.2. Under the notations of Theorem 1.1, for 1<c<837727 the asymptotic formula (1.6) follows.

    It is easy to verify that the range of c in Corollary 1.2 is larger than one of Cai's result. Our improvement mainly derives from more accurate estimates of exponential sums by combining Van der Corput's method, exponent pairs and some elementary methods. Also the estimates of exponential sums has lots of applications in problems including automorphic forms (e.g., see [8,11,12,20,22,24,29,30,31,32,33,34,35,36,37,38]).

    Notation. Throughout the paper, N always denotes a sufficiently large integer. The letter p, with or without subscripts, is always reserved for primes. Let ε(0,1010(3+3κλ3κ+2c)). We denote by {x} and x the fraction part of x and the distance from x to the nearest integer, respectively. Let 1<c<3+3κλ3κ+2 and

    P=N1c,  τ=P1cε,  e(x)=e2πix,  S(α)=pP(logp)e(α[pc]).

    To prove Theorem 1.1, we need the following lemmas.

    Lemma 2.1 ([9,Lemma 5]). Suppose that zn is a sequence of complex numbers, then we have

    |Nn2Nzn|2(1+NQ)Qq=0(1qQ)Re(Nn2Nq¯znzn+q),

    where Re(t) and ¯t denote the real part and the conjugate of the complex number t, respectively.

    Lemma 2.2. Suppose that |x|>0 and c>1. Then for any exponent pair (κ,λ) and Ma<b2M, we have

    anbe(xnc)(|x|Mc)κMλκ+M1c|x|.

    Proof. We can get this lemma from [6,(3.3.4)].

    Lemma 2.3 ([2,Lemma 12]). Suppose that t is not an integer and H3. Then for any α(0,1), we have

    e(α{t})=|h|Hch(α)e(ht)+O(min(1,1Ht)),

    where

    ch(α)=1e(α)2πi(h+α).

    Lemma 2.4 ([9,Lemma 3]). Suppose that 3<U<V<Z<X, and {Z}=12, X64Z2U, Z4U2, V332X. Further suppose that F(n) is a complex valued function such that |F(n)|1. Then the sum

    Xn2XΛ(n)F(n)

    can be decomposed into O(log10X) sums, each of which either of type {I}:

    Mm2Ma(m)Nn2NF(mn)

    with N>Z, where a(m)mε and XMNX, or of type {II}:

    Mm2Ma(m)Nn2Nb(n)F(mn)

    with UMV, where a(m)mε,b(n)nε and XMNX.

    Lemma 2.5. Let f(t) be a real value function and continuous differentiable at least three times on [a,b](1a<b2a), |f(x)|Δ>0, then we have

    a<nbe(f(n))aΔ16+Δ13.

    Moreover, if 0<c1λ1c2λ1, |f(x)|λ1a1, then we have

    a<nbe(f(n))a12λ121+λ11;

    if c2λ112, then we have

    a<nbe(f(n))λ11.

    Proof. The first result was proved by Sargos [26]. And the remaining two results were due to Jia [13].

    Lemma 2.6 ([23,Lemma 2]). Let M>0, N>0, um>0, υn>0, Am>0, Bn>0 (1mM,1nN). Let also Q1 and Q2 be given non-negative numbers, Q1Q2. Then there is one q such that Q1qQ2 and

    Mm=1Amqum+Nn=1BnqυnMm=1Nn=1(AυnmBumn)1um+υn+Mm=1AmQum1+Nn=1BnQυn2.

    Lemma 2.7 ([36,Lemma 5]). Let f(x), g(x) be algebraic functions in [a,b], |f(x)|1R, f(x)1RU, U1, |g(x)|G, |g(x)|GU1. [α,β] is the image of [a,b] under the mapping y=f(x). nu is the solution of f(n)=u.

    bu={1,α<u<β,12,u=αNoru=βN.

    Then we have

    a<nbg(n)e(f(n))=α<uβbug(nu)|f(nu)|e(f(nu)unu+18)+O(Glog(βα+2)+G(ba+R)u1)+O(Gmin(R,1α)+Gmin(R,1β)).

    Lemma 2.8 ([13,Lemma 3]). Suppose that xN, f(x)P, and f(x)Δ. Then we have

    nNmin(D,1f(n))(P+1)(D+Δ1)log(2+Δ1).

    Lemma 2.9. For 0<α<1 and any exponent pair (κ,λ), we have

    T(α,X)=X<n2Xe(α[nc])Xκc+λ1+κlogX+XαXc.

    Proof. Throughout the proof of this lemma, we write H=Xκc+1λ+κ1+κ for convenience. Using Lemma 2.3 we can get

    T(α,X)=|h|Hch(α)X<n2Xe((h+α)nc)+O((logX)X<n2Xmin(1,1H||nc||)).

    Then by the expansion

    min(1,1H||θ||)=h=ahe(hθ),

    where

    |ah|=min(log2HH, 1|h|, Hh2),

    we have

    X<n2Xmin(1,1H||nc||)h=|ah||X<n2Xe(hnc)|Xlog2HH+1hH1h((hXc)κXλκ+XhXc)+hHHh2((hXc)κXλκ+XhXc)Xκc+λ1+κlogX,

    where we estimated the sum over n by Lemma 2.2.

    In a similar way, we have

    |h|Hch(α)X<n2Xe((h+α)nc)=c0(α)X<n2Xe(αnc)+1hHch(α)X<n2Xe((h+α)nc)Xκc+λ1+κlogX+XαXc.

    Then this lemma follows.

    Lemma 2.10 ([42,Lemma 2.1]). Suppose that f(n) is a real-valued function in the interval [N,N1], where 2N<N12N. If 0<c1λ1|f(n)|c2λ112, then we have

    N<nN1e(f(n))λ11.

    If |f(j)(n)|λ1Nj+1(j=1,2), then we have

    N<nN1e(f(n))λ11+N12λ121.

    If |f(j)(n)|λ1Nj+1(j=1,2,3,4,5,6), then we have

    N<nN1e(f(n))λ11+Nλλκ1,

    where (κ,λ) is any exponent pair.

    Lemma 2.11 ([9,Lemma 6]). Suppose that 0<a<b2a and R is an open convex set in C containing the real segment [a,b]. Suppose further that f(z) is analytic on R. f(x) is real for real xR. f(z)M for zR. There is a constant k>0 such that f(x)kM for all real xR. Let f(b)=α and  f(a)=β, and define xυ for each integer υ in the range α<υ<β by f(xυ)=υ. Then we have

    a<nbe(f(n))=e(18)α<υβ|f(xυ)|12e(f(xυ)υxυ)+O(M12+log(2+M(ba))).

    Lemma 3.1. Let P56XP, H=X1(1+2κ)c+λ2+2κ and ch(α) denote complex numbers such that ch(α)(1+|h|)1. Then uniformly for α(τ,1τ), we have

    SI=|h|Hch(α)Mm2Ma(m)Nn2Ne((h+α)(mn)c)X(1+2κ)c+λ2+2κ+2ε (3.1)

    for any a(m)mε, where (κ,λ) is any exponent pair, XMNX and MY with Y=min{X1,X2,X3,X4,X5,X6,X7,X8},

    X1=X152(1+2κ)c+λ2+2κc2112, X2=X5211(1+2κ)c+λ2+2κ4c11811,X3=X318(1+2κ)c+λ2+2κc8238, X4=X2(1+2κ)c+2λ1+κ3,X5=X4(1+2κ)c+4λ1+κ467,X6=X167(1+2κ)c+λ1+κ257,X7=X203(1+2κ)c+λ1+κ343,X8=X73(1+2κ)c+λ1+κ113.

    Proof. It is easy to deduce that

    SIMεhHKh,

    where Kh=mM|nNe((α+h)(mn)c)|. According to Hölder's inequality, we have

    K4hM3mM|nNe((α+h)(mn)c)|4. (3.2)

    Let zn=zn(m,α)=(α+h)(mn)c. Suppose that Q, J are two positive integers such that 1QNlog1X, 1JNlog1X. For the inner sum in (3.2), applying Lemma 2.1 twice, we can get

    K4hX4Q2+X4J+X3JQJj=1Qq=1|Eq,j|, (3.3)

    where

    Eq,j=mMN<n2Nqje(znzn+q+zn+q+jzn+j). (3.4)

    Let Δ(nc;q,j)=(n+q+j)c(n+q)c(n+j)c+nc, G(m,n)=(α+h)mcΔ(nc;q,j). Then znzn+qzn+j+zn+q+j=G(m,n). Thus we have

    Eq,j=mne(G(m,n)). (3.5)

    For any t1,0, we have

    Δ(nt;q,j)=t(t1)qjnt2+O(Nt3qj(q+j)), (3.6)

    then

    Gn=c(c1)(c2)(α+h)qjmcnc3(1+O(q+jN))

    and

    2Gn2=c(c1)(c2)(c3)(α+h)qjmcnc4(1+O(q+jN)). (3.7)

    If c(c1)(c2)(α+h)qjMcNc31100, by Lemma 2.5 we have

    mne(G(m,n))MN3((α+h)qjMcNc)1.

    From now we always suppose that c(c1)(c2)(α+h)qjMcNc31100. By Lemma 2.7 we have

    N<n2Njqe(G(m,n))=e(18)α<υ<β|2Gn2(m,nυ)|12e(G(m,nυ)υnυ)+R(m,q,j),

    where

    Gn(m,nυ)=υ,β=Gn(m,N),α=Gn(m,2Nqj),R=N4[(h+α)qjXc]1,υ(h+α)qjMcNc3,R(m,q,j)=O(logX+RN1+min(R,max(1α,1β))). (3.8)

    By Lemma 2.8, the contribution of R(m,q,j) to E(q,j) is

    MlogX+MRN1+mMmin(R,1α)+mMmin(R,1β)MlogX+X3c[(h+α)qjM2]1+[(h+α)qj]12MXc21logX. (3.9)

    Then we only need to deal with the following exponential sum

    mMα<υ<β|2Gn2(m,nυ)|12e(G(m,nυ)υnυ)=υmIυ|2Gn2(m,nυ)|12e(G(m,nυ)υnυ),

    where Iυ is a subinterval of [M,2M]. For a fixed υ, we define Δλ=Δ(nλυ;q,j), where λ is an arbitrary real number. We take the derivative of m in (3.8) and get

    nυ=cΔc1(c1)mΔc2. (3.10)

    It follows from (3.7) that

    ddm(2Gn2(m,nυ))=c2(h+α)mc1Δc2((c1)Δ2c2(c2)Δc1Δc3).

    Recalling (3.6), we can get

    ddm(2Gn2(m,nυ))=c2(c1)(c2)(c3)(h+α)qjmc1nc4υ(1+O(q+jN)).

    Thus for m, |2Gn2(m,nυ)|12 is monotonic. Let g(m)=G(m,nυ(m))υnυ(m). Then we have

    g(m)=c(α+h)mc1Δc,g(m)=c(α+h)c1(c1)2ΔcΔc2c2Δ2c1m2cΔc2=c(α+h)(c1)g1(m)g2(m)g0(m),g(m)=c(α+h)(c1)(g1g2)g0g0(g1g2)g20,

    where

    g1=((c1)2cΔc1Δc2+(c1)2(c2)ΔcΔc3)nυ(m),g2=2c2(c1)Δc1Δc2nυ(m),g0=(2c)m1c(c1)Δc2((c1)Δ2c2+cΔc1Δc3).

    From the above formulas we can obtain

    g(m)(h+α)qjM1Xc2.

    Using Lemma 2.5 and partial summation we can get

    mMυ|2Gn2(m,nυ)|12e(G(m,nυ)υnυ)(M((h+α)qjM1Xc2)16+((h+α)qjM1Xc2)13)×(h+α)qjMcNc3((h+α)qjMcNc4)12((h+α)qj)23M116X2c343+((h+α)qj)16M43Xc613. (3.11)

    By (3.5), (3.9) and (3.11), we have

    Eq,jlog1XM+((h+α)qjM2)1X3c+((h+α)qj)12MXc21+((h+α)qj)23M116X2c343+((h+α)qj)16M43Xc613. (3.12)

    Inserting (3.12) into (3.3), we obtain

    K4hlog1XX4Q2+X4J+MX3+((h+α)QJM2)1X6c+((h+α)QJ)12MXc2+2+((h+α)QJ)23M116X2c3+53+((h+α)QJ)16M43Xc6+83.

    Then choosing optimal J[0,Nlog1X] and Q[0,Nlog1X] and using Lemma 6 twice we can get

    Khlog3XB(h),

    where

    B(h)=X56+(α+h)114M17Xc14+57+(α+h)112M1148Xc12+1724+(α+h)130M415Xc30+1115+X34M14+(α+h)14X1c4+X2328M18+X2532M732+X1720M340+X1114M314.

    Recalling the definitions of H and Y, we have

    SIlog3XMεHB(H)X(1+2κ)c+λ2+2κ+2ε,

    and Lemma 3.1 is proved.

    Lemma 3.2. Let P56XP, H=X1(1+2κ)c+λ2+2κ, F=(h+α)Xcand ch(α) denote complex numbers such that ch(α)(1+|h|)1. Then uniformly for α(τ,1τ), we have

    SII=|h|Hch(α)Mm2Ma(m)Nn2Nb(n)e((h+α)(mn)c)X(1+2κ)c+λ2+2κ+2ε, (3.13)

    for any a(m)mε, b(n)nε, where (κ,λ) is any exponent pair, XMNX and

    max{X3(1+2κ)c+λ1+κF1,X42(1+2κ)c+2λ1+κ,X26533(1+2κ)c+λ1+κF539}MX(1+2κ)c+λ1+κ1.

    Proof. Taking Q=[X2(1+2κ)c+λ1+κlog1X], then we have Q=o(N). By Cauchy's inequality and Lemma 2.1, we have

    |SII|2mM|a(m)|2mM|nNb(n)e(f(mn))|2M2N2log2A+2BXQ+MNlog2AXQQq=1Eq, (3.14)

    where Eq=nN|b(n+q)b(n)||mMe(G(mn))| and G(m,n)=G(m,n,q)=(h+α)mcΔ(n,q;c), Δ(n,q;c)=(n+q)cnc.

    If |Gm|103Mq2, by Lemma 2.10 we have

    EqnN|b(n+q)b(n)|(MNFq+(FqMN)12M12)nN(|b(n+q)|2+|b(n)|2)(MNFq+Mq)MNqlog2BX (3.15)

    noting that MXF.

    Now we suppose |G/m|>103Mq2. By Lemma 11 we get

    mMe(G(m,n))MN1/2(Fq)1/2|r1(n)rr2(n)φ(n,r)e(s(r,n))|+logX+MN1/2(Fq)1/2,

    where s(r,n)=G(M(r,n),n)rm(r,n), φ(r,n)=(Fq)12MN12|2G(m(r,n),n)m2|12 and

    r1(n)=Gm(M,n),  r2(n)=Gm(2M,n).

    Thus we have

    EqMN1/2(Fq)1/2nN|b(n+q)b(n)||r1(n)<rr2(n)φ(n,r)e(s(r,n))|+Nlog2B+1X+MN3/2(Fq)1/2log2BX. (3.16)

    So it suffices to bound the sum

    Σ1=nN|b(n+q)b(n)||r1(n)<rr2(n)φ(n,r)e(s(r,n))|.

    Let T=[Fq3/M2N] and R=Fq/MN. By Cauchy's inequality and Lemma 2.1 again we get

    Σ12nN|b(n+q)b(n)|2nN|r1(n)<rr2(n)φ(n,r)e(s(r,n))|2N2R2log4BXT+NRlog4BXTΣ2, (3.17)

    where

    Σ2=Tt=1|nNr1(n)<rr2(n)tφ(n,r+t)φ(n,r)e(s(r+t)s(r,n))|

    and where we used the estimate

    nN|b(n+q)b(n)|2nN(|b(n+q)|4+|b(n)|4)Nlog4BX.

    It is easy to check that 10<T=o(R).

    Recall that s(r,n)=G(m(r,n),n)rm(r,n), where m(r,n) denotes the solution of

    Gm(m,n)=r.

    It is easy to deduce that

    sr(r,n)=Gmmrm(r,n)rmr=m(r,n).

    So we can obtain

    H(n):=Hr,t,q(n)=s(r+t,n)s(r,n)=r+trsu(u,n)du=r+trm(u,n)du,

    which implies that |H(j)|tMNj, (j=0,1,2,3,4,5,6). Denote by I(r,t) the interval N<n2N, r1(n)<nr2(n)t. Then we have

    Σ2Tt=1rR|nI(r,t)φ(n,r+t)φ(n,r)e(s(r+t,n)s(r,n))|.

    Thus using partial summation, we get

    Σ2Tt=1rR(tMN)κNλRMκNλκT1+κNR (3.18)

    with the exponent pair (κ,λ), if we note that MX26533(1+2κ)c+λ1+κF539. From (3.15)–(3.18) we get that for any 1qQ,

    EqMNlog2B+1Xq+Nlog2B+1X+MN32(Fq)12log2BX. (3.19)

    Now this lemma follows from inserting (3.19) into (3.14).

    Lemma 3.3. For τα1τ, we have

    S(α)P(1+2κ)c+λ2+2κ+4ε,

    where (κ,λ) is any exponent pair.

    Proof. Throughout the proof of this lemma, we write H=X1(1+2κ)c+λ2+2κ for convenience. By a dissection argument we only need to prove that

    X<n2XΛ(n)e(α[nc])X(1+2κ)c+λ2+2κ+3ε (3.20)

    holds for P56XP and τα1τ. According to Lemma 2.3, we have

    X<n2XΛ(n)e(α[nc])=|h|Hch(α)X<n2XΛ(n)e((h+α)nc)+O((logX)X<n2Xmin(1,1Hnc)). (3.21)

    By the expansion

    min(1,1Hnc)=h=ahe(hnc),

    where

    |ah|min(log2HH,1|h|,Hh2),

    we get

    X<n2Xmin(1,1Hnc)h=ah|X<n2Xe(hnc)|Xlog2HH+1hH1h((hXc)12+XhXc)+hHHh2((hXc)12+XhXc)X(1+2κ)c+λ2+2κlogX, (3.22)

    where we estimated the sum over n by Lemma 2.2 with the exponent pair (12,12).

    Let R=max{X3(1+2κ)c+λ1+κF1,X42(1+2κ)c+2λ1+κ,X26533(1+2κ)c+λ1+κF539}. Recall the definition of Y in Lemma 3.1. Let U=R, V=X(1+2κ)c+λ1+κ1, Z=[XY1]+12. By Lemma 4 with F(n)=e((h+α)nc), then we reduce the estimate of

    |h|Hch(α)X<n2XΛ(n)e((h+α)nc)

    to the estimates of sums of type I

    SI=|h|Hch(α)M<m2Ma(m)N<n2Ne((h+α)(mn)c), N>Z,

    and sums of type II

    SII=|h|Hch(α)M<m2Ma(m)N<n2Nb(n)e((h+α)(mn)c), U<M<V,

    where a(m)mε, b(n)nε, XMNX. By Lemma 3.1, we get

    SIX(1+2κ)c+λ2+2κ+2ε. (3.23)

    By Lemma 3.2, we get

    SIIX(1+2κ)c+λ2+2κ+3ε. (3.24)

    From (3.23) and (3.24) we can obtain

    |h|Hch(α)X<n2XΛ(n)e((h+α)nc)X(1+2κ)c+λ2+2κ+3ε. (3.25)

    Now (3.20) follows from (3.21), (3.22) and (3.25). Thus we complete the proof of this Lemma.

    It is easy to see that

    R(N)=1ττS3(α)e(αN)dα=ττS3(α)e(αN)dα+1ττS3(α)e(αN)dα=R1(N)+R2(N). (4.1)

    Following the argument of Laporta and Tolev [18,pages 928–929], we can get that

    R1(N)=Γ3(1+1c)Γ(3c)N3c1+O(N3c1exp(log13δN)) (4.2)

    for 1<c<32 and any 0<δ<13, where the implied constant in the Osymbol depends only on c.

    Let

    S(α,X)=X<p2Xe(α[pc])logp, T(α,X)=X<n2Xe(α[nc]).

    We can get

    R2(N)=1ττS3(α)e(αN)dα(logX)maxP56X0.5P|1ττS2(α)S(α,X)e(αN)dα|+P116log2P, (4.3)

    where we used

    1ττ|S2(α)|dα10|S2(α)|dαPlog2P. (4.4)

    Now, we start to estimate the absolute value on the right hand in (4.3). By Cauchy's inequality we have

    |1ττS2(α)S(α,X)e(αN)dα|=|X<p2X(logp)1ττS2(α)e(α[pc]αN)dα|X<p2X(logp)|1ττS2(α)e(α[pc]αN)dα|(logX)X<n2X|1ττS2(α)e(α[nc]αN)dα|X12(logX)(X<n2X|1ττS2(α)e(α[nc]αN)dα|2)12=X12(logX)(1ττ¯S2(β)e(βN)dβ1ττS2(α)T(αβ,X)e(αN)dα)12X12(logX)(1ττ|S(β)|2dβ1ττ|S(α)|2|T(αβ,X)|dα)12. (4.5)

    Then we have

    1ττ|S(α)|2|T(αβ,X)|dατ<α<1τ|αβ|Xc|S(α)|2|T(αβ,X)|dα+τ<α<1τ|αβ|>Xc|S(α)|2|T(αβ,X)|dα. (4.6)

    By Lemma 3.3, we have

    τ<α<1τ|αβ|Xc|S(α)|2|T(αβ,X)|dαXmaxα(τ,1τ)|S(α)|2|αβ|Xc1dαX1cP(1+2κ)c+λ1+κ+8ε, (4.7)

    where we used the trivial bound T(α,X)X. By Lemma 2.9, Lemma 3.3 and (4.4), we get

    τ<α<1τ|αβ|>Xc|S(α)|2|T(αβ,X)|dατ<α<1τ|αβ|>Xc|S(α)|2(Xκc+λ1+κlogX+X|αβ|Xc)dαXκc+λ1+κ(logX)1ττ|S(α)|2dα+maxα(τ,1τ)|S(α)|2|αβ|>XcX|αβ|XcdαXκc+λ1+κPlog3P+X1cP(1+2κ)c+λ1+κ+9ε. (4.8)

    Thus, combining (4.6)–(4.8) we obtain

    1ττ|S(α)|2|T(αβ,X)|dαXκc+λ1+κPlog3P+X1cP(1+2κ)c+λ1+κ+9ε. (4.9)

    By (4.3), (4.5) and (4.9), we can obtain

    R2(N)P3cε. (4.10)

    Now putting (4.1), (4.2) and (4.10) into together, we have

    R(N)=Γ3(1+1c)Γ(3c)N3c1+O(N3c1exp(log13δN))

    follows for any 0<δ<13, where the implied constant in the Osymbol depends only on c. Thus we complete the proof of Theorem 1.1.

    The authors would like to thank the referees for their many useful comments. This work is supported by National Natural Science Foundation of China (Grant Nos. 11801328 and 11771256).

    The authors declare no conflict of interest.



    [1] J. A. Bondy, U. S. R. Murty, Graph theory with applications, Elsevier Science Publishing Co., Inc., New York, USA, 1976. doi: 10.1057/jors.1977.45.
    [2] J. A. Bondy, U. S. R. Murty, Graph theory, Springer, Berlin, 2008.
    [3] D. R. Stinson, Combinatorial designs: Constructions and analysis, Springer, New York, 2004.
    [4] R. Khattree, On construction of constant block-sum partially balanced incomplete block designs, Commun. Stat. Theor. M., 49 (2020), 2585-2606. doi: 10.1080/03610926.2019.1576895. doi: 10.1080/03610926.2019.1576895
    [5] P. Kaur, D. G. Kumar, Construction of incomplete Sudoku square and partially balanced incomplete block designs, Commun. Stat. Theor. M., 49 (2020), 1462-1474. doi: 10.1080/03610926.2018.1563177. doi: 10.1080/03610926.2018.1563177
    [6] I. Iqbal, M. Parveen, Z. Mahmood, New diallel cross designs through resolvable balanced incomplete block designs for field experiments, Sarhad J. Agric., 34 (2018), 994-1000. doi: 10.17582/journal.sja/2018/34.4.994.1000. doi: 10.17582/journal.sja/2018/34.4.994.1000
    [7] A. Adhikari, M. Bose, D. Kumar, B. Roy, Applications of partially balanced incomplete block designs in developing (2, n)-visual cryptographic schemes, IEICE T. Fund. Electr., E90-A (2007), 949-951. doi: 10.1093/ietfec/e90-a.5.949. doi: 10.1093/ietfec/e90-a.5.949
    [8] R. C. Bose, Partially balanced incomplete block designs with two associate classes involving only two replications, Calcutta Stat. Assoc. Bul., 3 (1951), 120-125. doi: 10.1177/0008068319510304. doi: 10.1177/0008068319510304
    [9] R. C. Bose, K. R. Nair, Partially balanced incomplete block designs, Sankhya, 4 (1939), 337-372. Available from: https://www.jstor.org/stable/40383923.
    [10] R. C. Bose, T. Shimamoto, Classification and analysis of partially balanced incomplete block designs with two associate classes, J. Am. Stat. Assoc., 47 (1952), 151-184. doi: 10.2307/2280741. doi: 10.2307/2280741
    [11] W. D. Wallis, Regular graph designs, J. Stat. Plan. Infer., 51 (1996), 273-281. doi: 10.1016/0378-3758(95)00091-7. doi: 10.1016/0378-3758(95)00091-7
    [12] D. L. Kreher, G. F. Royle, W. D. Wallis, A family of resolvable regular graph designs, Discrete Math., 156 (1996), 269-275. doi: 10.1016/0012-365X(95)00052-X. doi: 10.1016/0012-365X(95)00052-X
    [13] H. B. Walikar, B. D. Acharya, H. S. Ramane, H. G. Shekharappa, S. Arumugam, Partially balanced incomplete block designs arising from minimal dominating sets of a graph, AKCE. Int. J. Graphs Co., 4 (2007), 223-232. doi: 10.1080/09728600.2007.12088837. doi: 10.1080/09728600.2007.12088837
    [14] F. R. Barandagh, A. R. Barghi, B. Pejman, M. R. Parsa, Strongly regular graphs arising from balanced incomplete block design with λ = 1, Gen. Math. Notes, 24 (2014), 70-77.
    [15] S. A. Cakiroglu, Optimal regular graph designs, Stat. Comput., 28 (2018), 103-112. doi: 10.1007/s11222-016-9720-8. doi: 10.1007/s11222-016-9720-8
    [16] R. Ahmed, F. Shehzad, M. Jamil, H. M. K. Rasheed, Construction of some circular regular graph designs in blocks of size four using cyclic shifts, J. Stat. Theory Appl., 19 (2020), 314-324. doi: 10.2991/jsta.d.200423.001. doi: 10.2991/jsta.d.200423.001
    [17] A. Boua, L. Oukhtite, A. Raji, O. A. Zemzami, An algorithm to construct error correcting codes from planar near-rings, Int. J. Math. Eng. Sci., 3 (2014), 614-623. Available from: https://vixra.org/pdf/1405.0130v1.pdf.
    [18] C. J. Colbourn, J. H. Dinitz, Handbook of combinatorial designs, 2 Eds., Chapman and Hall-CRC, 2007.
    [19] S. J. M. Hwang, Application of balanced incomplete block designs in error detection and correction, 2016. doi: 10.4135/9781473941977.
    [20] R. Merris, Combinatorics, 2 Eds., John Wiley & Sons, Inc., 2003.
    [21] U. Shumacher, Suborthogonal double covers of complete graphs by stars, Discret. Appl. Math., 95 (1999), 439-444. doi: 10.1016/S0166-218X(99)00091-8. doi: 10.1016/S0166-218X(99)00091-8
    [22] S. A Hartmann, Symptotic results on suborthogonal G-decompositions of complete digraphs, Discret. Appl. Math., 95 (1999), 311-320. doi: 10.1016/S0166-218X(99)00083-9. doi: 10.1016/S0166-218X(99)00083-9
    [23] S. Hartmann, U. Shumacher, Suborthogonal double covers of complete graphs, Congressus Numerantium, 147 (2000), 33-40.
    [24] R. El-Shanawany, H. Shabana, General cyclic orthogonal double covers of finite regular circulant graphs, Open J. Discret. Math., 4 (2014), 19-27. doi: 10.4236/ojdm.2014.42004. doi: 10.4236/ojdm.2014.42004
    [25] M. Higazy, Suborthogonal double covers of the complete bipartite graphs by all bipartite subgraphs with five edges over finite fields, Far East J. Appl. Math., 91 (2015), 63-80. doi: 10.17654/FJAMApr2015_063_080. doi: 10.17654/FJAMApr2015_063_080
    [26] H. D. O. F. Gronau, M. Grüttmüller, S. Hartmann, U. Leck, V. Leck, On orthogonal double covers of graphs, Design. Code. Cryptogr., 7 (2002), 49-91. doi: 10.1023/A:1016546402248. doi: 10.1023/A:1016546402248
    [27] R. El-Shanawany, M. Higazy, H. Shabana, A. El-Mesady, Cartesian product of two symmetric starter vectors of orthogonal double covers, AKCE Int. J. Graphs Co., 12 (2015), 59-63. doi: 10.1016/j.akcej.2015.06.009. doi: 10.1016/j.akcej.2015.06.009
    [28] S. El-Serafi, R. El-Shanawany, H. Shabana, Orthogonal double cover of complete bipartite graph by disjoint union of complete bipartite graphs, Ain. Shams Eng. J., 6 (2015), 657-660. doi: 10.1016/j.asej.2014.12.002. doi: 10.1016/j.asej.2014.12.002
    [29] R. El-Shanawany, A. El-Mesady, Cyclic orthogonal double covers of circulants by certain nerve cell graphs, Contrib. Discret. Math., 14 (2019), 105-116. doi: 10.11575/cdm.v14i1.62428. doi: 10.11575/cdm.v14i1.62428
    [30] R. El-Shanawany, A. El-Mesady, On cyclic orthogonal double covers of circulant graphs by special infinite graphs, AKCE Int. J. Graphs Co., 14 (2017), 199-207. doi: 10.1016/j.akcej.2017.04.002. doi: 10.1016/j.akcej.2017.04.002
    [31] R. Sampathkumar, S. Srinivasan, Cyclic orthogonal double covers of 4-regular circulant graphs, Discrete Math., 311 (2011), 2417-2422. doi: 10.1016/j.disc.2011.06.021. doi: 10.1016/j.disc.2011.06.021
    [32] R. El-Shanawany, A. El-Mesady, On the one edge algorithm for the orthogonal double covers, Prikl. Diskretn. Mat., 45 (2019), 78-84. doi: 10.17223/20710410/45/8. doi: 10.17223/20710410/45/8
    [33] R. Sampathkumar, Orthogonal double covers of complete bipartite graphs, Australas. J. Comb., 49 (2011), 15-18. Available from: https://ajc.maths.uq.edu.au/pdf/49/ajc_v49_p015.pdf.
    [34] R. El-Shanawany, H. D. O. F. Gronau, M. Grüttmüller, Orthogonal double covers of Kn, n by small graphs, Discret. Appl. Math., 138 (2004), 47-63. doi: 10.1016/S0166-218X(03)00269-5. doi: 10.1016/S0166-218X(03)00269-5
    [35] M. Higazy, R. Scapellato, Y. S. Hamed, A complete classification of 5-regular circulant graphs that allow cyclic orthogonal double covers, J. Algebr. Comb., 2021. doi: 10.1007/s10801-020-01008-4. doi: 10.1007/s10801-020-01008-4
    [36] R. Scapellato, R. El Shanawany, M. Higazy, Orthogonal double covers of Cayley graphs, Discret. Appl. Math, 157 (2009), 3111-3118. doi: 10.1016/j.dam.2009.06.005. doi: 10.1016/j.dam.2009.06.005
    [37] R. Sampathkumar, S. Srinivasan, More mutually orthogonal graph squares, Utilitas Math., 91 (2013), 345-354.
    [38] R. El-Shanawany, A. El-Mesady, Mutually orthogonal graph squares for disjoint union of stars, Ars Comb., 149 (2020), 83-91.
    [39] M. Higazy, Lambda-mutually orthogonal covers of complete bipartite graphs, Adv. Appl. Discret. Mat., 17 (2016), 151-167. doi: 10.17654/DM017020151. doi: 10.17654/DM017020151
    [40] R. El-Shanawany, A. El-Mesady, On mutually orthogonal certain graph squares, Online J. Anal. Comb., 14 (2020).
    [41] R. Sampathkumar, S. Srinivasan, Mutually orthogonal graph squares, J. Comb. Des., 17 (2009), 369-373. doi: 10.1002/jcd.20216. doi: 10.1002/jcd.20216
    [42] R. El-Shanawany, On mutually orthogonal disjoint copies of graph squares, Note Mat., 36 (2016), 89-98. doi: 10.1285/i15900932v36n2p89. doi: 10.1285/i15900932v36n2p89
    [43] M. Higazy, A. El-Mesady, M. S. Mohamed, On graph-orthogonal arrays by mutually orthogonal graph squares, Symmetry, 12 (2020), 1895. doi: 10.3390/sym12111895. doi: 10.3390/sym12111895
    [44] C. J. Colbourn, J. H. Dinitz, Mutually orthogonal latin squares: A brief survey of constructions, J. Stat. Plan. Infer., 95 (2001), 9-48. doi: 10.1016/S0378-3758(00)00276-7. doi: 10.1016/S0378-3758(00)00276-7
    [45] M. Higazy, A. El-Mesady, E. E. Mahmoud, M. H. Alkinani, Circular intensely orthogonal double cover design of balanced complete multipartite graphs, Symmetry, 12 (2020), 1743. doi: 10.3390/sym12101743. doi: 10.3390/sym12101743
    [46] N. Yu. Erokhovets, Gal's conjecture for nestohedra corresponding to complete bipartite graphs, P. Steklov. Math., 266 (2009), 120-132. doi: 10.1134/S0081543809030079. doi: 10.1134/S0081543809030079
    [47] S. Hartmann, Orthogonal decompositions of complete digraphs, Graph. Combinator., 18 (2002), 285-302. doi: 10.1007/s003730200021. doi: 10.1007/s003730200021
    [48] D. Fronček, A. Rosa, Symmetric graph designs on friendship graphs, J. Comb. Des., 8 (2000), 201-206. doi: 10.1002/(sici)1520-6610(2000)8:3<201::aid-jcd5>3.0.co;2-#. doi: 10.1002/(sici)1520-6610(2000)8:3<201::aid-jcd5>3.0.co;2-#
    [49] H. D. O. F. Gronau, R. C. Mullin, A. Rosa, P. J. Schellenberg, Symmetric graph designs, Graph. Combinator., 16 (2000), 93-102. doi: 10.1007/s003730050006. doi: 10.1007/s003730050006
    [50] P. M. Gergely, Partitions with certain intersection properties, J. Comb. Des., 19 (2011), 345-354. doi: 10.1002/jcd.20290. doi: 10.1002/jcd.20290
    [51] Jr. E. Assmus, J. D. Key, Designs and codes: An update, Code. Des. Geom., 9 (1996), 7-27. doi: 10.1007/BF00169770. doi: 10.1007/BF00169770
    [52] A. E. Brouwer, C. A. Eijl, On the p-rank of the adjacency matrices of strongly regular graphs, J. Algebr. Comb., 1 (1992), 329-346. doi: 10.1023/A:1022438616684. doi: 10.1023/A:1022438616684
    [53] W. H. Haemers, C. Parker, V. Pless, V. D. Tonchev, A design and a code invariant under the simple group Co3, J. Comb. A., 62 (1993), 225-233. doi: 10.1016/0097-3165(93)90045-A. doi: 10.1016/0097-3165(93)90045-A
    [54] V. D. Tonchev, Binary codes derived from the Hoffman-Singleton and Higman-Sims graphs, IEEE T. Inform. Theory, 43 (1997), 1021-1025. doi: 10.1109/18.568714. doi: 10.1109/18.568714
    [55] W. H. Haemers, R. Peeters, J. M. Rijckevorsel, Binary codes of strongly regular graphs, Design. Code. Cryptogr., 17 (1999), 187-209. doi: 10.1023/A:1026479210284. doi: 10.1023/A:1026479210284
    [56] D. Crnković, B. G; Rodrigues, S. Rukavina, L. Simčić, Ternary codes from the strongly regular (45, 12, 3, 3) graphs and orbit matrices of 2-(45, 12, 3) designs, Discrete Math., 312 (2012), 3000-3010. doi: 10.1016/j.disc.2012.06.012. doi: 10.1016/j.disc.2012.06.012
    [57] D. Crnković, M. Maximović, B. Rodrigues, S. Rukavina, Self-orthogonal codes from the strongly regular graphs on up to 40 vertices, Adv. Math. Commun., 10 (2016), 555-582. doi: 10.3934/amc.2016026. doi: 10.3934/amc.2016026
    [58] W. Fish, R. Fray, E. Mwambene, Binary codes from the complements of the triangular graphs, Quaest. Math., 33 (2010), 399-408. doi: 10.2989/16073606.2010.541595. doi: 10.2989/16073606.2010.541595
    [59] M. Grassl, M. Harada, New self-dual additive F4-codes constructed from circulant graphs, Discrete Math., 340 (2017), 399-403. doi: 10.1016/j.disc.2016.08.023. doi: 10.1016/j.disc.2016.08.023
    [60] J. D. Key, B. G. Rodrigues, LCD codes from adjacency matrices of graphs, Appl. Algebr. Eng. Comm., 29 (2018), 227-244. doi: 10.1007/s00200-017-0339-6. doi: 10.1007/s00200-017-0339-6
    [61] D. Leemans, B. G. Rodrigues, Binary codes of some strongly regular subgraphs of the McLaughlin graph, Design. Code. Cryptogr., 67 (2013), 93-109. doi: 10.1007/s10623-011-9589-7. doi: 10.1007/s10623-011-9589-7
    [62] M. Higazy, T. A. Nofal, On network designs with coding error detection and correction application, Comput. Mater. Con., 67 (2021), 3401-3418. doi: 10.32604/cmc.2021.015790. doi: 10.32604/cmc.2021.015790
    [63] W. Fish, J. D. Key, E. Mwambene, Special LCD codes from products of graphs, Appl. Algebr. Eng. Comm., 2021, doi: 10.1007/s00200-021-00517-4. doi: 10.1007/s00200-021-00517-4
  • This article has been cited by:

    1. Qian Sima, Shan Wu, Rahim Khan, The Acceptability of Traditional Culture under the Background of Deep Learning, 2022, 2022, 1687-5273, 1, 10.1155/2022/4010099
    2. Min Hong, Jiajia He, Kexian Zhang, Zhidou Guo, Does digital transformation of enterprises help reduce the cost of equity capital, 2023, 20, 1551-0018, 6498, 10.3934/mbe.2023280
    3. Kaimeng Zhang, Xihe Liu, Jingjing Wang, Exploring the relationship between corporate ESG information disclosure and audit fees: evidence from non-financial A-share listed companies in China, 2023, 11, 2296-665X, 10.3389/fenvs.2023.1196728
    4. Tingfang Zhang, Model Design and Discourse Construction of Intercultural Communication of Chinese Cultural Community in Globalized Business Environment, 2024, 9, 2444-8656, 10.2478/amns-2024-3259
    5. Guangbin Liu, Wei Nie, The role of Marxist ecological view on environmental protection in China, 2023, 0958-305X, 10.1177/0958305X231177738
    6. Yang Xu, Conghao Zhu, Runze Yang, Qiying Ran, Xiaodong Yang, Applications of linear regression models in exploring the relationship between media attention, economic policy uncertainty and corporate green innovation, 2023, 8, 2473-6988, 18734, 10.3934/math.2023954
    7. Shan Huang, Khor Teik Huat, Yue Liu, Study on the influence of Chinese traditional culture on corporate environmental responsibility, 2023, 20, 1551-0018, 14281, 10.3934/mbe.2023639
    8. Tinghui Li, Xin Shu, Gaoke Liao, Does corporate greenwashing affect investors' decisions?, 2024, 67, 15446123, 105877, 10.1016/j.frl.2024.105877
  • Reader Comments
  • © 2022 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2500) PDF downloads(75) Cited by(5)

Figures and Tables

Figures(2)  /  Tables(6)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog