Kharatti Lal Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 1) January 2016, pp.88-93 www.ijera.com 88|P a g e Application of Fuzzy Algebra in Coding Theory Kharatti Lal Deptt .of (Applied Science) – Mathematics Govt. Millennium Polytechnic College Chamba Himachal Pradesh - 176310 ABSTRACT Fuzziness means different things depending upon the domain of application and the way it is measured. By means of fuzzy sets, vague notions can be described mathematically now a vigorous area of research with manifold applications. It should be mentioned that there are natural ways (not necessarily trivial) to fuzzily various mathematical structures such as topological spaces, algebraic structure etc. The notion of L-fuzzy sets later more generalizations were also made using various membership sets and operations. In this section we let F denote the field of integers module 2, we define a fuzzy code as a fuzzy subset of Fn where Fn = {(a1, ....an | a i  F, i = 1, ...n} and n is a fixed arbitrary positive integers we recall that Fn is a vector space over F. We give an analysis of the Hamming distance between two fuzzy code words and the error – correcting capability of a code in terms of its corresponding fuzzy codes. The results appearing in the first part of this section are from [17]. Key Words: Fuzzy code, Symmetric channel, Hankel matrices, Membership value, Semigroup, I. INTRODUCTION Now mention some other way  fuzzy abstract algebra has been applied. The paper [35] deals with the classification of knowledge when they are endowed with some fuzzy algebraic structure. By using the quotient group of symmetric knowledge as algebraic method is given in [35] to classify them also the anti fuzzy sub groups construction used to classify knowledge. In the paper [20] fuzzy points are regarded as data and fuzzy objects are constructed from the set of given data on an arbitrary group. Using the method of least square, optimal fuzzy subgroups are defined for the set of data and it is shown that one of them is obtained as f fuzzy subgroup by a set of some modified data.In [55], a decomposition of an valued set given a family of characteristic functions which can be considered as a binary block code. Conditions are given under which an arbitrary block code corresponds to L-valued fuzzy set. An explicit description of the Hamming distance, as well as of any code distance is also given all in lattice-theoretic terms. A necessary and sufficient conditions is given for a linear code to correspond to an L-valued fuzzy set. One of the most important problem in coding theory is to define code whose codeword are “far apart” from each other as possible or whose values EC is maximized. It is also desirable to decode uniquely. For example let n =3 and c = (0 0 0) (1 0 1). Then d min (C) = 2 suppose that a codeword is transmitted across the channel and (0, 0, 1) is received. Then (0, 0, 1) is of distance 1 from both the code word (0, 0, 0) and (1, 0, 1). Hence (0, 0, 1) cannot be decoded uniquely. Thus in always order to able be correct a single error we must have d min (c) at least equal to 3. If c = {[0, 0, 0)(1, 1, 1)} then (0, 0, 1) is decoded as (0, 0, 0) since it is closer to (0, 0, 0) then it is to (1, 1, 1).We now examine the fuzzy codes. For any code, c  Fn , we have see that there is a corresponding fuzzy code (c). If u  Fn is a received word and C is a core word,i.e cC then CA (u) is the probability that c was transmitted. Fuzzy sets appear to be a natural setting for the study of codes in that probability of error in the channel is included in the definition of fuzzy code. In the following we assume that p  q. Definition 1.1:  u = (u1, ....un)  Fn define the fuzzy subset Au of n F by  u = u1, ...un  Fn , n d d Au(u) P q  , where n i i i 1 d | x v |    and p and q are fixed positive real numbers such that p + q = 1 Define  n n n u:F A A | u F     by (u) = n uA u F  . Then  is a one to one functions of Fn onto n A . RESEARCH ARTICLE OPEN ACCESS
Kharatti Lal Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 1) January 2016, pp.88-93 www.ijera.com 89|P a g e Definition 1.2: If c  F n then (c) is called a fuzzy code corresponding to the code C.If cC then cA is called a fuzzy code word. We consider an example let n = z and c = {(0, 0, 0) (1, 1, 1). If (0, 0, 0) is transmitted and (0, 1, 0) is received, then assuming q < ½ there is a greater likelihood that (0, 0, 0,) was transmitted then (1, 1, 1) since we are assuming burst errors do not occur. Let u Fn and un  Fn then n i i i 1 | u u |   is the number of coordinates position in which u and u differ. The number of errors required to transform u into U equal this number. We let d(u, v) denote n i i i 1 | u u | d(u,v)   is called the Hamming distance of uv. Definition 1.3: Let C  Fn be a code the minimum distance c is defined to be  mind (c) d(a,b)|(a,b) c,a b    . If C is a subspace of Fn then dmin(c)  d(a,0)|a c,a 0    0 = (0, ...., 0) now d(a0, 0) is the number of non zero entries in a and is called the weight of a and often is denoted by | a | when a code C is a subspace of Fn , we called it a linear code. Let [[ ]] denote the greater integer function on the real numbers for any code c  Fn E c = [[d min (C)  1)/2]] in the maximum number of errors allowed in the channel for each n bits transmitted for which received signals may be correctly decoded Definition 1.4: Let  Fn be a code. Define Q:Fn { A/ A  is a fuzzy subset of Fn } by  u  Fn , Q (u) = { cA | c  C, cA (u) (u)  bA (u)  b  C} A code for which | (u) | = 1  u  Fn is uniquely decodable. In such a case u is decoded as 1 ((u)). An important criteria for designing good code is s spasing the code words as far apart from each other as possible, the Hamming distance is the metric used in Fn to measure distance. Analogously the generalized Hamming distance between fuzzy subsets may be used as a metric in n A . It is defined by  uA . uA  n A , n u u u u w F d(A ,A ) | A (w) A (w) |      . The theorem which follows show that u ud(A ,A )  is independent of n. Let u, v  Fn be such that d(u, x) = d), if P  q and p  0, then u u d d(A ,A )    , where d i d i d i i d i 0 d | p q P q i             , Theorem 2.1: Let C1 and C2 be two codes used in the same channel. If p  q and p  0, 1 then 1 2C CE E if and only if d min ((c1)) = d min ((c2)) d min = ((C1)) = d min((C2)). Proof: Let d i = d min ((c1)) for i = 1, 2. If 1 2C CE E , then either d1 = d2 in which case the desired result holds or d2 = d1 + 1, where d1 is a an odd positive integer. From Lemma we have if p  q and P  0, 1 then 1 2 2 3 4 5 .....           min 1 min 2d ( (c )) d ( (c ))   , then it follows from lemma.
Kharatti Lal Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 1) January 2016, pp.88-93 www.ijera.com 90|P a g e Conversely if min 1 min 2d ( (c )) d ( (c ))   , either d1 = d2 and so 1 2C CE E or d1 = d2  1 where d1  d2 is odd and so 1 2C CE E .Let M be a subset of . Let n C F be a code suppose c  C is transmitted across the channel and that u  Fn is received. The signal that are transmitted are usually distorted by varying degrees. Let M be a subset of R. Let C  F n be a code. Suppose cC is transmitted across the channel and that uFn is received. The signal that are transmitted are usually destroyed by varying degrees. The electrical receiver may record the signals is one of the two ways. The electrical waves received representing the word 4 Rs. measured bit by bit as real numbers. The signals then are either recorded as n types over M or each bit of u is transformed into an element of F. u is then coded in Fm for some positive integer’s m. For example suppose that (1, 0, 1) is encoded as C = (1, 0, 1, 0) and transmitted electronically across the channel. Supposed the received waves are measured as u = (1, 02, 0.52, 0.98, 0.02) and recorded as U = (1, 1, 1, 0), Then some information is lost in recording u as u – Some possible directories for further study to overcome this loss and suggested in [15]. For example let x F n and define the fuzzy subset xA of M n by  y M n xA (y) = p(x, y) where P(x, y) is the probability that if x is coded and transmitted across the channel, y is received. Then soft decoding may be studied via { xA /xFm }We have assumed that error in the transmitted of words across a noisy channel were symmetric in nature i.e., the probability of 1  0 and 0  1 cross over failures were equally likely. However error in VSLI circuit and many computer memories are on a undirectional nature [8] A undirectional error model assumes that both 1  0  1 cross overs can occur, but only are type of error occurs in a particular data word. This has provided the basis for a new direction in coding theory and fault tolerance computing. Also the failure of the memory cells of some of the LSI transistor cell memories and NMOS memories are most likely caused by leakage of charge. If we represent the presence of charge in a cell by 1 and the absence of charge by 0, then the errors in those type of memories can be modeled as 1  0 type symmetric errors, [8].The result in the remainder of this section are from [15]. Once again F denotes the field of integers module 2 and Fn the vector space of n-tuples over F, we let p denotes the transmitted 1 will be received as a1 and a transmitted 0 will be received as a 0, Let q = 1p. Then q is the probability that there is an error in transmission in an arbitrary bit Definition  (1.5): Let u = u1, ... , un Fn . Define the fuzzy subset A(u) of Fn as follows:  u  u = (u1, ..., un)  Fn 1 2 u m d d 0 if K K 0 A (U) P q otherwise       Where, K1 = n n i i 2 i i i 1 i 1 OV(u v ), K OV(u v )       1 2 2 1 K if K 0 d K if K 0     n i 2 i 1 n i 1 i 1 n n i i 1 2 i 1 i 1 u if K 0 m n u if K 0 u V n u if K K 0                                By this definition uA (u) is zero if both one and zero transitions have occurred. It allows either by themselves, to occur in a given received word. In the case that a received word is the same as that transmitted, one may choose either the one’s or the zero’s as possible toggling. In our definitions, we choose which ever there are more of for example: if there are more one’s, the definition would expect 1  0 transitions only.
Kharatti Lal Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 1) January 2016, pp.88-93 www.ijera.com 91|P a g e Hence in equal to the numbers of is and d = 0. In any event we only allow m one to take the value of the number of bits which can transition in calculating our membership functions. The bits that cannot change are not considered in the function. In the following definition .We define a fuzzy word for an asymmetric error model in which only errors may occour. Example 3.1: Let n = 2 let u = (0, 0) and d ( A u, A u) = | p2 q0  p0 q2 | + | p1 q1  p1 q1 | + | p1 q1  p1 q1 | + | p0 q2  p2 q0 | = 2 (p  q) and dH(u, u) = 2. Now let n = 3, w = (1, 1, 1) and x = (0, 0, 1) in F3 then d( A u, A u) = | p0 q3  p0 q1 | + |p1 q2  p2 q0 | + |p1 q2  0| + |p2 q1  p1 q1 | + | p1 q2  0 | + | p2 q1  p1 q1 | + | p3 q0  p0 q2 | = q  q2  q3 + p3 + p2 + 2pq + pq2  p2 q  2(p q) and DH (u, v) = 2. We some Hamming distance between u, U, w and x respectively but different distance between the corresponding fuzzy code word. We now state a result which says that the distance between fuzzy code word is independent of n for ideal symmetric error. The result holds when the Hamming distance or the as symmetric distance is used as the distance metric between two code words. Lemma 4.1: 1 2 n..... 1      . As the asymmetric between code words on which fuzzy codes will be based become large, there is only a small increase in the measurable distance between codewords. For unidirectional errors, the case is that the space of the code will effect the distance between the fuzzy code words. These issues must be taken into account in designing fuzzy codes. Lemma4.2:1 < 2 < ... n > 2. Proof: If instead of using the Hamming distance between two fuzzy codes, we used the asymmetric distance, so that    n n a u u u u v u w F w F D (A ,A ) A (w) A (w) V A (w) A (w) V                  Then the following theorem holds. Corollary 5.1: A fuzzy column vectors h1  An is independent of a set of fuzzy column vectors 1 nh ,....,h  . If S(i) =  for any i  {1, ....,m}. Proof: We give the algorithm for checking if a non-null column xk in the Sub semimodule F is linearly dependent on a set of fuzzy vectors at the end of this section. In a set of the column vectors ig , i = 1, ...n, is given a complete set of independent fuzzy vectors if , i = 1, ....i, can be selected such that subsemimodule generated by i m{f ,....,f }  contains the ig s the procedure is shown in the form of the flow chart. We now consider a positive sample set R+ = 0.8ab, 0.8aa, bb, 0.3ab, 0.2bc, 0.99bbc. The finite submatrix of the fuzzy Hankel matrix H(r) is shown. Using the algorithm DEPENDENCE the independent columns of the fuzzy Hankel matrix have been indicated as F1, F2, F5, F6, F7. The finite submatrix of the fuzzy Hankel matrix H(r)2 . 1 2 3 4 5 6 7 1 2 3 4 5 6 7 S S S S S S S S 0 0 0 0 0 0 0 S 0 0 .03 0 1 0 .08 S 0 0 0 0 0 0 0 (a) S 0 0 0 0 0 0 0 S 0 0 0 0 0 .08 0 S 0 0 0 0 0 0 0 S 0 0 0 0 0 0 0                       
Kharatti Lal Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 1) January 2016, pp.88-93 www.ijera.com 92|P a g e 1 2 3 4 5 6 7 1 2 3 4 5 6 7 S S S S S S S S 0 0 0 0 0 0 0 S 0 0 0 0 0 0 0 S 0 0 0 1 0 0 0 (b) S 0 0 0 0 0 0 0 S 0 0 1 0 0 0 0 S 0 0 0 0 0 0 1 S 1 0 0 0 0 0 0                        1 2 3 4 5 6 7 1 2 3 4 5 6 7 S S S S S S S S 0 0 0 0 0 0 0 S 0 0 0 0 0 0 0 S 0 0 0 0 0 0 0 (c) S 1 0 0 0 0 0 0 S 0 0 0 0 0 0 0 S 0 0 0 0 0 0 0 S 0 0 0 0 0 0 0                        ab a abc bc c abbc bbc aabb abb bb 0 .8 0 .3 .2 0 .9 0 .8 0 0 a 0 0 .8 0 .3 0 0 .9 0 .8 0 ab .8 0 0 0 .9 .3 0 0 0 0 0 abc .3 0 0 0 0 0 0 0 0 0 0 bc .2 0 0 0 0 0 0 0 0 0 0 (c) abb 0 0 0 0 0 .9 0 0 0 0 0 abbc .9 0 0 0 0 0 0 0 0 0 0 aa 0 0 0 0 0 0 0 0 0 aab aabb     1 7 3 4 2 5 6 0 0 0 0 .8 0 0 0 0 0 0 0 0 .8 0 0 0 0 0 0 0 0 0 0 F F F F F F F                                The algorithm depends also identifies column if any column vector h(j) is dependent on the set of generator H  (m) = 1 m ˆ ˆH (m) {f ,....,f }  of the Hankel matrix as constructed intable. It also identifies the coefficient Si, using the procedure ARRANGE CS(i), N, CARD(i) and the procedure COMPARESO(k), SO(K  1).
Kharatti Lal Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 1) January 2016, pp.88-93 www.ijera.com 93|P a g e Definition 1.6: A code C over the alphabet A is called a prefix (suffix) code if it satisfies CA+ C =  (A+ C  C = ). C is called a biprefix code of it is a prefix and a suffix code. A submonoid M of any monoid N. Satisfying of proposition CA+  C =  is called the left unitary in N. M is called right unitary in N if it is satisfies the dual of  x  A , Mw  M   implies w  M namely A+ C  C = . Let M be a submonoid of a free monoid A and c its base then the following conditions are equivalent: (i)  w  A , Mw  M   implies w  M (ii) CA+  C =  Proposition 6.1: Let A be a free monoid and C be a subset of A . Define the subset Di of A recursively by D0 = C and Di = {w  A | Di1w  c  0 or Cw  Di1  }, i = 1, 2, ..... Then c is a code over A if and only if C  Di =  for i = 1,2, .... Suppose e is a finite then the length of the word in C. Hence there is only a finite number of distinct Di and this proposition gives an algorithm for deciding whether or c is a code. II. CONCLUSION The search for suitable codes for communication theory is known. It was proposed by Garla-that-L-semi- group theory be used. To this end free, pure, very pure, left unitary, right unitary, unitary such L- submsemigroup there is a family of codes associated with it. An L-subsemigroup of a free semigroup if free,one are, pure, very pure, left unitary right unitary respectively. Thus any method used to construct an L- =subsemigroup of a free semigroup of one of these types yields a family of semigroups of the same types. Namely the level sets of the L-subsemigroup. The basic idea is that the class of non-fuzzy system, that are approximately equivalent to a given type of system from the point of view of their behaviours is a fuzzy class of systems.For instances the class of system that are approximately linear. This idea of fuzzy classification of system was first hinted at by Zadeh 1965. Saridis 1975 applied it to the classification of nonlinear systems according to their nonlinearies, pattern recognition methods are first used to build crisp classes. Generally, this approach does not answer the question of complete identification of the nonlinearlies involved within one class. To distinguish between the nonlinearlies belonging to a single class, membership value in this class are defined for each nonlinearly one of thee considered as a references with a membership value 1.The membership value of each nonlinearity is calculated by comparing the coefficients of its polynomial series expansion to that of the reference nonlinearlity. REFERENCES [1.] Mordeson J.N. ʽʽFuzzy algebraic varieties II advance in fuzzy theory and technologyʼʼ Vol. 1: 9-21 edited by Paul Wang 1994. [2.] Mordeson J.NB. ʽʽ L-subspace and L-subfield lecture notes in fuzzy mathematics’ʼ and computer science. Creighton University Vol.2,1996. [3.] Rosenfeld SA, Fuzzy group J Math Anal. Appl. 35: 512-517, 1971. [4.] Mordeson J. and Alkhamess Y. ʽʽFuzzy localized subrings inform Sciʼʼ. 99: 183-193, 1997. [5.] Bourbaki,ʽʽ Elements of mathematics’ commutative algebra ʼʼ, Springer Verlag, New York, 1989. [6.] Klir G.J. and Floger, T.A.ʽʽ Fuzzy Sets and Uncertainty and Informationʼʼ. Prentice Hall Englewood Cliffs. N.J. 1988. [7.] Zadeh-L.A., ʽʽSimilarity relations and fuzzy ordering informations.ʼʼ Sci. 3: 177-200, 1971. [8.] Goden J.S.ʽʽThe fuzzy of semirings with application in mathematics and theortical computer scienceʼʼ, Pitam monographs and surveys in pure and applied mathematics 54,longman Scientific and technical John Wiley and sons Inc. New York, 1992.

Application of Fuzzy Algebra in Coding Theory

  • 1.
    Kharatti Lal Int.Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 1) January 2016, pp.88-93 www.ijera.com 88|P a g e Application of Fuzzy Algebra in Coding Theory Kharatti Lal Deptt .of (Applied Science) – Mathematics Govt. Millennium Polytechnic College Chamba Himachal Pradesh - 176310 ABSTRACT Fuzziness means different things depending upon the domain of application and the way it is measured. By means of fuzzy sets, vague notions can be described mathematically now a vigorous area of research with manifold applications. It should be mentioned that there are natural ways (not necessarily trivial) to fuzzily various mathematical structures such as topological spaces, algebraic structure etc. The notion of L-fuzzy sets later more generalizations were also made using various membership sets and operations. In this section we let F denote the field of integers module 2, we define a fuzzy code as a fuzzy subset of Fn where Fn = {(a1, ....an | a i  F, i = 1, ...n} and n is a fixed arbitrary positive integers we recall that Fn is a vector space over F. We give an analysis of the Hamming distance between two fuzzy code words and the error – correcting capability of a code in terms of its corresponding fuzzy codes. The results appearing in the first part of this section are from [17]. Key Words: Fuzzy code, Symmetric channel, Hankel matrices, Membership value, Semigroup, I. INTRODUCTION Now mention some other way  fuzzy abstract algebra has been applied. The paper [35] deals with the classification of knowledge when they are endowed with some fuzzy algebraic structure. By using the quotient group of symmetric knowledge as algebraic method is given in [35] to classify them also the anti fuzzy sub groups construction used to classify knowledge. In the paper [20] fuzzy points are regarded as data and fuzzy objects are constructed from the set of given data on an arbitrary group. Using the method of least square, optimal fuzzy subgroups are defined for the set of data and it is shown that one of them is obtained as f fuzzy subgroup by a set of some modified data.In [55], a decomposition of an valued set given a family of characteristic functions which can be considered as a binary block code. Conditions are given under which an arbitrary block code corresponds to L-valued fuzzy set. An explicit description of the Hamming distance, as well as of any code distance is also given all in lattice-theoretic terms. A necessary and sufficient conditions is given for a linear code to correspond to an L-valued fuzzy set. One of the most important problem in coding theory is to define code whose codeword are “far apart” from each other as possible or whose values EC is maximized. It is also desirable to decode uniquely. For example let n =3 and c = (0 0 0) (1 0 1). Then d min (C) = 2 suppose that a codeword is transmitted across the channel and (0, 0, 1) is received. Then (0, 0, 1) is of distance 1 from both the code word (0, 0, 0) and (1, 0, 1). Hence (0, 0, 1) cannot be decoded uniquely. Thus in always order to able be correct a single error we must have d min (c) at least equal to 3. If c = {[0, 0, 0)(1, 1, 1)} then (0, 0, 1) is decoded as (0, 0, 0) since it is closer to (0, 0, 0) then it is to (1, 1, 1).We now examine the fuzzy codes. For any code, c  Fn , we have see that there is a corresponding fuzzy code (c). If u  Fn is a received word and C is a core word,i.e cC then CA (u) is the probability that c was transmitted. Fuzzy sets appear to be a natural setting for the study of codes in that probability of error in the channel is included in the definition of fuzzy code. In the following we assume that p  q. Definition 1.1:  u = (u1, ....un)  Fn define the fuzzy subset Au of n F by  u = u1, ...un  Fn , n d d Au(u) P q  , where n i i i 1 d | x v |    and p and q are fixed positive real numbers such that p + q = 1 Define  n n n u:F A A | u F     by (u) = n uA u F  . Then  is a one to one functions of Fn onto n A . RESEARCH ARTICLE OPEN ACCESS
  • 2.
    Kharatti Lal Int.Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 1) January 2016, pp.88-93 www.ijera.com 89|P a g e Definition 1.2: If c  F n then (c) is called a fuzzy code corresponding to the code C.If cC then cA is called a fuzzy code word. We consider an example let n = z and c = {(0, 0, 0) (1, 1, 1). If (0, 0, 0) is transmitted and (0, 1, 0) is received, then assuming q < ½ there is a greater likelihood that (0, 0, 0,) was transmitted then (1, 1, 1) since we are assuming burst errors do not occur. Let u Fn and un  Fn then n i i i 1 | u u |   is the number of coordinates position in which u and u differ. The number of errors required to transform u into U equal this number. We let d(u, v) denote n i i i 1 | u u | d(u,v)   is called the Hamming distance of uv. Definition 1.3: Let C  Fn be a code the minimum distance c is defined to be  mind (c) d(a,b)|(a,b) c,a b    . If C is a subspace of Fn then dmin(c)  d(a,0)|a c,a 0    0 = (0, ...., 0) now d(a0, 0) is the number of non zero entries in a and is called the weight of a and often is denoted by | a | when a code C is a subspace of Fn , we called it a linear code. Let [[ ]] denote the greater integer function on the real numbers for any code c  Fn E c = [[d min (C)  1)/2]] in the maximum number of errors allowed in the channel for each n bits transmitted for which received signals may be correctly decoded Definition 1.4: Let  Fn be a code. Define Q:Fn { A/ A  is a fuzzy subset of Fn } by  u  Fn , Q (u) = { cA | c  C, cA (u) (u)  bA (u)  b  C} A code for which | (u) | = 1  u  Fn is uniquely decodable. In such a case u is decoded as 1 ((u)). An important criteria for designing good code is s spasing the code words as far apart from each other as possible, the Hamming distance is the metric used in Fn to measure distance. Analogously the generalized Hamming distance between fuzzy subsets may be used as a metric in n A . It is defined by  uA . uA  n A , n u u u u w F d(A ,A ) | A (w) A (w) |      . The theorem which follows show that u ud(A ,A )  is independent of n. Let u, v  Fn be such that d(u, x) = d), if P  q and p  0, then u u d d(A ,A )    , where d i d i d i i d i 0 d | p q P q i             , Theorem 2.1: Let C1 and C2 be two codes used in the same channel. If p  q and p  0, 1 then 1 2C CE E if and only if d min ((c1)) = d min ((c2)) d min = ((C1)) = d min((C2)). Proof: Let d i = d min ((c1)) for i = 1, 2. If 1 2C CE E , then either d1 = d2 in which case the desired result holds or d2 = d1 + 1, where d1 is a an odd positive integer. From Lemma we have if p  q and P  0, 1 then 1 2 2 3 4 5 .....           min 1 min 2d ( (c )) d ( (c ))   , then it follows from lemma.
  • 3.
    Kharatti Lal Int.Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 1) January 2016, pp.88-93 www.ijera.com 90|P a g e Conversely if min 1 min 2d ( (c )) d ( (c ))   , either d1 = d2 and so 1 2C CE E or d1 = d2  1 where d1  d2 is odd and so 1 2C CE E .Let M be a subset of . Let n C F be a code suppose c  C is transmitted across the channel and that u  Fn is received. The signal that are transmitted are usually distorted by varying degrees. Let M be a subset of R. Let C  F n be a code. Suppose cC is transmitted across the channel and that uFn is received. The signal that are transmitted are usually destroyed by varying degrees. The electrical receiver may record the signals is one of the two ways. The electrical waves received representing the word 4 Rs. measured bit by bit as real numbers. The signals then are either recorded as n types over M or each bit of u is transformed into an element of F. u is then coded in Fm for some positive integer’s m. For example suppose that (1, 0, 1) is encoded as C = (1, 0, 1, 0) and transmitted electronically across the channel. Supposed the received waves are measured as u = (1, 02, 0.52, 0.98, 0.02) and recorded as U = (1, 1, 1, 0), Then some information is lost in recording u as u – Some possible directories for further study to overcome this loss and suggested in [15]. For example let x F n and define the fuzzy subset xA of M n by  y M n xA (y) = p(x, y) where P(x, y) is the probability that if x is coded and transmitted across the channel, y is received. Then soft decoding may be studied via { xA /xFm }We have assumed that error in the transmitted of words across a noisy channel were symmetric in nature i.e., the probability of 1  0 and 0  1 cross over failures were equally likely. However error in VSLI circuit and many computer memories are on a undirectional nature [8] A undirectional error model assumes that both 1  0  1 cross overs can occur, but only are type of error occurs in a particular data word. This has provided the basis for a new direction in coding theory and fault tolerance computing. Also the failure of the memory cells of some of the LSI transistor cell memories and NMOS memories are most likely caused by leakage of charge. If we represent the presence of charge in a cell by 1 and the absence of charge by 0, then the errors in those type of memories can be modeled as 1  0 type symmetric errors, [8].The result in the remainder of this section are from [15]. Once again F denotes the field of integers module 2 and Fn the vector space of n-tuples over F, we let p denotes the transmitted 1 will be received as a1 and a transmitted 0 will be received as a 0, Let q = 1p. Then q is the probability that there is an error in transmission in an arbitrary bit Definition  (1.5): Let u = u1, ... , un Fn . Define the fuzzy subset A(u) of Fn as follows:  u  u = (u1, ..., un)  Fn 1 2 u m d d 0 if K K 0 A (U) P q otherwise       Where, K1 = n n i i 2 i i i 1 i 1 OV(u v ), K OV(u v )       1 2 2 1 K if K 0 d K if K 0     n i 2 i 1 n i 1 i 1 n n i i 1 2 i 1 i 1 u if K 0 m n u if K 0 u V n u if K K 0                                By this definition uA (u) is zero if both one and zero transitions have occurred. It allows either by themselves, to occur in a given received word. In the case that a received word is the same as that transmitted, one may choose either the one’s or the zero’s as possible toggling. In our definitions, we choose which ever there are more of for example: if there are more one’s, the definition would expect 1  0 transitions only.
  • 4.
    Kharatti Lal Int.Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 1) January 2016, pp.88-93 www.ijera.com 91|P a g e Hence in equal to the numbers of is and d = 0. In any event we only allow m one to take the value of the number of bits which can transition in calculating our membership functions. The bits that cannot change are not considered in the function. In the following definition .We define a fuzzy word for an asymmetric error model in which only errors may occour. Example 3.1: Let n = 2 let u = (0, 0) and d ( A u, A u) = | p2 q0  p0 q2 | + | p1 q1  p1 q1 | + | p1 q1  p1 q1 | + | p0 q2  p2 q0 | = 2 (p  q) and dH(u, u) = 2. Now let n = 3, w = (1, 1, 1) and x = (0, 0, 1) in F3 then d( A u, A u) = | p0 q3  p0 q1 | + |p1 q2  p2 q0 | + |p1 q2  0| + |p2 q1  p1 q1 | + | p1 q2  0 | + | p2 q1  p1 q1 | + | p3 q0  p0 q2 | = q  q2  q3 + p3 + p2 + 2pq + pq2  p2 q  2(p q) and DH (u, v) = 2. We some Hamming distance between u, U, w and x respectively but different distance between the corresponding fuzzy code word. We now state a result which says that the distance between fuzzy code word is independent of n for ideal symmetric error. The result holds when the Hamming distance or the as symmetric distance is used as the distance metric between two code words. Lemma 4.1: 1 2 n..... 1      . As the asymmetric between code words on which fuzzy codes will be based become large, there is only a small increase in the measurable distance between codewords. For unidirectional errors, the case is that the space of the code will effect the distance between the fuzzy code words. These issues must be taken into account in designing fuzzy codes. Lemma4.2:1 < 2 < ... n > 2. Proof: If instead of using the Hamming distance between two fuzzy codes, we used the asymmetric distance, so that    n n a u u u u v u w F w F D (A ,A ) A (w) A (w) V A (w) A (w) V                  Then the following theorem holds. Corollary 5.1: A fuzzy column vectors h1  An is independent of a set of fuzzy column vectors 1 nh ,....,h  . If S(i) =  for any i  {1, ....,m}. Proof: We give the algorithm for checking if a non-null column xk in the Sub semimodule F is linearly dependent on a set of fuzzy vectors at the end of this section. In a set of the column vectors ig , i = 1, ...n, is given a complete set of independent fuzzy vectors if , i = 1, ....i, can be selected such that subsemimodule generated by i m{f ,....,f }  contains the ig s the procedure is shown in the form of the flow chart. We now consider a positive sample set R+ = 0.8ab, 0.8aa, bb, 0.3ab, 0.2bc, 0.99bbc. The finite submatrix of the fuzzy Hankel matrix H(r) is shown. Using the algorithm DEPENDENCE the independent columns of the fuzzy Hankel matrix have been indicated as F1, F2, F5, F6, F7. The finite submatrix of the fuzzy Hankel matrix H(r)2 . 1 2 3 4 5 6 7 1 2 3 4 5 6 7 S S S S S S S S 0 0 0 0 0 0 0 S 0 0 .03 0 1 0 .08 S 0 0 0 0 0 0 0 (a) S 0 0 0 0 0 0 0 S 0 0 0 0 0 .08 0 S 0 0 0 0 0 0 0 S 0 0 0 0 0 0 0                       
  • 5.
    Kharatti Lal Int.Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 1) January 2016, pp.88-93 www.ijera.com 92|P a g e 1 2 3 4 5 6 7 1 2 3 4 5 6 7 S S S S S S S S 0 0 0 0 0 0 0 S 0 0 0 0 0 0 0 S 0 0 0 1 0 0 0 (b) S 0 0 0 0 0 0 0 S 0 0 1 0 0 0 0 S 0 0 0 0 0 0 1 S 1 0 0 0 0 0 0                        1 2 3 4 5 6 7 1 2 3 4 5 6 7 S S S S S S S S 0 0 0 0 0 0 0 S 0 0 0 0 0 0 0 S 0 0 0 0 0 0 0 (c) S 1 0 0 0 0 0 0 S 0 0 0 0 0 0 0 S 0 0 0 0 0 0 0 S 0 0 0 0 0 0 0                        ab a abc bc c abbc bbc aabb abb bb 0 .8 0 .3 .2 0 .9 0 .8 0 0 a 0 0 .8 0 .3 0 0 .9 0 .8 0 ab .8 0 0 0 .9 .3 0 0 0 0 0 abc .3 0 0 0 0 0 0 0 0 0 0 bc .2 0 0 0 0 0 0 0 0 0 0 (c) abb 0 0 0 0 0 .9 0 0 0 0 0 abbc .9 0 0 0 0 0 0 0 0 0 0 aa 0 0 0 0 0 0 0 0 0 aab aabb     1 7 3 4 2 5 6 0 0 0 0 .8 0 0 0 0 0 0 0 0 .8 0 0 0 0 0 0 0 0 0 0 F F F F F F F                                The algorithm depends also identifies column if any column vector h(j) is dependent on the set of generator H  (m) = 1 m ˆ ˆH (m) {f ,....,f }  of the Hankel matrix as constructed intable. It also identifies the coefficient Si, using the procedure ARRANGE CS(i), N, CARD(i) and the procedure COMPARESO(k), SO(K  1).
  • 6.
    Kharatti Lal Int.Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 1) January 2016, pp.88-93 www.ijera.com 93|P a g e Definition 1.6: A code C over the alphabet A is called a prefix (suffix) code if it satisfies CA+ C =  (A+ C  C = ). C is called a biprefix code of it is a prefix and a suffix code. A submonoid M of any monoid N. Satisfying of proposition CA+  C =  is called the left unitary in N. M is called right unitary in N if it is satisfies the dual of  x  A , Mw  M   implies w  M namely A+ C  C = . Let M be a submonoid of a free monoid A and c its base then the following conditions are equivalent: (i)  w  A , Mw  M   implies w  M (ii) CA+  C =  Proposition 6.1: Let A be a free monoid and C be a subset of A . Define the subset Di of A recursively by D0 = C and Di = {w  A | Di1w  c  0 or Cw  Di1  }, i = 1, 2, ..... Then c is a code over A if and only if C  Di =  for i = 1,2, .... Suppose e is a finite then the length of the word in C. Hence there is only a finite number of distinct Di and this proposition gives an algorithm for deciding whether or c is a code. II. CONCLUSION The search for suitable codes for communication theory is known. It was proposed by Garla-that-L-semi- group theory be used. To this end free, pure, very pure, left unitary, right unitary, unitary such L- submsemigroup there is a family of codes associated with it. An L-subsemigroup of a free semigroup if free,one are, pure, very pure, left unitary right unitary respectively. Thus any method used to construct an L- =subsemigroup of a free semigroup of one of these types yields a family of semigroups of the same types. Namely the level sets of the L-subsemigroup. The basic idea is that the class of non-fuzzy system, that are approximately equivalent to a given type of system from the point of view of their behaviours is a fuzzy class of systems.For instances the class of system that are approximately linear. This idea of fuzzy classification of system was first hinted at by Zadeh 1965. Saridis 1975 applied it to the classification of nonlinear systems according to their nonlinearies, pattern recognition methods are first used to build crisp classes. Generally, this approach does not answer the question of complete identification of the nonlinearlies involved within one class. To distinguish between the nonlinearlies belonging to a single class, membership value in this class are defined for each nonlinearly one of thee considered as a references with a membership value 1.The membership value of each nonlinearity is calculated by comparing the coefficients of its polynomial series expansion to that of the reference nonlinearlity. REFERENCES [1.] Mordeson J.N. ʽʽFuzzy algebraic varieties II advance in fuzzy theory and technologyʼʼ Vol. 1: 9-21 edited by Paul Wang 1994. [2.] Mordeson J.NB. ʽʽ L-subspace and L-subfield lecture notes in fuzzy mathematics’ʼ and computer science. Creighton University Vol.2,1996. [3.] Rosenfeld SA, Fuzzy group J Math Anal. Appl. 35: 512-517, 1971. [4.] Mordeson J. and Alkhamess Y. ʽʽFuzzy localized subrings inform Sciʼʼ. 99: 183-193, 1997. [5.] Bourbaki,ʽʽ Elements of mathematics’ commutative algebra ʼʼ, Springer Verlag, New York, 1989. [6.] Klir G.J. and Floger, T.A.ʽʽ Fuzzy Sets and Uncertainty and Informationʼʼ. Prentice Hall Englewood Cliffs. N.J. 1988. [7.] Zadeh-L.A., ʽʽSimilarity relations and fuzzy ordering informations.ʼʼ Sci. 3: 177-200, 1971. [8.] Goden J.S.ʽʽThe fuzzy of semirings with application in mathematics and theortical computer scienceʼʼ, Pitam monographs and surveys in pure and applied mathematics 54,longman Scientific and technical John Wiley and sons Inc. New York, 1992.