首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 133 毫秒
1.
In this work, we investigate linear codes over the ring ${\mathbb{F}_2+u\mathbb{F}_2+v\mathbb{F}_2+uv\mathbb{F}_2}$ . We first analyze the structure of the ring and then define linear codes over this ring which turns out to be a ring that is not finite chain or principal ideal contrary to the rings that have hitherto been studied in coding theory. Lee weights and Gray maps for these codes are defined by extending on those introduced in works such as Betsumiya et al. (Discret Math 275:43–65, 2004) and Dougherty et al. (IEEE Trans Inf 45:32–45, 1999). We then characterize the ${\mathbb{F}_2+u\mathbb{F}_2+v\mathbb{F}_2+uv\mathbb{F}_2}$ -linearity of binary codes under the Gray map and give a main class of binary codes as an example of ${\mathbb{F}_2+u\mathbb{F}_2+v\mathbb{F}_2+uv\mathbb{F}_2}$ -linear codes. The duals and the complete weight enumerators for ${\mathbb{F}_2+u\mathbb{F}_2+v\mathbb{F}_2+uv\mathbb{F}_2}$ -linear codes are also defined after which MacWilliams-like identities for complete and Lee weight enumerators as well as for the ideal decompositions of linear codes over ${\mathbb{F}_2+u\mathbb{F}_2+v\mathbb{F}_2+uv\mathbb{F}_2}$ are obtained.  相似文献   

2.
A code C{{\mathcal C}} is \mathbbZ2\mathbbZ4{{\mathbb{Z}_2\mathbb{Z}_4}}-additive if the set of coordinates can be partitioned into two subsets X and Y such that the punctured code of C{{\mathcal C}} by deleting the coordinates outside X (respectively, Y) is a binary linear code (respectively, a quaternary linear code). The corresponding binary codes of \mathbbZ2\mathbbZ4{{\mathbb{Z}_2\mathbb{Z}_4}}-additive codes under an extended Gray map are called \mathbbZ2\mathbbZ4{{\mathbb{Z}_2\mathbb{Z}_4}}-linear codes. In this paper, the invariants for \mathbbZ2\mathbbZ4{{\mathbb{Z}_2\mathbb{Z}_4}}-linear codes, the rank and dimension of the kernel, are studied. Specifically, given the algebraic parameters of \mathbbZ2\mathbbZ4{{\mathbb{Z}_2\mathbb{Z}_4}}-linear codes, the possible values of these two invariants, giving lower and upper bounds, are established. For each possible rank r between these bounds, the construction of a \mathbbZ2\mathbbZ4{{\mathbb{Z}_2\mathbb{Z}_4}}-linear code with rank r is given. Equivalently, for each possible dimension of the kernel k, the construction of a \mathbbZ2\mathbbZ4{{\mathbb{Z}_2\mathbb{Z}_4}}-linear code with dimension of the kernel k is given. Finally, the bounds on the rank, once the kernel dimension is fixed, are established and the construction of a \mathbbZ2\mathbbZ4{{\mathbb{Z}_2\mathbb{Z}_4}}-linear code for each possible pair (r, k) is given.  相似文献   

3.
We study the structure of cyclic DNA codes of odd length over the finite commutative ring \(R=\mathbb {F}_2+u\mathbb {F}_2+v\mathbb {F}_2+uv\mathbb {F}_2 + v^2\mathbb {F}_2+uv^2\mathbb {F}_2,~u^2=0, v^3=v\), which plays an important role in genetics, bioengineering and DNA computing. A direct link between the elements of the ring R and 64 codons used in the amino acids of living organisms is established by introducing a Gray map from R to \(R_1=\mathbb {F}_2+u\mathbb {F}_2 ~(u^2=0)\). The reversible and the reversible-complement codes over R are investigated. We also discuss the binary image of the cyclic DNA codes over R. Among others, some examples of DNA codes obtained via Gray map are provided.  相似文献   

4.
In an earlier paper the authors studied simplex codes of type α and β over and obtained some known binary linear and nonlinear codes as Gray images of these codes. In this correspondence, we study weight distributions of simplex codes of type α and β over The generalized Gray map is then used to construct binary codes. The linear codes meet the Griesmer bound and a few non-linear codes are obtained that meet the Plotkin/Johnson bound. We also give the weight hierarchies of the first order Reed-Muller codes over The above codes are also shown to satisfy the chain condition.A part of this paper is contained in his Ph.D. Thesis from IIT Kanpur, India  相似文献   

5.
A contact-stationary Legendrian submanifold of is a Legendrian submanifold whose volume is stationary under contact deformations. The simplest contact-stationary Legendrian submanifold (actually minimal Legendrian) is the real, equatorial n-sphere S 0. This paper develops a method for constructing contact-stationary (but not minimal) Legendrian submanifolds of by gluing together configurations of sufficiently many many U(n + 1)-rotated copies of S 0. Two examples of the construction, corresponding to finite cyclic subgroups of U(n + 1) are given. The resulting submanifolds are very symmetric; are geometrically akin to a ‘necklace’ of copies of S 0 attached to each other by narrow necks and winding a large number of times around before closing up on themselves; and are topologically equivalent to .  相似文献   

6.
Let \(\mathcal{C}\) be a \({\mathbb {Z}}_2{\mathbb {Z}}_4\)-additive code of length \(n > 3\). We prove that if the binary Gray image of \(\mathcal{C}\) is a 1-perfect nonlinear code, then \(\mathcal{C}\) cannot be a \({\mathbb {Z}}_2{\mathbb {Z}}_4\)-cyclic code except for one case of length \(n=15\). Moreover, we give a parity check matrix for this cyclic code. Adding an even parity check coordinate to a \({\mathbb {Z}}_2{\mathbb {Z}}_4\)-additive 1-perfect code gives a \({\mathbb {Z}}_2{\mathbb {Z}}_4\)-additive extended 1-perfect code. We also prove that such a code cannot be \({\mathbb {Z}}_2{\mathbb {Z}}_4\)-cyclic.  相似文献   

7.
Let Γ6 be the elliptic curve of degree 6 in PG(5, q) arising from a non-singular cubic curve of PG(2, q) via the canonical Veronese embedding
(1) If Γ6 (equivalently ) has n GF(q)-rational points, then the associated near-MDS code has length n and dimension 6. In this paper, the case q  =  5 is investigated. For q  =  5, the maximum number of GF(q)-rational points of an elliptic curve is known to be equal to ten. We show that for an elliptic curve with ten GF(5)-rational points, the associated near-MDS code can be extended by adding two more points of PG(5, 5). In this way we obtain six non-isomorphic [12, 6]5 codes. The automorphism group of is also considered.   相似文献   

8.
The purpose of this paper is to improve the upper bounds of the minimum distances of self-dual codes over for lengths [22, 26, 28, 32–40]. In particular, we prove that there is no [22, 11, 9] self-dual code over , whose existence was left open in 1982. We also show that both the Hamming weight enumerator and the Lee weight enumerator of a putative [24, 12, 10] self-dual code over are unique. Using the building-up construction, we show that there are exactly nine inequivalent optimal self-dual [18, 9, 7] codes over up to the monomial equivalence, and construct one new optimal self-dual [20, 10, 8] code over and at least 40 new inequivalent optimal self-dual [22, 11, 8] codes.   相似文献   

9.
We prove the existence of a global heat flow u : Ω ×  \mathbbR+ ? \mathbbRN {\mathbb{R}^{+}} \to {\mathbb{R}^{N}}, N > 1, satisfying a Signorini type boundary condition u(∂Ω ×  \mathbbR+ {\mathbb{R}^{+}}) ⊂  \mathbbRn {\mathbb{R}^{n}}), n \geqslant 2 n \geqslant 2 , and \mathbbRN {\mathbb{R}^{N}}) with boundary [`(W)] \bar{\Omega } such that φ(∂Ω) ⊂ \mathbbRN {\mathbb{R}^{N}} is given by a smooth noncompact hypersurface S. Bibliography: 30 titles.  相似文献   

10.
The NTRU cryptosystem is constructed on the base ring \mathbbZ{\mathbb{Z}} . We give suitability conditions on rings to serve as alternate base rings. We present an example of an NTRU-like cryptosystem based on the Eisenstein integers \mathbbZ[z3]{\mathbb{Z}[\zeta_3]} , which has a denser lattice structure than \mathbbZ{\mathbb{Z}} for the same dimension, and which furthermore presents a more difficult lattice problem for lattice attacks, for the same level of decryption failure security.  相似文献   

11.
Let G be a finite non-Abelian group. We define a graph Γ G ; called the noncommuting graph of G; with a vertex set GZ(G) such that two vertices x and y are adjacent if and only if xyyx: Abdollahi, Akbari, and Maimani put forward the following conjecture (the AAM conjecture): If S is a finite non-Abelian simple group and G is a group such that Γ S ≅ Γ G ; then SG: It is still unknown if this conjecture holds for all simple finite groups with connected prime graph except \mathbbA10 {\mathbb{A}_{10}} , L 4(8), L 4(4), and U 4(4). In this paper, we prove that if \mathbbA16 {\mathbb{A}_{16}} denotes the alternating group of degree 16; then, for any finite group G; the graph isomorphism G\mathbbA16 @ GG {\Gamma_{{\mathbb{A}_{16}}}} \cong {\Gamma_G} implies that \mathbbA16 @ G {\mathbb{A}_{16}} \cong G .  相似文献   

12.
Let F be either or . Consider the standard embedding and the action of GLn(F) on GLn+1(F) by conjugation. We show that any GLn(F)-invariant distribution on GLn+1(F) is invariant with respect to transposition. We prove that this implies that for any irreducible admissible smooth Fréchet representations π of GLn+1(F) and of GLn(F),
. For p-adic fields those results were proven in [AGRS].   相似文献   

13.
Let G be a finite group and a formation of finite groups. We say that a subgroup H of G is -supplemented in G if there exists a subgroup T of G such that G = TH and is contained in the -hypercenter of G/H G . In this paper, we use -supplemented subgroups to study the structure of finite groups. A series of previously known results are unified and generalized. Research of the author is supported by a NNSF grant of China (Grant #10771180).  相似文献   

14.
Let , n  ≥ 2, be the near 2n-gon on the 2-factors of a complete graph with 2n + 2 vertices. In this paper, we classify the valuations of the near octagon . We use this classification to study isometric full embeddings of into DQ(8,2) and DH(7,4). We show that there is up to isomorphism a unique isometric full embedding of into each of these dual polar spaces. Further applications are expected in the classification of dense near polygons with lines of size 3.  相似文献   

15.
A binary linear code C is a \({\mathbb {Z}}_2\)-double cyclic code if the set of coordinates can be partitioned into two subsets such that any cyclic shift of the coordinates of both subsets leaves invariant the code. These codes can be identified as submodules of the \({\mathbb {Z}}_2[x]\)-module \({\mathbb {Z}}_2[x]/(x^r-1)\times {\mathbb {Z}}_2[x]/(x^s-1).\) We determine the structure of \({\mathbb {Z}}_2\)-double cyclic codes giving the generator polynomials of these codes. We give the polynomial representation of \({\mathbb {Z}}_2\)-double cyclic codes and its duals, and the relations between the generator polynomials of these codes. Finally, we study the relations between \({{\mathbb {Z}}}_2\)-double cyclic and other families of cyclic codes, and show some examples of distance optimal \({\mathbb {Z}}_2\)-double cyclic codes.  相似文献   

16.
Let be a subharmonic, nonharmonic polynomial and a parameter. Define , a closed, densely defined operator on . If and , we solve the heat equations , u(0,z) = f(z) and , . We write the solutions via heat semigroups and show that the solutions can be written as integrals against distributional kernels. We prove that the kernels are C off of the diagonal {(s, z, w) : s = 0 and z = w} and find pointwise bounds for the kernels and their derivatives.   相似文献   

17.
A code C{{\mathcal C}} is \mathbb Z2\mathbb Z4{{{\mathbb Z}_2}{{\mathbb Z}_4}} -additive if the set of coordinates can be partitioned into two subsets X and Y such that the punctured code of C{{\mathcal C}} by deleting the coordinates outside X (respectively, Y) is a binary linear code (respectively, a quaternary linear code). In this paper \mathbb Z2\mathbb Z4{{{\mathbb Z}_2}{{\mathbb Z}_4}} -additive codes are studied. Their corresponding binary images, via the Gray map, are \mathbb Z2\mathbb Z4{{{\mathbb Z}_2}{{\mathbb Z}_4}} -linear codes, which seem to be a very distinguished class of binary group codes. As for binary and quaternary linear codes, for these codes the fundamental parameters are found and standard forms for generator and parity-check matrices are given. In order to do this, the appropriate concept of duality for \mathbb Z2\mathbb Z4{{{\mathbb Z}_2}{{\mathbb Z}_4}} -additive codes is defined and the parameters of their dual codes are computed.  相似文献   

18.
We study the functional codes of second order on a non-degenerate Hermitian variety as defined by G. Lachaud. We provide the best possible bounds for the number of points of quadratic sections of . We list the first five weights, describe the corresponding codewords and compute their number. The paper ends with two conjectures. The first is about minimum distance of the functional codes of order h on a non-singular Hermitian variety . The second is about distribution of the codewords of first five weights of the functional codes of second order on a non-singular Hermitian variety .   相似文献   

19.
In this paper, we mainly study the theory of linear codes over the ring \(R =\mathbb {Z}_4+u\mathbb {Z}_4+v\mathbb {Z}_4+uv\mathbb {Z}_4\). By using the Chinese Remainder Theorem, we prove that R is isomorphic to a direct sum of four rings. We define a Gray map \(\Phi \) from \(R^{n}\) to \(\mathbb {Z}_4^{4n}\), which is a distance preserving map. The Gray image of a cyclic code over R is a linear code over \(\mathbb {Z}_4\). We also discuss some properties of MDS codes over R. Furthermore, we study the MacWilliams identities of linear codes over R and give the generator polynomials of cyclic codes over R.  相似文献   

20.
The holomorphic functions of several complex variables are closely related to the continuously differentiable solutions $f : {\mathbb{R}}^{2n} \mapsto {\mathbb{C}}_{n}$f : {\mathbb{R}}^{2n} \mapsto {\mathbb{C}}_{n} of the so called isotonic system
?x1 + i [(f)\tilde] ?x 2 = 0\partial _{\underbar{x}_1 } + i \tilde{f} \mathop{\partial _{\underbar{x} _2 } = 0}  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号