共查询到20条相似文献,搜索用时 125 毫秒
1.
2008-2009年,丁存生在构造最佳常组合码与优化及完善差分系统中首次引入了零差分平衡(简称ZDB)函数的概念,据此学者们构造出了最佳组成权重码和最优跳频序列.作者将零差分平衡函数的定义推广到一般的广义零差分平衡函数,并利用2分圆陪集构造了一类广义零差分平衡函数,由此构造出一类新的常组合码和差分系统. 相似文献
2.
本文研究了混合长度的删位纠错码的构造问题.利用组合设计的方法构造了长为{3,4,5}的完备删位纠错码T(2,{3,4,5},v),当v为正整数且v≠8时,得到了所有的T(2,{3,4,5},v)-码,并给出码字总数的一个上界,T(2,{3,4,5},v)-码的构造推广了长度为单一值的删位纠错码的构造结果. 相似文献
3.
4.
局部修复码是一种能修复多个故障节点的纠删码,在分布式存储系统中被广泛使用,构造最优局部修复码是目前分布式存储编码理论研究的热点问题之一.文章利用有限域Fq上循环码构造了以下两类具有局部修复性(r,δ)的最优局部修复码:1)[3(q+1),3(q+1)-3δ+1,δ+2],其中 q ≡ 1(mod 6),r+δ-1=q+... 相似文献
5.
W.Ogata等定义了两种新的组合设计:外差族(EDF)与外平衡不完全区组设计(E-BIBD).本文首先用有限域中的分圆类给出EDF的一个构造;接着用EBIBD构造出具有完善保密性的最优分裂A-码,然后证明了由满足一定条件的两个EBIBD通过上述方法构造出的两个认证码是同构的. 相似文献
6.
7.
8.
一类线性流形上矩阵方程X^TAX=B的反问题 总被引:1,自引:0,他引:1
设Ω={A∈ASR^nxn|Ax=C,↓Ax∈RT(S),SS^+C=0,T2^TC2=-C2^TT2,C2T2^+72=C2},考虑问题Ⅰ:给定X∈R^nxm,B∈R^mxm求A∈Ω,使得f(A)=||X^TAX—B||=min;问题Ⅱ:给定A^+∈R^nxm,求A∈SE,使得||A^+-A||=minA∈SE||A^+-A||,SE是问题Ⅰ的解集。本文给出了问题Ⅰ、Ⅱ的解的通式,并给出了问题Ikf(A)=0成立的充分必要条件。 相似文献
9.
10.
11.
On Construction of Optimal A2-Codes 总被引:2,自引:0,他引:2
§ 1.Introduction Theauthenticationcodeswitharbitration (A2 codes)areintroducedbySimmons[1]andstudiedinmanypapers (forexample ,[1— 8] ) .Oneofthemostimportantproblemsinthestudyofauthenticationcodesistofindlowerboundsoncheatingprobabilitiesandonthenumbersofencodi… 相似文献
12.
Two-dimensional optical orthogonal codes (2-D OOCs) are of current practical interest in fiber-optic code-division multiple-access
networks as they enable optical communication at lower chip rate to overcome the drawbacks of nonlinear effects in large spreading
sequences of one-dimensional codes. A 2-D OOC is said to be optimal if its cardinality is the largest possible. In this paper,
we develop some constructions for optimal 2-D OOCs using combinatorial design theory. As an application, these constructions
are used to construct an infinite family of new optimal 2-D OOCs with auto-correlation 1 and cross-correlation 1. 相似文献
13.
Unconditionallysecure authentication codes with arbitration ( A
2-codes)protect against deceptions from the transmitter and the receiveras well as that from the opponent. We first show that an optimalA
2-code implies an orthogonal array and an affine-resolvable design. Next we define a new design,an affine -resolvable + BIBD,and prove that optimal A
2-codes are equivalentto this new design. From this equivalence, we derive a conditionon the parameters for the existence of optimal A
2-codes.Further, we show tighter lower bounds on the size of keys thanbefore for large sizes of source states which can be consideredas an extension of the bounds on the related designs. 相似文献
14.
In this paper we consider the existence of perfect codes in the infinite class of distance-transitive graphs Ok. Perfect 1-codes correspond to certain Steiner systems and necessary conditions for the existence of such a code are satisfied if k + 1 is prime. We give some nonexistence results for perfect 2-, 3-, and 4-codes and for perfect e-codes in general, including a lower bound for k in terms of e. 相似文献
15.
In the model of(k,n) multi-receiver authentication codes ( A-codes),a transmitter broadcasts a message m to nreceivers in such a way that not only an outside opponent butalso any k-1 receivers cannot cheat any other receiver.In this paper, we derive lower bounds on the cheating probabilitiesand the sizes of keys of (k,n) multi-receiver A-codes.The scheme proposed by Desmedt, Frankel and Yung meets all ourbounds with equalities. This means that our bounds are tightand their scheme is optimum. We further show a combinatorialstructure of optimum (k,n) multi-receiver A-codes.A notion of TWOOAs is introduced. A TWOOA is a pair of orthogonalarrays which satisfy a certain condition. We then prove thatan optimum (k,n) multi-receiver A-codeis equivalent to a TWOOA. 相似文献
16.
Unconditionallysecure authentication codes with arbitration ( A2-codes)protect against deceptions from the transmitter and the receiveras well as that from the opponent. In this paper, we presentcombinatorial lower bounds on the cheating probabilities andthe sizes of keys of A2-codes. These bounds areall tight. Our main technique is a reduction of an A2-codeto a splitting A-code. 相似文献
17.
Partitioned difference families are an interesting class of discrete structures which can be used to derive optimal constant composition codes. There have been intensive researches on the construction of partitioned difference families. In this paper, we consider the combinatorial approach. We introduce a new combinatorial configuration named partitioned relative difference family, which proves to be very powerful in the construction of partitioned difference families. In particular, we present two general recursive constructions, which not only include some existing constructions as special cases, but also generate many new series of partitioned difference families. As an application, we use these partitioned difference families to construct several new classes of optimal constant composition codes. 相似文献
18.
Jianmin Wang 《Designs, Codes and Cryptography》2008,48(3):331-347
There are two kinds of perfect t-deletion-correcting codes of length k over an alphabet of size v, those where the coordinates may be equal and those where all coordinates must be different. We call these two kinds of codes
T*(k − t, k, v)-codes and T(k − t, k, v)-codes respectively. The cardinality of a T(k − t, k, v)-code is determined by its parameters, while T*(k − t, k, v)-codes do not necessarily have a fixed size. Let N(k − t, k, v) denote the maximum number of codewords in any T*(k − t, k, v)-code. A T*(k − t, k, v)-code with N(k − t, k, v) codewords is said to be optimal. In this paper, some combinatorial constructions for optimal T*(2, k, v)-codes are developed. Using these constructions, we are able to determine the values of N(2, 4, v) for all positive integers v. The values of N(2, 5, v) are also determined for almost all positive integers v, except for v = 13, 15, 19, 27 and 34.
相似文献
19.
We prove a new characterization of weakly regular ternary bent functions via partial difference sets. Partial difference sets are combinatorial objects corresponding to strongly regular graphs. Using known families of bent functions, we obtain in this way new families of strongly regular graphs, some of which were previously unknown. One of the families includes an example in [N. Hamada, T. Helleseth, A characterization of some {3v2+v3,3v1+v2,3,3}-minihypers and some [15,4,9;3]-codes with B2=0, J. Statist. Plann. Inference 56 (1996) 129-146], which was considered to be sporadic; using our results, this strongly regular graph is now a member of an infinite family. Moreover, this paper contains a new proof that the Coulter-Matthews and ternary quadratic bent functions are weakly regular. 相似文献
20.
Peter Hammond 《Journal of Combinatorial Theory, Series B》1981,30(1):32-35
In this paper we consider the relationship between q-coverings of a regular graph and perfect 1-codes in line graphs. An infinite class of perfect 1-codes in the line graphs L(Ik) is constructed. 相似文献