首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 406 毫秒
1.
Splitting t-designs were first formulated by Huber in recent investigation of optimal (t − 1)-fold secure splitting authentication codes. In this paper, we investigate the construction and existence of splitting t-designs t-(v, u × k, 1) splitting designs and, show that there exists a 3-(v, 3 × 2, 1) splitting design if and only if v ≡ 2 (mod 8). As its application, we obtain a new infinite class of optimal 2-fold secure splitting authentication codes.  相似文献   

2.
Authentication codes with arbitration protect against deceptions from the transmitter and the receiver as well as that from the opponent. An authentication code with arbitration is t-fold perfect if the numbers of decoding rules and encoding rules meet the information-theoretic lower bounds. Pei (Message authentication codes (in Chinese). USCT, Hefei, 2009) pointed out that there has not yet been able to construct t-fold perfect authentication codes with arbitration for \(t > 2\) . In this paper, we define a new design, perfect strong strict restricted partially balanced t-design, and prove that the existence of perfect strong strict restricted partially balanced t-designs implies the existence of t-fold perfect authentication codes with arbitration. Further, we obtain some new infinite classes of t-fold perfect authentication codes with arbitration.  相似文献   

3.
Splitting balanced incomplete block designs were first formulated by Ogata, Kurosawa, Stinson, and Saido recently in the investigation of authentication codes. This article investigates the existence of splitting balanced incomplete block designs, i.e., (v, 3k, λ)‐splitting BIBDs; we give the spectrum of (v, 3 × 2, λ)‐splitting BIBDs. As an application, we obtain an infinite class of 2‐splitting A‐codes. © 2004 Wiley Periodicals, Inc.  相似文献   

4.
We shall refer to a strong partially balanced design SPBD(v,b,k;λ,0) whose b is the maximum number of blocks in all SPBD(v,b,k;λ,0), as an optimal strong partially balanced design, briefly OSPBD(v,k,λ). Resolvable strong partially balanced design was first formulated by Wang, Safavi-Naini and Pei [Combinatorial characterization of l-optimal authentication codes with arbitration, J. Combin. Math. Combin. Comput. 37 (2001) 205-224] in investigation of l-optimal authentication codes. This article investigates the existence of resolvable optimal strong partially balanced design ROSPBD(v,3,1). We show that there exists an ROSPBD(v,3,1) for any v?3 except v=6,12.  相似文献   

5.
A defining set of a t-(v, k, λ) design is a partial design which is contained in a unique t-design with the given parameters. A minimal defining set is a defining set, none of whose proper partial designs is a defining set. This paper proposes a new and more efficient algorithm that finds all non-isomorphic minimal defining sets of a given t-design. The complete list of minimal defining sets of 2-(6, 3, 6) designs, 2-(7, 3, 4) designs, the full 2-(7, 3, 5) design, a 2-(10, 4, 4) design, 2-(10, 5, 4) designs, 2-(13, 3, 1) designs, 2-(15, 3, 1) designs, the 2-(25, 5, 1) design, 3-(8, 4, 2) designs, the 3-(12, 6, 2) design, and 3-(16, 8, 3) designs are given to illustrate the efficiency of the algorithm. Also, corrections to the literature are made for the minimal defining sets of four 2-(7, 3, 3) designs, two 2-(6, 3, 4) designs and the 2-(21, 5, 1) design. Moreover, an infinite class of minimal defining sets for 2-((v) || 3){v\choose3} designs, where v ≥ 5, has been constructed which helped to show that the difference between the sizes of the largest and the smallest minimal defining sets of 2-((v) || 3){v\choose3} designs gets arbitrarily large as v → ∞. Some results in the literature for the smallest defining sets of t-designs have been generalized to all minimal defining sets of these designs. We have also shown that all minimal defining sets of t-(2n, n, λ) designs can be constructed from the minimal defining sets of their restrictions when t is odd and all t-(2n, n, λ) designs are self-complementary. This theorem can be applied to 3-(8, 4, 3) designs, 3-(8, 4, 4) designs and the full 3-(8 || 4)3-{8 \choose 4} design using the previous results on minimal defining sets of their restrictions. Furthermore we proved that when n is even all (n − 1)-(2n, n, λ) designs are self-complementary.  相似文献   

6.
Let (v,u×c,λ)-splitting BIBD denote a (v,u×c,λ)-splitting balanced incomplete block design of order v with block size u×c and index λ. Necessary conditions for the existence of a (v,u×c,λ)-splitting BIBD are vuc, λ(v−1)≡0 (mod c(u−1)) and λ v(v−1)≡0 (mod (c 2 u(u−1))). We show in this paper that the necessary conditions for the existence of a (v,3×3,λ)-splitting BIBD are also sufficient with possible exceptions when (1) (v,λ)∈{(55,1),(39,9k):k=1,2,…}, (2) λ≡0 (mod 54) and v≡0 (mod 2). We also show that there exists a (v,3×4,1)-splitting BIBD when v≡1 (mod 96). As its application, we obtain a new infinite class of optimal 4-splitting authentication codes.  相似文献   

7.
As a consequence of the classification of the finite simple groups, it has been possible in recent years to characterize Steiner t-designs, that is t-(v,k,1) designs, mainly for t=2, admitting groups of automorphisms with sufficiently strong symmetry properties. However, despite the finite simple group classification, for Steiner t-designs with t>2 most of these characterizations have remained long-standing challenging problems. Especially, the determination of all flag-transitive Steiner t-designs with 3≤t≤6 is of particular interest and has been open for about 40 years (cf. Delandtsheer (Geom. Dedicata 41, p. 147, 1992 and Handbook of Incidence Geometry, Elsevier Science, Amsterdam, 1995, p. 273), but presumably dating back to 1965). The present paper continues the author’s work (see Huber (J. Comb. Theory Ser. A 94, 180–190, 2001; Adv. Geom. 5, 195–221, 2005; J. Algebr. Comb., 2007, to appear)) of classifying all flag-transitive Steiner 3-designs and 4-designs. We give a complete classification of all flag-transitive Steiner 5-designs and prove furthermore that there are no non-trivial flag-transitive Steiner 6-designs. Both results rely on the classification of the finite 3-homogeneous permutation groups. Moreover, we survey some of the most general results on highly symmetric Steiner t-designs.   相似文献   

8.
In the present paper we consider a q-analog of t–(v,k,)-designs. It is canonic since it arises by replacing sets by vector spaces over GF(q), and their orders by dimensions. These generalizations were introduced by Thomas [Geom.Dedicata vol. 63, pp. 247–253 (1996)] they are called t –(v,k,;q)- designs. A few of such q-analogs are known today, they were constructed using sophisticated geometric arguments and case-by-case methods. It is our aim now to present a general method that allows systematically to construct such designs, and to give complete catalogs (for small parameters, of course) using an implemented software package.   In order to attack the (highly complex) construction, we prepare them for an enormous data reduction by embedding their definition into the theory of group actions on posets, so that we can derive and use a generalization of the Kramer-Mesner matrix for their definition, together with an improved version of the LLL-algorithm. By doing so we generalize the methods developed in a research project on t –(v,k,)-designs on sets, obtaining this way new results on the existence of t–(v,k,;q)-designs on spaces for further quintuples (t,v,k,;q) of parameters. We present several 2–(6,3,;2)-designs, 2–(7,3,;2)-designs and, as far as we know, the very first 3-designs over GF(q).classification 05B05  相似文献   

9.
An ordered analogue of quadruple systems is tetrahedral quadruple systems. A tetrahedral quadruple system of order v and index λ, TQS(v, λ), is a pair (S, T){(S, \mathcal{T})} where S is a finite set of v elements and T{\mathcal{T}} is a family of oriented tetrahedrons of elements of S called blocks, such that every directed 3-cycle on S is contained in exactly λ blocks of T{\mathcal{T}} . When λ = 1, the spectrum problem of TQS(v, 1) has been completely determined. It is proved that a TQS(v, λ) exists if and only if λ(v − 1)(v − 2) ≡ 0 (mod 3), λv(v − 1)(v − 2) ≡ 0 (mod 4) and v ≥ 4.  相似文献   

10.
We establish existence and sharp regularity results for solutions to singular elliptic equations of the order u β , 0 < β < 1, with gradient dependence and involving a forcing term λ f(x, u). Our approach is based on a singularly perturbed technique. We show that if the forcing parameter λ > 0 is large enough, our solution is positive. For λ small solutions vanish on a nontrivial set and therefore they exhibit free boundaries. We also establish regularity results for the free boundary and study the asymptotic behavior of the problem as b\searrow 0{\beta\searrow 0} and b\nearrow 1{\beta\nearrow 1}. In the former, we show that our solutions u β converge to a C 1,1 function which is a solution to an obstacle type problem. When b\nearrow 1{\beta\nearrow 1} we recover the Alt-Caffarelli theory.  相似文献   

11.
Neumaier and Seidel (1988) generalized the concept of spherical designs and defined Euclidean designs in ℝ n . For an integer t, a finite subset X of ℝ n given together with a weight function w is a Euclidean t-design if holds for any polynomial f(x) of deg(f)≤ t, where {S i , 1≤ ip} is the set of all the concentric spheres centered at the origin that intersect with X, X i = XS i , and w:X→ ℝ> 0. (The case of XS n−1 with w≡ 1 on X corresponds to a spherical t-design.) In this paper we study antipodal Euclidean (2e+1)-designs. We give some new examples of antipodal Euclidean tight 5-designs. We also give the classification of all antipodal Euclidean tight 3-designs, the classification of antipodal Euclidean tight 5-designs supported by 2 concentric spheres.  相似文献   

12.
The Multiplier Theorem is a celebrated theorem in the Design theory. The conditionp>λ is crucial to all known proofs of the multiplier theorem. However in all known examples of difference sets μ p . is a multiplier for every primep with (p, v)=1 andpn. Thus there is the multiplier conjecture: “The multiplier theorem holds without the assumption thatp>λ”. The general form of the multiplier theorem may be viewed as an attempt to partially resolve the multiplier conjecture, where the assumption “p>λ” is replaced by “n 1>λ”. Since then Newman (1963), Turyn (1964), and McFarland (1970) attempted to partially resolve the multiplier conjecture (see [7], [8], [9]). This paper will prove the following result using the representation theory of finite groups and the algebraic number theory: LetG be an abelian group of orderv,v 0 be the exponent ofG, andD be a (v, k, λ)-difference set inG. Ifn=2n 1, then the general form of the multiplier theorem holds without the assumption thatn 1>λ in any of the following cases:
2〈  n 1;
2 Xn 1 and (v, 7)=1;
2 Xn1, 7〈  v, andt≡1 or 2 or 4 (mod 7).
Supported by the scientific research finances of Peking University.  相似文献   

13.
The aim of this study is to prove global existence of classical solutions for systems of the form ${\frac{\partial u}{\partial t} -a \Delta u=-f(u,v)}The aim of this study is to prove global existence of classical solutions for systems of the form \frac?u?t -a Du=-f(u,v){\frac{\partial u}{\partial t} -a \Delta u=-f(u,v)} , \frac?v?t -b Dv=g(u,v){\frac{\partial v}{\partial t} -b \Delta v=g(u,v)} in (0, +∞) × Ω where Ω is an open bounded domain of class C 1 in \mathbbRn{\mathbb{R}^n}, a > 0, b > 0 and f, g are nonnegative continuously differentiable functions on [0, +∞) × [0, +∞) satisfying f (0, η) = 0, g(x,h) £ C j(x)eahb{g(\xi,\eta) \leq C \varphi(\xi)e^{\alpha {\eta^\beta}}} and g(ξ, η) ≤ ψ(η)f(ξ, η) for some constants C > 0, α > 0 and β ≥ 1 where j{\varphi} and ψ are any nonnegative continuously differentiable functions on [0, +∞) such that j(0)=0{\varphi(0)=0} and limh? +¥hb-1y(h) = l{ \lim_{\eta \rightarrow +\infty}\eta^{\beta -1}\psi(\eta)= \ell} where is a nonnegative constant. The asymptotic behavior of the global solutions as t goes to +∞ is also studied. For this purpose, we use the appropriate techniques which are based on semigroups, energy estimates and Lyapunov functional methods.  相似文献   

14.
Let K q (n, w, t, d) be the minimum size of a code over Z q of length n, constant weight w, such that every word with weight t is within Hamming distance d of at least one codeword. In this article, we determine K q (n, 4, 3, 1) for all n ≥ 4, q = 3, 4 or q = 2 m  + 1 with m ≥ 2, leaving the only case (q, n) = (3, 5) in doubt. Our construction method is mainly based on the auxiliary designs, H-frames, which play a crucial role in the recursive constructions of group divisible 3-designs similar to that of candelabra systems in the constructions of 3-wise balanced designs. As an application of this approach, several new infinite classes of nonuniform group divisible 3-designs with block size four are also constructed.  相似文献   

15.
Let N be the set of nonnegative integers, let , t, v be in N and let K be a subset of N, let V be a v-dimensional vector space over the finite field GF(q), and let W Kbe the set of subspaces of V whose dimensions belong to K. A t-[v, K, ; q]-design on V is a mapping : W K N such that for every t-dimensional subspace, T, of V, we have (B)=. We construct t-[v, {t, t+1}, ; q-designs on the vector space GF(q v) over GF(q) for t2, v odd, and q t(q–1)2 equal to the number of nondegenerate quadratic forms in t+1 variables over GF(q). Moreover, the vast majority of blocks of these designs have dimension t+1. We also construct nontrivial 2-[v, k, ; q]-designs for v odd and 3kv–3 and 3-[v, 4, q 6+q 5+q 4; q]-designs for v even. The distribution of subspaces in the designs is determined by the distribution of the pairs (Q, a) where Q is a nondegenerate quadratic form in k variables with coefficients in GF(q) and a is a vector with elements in GF(q v) such that Q(a)=0.This research was partly supported by NSA grant #MDA 904-88-H-2034.  相似文献   

16.
Let Φ(u × v, k, λ a , λ c ) denote the largest possible size among all 2-D (u × v, k, λ a , λ c )-OOCs. In this paper, the exact value of Φ(u × v, k, λ a , k − 1) for λ a = k − 1 and k is determined. The case λ a = k − 1 is a generalization of a result in Yang (Inform Process Lett 40:85–87, 1991) which deals with one dimensional OOCs namely, u = 1.  相似文献   

17.
Recently, Lindner showed that every partial 4-cycle system of order n and index 1 could be embedded in a 4-cycle system of order ν and index 1 with v ≤ 2n + 15. While the technique he used does not immediately extend to any higher index, here we develop his ideas to show that every partial 4-cycle system of order n and index λ can be embedded in a 4-cycle system of order v and index λ for all λ-admissible . This improves on the best known bounds of v = 4n and v = 8n + 1 when λ > 1 is even and odd respectively.  相似文献   

18.
There are two kinds of perfect t-deletion-correcting codes of length k over an alphabet of size v, those where the coordinates may be equal and those where all coordinates must be different. We call these two kinds of codes T*(k − t, k, v)-codes and T(k − t, k, v)-codes respectively. The cardinality of a T(k − t, k, v)-code is determined by its parameters, while T*(k − t, k, v)-codes do not necessarily have a fixed size. Let N(k − t, k, v) denote the maximum number of codewords in any T*(k − t, k, v)-code. A T*(k − t, k, v)-code with N(k − t, k, v) codewords is said to be optimal. In this paper, some combinatorial constructions for optimal T*(2, k, v)-codes are developed. Using these constructions, we are able to determine the values of N(2, 4, v) for all positive integers v. The values of N(2, 5, v) are also determined for almost all positive integers v, except for v = 13, 15, 19, 27 and 34.   相似文献   

19.
Abstract  In this paper, we deal with some global existence results for the large data smooth solutions of the Cauchy Problem associated with the semilinear weakly hyperbolic equations
Here u=u(x,t), and for λ≥ 0, aλ≥ 0 is a continuous function that behaves as |tt0|λ close to some t0>0. We conjecture the existence of a critical exponent pc(λ1,λ2,n) such that for ppc(λ1,λ2,n) a global existence theorem holds. For suitable λ1,λ2,n, we recall some known results and add new ones. Keywords: Critical exponents for semilinear equations, Weak hyperbolicity  相似文献   

20.
In [Z.J. Jurek, Relations between the s-selfdecomposable and selfdecomposable measures, Ann. Probab., 13(2):592–608, 1985] and [Z.J. Jurek, Random integral representation for classes of limit distributions similar to Lévy class L 0, Probab. Theory Relat. Fields, 78:473–490, 1988] the random integral representation conjecture was stated. It claims that (some) limit laws can be written as the probability distributions of random integrals of the form ò( a,b ]h(t)\textdYv( r(t) ) \int {_{\left( {a,b} \right]}h(t){\text{d}}{Y_v}\left( {r(t)} \right)} for some deterministic functions h, r, and a Lévy process Yv(t),  t \geqslant 0 {Y_v}(t),\;t \geqslant 0 . Here we review situations where such a claim holds. Each theorem is followed by a remark that gives references to other related papers, results, and historical comments. Moreover, some open questions are stated.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号