首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
For q = p m and m ≥ 1, we construct systematic authentication codes over finite field using Galois rings. We give corrections of the construction of [2]. We generalize corresponding systematic authentication codes of [6] in various ways.  相似文献   

2.
The purpose of this paper is to construct nontrivial MDS self-dual codes over Galois rings. We consider a building-up construction of self-dual codes over Galois rings as a GF(q)-analogue of (Kim and Lee, J Combin Theory ser A, 105:79–95). We give a necessary and sufficient condition on which the building-up construction holds. We construct MDS self-dual codes of lengths up to 8 over GR(32,2), GR(33,2) and GR(34,2), and near-MDS self-dual codes of length 10 over these rings. In a similar manner, over GR(52,2), GR(53,2) and GR(72,2), we construct MDS self-dual codes of lengths up to 10 and near-MDS self-dual codes of length 12. Furthermore, over GR(112,2) we have MDS self-dual codes of lengths up to 12.   相似文献   

3.
In this paper, we investigate self-dual codes over finite rings, specifically the ring of integers modulo 2m. Type II codes over are introduced as self-dual codes with Euclidean weights which are a multiple of 2m +1. We describe a relationship between Type II codes and even unimodular lattices. This relationship provides much information on Type II codes. Double circulant Type II codes over are also studied.  相似文献   

4.
We study self-dual codes over the rings and . We define various weights and weight enumerators over these rings and describe the groups of invariants for each weight enumerator over the rings. We examine the torsion codes over these rings to describe the structure of self-dual codes. Finally we classify self-dual codes of small lengths over .  相似文献   

5.
Kerdock codes (Kerdock, Inform Control 20:182–187, 1972) are a well-known family of non-linear binary codes with good parameters admitting a linear presentation in terms of codes over the ring (see Nechaev, Diskret Mat 1:123–139, 1989; Hammons et al., IEEE Trans Inform Theory 40:301–319, 1994). These codes have been generalized in different directions: in Calderbank et al. (Proc Lond Math Soc 75:436–480, 1997) a symplectic construction of non-linear binary codes with the same parameters of the Kerdock codes has been given. Such codes are not necessarily equivalent. On the other hand, in Kuzmin and Nechaev (Russ Math Surv 49(5), 1994) the authors give a family of non-linear codes over the finite field F of q = 2 l elements, all of them admitting a linear presentation over the Galois Ring R of cardinality q 2 and characteristic 22. The aim of this article is to merge both approaches, obtaining in this way new families of non-linear codes over F that can be presented as linear codes over the Galois Ring R. The construction uses symplectic spreads.   相似文献   

6.
We construct self-dual codes over small fields with q = 3, 4, 5, 7, 8, 9 of moderate length with long cycles in the automorphism group. With few exceptions, the codes achieve or improve the known lower bounds on the minimum distance of self-dual codes.   相似文献   

7.
In this paper we give the structure of constacyclic codes over formal power series and chain rings. We also present necessary and sufficient conditions on the existence of MDS codes over principal ideal rings. These results allow for the construction of infinite families of MDS self-dual codes over finite chain rings, formal power series and principal ideal rings. We also define the Reed–Solomon codes over principal ideal rings.  相似文献   

8.
Let p be a prime number. In this paper, we consider codes over the ring of integers modulo p 3 and give a characterization of self-duality. This leads to a construction of self-dual codes and a mass formula, which counts the number of such codes over .   相似文献   

9.
In this paper, we study self-dual permutation codes over formal power series rings and finite principal ideal rings. We first give some results on the torsion codes associated with the linear codes over formal power series rings. These results allow for obtaining some conditions for non-existence of self-dual permutation codes over formal power series rings. Finally, we describe self-dual permutation codes over finite principal ideal rings by examining permutation codes over their component chain rings.  相似文献   

10.
In this paper, it is shown that extremal (Hermitian) self-dual codes over 2 × 2 exist only for lengths 1, 2, 3, 4, 5, 8 and 10. All extremal self-dual codes over 2 × 2 are found. In particular, it is shown that there is a unique extremal self-dual code up to equivalence for lengths 8 and 10. Optimal self-dual codes are also investigated. A classification is given for binary [12, 7, 4] codes with dual distance 4, binary [13, 7, 4] codes with dual distance 4 and binary [13, 8, 4] codes with dual distance 4.  相似文献   

11.
A code is called formally self-dual if and have the same weight enumerators. There are four types of nontrivial divisible formally self-dual codes over , and . These codes are called extremal if their minimum distances achieve the Mallows-Sloane bound. S. Zhang gave possible lengths for which extremal self-dual codes do not exist. In this paper, we define near-extremal formally self-dual (f.s.d.) codes. With Zhang’s systematic approach, we determine possible lengths for which the four types of near-extremal formally self-dual codes as well as the two types of near-extremal formally self-dual additive codes cannot exist. In particular, our result on the nonexistence of near-extremal binary f.s.d. even codes of any even length n completes all the cases since only the case 8|n was dealt with by Han and Lee.   相似文献   

12.
The purpose of this paper is to improve the upper bounds of the minimum distances of self-dual codes over for lengths [22, 26, 28, 32–40]. In particular, we prove that there is no [22, 11, 9] self-dual code over , whose existence was left open in 1982. We also show that both the Hamming weight enumerator and the Lee weight enumerator of a putative [24, 12, 10] self-dual code over are unique. Using the building-up construction, we show that there are exactly nine inequivalent optimal self-dual [18, 9, 7] codes over up to the monomial equivalence, and construct one new optimal self-dual [20, 10, 8] code over and at least 40 new inequivalent optimal self-dual [22, 11, 8] codes.   相似文献   

13.
Let Z/(pe) be the integer residue ring modulo pe with p an odd prime and integer e ≥ 3. For a sequence (a) over Z/(pe), there is a unique p-adic decomposition (a) = (a)0 (a)1·p … (a)e-1 ·pe-1, where each (a)i can be regarded as a sequence over Z/(p), 0 ≤ i ≤ e - 1. Let f(x) be a primitive polynomial over Z/(pe) and G' (f(x), pe) the set of all primitive sequences generated by f(x) over Z/(pe). For μ(x) ∈ Z/(p)[x] with deg(μ(x)) ≥ 2 and gcd(1 deg(μ(x)),p- 1) = 1,set ψe-1 (x0, x1,…, xe-1) = xe-1·[ μ(xe-2) ηe-3 (x0, x1,…, xe-3)] ηe-2 (x0, x1,…, xe-2),which is a function of e variables over Z/(p). Then the compressing map ψe-1: G'(f(x),pe) → (Z/(p))∞,(a) (→)ψe-1((a)0, (a)1,… ,(a)e-1) is injective. That is, for (a), (b) ∈ G' (f(x), pe), (a) = (b) if and only if ψe - 1 ((a)0, (a)1,… , (a)e - 1) =ψe - 1 ((b)0,(b)1,… ,(b)e-1). As for the case of e = 2, similar result is also given. Furthermore, if functions ψe-1 and ψe-1 over Z/(p) are both of the above form and satisfy ψe-1((a)0,(a)1,… ,(a)e-1) = ψe-1((b)0,(b)1,… ,(b)e-1) for (a),(b) ∈ G'(f(x),pe), the relations between (a) and (b), ψe-1 and ψe-1 are discussed.  相似文献   

14.
We derive the Singleton bound for poset codes and define the MDS poset codes as linear codes which attain the Singleton bound. In this paper, we study the basic properties of MDS poset codes. First, we introduce the concept of I-perfect codes and describe the MDS poset codes in terms of I-perfect codes. Next, we study the weight distribution of an MDS poset code and show that the weight distribution of an MDS poset code is completely determined. Finally, we prove the duality theorem which states that a linear code C is an MDS -code if and only if is an MDS -code, where is the dual code of C and is the dual poset of   相似文献   

15.
It has been known for a long time that the Deligne–Lusztig curves associated to the algebraic groups of type and defined over the finite field all have the maximum number of -rational points allowed by the Weil “explicit formulas”, and that these curves are -maximal curves over infinitely many algebraic extensions of . Serre showed that an -rational curve which is -covered by an -maximal curve is also -maximal. This has posed the problem of the existence of -maximal curves other than the Deligne–Lusztig curves and their -subcovers, see for instance Garcia (On curves with many rational points over finite fields. In: Finite Fields with Applications to Coding Theory, Cryptography and Related Areas, pp. 152–163. Springer, Berlin, 2002) and Garcia and Stichtenoth (A maximal curve which is not a Galois subcover of the Hermitan curve. Bull. Braz. Math. Soc. (N.S.) 37, 139–152, 2006). In this paper, a positive answer to this problem is obtained. For every q = n 3 with n = p r  > 2, p ≥ 2 prime, we give a simple, explicit construction of an -maximal curve that is not -covered by any -maximal Deligne–Lusztig curve. Furthermore, the -automorphism group Aut has size n 3(n 3 + 1)(n 2 − 1)(n 2 − n + 1). Interestingly, has a very large -automorphism group with respect to its genus . Research supported by the Italian Ministry MURST, Strutture geometriche, combinatoria e loro applicazioni, PRIN 2006–2007.  相似文献   

16.
Let q = 2l with l≥ 1 and d ≥ 2. We prove that any automorphism of the d-dimensional dual hyperoval over GF(q), constructed in [3] for any (d + 1)-dimensional GF(q)-vector subspace V in GF(qn) with nd + 1 and for any generator σ of the Galois group of GF(qn) over GF(q), always fixes the special member X(∞). Moreover, we prove that, in case V = GF(qd+1), two dual hyperovals and in PG(2d + 1,q), where σ and τ are generators of the Galois group of GF(qd+1) over GF(q), are isomorphic if and only if (1) σ = τ or (2) σ τ = id. Therefore, we have proved that, even in the case q > 2, there exist non isomorphic d-dimensional dual hyperovals in PG(2d + 1,q) for d ≥ 3.  相似文献   

17.
The Gleason–Pierce–Ward theorem gives constraints on the divisor and field size of a linear divisible code over a finite field whose dimension is half of the code length. This result is a departure point for the study of self-dual codes. In recent years, additive codes have been studied intensively because of their use in additive quantum codes. In this work, we generalize the Gleason–Pierce–Ward theorem on linear codes over GF(q), q = p m , to additive codes over GF(q). The first step of our proof is an application of a generalized upper bound on the dimension of a divisible code determined by its weight spectrum. The bound is proved by Ward for linear codes over GF(q), and is generalized by Liu to any code as long as the MacWilliams identities are satisfied. The trace map and an analogous homomorphism on GF(q) are used to complete our proof.   相似文献   

18.
For two measured laminations ν+ and ν that fill up a hyperbolizable surface S and for , let be the unique hyperbolic surface that minimizes the length function e t l+) + e -t l) on Teichmüller space. We characterize the curves that are short in and estimate their lengths. We find that the short curves coincide with the curves that are short in the surface on the Teichmüller geodesic whose horizontal and vertical foliations are respectively, e t ν+ and e t ν. By deriving additional information about the twists of ν+ and ν around the short curves, we estimate the Teichmüller distance between and . We deduce that this distance can be arbitrarily large, but that if S is a once-punctured torus or four-times-punctured sphere, the distance is bounded independently of t. Received: May 2006, Revision: November 2006, Accepted: February 2007  相似文献   

19.
We classify the solutions to the equation (−Δ) m u = (2m − 1)!e 2mu on giving rise to a metric with finite total Q-curvature in terms of analytic and geometric properties. The analytic conditions involve the growth rate of u and the asymptotic behaviour of Δu at infinity. As a consequence we give a geometric characterization in terms of the scalar curvature of the metric at infinity, and we observe that the pull-back of this metric to S 2m via the stereographic projection can be extended to a smooth Riemannian metric if and only if it is round.  相似文献   

20.
We present a method for computing pth roots using a polynomial basis over finite fields of odd characteristic p, p ≥ 5, by taking advantage of a binomial reduction polynomial. For a finite field extension of our method requires p − 1 scalar multiplications of elements in by elements in . In addition, our method requires at most additions in the extension field. In certain cases, these additions are not required. If z is a root of the irreducible reduction polynomial, then the number of terms in the polynomial basis expansion of z 1/p , defined as the Hamming weight of z 1/p or , is directly related to the computational cost of the pth root computation. Using trinomials in characteristic 3, Ahmadi et al. (Discrete Appl Math 155:260–270, 2007) give is greater than 1 in nearly all cases. Using a binomial reduction polynomial over odd characteristic p, p ≥ 5, we find always.   相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号