首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 457 毫秒
1.
An (n, M, d)q code is a q‐ary code of length n, cardinality M, and minimum distance d. We show that there exists no (15,5,4) resolvable balanced incomplete block design (RBIBD) by showing that there exists no (equidistant) (14,15,10)3 code. This is accomplished by an exhaustive computer search using an orderly algorithm combined with a maximum clique algorithm. © 2001 John Wiley & Sons, Inc. J Combin Designs 9: 357–362, 2001  相似文献   

2.
Using group theory approach, we determine all numbers q for which there exists a linear 1-error correcting perfect Lee code of block length n over Z q , and then we enumerate those codes. At the same time this approach allows us to design a linear time decoding algorithm.   相似文献   

3.
We show that for all finite fields Fq, there exists a curve C over Fq of genus 3 such that the number of rational points on C is within 3 of the Serre–Weil upper or lower bound. For some q, we also obtain improvements on the upper bound for the number of rational points on a genus 3 curve over Fq.with an Appendix by Jean-Pierre Serre  相似文献   

4.
Let Г be a simple connected graph and let G be a group of automorphisms of Г. Г is said to be (G, 2)-arc transitive if G is transitive on the 2-arcs of Г. It has been shown that there exists a family of non-quasiprimitive (PSU3(q), 2)-arc transitive graphs where q = 2^3m with m an odd integer. In this paper we investigate the case where q is an odd prime power.  相似文献   

5.
A linear (qd, q, t)‐perfect hash family of size s consists of a vector space V of order qd over a field F of order q and a sequence ?1,…,?s of linear functions from V to F with the following property: for all t subsets X ? V, there exists i ∈ {1,·,s} such that ?i is injective when restricted to F. A linear (qd, q, t)‐perfect hash family of minimal size d( – 1) is said to be optimal. In this paper, we prove that optimal linear (q2, q, 4)‐perfect hash families exist only for q = 11 and for all prime powers q > 13 and we give constructions for these values of q. © 2004 Wiley Periodicals, Inc. J Comb Designs 12: 311–324, 2004  相似文献   

6.
It is unknown whether or not there exists an [87, 5, 57; 3]-code. Such a code would meet the Griesmer bound. The purpose of this paper is to give a constructive proof of the existence of [q 4 + q 2q, 5, q 4q 3 + q 2 – 2q; q]-codes for any prime power q 3. As a special case, it is shown that there exists an [87, 5, 57; 3]-code with weight enumerator 1 + 156z 37 + 82z 60 + 2z 63 + 2z 78. The new construction settles an open problem due to Hill and Newton [10].  相似文献   

7.
In [J.L. Kim, K. Mellinger, L. Storme, Small weight codewords in LDPC codes defined by (dual) classical generalised quadrangles, Des. Codes Cryptogr. 42 (1) (2007) 73-92], the codewords of small weight in the dual code of the code of points and lines of Q(4,q) are characterised. Inspired by this result, using geometrical arguments, we characterise the codewords of small weight in the dual code of the code of points and generators of Q+(5,q) and H(5,q2), and we present lower bounds on the weight of the codewords in the dual of the code of points and k-spaces of the classical polar spaces. Furthermore, we investigate the codewords with the largest weights in these codes, where for q even and k sufficiently small, we determine the maximum weight and characterise the codewords of maximum weight. Moreover, we show that there exists an interval such that for every even number w in this interval, there is a codeword in the dual code of Q+(5,q), q even, with weight w and we show that there is an empty interval in the weight distribution of the dual of the code of Q(4,q), q even. To prove this, we show that a blocking set of Q(4,q), q even, of size q2+1+r, where 0<r<(q+4)/6, contains an ovoid of Q(4,q), improving on [J. Eisfeld, L. Storme, T. Sz?nyi, P. Sziklai, Covers and blocking sets of classical generalised quadrangles, Discrete Math. 238 (2001) 35-51, Theorem 9].  相似文献   

8.
We show that if a linear code admits an extension, then it necessarily admits a linear extension. There are many linear codes that are known to admit no linear extensions. Our result implies that these codes are in fact maximal. We are able to characterize maximal linear (n, k, d) q -codes as complete (weighted) (n, nd)-arcs in PG(k − 1, q). At the same time our results sharply limit the possibilities for constructing long non-linear codes. The central ideas to our approach are the Bruen-Silverman model of linear codes, and some well known results on the theory of directions determined by affine point-sets in PG(k, q).   相似文献   

9.
A new extension theorem for linear codes   总被引:1,自引:0,他引:1  
For an [n,k,d]q code with k3, gcd(d,q)=1, the diversity of is defined as the pair (Φ01) with
All the diversities for [n,k,d]q codes with k3, d−2 (mod q) such that Ai=0 for all i0,−1,−2 (mod q) are found and characterized with their spectra geometrically, which yields that such codes are extendable for all odd q5. Double extendability is also investigated.  相似文献   

10.
We extend the set of values of n for which it is known that a Z-cyclic triple whist tournament for 4n players exists by proving that if there exists such a tournament for q + 1 players, where q ≡ 3 (mod 4) is prime, then there exists such a tournament for qpa11pann + 1 players, whenever the pi are primes ≡ 5 (mod 8). © 1995 John Wiley & Sons, Inc.  相似文献   

11.
Because of their potential for offering a computational speed-up when used on certain multiprocessor computers, implicit Runge-Kutta methods with a stability function having distinct poles are analyzed. These are calledmultiply implicit (MIRK) methods, and because of the so-calledorder reduction phenomenon, their poles are required to be real, i.e., only real MIRK's are considered. Specifically, it is proved that a necessary condition for aq-stage, real MIRK to beA-stable with maximal orderq+1 is thatq=1, 2, 3 or 5. Nevertheless, it is shown that for every positive integerq, there exists aq-stage, real MIRK which is stronglyA 0-stable with orderq+1, and for every evenq, there is aq-stage, real MIRK which isI-stable with orderq. Finally, some useful examples of algebraically stable real MIRK's are given.This work was supported by the National Aeronautics and Space Administration under NASA Contract No. NAS1-18107 while the author was in residence at the Institute for Computer Applications in Science and Engineering (ICASE), NASA Langley Research Center, Hampton, VA 23665-5225.  相似文献   

12.
In this paper we consider a system of heat equations ut = Δu, vt = Δv in an unbounded domain Ω⊂ℝN coupled through the Neumann boundary conditions uv = vp, vv = uq, where p>0, q>0, pq>1 and ν is the exterior unit normal on ∂Ω. It is shown that for several types of domain there exists a critical exponent such that all of positive solutions blow up in a finite time in subcritical case (including the critical case) while there exist positive global solutions in the supercritical case if initial data are small.  相似文献   

13.
We show that the incidence vector of any hermitian variety in the projective geometry PG m–1(F q 2), where q = p t , and p is a prime, is in the code over F p of the symmetric design of points and hyperplanes of the geometry by using the theorem of Delsarte [8] that identifies this code with a nonprimitive generalized Reed-Muller code.  相似文献   

14.
The minimal cardinality of a q-ary code of length n and covering radius at most R is denoted by Kq(n, R); if we have the additional requirement that the minimum distance be at least d, it is denoted by Kq(n, R, d). Obviously, Kq(n, R, d) Kq(n, R). In this paper, we study instances for which Kq(n,1,2) > Kq(n, 1) and, in particular, determine K4(4,1,2)=28 > 24=K4(4,1).Supported in part by the Academy of Finland under grant 100500.  相似文献   

15.
LetX 1 andX 2 be two mixing Markov shifts over finite alphabet. If the entropy ofX 1 is strictly larger than the entropy ofX 2, then there exists a finitary homomorphism ϕ:X 1X 2 such that the code length is anL p random variable for allp<4/3. In particular, the expected length of the code ϕ is finite. Research supported by KBN grant 2 P03A 039 15 1998–2001.  相似文献   

16.
Let X be a finite set of q elements, and n, K, d be integers. A subset CX n is an (n, K, d) error-correcting code, if #(C) = K and its minimum distance is d. We define an (n, K, d) error-correcting sequence over X as a periodic sequence {a i } i=0,1,... (a i X) with period K, such that the set of all consecutive n-tuples of this sequence form an (n, K, d) error-correcting code over X. Under a moderate conjecture on the existence of some type of primitive polynomials, we prove that there is a error correcting sequence, such that its code-set is the q-ary Hamming code with 0 removed, for q > 2 being a prime power. For the case q = 2, under a similar conjecture, we prove that there is a error-correcting sequence, such that its code-set supplemented with 0 is the subset of the binary Hamming code [2 m  − 1, 2 m  − 1 − m, 3] obtained by requiring one specified coordinate being 0. Received: October 27, 2005. Final Version received: December 31, 2007  相似文献   

17.
Primitive polynomial with three coefficients prescribed   总被引:1,自引:1,他引:0  
The authors proved in Fan and Han (Finite Field Appl., in press) that, for any given (a1,a2,a3)Fq3, there exists a primitive polynomial f(x)=xn−σ1xn−1++(−1)nσn over Fq of degree n with the first three coefficients σ123 prescribed as a1,a2,a3 when n8. But the methods in Fan and Han (in press) are not effective for the case of n=7. Mills (Existence of primitive polynomials with three coefficients prescribed, J. Algebra Number Theory Appl., in press) resolves the n=7 case for finite fields of characteristic at least 5. In this paper, we deal with the remaining cases and prove that there exists a primitive polynomial of degree 7 over Fq with the first three coefficient prescribed where the characteristic of Fq is 2 or 3.  相似文献   

18.
A classical binary Preparata code P2(m) is a nonlinear (2m+1,22(2m-1-m),6)-code, where m is odd. It has a linear representation over the ring Z4 [Hammons et al., The Z4-linearity of Kerdock, Preparata, Goethals and related codes, IEEE Trans. Inform. Theory 40(2) (1994) 301-319]. Here for any q=2l>2 and any m such that (m,q-1)=1 a nonlinear code Pq(m) over the field F=GF(q) with parameters (q(Δ+1),q2(Δ-m),d?3q), where Δ=(qm-1)/(q-1), is constructed. If d=3q this set of parameters generalizes that of P2(m). The equality d=3q is established in the following cases: (1) for a series of initial admissible values q and m such that qm<2100; (2) for m=3,4 and any admissible q, and (3) for admissible q and m such that there exists a number m1 with m1|m and d(Pq(m1))=3q. We apply the approach of [Nechaev and Kuzmin, Linearly presentable codes, Proceedings of the 1996 IEEE International Symposium Information Theory and Application Victoria, BC, Canada 1996, pp. 31-34] the code P is a Reed-Solomon representation of a linear over the Galois ring R=GR(q2,4) code P dual to a linear code K with parameters near to those of generalized linear Kerdock code over R.  相似文献   

19.
It is shown that there exists a quantum superdeterminant sdet q T for the quantum super group OSP q (1|2n). It is also shown that the quantum superdeterminant sdet q T is a group-like element and central, and that the square of sdet q T for OSP q (1|2n) is equal to 1.  相似文献   

20.
LetA=k (X 1, X2..., Xm) be the division ring generated by genericn×n matrices over a fieldk; thenA is not a crossed product in the following cases: (i) there exists a primeq such thatq 3n;(ii)[k:Q]=m, whereQ is the field of rationals, then if eitherq 3n for someq for whichq-1ℛm, orq 2/nn for some other prime; (iii)k=Z p r a finite field ofp r elements and eitherq 3n for sameqp r-1 orq 2n for some other primes. Other cases are also considered.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号