首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
An equivalent of kernel existence is formulated using semikernels. It facilitates inductive arguments, which allow us to establish several sufficient conditions for the existence of kernels in finite digraphs. The conditions identify classes of digraphs that have kernels without necessarily being kernel perfect.  相似文献   

2.
There are two kinds of perfect t-deletion-correcting codes of length k over an alphabet of size v, those where the coordinates may be equal and those where all coordinates must be different. We call these two kinds of codes T*(k − t, k, v)-codes and T(k − t, k, v)-codes respectively. The cardinality of a T(k − t, k, v)-code is determined by its parameters, while T*(k − t, k, v)-codes do not necessarily have a fixed size. Let N(k − t, k, v) denote the maximum number of codewords in any T*(k − t, k, v)-code. A T*(k − t, k, v)-code with N(k − t, k, v) codewords is said to be optimal. In this paper, some combinatorial constructions for optimal T*(2, k, v)-codes are developed. Using these constructions, we are able to determine the values of N(2, 4, v) for all positive integers v. The values of N(2, 5, v) are also determined for almost all positive integers v, except for v = 13, 15, 19, 27 and 34.   相似文献   

3.
4.
5.
6.
The quaternary Hermitian self-dual [18,9,6]4 codes are classified and used to construct new binary self-dual [54,27,10]2 codes. All self-dual [54,27,10]2 codes obtained have automorphisms of order 3, and six of their weight enumerators have not been previously encountered.   相似文献   

7.
All nonequivalent perfect binary codes of length 15 and rank 15 are constructed that are obtained from the Hamming code H 15 by translating its disjoint components. Also, the main invariants of this class of codes are determined such as the ranks, dimensions of kernels, and orders of automorphism groups.  相似文献   

8.
The intersections of q-ary perfect codes are under study. We prove that there exist two q-ary perfect codes C 1 and C 2 of length N = qn + 1 such that |C 1 ? C 2| = k · |P i |/p for each k ∈ {0,..., p · K ? 2, p · K}, where q = p r , p is prime, r ≥ 1, $n = \tfrac{{q^{m - 1} - 1}}{{q - 1}}$ , m ≥ 2, |P i | = p nr(q?2)+n , and K = p n(2r?1)?r(m?1). We show also that there exist two q-ary perfect codes of length N which are intersected by p nr(q?3)+n codewords.  相似文献   

9.
Olof Heden 《Discrete Mathematics》2010,310(21):3052-3055
It is shown that there exists a perfect one-error-correcting binary code with a kernel which is not contained in any Hamming code.  相似文献   

10.
We are concerned with the problem of finding the polynomial with minimal uniform norm on among all polynomials of degree at most n and normalized to be 1 at c. Here, is a given ellipse with both foci on the real axis and c is a given real point not contained in . Problems of this type arise in certain iterative matrix computations, and, in this context, it is generally believed and widely referenced that suitably normalized Chebyshev polynomials are optimal for such constrained approximation problems. In this work, we show that this is not true in general. Moreover, we derive sufficient conditions which guarantee that Chebyshev polynomials are optimal. Also, some numerical examples are presented.  相似文献   

11.
The main result of the paper is the proof of the non-existence of a class of completely regular codes in certain distance-regular graphs. Corollaries of this result establish the non-existence of perfect and nearly perfect codes in the infinite families of distance-regular graphs J(2b + 1, b) and J(2b+2,b).  相似文献   

12.
Conflict-avoiding codes (CACs) have played an important role in multiple-access collision channel without feedback. The size of a CAC is the number of codewords which equals the number of potential users that can be supported in the system. A CAC with maximal code size is said to be optimal. The use of an optimal CAC enables the largest possible number of asynchronous users to transmit information efficiently and reliably. In this paper, the maximal sizes of both equidifference and non equidifference CACs of odd prime length and weight 3 are obtained. Meanwhile, the optimal constructions of both equidifference and non equidifference CACs are presented. The numbers of equidifference and non equidifference codewords in an optimal code are also obtained. Furthermore, a new modified recursive construction of CACs for any odd length is shown. Non equidifference codes can be constructed in this method.  相似文献   

13.
1. IntroductionIn ant omat ic--rep eat-- request (ARQ ) error- cont rol syst em 3 t he u-ndet ect ed error probability (UEP) of an error-detecting code is one of the most importallt performance characteristics. There are a number of papers dedicated to examining the error detection capabilityfor some well known classes of linear codes, suCh as Reed-Solomon codes, BCH codes andReed-Muller codes. For a general introduction to the theory of error detecting codes, werefer the readers to [if …  相似文献   

14.
We show that each q-ary constant-weight code of weight 3, minimum distance 4, and length m embeds in a q-ary 1-perfect code of length n = (q m ? 1)/(q ? 1).  相似文献   

15.
In this paper, we determine the smallest lengths of linear codes with some minimum distances. We construct a [g q (k, d) + 1, k, d] q code for sq k-1 − sq k-2 − q s  − q 2 + 1 ≤ dsq k-1 − sq k-2 − q s with 3 ≤ sk − 2 and qs + 1. Then we get n q (k, d) = g q (k, d) + 1 for (k − 2)q k-1 − (k − 1)q k-2 − q 2 + 1 ≤ d ≤ (k − 2)q k-1 − (k − 1)q k-2, k ≥ 6, q ≥ 2k − 3; and sq k-1 − sq k-2 − q s  − q + 1 ≤ dsq k-1 − sq k-2 − q s , s ≥ 2, k ≥ 2s + 1 and q ≥ 2s − 1. This work was partially supported by the Com2MaC-SRC/ERC program of MOST/KOSEF (grant # R11-1999-054) and was partially supported by the Korea Research Foundation Grant funded by the Korean Government(MOEHRD)(KRF-2005-214-C00175).  相似文献   

16.
17.
18.
An important problem on almost perfect nonlinear (APN) functions is the existence of APN permutations on even-degree extensions of F2 larger than 6. Browning et al. (2010) gave the first known example of an APN permutation on the degree-6 extension of F2. The APN permutation is CCZ-equivalent to the previously known quadratic Kim κ-function (Browning et al. (2009)). Aside from the computer based CCZ-inequivalence results on known APN functions on even-degree extensions of F2 with extension degrees less than 12, no theoretical CCZ-inequivalence result on infinite families is known. In this paper, we show that Gold and Kasami APN functions are not CCZ-equivalent to permutations on infinitely many even-degree extensions of F2. In the Gold case, we show that Gold APN functions are not equivalent to permutations on any even-degree extension of F2, whereas in the Kasami case we are able to prove inequivalence results for every doubly-even-degree extension of F2.  相似文献   

19.
Let be domains in . Under very mild conditions on we show that there exist holomorphic functions , defined on with the property that is nowhere extendible across , while the graph of over is not complete pluripolar in . This refutes a conjecture of Levenberg, Martin and Poletsky (1992).

  相似文献   


20.
First, we show that every coherent tree that contains a Countryman suborder is \({\mathbb {R}}\)-embeddable when restricted to a club. Then for a linear order O that can not be embedded into \(\omega \), there exists (consistently) an \({{\mathbb {R}}}\)-embeddable O-ranging coherent tree which is not Countryman. And for a linear order \(O'\) that can not be embedded into \({\mathbb {Z}}\), there exists (consistently) an \({\mathbb {R}}\)-embeddable \(O'\)-ranging coherent tree which contains no Countryman suborder. Finally, we will see that this is the best we can do.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号