共查询到5条相似文献,搜索用时 0 毫秒
1.
Let Kq(n,R) denote the minimum number of codewords in any q-ary code of length n and covering radius R. We collect lower and upper bounds for Kq(n,R) where 6 ≤ q ≤ 21 and R ≤ 3. For q ≤ 10, we consider lengths n ≤ 10, and for q ≥ 11, we consider n ≤ 8. This extends earlier results, which have been tabulated for 2 ≤ q ≤ 5. We survey known bounds and obtain some new results as well, also for s-surjective codes, which are closely related to covering codes and utilized in some of the constructions.AMS Classification: 94B75, 94B25, 94B65Gerzson Kéri - Supported in part by the Hungarian National Research Fund, Grant No. OTKA-T029572.Patric R. J. Östergård - Supported in part by the Academy of Finland, Grants No. 100500 and No. 202315. 相似文献
2.
We denote by mr,q(s) the minimum value of f for which an {f, r-2+s ; r,q }-minihyper exists for r 3, 1 s q–1, where j=(qj+1–1)/(q–1). It is proved that m3,q(s)=1(1+s) for many cases (e.g., for all q 4 when
) and that mr,q(s) r-1+s1+q for 1 s q – 1,~q 3,~r 4. The nonexistence of some [n,k,n+s–qk-2]q codes attaining the Griesmer bound is given as an application.AMS classification: 94B27, 94B05, 51E22, 51E21 相似文献
3.
The rank of a q-ary code C is the dimension of the subspace spanned by C. The kernel of a q-ary code C of length n can be defined as the set of all translations leaving C invariant. Some relations between the rank and the dimension of the kernel of q-ary 1-perfect codes, over
as well as over the prime field
, are established. Q-ary 1-perfect codes of length n=(qm − 1)/(q − 1) with different kernel dimensions using switching constructions are constructed and some upper and lower bounds for the dimension of the kernel, once the rank is given, are established.Communicated by: I.F. Blake 相似文献
4.
Massimiliano Sala 《Designs, Codes and Cryptography》2003,30(2):159-168
To obtain upper bounds on the distance of a binary linear code, many probabilistic algorithms have been proposed. The author presents a general variation to these algorithms, specific for cyclic codes, which is shown to be an improvement. As an example, the author optimizes Brouwer's algorithm to find the best upper bounds on the dual distance of BCH[255,k,d]. 相似文献
5.
Horst Trinker 《Designs, Codes and Cryptography》2009,50(2):229-234
In (Can J Math 51(2):326–346, 1999), Martin and Stinson provide a generalized MacWilliams identity for linear ordered orthogonal arrays and linear ordered codes (introduced by Rosenbloom and Tsfasman (Prob Inform Transm 33(1):45–52, 1997) as “codes for the m-metric”) using association schemes. We give an elementary proof of this generalized MacWilliams identity using group characters and use it to derive an explicit formula for the dual type distribution of a linear ordered code or orthogonal array. 相似文献