首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 531 毫秒
1.
Ding and Feng (IEEE Trans Inform Theory 52(9):4229–4235, 2006, IEEE Trans Inform Theory 53(11):4245–4250, 2007) constructed series of (N, K) codebooks which meet or nearly meet the Welch bound \({\sqrt{\frac{N-K}{(N-1)K}}}\) by using difference set (DS) or almost difference set (ADS) in certain finite abelian group respectively. In this paper, we generalize the cyclotomic constructions considered in (IEEE Trans Inform Theory 52(9):4229–4235, 2006, IEEE Trans Inform Theory 53(11):4245–4250, 2007) and (IEEE Trans Inform Theory 52(5), 2052–2061, 2006) to present more series of codebooks which nearly meet the Welch bound under looser conditions than ones required by DS and ADS.  相似文献   

2.
《Journal of Complexity》2004,20(2-3):245-265
Dobbertin (Construction of bent functions and balanced Boolean functions with high nonlinearity, in: Fast Software Encryption, Lecture Notes in Computer Science, Vol. 1008, Springer, Berlin, 1994, pp. 61–74) introduced the normality of bent functions. His work strengthened the interest for the study of the restrictions of Boolean functions on k-dimensional flats providing the concept of k-normality. Using recent results on the decomposition of any Boolean functions with respect to some subspace, we present several formulations of k-normality. We later focus on some highly linear functions, bent functions and almost optimal functions. We point out that normality is a property for which these two classes are strongly connected. We propose several improvements for checking normality, again based on specific decompositions introduced in Canteaut et al. (IEEE Trans. Inform. Theory, 47(4) (2001) 1494), Canteaut and Charpin (IEEE Trans. Inform. Theory). As an illustration, we show that cubic bent functions of 8 variables are normal.  相似文献   

3.
One of the hardest problems in coding theory is to evaluate the covering radius of first order Reed–Muller codes RM(1,m), and more recently the balanced covering radius for crypto graphical purposes. The aim of this paper is to present some new results on this subject. We mainly study boolean functions invariant under the action of some finite groups, following the idea of Patterson and Wiedemann [The covering radius of the (1, 15) Reed-Muller Code is atleast 16276. IEEE Trans Inform Theory. Vol. 29 (1983) 354.]. Our method is Fourier transforms and our results are both theoretical and numerical.  相似文献   

4.
In this correspondence, we will introduce a new combinatorial method for a coordinate-wise construction of the homogeneous-weight preserving Gray map for Galois rings by using elementary tools from Affine Geometries. Our construction differs in the methods used from the algebraic constructions done previously in [M. Greferath, S.E. Schmidt, Gray Isometries for finite chain rings and a nonlinear ternary (36, 312, 15) code, IEEE Trans. Inform. Theory 45 (1999) 2522-2524; S. Ling, J.T. Blackford, Zpk+1-linear codes, IEEE Trans. Inform. Theory 48 (2002) 2592-2605].  相似文献   

5.
We construct a sequence of one-point codes from a tower of function fields whose relative minimum distances have a positive limit. Our tower is characterized by principal divisors. We determine completely the minimum distance of the codes from the first field of our tower. These results extend those of Stichtenoth [IEEE Trans Inform Theory (1988), 34(15):1345–1348], Yang and Kumar [Lecture Notes in Mathematics, 1518, (1991), Springer-Verlag, Berlin Hidelberg New York, pp. 99–107], and Garcia [Comm. Algebra, 20(12): 3683–3689]. As an application, we show that the minimum distance corresponds to the Feng–Rao bound.  相似文献   

6.
Recently, the weight distributions of the duals of the cyclic codes with two zeros have been obtained for several cases in Ding et al. (IEEE Trans Inform Theory 57(12), 8000–8006, 2011); Ma et al. (IEEE Trans Inform Theory 57(1):397–402, 2011); Wang et al. (Trans Inf Theory 58(12):7253–7259, 2012); and Xiong (Finite Fields Appl 18(5):933–945, 2012). In this paper we use the method developed in Xiong (Finite Fields Appl 18(5):933–945, 2012) to solve one more special case. We make extensive use of standard tools in number theory such as characters of finite fields, the Gauss sums and the Jacobi sums. The problem of finding the weight distribution is transformed into a problem of evaluating certain character sums over finite fields, which turns out to be associated with counting the number of points on some elliptic curves over finite fields. We also treat the special case that the characteristic of the finite field is 2.  相似文献   

7.
A new class of quaternary LCZ sequence sets   总被引:1,自引:0,他引:1  
In this article, we present a construction of low correlation zone (LCZ) sequence sets. This construction gives a new class of quaternary LCZ sequence sets. Furthermore, we observe a generalization of the LCZ sequence sets in Kim et al. (IEEE Trans Inform Theory 52(10):4607–4616, 2006) by using an orthogonal transformation. The obtained LCZ sequence sets are optimal with respect to the Tang, Fan and Matsufuji bound.  相似文献   

8.
Frequency-hopping multiple-access (FHMA) spread-spectrum communication systems employing multiple frequency shift keying as data modulation technique were investigated by Fuji-Hara, Miao and Mishima [R. Fuji-Hara, Y. Miao, M. Mishima, Optimal frequency hopping sequences: A combinatorial approach, IEEE Trans. Inform. Theory 50 (2004) 2408-2420] from a combinatorial approach, where a correspondence between frequency-hopping (FH) sequences and partition-type cyclic difference packings was established, and several combinatorial constructions were provided for FHMA systems with a single optimal FH sequence. In this paper, by means of this correspondence, we describe more combinatorial constructions for such optimal FH sequences. As a consequence, more new infinite series of optimal FH sequences are obtained.  相似文献   

9.
In this paper, by means of fractional differential–integral technique we give a new whitening filter formula for fractional Brownian motion defined by Mandelbrot and van Ness [Mandelbrot BB, van Ness JW. SIAM Rev 1968;10(4):422]. This new formula has potential use in time series analysis and in detecting signals as Barton and Vincent Poor [Barton RJ, Vincent Poor H. IEEE Trans Inform Theory 1988;34(5):943] have shown. Another potential application of it is behavioral finance, where the arbitrage opportunities that come from the reversal effect of stock returns, can be eliminated by such a formula.  相似文献   

10.
The optimal one-error-correcting codes of length 13 that are doubly shortened perfect codes are classified utilizing the results of [Östergård, P.R.J., Pottonen, O.: The perfect binary one-error-correcting codes of length 15: Part I??Classification. IEEE Trans. Inform. Theory 55, 4657?C4660 (2009)]; there are 117821 such (13,512,3) codes. By applying a switching operation to those codes, two more (13,512,3) codes are obtained, which are then not doubly shortened perfect codes.  相似文献   

11.
We investigate further the existence question regarding optimal (v, 4, 2, 1) optical orthogonal codes begun in Momihara and Buratti (IEEE Trans Inform Theory 55:514–523, 2009). We give some non-existence results for infinitely many values of v ≡ ± 3 (mod 9) and several explicit constructions for infinite classes of perfect optical orthogonal codes.  相似文献   

12.
13.
The only example of a binary doubly-even self-dual [120,60,20] code was found in 2005 by Gaborit et al. (IEEE Trans Inform theory 51, 402–407 2005). In this work we present 25 new binary doubly-even self-dual [120,60,20] codes having an automorphism of order 23. Moreover we list 7 self-dual [116,58,18] codes, 30 singly-even self-dual [96,48,16] codes and 20 extremal self-dual [92,46,16] codes. All codes are new and present different weight enumerators.   相似文献   

14.
It is well known that the ratio bound is an upper bound on the stability number α(G) of a regular graph G. In this note it is proved that, if G is a graph whose edge is a union of classes of a symmetric association scheme, the Delsarte’s linear programming bound can alternatively be stated as the minimum of a set of ratio bounds. This result follows from a recently established relationship between a set of convex quadratic bounds on α(G) and the number ?′(G), a well known variant of the Lovász theta number, which was introduced independently by Schrijver [A. Schrijver, A comparison of the Delsarte and Lovász bounds, IEEE Trans. Inform. Theory 25 (1979) 425-429] and McEliece et al. [R.J. McEliece, E.R. Rodemich, H.C. Rumsey Jr, The Lovász bound and some generalizations, J. Combin. Inform. System Sci. 3 (1978) 134-152].  相似文献   

15.
This work addresses the problem of regularized linear least squares (RLS) with non-quadratic separable regularization. Despite being frequently deployed in many applications, the RLS problem is often hard to solve using standard iterative methods. In a recent work [M. Elad, Why simple shrinkage is still relevant for redundant representations? IEEE Trans. Inform. Theory 52 (12) (2006) 5559–5569], a new iterative method called parallel coordinate descent (PCD) was devised. We provide herein a convergence analysis of the PCD algorithm, and also introduce a form of the regularization function, which permits analytical solution to the coordinate optimization. Several other recent works [I. Daubechies, M. Defrise, C. De-Mol, An iterative thresholding algorithm for linear inverse problems with a sparsity constraint, Comm. Pure Appl. Math. LVII (2004) 1413–1457; M.A. Figueiredo, R.D. Nowak, An EM algorithm for wavelet-based image restoration, IEEE Trans. Image Process. 12 (8) (2003) 906–916; M.A. Figueiredo, R.D. Nowak, A bound optimization approach to wavelet-based image deconvolution, in: IEEE International Conference on Image Processing, 2005], which considered the deblurring problem in a Bayesian methodology, also obtained element-wise optimization algorithms. We show that the last three methods are essentially equivalent, and the unified method is termed separable surrogate functionals (SSF). We also provide a convergence analysis for SSF. To further accelerate PCD and SSF, we merge them into a recently developed sequential subspace optimization technique (SESOP), with almost no additional complexity. A thorough numerical comparison of the denoising application is presented, using the basis pursuit denoising (BPDN) objective function, which leads all of the above algorithms to an iterated shrinkage format. Both with synthetic data and with real images, the advantage of the combined PCD-SESOP method is demonstrated.  相似文献   

16.
Pat Morin   《Computational Geometry》2008,39(3):229-235
A randomized linear expected-time algorithm for computing the zonoid depth [R. Dyckerhoff, G. Koshevoy, K. Mosler, Zonoid data depth: Theory and computation, in: A. Prat (Ed.), COMPSTAT 1996—Proceedings in Computational Statistics, Physica-Verlag, Heidelberg, 1996, pp. 235–240; K. Mosler, Multivariate Dispersion, Central Regions and Depth. The Lift Zonoid Approach, Lecture Notes in Statistics, vol. 165, Springer-Verlag, New York, 2002] of a point with respect to a fixed dimensional point set is presented.  相似文献   

17.
Ling and Solé [S. Ling, P. Solé, On the algebraic structure of quasi-cyclic codes I: Finite fields, IEEE Trans. Inform. Theory 47 (2001) 2751–2760] showed that every quasi-cyclic code C is constructed from shorter linear codes which are called the constituent codes of C. Given a quasi-cyclic code C of length ℓm and index with m being pairwise coprime to and the order of the field C is over, if all its constituent codes are cyclic with their zeroes having full multiplicity, C is then shown to be equivalent to a cyclic code whose zeroes with their multiplicities are fully described in terms of the nonzeroes of the cyclic constituent codes. The general transformation to obtain the above-mentioned equivalent cyclic code is also explicitly given. The approach adopted here follows the approach used by A.M.A. Natividad [A.M.A. Natividad, PhD thesis, Department of Mathematics, University of Philippines Diliman, The Philippines, 2004] and uses the generalized discrete Fourier transform on the algebraic structure of the class of quasi-cyclic codes developed by Ling and Solé [S. Ling, P. Solé, On the algebraic structure of quasi-cyclic codes I: Finite fields, IEEE Trans. Inform. Theory 47 (2001) 2751–2760].  相似文献   

18.
In Bernal and Simón (IEEE Trans Inf Theory 57(12):7990–7999, 2011) we introduced a technique to construct information sets for every semisimple abelian code by means of its defining set. This construction is a non trivial generalization of that given by Imai (Inf Control 34:1–21, 1977) in the case of binary two-dimensional cyclic (TDC) codes. On the other hand, Sakata (IEEE Trans Inf Theory IT-27(5):556–565, 1981) showed a method for constructing information sets for binary TDC codes based on the computation of Groebner basis which agrees with the information set obtained by Imai. Later, Chabanne (IEEE Trans Inf Theory 38(6):1826–1829, 1992) presents a generalization of the permutation decoding algorithm for binary abelian codes by using Groebner basis, and as a part of his method he constructs an information set following the same ideas introduced by Sakata. In this paper we show that, in the general case of q-ary multidimensional abelian codes, both methods, that based on Groebner basis and that defined in terms of the defining sets, also yield the same information set.  相似文献   

19.
We study the distribution of triples of codewords of codes and ordered codes. Schrijver [A. Schrijver, New code upper bounds from the Terwilliger algebra and semidefinite programming, IEEE Trans. Inform. Theory 51 (8) (2005) 2859–2866] used the triple distribution of a code to establish a bound on the number of codewords based on semidefinite programming. In the first part of this work, we generalize this approach for ordered codes. In the second part, we consider linear codes and linear ordered codes and present a MacWilliams-type identity for the triple distribution of their dual code. Based on the non-negativity of this linear transform, we establish a linear programming bound and conclude with a table of parameters for which this bound yields better results than the standard linear programming bound.  相似文献   

20.
The covering radius problem is a question in coding theory concerned with finding the minimum radius r such that, given a code that is a subset of an underlying metric space, balls of radius r over its code words cover the entire metric space. Klapper (IEEE Trans. Inform. Theory 43:1372–1377, 1997) introduced a code parameter, called the multicovering radius, which is a generalization of the covering radius. In this paper, we introduce an analogue of the multicovering radius for permutation codes (Des. Codes Cryptogr. 41:79–86, cf. 2006) and for codes of perfect matchings (cf. 2012). We apply probabilistic tools to give some lower bounds on the multicovering radii of these codes. In the process of obtaining these results, we also correct an error in the proof of the lower bound of the covering radius that appeared in (Des. Codes Cryptogr. 41:79–86, cf. 2006). We conclude with a discussion of the multicovering radius problem in an even more general context, which offers room for further research.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号