共查询到20条相似文献,搜索用时 0 毫秒
1.
《Discrete Mathematics》2023,346(7):113391
Symbol-pair codes are proposed to guard against pair-errors in symbol-pair read channels. The minimum symbol-pair distance is of significance in determining the error-correcting capability of a symbol-pair code. One of the central themes in symbol-pair coding theory is the constructions of symbol-pair codes with the largest possible minimum symbol-pair distance. Maximum distance separable (MDS) and almost maximum distance separable (AMDS) symbol-pair codes are optimal and sub-optimal regarding the Singleton bound, respectively. In this paper, six new classes of AMDS symbol-pair codes are explicitly constructed through repeated-root cyclic codes. Remarkably, one class of such codes has unbounded lengths and the minimum symbol-pair distance of another class can reach 13. 相似文献
2.
We introduce new classes of 2-weight cyclic codes which are direct sums of 1-weight irreducible cyclic codes
相似文献
5.
7.
After several remarks on two-weight irreducible cyclic codes, we introduce a family of projective two-weight cyclic codes and a family of projective two-weight constacyclic codes and we discuss the existence of such codes. 相似文献
8.
In this paper, by analyzing the solutions of certain equations over , we present four classes of optimal ternary cyclic codes with parameters . It is shown that some recent work on this class of optimal ternary cyclic codes are special cases of our results. 相似文献
9.
In this paper we initiate the study of cyclic algebraic geometry codes. We give conditions to construct cyclic algebraic geometry codes in the context of algebraic function fields over a finite field by using their group of automorphisms. We prove that cyclic algebraic geometry codes constructed in this way are closely related to cyclic extensions. We also give a detailed study of the monomial equivalence of cyclic algebraic geometry codes constructed with our method in the case of a rational function field. 相似文献
10.
12.
In this paper, a Roos like bound on the minimum distance for skew cyclic codes over a general field is provided. The result holds in the Hamming metric and in the rank metric. The proofs involve arithmetic properties of skew polynomials and an analysis of the rank of parity-check matrices. For the rank metric case, a way to arithmetically construct codes with a prescribed minimum rank distance, using the skew Roos bound, is also given. Moreover, some examples of MDS codes and MRD codes over finite fields are built, using the skew Roos bound. 相似文献
13.
14.
We present a new construction for (n,w,λ)-optical orthogonal codes (OOCs). The construction is pleasingly simple, where codewords correspond to arcs, specifically normal rational curves. Moreover, our construction yields for each λ>1 an infinite family of OOCs which are asymptotically optimal (with respect to the Johnson bound). 相似文献
15.
16.
17.
Bing Wang 《Discrete Mathematics》2009,309(13):4555-4563
A cyclic edge-cut of a graph G is an edge set, the removal of which separates two cycles. If G has a cyclic edge-cut, then it is said to be cyclically separable. For a cyclically separable graph G, the cyclic edge-connectivity cλ(G) is the cardinality of a minimum cyclic edge-cut of G. In this paper, we first prove that for any cyclically separable graph G, , where ω(X) is the number of edges with one end in X and the other end in V(G)?X. A cyclically separable graph G with cλ(G)=ζ(G) is said to be cyclically optimal. The main results in this paper are: any connected k-regular vertex-transitive graph with k≥4 and girth at least 5 is cyclically optimal; any connected edge-transitive graph with minimum degree at least 4 and order at least 6 is cyclically optimal. 相似文献
18.
Relative generalized Hamming weights (RGHWs) of a linear code with respect to a linear subcode determine the security of the linear ramp secret sharing scheme based on the linear codes. They can be used to express the information leakage of the secret when some keepers of shares are corrupted. Cyclic codes are an interesting type of linear codes and have wide applications in communication and storage systems. In this paper, we investigate the RGHWs of cyclic codes of two nonzeros with respect to its irreducible cyclic subcodes. We give two formulae for RGHWs of the cyclic codes. As applications of the formulae, explicit examples are computed. Moreover, RGHWs of cyclic codes in the examples are very large, comparing with the generalized Plotkin bound of RGHWs. So it guarantees very high security for the secret sharing scheme based on the dual codes. 相似文献
19.
Additive cyclic codes over Galois rings were investigated in Cao et al. (2015). In this paper, we investigate the same problem but over a more general ring family, finite commutative chain rings. When we focus on non-Galois finite commutative chain rings, we observe two different kinds of additivity. One of them is a natural generalization of the study in Cao et al. (2015), whereas the other one has some unusual properties especially while constructing dual codes. We interpret the reasons of such properties and illustrate our results giving concrete examples. 相似文献
20.
《Discrete Mathematics》2020,343(5):111788
Subspace codes have attracted much attention in recent years due to their applications to error correction in random network coding. In this paper, we construct several kinds of large cyclic subspace codes via Sidon spaces and large subspace codes via unions of some Sidon spaces. Therefore, some known results are extended. 相似文献