首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Algebraic geometric codes (or AG codes) provide a way to correct errors that occur during the transmission of digital information. AG codes on curves have been studied extensively, but much less work has been done for AG codes on higher dimensional varieties. In particular, we seek good bounds for the minimum distance.We study AG codes on anticanonical surfaces coming from blow-ups of P2 at points on a line and points on the union of two lines. We can compute the dimension of such codes exactly due to known results. For certain families of these codes, we prove an exact result on the minimum distance. For other families, we obtain lower bounds on the minimum distance.  相似文献   

2.
In this paper, codes over F5 with parameters [36, 18, 12], [48, 24, 15], [60, 30, 18], [64, 32, 18] and [76, 38, 21] which improve the previously known bounds on the minimum weight for linear codes over F5 are constructed from conference matrices. Through shortening and truncating, the above codes give numerous new codes over F5 which improve the previously known bounds on minimum weights.  相似文献   

3.
《Discrete Mathematics》2001,221(1-3):51-63
We investigate bit oriented decoder trellises for binary constrained codes. In particular, we are interested in destined trellises, where each state determines the last bits leading into the state and the first bits coming out of the state. A destined trellis can be constructed from a conventional trellis by state splitting. However, we demonstrate that integrating the design of destined encoders into the conventional encoder design process for constrained codes yields simpler trellises. We also prove lower bounds on the number of states in such trellises.  相似文献   

4.

We give two methods for constructing many linear complementary dual (LCD for short) codes from a given LCD code, by modifying some known methods for constructing self-dual codes. Using the methods, we construct binary LCD codes and quaternary Hermitian LCD codes, which improve the previously known lower bounds on the largest minimum weights.

  相似文献   

5.
On Construction of Optimal A2-Codes   总被引:2,自引:0,他引:2  
胡磊 《东北数学》2001,17(1):27-33
§ 1.Introduction Theauthenticationcodeswitharbitration (A2 codes)areintroducedbySimmons[1]andstudiedinmanypapers (forexample ,[1— 8] ) .Oneofthemostimportantproblemsinthestudyofauthenticationcodesistofindlowerboundsoncheatingprobabilitiesandonthenumbersofencodi…  相似文献   

6.
In this paper, new codes of dimension 8 are presented which give improved bounds on the maximum possible minimum distance of ternary linear codes. These codes belong to the class of quasi-twisted (QT) codes, and have been constructed using a stochastic optimization algorithm, tabu search. Twenty three codes are given which improve or establish the bounds for ternary codes. In addition, a table of upper and lower bounds for d 3(n, 8) is presented for n 200.  相似文献   

7.
In this article we consider linear codes coming from skew-symmetric determinantal varieties, which are defined by the vanishing of minors of a certain fixed size in the space of skew-symmetric matrices. In odd characteristic, the minimum distances of these codes are determined and a recursive formula for the weight of a general codeword in these codes is given.  相似文献   

8.
Quasi-cyclic codes have provided a rich source of good linear codes. Previous constructions of quasi-cyclic codes have been confined mainly to codes whose length is a multiple of the dimension. In this paper it is shown how searches may be extended to codes whose length is a multiple of some integer which is greater than the dimension. The particular case of 5-dimensional codes over GF(3) is considered and a number of optimal codes (i.e., [n, k, d]-codes having largest possible minimum distance d for given length n and dimension k) are constructed. These include ternary codes with parameters [45, 5, 28], [36, 5, 22], [42, 5, 26], [48, 5, 30] and [72, 5, 46], all of which improve on the previously best known bounds.This research has been supported by the British SERC.  相似文献   

9.
构作正交空间中的一类Cartesian认证码   总被引:3,自引:0,他引:3  
利用正交几何构作出一类Cartesian认证码,并且计算了它们的参数.假定信源和编码规则都按等概率分布选取,求出了认证码的成功的模仿攻击概率PI和成功的替换攻击概率PS.本文构作的Cartesian认证码的成功的模仿攻击概率PI均达到了其下界.  相似文献   

10.
We apply tools coming from singularity theory, as Hamburger–Noether expansions, and from valuation theory, as generating sequences, to explicitly describe order functions given by valuations of 2-dimensional function fields. We show that these order functions are simple when their ordered domains are isomorphic to the value semigroup algebra of the corresponding valuation. Otherwise, we provide parametric equations to compute them. In the first case, we construct, for each order function, families of error correcting codes which can be decodified by the Berlekamp–Massey–Sakata algorithm and we give bounds for their minimum distance depending on minimal sets of generators for the above value semigroup.  相似文献   

11.
The minimum number of rows in covering arrays (equivalently, surjective codes) and radius-covering arrays (equivalently, surjective codes with a radius) has been determined precisely only in special cases. In this paper, explicit constructions for numerous best known covering arrays (upper bounds) are found by a combination of combinatorial and computational methods. For radius-covering arrays, explicit constructions from covering codes are developed. Lower bounds are improved upon using connections to orthogonal arrays, partition matrices, and covering codes, and in specific cases by computation. Consequently for some parameter sets the minimum size of a covering array is determined precisely. For some of these, a complete classification of all inequivalent covering arrays is determined, again using computational techniques. Existence tables for up to 10 columns, up to 8 symbols, and all possible strengths are presented to report the best current lower and upper bounds, and classifications of inequivalent arrays.  相似文献   

12.
By considering a class of combinatorial structures, known as semipartial geometries, we define a class of low-density parity-check (LDPC) codes. We derive bounds on minimum distance, rank and girth for the codes from semipartial geometries, and present constructions and performance results for the classes of semipartial geometries which have not previously been proposed for use with iterative decoding.  相似文献   

13.
We study completely reducible fibers of pencils of hypersurfaces on Pn and associated codimension one foliations of Pn. Using methods from theory of foliations we obtain certain upper bounds for the number of these fibers as functions only of n. Equivalently this gives upper bounds for the dimensions of resonance varieties of hyperplane arrangements. We obtain similar bounds for the dimensions of the characteristic varieties of the arrangement complements.  相似文献   

14.
We investigate two extremal problems for polynomials giving upper bounds for spherical codes and for polynomials giving lower bounds for spherical designs, respectively. We consider two basic properties of the solutions of these problems. Namely, we estimate from below the number of double zeros and find zero Gegenbauer coefficients of extremal polynomials. Our results allow us to search effectively for such solutions using a computer. The best polynomials we have obtained give substantial improvements in some cases on the previously known bounds for spherical codes and designs. Some examples are given in Section 6. This research was partially supported by the Bulgarian NSF under Contract I-35/1994.  相似文献   

15.
Three binary fingerprinting code classes with properties similar to codes with the identifiable parent property are proposed. In order to compare such codes a new combinatorial quality measure is introduced. In the case of two cooperating pirates the measure is derived for the proposed codes, upper and lower bounds are constructed and the results of computer searches for good codes in the sense of the quality measure are presented. Some properties of the quality measure are also derived.AMS classification:94B60, 94B65  相似文献   

16.
In this paper we give a construction of T-shift synchronization codes, i.e. block codes capable of correcting synchronization shifts of length at most T in either direction (left or right). We prove lower and upper bounds on the maximal cardinality of such codes. An infinite number of the constructed codes turn out to be asymptotically optimal.  相似文献   

17.
The paper provides an upper bound on the size of a (generalized) separating hash family, a notion introduced by Stinson, Wei and Chen. The upper bound generalizes and unifies several previously known bounds which apply in special cases, namely bounds on perfect hash families, frameproof codes, secure frameproof codes and separating hash families of small type.  相似文献   

18.
In this paper we investigate known Singleton-like bounds in the Lee metric and characterize their extremal codes, which turn out to be very few. We then focus on Plotkin-like bounds in the Lee metric and present a new bound that extends and refines a previously known, and out-performs it in the case of non-free codes. We then compute the density of extremal codes with regard to the new bound. Finally we fill a gap in the characterization of Lee-equidistant codes.  相似文献   

19.
Two methods are presented to construct some vertex-transitive and 2-transitive partitions of the n-cube into perfect codes. Some lower bounds are given on the number of transitive, vertex-transitive, and 2-transitive partitions of the n-cube into perfect codes.  相似文献   

20.
We investigate universal bounds on spherical codes and spherical designs that could be obtained using Delsartes linear programming methods. We give a lower estimate for the LP upper bound on codes, and an upper estimate for the LP lower bound on designs. Specifically, when the distance of the code is fixed and the dimension goes to infinity, the LP upper bound on codes is at least as large as the average of the best known upper and lower bounds. When the dimension n of the design is fixed, and the strength k goes to infinity, the LP bound on designs turns out, in conjunction with known lower bounds, to be proportional to kn-1.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号