首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Linear codes with a few weights have been widely investigated in recent years. In this paper, we mainly use Gauss sums to represent the Hamming weights of a class of q-ary linear codes under some certain conditions, where q is a power of a prime. The lower bound of its minimum Hamming distance is obtained. In some special cases, we evaluate the weight distributions of the linear codes by semi-primitive Gauss sums and obtain some one-weight, two-weight linear codes. It is quite interesting that we find new optimal codes achieving some bounds on linear codes. The linear codes in this paper can be used in secret sharing schemes, authentication codes and data storage systems.  相似文献   

2.
In this work, doubly extended linearized Reed–Solomon codes and triply extended Reed–Solomon codes are generalized. We obtain a general result in which we characterize when a multiply extended code for a general metric attains the Singleton bound. We then use this result to obtain several families of doubly extended and triply extended maximum sum-rank distance (MSRD) codes that include doubly extended linearized Reed–Solomon codes and triply extended Reed–Solomon codes as particular cases. To conclude, we discuss when these codes are one-weight codes.  相似文献   

3.
A new public key cryptosystem was introduced by Wu and Dawson at the Fourth International Conference on Finite Fields (Fq4). This scheme is similar to the McEliece public key cryptosystem, in the sense that it also can be described in terms of linear error-correcting codes over finite fields. However, in contrast to the McEliece scheme, the security of the Wu–Dawson system is not based on a decoding problem which is assumed to be intractable but on the theory of generalized inverses of matrices over finite fields. The authors compare their scheme with the McEliece scheme and claim that the same level of security can be obtained using smaller codes, therefore reducing the key size. In this note it will be shown that the Wu–Dawson scheme is insecure, i.e., a trapdoor can be computed efficiently from the knowledge of the public key.  相似文献   

4.
We continue the investigation of locally testable codes, i.e., error‐correcting codes for which membership of a given word in the code can be tested probabilistically by examining it in very few locations. We give two general results on local testability: First, motivated by the recently proposed notion of robust probabilistically checkable proofs, we introduce the notion of robust local testability of codes. We relate this notion to a product of codes introduced by Tanner and show a very simple composition lemma for this notion. Next, we show that codes built by tensor products can be tested robustly and somewhat locally by applying a variant of a test and proof technique introduced by Raz and Safra in the context of testing low‐degree multivariate polynomials (which are a special case of tensor codes). Combining these two results gives us a generic construction of codes of inverse polynomial rate that are testable with poly‐logarithmically many queries. We note that these locally testable tensor codes can be obtained from any linear error correcting code with good distance. Previous results on local testability, albeit much stronger quantitatively, rely heavily on algebraic properties of the underlying codes. © 2006 Wiley Periodicals, Inc. Random Struct. Alg., 2006  相似文献   

5.
We show that a matroid is representable over GF(3) if and only if no minor is the five-point line or the Fano matroid, or their duals. Tutte's famous characterization of the regular matroids is a corollary. A key lemma states that two representations of the same matroid in the same vector space over GF(3) may be transformed one into the other by inverting some points through the origin and taking a linear transformation; no result of this kind holds in larger fields.  相似文献   

6.
王紫  王玉文 《数学学报》2018,61(5):751-760
本文给出Banach空间中闭线性算子的Moore-Penrose有界拟线性投影广义逆的一种新的扰动分析方法.运用的核心工具是广义Neumann引理,这与以往其他结果中所运用的广义Banach引理的处理方法极为不同,得到了闭线性算子的MoorePenrose有界拟线性广义逆的又一个扰动定理及三个误差界不等式.  相似文献   

7.
记R=F_2+uF_2+u~2F_2,定义了环R上码字的李重量分布的概念,构造了从R~n到F_2~(3n)的Gray映射φ.通过对环R上线性码及其对偶码生成矩阵的研究,证明了环R上线性码及其对偶码的Gray象是F_2上的对偶码.利用域F_2上线性码及其对偶码的重量分布关系,得到了环R上线性码及其对偶码关于李重量分布的MacWilliams恒等式.  相似文献   

8.
9.
An alternative proof is presented for a key lemma arising in the study of the linear and non-linear stability of Runge-Kutta methods.  相似文献   

10.
One of the main results says that ifC is a binary linear code of length 4t and of dimension greater than 2t, thenC contains a word of weight 2t and this bound is best possible. Several results of similar flavor are established both for linear and non-linear codes. For the proof a lemma introducing the binormal forms of binary matrices is needed. The results are applied to determine the coset chromatic number of Hadamard graphs, to solve a problem of Galvin and to give a short proof of a theorem of Gleason on self-dual doubly-even codes.  相似文献   

11.
In this paper, three classes of binary linear codes with few weights are proposed from vectorial Boolean power functions, and their weight distributions are completely determined by solving certain equations over finite fields. In particular, a class of simplex codes and a class of first-order Reed-Muller codes can be obtained from our construction by taking the identity map, whose dual codes are Hamming codes and extended Hamming codes, respectively.  相似文献   

12.
We define alternant codes over a commutative ring R and a corresponding key equation. We show that when the ring is a domain, e.g. the p-adic integers, the error-locator polynomial is the unique monic minimal polynomial (equivalently, the unique shortest linear recurrence) of the finite sequence of syndromes and that it can be obtained by Algorithm MR of Norton.WhenR is a local ring, we show that the syndrome sequence may have more than one (monic) minimal polynomial, but that all the minimal polynomials coincide modulo the maximal ideal ofR . We characterise the set of minimal polynomials when R is a Hensel ring. We also apply these results to decoding alternant codes over a local ring R: it is enough to find any monic minimal polynomial over R and to find its roots in the residue field. This gives a decoding algorithm for alternant codes over a finite chain ring, which generalizes and improves a method of Interlando et. al. for BCH and Reed-Solomon codes over a Galois ring.  相似文献   

13.
Described in this paper are two different methods of forcing greedy codesto be linear over arbitrary finite fields. Both methods are generalizationsof the binary B-greedy codes as well as the triangular greedycodes over arbitrary fields. One method generalizes to arbitrary orderingsover arbitrary finite fields while the other method generalizes theB-greedy codes to linear codes over arbitrary finite fields.Examples of the first method are computed for triangular greedy codes. Theseexamples give codes similar to triangular codes from B-orderings.Both methods are shown to be substantially different.  相似文献   

14.
In this paper, we consider linear codes over finite chain rings. We present a general mapping which produces codes over smaller alphabets. Under special conditions, these codes are linear over a finite field. We introduce the notion of a linearly representable code and prove that certain MacDonald codes are linearly representable. Finally, we give examples for good linear codes over finite fields obtained from special multisets in projective Hjelmslev planes.  相似文献   

15.
Designs, Codes and Cryptography - $${\mathbb {Z}}_{p^s}$$ -additive codes of length n are subgroups of $${\mathbb {Z}}_{p^s}^n$$ , and can be seen as a generalization of linear codes over...  相似文献   

16.
In coding theory, quasi-twisted (QT) codes form an important class of codes which has been extensively studied. We decompose a QT code to a direct sum of component codes – linear codes over rings. Furthermore, given the decomposition of a QT code, we can describe the decomposition of its dual code. We also use the generalized discrete Fourier transform to give the inverse formula for both the nonrepeated-root and repeated-root cases. Then we produce a formula which can be used to construct a QT code given the component codes.  相似文献   

17.
18.
Ben‐Sasson and Sudan (RSA 2006) showed that taking the repeated tensor product of linear codes with very large distance results in codes that are locally testable. Due to the large distance requirement the associated tensor products could be applied only over sufficiently large fields. Then Meir (SICOMP 2009) used this result to present a combinatorial construction of locally testable codes with largest known rate. As a consequence, this construction was obtained over sufficiently large fields. In this paper we improve the result of Ben‐Sasson and Sudan and show that for any linear codes the associated tensor products are locally testable. Consequently, the construction of Meir can be taken over any field, including the binary field. Moreover, a combination of our result with the result of Spielman (IEEE IT, 1996) implies a construction of linear codes (over any field) that combine the following properties:
  • have constant rate and constant relative distance;
  • have blocklength n and are testable with n? queries, for any constant ? > 0;
  • linear time encodable and linear‐time decodable from a constant fraction of errors.
Furthermore, a combination of our result with the result of Guruswami et al. (STOC 2009) implies a similar corollary for list‐decodable codes. © 2013 Wiley Periodicals, Inc. Random Struct. Alg., 46, 572–598, 2015  相似文献   

19.
We construct new linear two-weight codes over the finite field with q elements. To do so we solve the equivalent problem of finding point sets in the projective geometry with certain intersection properties. These point sets are in bijection to solutions of a Diophantine linear system of equations. To reduce the size of the system of equations we restrict the search for solutions to solutions with special symmetries.Two-weight codes can be used to define strongly regular graphs. We give tables of the two-weight codes and the corresponding strongly regular graphs. In some cases we find new distance-optimal two-weight codes and also new strongly regular graphs.  相似文献   

20.
V. Jeyakumar  G. Li 《Positivity》2011,15(2):331-342
We present a robust Farkas lemma, which provides a new generalization of the celebrated Farkas lemma for linear inequality systems to uncertain conical linear systems. We also characterize the robust Farkas lemma in terms of a generalized characteristic cone. As an application of the robust Farkas lemma we establish a characterization of uncertainty-immunized solutions of conical linear programming problems under uncertainty.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号