共查询到20条相似文献,搜索用时 15 毫秒
1.
《Journal of Mathematical Analysis and Applications》1987,126(1):70-77
The author improves some recent results due to Shigeyoshi Owa (Tamkang J. Math., 14 1983, 15–21) concerning the quasi-Hadamard product of certain starlike and convex univalent functions. 相似文献
2.
In this paper, we introduce new subclasses of analytic and univalent functions and establish certain results concerning the quasi-Hadamard product of functions in these subclasses. Our result includes several previous known results as special cases. 相似文献
3.
Codes over p-adic numbers and over integers modulo pd of block length pm invariant under the full affine group AGLm(Fp) are described. 相似文献
4.
引进了去心圆盘U~*={z:0|z|1}内的亚纯倒星象函数和倒凸象函数的某些新子类,研究了该类中函数的拟Hadamard卷积,所得结果推广了前人的某些工作. 相似文献
5.
首先利用广义拟-Hadamard卷积引入一个广义积分算子;其次,应用两个经典不等式和系数不等式研究广义积分算子及其特殊殊算子在某些非标准化广义解析函数类上的封闭性质. 相似文献
6.
We describe a code lengthening technique that uses unequal error protection codes as suffix codes and combine it with iteration of the conventional Construction X. By applying this technique to BCH codes, we obtain five new binary codes, 13 new ternary codes, and 13 new quarternary codes. An improvement of Construction XX yields two new ternary codes. 相似文献
7.
We consider generalized algebraic-geometry codes, based on places of the same degree of a fixed algebraic function field over a finite field. In this note, using a method similar to the Justesen’s one, we construct a family of such codes which is asymptotically good.Communicated by: D. Jangnickel 相似文献
8.
9.
It is shown how ternary BCH codes can be lengthened to get linear codes with covering radius 2. The family obtained has the ternary Golay code as its first code, contains codes with record-breaking parameters, and has a good asymptotic behavior. The ternary Golay code is further used to obtain short proofs for the best known upper bounds for the football pool problem for 11 and 12 matches. 相似文献
10.
M. A. Shokrollahi 《Designs, Codes and Cryptography》1996,9(2):203-213
Let p be an odd prime and
be a primitive p th root of unity over
. The Galois group G of
over
is a cyclic group of order p-1. The integral group ring
[G] contains the Stickelberger ideal S
p
which annihilates the ideal class group of K. In this paper we investigate the parameters of cyclic codes S
p
(q) obtained as reductions of S
p
modulo primes q which we call Stickelberger codes. In particular, we show that the dimension of S
p
(p) is related to the index of irregularity of p, i.e., the number of Bernoulli numbers B
2k
,
, which are divisible by p. We then develop methods to compute the generator polynomial of S
p
(p). This gives rise to anew algorithm for the computation of the index of irregularity of a prime. As an application we show that 20,001,301 is regular. This significantly improves a previous record of 8,388,019 on the largest explicitly known regular prime. 相似文献
11.
The Goethals code is a binary nonlinear code of length 2m+1 which has
codewords and minimum Hamming distance 8 for any odd
. Recently, Hammons et. al. showed that codes with the same weight distribution can be obtained via the Gray map from a linear code over Z
4of length 2m and Lee distance 8. The Gray map of the dual of the corresponding Z
4 code is a Delsarte-Goethals code. We construct codes over Z
4 such that their Gray maps lead to codes with the same weight distribution as the Goethals codes and the Delsarte-Goethals codes. 相似文献
12.
Vince Grolmusz 《Designs, Codes and Cryptography》2006,38(3):363-372
We define, construct and sketch possible applications of a new class of non-linear codes: co-orthogonal codes, with possible
applications in cryptography and parallel processing. We also describe a fast and general method for generating (non-linear)
codes with prescribed dot-products with the help of multi-linear polynomials. 相似文献
13.
K. D. Tocher 《The Journal of the Operational Research Society》1966,17(2):139-159
The mathematical theory of Error-Protected Codes is a specialized offshoot of Shannon's Communication Theory and is of practical interest to operational research workers because of the increasing interest in operational research circles in on-line computer control of production systems and, from the standpoint of methodology, as a fascinating example of the compromise necessary in a theory to make it both realistic and useful.The paper shows how the natural structure of binary signalling alphabets is mapped on to mathematical structures, such as groups and rings, and the typical examples of the mathematical techniques that have been evolved are illustrated.The limitation of this theory, that it assumes context-free messages, is emphasized by an example of a code, which is made more powerful by consideration of the context of the symbols appearing in a message. 相似文献
14.
We show that almost all codes satisfy an antichain condition. This states that the minimum length of a two dimensional subcode of a code C increases if the subcode is constrained to contain a minimum weight codeword. In particular, almost no code satisfies the chain condition. In passing, we study the typical behaviour of codes with respect to generalized distances and show that almost all lie on a generalized Varshamov-Gilbert bound. 相似文献
15.
We show how to get a 1-1 correspondence between projective linear codes and 2-weight linear codes. A generalization of the construction gives rise to several new ternary linear codes of dimension six. 相似文献
16.
研究给出了一类基于循环码的常重复合码的构造,并利用指数和计算其参数.与相关的常重复合码相比,该码具有更多的码字,且渐近性较好. 相似文献
17.
《Finite Fields and Their Applications》2000,6(3):255-281
Classical Goppa codes are a special case of Alternant codes. First we prove that the parity-check subcodes of Goppa codes and the extended Goppa codes are both Alternant codes. Before this paper, all known cyclic Goppa codes were some particular BCH codes. Many families of Goppa codes with a cyclic extension have been found. All these cyclic codes are in fact Alternant codes associated to a cyclic Generalized Reed–Solomon code. In (1989, J. Combin. Theory Ser. A 51, 205–220) H. Stichtenoth determined all cyclic extended Goppa codes with this property. In a recent paper (T. P. Berger, 1999, in “Finite Fields: Theory, Applications and Algorithms (R. Mullin and G. Mullen, Eds.), pp. 143–154, Amer. Math. Soc., Providence), we used some semi-linear transformations on GRS codes to construct cyclic Alternant codes that are not associated to cyclic GRS codes. In this paper, we use these results to construct cyclic Goppa codes that are not BCH codes, new families of Goppa codes with a cyclic extension, and some families of non-cyclic Goppa codes with a cyclic parity-check subcode. 相似文献
18.
Almost MDS Codes 总被引:2,自引:0,他引:2
Mario A. de Boer 《Designs, Codes and Cryptography》1996,9(2):143-155
MDS codes are codes meeting the Singleton bound. Both for theory and practice, these codes are very important and have been studied extensively. Codes near this bound, but not attaining it, have had far less attention. In this paper we study codes that almost reach the Singleton bound. 相似文献
19.
Extending MDS Codes 总被引:1,自引:0,他引:1
T. L. Alderson 《Annals of Combinatorics》2005,9(2):125-135
A q-ary (n, k)-MDS code, linear or not, satisfies n ≤ q + k − 1. A code meeting this bound is said to have maximum length. Using purely combinatorial methods we show that an MDS code with n = q + k − 2 can be uniquely extended to a maximum length code if and only if q is even. This result is best possible in the sense that there is, for example, a non-extendable 4-ary (5, 4)-MDS code. It may be that the proof of our result is as interesting as the result itself. We provide a simple necessary and sufficient condition
for code extendability. In future work, this condition might be suitably modified to give an extendability condition for arbitrary (shorter) MDS codes.Received December 1, 2003 相似文献