首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
2.
We give a new concatenated type construction for linear codes with complementary dual (LCD) over small finite fields. In this construction,we need a special class of inner codes that we call isometry codes. Our construction generalizes a recent construction of Carlet et al. (2014–2016) and of Güneri et al. (2016). In particular, it allows us to construct LCD codes with improved parameters directly.  相似文献   

3.
4.
Ruihu Li 《Discrete Mathematics》2008,308(9):1603-1611
In this paper, we construct a large number of good quantum codes of minimum distances five and six by Steane's Construction. Our methods involve the study of the check matrices of binary extended BCH-codes, together with puncturing and combining such matrices.  相似文献   

5.
6.
Olof Heden 《Discrete Mathematics》2010,310(21):3052-3055
It is shown that there exists a perfect one-error-correcting binary code with a kernel which is not contained in any Hamming code.  相似文献   

7.
An index ?, length m? quasi-cyclic code can be viewed as a cyclic code of length m over the field Fq? via a basis of the extension Fq?Fq. However, this cyclic code is only linear over Fq, making it an additive cyclic code, or an Fq-linear cyclic code, over the alphabet Fq?. This approach was recently used in Shi et al. (2017) [16] to study a class of quasi-cyclic codes, and more importantly in Shi et al. (2017) [17] to settle a long-standing question on the asymptotic performance of cyclic codes. Here, we answer one of the problems posed in these two articles, and characterize those quasi-cyclic codes which have Fq?-linear cyclic images under a basis of the extension Fq?Fq. Our characterizations are based on the module structure of quasi-cyclic codes, as well as on their CRT decompositions into constituents. In the case of a polynomial basis, we characterize the constituents by using the theory of invariant subspaces of operators. We also observe that analogous results extend to the case of quasi-twisted codes.  相似文献   

8.
黄宝生 《数学研究》1998,31(2):200-203,224
本文研究了具有三角形波基函数的Bernstein-Fan值算子的收敛定理和逼近阶估计,并给出了它的算法程序。  相似文献   

9.
J. Borges 《Discrete Mathematics》2008,308(16):3508-3525
Binary non-antipodal completely regular codes are characterized. Using a result on nonexistence of nontrivial binary perfect codes, it is concluded that there are no unknown nontrivial non-antipodal completely regular binary codes with minimum distance d?3. The only such codes are halves and punctured halves of known binary perfect codes. Thus, new such codes with covering radius ρ=6 and 7 are obtained. In particular, a half of the binary Golay [23,12,7]-code is a new binary completely regular code with minimum distance d=8 and covering radius ρ=7. The punctured half of the Golay code is a new completely regular code with minimum distance d=7 and covering radius ρ=6. The new code with d=8 disproves the known conjecture of Neumaier, that the extended binary Golay [24,12,8]-code is the only binary completely regular code with d?8. Halves of binary perfect codes with Hamming parameters also provide an infinite family of binary completely regular codes with d=4 and ρ=3. Puncturing of these codes also provide an infinite family of binary completely regular codes with d=3 and ρ=2. Both these families of codes are well known, since they are uniformly packed in the narrow sense, or extended such codes. Some of these completely regular codes are new completely transitive codes.  相似文献   

10.
11.
12.
13.
14.
In this paper we consider the problem of finding zeroes of a continuous functionf from a convex, compact subsetU of ℝ n to ℝ n . In the first part of the paper it is proved thatf has a computable zero iff:C n →ℝ n satisfies the nonparallel condition for any two antipodal points on bdC n, i.e. if for anyx∈bdC n ,f(x)≠αf(−x), α≥0, holds. Therefore we describe a simplicial algorithm to approximate such a zero. It is shown that generally the degree of the approximate zero depends on the number of reflection steps made by the algorithm, i.e. the number of times the algorithm switches from a face τ on bdC n to the face −τ. Therefore the index of a terminal simplex σ is defined which equals the local Brouwer degree of the function if σ is full-dimensional. In the second part of the paper the algorithm is used to generate possibly several approximate zeroes off. Two sucessive solutions may have both the same or opposite degrees, again depending on the number of reflection steps. By extendingf:U→ℝ n to a function g from a cube containingU to ℝ n , the procedure can be applied to any continuous functionf without having any information about the global and local Brouwer degrees a priori.  相似文献   

15.
16.
A binary Gray code G(n) of length n, is a list of all 2nn-bit codewords such that successive codewords differ in only one bit position. The sequence of bit positions where the single change occurs when going to the next codeword in G(n), denoted by S(n)?s1,s2,…,s2n-1, is called the transition sequence of the Gray code G(n). The graph GG(n) induced by a Gray code G(n) has vertex set {1,2,…,n} and edge set {{si,si+1}:1?i?2n-2}. If the first and the last codeword differ only in position s2n, the code is cyclic and we extend the graph by two more edges {s2n-1,s2n} and {s2n,s1}. We solve a problem of Wilmer and Ernst [Graphs induced by Gray codes, Discrete Math. 257 (2002) 585-598] about a construction of an n-bit Gray code inducing the complete graph Kn. The technique used to solve this problem is based on a Gray code construction due to Bakos [A. Ádám, Truth Functions and the Problem of their Realization by Two-Terminal Graphs, Akadémiai Kiadó, Budapest, 1968], and which is presented in D.E. Knuth [The Art of Computer Programming, vol. 4, Addison-Wesley as part of “fascicle” 2, USA, 2005].  相似文献   

17.
Let V be an n-dimensional vector space over the finite field consisting of q elements and let Γk(V) be the Grassmann graph formed by k-dimensional subspaces of V, 1<k<n1. Denote by Γ(n,k)q the restriction of Γk(V) to the set of all non-degenerate linear [n,k]q codes. We show that for any two codes the distance in Γ(n,k)q coincides with the distance in Γk(V) only in the case when n<(q+1)2+k2, i.e. if n is sufficiently large then for some pairs of codes the distances in the graphs Γk(V) and Γ(n,k)q are distinct. We describe one class of such pairs.  相似文献   

18.
19.
20.
On the two-dimensional Knapsack Problem   总被引:1,自引:0,他引:1  
We address the two-dimensional Knapsack Problem (2KP), aimed at packing a maximum-profit subset of rectangles selected from a given set into another rectangle. We consider the natural relaxation of 2KP given by the one-dimensional KP with item weights equal to the rectangle areas, proving the worst-case performance of the associated upper bound, and present and compare computationally four exact algorithms based on the above relaxation, showing their effectiveness.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号