首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 546 毫秒
1.
2.
We consider the weight distribution of the binary cyclic code of length 2n−12n1 with two zeros αabαa,αb. Our proof gives information in terms of the zeta function of an associated variety. We carry out an explicit determination of the weight distribution in two cases, for the cyclic codes with zeros α35α3,α5 and α,α11α,α11. These are the smallest cases of two infinite families where finding the weight distribution is an open problem. Finally, an interesting application of our methods is that we can prove that these two codes have the same weight distribution for all odd nn.  相似文献   

3.
Some observations on products of primitive words are discussed. By these results, alternative proof is given for the Lyndon–Schützenberger Theorem, which says that every solution of the equation ambn=ckambn=ck over Σ*Σ* is trivial.  相似文献   

4.
The software package Qcompiler (Chen and Wang 2013) provides a general quantum compilation framework, which maps any given unitary operation into a quantum circuit consisting of a sequential set of elementary quantum gates. In this paper, we present an extended software OptQC  , which finds permutation matrices PP and QQ for a given unitary matrix UU such that the number of gates in the quantum circuit of U=QTPTUPQU=QTPTUPQ is significantly reduced, where UU is equivalent to UU up to a permutation and the quantum circuit implementation of each matrix component is considered separately. We extend further this software package to make use of high-performance computers with a multiprocessor architecture using MPI. We demonstrate its effectiveness in reducing the total number of quantum gates required for various unitary operators.  相似文献   

5.
The present paper investigates two-parameter families of spheres in R3R3 and their corresponding two-dimensional surfaces ΦΦ in R4R4. Considering a rational surface ΦΦ in R4R4, the envelope surface ΨΨ of the corresponding family of spheres in R3R3 is typically non-rational. Using a classical sphere-geometric approach, we prove that the envelope surface ΨΨ and its offset surfaces admit rational parameterizations if and only if ΦΦ is a rational sub-variety of a rational isotropic hyper-surface in R4R4. The close relation between the envelope surfaces ΨΨ and rational offset surfaces in R3R3 is elaborated in detail. This connection leads to explicit rational parameterizations for all rational surfaces ΦΦ in R4R4 whose corresponding two-parameter families of spheres possess envelope surfaces admitting rational parameterizations. Finally we discuss several classes of surfaces sharing this property.  相似文献   

6.
The most efficient currently known algorithms for two-dimensional pattern matching with rotations have a worst case time complexity of O(n2m3)O(n2m3), where the size of the text is n×nn×n and the size of the pattern is m×mm×m. In this paper we present a new algorithm for the problem whose running time is O(n2m2)O(n2m2).  相似文献   

7.
8.
9.
Sensor networks are increasingly being used for applications which require fast processing of data, such as multimedia processing and collaboration among sensors to relay observed data to a base station (BS). Distributed computing can be used on a sensor network to reduce the completion time of a task (an application) and distribute the energy consumption equitably across all sensors, so that certain sensors do not die out faster than the others. The distribution of task modules to sensors should consider not only the time and energy savings, but must also improve reliability of the entire task execution. We formulate the above as an optimization problem, and use the AA algorithm with improvements to determine an optimal static allocation of modules among a set of sensors. We also suggest a faster algorithm, called the greedy AA algorithm, if a sub-optimal solution is sufficient. Both algorithms have been simulated, and the results have been compared in terms of energy savings, decrease in completion time of the task, and the deviation of the sub-optimal solution from the optimal one. The sub-optimal solution required 8%–35% less computation, at the cost of 2.5%–15% deviation from the optimal solution in terms of average energy spent per sensor node. Both the AA and greedy AA algorithms have been shown to distribute energy consumption more uniformly across sensors than centralized execution. The greedy AA algorithm is found to be scalable, as the number of evaluations in determining the allocation increases linearly with the number of sensors.  相似文献   

10.
11.
In this work we study the size of Boyer–Moore automata introduced in Knuth, Morris & Pratt’s famous paper on pattern matching. We experimentally show that a finite class of binary patterns produce very large Boyer–Moore automata, and find one particular case which we conjecture, generates automata of size Ω(m6)Ω(m6). Further experimental results suggest that the maximal size could be a polynomial of O(m7)O(m7), or even an exponential O(20.4m)O(20.4m), where mm is the length of the pattern.  相似文献   

12.
The most natural and perhaps most frequently used method for testing membership of an individual tuple in a conjunctive query is based on searching trees of partial solutions, or search-trees. We investigate the question of evaluating conjunctive queries with a time-bound guarantee that is measured as a function of the size of the optimal search-tree. We provide an algorithm that, given a database DD, a conjunctive query QQ, and a tuple aa, tests whether Q(a)Q(a) holds in DD in time bounded by a polynomial in (sn)logk(sn)loglogn(sn)logk(sn)loglogn and nrnr, where nn is the size of the domain of the database, kk is the number of bound variables of the conjunctive query, ss is the size of the optimal search-tree, and rr is the maximum arity of the relations. In many cases of interest, this bound is significantly smaller than the nO(k)nO(k) bound provided by the naive search-tree method. Moreover, our algorithm has the advantage of guaranteeing the bound for any given conjunctive query. In particular, it guarantees the bound for queries that admit an equivalent form that is much easier to evaluate, even when finding such a form is an NP-hard task. Concrete examples include the conjunctive queries that can be non-trivially folded into a conjunctive query of bounded size or bounded treewidth. All our results translate to the context of constraint-satisfaction problems via the well-publicized correspondence between both frameworks.  相似文献   

13.
There are various ways to define digital convexity in ZnZn. The proposed approach focuses on structuring elements (and not the sets under study), whose digital versions should allow to construct hierarchies of operators satisfying Matheron semi-groups law γλγμ=γmax(λ,μ)γλγμ=γmax(λ,μ), where λλ is a size factor. In RnRn the convenient class is the Steiner one. Its elements are Minkowski sums of segments. We prove that it admits a digital equivalent when the segments of ZnZn are Bezout. The conditions under which the Steiner sets are convex in ZnZn, and are connected, are established. The approach is then extended to structuring elements that vary according to the law of perspective, and also to anamorphoses, so that the digital Steiner class and its properties can extend to digital spaces as a sphere or a torus.  相似文献   

14.
15.
Matroid theory gives us powerful techniques for understanding combinatorial optimization problems and for designing polynomial-time algorithms. However, several natural matroid problems, such as 3-matroid intersection, are NP-hard. Here we investigate these problems from the parameterized complexity point of view: instead of the trivial nO(k)nO(k) time brute force algorithm for finding a kk-element solution, we try to give algorithms with uniformly polynomial (i.e., f(k)⋅nO(1)f(k)nO(1)) running time. The main result is that if the ground set of a represented linear matroid is partitioned into blocks of size ??, then we can determine in randomized time f(k,?)⋅nO(1)f(k,?)nO(1) whether there is an independent set that is the union of kk blocks. As a consequence, algorithms with similar running time are obtained for other problems such as finding a kk-element set in the intersection of ?? matroids, or finding kk terminals in a network such that each of them can be connected simultaneously to the source by ?? disjoint paths.  相似文献   

16.
We study the state complexity of certain simple languages. If AA is an alphabet of kk letters, then a kk-language   is a nonempty set of words of length kk, that is, a uniform language of length kk. We show that the minimal state complexity of a kk-language is k+2k+2, and the maximal, (kk−1−1)/(k−1)+2k+1(kk11)/(k1)+2k+1. We prove constructively that, for every ii between the minimal and maximal bounds, there is a language of state complexity ii. We introduce a class of automata accepting sets of words that are permutations of AA; these languages define a complete hierarchy of complexities between k2−k+3k2k+3 and 2k+12k+1. The languages of another class of automata, based on kk-ary trees, define a complete hierarchy of complexities between 2k+12k+1 and (kk−1−1)/(k−1)+2k+1(kk11)/(k1)+2k+1. This provides new examples of uniform languages of maximal complexity.  相似文献   

17.
New computational topology techniques are presented for surface reconstruction of 2-manifolds with boundary, while rigorous proofs have previously been limited to surfaces without boundary. This is done by an intermediate construction of the envelope   (as defined herein) of the original surface. For any compact C2C2-manifold MM embedded in R3R3, it is shown that its envelope is C1,1C1,1. Then it is shown that there exists a piecewise linear (PL) subset of the reconstruction of the envelope that is ambient isotopic to MM, whenever MM is orientable. The emphasis of this paper is upon the formal mathematical proofs needed for these extensions. (Practical application examples have already been published in a companion paper.) Possible extensions to non-orientable manifolds are also discussed. The mathematical exposition relies heavily on known techniques from differential geometry and topology, but the specific new proofs are intended to be sufficiently specialized to prompt further algorithmic discoveries.  相似文献   

18.
A folded hypercube is basically a hypercube with additional links augmented, where the additional links connect all pairs of nodes with longest distance in the hypercube. In an nn-dimensional folded hypercube, it has been shown that n+1n+1 node-disjoint paths from one source node to other n+1n+1 (mutually) distinct destination nodes, respectively, can be constructed in O(n4)O(n4) time so that their maximal length is not greater than ⌈n/2⌉+1n/2+1, where n+1n+1 is the connectivity and ⌈n/2⌉n/2 is the diameter. Besides, their maximal length is minimized in the worst case. In this paper, we further show that by minimizing the computations of minimal routing functions, these node-disjoint paths can be constructed in O(n3)O(n3) time, which is more efficient, and is hard to be reduced because it must take O(n3)O(n3) time to compute a minimal routing function by solving a corresponding maximum weighted bipartite matching problem with the best known algorithm.  相似文献   

19.
We consider a two-edge connected, undirected graph G=(V,E)G=(V,E), with nn nodes and mm non-negatively real weighted edges, and a single source shortest paths tree (SPT) TT of GG rooted at an arbitrary node rr. If an edge in TT is temporarily removed, it makes sense to reconnect the nodes disconnected from the root by adding a single non-tree edge, called a swap edge  , instead of rebuilding a new optimal SPT from scratch. In the past, several optimality criteria have been considered to select a best possible swap edge. In this paper we focus on the most prominent one, that is the minimization of the average distance between the root and the disconnected nodes. To this respect, we present an O(mlog2n)O(mlog2n) time and O(m)O(m) space algorithm to find a best swap edge for every edge of TT, thus improving for m=o(n2/log2n)m=o(n2/log2n) the previously known O(n2)O(n2) time and space complexity algorithm.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号