首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
In analogy to cyclic codes, we study linear codes over finite fields obtained from left ideals in a quotient ring of a (non-commutative) skew polynomial ring. The paper shows how existence and properties of such codes are linked to arithmetic properties of skew polynomials. This class of codes is a generalization of the θ-cyclic codes discussed in [Boucher, D., Geiselmann, W., Ulmer, F., 2007. Skew cyclic codes. Applied Algebra in Engineering, Communication and Computing 18, 379–389]. However θ-cyclic codes are powerful representatives of this family and we show that the dual of a θ-cyclic code is still θ-cyclic. Using Groebner bases, we compute all Euclidean and Hermitian self-dual θ-cyclic codes over of length less than 40, including a [36,18,11] Euclidean self-dual θ-cyclic code which improves the previously best known self-dual code of length 36 over .  相似文献   

2.
Let X1,…, Xk be real analytic vector fields on an n-dimensional manifold M, k < n, which are linearly independent at a point p ε M and which, together with their Lie products at p, span the tangent space TMp. Then X1,…, Xk form a local basis for a real analytic k-dimensional distribution xDk(x)=span{X1(x),…,Xk(x)}. We study the question of when Dk admits a basis which generates a nilpotent, or solvable (or finite dimensional) Lie algebra. If this is the case the study of affine control systems, or partial differential operators, described via X1,…, Xk can often be greatly simplified.  相似文献   

3.
Let f(xθ) = αθαx−(α+1)I(x>θ) be the pdf of a Pareto distribution with known shape parameter α>0, and unknown scale parameter θ. Let {(Xi, θi)} be a sequence of independent random pairs, where Xi's are independent with pdf f(xαi), and θi are iid according to an unknown distribution G in a class of distributions whose supports are included in an interval (0, m), where m is a positive finite number. Under some assumption on the class and squared error loss, at (n + 1)th stage we construct a sequence of empirical Bayes estimators of θn+1 based on the past n independent observations X1,…, Xn and the present observation Xn+1. This empirical Bayes estimator is shown to be asymptotically optimal with rate of convergence O(n−1/2). It is also exhibited that this convergence rate cannot be improved beyond n−1/2 for the priors in class .  相似文献   

4.
Let [n, k, d] q -codes be linear codes of length n, dimension k, and minimum Hamming distance d over GF(q). In this paper we consider codes over GF(3), GF(5), GF(7), and GF(8). Over GF(3), three new linear codes are constructed. Over GF(5), eight new linear codes are constructed and the nonexistence of six codes is proved. Over GF(7), the existence of 33 new codes is proved. Over GF(8), the existence of ten new codes and the nonexistence of six codes is proved. All of these results improve the corresponding lower and upper bounds in Brouwer's table [www.win.tue.nl/aeb/voorlincod.html].  相似文献   

5.
To produce a highly nonlinear resilient function, the disjoint linear codes were originally proposed by Johansson and Pasalic in IEEE Trans. Inform. Theory, 2003, 49(2): 494–501. In this paper, an effective method for finding a set of such disjoint linear codes is presented. When n ⩾ 2k, we can find a set of [n,k]disjoint linear codes with cardinality 2n-k +⌊(n-k)/k⌊; When n < 2k, no set of disjoint linear codes exists with cardinality at least 2. We also describe a result on constructing a set of [n, k] disjoint linear codes with minimum distance at least some fixed positive integer.  相似文献   

6.
7.
For a set of n jobs with deterministic processing times and common starting times, the problem is to determine the optimal constant flow allowance k* for the CON due-date assignment method and the optimal sequence σ* which minimizes the weighted average of missed due-dates. As k* and σ* cannot be independently determined, we propose an algorithm which systematically searches for the optimal solution. Although the algorithm has time complexity of 0(2nn2), it is considerably more efficient than the exhaustive enumeration method which considers all n! possible sequences.  相似文献   

8.
A monotonicity result for the maximal solution of the equation XBB*XA*XXAQ = 0, Q = Q*, (A, B) stabilizable, is proved.  相似文献   

9.
The unification problem for term rewriting systems (TRSs) is the problem of deciding, for a given TRS R and two terms M and N, whether there exists a substitution θ such that Mθ and Nθ are congruent modulo R (i.e., Mθ↔R*Nθ). In this paper, the unification problem for confluent right-ground TRSs is shown to be decidable. To show this, the notion of minimal terms is introduced and a new unification algorithm for obtaining a substitution whose range consists of minimal terms is proposed. Our result extends the decidability of unification for canonical (i.e., terminating and confluent) right-ground TRSs given by Hullot [Proceedings of the 5th Conference on Automated Deduction, LNCS, vol. 87, 1980, p. 318] in the sense that the termination condition can be omitted.  相似文献   

10.
Given a -complete (semi)lattice , we consider -labeled transition systems as coalgebras of a functor (−), associating with a set X the set X of all -fuzzy subsets. We describe simulations and bisimulations of -coalgebras to show that L(−) weakly preserves nonempty kernel pairs iff it weakly preserves nonempty pullbacks iff L is join infinitely distributive (JID).Exchanging for a commutative monoid , we consider the functor (−)ω which associates with a set X all finite multisets containing elements of X with multiplicities m M. The corresponding functor weakly preserves nonempty pullbacks along injectives iff 0 is the only invertible element of , and it preserves nonempty kernel pairs iff is refinable, in the sense that two sum representations of the same value, r1 + … + rm = c1 + … + cn, have a common refinement matrix (m(i, j)) whose k-th row sums to rk and whose l-th column sums to cl for any 1≤ km and 1 ≤ ln.  相似文献   

11.
Relevant to the design of multiple access protocols is the problem of finding the largest of N i.i.d. numbers X1,…,XN uniformly distributed over [0,1] using the minimum number of questions of the following type. We pick a set A(1) [0, 1] and ask which Xi ε A(1). Depending on the response, we pick another subset A(2) and ask which Xi ε A(2), and so on, until we identify the largest Xi. It is shown that the optimum sequence of questions must be of the type A(k) = (a(k), 1]; the best sequence {a(k)} can then be determined by dynamic programming following the work of Arrow, Pesotchinsky and Sobel.  相似文献   

12.
LetX be a finite alphabet and letX * be the free monoid generated byX. A languageA X * is called left-noncounting if there existsk 0 such that forx,y X *,x k y A if and only ifx k+i y A. The class of all left-noncounting languages overX forms a Boolean algebra which generally contains properly the class of all noncounting languages overX and is properly contained in the class of all power-separating languages overX. In this paper, we discuss some relations among these three classes of languages and we characterize the automata accepting the left-noncounting languages and the syn tactic monoids of the left-noncounting languages.This research has been supported by Grant A7877 of the National Research Council of Canada.  相似文献   

13.
Under relative-degree-one and minimum-phase assumptions, it is well known that the class of finite-dimensional, linear, single-input (u), single-output (y) systems (A,b,c) is universally stabilized by the feedback strategy u = Λ(λ)y, λ = y2, where Λ is a function of Nussbaum type (the terminology “universal stabilization” being used in the sense of rendering /s(0/s) a global attractor for each member of the underlying class whilst assuring boundedness of the function λ(·)). A natural generalization of this result to a class k of nonlinear control systems (a,b,c), with positively homogeneous (of degree k 1) drift vector field a, is described. Specifically, under the relative-degree-one (cb ≠ 0) and minimum-phase hypotheses (the latter being interpreted as that of asymptotic stability of the equilibrium of the “zero dynamics”), it is shown that the strategy u = Λ(λ)/vby/vbk−1y, assures k-universal stabilization. More generally, the strategy u = Λ(λ)exp(/vby/vb)y, assures -universal stabilization, where = k 1 k.  相似文献   

14.
We consider worst-case identification in the ℓ2 norm. Given an unknown system h ε ℓ1 one wishes to choose bounded inputs u ε ℓ∞ such that given finitely many corrupted output measurements {y(k): 0 ≤ k}of Y = h*u + η, where η is noise, assumed small, one can construct an approximation g with g - h2 → 0 as η∞ → 0 and n → ∞. It is shown that inputs can be chosen such that to identify a sequence of length n with an ℓ2 error of O(η∞) one requires only O(n) measurements. A numerical example is inclu  相似文献   

15.
Plant template generation is the key step in applying quantitative feedback theory (QFT) to design robust control for uncertain systems. In this paper we propose a technique for generating plant templates for a class of linear systems with an uncertain time delay and affine parameter perturbations in coefficients. The main contribution lies in presenting a necessary and sufficient condition for the zero inclusion of the value set f(T,Q)={f(τ,q): τT+], qQk=0m−1[qk,qk+]}, where f(τ,q)=g(q)+h(q)e−jτω*, g(q) and h(q) are both complex-valued affine functions of the m-dimensional real vector q, and ω* is a fixed frequency. Based on this condition, an efficient algorithm which involves, in the worst case, evaluation of m algebraic inequalities and solution of m2m−1 one-variable quadratic equations, is developed for testing the zero inclusion of the value set f(T,Q). This zero-inclusion test algorithm allows one to utilize a pivoting procedure to generate the outer boundary of a plant template with a prescribed accuracy or resolution. The proposed template generation technique has a linear computational complexity in resolution and is, therefore, more efficient than the parameter gridding and interval methods. A numerical example illustrating the proposed technique and its computational superiority over the interval method is included.  相似文献   

16.
In this paper, a high-speed, low-cost and efficient design of reverse converter for the general three-moduli set {2α, 2β − 1, 2β + 1} where α < β is presented. The simple proposed architecture consists of a carry save adder (CSA) and a modulo adder. As a result it can be efficiently implemented in VLSI circuits. The values of α and β are set in order to provide the desired dynamic range and also to obtain a balanced moduli set. Based on the above, two new moduli sets {2n+k, 22n − 1, 22n + 1} and {22n−1, 22n+1 − 1, 22n+1 + 1}, which are the special cases of the moduli set {2α, 2β − 1, 2β + 1} are proposed. The reverse converters for these new moduli sets are derived from the proposed general architecture with better performance compared to the other reverse converters for moduli sets with similar dynamic range.  相似文献   

17.
Let be an imaginary quadratic number field with ring of integers Zk and let k(α) be the cubic extension of k generated by the polynomial ft(x)=x3−(t−1)x2−(t+2)x−1 with tZk. In the present paper we characterize all elements γZk[α] with norms satisfying |Nk(α)/k|≤|2t+1| for |t|≥14. This generalizes a corresponding result by Lemmermeyer and Pethő for Shanks’ cubic fields over the rationals.  相似文献   

18.
Constant weight codes (CWCs) are an important class of codes in coding theory. Generalized Steiner systems GS (2, k, v, g) were first introduced by Etzion and used to construct optimal nonlinear CWCs over an alphabet of size g + 1 with minimum Hamming distance 2k − 3, in which each codeword has length v and weight k. In this paper, Weil’s theorem on character sum estimates is used to show that there exists a GS(2, 4, v, 3) for any prime v ≡ 1 (mod 4) and v > 13. From the coding theory point of view, an optimal nonlinear quaternary (v, 5, 4) CWC exists for such a prime v.  相似文献   

19.
We determine the functions on GF(2)n which satisfy the propagation criterion of degree n−2, PC(n−2). We study subsequently the propagation criterion of degree ℓ and order k and its extended version EPC. We determine those Boolean functions on GF(2)n which satisfy PC(ℓ) of order kn−ℓ−2. We show that none of them satisfies EPC(ℓ) of the same order. We finally give a general construction of nonquadratic functions satisfying EPC(ℓ) of order k. This construction uses the existence of nonlinear, systematic codes with good minimum distances and dual distances (e.g., Kerdock codes and Preparata codes).  相似文献   

20.
A k -container C(u,v) of a graph G is a set of k disjoint paths between u and v. A k-container C(u,v) of G is a k * -container if it contains all vertices of G. A graph G is k * -connected if there exists a k *-container between any two distinct vertices of G. Therefore, a graph is 1*-connected (respectively, 2*-connected) if and only if it is Hamiltonian connected (respectively, Hamiltonian). A graph G is super spanning connected if there exists a k *-container between any two distinct vertices of G for every k with 1≤kκ(G) where κ(G) is the connectivity of G. A bipartite graph G is k * -laceable if there exists a k *-container between any two vertices from different partite set of G. A bipartite graph G is super spanning laceable if there exists a k *-container between any two vertices from different partite set of G for every k with 1≤kκ(G). In this paper, we prove that the enhanced hypercube Q n,m is super spanning laceable if m is an odd integer and super spanning connected if otherwise.
Chung-Hao ChangEmail:
  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号