首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
We present a new family of binary codes derived from the family of classical Goppa codes. We generalize properties of Goppa codes to this family, including bounds on the dimension and minimum distance and construction of a polynomial-time algorithm of decoding up to the designed distance. Asymptotically, these codes have the same parameters as Goppa codes.  相似文献   

2.
We describe a new connection between the problem of finding rigid matrices, as posed by Valiant (MFCS 1977), and the problem of proving lower bounds for linear locally correctable codes. Our result shows that proving linear lower bounds on locally correctable codes with super-logarithmic query complexity will give new constructions of rigid matrices. The interest in constructing rigid matrices is their connection to circuit lower bounds.  相似文献   

3.
Cyclic codes form an important class of codes. They have very interesting algebraic structure. Furthermore, they are equivalent to many important codes, such as binary Hamming codes, Golay codes and BCH codes. Minimal codewords in linear codes are widely used in constructing decoding algorithms and studying linear secret sharing scheme. In this paper, we show that in the binary cyclic code all of the codewords are minimal, except 0 and 1. Then, we obtain a result about the number of minimal codewords in the binary cyclic codes.  相似文献   

4.
International Journal of Computer Vision - Due to the highly complex semantic information of images, even with the same query image, the expected content-based image retrieval results could be very...  相似文献   

5.
一种二进制数字指纹编码算法   总被引:6,自引:1,他引:6       下载免费PDF全文
王彦  吕述望  徐汉良 《软件学报》2003,14(6):1172-1177
抗合谋攻击是数字指纹技术中需要解决的关键问题之一.基于二进制随机编码,通过使用伪随机序列对指纹比特的重复嵌入进行控制,提出了一种有效的抗合谋攻击的数字指纹编码算法及其相应的跟踪算法.理论分析和实验结果表明,在适当的合谋尺寸下,该算法能够对非法分发者进行有效跟踪,同时无辜用户被诬陷的概率可以根据要求接近于0.由于在该算法中发行商无须知道用户原来的码字,因此可以说该算法是设计非对称指纹的一个很好的备选算法.  相似文献   

6.
We enumerate binary nonlinear perfect codes of length 15 obtained by the generalized concatenated (GC) construction. There are 15 different types of such codes. They are defined by pairs of MDS codes A i : (4, 2, 64)4. For every pair we give the number of nonequivalent codes of this type. In total, there are 777 nonequivalent binary perfect codes of length 15 obtained by the GC construction. This number includes the Hamming code (of rank 11), 18 Vasil'ev codes (of rank 12), and 758 codes of rank 13.  相似文献   

7.
现有极化码构造方案仅适用于二进制删除信道和加性高斯白噪声信道。为此,研究极化码在二进制对称信道(BSC)的构造方案。分析BSC中的极化码构造方式和编译码算法原理,利用连续删除译码算法对极化码在BSC中的纠错效率进行测试。仿真结果表明,蒙特卡罗法构造的极化码相对于巴氏参数法构造的极化码具有较好的纠错效率。  相似文献   

8.
A theoretical and experimental analysis of iterative decoding of low-density convolutional (LDC) codes is given. Two families are investigated: homogeneous LDC codes and a convolutional code version of turbo-codes.  相似文献   

9.
Let K be a permutation group acting on binary vectors of length n and F K be a code of length 2 n consisting of all binary functions with nontrivial inertia group in K. We obtain upper and lower bounds on the covering radii of F K , where K are certain subgroups of the affine permutation group GA n . We also obtain estimates for distances between F K and almost all functions in n variables as n . We prove the existence of functions with the trivial inertia group in GA n for all n 7. An upper bound for the asymmetry of a k-uniform hypergraph is obtained.  相似文献   

10.
We enumerate binary extended nonlinear perfect codes of length 16 obtained by the generalized concatenated construction (GC-construction). There are 15 different types of such codes. They are defined by pairs of MDS codes A i : (4, 2, 64)4. For every pair, we give the number of nonequivalent codes of this type. In total, there are 285 nonequivalent binary extended nonlinear perfect codes of length 16 obtained by the GC-construction, including the Hamming (i.e., linear) code. Thus, we obtain all binary extended perfect codes of length 16 and rank 13. Their total number is equal to 272.  相似文献   

11.
高精度是变流装置调试仪的重要技术指标,本文针对基于LabVIEW开发的一套双向变流装置调试仪,从硬件和软件两个方面研究分析了影响其精度的主要原因以及提高其测量精度的几项措施,重点讨论了软件措施中的数字滤波和小波处理技术.并结合试验结果进行了验证.  相似文献   

12.
基于RS码的二值图像认证及篡改定位算法   总被引:1,自引:1,他引:1  
用于二值图像内容认证和篡改定位的数字水印技术具有重要的实际价值,但却面临着二值图像像素单一、嵌入容量有限且分布不均匀等问题.根据纠错码--RS码的检错原理,提出一种用于二值图像内容认证和篡改定位的脆弱的数字水印算法.该算法利用二值图像的像素值来构造RS码,通过嵌入其校验码来实现对图像的内容认证和篡改定位,一方面保证了其优越的检错能力;另一方面,具有较低的嵌入负载.经实验证明,该算法能有效地检测出二值图像是否被篡改以及篡改发生的位置.此外,在水印信号的生成和提取过程中使用了密钥,确保了水印的安全.  相似文献   

13.
代码混淆技术常被用于软件保护领域和恶意代码对抗分析.传统的代码混淆技术会使逆向分析者获得程序的全部二进制代码,因此存在一定的安全性问题.为缓解这一问题,提出了一种基于代码移动的二进制程序控制流混淆方法,将程序的重要控制逻辑代码移动至逆向分析者不可控的可信实体,以使本地代码控制流信息部分缺失,从而使得程序的关键行为无法通过推理获知;利用包含无初始意义操作数的非条件跳转指令替代条件跳转指令隐藏路径分支的分支条件和目标地址,以增大收集程序路径信息的难度.对该控制流混淆方法从强度、弹性和开销3个指标进行了技术评价.将所提混淆方法用于6个恶意软件触发条件的混淆并对混淆之后的恶意代码进行逆向分析实验,结果表明该混淆方法能够较好地抵抗基于静态分析和符号执行的逆向分析方法.  相似文献   

14.
15.
针对背包问题传统的解决方法有动态规划法、分支界限法、回溯法.传统的方法不能有效地解决背包问题.文中提出二重结构编码的遗传算法解决背包问题,是一种适合于在大量的可行解中搜索最优解的有效算法,在约束条件的处理上结合贪婪算法,既加快了算法的收敛速度,又克服了传统方法容易陷入局部最优的特点,提高了搜索效率.通过计算机仿真试验结果表明,二重结构编码的遗传算法比基本遗传编码有更好的近似解,充分证明了使用二重结构编码的混合遗传算法来求解背包问题的有效性和实用性.  相似文献   

16.
IA-64体系结构使用软件流水提高程序的执行性能,但产生的二进制代码跟机器特性紧密相关,给代码跨平台移植造成了困难。该文针对IA-64体系结构下软件流水的特点,提出2种软件流水代码消除方法,它能够将软件流水代码转换成语义等价无硬件依赖的串行代码,实验验证了这2种方法的有效性。  相似文献   

17.
使用DAO访问Access数据表的Binary字段   总被引:1,自引:0,他引:1  
荣冰  徐炜民 《计算机工程》1999,25(10):67-68
Access数据具有针对数据库集成性的最优文件结构,其数据表中的Binary字段是专为存放二进制数据而设的,在此详尽探讨了VC5.0中使用DAO类访问Access数据中表Binary字段的途径及其相关的COleVarinnt的应用方法。  相似文献   

18.
19.
编码纠错、检错是计算机应用中最重要的操作手段之一,双偶编码在其中有着重要作用,但目前对长度较大的编码却研究甚少,尤其在对编码分类问题的研究中遇到较大困难。针对此问题,本文给出了所有有阶为7的自同构的二元极大双偶编码[56,28,12],在等价关系下有499种这样的编码,从而使这类编码得到彻底解决。  相似文献   

20.
Hashing methods aim to learn a set of hash functions which map the original features to compact binary codes with similarity preserving in the Hamming space. Hashing has proven a valuable tool for large-scale information retrieval. We propose a column generation based binary code learning framework for data-dependent hash function learning. Given a set of triplets that encode the pairwise similarity comparison information, our column generation based method learns hash functions that preserve the relative comparison relations within the large-margin learning framework. Our method iteratively learns the best hash functions during the column generation procedure. Existing hashing methods optimize over simple objectives such as the reconstruction error or graph Laplacian related loss functions, instead of the performance evaluation criteria of interest—multivariate performance measures such as the AUC and NDCG. Our column generation based method can be further generalized from the triplet loss to a general structured learning based framework that allows one to directly optimize multivariate performance measures. For optimizing general ranking measures, the resulting optimization problem can involve exponentially or infinitely many variables and constraints, which is more challenging than standard structured output learning. We use a combination of column generation and cutting-plane techniques to solve the optimization problem. To speed-up the training we further explore stage-wise training and propose to optimize a simplified NDCG loss for efficient inference. We demonstrate the generality of our method by applying it to ranking prediction and image retrieval, and show that it outperforms several state-of-the-art hashing methods.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号