首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
This paper firstly gives some necessary conditions on one-Gray weight linear codes. And then we use these results to construct several classes of one-Gray weight linear codes over ?4+u?4(u 2 = u) with type \({16^{{k_1}}}{8^{{k_2}}}{8^{{k_3}}}{4^{{k_4}}}{4^{{k_5}}}{4^{{k_6}}}{2^{{k_7}}}{2^{{k_8}}}\) based on a distance-preserving Gray map from (?4 + u?4) n to ? 4 2n . Secondly, the authors use the similar approach to do works on two-Gray (projective) weight linear codes. Finally, some examples are given to illustrate the construction methods.  相似文献   

2.
By constructing a Gray map, a class of constacyclic codes over ring R = R+vR is studied. Using cyclic codes and negacyclic codes of length p s over ring R, the structure of (1?2v)-constacyclic codes and dual codes of length p s over ring R are given, the Gray images of (1 ? 2v)-constacyclic codes in a particular case are also studied. It is shown that linear codes of length p s over ring R are (1?2v)-constacyclic codes if and only if their Gray images are distance-invariant cyclic codes of length 2p s over ring R.  相似文献   

3.
This paper deduces the structure of LCD negacyclic codes over the finite field Fq, where q is an odd prime power. Based on the study of q-cyclotomic cosets modulo 2 n, the authors obtain the parameters of LCD negacyclic codes of lengths n =(q+1)/2,(q~m-1)/2(q-1)and q~(t·2~τ)-1/2(q~t +1), respectively. And many optimal codes are given. Moreover, the authors research two special classes of MDS LCD negacyclic codes of length n |(q-1)/2 and n |(q+1)2, respectively.  相似文献   

4.
This paper is devoted to the construction of one-Lee weight codes and two-Lee weight codes over F p + vF p (v 2 = v) with type \({p^{2{k_1}}}{p^{{k_2}}}{p^{{k_3}}}\) based on two different distance-preserving Gray maps from ((F p + vF p ) n , Lee weight) to (F p 2n , Hamming weight), where p is a prime. Moreover, the authors prove that the obtained two-Lee weight codes are projective only when p = 2.  相似文献   

5.
This paper presents a new algorithm for computing the extended Hensel construction(EHC) of multivariate polynomials in main variable x and sub-variables u_1, u_2, ···, u_m over a number field K. This algorithm first constructs a set by using the resultant of two initial coprime factors w.r.t. x, and then obtains the Hensel factors by comparing the coefficients of x~i on both sides of an equation. Since the Hensel factors are polynomials of the main variable with coefficients in fraction field K(u_1, u_2, ···, u_m), the computation cost of handling rational functions can be high. Therefore,the authors use a method which multiplies resultant and removes the denominators of the rational functions. Unlike previously-developed algorithms that use interpolation functions or Gr?bner basis, the algorithm relies little on polynomial division, and avoids multiplying by different factors when removing the denominators of Hensel factors. All algorithms are implemented using Magma, a computational algebra system and experiments indicate that our algorithm is more efficient.  相似文献   

6.
It is well known that almost all subset sum problems with density less than 0.9408… can be solved in polynomial time with an SVP oracle that can find a shortest vector in a special lattice.In this paper,the authors show that a similar result holds for the k-multiple subset sum problem which has k subset sum problems with exactly the same solution.Specially,for the single subset sum problem(k=1),a modified lattice is introduced to make the proposed analysis much simpler and the bound for the success probability tighter than before.Moreover,some extended versions of the multiple subset sum problem are also considered.  相似文献   

7.
Elliptic PDE-constrained optimal control problems with L1-control cost (L1-EOCP) are considered. To solve L1-EOCP, the primal-dual active set (PDAS) method, which is a special semismooth Newton (SSN) method, used to be a priority. However, in general solving Newton equations is expensive. Motivated by the success of alternating direction method of multipliers (ADMM), we consider extending the ADMM to L1-EOCP. To discretize L1-EOCP, the piecewise linear finite element (FE) is considered. However, different from the finite dimensional l1-norm, the discretized L1-norm does not have a decoupled form. To overcome this difficulty, an effective approach is utilizing nodal quadrature formulas to approximately discretize the L1-norm and L2-norm. It is proved that these approximation steps will not change the order of error estimates. To solve the discretized problem, an inexact heterogeneous ADMM (ihADMM) is proposed. Different from the classical ADMM, the ihADMM adopts two different weighted inner products to define the augmented Lagrangian function in two subproblems, respectively. Benefiting from such different weighted techniques, two subproblems of ihADMM can be efficiently implemented. Furthermore, theoretical results on the global convergence as well as the iteration complexity results o(1/k) for ihADMM are given. In order to obtain more accurate solution, a two-phase strategy is also presented, in which the primal-dual active set (PDAS) method is used as a postprocessor of the ihADMM. Numerical results not only confirm error estimates, but also show that the ihADMM and the two-phase strategy are highly efficient.  相似文献   

8.
For the two-parameter inverse Gaussian distribution denoted by I G(μ,λ),the authors employ a linear Bayes procedure to estimate the parameters μ and λ.The superiority of the proposed linear Bayes estimator(LBE) over both the classical UMVUE and the maximum likelihood estimator(MLE) is established in terms of the mean squared error matrix(MSEM) criterion.Compared with the usual Bayes estimator,which is obtained by an MCMC method,the proposed LBE is simple and easy to use.Some numerical results are presented to verify that the LBE performs well.  相似文献   

9.
NNMDS codes     
C is an[n,k,d]q linear code over F9.And s(C)=n+1-k-d is the Singleton defect of C.An MDS code C with s(C)=0 has been studied extensively.Recently,a near-MDS code C with s(C)=s(C)=1 is studied by many scholars,where Cdenotes the dual code of C.This paper concentrates on the linear code C with s(C)=s(C)=2,and the author calls it an NNMDS code.A series of iff conditions of NNMDS codes are presented.And the author gives an upper bound on length of NNMDS codes.In the last,some examples of NNMDS are given.  相似文献   

10.
This paper addresses a dynamic lot sizing problem with bounded inventory and stockout where both no backlogging and backlogging allowed cases are considered. The stockout option means that there is outsourcing in a period only when the inventory level at that period is non-positive. The production capacity is unlimited and production cost functions are linear but with fixed charges. The problem is that of satisfying all demands in the planning horizon at minimal total cost. We show that the no backlogging case can be solved in ) O(T 2) time with general concave inventory holding and outsourcing cost functions where T is the length of the planning horizon. The complexity can be reduced to O(T) when the inventory holding cost functions are also linear and have some realistic properties, even if the outsourcing cost functions remain general concave functions. When the inventory holding and outsourcing cost functions are linear, the backlogging case can be solved in O(T 3logT) time whether the outsourcing level at each period is bounded by the sum of the demand of that period and backlogging level from previous periods, or only by the demand of that period.  相似文献   

11.
Reliability is a desirable performance indicator of many real-world systems to measure the quality level. One general method for evaluating multi-state reliability is using d-minimal paths (d-MPs). However, being an NP-hard problem, searching for all d-MPs is a rather challenging task. This paper proposes an improved algorithm to solve the d-MP problem. To reduce the search space of d-MPs, a concept of lower capacity bound is introduced into the d-MP problem, and an effective technique is developed to find lower capacity bounds. Meanwhile, the fast enumeration method which is a recent improvement to the traditional enumeration method is employed to solve d-MPs. In addition, by introducing the operation of transforming undirected edges into directed edges, the proposed algorithm is applicable to solving both directed networks and undirected networks. Through numerical experiments, it is found that the proposed algorithm holds a distinct advantage over the existing methods in solving all d-MPs.  相似文献   

12.
<正> This paper presents the notions of exact observability and exact detectability for Markovjump linear stochastic systems of Ito type with multiplicative noise (for short,MJLSS).StochasticPopov-Belevith-Hautus (PBH) Criterions for exact observability and exact detectability are respectivelyobtained.As an application,stochastic H_2/H_∞ control for such MJLSS is discussed under exactdetectability.  相似文献   

13.
This paper demonstrates the equivalence of two classes of D-invariant polynomial subspaces, i.e., these two classes of subspaces are different representations of the breadth-one D-invariant subspace. Moreover, the authors solve the discrete approximation problem in ideal interpolation for the breadth-one D-invariant subspace. Namely, the authors find the points, such that the limiting space of the evaluation functionals at these points is the functional space induced by the given D-invariant subspace, as the evaluation points all coalesce at one point.  相似文献   

14.
The purpose of the present article is to introduce a class of mixed two- and three-level extended designs obtained by adding some new runs to an existing mixed two-and three-level design. A formulation of wrap-around L2-discrepancy for the extended designs is developed. As a benchmark of obtaining (nearly) uniform asymmetrical extended designs, a lower bound to the wrap-around L2-discrepancy for our proposed designs is established. Thorough numerical results are displayed, which provide further corroboration to the derived theoretical results.  相似文献   

15.
In many auctions, buyers know beforehand little about objects to be sold in the future. Whether and how to reveal information about future objects is an important decision problem for sellers. In this paper, two objects are sold sequentially and each buyer’s valuation for the second object is k times that for the first one, and the true value of k is sellers’ private information. The authors identify three factors which affect sellers’ revelation strategies: The market’s competition intensity which is characterized by the number of buyers, buyers’ prior information about the second object, and the difference degree between two objects which is characterized by k. The authors give not only conditions under which revealing information about the second object in advance benefits the seller, but also the optimal releasing amount of information in the market with two sellers and one seller, respectively.  相似文献   

16.
The authors establish weighted L2-estimates of solutions for the damped wave equations with variable coefficients u tt ? divA(x)?u+au t = 0 in ? n under the assumption a(x) ≥ a0[1+ρ(x)]?l, where a0 > 0, l < 1, ρ(x) is the distance function of the metric g = A?1(x) on ? n . The authors show that these weighted L2-estimates are closely related to the geometrical properties of the metric g = A?1(x).  相似文献   

17.
This paper considers a discrete-time Geo/G/1 queue under the Min(N,D)-policy in which the idle server resumes its service if either N customers accumulate in the system or the total backlog of the service times of the waiting customers exceeds D, whichever occurs first (Min(N,D)-policy). By using renewal process theory and total probability decomposition technique, the authors study the transient and equilibrium properties of the queue length from the beginning of the arbitrary initial state, and obtain both the recursive expression of the z-transformation of the transient queue length distribution and the recursive formula for calculating the steady state queue length at arbitrary time epoch n +. Meanwhile, the authors obtain the explicit expressions of the additional queue length distribution. Furthermore, the important relations between the steady state queue length distributions at different time epochs n -, n and n + are also reported. Finally, the authors give numerical examples to illustrate the effect of system parameters on the steady state queue length distribution, and also show from numerical results that the expressions of the steady state queue length distribution is important in the system capacity design.  相似文献   

18.
This paper considers experimental situations where the interested effects have to be orthogonal to a set of nonnegligible effects.It is shown that various types of orthogonal arrays with mixed strength are A-optimal for estimating the parameters in ANOVA high dimension model representation.Both cases including interactions or not are considered in the model.In particularly,the estimations of all main effects are A-optimal in a mixed strength(2,2)_3 orthogonal array and the estimations of all main effects and two-factor interactions in G_1×G_2 are A-optimal in a mixed strength(2,2)_4 orthogonal array.The properties are also illustrated through a simulation study.  相似文献   

19.
This paper proposes to use the blockwise empirical likelihood(EL) method to construct the confidence regions for the regression vector β in a partially linear model under negatively associated errors. It is shown that the blockwise EL ratio statistic for β is asymptotically χ~2 distributed. The result is used to obtain an EL-based confidence region for β. Results of a simulation study on the finite sample performance of the proposed confidence regions are reported.  相似文献   

20.
On the axioms of revealed preference in fuzzy consumer theory   总被引:5,自引:0,他引:5  
The revealed preference is a central subject in classical consumer theory.Authors likeSamuelson,Arrow,Richter,Sen,Uzawa and others have proposed an axiomatic setting of revealedpreference theory.Consequently revealed preference axioms WARP and SARP and congruence axioms WCA andSCA have been considered.An important theorem of Sen establishes the equivalence between these axioms provided thefamily of budgets includes all non-empty finite sets of bundles.Fuzzy consumer theory(=fuzzy choice functions)is a topic that appears in a lot of papers.Particularly,Banerjee studies in fuzzy context axioms of revealed preference and congruenceextending some results of Arrow and Sen.In this paper we modify the Banerjee definition of a fuzzy choice function(=fuzzy consumer)and we study some fuzzy versions of the axioms of revealed preference and congruence.Banerjeefuzzifies only the range of a consumer;we use a fuzzification of both the domain and the range of aconsumer.The axioms WAFRP,SAFRP,WFCA,SFCA generalize to fu  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号