This paper presents new half rate Quasi Cyclic Low Density Parity Check (QC- LDPC) codes formed on the basis of combinatorial designs. In these codes, circulant matrices of the parity check matrix are formed on the ba...This paper presents new half rate Quasi Cyclic Low Density Parity Check (QC- LDPC) codes formed on the basis of combinatorial designs. In these codes, circulant matrices of the parity check matrix are formed on the basis of subsets in which the difference between any two elements of a subset is unique with all differences obtained from the same or different subsets. This structure of circulant matrices guarantees non-existence of cycle-4 in the Tanner graph of QC-LDPC codes. First, an irregular code with girth 6 constituted by two rows of circulant matrices is proposed. Then, more criteria will be considered on the structure of subsets with the mentioned feature aiming to represent a new scheme of regular QC-LPDC codes with girth at least 8. From simulations, it is confirmed that codes have similar to or better performance than other well-known half rate codes, while require lower complexity in their design.展开更多
We study the construction of minimum bandwidth regenerating code with combinatorial design. At first, a method of constructing minimum storage regenerating (MBR) codes is presented, which can tolerate only one-node ...We study the construction of minimum bandwidth regenerating code with combinatorial design. At first, a method of constructing minimum storage regenerating (MBR) codes is presented, which can tolerate only one-node failure. Then, we give examples to explain the code. Finally, we discuss the case of repairing multiple nodes, and analyze the performance with an example.展开更多
<div style="text-align:justify;"> <span style="font-family:Verdana;">In the field of design theory, the most well-known design is a Steiner Triple System. In general, a G-design on H is...<div style="text-align:justify;"> <span style="font-family:Verdana;">In the field of design theory, the most well-known design is a Steiner Triple System. In general, a G-design on H is an edge-disjoint decomposition of H into isomorphic copies of G. In a Steiner Triple system, a complete graph is decomposed into triangles. In this paper we let H be a complete graph with a hole and G be a complete graph on four vertices minus one edge, also referred to as a <img alt="" src="Edit_e69ee166-4bbc-48f5-8ba1-b446e7d3738c.png" /> . A complete graph with a hole, <img alt="" src="Edit_558c249b-55e8-4f3b-a043-e36d001c4250.png" />, consists of a complete graph on <em>d</em> vertices, <img alt="" src="Edit_cb1772f7-837c-4aea-b4a6-cb38565f5a8b.png" />, and a set of independent vertices of size<em> v, V,</em> where each vertex in <em>V</em> is adjacent to each vertex in <img alt="" src="Edit_cb1772f7-837c-4aea-b4a6-cb38565f5a8b.png" />. When <em>d</em> is even, we give two constructions for the decomposition of a complete graph with a hole into copies of <img alt="" src="Edit_e69ee166-4bbc-48f5-8ba1-b446e7d3738c.png" /> : the Alpha-Delta Construction, and the Alpha-Beta-Delta Construction. By restricting <em>d</em> and <em>v</em> so that <img alt="" src="Edit_6bb9e3b4-1769-4b28-bf89-bc97c47c637e.png" /><span style="white-space:nowrap;"> </span>, we are able to resolve both of these cases for a subset of <img alt="" src="Edit_558c249b-55e8-4f3b-a043-e36d001c4250.png" />using difference methods and 1-factors.</span> </div>展开更多
In the first part of this- paper, three generalizations of arrangement graph A.,k of [1], namely Bn,k, Cn,k and Dn,k , are introduced. We prove that all the three classes of graphs are vertex symmetric, two of them ar...In the first part of this- paper, three generalizations of arrangement graph A.,k of [1], namely Bn,k, Cn,k and Dn,k , are introduced. We prove that all the three classes of graphs are vertex symmetric, two of them are edge symmetric. They have great faulty tolerance and high connectivity. We give the diameters of B..k and Cn,k, the Hamiltonian cycle of Cn,k and Hamiltonian path of B.,k. We list several open problems, one of them related to the complexity of sorting algorithm on the arrangement graphs. All these graphs can be thought as generalizations of star graph but are more flexible so that they can be considered as new interconnection network topologies. In the second part of this paper, we provide other four classes of combinatorial graphes, Chn , Cyn, Zhn and Zyn. Many good properties of them, such as high node--connectivity, node symmetry, edge symmetry, diameter, ets., are shown in this paper.展开更多
Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely with each other using cryptographic techniques. In order to ensure this security, many a...Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely with each other using cryptographic techniques. In order to ensure this security, many approaches have been proposed recently. One of them is to use key predistribution schemes (KPSs) by means of combinatorial designs. In this paper, we use the Bush's construction of orthogonal arrays to present a class of key predistribution schemes for distributed sensor networks. The secure connectivity and resilience of the resulting sensor network are analyzed. This KPS constructed in our paper has some better properties than those of the existing schemes.展开更多
The paper summarises existing theory and classifications for finite line-transitive linear spaces, develops the theory further, and organises it in a way that enables its effective application. The starting point is a...The paper summarises existing theory and classifications for finite line-transitive linear spaces, develops the theory further, and organises it in a way that enables its effective application. The starting point is a theorem of Camina and the fifth author that identifies three kinds of line-transitive automorphism groups of linear spaces. In two of these cases the group may be imprimitive on points, that is, the group leaves invariant a nontrivial partition of the point set. In the first of these cases the group is almost simple with point-transitive simple socle, and may or may not be point-primitive, while in the second case the group has a non-trivial point-intransitive normal subgroup and hence is definitely point-imprimitive. The theory presented here focuses on point-imprimitive groups. As a non-trivial application a classification is given of the point-imprimitive, line-transitive groups, and the corresponding linear spaces, for which the greatest common divisor gcd(k, v - 1) ≤ 8, where v is the number of points, and k is the line size. Motivation for this classification comes from a result of Weidong Fang and Huffing Li in 1993, that there are only finitely many non-trivial point-imprimitive, linetransitive linear spaces for a given value of gcd(k, v - 1). The classification strengthens the classification by Camina and Mischke under the much stronger restriction k ≤ 8: no additional examples arise. The paper provides the backbone for future computer-based classifications of point-imprimitive, line- transitive linear spaces with small parameters. Several suggestions for further investigations are made.展开更多
文摘This paper presents new half rate Quasi Cyclic Low Density Parity Check (QC- LDPC) codes formed on the basis of combinatorial designs. In these codes, circulant matrices of the parity check matrix are formed on the basis of subsets in which the difference between any two elements of a subset is unique with all differences obtained from the same or different subsets. This structure of circulant matrices guarantees non-existence of cycle-4 in the Tanner graph of QC-LDPC codes. First, an irregular code with girth 6 constituted by two rows of circulant matrices is proposed. Then, more criteria will be considered on the structure of subsets with the mentioned feature aiming to represent a new scheme of regular QC-LPDC codes with girth at least 8. From simulations, it is confirmed that codes have similar to or better performance than other well-known half rate codes, while require lower complexity in their design.
基金Supported by the National Natural Science Foundation of China(61271174,61301178)
文摘We study the construction of minimum bandwidth regenerating code with combinatorial design. At first, a method of constructing minimum storage regenerating (MBR) codes is presented, which can tolerate only one-node failure. Then, we give examples to explain the code. Finally, we discuss the case of repairing multiple nodes, and analyze the performance with an example.
文摘<div style="text-align:justify;"> <span style="font-family:Verdana;">In the field of design theory, the most well-known design is a Steiner Triple System. In general, a G-design on H is an edge-disjoint decomposition of H into isomorphic copies of G. In a Steiner Triple system, a complete graph is decomposed into triangles. In this paper we let H be a complete graph with a hole and G be a complete graph on four vertices minus one edge, also referred to as a <img alt="" src="Edit_e69ee166-4bbc-48f5-8ba1-b446e7d3738c.png" /> . A complete graph with a hole, <img alt="" src="Edit_558c249b-55e8-4f3b-a043-e36d001c4250.png" />, consists of a complete graph on <em>d</em> vertices, <img alt="" src="Edit_cb1772f7-837c-4aea-b4a6-cb38565f5a8b.png" />, and a set of independent vertices of size<em> v, V,</em> where each vertex in <em>V</em> is adjacent to each vertex in <img alt="" src="Edit_cb1772f7-837c-4aea-b4a6-cb38565f5a8b.png" />. When <em>d</em> is even, we give two constructions for the decomposition of a complete graph with a hole into copies of <img alt="" src="Edit_e69ee166-4bbc-48f5-8ba1-b446e7d3738c.png" /> : the Alpha-Delta Construction, and the Alpha-Beta-Delta Construction. By restricting <em>d</em> and <em>v</em> so that <img alt="" src="Edit_6bb9e3b4-1769-4b28-bf89-bc97c47c637e.png" /><span style="white-space:nowrap;"> </span>, we are able to resolve both of these cases for a subset of <img alt="" src="Edit_558c249b-55e8-4f3b-a043-e36d001c4250.png" />using difference methods and 1-factors.</span> </div>
文摘In the first part of this- paper, three generalizations of arrangement graph A.,k of [1], namely Bn,k, Cn,k and Dn,k , are introduced. We prove that all the three classes of graphs are vertex symmetric, two of them are edge symmetric. They have great faulty tolerance and high connectivity. We give the diameters of B..k and Cn,k, the Hamiltonian cycle of Cn,k and Hamiltonian path of B.,k. We list several open problems, one of them related to the complexity of sorting algorithm on the arrangement graphs. All these graphs can be thought as generalizations of star graph but are more flexible so that they can be considered as new interconnection network topologies. In the second part of this paper, we provide other four classes of combinatorial graphes, Chn , Cyn, Zhn and Zyn. Many good properties of them, such as high node--connectivity, node symmetry, edge symmetry, diameter, ets., are shown in this paper.
基金supported by the National Natural Science Foundation of China under Grant Nos. 60473017, 90604034and 10771078.
文摘Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely with each other using cryptographic techniques. In order to ensure this security, many approaches have been proposed recently. One of them is to use key predistribution schemes (KPSs) by means of combinatorial designs. In this paper, we use the Bush's construction of orthogonal arrays to present a class of key predistribution schemes for distributed sensor networks. The secure connectivity and resilience of the resulting sensor network are analyzed. This KPS constructed in our paper has some better properties than those of the existing schemes.
基金Supported by Australian Research Council(Grant Nos. DP0557587 and DP0209706)The fifth author is supported by Australian Research Council Federation Fellowship FF0776186The sixth author is partly supported by the NSF of Guangdong Province
文摘The paper summarises existing theory and classifications for finite line-transitive linear spaces, develops the theory further, and organises it in a way that enables its effective application. The starting point is a theorem of Camina and the fifth author that identifies three kinds of line-transitive automorphism groups of linear spaces. In two of these cases the group may be imprimitive on points, that is, the group leaves invariant a nontrivial partition of the point set. In the first of these cases the group is almost simple with point-transitive simple socle, and may or may not be point-primitive, while in the second case the group has a non-trivial point-intransitive normal subgroup and hence is definitely point-imprimitive. The theory presented here focuses on point-imprimitive groups. As a non-trivial application a classification is given of the point-imprimitive, line-transitive groups, and the corresponding linear spaces, for which the greatest common divisor gcd(k, v - 1) ≤ 8, where v is the number of points, and k is the line size. Motivation for this classification comes from a result of Weidong Fang and Huffing Li in 1993, that there are only finitely many non-trivial point-imprimitive, linetransitive linear spaces for a given value of gcd(k, v - 1). The classification strengthens the classification by Camina and Mischke under the much stronger restriction k ≤ 8: no additional examples arise. The paper provides the backbone for future computer-based classifications of point-imprimitive, line- transitive linear spaces with small parameters. Several suggestions for further investigations are made.