期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Half Rate Quasi Cyclic Low Density Parity Check Codes Based on Combinatorial Designs 被引量:2
1
作者 Sina Vafi Narges Rezvani Majid 《Journal of Computer and Communications》 2016年第12期39-49,共12页
This paper presents new half rate Quasi Cyclic Low Density Parity Check (QC- LDPC) codes formed on the basis of combinatorial designs. In these codes, circulant matrices of the parity check matrix are formed on the ba... This paper presents new half rate Quasi Cyclic Low Density Parity Check (QC- LDPC) codes formed on the basis of combinatorial designs. In these codes, circulant matrices of the parity check matrix are formed on the basis of subsets in which the difference between any two elements of a subset is unique with all differences obtained from the same or different subsets. This structure of circulant matrices guarantees non-existence of cycle-4 in the Tanner graph of QC-LDPC codes. First, an irregular code with girth 6 constituted by two rows of circulant matrices is proposed. Then, more criteria will be considered on the structure of subsets with the mentioned feature aiming to represent a new scheme of regular QC-LPDC codes with girth at least 8. From simulations, it is confirmed that codes have similar to or better performance than other well-known half rate codes, while require lower complexity in their design. 展开更多
关键词 Quasi-Cyclic LDPC Codes combinatorial designs Circulant Matrix
下载PDF
Construction of Minimum Bandwidth Regenerating Codes with Combinatorial Design 被引量:1
2
作者 CAI Feng GUO Wangmei 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第3期229-234,共6页
We study the construction of minimum bandwidth regenerating code with combinatorial design. At first, a method of constructing minimum storage regenerating (MBR) codes is presented, which can tolerate only one-node ... We study the construction of minimum bandwidth regenerating code with combinatorial design. At first, a method of constructing minimum storage regenerating (MBR) codes is presented, which can tolerate only one-node failure. Then, we give examples to explain the code. Finally, we discuss the case of repairing multiple nodes, and analyze the performance with an example. 展开更多
关键词 distributed storage system minimum bandwidth regenerating codes combinatorial design network coding
原文传递
A Decomposition of a Complete Graph with a Hole
3
作者 Roxanne Back Alejandra Brewer Castano +1 位作者 Rachel Galindo Jessica Finocchiaro 《Open Journal of Discrete Mathematics》 2021年第1期1-12,共12页
<div style="text-align:justify;"> <span style="font-family:Verdana;">In the field of design theory, the most well-known design is a Steiner Triple System. In general, a G-design on H is... <div style="text-align:justify;"> <span style="font-family:Verdana;">In the field of design theory, the most well-known design is a Steiner Triple System. In general, a G-design on H is an edge-disjoint decomposition of H into isomorphic copies of G. In a Steiner Triple system, a complete graph is decomposed into triangles. In this paper we let H be a complete graph with a hole and G be a complete graph on four vertices minus one edge, also referred to as a <img alt="" src="Edit_e69ee166-4bbc-48f5-8ba1-b446e7d3738c.png" /> . A complete graph with a hole, <img alt="" src="Edit_558c249b-55e8-4f3b-a043-e36d001c4250.png" />, consists of a complete graph on <em>d</em> vertices, <img alt="" src="Edit_cb1772f7-837c-4aea-b4a6-cb38565f5a8b.png" />, and a set of independent vertices of size<em> v, V,</em> where each vertex in <em>V</em> is adjacent to each vertex in <img alt="" src="Edit_cb1772f7-837c-4aea-b4a6-cb38565f5a8b.png" />. When <em>d</em> is even, we give two constructions for the decomposition of a complete graph with a hole into copies of <img alt="" src="Edit_e69ee166-4bbc-48f5-8ba1-b446e7d3738c.png" /> : the Alpha-Delta Construction, and the Alpha-Beta-Delta Construction. By restricting <em>d</em> and <em>v</em> so that <img alt="" src="Edit_6bb9e3b4-1769-4b28-bf89-bc97c47c637e.png" /><span style="white-space:nowrap;"> </span>, we are able to resolve both of these cases for a subset of <img alt="" src="Edit_558c249b-55e8-4f3b-a043-e36d001c4250.png" />using difference methods and 1-factors.</span> </div> 展开更多
关键词 Graph Decomposition combinatorial design Complete Graph with a Hole
下载PDF
New Classes of Interconnection Topology Structures and Their Properties
4
作者 Hong Zhu Zheng Sun(Department of Computer Science, Fudan University, Shanghai 200133, China)(Tel. +86 21 65492222-2821 or 65482082 Fax. +86 21 65490475 Telex. 33317 HUAFU CN E-mail: hzhu@solaris.fudan.sh.cn or sum@math.vanderbilt.edu) 《Wuhan University Journal of Natural Sciences》 CAS 1996年第Z1期371-385,共15页
In the first part of this- paper, three generalizations of arrangement graph A.,k of [1], namely Bn,k, Cn,k and Dn,k , are introduced. We prove that all the three classes of graphs are vertex symmetric, two of them ar... In the first part of this- paper, three generalizations of arrangement graph A.,k of [1], namely Bn,k, Cn,k and Dn,k , are introduced. We prove that all the three classes of graphs are vertex symmetric, two of them are edge symmetric. They have great faulty tolerance and high connectivity. We give the diameters of B..k and Cn,k, the Hamiltonian cycle of Cn,k and Hamiltonian path of B.,k. We list several open problems, one of them related to the complexity of sorting algorithm on the arrangement graphs. All these graphs can be thought as generalizations of star graph but are more flexible so that they can be considered as new interconnection network topologies. In the second part of this paper, we provide other four classes of combinatorial graphes, Chn , Cyn, Zhn and Zyn. Many good properties of them, such as high node--connectivity, node symmetry, edge symmetry, diameter, ets., are shown in this paper. 展开更多
关键词 combinatorial problem design of algorithms parallel algorithms faulty tolerance routing star graphs symmetry.
下载PDF
A Class of Key Predistribution Schemes Based on Orthogonal Arrays 被引量:1
5
作者 董军武 裴定一 王学理 《Journal of Computer Science & Technology》 SCIE EI CSCD 2008年第5期825-831,共7页
Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely with each other using cryptographic techniques. In order to ensure this security, many a... Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely with each other using cryptographic techniques. In order to ensure this security, many approaches have been proposed recently. One of them is to use key predistribution schemes (KPSs) by means of combinatorial designs. In this paper, we use the Bush's construction of orthogonal arrays to present a class of key predistribution schemes for distributed sensor networks. The secure connectivity and resilience of the resulting sensor network are analyzed. This KPS constructed in our paper has some better properties than those of the existing schemes. 展开更多
关键词 sensor network key predistribution scheme combinatorial design orthogonal array Bush's construction
原文传递
Finite Line-transitive Linear Spaces:Theory and Search Strategies 被引量:1
6
作者 Anton BETTEN Anne DELANDTSHEER +3 位作者 Maska LAW Alice C. NIEMEYER Cheryl E. PRAEGER Shenglin ZHOU 《Acta Mathematica Sinica,English Series》 SCIE CSCD 2009年第9期1399-1436,共38页
The paper summarises existing theory and classifications for finite line-transitive linear spaces, develops the theory further, and organises it in a way that enables its effective application. The starting point is a... The paper summarises existing theory and classifications for finite line-transitive linear spaces, develops the theory further, and organises it in a way that enables its effective application. The starting point is a theorem of Camina and the fifth author that identifies three kinds of line-transitive automorphism groups of linear spaces. In two of these cases the group may be imprimitive on points, that is, the group leaves invariant a nontrivial partition of the point set. In the first of these cases the group is almost simple with point-transitive simple socle, and may or may not be point-primitive, while in the second case the group has a non-trivial point-intransitive normal subgroup and hence is definitely point-imprimitive. The theory presented here focuses on point-imprimitive groups. As a non-trivial application a classification is given of the point-imprimitive, line-transitive groups, and the corresponding linear spaces, for which the greatest common divisor gcd(k, v - 1) ≤ 8, where v is the number of points, and k is the line size. Motivation for this classification comes from a result of Weidong Fang and Huffing Li in 1993, that there are only finitely many non-trivial point-imprimitive, linetransitive linear spaces for a given value of gcd(k, v - 1). The classification strengthens the classification by Camina and Mischke under the much stronger restriction k ≤ 8: no additional examples arise. The paper provides the backbone for future computer-based classifications of point-imprimitive, line- transitive linear spaces with small parameters. Several suggestions for further investigations are made. 展开更多
关键词 linear space LINE-TRANSITIVE automorphism group combinatorial design combinatorial search algorithm
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部