期刊文献+
共找到2,956篇文章
< 1 2 148 >
每页显示 20 50 100
Watermarking Images in the Frequency Domain by Exploiting Self-Inverting Permutations
1
作者 Maria Chroni Angelos Fylakis Stavros D. Nikolopoulos 《Journal of Information Security》 2013年第2期80-91,共12页
In this work we propose efficient codec algorithms for watermarking images that are intended for uploading on the web under intellectual property protection. Headed to this direction, we recently suggested a way in wh... In this work we propose efficient codec algorithms for watermarking images that are intended for uploading on the web under intellectual property protection. Headed to this direction, we recently suggested a way in which an integer number w which being transformed into a self-inverting permutation, can be represented in a two dimensional (2D) object and thus, since images are 2D structures, we have proposed a watermarking algorithm that embeds marks on them using the 2D representation of w in the spatial domain. Based on the idea behind this technique, we now expand the usage of this concept by marking the image in the frequency domain. In particular, we propose a watermarking technique that also uses the 2D representation of self-inverting permutations and utilizes marking at specific areas thanks to partial modifications of the image’s Discrete Fourier Transform (DFT). Those modifications are made on the magnitude of specific frequency bands and they are the least possible additive information ensuring robustness and imperceptiveness. We have experimentally evaluated our algorithms using various images of different characteristics under JPEG compression. The experimental results show an improvement in comparison to the previously obtained results and they also depict the validity of our proposed codec algorithms. 展开更多
关键词 WATERMARKING Techniques Image WATERMARKING Algorithms self-inverting permutations 2D REPRESENTATIONS of permutations ENCODING DECODING Frequency Domain Experimental Evaluation
在线阅读 下载PDF
Walsh Spectral Characteristics and the Auto-Correlation Function Characteristics of Forming Orthomorphic Permutations of Multi-Output Functions 被引量:4
2
作者 ZHAO Yaqun WANG Jue 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1895-1898,共4页
Orthomorphic permutations have good characteristics in cryptosystems. In this paper, by using of knowledge about relation between orthomorphic permutations and multi-output functions, and conceptions of the generalize... Orthomorphic permutations have good characteristics in cryptosystems. In this paper, by using of knowledge about relation between orthomorphic permutations and multi-output functions, and conceptions of the generalized Walsh spectrum of multi-output functions and the auto-correlation function of multi-output functions to investigate the Walsh spectral characteristics and the auto-correlation function characteristics of orthormophic permutations, several results are obtained. 展开更多
关键词 orthomorphic permutation multi-output functions walsh spectral auto-correlation function
在线阅读 下载PDF
Role of Metacognition in Mathematical Problem Solving Process of Permutations and Combinations--Basic Study for CAI Software Development 被引量:1
3
作者 Atsuo Murata Yukio Ohta 《Computer Technology and Application》 2013年第6期296-306,共11页
When solving a mathematical problem, we sometimes encounter a situation where we can not reach a correct answer in spite of acquiring knowledge and formula necessary for the solution. The reason can be attributed to t... When solving a mathematical problem, we sometimes encounter a situation where we can not reach a correct answer in spite of acquiring knowledge and formula necessary for the solution. The reason can be attributed to the lack in metacognitive abilities. Metacognitive abilities consist of comparing the difficulty of problem with own ability, proper plan of solution process, and conscious monitoring and control of solution process. The role and importance of metacognitive ability in mathematical problem solving of permutations and combinations was explored. Participants were required to solve five practical problems related to permutations and combinations. For each problem, the solution process was divided into: (1) understanding (recognition) of mathematical problem; (2) plan of solution; (3) execution of solution. Participants were also required to rate the anticipation whether they could solve it or not, and to rate the confidence of their own answer. According to the total score of five problems, the participants were categorized into the group of the high test score and the group of the low test score. As a result, at the plan and the execution processes, statistically significant differences were detected between the high and the low score groups. As for the rating on the anticipation of result and the confidence of own answer, no significant differences were found between both groups. Moreover, the relationship between the score of plan process and the score of execution process was statistically correlated. In other words, the more proper the plan process was conducted, the more proper solution the participants reached. In such a way, the importance of metacognitive ability in the solving process, especially the plan ability, was suggested. 展开更多
关键词 permutation and combination problem METACOGNITION understanding plan EXECUTION CAI (computer assistedinstruction).
在线阅读 下载PDF
Singly Covered Minimal Elements of Linked Partitions and Cycles of Permutations
4
作者 Guo Wen-kui Niu Fei-fei Du Xian-kun 《Communications in Mathematical Research》 CSCD 2019年第1期75-80,共6页
Linked partitions were introduced by Dykema(Dykema K J. Multilinear function series and transforms in free probability theory. Adv. Math., 2005, 208(1):351–407) in the study of the unsymmetrized T-transform in free p... Linked partitions were introduced by Dykema(Dykema K J. Multilinear function series and transforms in free probability theory. Adv. Math., 2005, 208(1):351–407) in the study of the unsymmetrized T-transform in free probability theory.Permutation is one of the most classical combinatorial structures. According to the linear representation of linked partitions, Chen et al.(Chen W Y C, Wu S Y J, Yan C H. Linked partitions and linked cycles. European J. Combin., 2008, 29(6): 1408–1426) de?ned the concept of singly covered minimal elements. Let L(n, k) denote the set of linked partitions of [n] with k singly covered minimal elements and let P(n, k) denote the set of permutations of [n] with k cycles. In this paper, we mainly establish two bijections between L(n, k) and P(n, k). The two bijections from a different perspective show the one-to-one correspondence between the singly covered minimal elements in L(n, k) and the cycles in P(n, k). 展开更多
关键词 singly COVERED MINIMAL element linked PARTITION permutATION cycle
在线阅读 下载PDF
Chrestenson Spectrum and Auto-Correlation Function of Inverse Permutations of Quick Trickle Permutations
5
作者 WANG Jue LI Zhengchao ZHAO Yaqun 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期587-590,共4页
In this paper, a sufficient and necessary condition of quick trickle permutations is given from the point of inverse permutations. The bridge is built between quick trickle permutations and m-value logic functions. By... In this paper, a sufficient and necessary condition of quick trickle permutations is given from the point of inverse permutations. The bridge is built between quick trickle permutations and m-value logic functions. By the methods of the Chrestenson spectrum of m-value logic functions and the auto-correlation function of m-value logic functions to investigate the Chrestenson spectral characteristics and the auto-correlation function charac- teristics of inverse permutations of quick trickle permutations, a determinant arithmetic of quick trickle permutations is given. Using the results, it becomes easy to judge that a permutation is a quick trickle permutation or not by using computer. This gives a new pathway to study constructions and enumerations of quick trickle permutations. 展开更多
关键词 quick trickle permutation chrestenson spectrum auto-correlation function m-value logic function
在线阅读 下载PDF
Constructing Permutation Binomials from Permutations of Subfields
6
作者 QIN Xiaoer YAN Li 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2020年第4期330-336,共7页
Permutation polynomials is a hot topic in finite fields,they have many applications in different areas.Permutation binomials and trinomials over finite fields were studied recently.In thispaper,by using a powerful lem... Permutation polynomials is a hot topic in finite fields,they have many applications in different areas.Permutation binomials and trinomials over finite fields were studied recently.In thispaper,by using a powerful lemma given by Zieve and some degree 5 and 6 permutation polynomials over Fq,we construct somepermutation binomials over Fqm. 展开更多
关键词 finite field permutation binomials normalized permutation polynomials
原文传递
Enumerating Pattern-avoiding Fishburn Permutations Subject to Seven Statistics
7
作者 Yujie DU Philip B.ZHANG 《Journal of Mathematical Research with Applications》 CSCD 2024年第4期427-436,共10页
Fishburn permutations are in bijection with several important combinatorial structures including interval orders.In this paper,we use the method of generating trees to enumerate two classes of pattern-avoiding Fishbur... Fishburn permutations are in bijection with several important combinatorial structures including interval orders.In this paper,we use the method of generating trees to enumerate two classes of pattern-avoiding Fishburn permutations subject to 7 classical statistics simultaneously.The classes of our interest are(321,312)-avoiding and(321,4123)-avoiding Fishburn permutations.The statistics of our interest are ascents,descents,inversions,right-to-left maxima,right-to-left minima,left-to-right maxima and left-to-right minima.Our results generalize a result by Egge. 展开更多
关键词 Fishburn permutation Fishburn number pattern avoidance generating tree
原文传递
Double Derangement Permutations
8
作者 Pooya Daneshmand Kamyar Mirzavaziri Madjid Mirzavaziri 《Open Journal of Discrete Mathematics》 2016年第2期99-104,共6页
Let n be a positive integer. A permutation a of the symmetric group  of permutations of  is called a derangement if   for each . Suppose that x and y are two arbitrary permutations of . We say that... Let n be a positive integer. A permutation a of the symmetric group  of permutations of  is called a derangement if   for each . Suppose that x and y are two arbitrary permutations of . We say that a permutation a is a double derangement with respect to x and y if  and  for each . In this paper, we give an explicit formula for , the number of double derangements with respect to x and y. Let  and let  and  be two subsets of  with  and . Suppose that  denotes the number of derangements x such that . As the main result, we show that if  and z is a permutation such that  for  and  for , then  where . 展开更多
关键词 Symmetric Group of permutations Derangement Double Derangement
在线阅读 下载PDF
Coupling Product on Permutations
9
作者 Yishuo Yang Huilan Li 《Journal of Applied Mathematics and Physics》 2024年第12期4104-4111,共8页
In combinatorics, permutations are important objects with many operations. In this paper, we define a coupling product on permutations and prove that the space spanned by permutations is a graded algebra.
关键词 permutATION Coupling Product GRADED ALGEBRA
在线阅读 下载PDF
Generation Algorithm of a Sort of P-Permutations
10
作者 HAN Haiqing ZHANG Huanguo +1 位作者 LI Qin TONG Yan 《Wuhan University Journal of Natural Sciences》 CAS 2010年第3期237-241,共5页
This paper design the P-permutation with cryptologic properties beyond certain bound based on BCH code and Goppa code, which is the generalization of the design method utilizing the maximum distance separable (MDS) ... This paper design the P-permutation with cryptologic properties beyond certain bound based on BCH code and Goppa code, which is the generalization of the design method utilizing the maximum distance separable (MDS) code, and presents the novel algorithms to generate the P-permutations with the branch number no less than a preset low bound. The new generation algorithms provide a theoretical basis for automation design of the cryptosystem. 展开更多
关键词 block cipher P-permutation branch number linear code check matrix generator matrix
原文传递
An Iterated Greedy Algorithm with Memory and Learning Mechanisms for the Distributed Permutation Flow Shop Scheduling Problem
11
作者 Binhui Wang Hongfeng Wang 《Computers, Materials & Continua》 SCIE EI 2025年第1期371-388,共18页
The distributed permutation flow shop scheduling problem(DPFSP)has received increasing attention in recent years.The iterated greedy algorithm(IGA)serves as a powerful optimizer for addressing such a problem because o... The distributed permutation flow shop scheduling problem(DPFSP)has received increasing attention in recent years.The iterated greedy algorithm(IGA)serves as a powerful optimizer for addressing such a problem because of its straightforward,single-solution evolution framework.However,a potential draw-back of IGA is the lack of utilization of historical information,which could lead to an imbalance between exploration and exploitation,especially in large-scale DPFSPs.As a consequence,this paper develops an IGA with memory and learning mechanisms(MLIGA)to efficiently solve the DPFSP targeted at the mini-malmakespan.InMLIGA,we incorporate a memory mechanism to make a more informed selection of the initial solution at each stage of the search,by extending,reconstructing,and reinforcing the information from previous solutions.In addition,we design a twolayer cooperative reinforcement learning approach to intelligently determine the key parameters of IGA and the operations of the memory mechanism.Meanwhile,to ensure that the experience generated by each perturbation operator is fully learned and to reduce the prior parameters of MLIGA,a probability curve-based acceptance criterion is proposed by combining a cube root function with custom rules.At last,a discrete adaptive learning rate is employed to enhance the stability of the memory and learningmechanisms.Complete ablation experiments are utilized to verify the effectiveness of the memory mechanism,and the results show that this mechanism is capable of improving the performance of IGA to a large extent.Furthermore,through comparative experiments involving MLIGA and five state-of-the-art algorithms on 720 benchmarks,we have discovered that MLI-GA demonstrates significant potential for solving large-scale DPFSPs.This indicates that MLIGA is well-suited for real-world distributed flow shop scheduling. 展开更多
关键词 Distributed permutation flow shop scheduling MAKESPAN iterated greedy algorithm memory mechanism cooperative reinforcement learning
在线阅读 下载PDF
Sign-Balanced Pattern-Avoiding Permutation Classes
12
作者 Junyao PAN Pengfei GUO 《Journal of Mathematical Research with Applications》 2025年第4期427-436,共10页
A set of permutations is called sign-balanced if the set contains the same number of even permutations as odd permutations.Let S_(n)(σ_(1),σ_(2),...,σ_(r))denote the set of permutations in the symmetric group S_(n)... A set of permutations is called sign-balanced if the set contains the same number of even permutations as odd permutations.Let S_(n)(σ_(1),σ_(2),...,σ_(r))denote the set of permutations in the symmetric group S_(n)which avoid patternsσ_(1),σ_(2),...,σ_(r).The aim of this paper is to investigate when,for certain patternsσ_(1),σ_(2),...,σ_(r),S_(n)(σ_(1),σ_(2),...,σ_(r))is sign-balanced for every integer n>1.We prove that for any{σ_(1),σ_(2),...,σ_(r)}?S_3,if{σ_(1),σ_(2),...,σ_(r)}is sign-balanced except for{132,213,231,312},then S_(n)(σ_(1),σ_(2),...,σ_(r))is sign-balanced for every integer n>1.In addition,we give some results in the case of avoiding some patterns of length 4. 展开更多
关键词 permutATION sign-balanced symmetric group avoid patterns
原文传递
A Note on a Class of Permutation Quadrinomials of F_(q^(2))
13
作者 QIN Xiaoer GUO Xiaonan +1 位作者 QIU Yinuo YAN Li 《Wuhan University Journal of Natural Sciences》 2025年第3期231-234,共4页
Constructing permutation polynomials is a hot topic in finite fields,and permutation polynomials have many applications in dif‐ferent areas.In this paper,by using monomials on the cosets of a subgroup to characterize... Constructing permutation polynomials is a hot topic in finite fields,and permutation polynomials have many applications in dif‐ferent areas.In this paper,by using monomials on the cosets of a subgroup to characterize the permutational property of rational functions onμq+1,we construct a class of permutation quadrinomials with the form f_(r,a,b,c,s,t,u)(x)=x^(r)(1+ax^(s(q-1))+bx^(t(q-1))+cxu(q-1))of F_(q^(2)). 展开更多
关键词 permutation quadrinomials MONOMIALS finite fields
原文传递
Efficient implementation of quantum permutation algorithm using a polar SrO molecule in pendular states
14
作者 Jie-Ru Hu Zuo-Yuan Zhang Jin-Ming Liu 《Communications in Theoretical Physics》 2025年第2期39-51,共13页
Quantum algorithms offer more enhanced computational efficiency in comparison to their classical counterparts when solving specific tasks.In this study,we implement the quantum permutation algorithm utilizing a polar ... Quantum algorithms offer more enhanced computational efficiency in comparison to their classical counterparts when solving specific tasks.In this study,we implement the quantum permutation algorithm utilizing a polar molecule within an external electric field.The selection of the molecular qutrit involves the utilization of field-dressed states generated through the pendular modes of SrO.Through the application of multi-target optimal control theory,we strategically design microwave pulses to execute logical operations,including Fourier transform,oracle U_(f)operation,and inverse Fourier transform within a three-level molecular qutrit structure.The observed high fidelity of our outcomes is intricately linked to the concept of the quantum speed limit,which quantifies the maximum speed of quantum state manipulation.Subsequently,we design the optimized pulse sequence to successfully simulate the quantum permutation algorithm on a single SrO molecule,achieving remarkable fidelity.Consequently,a quantum circuit comprising a single qutrit suffices to determine permutation parity with just a single function evaluation.Therefore,our results indicate that the optimal control theory can be well applied to the quantum computation of polar molecular systems. 展开更多
关键词 polar molecule optimal control quantum permutation algorithm pendular states
原文传递
A Secure Audio Encryption Method Using Tent-Controlled Permutation and Logistic Map-Based Key Generation
15
作者 Ibtisam A.Taqi Sarab M.Hameed 《Computers, Materials & Continua》 2025年第10期1653-1674,共22页
The exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information.Due to high processing requirements,tr... The exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information.Due to high processing requirements,traditional encryption algorithms demand considerable computational effort for real-time audio encryption.To address these challenges,this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps.The audio data is first shuffled using Tent map for the random permutation.The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map.Finally,the Exclusive OR(XOR)operation is applied between the generated key and the shuffled audio to yield the cipher audio.The experimental results prove that the proposed method surpassed the other techniques by encrypting two types of audio files,as mono and stereo audio files with large sizes up to 122 MB,different sample rates 22,050,44,100,48,000,and 96,000 for WAV and 44,100 sample rates for MP3 of size 11 MB.The results show high Mean Square Error(MSE),low Signal-to-Noise Ratio(SNR),spectral distortion,100%Number of Sample Change Rate(NSCR),high Percent Residual Deviation(PRD),low Correlation Coefficient(CC),large key space 2^(616),high sensitivity to a slight change in the secret key and that it can counter several attacks,namely brute force attack,statistical attack,differential attack,and noise attack. 展开更多
关键词 Wave protection 1D logistic map Tent map random permutation key generation
在线阅读 下载PDF
Layer-2 transferable belief model:Manage uncertainty on random permutation sets
16
作者 Qian-Li Zhou Yong Deng 《Journal of Electronic Science and Technology》 2025年第2期52-64,共13页
In this paper,the transferable belief model established on power sets is extended to the permutation event space(PES)and is referred to as the layer-2 transferable belief model.Our goal is to provide a comprehensive a... In this paper,the transferable belief model established on power sets is extended to the permutation event space(PES)and is referred to as the layer-2 transferable belief model.Our goal is to provide a comprehensive approach for handling and modeling uncertainty,capable of representing both quantitative and qualitative information.First,the motivation for proposing the layer-2 transferable belief model and its information processing principles are explored from the perspective of weak propensity.Then,based on these principles,the corresponding information processing methods for the credal and pignistic levels are developed.Finally,the advantages of this model are validated through a classifier that leverages attribute fusion to enhance performance and decision-making accuracy. 展开更多
关键词 Evidence theory Information processing Information fusion Layer-2 belief structure Random permutation set
在线阅读 下载PDF
2024年4月3日中国台湾花莲县海域7.3级地震前重力扰动提取
17
作者 刘水莲 蔡佩蕊 王绍然 《山西地震》 2026年第1期18-25,共8页
通过对福建省连续重力台站记录到的中国台湾花莲县海域7.3级地震震前9 d重力原始秒采样数据进行分析,并采用排列熵法成功提取到震前的重力扰动信号。结果显示,噪声信号呈现“纺锤状”形态,主频率集中在0.2~0.5 Hz,PE值表现为缓慢下降后... 通过对福建省连续重力台站记录到的中国台湾花莲县海域7.3级地震震前9 d重力原始秒采样数据进行分析,并采用排列熵法成功提取到震前的重力扰动信号。结果显示,噪声信号呈现“纺锤状”形态,主频率集中在0.2~0.5 Hz,PE值表现为缓慢下降后上升形态,并将其与2022年9月18日中国台湾花莲县6.9级地震前台风扰动结果进行频谱对比分析,发现连续重力记录中,二者扰动形态、扰动频率等存在些许差异。震前异常扰动的频率范围较台风更窄,主频大于风扰,福建区域重力扰动提取结果验证了采用本方法提取震前扰动的可信度。研究结果可为今后进一步研究闽台地区中强地震短临阶段的扰动现象提供借鉴。 展开更多
关键词 连续重力 排列熵 震前扰动
在线阅读 下载PDF
基于扩散先验的脑部MRI超分辨率重建
18
作者 熊承义 曹雨轩 高志荣 《中南民族大学学报(自然科学版)》 2026年第2期202-211,共10页
现有基于Transformer的MRI超分辨率方法虽具有良好的全局建模能力,但忽略了深度先验约束建模的重要性.为此,提出了一种基于扩散先验的脑部MRI超分辨率方法,利用潜在扩散模型生成的先验来引导Transformer进行超分辨率重建,以提升MRI细节... 现有基于Transformer的MRI超分辨率方法虽具有良好的全局建模能力,但忽略了深度先验约束建模的重要性.为此,提出了一种基于扩散先验的脑部MRI超分辨率方法,利用潜在扩散模型生成的先验来引导Transformer进行超分辨率重建,以提升MRI细节重建能力.具体而言,采用两阶段协同训练策略:第一阶段通过真实图像潜编码构建内容先验;第二阶段引入扩散模型重构先验,并联合优化去噪与重建过程,实现无监督条件下的图像超分辨率.此外,采用深度可分离卷积与置换自注意力机制,实现编码器的高效建模与感受野扩展.在IXI多模态MRI数据集上的4倍超分辨率实验表明:所提出方法在提升重建图像主客观质量与重建效率方面优于已有方法 . 展开更多
关键词 MRI超分辨率 扩散先验 置换自注意力 深度可分离卷积
在线阅读 下载PDF
电力变压器缺陷记录嵌套实体识别方法
19
作者 缪希仁 曹喜龙 +2 位作者 江灏 陈静 林蔚青 《仪器仪表学报》 北大核心 2026年第2期161-172,共12页
随着近年来电网规模的不断扩大,海量非结构化的设备缺陷记录被采集与积累。这些数据中蕴涵着对设备状态评估与运维决策至关重要的实体信息。然而,此类数据中普遍存在的实体嵌套结构导致了实体边界模糊性与上下文语义复杂性的提升,对传... 随着近年来电网规模的不断扩大,海量非结构化的设备缺陷记录被采集与积累。这些数据中蕴涵着对设备状态评估与运维决策至关重要的实体信息。然而,此类数据中普遍存在的实体嵌套结构导致了实体边界模糊性与上下文语义复杂性的提升,对传统的命名实体识别方法构成了显著挑战。为实现对缺陷记录嵌套实体精准识别,以电力变压器为典型设备,提出了一种乱序预训练语言模型(PERT)、双向门控循环单元(BiGRU)与高效全局指针网络(EGP)相结合的电力变压器缺陷记录命名实体识别方法。该方法首先以PERT模型作为向量嵌入层进行动态语义编码,利用其乱序预训练特性深度捕捉文本的上下文依赖关系;随后引入BiGRU网络作为文本编码层,通过双向门控机制,更加全面地进行语义特征提取;最后采用EGP作为解码输出层,聚焦实体跨度与边界,实现对嵌套实体的精准抽取,避免了传统条件随机场(CRF)解码的标记冲突问题。实验结果表明,该实体识别方法能有效应对嵌套实体挑战,其综合F1分数达96.01%,较传统嵌套识别方法双向变换器预训练模型-双仿射注意力(BERT-Biaffine)以及双向变换器预训练模型-机器阅读理解(BERT-MRC)分别高出0.55%和0.70%。在全部5类实体标签识别中均取得了最高的F1分数。特别地,在嵌套现象最显著的缺陷设备与缺陷部位识别上,所提方法的F1分数分别达到100%与94.74%,相较最优基准模型提升了0.57%与0.13%。 展开更多
关键词 电力变压器缺陷记录 命名实体识别 乱序预训练语言模型 双向门控循环单元 高效全局指针网络 嵌套实体
原文传递
最优和渐近最优码本的新构造
20
作者 高有 谢明月 王刚 《中国民航大学学报》 2026年第1期86-90,共5页
码本是一类具有较低相关性的信号集,满足Welch界或Levenshtein界的码本(又称信号集)主要用于码分多址(CDMA,code-division multiple-access)系统中不同用户信号的区分,也可用于压缩感知、编码理论和量子计算。本文提供了两类关于Levensh... 码本是一类具有较低相关性的信号集,满足Welch界或Levenshtein界的码本(又称信号集)主要用于码分多址(CDMA,code-division multiple-access)系统中不同用户信号的区分,也可用于压缩感知、编码理论和量子计算。本文提供了两类关于Levenshtein界的最优和渐近最优码本的新构造。首先,利用设计理论对象网和Hadamard矩阵构造了一类新的关于Levenshtein界的最优码本;其次,利用有限域上的置换函数构造了一类关于Levenshtein界的渐近最优码本。参数对比表明,这两类码本的构造参数和方法均为新成果。 展开更多
关键词 最优码本 渐近最优码本 Levenshtein界 设计理论对象网 置换函数 有限域
在线阅读 下载PDF
上一页 1 2 148 下一页 到第
使用帮助 返回顶部