423 research outputs found
On some codes from rank 3 primitive actions of the simple Chevalley group G2(q)
Please read abstract in the article.The National Research Foundation of South Africahttp://aimsciences.org/journals/amc/index.htmhj2022Mathematics and Applied Mathematic
Codes from adjacency matrices of uniform subset graphs
Studies of the p-ary codes from the adjacency matrices of uniform subset graphs Γ(n,k,r)Γ(n,k,r) and their reflexive associates have shown that a particular family of codes defined on the subsets are intimately related to the codes from these graphs. We describe these codes here and examine their relation to some particular classes of uniform subset graphs. In particular we include a complete analysis of the p-ary codes from Γ(n,3,r)Γ(n,3,r) for p≥5p≥5 , thus extending earlier results for p=2,3p=2,3
On Commutation and Conjugacy of Rational Languages and the Fixed Point Method
The research on language equations has been active during last decades. Compared to the equations on words the equations on languages are much more difficult to solve. Even very simple equations that are easy to solve for words can be very hard for languages. In this thesis we study two of such equations, namely commutation and conjugacy equations. We study these equations on some limited special cases and compare some of these results to the solutions of corresponding equations on words. For both equations we study the maximal solutions, the centralizer and the conjugator. We present a fixed point method that we can use to search these maximal solutions and analyze the reasons why this method is not successful for all languages. We give also several examples to illustrate the behaviour of this method.Siirretty Doriast
Codes Related to and Derived from Hamming Graphs
Masters of ScienceCodes Related to and Derived from Hamming Graphs
T.R Muthivhi
M.Sc thesis, Department of Mathematics, University of Western Cape
For integers n; k 1; and k n; the graph k
n has vertices the 2n vectors
of Fn2
and adjacency de ned by two vectors being adjacent if they di er in k
coordinate positions. In particular, 1
n is the classical n-cube, usually denoted
by H1(n; 2): This study examines the codes (both binary and p-ary for p an odd
prime) of the row span of adjacency and incidence matrices of these graphs.
We rst examine codes of the adjacency matrices of the n-cube. These have
been considered in [14]. We then consider codes generated by both incidence
and adjacency matrices of the Hamming graphs H1(n; 3) [12]. We will also
consider codes of the line graphs of the n-cube as in [13].
Further, the automorphism groups of the codes, designs and graphs will be
examined, highlighting where there is an interplay. Where possible, suitable
permutation decoding sets will be given
Combinatorial structures for anonymous database search
This thesis treats a protocol for anonymous database search (or if one prefer, a protocol for user-private information retrieval), that is based on the use of combinatorial configurations. The protocol is called P2P UPIR. It is proved that the (v,k,1)-balanced incomplete block designs (BIBD) and in particular the finite projective planes are optimal configurations for this protocol. The notion of n-anonymity is applied to the configurations for P2P UPIR protocol and the transversal designs are proved to be n-anonymous configurations for P2P UPIR, with respect to the neighborhood points of the points of the configuration. It is proved that to the configurable tuples one can associate a numerical semigroup. This theorem implies results on existence of combinatorial configurations. The proofs are constructive and can be used as algorithms for finding combinatorial configurations. It is also proved that to the triangle-free configurable tuples one can associate a numerical semigroup. This implies results on existence of triangle-free combinatorial configurations
- …