极值组合与编码理论中的若干问题
[Abstract]:Some problems in the theory of extreme combination and coding are considered in this paper. By using the powerful mathematical tools, including the polynomial method, the super-graph removal approach and the addition number theory, several conjecture and open problems with considerable difficulty are studied. In the second chapter, we consider a conjecture of the three-year history of Erdos, Franklin and Furedi in the field of cluster test. Given n of the n-tested samples, where d is positive, the objective of the group test theory is to find all positive samples using as few test times as possible, rather than just one-by-one detection of all samples. A binary matrix is called d-separated, and if its arbitrary d column does not contain other columns. The separation matrix has very important application in the non-self-adaptive group test. the minimum t is represented by t (d) so that there is a d-separation matrix that satisfies n t-rn. T (?) and guesses t (d) 1 (d + 1) 2. By using the graph matching theorem of Erdos and Galai, we prove (?), the gap between the conjecture value is reduced. In chapter 3, we consider the upper boundary of the anti-frame code, the parent identification code and the tracking code. these codes are used to protect digital files with copyright. They are applied in scenarios such as digital fingerprints, broadcast encryption schemes, and the like. Using the techniques of some combination counting methods, we give the upper bounds of these three codes, respectively. These boundaries are the best known in the art. In the fourth chapter, we have studied an important problem of Tulane, that is, the problem of the sparse hypergraph proposed by Brown, Erd6s and S6s. In consideration of the r-equilibrium hypergraph on n vertices, it is assumed that it does not contain the e-edge only by v vertices, and for more than forty years, Brown and others use the function fr (n, u, e) to represent the maximum number of edges that can be included in this hypergraph. They made a famous guess: (?) All integers r k, 2, e and 3 are established. It is noted that when r = 3, e = 3, k = 2, the correctness of the conjecture is guaranteed by the (6, 3)-theorem of the well-known Ruzsa-Szemeteredi. We have provided more evidence for the establishment of the conjecture. On the one hand, we removed the lemma from the hypergraph: the right-hand side of the conjecture is set up for all fixed integers, r-kk + 1 and e-3. Our results cover all the well-known scenarios in history that have assumed the bounds of the conjecture. On the other hand, by constructing a sum-free set in a suitable number theory, we note that the left pair r = 3, k = 2 and e = 4, 5, 7, and 8 of the conjecture are all set up. In the range of e-4 and r-4, our structure is the first to set up the lower bound of the conjecture. The distributable hash family is a very useful combination structure, which is a generalization of many research objects in the theory of combination, cryptography and coding. In the fifth chapter, we have solved a number of open questions and conjecture on the upper and lower bounds of the sub-hash family and the perfect hash family. First, we find that the size of the sub-hash family satisfies a Johnson-type iterative inequality. From this point of view, we give the improved upper boundary of the sub-hash family. Second, we construct an infinite class of perfect hash family. It's not only a positive answer to Bazrafshan and Trung's open question about the partible-hash family, but also an answer to Alon and Sta's conjecture about the parent's identification code. Finally, the maximum possible size of the perfect hash family, denoted by (N, q), of the q-element N long-intensity of t is denoted by (N, q). Walker and Colboun guesses that there are p3 (3, q) = o (q2) when q is sufficiently large. By using (6, 3)-theorem, we prove (?). In addition, using some of the tools of the addition number theory, we also prove (? In Chapter 6 and Chapter 7, we respectively study the two coding problems in the information science. The first problem is a centralized cache coding scheme, a technique proposed by Maddah-Ali and Niesen, which is used to reduce the network load in the high-peak period in the wireless network system. If K is the number of users in the system, the ratio R (K) and the complexity F (K) are the main measure of the cache scheme. We want to design a cache that makes both R (K) and F (K) as small as possible. The previous results satisfy the constant of R (K) and F (K) is an exponential function. We associate this problem with the construction of 3-balanced 3-part (6, 3)-free hypergraph, and put forward the first cache scheme with constant ratio and subexponential complexity. The second problem is the distributed storage code, which has an important application in modern storage systems. the piggy back design is used to construct a memory code that has good coding complexity and repair bandwidth at the same time. By introducing a novel piggy back frame, our proposed piggy back code has the same decoding complexity as the existing code, but reduces the repair bandwidth rate from r-1 to (?). In Chapter 8, we consider the extreme problem on a finite field. Recently, Cot-Lev-Pach and Elenberg-Gijswjt use a novel polynomial method, which respectively defines the size of the largest subset of the three-length equal-difference series on the Z4n and F3n, both of which are published in the . Terrence Tao summed up their work and refined it as a method of calculating the rank of certain multivariate functions. We change the Tao's counting formula and use the new formula to prove the following conclusion: Let q be a fixed odd prime power, A is a subset of Fqn, so that there are no three different elements x, y, z and A.
【学位授予单位】:浙江大学
【学位级别】:博士
【学位授予年份】:2017
【分类号】:O157
【相似文献】
相关期刊论文 前10条
1 王建方,闫桂英;超图的圈结构[J];科学通报;2001年19期
2 林启忠,房杰,刘娟,杜智华;两类特殊超图的分数横贯[J];新疆师范大学学报(自然科学版);2005年03期
3 唐宇轩;;圈区间超图相关性质的讨论[J];新疆师范大学学报(自然科学版);2006年03期
4 刘木伙;柳柏濂;;严格(d)-连通无圈超图的计数[J];数学学报;2007年06期
5 范新爱;赵守娟;;r一致导出匹配可扩张超图及性质[J];新乡学院学报(自然科学版);2009年05期
6 石怡;王福;;有关交簇超图的两个结论[J];兵团教育学院学报;2009年05期
7 朱俊杰;;超图的奇圈横贯[J];成都大学学报(自然科学版);2010年02期
8 孙林;;完美图在超图上的推广[J];新疆师范大学学报(自然科学版);2011年01期
9 王福;石怡;杜智华;;一类超图的横贯[J];石河子大学学报(自然科学版);2011年03期
10 赵凌琪;冯伟;徐春雷;吉日木图;;无圈超图规模的进一步研究[J];应用数学学报;2012年05期
相关重要报纸文章 前10条
1 本报驻东京记者 吴仲国;中国软件在日本叫响知名品牌成市场宠儿[N];科技日报;2002年
2 证券时报记者 吴中珞;超图软件信披创新 微博释疑股吧发帖详解年报延期[N];证券时报;2011年
3 本报记者 朱熹妍;地理信息火爆 超图地理专注成器[N];经济观察报;2008年
4 记者 赵一蕙;超图软件业绩快报“失准”逾20%[N];上海证券报;2013年
5 栾玲 赵培;超图软件:中国“智”造的跨国软件企业[N];中国高新技术产业导报;2010年
6 本报记者 解佳涛 戈清平;超图软件:做“中国智造”的跨国软件企业[N];中国高新技术产业导报;2010年
7 本报记者 梁爽;超图:十年打造地理信息超级版图[N];中国政府采购报;2012年
8 徐洋;北京市委书记郭金龙视察超图软件公司[N];中国测绘报;2012年
9 本报记者 郑燃;超图软件:让应急事件避免盲人摸象[N];政府采购信息报;2011年
10 江雪;钟耳顺钟情GIS[N];中国企业报;2007年
相关博士学位论文 前10条
1 上官冲;极值组合与编码理论中的若干问题[D];浙江大学;2017年
2 古万荣;基于超图模型的新闻推荐研究[D];华南理工大学;2015年
3 孙艳萍;3一致超图的拉格朗日和最大团之间的关系的研究[D];湖南大学;2016年
4 彭豪;超图的Motzkin-Straus型结果及Frankl-F(?)redi猜想[D];湖南大学;2015年
5 岳俊杰;超图H谱理论和稀疏低秩优化算法研究[D];清华大学;2016年
6 吴艳;3-一致超图分解及相关问题[D];北京交通大学;2010年
7 吴颖敏;市场机遇发现的超图支持方法研究[D];华中科技大学;2009年
8 叶淼林;图与超图理论中的谱方法[D];安徽大学;2010年
9 吉日木图;图的标号及超图分解问题研究[D];大连理工大学;2006年
10 王琦;网络中的超图嵌入问题[D];山东大学;2007年
相关硕士学位论文 前10条
1 朱俊杰;超图的奇圈横贯和偶边着色[D];新疆师范大学;2008年
2 程全胜;超图路径求解算法及其应用[D];华中科技大学;2008年
3 赵金辉;超图的圈性[D];上海交通大学;2011年
4 范新爱;关于一致超图的导出匹配可扩张性[D];新疆师范大学;2006年
5 林启忠;超图中的C-圈[D];新疆师范大学;2006年
6 刘相国;超图及其线图的若干性质的讨论[D];内蒙古师范大学;2008年
7 张娜;两类存取结构及其信息率的研究[D];陕西师范大学;2015年
8 彭茜茜;关于一致超图的谱半径[D];安徽大学;2015年
9 李冠儒;完全3-一致超图的分解及其应用[D];内蒙古民族大学;2015年
10 伊国华;一致超图的张量谱性质研究[D];福州大学;2014年
本文编号:2408890
本文链接:https://www.wllwen.com/kejilunwen/yysx/2408890.html