
In this paper, we study further bounds of constant dimension codes in Grassmannian space
In this paper, we use a recent result of Bryant, Horsley, and Pettersson in [1] to provide an alternate and more straightforward proof of results concerning neighborhood graphs in maximum packings of
To set the stage, consider any partial triple system
In both of these original papers, the authors employed difference methods—a combinatorial technique that often involves selecting pairs of elements from a group and studying their differences—and a pull-up technique, which is used to modify the neighborhood of a vertex. However, despite the effectiveness of these methods, neither approach seems to lend itself easily to deriving the results of the other.
In our paper, we present a more unified and simplified proof that brings both of these results together. By leveraging the recent findings of Bryant, Horsley, and Pettersson, we can bypass the need for the more complex difference methods and pull-up techniques, instead relying on the underlying principles elucidated in their work. This approach not only simplifies the proof process but also provides a clearer and more direct route to understanding the structure of neighborhood graphs in these maximum packings.
Compressed sensing (CS) has broken through the traditional Nyquist sampling theory as it is a new technique in signal processing. According to CS theory, compressed sensing makes full use of sparsity so that a sparse signal can be reconstructed from very few measurements. It is well known that the construction of CS matrices is the central problem. In this paper, we provide one kind of deterministic sensing matrix by describing a combinatorial design. Then, we obtain two cases by instantiating the RIP framework with the obtained design, with the latter case being the majorization of the former. Finally, we show that our construction has better properties than DeVore’s construction using polynomials over finite fields.
In this paper, with the help of the residue method, we find some interesting formulas relating residue and ordinary Bell polynomials,
We expand the theory of pebbling to graphs with weighted edges. In a weighted pebbling game, one player distributes a set amount of weight on the edges of a graph and his opponent chooses a target vertex and places a configuration of pebbles on the vertices. Player one wins if, through a series of pebbling moves, he can move at least one pebble to the target. A pebbling move of
We examine two particular constructions of Costas arrays known as the Taylor variant of the Lempel construction, or the
The authentication codes with arbitration are said to be
For
The cycle length distribution (CLD) of a graph of order
Two-fold automorphisms (or “TF-isomorphisms”) of graphs are a generalisation of automorphisms. Suppose
Now let
We define a new fairness notion on edge-colorings, requiring that the number of vertices in the subgraphs induced by the edges of each color are within one of each other. Given a (not necessarily proper)
Let
Irregular-spotty-byte error control codes were devised by the author in [2] and their properties were further studied in [3] and [4]. These codes are suitable for semi-conductor memories where an I/O word is divided into irregular bytes not necessarily of the same length. The
Let
For a poset
In this paper, we revisit LE graphs, find the minimum
We determine the signless Laplacian spectrum for the
Placing degree constraints on the vertices of a path yields the definitions of uphill and downhill paths. Specifically, we say that a path
Set-to-Set Broadcasting is an information distribution problem in a connected graph,
Let
1970-2025 CP (Manitoba, Canada) unless otherwise stated.