Processing math: 100%
Research article

A deep neural network-based smart error measurement method for fiscal accounting data


  • The error measurement of fiscal accounting data can effectively slow down the change of financial assets. Based on deep neural network theory, we constructed an error measurement model for fiscal and tax accounting data, and we analyzed the relevant theories of fiscal and tax performance evaluation. By establishing a batch evaluation index of finance and tax accounting, the model can monitor the changing trend of the error of urban finance and tax benchmark data scientifically and accurately, as well as solve the problem of high cost and delay in predicting the error of finance and tax benchmark data. In the simulation process, based on the panel data of credit unions, the entropy method and a deep neural network were used to measure the fiscal and tax performance of regional credit unions. In the example application, the model, combined with MATLAB programming, calculated the contribution rate of regional higher fiscal and tax accounting input to economic growth. The data show that the contribution rates of some fiscal and tax accounting input, commodity and service expenditure, other capital expenditure and capital construction expenditure to regional economic growth are 0.0060, 0.0924, 0.1696 and -0.0822, respectively. The results show that the proposed method can effectively map the relationships between variables.

    Citation: Yutian Cai, Ting Wang, Shaohua Wang. A deep neural network-based smart error measurement method for fiscal accounting data[J]. Mathematical Biosciences and Engineering, 2023, 20(6): 10866-10882. doi: 10.3934/mbe.2023482

    Related Papers:

    [1] Erhan Deniz, Muhammet Kamali, Semra Korkmaz . A certain subclass of bi-univalent functions associated with Bell numbers and qSrivastava Attiya operator. AIMS Mathematics, 2020, 5(6): 7259-7271. doi: 10.3934/math.2020464
    [2] Luminiţa-Ioana Cotîrlǎ . New classes of analytic and bi-univalent functions. AIMS Mathematics, 2021, 6(10): 10642-10651. doi: 10.3934/math.2021618
    [3] Ahmad A. Abubaker, Khaled Matarneh, Mohammad Faisal Khan, Suha B. Al-Shaikh, Mustafa Kamal . Study of quantum calculus for a new subclass of q-starlike bi-univalent functions connected with vertical strip domain. AIMS Mathematics, 2024, 9(5): 11789-11804. doi: 10.3934/math.2024577
    [4] Sheza. M. El-Deeb, Gangadharan Murugusundaramoorthy, Kaliyappan Vijaya, Alhanouf Alburaikan . Certain class of bi-univalent functions defined by quantum calculus operator associated with Faber polynomial. AIMS Mathematics, 2022, 7(2): 2989-3005. doi: 10.3934/math.2022165
    [5] Tariq Al-Hawary, Ala Amourah, Abdullah Alsoboh, Osama Ogilat, Irianto Harny, Maslina Darus . Applications of qUltraspherical polynomials to bi-univalent functions defined by qSaigo's fractional integral operators. AIMS Mathematics, 2024, 9(7): 17063-17075. doi: 10.3934/math.2024828
    [6] Sarem H. Hadi, Maslina Darus, Choonkil Park, Jung Rye Lee . Some geometric properties of multivalent functions associated with a new generalized q-Mittag-Leffler function. AIMS Mathematics, 2022, 7(7): 11772-11783. doi: 10.3934/math.2022656
    [7] Ekram E. Ali, Miguel Vivas-Cortez, Rabha M. El-Ashwah . New results about fuzzy γ-convex functions connected with the q-analogue multiplier-Noor integral operator. AIMS Mathematics, 2024, 9(3): 5451-5465. doi: 10.3934/math.2024263
    [8] Ala Amourah, B. A. Frasin, G. Murugusundaramoorthy, Tariq Al-Hawary . Bi-Bazilevič functions of order ϑ+iδ associated with (p,q) Lucas polynomials. AIMS Mathematics, 2021, 6(5): 4296-4305. doi: 10.3934/math.2021254
    [9] F. Müge Sakar, Arzu Akgül . Based on a family of bi-univalent functions introduced through the Faber polynomial expansions and Noor integral operator. AIMS Mathematics, 2022, 7(4): 5146-5155. doi: 10.3934/math.2022287
    [10] Prathviraj Sharma, Srikandan Sivasubramanian, Nak Eun Cho . Initial coefficient bounds for certain new subclasses of bi-univalent functions with bounded boundary rotation. AIMS Mathematics, 2023, 8(12): 29535-29554. doi: 10.3934/math.20231512
  • The error measurement of fiscal accounting data can effectively slow down the change of financial assets. Based on deep neural network theory, we constructed an error measurement model for fiscal and tax accounting data, and we analyzed the relevant theories of fiscal and tax performance evaluation. By establishing a batch evaluation index of finance and tax accounting, the model can monitor the changing trend of the error of urban finance and tax benchmark data scientifically and accurately, as well as solve the problem of high cost and delay in predicting the error of finance and tax benchmark data. In the simulation process, based on the panel data of credit unions, the entropy method and a deep neural network were used to measure the fiscal and tax performance of regional credit unions. In the example application, the model, combined with MATLAB programming, calculated the contribution rate of regional higher fiscal and tax accounting input to economic growth. The data show that the contribution rates of some fiscal and tax accounting input, commodity and service expenditure, other capital expenditure and capital construction expenditure to regional economic growth are 0.0060, 0.0924, 0.1696 and -0.0822, respectively. The results show that the proposed method can effectively map the relationships between variables.



    One of the many techniques for constructing self-dual codes over rings is to build their generator matrices from combinatorial matrices, that is to say, matrices related to graphs and designs. For instance, quadratic double circulant matrices related to the Paley graph [9,13], and more generally, adjacency matrices of two-class association schemes [11] and three-class association schemes [6] were used to construct self-dual codes over fields and unital rings. The notion that plays the role of self-dual codes over non-unital rings of order four is that of quasi self-dual (QSD) codes, which are self-orthogonal codes of length n and size 2n. The introduction of this new notion in [1,2] was motivated by the fact that the usual relation between the size of a linear code and the size of its dual does not hold in general for linear codes over non-unital rings. In that context, Type Ⅳ codes were defined as QSD codes with all Hamming weights even. The non-unital rings E and I of order four in the list of Fine [12] have received some short length classification of QSD codes [1,2,3,4]. The codes in these classifications had minimum distance at most 2 in the case of I, and 4 in the case of E. This motivates us to look for general constructions in higher lengths to search for codes with better minimum distance.

    Similar constructions to those in [11] were used to construct QSD codes over E in [17] and I in [5]. In this work, we describe two constructions (namely pure and bordered) for linear codes over the rings E and I in which we employ the adjacency matrices of symmetric or non-symmetric three-class association schemes. These constructions were first described for self-dual binary codes and codes over Zk in [6]. The form of the generator matrices of the linear codes with these two constructions motivated some new results on free linear codes over E and I. These observations imply that all QSD codes over E formed by using either construction are equivalent as additive F4-codes to QSD codes over I. Consequently, we focus on studying QSD and Type Ⅳ codes over I and we give the conditions that guarantee such structures. Many codes meeting these conditions, and with minimum distance higher than 4, are presented. All computations are done via the additive codes package in Magma [7] using the connection between F4 and the non-unital rings as additive groups of order 4. Note that, since their inception, additive quaternary codes have some implications for quantum computing [8].

    The paper is structured in the following way. Section 2 collects preliminary definitions and notations about rings, linear codes and association schemes with three classes. Section 3 studies free linear codes over the non-unital rings E and I. Section 4 describes the two constructions used to generate linear codes from the adjacency matrices of three-class association schemes and investigates the conditions required to obtain QSD codes as well as sufficient Type Ⅳ conditions. Section 5 concludes the paper.

    The ring I defined by I=a,b2a=2b=0,a2=b,ab=0 consists of the four elements {0,a,b,c} where c=a+b. It is a non-unital commutative ring with characteristic two. The multiplication table for I is given in Table 1.

    Table 1.  Multiplication table for the ring I.
    × 0 a b c
    0 0 0 0 0
    a 0 b 0 b
    b 0 0 0 0
    c 0 b 0 b

     | Show Table
    DownLoad: CSV

    The ring E defined by E=a,b2a=2b=0,a2=a,b2=b,ab=a,ba=b consists of the four elements {0,a,b,c} where c=a+b. It is a non-unital non-commutative ring with characteristic two. The multiplication table for E is given in Table 2.

    Table 2.  Multiplication table for the ring E.
    × 0 a b c
    0 0 0 0 0
    a 0 a a 0
    b 0 b b 0
    c 0 c c 0

     | Show Table
    DownLoad: CSV

    Let R be either E or I. Throughout this paper, if the statement does not depend on which ring we are using, we shall denote the ring by R.

    For a positive integer n, Rn is an R-module whose elements are n-tuples over R. We will use the term vectors for these n-tuples. The (Hamming) weight wt(x) of xRn is the number of nonzero coordinates in x.

    A linear code of length n over I is an I-submodule of In whereas a linear code of length n over E is a left E-submodule of En. If C is a linear code of length n over R with a k×n generator matrix G, then

    ● for R=I, C={ki=1(αigi+βiagi) | αi,βiF2},

    ● for R=E, C={ki=1(αigi+βiagi+γibgi) | αi,βi,γiF2},

    where gi is the ith row of G for each 1ik. A linear code with an additive generator matrix M is the F2-span of the rows of M.

    With every linear code C over R, we attach an additive code ϕR(C) over F4=F2[ω] such that

    ϕI(C) is defined by the alphabet substitution 00, aω, b1, cω2,

    ϕE(C) is defined by the alphabet substitution 00, aω, bω2, c1.

    There are two binary linear codes of length n associated canonically with every linear code C of length n over R, namely the residue code res(C) and the torsion code tor(C).

    For R=I,

    res(C)={α(y)yC}

    where α:IF2 is the map defined by α(0)=α(b)=0 and α(a)=α(c)=1, extended componentwise from C to Fn2, and

    tor(C)={xFn2bxC}.

    For R=E,

    res(C)={α(y)yC}

    where α:EF2 is the map defined by α(0)=α(c)=0 and α(a)=α(b)=1, extended componentwise from C to Fn2, and

    tor(C)={xFn2cxC}.

    The two binary codes satisfy the inclusion res(C)tor(C) and their sizes are related to the size of C by |C|=|res(C)||tor(C)| as shown in [1,2]. Throughout the paper, we let k1=dim(res(C)) and k2=dim(tor(C))k1. The linear code C is said to be of type (k1,k2). We say that the linear code C is free if and only if k2=0.

    Two linear codes over R are permutation equivalent if there is a permutation of coordinates that maps one to the other.

    An inner product on Rn is defined by xy=ni=1xiyi where x=(x1,x2,,xn) and y=(y1,y2,,yn) in Rn. A linear code C over R is self-orthogonal if for any x,yC, xy=0. A linear code of length n is quasi self-dual (QSD) if it is self-orthogonal and of size 2n. A QSD code with all weights even is called a Type Ⅳ code. A quasi Type Ⅳ code over I is a QSD code with an even torsion code.

    The following matrix notations will be used consistently throughout this paper: Ik denotes the identity matrix of size k, O denotes the zero matrix of appropriate dimensions, and M1,...,MnF2 denotes the F2-span of the rows of the matrices Mi with entries not necessarily from F2.

    For any positive integer m, an association scheme with m classes is a set together with m+1 relations defined on it satisfying certain conditions. Adopting Delsarte's [10] notations and conditions for m=3, we have the following definition:

    Definition 1. Let X be a set of size n2. Let R={R0,R1,R2,R3} be a family of four relations Ri on X. The pair (X,R) is called a three-class association scheme if the following conditions are satisfied:

    (1) The set R is a partition of X×X and R0={(x,x)xX}.

    (2) For i{0,1,2,3}, R1i={(y,x)(x,y)Ri}=Rj for some j{0,1,2,3}.

    (3) For any triple of integers i,j,k{0,1,2,3}, there exists a number pkij=pkji such that for all (x,y)Rk,

    pkij=|{zX(x,z)Ri and (z,y)Rj}|.

    We describe the relations Ri by their adjacency matrices A0=In,A1,A2 and A3=JInA1A2 where In is the identity matrix of size n and J is the all-one matrix of size n.

    The values pkij are called intersection numbers. It follows from the above definition that for any i,j{0,1,2,3},

    AiAj=AjAi=3k=0pkijAk. (2.1)

    For 0i3, we have

    AiJ=JAi=κiJ (2.2)

    where κi represents the number of ones per row (or column) in Ai. The matrix Ai is called a valency κi matrix of degree n.

    It was shown in [14] that each pkij is a non-negative integer that can be computed using the trace of the adjacency matrices as follows

    pkij=tr(ATkAiAj)nκk (2.3)

    where κk is the valency of Ak.

    If R1i=Ri for all i, then the association scheme is said to be symmetric, otherwise it is non-symmetric. If the association scheme is symmetric, then Ai=ATi for all i and Ai is called a non-directed matrix. By counting the number of 1's in a non-directed valency κ matrix in two ways, the following lemma is obtained.

    Lemma 1. [16] There do not exist non-directed valency κ matrices of degree n if n and κ are odd.

    Using the standard form of the generator matrices of linear codes over R, we establish some new results on free codes as well as QSD codes.

    We state the following result from [1] without proof.

    Theorem 1. [1] Assume C is a linear code over I of length n and type (k1,k2). Then, up to a permutation of columns, a generator matrix G of C is of the form

    G=(aIk1aXYObIk2bZ)

    where Iki is the identity matrix of size ki, X and Z are matrices with entries from F2, Y is a matrix with entries from I, and O is the k2×k1 zero matrix.

    We will need the following structural theorem.

    Theorem 2. Let k be a positive integer and let C be a linear code over I. Then C is a free code of type (k,0) if and only if C is permutation equivalent to a code with generator matrix (aIk,Y) where Ik is the identity matrix of size k and Y is a matrix with entries from I.

    Proof. It is immediate from Theorem 1 that every free code of type (k,0) over I is permutation equivalent to a code with generator matrix (aIk,Y) where Y is a matrix with entries from I.

    For the converse, let G=(aIk,Y) be a generator matrix for C where Ik and Y are as given in the hypothesis. Observe that

    G=(GaG)=(aIkYbIkaY)

    is an additive generator matrix for C where the rows are F2- linearly independent. Hence, |C|=22k. Since |C|=|res(C)||tor(C)|, it follows that 2k=2k1+k2. Since α(G)F2=res(C) and α(G) is a binary matrix with rank k, it follows that k=k1 and thus k2=0. Hence, C is a free code of type (k,0).

    For x,yIn, following [5], we denote by xy the vector in In which has a nonzero element x+yI precisely in those positions where x has a nonzero x and y has a different nonzero y, and 0 elsewhere.

    Lemma 2. [5] Let m be an integer with m2. If xiIn for each 1im, then

    wt(mi=1xi)  mi=1wt(xi)+m1j=1ji=1wt(xixj+1)  (mod 2).

    Let C be a linear code over I. For x,yC and i,jI, denote by ni(x) the number of coordinates of x that are i and denote by ni,j(x,y) the number of coordinates satisfying simultaneously that i is a component in x and j is a component in y. These notations are useful in gathering some facts about the weights of vectors related to the codewords of self-orthogonal codes over I as the following lemma shows.

    Lemma 3. If C is a self-orthogonal code over I, then the following hold for x,yC:

    (ⅰ) wt(x)nb(x) (mod 2),

    (ⅱ) wt(ax)0 (mod 2),

    (ⅲ) wt(xay)0 (mod 2).

    Proof. The self-orthogonality of C implies that

    na(x)+nc(x)0 (mod 2) (3.1)

    and

    na,a(x,y)+na,c(x,y)+nc,a(x,y)+nc,c(x,y)0 (mod 2). (3.2)

    Using the definition of ni(x), ni,j(x,y) and xy, we have the following:

    (ⅰ) wt(x)=na(x)+nb(x)+nc(x),

    (ⅱ) wt(ax)=nb(ax)=na(x)+nc(x),

    (ⅲ) wt(xay)=na,b(x,ay)+nc,b(x,ay)=na,a(x,y)+na,c(x,y)+nc,a(x,y)+nc,c(x,y).

    Substituting Eqs (3.1) and (3.2) into the above equations, we obtain the desired result.

    The next theorem gives a way to tell when a QSD code over I is Type Ⅳ.

    Theorem 3. Let C be a QSD code of length n over I and has a generator matrix G each of whose rows has an even weight. Then C is Type Ⅳ if and only if each distinct pair of rows gi and gj of G satisfies that wt(gigj) is even.

    Proof. If C is a Type Ⅳ code, then every codeword in C has an even weight. In particular, wt(gi+gj) is even. Since wt(gi) and wt(gj) are even, by Lemma 2, wt(gigj) is even.

    For the converse, assume that wt(gigj) is even. We need to prove that every codeword c in C has an even weight. By definition, c has one of the following forms:

    gi , agi , gi , agi , or (gi+agj).

    We will use Lemma 2 to prove that wt(c) is even. In particular, we will show that

    wt(gi),wt(agi),wt(gigj),wt(agiagj), and wt(giagj)

    are even for all 1i,jk where k is the number of rows of G. From the hypotheses, wt(gi) and wt(gigj) are even. By definition, agiagj=0 and so wt(agiagj)=0 proving that wt(agiagj) is even. Since C is self-orthogonal, by Lemma 3, wt(agi) and wt(giagj) are even. Hence, c has an even weight and thus C is Type Ⅳ.

    The following result is basic and useful.

    Theorem 4. [5] If C is a self-orthogonal code over I, then res(C) is even.

    Corollary 1. Every free QSD code over I is quasi Type Ⅳ.

    Proof. Let C be a free QSD code. Then res(C)=tor(C). Since C is self-orthogonal, by Theorem 4, tor(C) is even. Hence, C is quasi Type Ⅳ.

    We state the following result from [2] without proof.

    Theorem 5. [2] Assume C is a linear code over E of length n and type (k1,k2). Then, a generator matrix G of C is of the form

    G=(aIk1XYOcIk2cZ)

    where Iki is the identity matrix of size ki, X and Y are matrices with entries from E, Z is a binary matrix, and O is the k2×k1 zero matrix.

    The analogue of Theorem 2 does not hold in general for codes over E.

    Example 1. The linear code C over E of length 2 and generator matrix G=(a  c) is not free as the residue and torsion codes of C have generator matrices (1  0) and I2, respectively.

    Theorem 6. Let k be a positive integer and let C be a linear code over E. Then C is a free code of type (k,0) if and only if C is permutation equivalent to a code with generator matrix (aIk,aM) where Ik is the identity matrix of size k and M is a binary matrix.

    Proof. Let C be a free code of type (k,0). Then |C|=22k. By Theorem 5, we can write the generator matrix of C as G=(aIk,Y) where Y is a matrix with entries from E. As every element in E can be written in a c-adic decomposition form [2, Section 2.2], we can write Y=aY1+cY2 where Y1 and Y2 are binary matrices. By linearity of C, we have aG,bGF2C. Observe that

    (aGbG)=(aIkaY1bIkbY1)

    is a matrix with 2k linearly independent rows over F2. Hence, |aG,bGF2|=22k=|C| and thus aG,bGF2=C. We claim that Y2 is a zero matrix. Suppose to the contrary that Y2 is a nonzero matrix. Then, there exists a row x in G such that the first k components consist of exactly one a and k1 zeros, whereas the last nk components contain at least one c, where n is the length of C. Without loss of generality, let x=(a,0,,0,c,xk+2,,xn) where xiE for k+2in. Since xC=aG,bGF2, the first k components imply that x is a row in aG which is a contradiction as the entries of aG are from {0,a}. Thus Y2 is a zero matrix, as claimed. Hence, G=(aIk,aY1) where Y1 is a binary matrix.

    Conversely, if G=(aIk,aM) is a generator matrix for C where Ik and M are as given in the hypotheses, then G=aG and therefore,

    (GbG)=(aIkaMbIkbM)

    is an additive generator matrix for C where the rows are F2- linearly independent. Hence, |C|=22k. Since |C|=|res(C)||tor(C)|, it follows that 2k=2k1+k2. Since α(G)F2=res(C) and α(G) is a binary matrix with rank k, it follows that k=k1 and thus k2=0. Hence, C is a free code of type (k,0).

    Corollary 2. Let C be a self-orthogonal code over E with generator matrix G=(aIn,Y) where Y is a square matrix of size n with entries from E. Then C is QSD if and only if C is a free code of type (n,0).

    Proof. Assume that C is a QSD code with generator matrix G=(aIn,Y) where Y is a square matrix of size n with entries from E. Then |C|=22n. Using the same argument as in the proof of Theorem 6, it follows that Y=aM where M is a binary square matrix of size n and hence C is a free code of type (n,0). The converse is immediate since |C|=|res(C)||tor(C)|=22n.

    The residue and the torsion codes of QSD codes over E admit some useful properties as presented in the next theorem.

    Theorem 7. [2] If C is a QSD code over E, then

    (1) res(C)res(C),

    (2) tor(C)=res(C).

    Furthermore, a QSD code C is Type Ⅳ if and only if res(C) contains the all-one codeword.

    Corollary 3. Every free QSD code over E is Type Ⅳ.

    Proof. Let C be a free QSD code. Then res(C)=tor(C)=res(C). Hence, res(C) is a binary self-dual code and so it contains the all-one codeword. By Theorem 7, C is Type Ⅳ.

    Let A0,A1,A2 and A3 be the adjacency matrices of the relations of a three-class association scheme on a set of size n. Let QR(r,s,t,u)=rA0+sA1+tA2+uA3 where r,s,t,uR. As A0=In and A3=JInA1A2,

    QR(r,s,t,u)=(ru)In+uJ+(su)A1+(tu)A2. (4.1)

    We describe two constructions using QR(r,s,t,u):

    ● The pure construction is the n×2n matrix

    PR(r,s,t,u)=(aIn,QR(r,s,t,u)).

    The linear code over R of length 2n and generator matrix PR(r,s,t,u) is denoted by CPR(r,s,t,u).

    ● The bordered construction is the (n+1)×(2n+2) matrix

    BR(r,s,t,u)=(a000aa0aaInQR(r,s,t,u)0a).

    The linear code over R of length 2n+2 and generator matrix BR(r,s,t,u) is denoted by CBR(r,s,t,u).

    Remark 1. Let aR. Observe the following:

    (1) The pure and the bordered constructions over R can be written as G=(aIm,Y) where Y is a square matrix of size m with entries from R.

    (2) If C is a self-orthogonal code over E with generator matrix G=(aIm,Y) where Y is a square matrix of size m, then by Theorem 6 and Corollary 2, C is QSD if and only if Y=aS for some binary square matrix S of size m.

    (3) Let M be a binary matrix of any size. If GR=aM is a generator matrix for a linear code CR over R, then

    GR=(aMbM)

    is an additive generator matrix for CR. By the definitions of the maps ϕE and ϕI, the additive codes ϕE(CE) and ϕI(CI) over F4 satisfy that

    ϕE(CE)=ωM,ω2MF2=ωM,MF2=ϕI(CI).

    Hence, there is a one-to-one correspondence between the linear codes CE and CI and so they have the same size and weight distribution. Note that CR is self-orthogonal if and only if GRGTR=O if and only if a2MMT=O. Since a20, CR is self-orthogonal if and only if MMT=O and so the self-orthogonality as well as the quasi-self duality and the Type Ⅳ property are preserved under this correspondence.

    From the above three observations, it follows that if C is a QSD code over I from either the pure or the bordered construction with r,s,t,u{0,a}, then C can be regarded as a QSD code over E. Conversely, if C is a QSD code over E from either the pure or the bordered construction, then C can be regarded as a QSD code over I. Note that this is not generally true for self-orthogonal codes which are not QSD. Also this remark implies that the ring I may produce more free QSD codes and hence possibly more free Type Ⅳ codes than the ring E would.

    Based on Remark 1 and since we are focusing on QSD and Type Ⅳ codes, it suffices to investigate the conditions which guarantee the quasi-self duality and the Type Ⅳ property of linear codes over the ring I. Indeed, in the case r,s,t,u{0,a}, such conditions would hold for QSD and Type Ⅳ codes over E. Hence, from this point forward, we only study linear codes over I.

    Let (X,R) be a non-symmetric three-class association scheme. We can order the relations such that R2=RT1 and R3 is a symmetric relation. The association scheme is uniquely determined by R1. If we denote the adjacency matrix for R1 by A, then the adjacency matrices for R0,R2 and R3 are In,AT and JInAAT, respectively. In this case, Eq (4.1) over I can be written as

    QI(r,s,t,u)=(ru)In+uJ+(su)A+(tu)AT. (4.2)

    To study self-orthogonality of the codes CPI(r,s,t,u) and CBI(r,s,t,u), we need to calculate QI(r,s,t,u)QI(r,s,t,u)T. To do this, we make substantial use of the following lemma.

    Lemma 4. [6] If (X,R) is a non-symmetric three-class association scheme, then the following equations hold:

    AJ=JA=κJ, (4.3)
    AAT=ATA=κIn+λ(A+AT)+μ(JInAAT), (4.4)
    A2=αA+βAT+γ(JInAAT), (4.5)

    where κ=p012=p021,λ=p112=p121=p212=p221, μ=p312=p321,α=p111,β=p211, and γ=p311. Moreover, α=λ and κ is the number of ones at each row and at each column of A.

    Lemma 5. Keep the notations in Lemma 4 and let QI=QI(r,s,t,u). Then,

    QIQTI=(r2+u2+(s2+t2)(κ+μ))In+(nu2+(s2+t2)μ)J  +((r+u)(t+s)+(s2+t2)(λ+μ)+(s+u)(t+u)(β+λ))(A+AT).

    Proof. By Eq (4.2) and the properties of I, we have

    QIQTI=((r+u)In+uJ+(s+u)A+(t+u)AT)((r+u)In+uJ+(s+u)A+(t+u)AT)T=((r+u)In+uJ+(s+u)A+(t+u)AT)((r+u)In+uJ+(s+u)AT+(t+u)A)=(r2+u2)In+(r+u)uJ+(r+u)(s+u)AT+(r+u)(t+u)A+u(r+u)J+u2J2+u(s+u)JAT  +u(t+u)JA+(s+u)(r+u)A+(s+u)uAJ+(s2+u2)AAT+(s+u)(t+u)A2  +(t+u)(r+u)AT+(t+u)uATJ+(t+u)(s+u)(AT)2+(t2+u2)ATA.

    Applying Eq (4.3) gives

    QIQTI=(r2+u2)In+(r+u)(s+u)AT+(r+u)(t+u)A+nu2J+u(s+u)κJ+u(t+u)κJ  +(s+u)(r+u)A+(s+u)uκJ+(s2+u2)AAT+(s+u)(t+u)A2+(t+u)(r+u)AT  +(t+u)uκJ+(t+u)(s+u)(A2)T+(t2+u2)ATA=(r2+u2)In+nu2J+(r+u)(t+s)(A+AT)+(s2+t2)AAT+(s+u)(t+u)(A2+(A2)T).

    From Eqs (4.4) and (4.5), we obtain

    QIQTI=(r2+u2)In+nu2J+(r+u)(t+s)(A+AT)+(s2+t2)(κIn+λ(A+AT)+μ(JInAAT))  +(s+u)(t+u)(αA+βAT+αAT+βA).

    Since α=λ and I has characteristic two, it follows that

    QIQTI=(r2+u2+(s2+t2)(κ+μ))In+(nu2+(s2+t2)μ)J+((r+u)(t+s)+(s2+t2)(λ+μ)  +(s+u)(t+u)(β+λ))(A+AT).

    In the next two theorems, all congruences are given in F2.

    Theorem 8. The code CPI(r,s,t,u) constructed from a non-symmetric three-class association scheme is QSD if and only if the parameters are as in Table 3.

    Table 3.  Conditions for linear codes over I formed from non-symmetric three-class association schemes by the pure construction to be QSD.
    r s t u CPI(r,s,t,u) is QSD
    {0,b} {0,b} {0,b} {0,b} never
    {0,b} {0,b} {0,b} {a,c} n0 and βλ
    {0,b} {0,b} {a,c} {0,b} κ+1λμ0
    {0,b} {0,b} {a,c} {a,c} κλ+1μn
    {0,b} {a,c} {0,b} {0,b} κ+1λμ0
    {0,b} {a,c} {0,b} {a,c} κλ+1μn
    {0,b} {a,c} {a,c} {0,b} never
    {0,b} {a,c} {a,c} {a,c} n0
    {a,c} {0,b} {0,b} {0,b} always
    {a,c} {0,b} {0,b} {a,c} never
    {a,c} {0,b} {a,c} {0,b} κλ+1μ0
    {a,c} {0,b} {a,c} {a,c} κ+1λμn
    {a,c} {a,c} {0,b} {0,b} κλ+1μ0
    {a,c} {a,c} {0,b} {a,c} κ+1λμn
    {a,c} {a,c} {a,c} {0,b} βλ
    {a,c} {a,c} {a,c} {a,c} never

     | Show Table
    DownLoad: CSV

    Proof. By Theorem 2, CPI(r,s,t,u) is a free code of type (n,0) and thus it has 22n codewords. Hence, to prove that CPI(r,s,t,u) is QSD, we only need to show that it is self-orthogonal.

    The code CPI(r,s,t,u) is self-orthogonal if and only if PI(r,s,t,u)PI(r,s,t,u)T=O which occurs if and only if QI(r,s,t,u)QI(r,s,t,u)T=bIn. Then, by Lemma 5, the code CPI(r,s,t,u) is self-orthogonal if and only if the following are satisfied:

    r2+u2+(s2+t2)(κ+μ)=b, (4.6)
    nu2+(s2+t2)μ=0, (4.7)
    (r+u)(s+t)+(s2+t2)(λ+μ)+(s+u)(t+u)(β+λ)=0. (4.8)

    To determine when the codes are self-orthogonal, we need to find the solutions that satisfy Eqs (4.6)–(4.8). We consider four cases depending on the values of the scalars s and t:

    Case 1: s,t{0,b}.

    Then s2+t2=0 and s+t{0,b}. Equations (4.6)–(4.8) then reduce to

    r2+u2=b,nu2=0,u2(β+λ)=0.

    If u{0,b}, then r{a,c}. If u{a,c}, then r{0,b}, n is even, and βλ (mod 2).

    Case 2: s,t{a,c}.

    Then s2+t2=0 and s+t{0,b}. Equations (4.6)–(4.8) then reduce to

    r2+u2=b,nu2=0,(s+u)(t+u)(β+λ)=0.

    If u{0,b}, then r{a,c} and βλ (mod 2). If u{a,c}, then r{0,b} and n is even.

    Case 3: s{0,b} and t{a,c}.

    Then s2+t2=b. Equations (4.6)–(4.8) then reduce to

    r2+u2+b(κ+μ)=b,nu2+bμ=0,(r+u)t+b(λ+μ)+u(t+u)(β+λ)=0.

    If r,u{0,b}, then κ+1λμ0 (mod 2). If r,u{a,c}, then κ+1λμn (mod 2). If r{0,b} and u{a,c}, then λ+1κμn (mod 2). If u{0,b} and r{a,c}, then λ+1κμ0 (mod 2).

    Case 4: t{0,b} and s{a,c}.

    By interchanging t and s in Case 3, we get the same restrictions on r and u as well as the parameters of the association scheme.

    Theorem 9. The code CBI(r,s,t,u) constructed from a non-symmetric three-class association scheme is QSD if and only if the parameters are as in Table 4.

    Table 4.  Conditions for linear codes over I formed from non-symmetric three-class association schemes by the bordered construction to be QSD.
    r s t u CBI(r,s,t,u) is QSD
    {0,b} {0,b} {0,b} {0,b} never
    {0,b} {0,b} {0,b} {a,c} n1 and βλ
    {0,b} {0,b} {a,c} {0,b} κ+1λμn1
    {0,b} {0,b} {a,c} {a,c} κλ+1μn+10
    {0,b} {a,c} {0,b} {0,b} κ+1λμn1
    {0,b} {a,c} {0,b} {a,c} κλ+1μn+10
    {0,b} {a,c} {a,c} {0,b} never
    {0,b} {a,c} {a,c} {a,c} n1
    {a,c} {0,b} {0,b} {0,b} never
    {a,c} {0,b} {0,b} {a,c} never
    {a,c} {0,b} {a,c} {0,b} κλ+1μn1
    {a,c} {0,b} {a,c} {a,c} κ+1λμn+10
    {a,c} {a,c} {0,b} {0,b} κλ+1μn1
    {a,c} {a,c} {0,b} {a,c} κ+1λμn+10
    {a,c} {a,c} {a,c} {0,b} never
    {a,c} {a,c} {a,c} {a,c} never

     | Show Table
    DownLoad: CSV

    Proof. By Theorem 2, CBI(r,s,t,u) is a free code of type (n+1,0) and thus it has 22n+2 codewords. Hence, to prove that CBI(r,s,t,u) is QSD, we only need to show that it is self-orthogonal.

    The code CBI(r,s,t,u) is self-orthogonal if and only if BI(r,s,t,u)BI(r,s,t,u)T=O which occurs if and only if the following are satisfied:

    (n+1)b=0,a(r+sκ+tκ+u(n2κ1))=0,QI(r,s,t,u)QI(r,s,t,u)T=b(In+J).

    Note that the first equation is the inner product of the top row with itself. The second equation is the inner product of the top row with any other row. The third equation ensures that the remaining rows are orthogonal to each other.

    The first equation requires n to be odd. The remaining two equations then satisfy

    a(r+sκ+tκ)=0,QI(r,s,t,u)QI(r,s,t,u)T=b(In+J).

    Then, by Lemma 5, the code CBI(r,s,t,u) is self-orthogonal if and only if n is odd and the following are satisfied:

    a(r+sκ+tκ)=0, (4.9)
    r2+u2+(s2+t2)(κ+μ)=b, (4.10)
    u2+(s2+t2)μ=b, (4.11)
    (r+u)(s+t)+(s2+t2)(λ+μ)+(s+u)(t+u)(β+λ)=0. (4.12)

    To determine when the codes are self-orthogonal, we need to find the solutions that satisfy Eqs (4.9)–(4.12). We consider four cases depending on the values of the scalars s and t:

    Case 1: s,t{0,b}.

    Then s2+t2=0 and s+t{0,b}. Equations (4.9)–(4.12) then reduce to

    ar=0,r2+u2=b,u2=b,u2(β+λ)=0.

    Hence, we must have r{0,b}, u{a,c}, and βλ (mod 2).

    Case 2: s,t{a,c}.

    Then s2+t2=0 and s+t{0,b}. Equations (4.9)–(4.12) then reduce to

    ar=0,r2+u2=b,u2=b,(s+u)(t+u)(β+λ)=0.

    Hence, we must have r{0,b} and u{a,c}.

    Case 3: s{0,b} and t{a,c}.

    Then s2+t2=b. Equations (4.9)–(4.12) then reduce to

    ar+bκ=0,r2+u2+b(κ+μ)=b,u2+bμ=b,(r+u)t+b(λ+μ)+u(t+u)(β+λ)=0.

    If r,u{0,b}, then λ+1μ+1κ0 (mod 2). If r,u{a,c}, then κ+1λμ0 (mod 2). If r{0,b} and u{a,c}, then λ+1μκ0 (mod 2). If u{0,b} and r{a,c}, then λ+1μκ1 (mod 2).

    Case 4: t{0,b} and s{a,c}.

    By interchanging t and s in Case 3, we get the same restrictions on r and u as well as the parameters of the association scheme.

    Theorem 10. Every QSD code constructed from a non-symmetric three-class association scheme by either the pure or the bordered construction is quasi Type Ⅳ.

    Proof. Let C denote a QSD code constructed from a non-symmetric three-class association scheme by either the pure or the bordered construction. Then C is a free code by Theorem 2 and thus C is quasi Type Ⅳ by Corollary 1.

    Example 2. In Table 5, we present examples of (N,d) QSD codes over I of length N and minimum distance d satisfying the conditions in Theorems 8 and 9 constructed from non-symmetric three-class association schemes. The corresponding adjacency matrices with length n and parameters (κ,β,λ,μ) as defined in Lemma 4 of such schemes can be found in [15].

    Table 5.  QSD codes over I constructed from non-symmetric three-class association schemes.
    Construction (n,κ,β,λ,μ) Code (N,d) Type Ⅳ
    (6,1,1,0,0) CPI(a,0,a,a) (12,4) yes
    (9,1,1,0,0) CPI(a,b,b,0) (18,2) yes
    (12,1,1,0,0) CPI(b,a,a,a) (24,4) no
    (14,3,2,1,0) CPI(0,a,a,a) (28,4) yes
    (15,1,1,0,0) CPI(0,a,0,b) (30,2) yes
    Pure (18,1,1,0,0) CPI(0,a,c,c) (36,4) no
    (21,3,2,1,0) CPI(a,0,0,b) (42,2) yes
    (22,5,3,2,0) CPI(c,0,c,a) (44,8) yes
    (28,3,2,1,0) CPI(0,a,a,a) (56,4) yes
    (33,5,3,2,0) CPI(0,0,a,0) (66,6) yes
    (38,9,5,4,0) CPI(c,c,0,c) (76,8) yes
    (9,1,1,0,0) CBI(0,c,c,a) (20,4) yes
    Bordered (15,1,1,0,0) CBI(0,a,a,a) (32,4) yes
    (33,5,3,2,0) CBI(c,0,c,a) (68,8) yes

     | Show Table
    DownLoad: CSV

    Lemma 6. Let C be a QSD code of length 2n over I with generator matrix G=(xIn,yM) where x,y{a,c} and M is a nonzero binary square matrix of size n. Then C is Type Ⅳ.

    Proof. Since C is self-orthogonal, by Lemma 3, wt(gi)nb(gi) (mod 2) for each row gi of G. As x,y{a,c}, nb(gi)=0 and thus wt(gi) is even. Since each column of G has entries from either {0,a} or {0,c}, wt(gigj)=0 and hence this weight is also even. By Theorem 3, C is Type Ⅳ.

    The conditions in the next two theorems are sufficient but not necessary as Table 5 shows.

    Theorem 11. A QSD CPI(r,s,t,u) constructed from a non-symmetric three-class association scheme is Type Ⅳ if one of the following holds

    (ⅰ) r,s,t,u{0,a},

    (ⅱ) r,s,t,u{0,c},

    (ⅲ) r=0, s,t{a,b,c}, u{a,c}, and s=tu,

    (ⅳ) r{a,c}, s=tr, and u=0,

    (ⅴ) r{a,c}, s=tr, u=b, and n is odd.

    Proof. If either (ⅰ) or (ⅱ) are satisfied, then CPI(r,s,t,u) is Type Ⅳ by Lemma 6.

    To prove (ⅲ)–(ⅴ), we will use Theorem 3. So we need to show that wt(gi) and wt(gigj) are even where gi and gj for 1i,jn are distinct rows of the generator matrix PI(r,s,t,u). By Lemma 3, wt(gi)nb(gi) (mod 2). Since

    nb(gi)={0in cases (iii) and (iv) with s=tb,2κin cases (iii) and (iv) with s=t=b,n2κ1in case (v) with s=tb,n1in case (v) with s=t=b,

    and n is odd in (ⅴ), wt(gi) is even.

    Next, we will prove that wt(gigj) is even. Let qi be the ith row of the matrix QI(r,s,t,u). Since PI=(aIn,QI(r,s,t,u)),

    wt(gigj)=wt(qiqj).

    Since s=t, we can view the rows qi and qj of QI(r,s,t,u) having the following entries:

    qi:rqijssuuqj:qjirsusuABCDEF

    where A,B,C,D,E, and F are the numbers of coordinates where qi and qj satisfy the entries in the corresponding column. The jth entry in qi and the ith entry in qj are denoted by qij and qji, respectively. Note that A=B=1 and qij,qji{s,u}.

    Since QI(r,s,t,u)=rIn+s(A+AT)+u(JIAAT), QI(r,s,t,u) is symmetric and so qij=qji. Observe that in case (ⅲ),

    wt(qiqj)=D+E,

    in case (ⅳ),

    wt(qiqj)={0if qij=0,2if qij0,

    and in case (ⅴ),

    wt(qiqj)={D+E+2if s=t{a,c},0if s=t{0,b} and qij=0,2if s=t{0,b} and qij=b.

    Since ns(qi)=ns(qj) along with the symmetry of QI(r,s,t,u), it follows that C+D=C+E. Hence, D=E and therefore wt(gigj)=wt(qiqj) is even. Hence, CPI(r,s,t,u) is Type Ⅳ. This proves (ⅲ)–(ⅴ).

    Theorem 12. A QSD CBI(r,s,t,u) constructed from a non-symmetric three-class association scheme is Type Ⅳ if one of the following holds

    (ⅰ) r,s,t,u{0,a},

    (ⅱ) r,s,t,u{0,c},

    (ⅲ) r=0 and s,t,u{a,c} such that s=tu.

    Proof. If (ⅰ) is satisfied, then CBI(r,s,t,u) is Type Ⅳ by Lemma 6.

    To prove (ⅱ) and (ⅲ), we will use Theorem 3. So we need to show that wt(gi) and wt(gigj) are even where gi and gj for 1i,jn+1 are distinct rows of the generator matrix BI(r,s,t,u). By Lemma 3, wt(gi)nb(gi) (mod 2). Since none of the entries of BI(r,s,t,u) equals b in cases (ⅱ) and (ⅲ), nb(gi)=0 and thus wt(gi) is even.

    Now we will prove that wt(gigj) is even.

    The self-orthogonality of CBI(r,s,t,u) implies that

    na,a(gi,gj)+na,c(gi,gj)+nc,a(gi,gj)+nc,c(gi,gj)0 (mod 2). (4.13)

    In case (ⅱ), since r,s,t,u{0,c}, Eq (4.13) implies that na,c(g1,gj)0 (mod 2) for j>1. Observe that wt(g1gj)=na,c(g1,gj) and wt(gigj)=0 for i,j>1. Hence, wt(gigj) is even for all i and j. Therefore, CBI(r,s,t,u) is Type Ⅳ. This proves (ⅱ).

    In case (ⅲ), observe that

    wt(g1gj)=na,c(g1,gj)=nc(gj)={2κif s=t=c and u=a,n2κ1if s=t=a and u=c.

    Since n is odd in the bordered construction, wt(g1gj) is even. Now let qi be the ith row of the matrix QI(r,s,t,u). Then for 2i,jn+1,

    wt(gigj)=wt(qi1qj1).

    We can view the rows qi1 and qj1 of QI(r,s,t,u) having the following entries:

    qi1:0qj1aaccqj1:qi10acacABCDEF

    where A,B,C,D,E, and F are the numbers of coordinates where qi1 and qj1 satisfy the entries in the corresponding column. The entries qj1 and qi1 denote the components in the j1 and i1 positions of qi1 and qj1, respectively. Note that A=B=1 and qi1,qj1{a,c}. Since QI(r,s,t,u)=s(A+AT)+u(JIAAT), QI(r,s,t,u) is symmetric and so qi1=qj1. Since na(qi1)=na(qj1) along with the symmetry of QI(r,s,t,u), it follows that C+D=C+E. Hence, D=E and so wt(gigj)=wt(qi1qj1)=D+E is even. Therefore, CBI(r,s,t,u) is Type Ⅳ. This proves (ⅲ).

    The next example shows that employing the same adjacency matrices of a three-class association scheme but interchanging the scalars within {0,b} or {a,c} leaves the quasi-self duality of the code unchanged but not the Type Ⅳ property or the weight distribution.

    Example 3. Let (X,R) be the non-symmetric three-class association scheme of size 6 and relation matrix No. 4 of [15]. The corresponding adjacency matrices are as follows, A0=I6,

    A1=(010000001000100000000010000001000100) , A2=(001000100000010000000001000100000010) , A3=(000111000111000111111000111000111000).

    Recall that QI(r,s,t,u)=rA0+sA1+tA2+uA3. Then

    PI(r,s,t,u)=(aI6,QI(r,s,t,u))=(a00000rstuuu0a0000trsuuu00a000struuu000a00uuurst0000a0uuutrs00000auuustr)

    is a generator matrix for CPI(r,s,t,u). Using Eq (2.3), we calculate the parameters (n,κ,β,λ,μ)=(6,1,1,0,0) of (X,R). Hence, κ+1λμn0 (mod 2). Consistent with Theorem 8, the following codes are QSD but not necessarily Type Ⅳ:

    CPI(a,0,a,a) is a (12,4) Type Ⅳ code with weight distribution [<0,1>,<4,45>,<6,216>, <8,1755>,<10,1800>,<12,279>].

    CPI(a,b,a,a) is a (12,4) QSD but not Type Ⅳ code with weight distribution [<0,1>,<4,45>, <6,152>,<7,384>,<8,795>,<9,1280>,<10,840>,<11,384>,<12,215>].

    CPI(a,b,c,c) is a (12,4) QSD but not Type Ⅳ code with weight distribution [<0,1>,<4,15>, <5,24>,<6,216>,<7,312>,<8,975>,<9,840>,<10,1176>,<11,360>, <12,177>].

    CPI(c,0,a,c) is a (12,4) QSD but not Type Ⅳ code with weight distribution [<0,1>,<4,15>, <5,24>,<6,200>,<7,408>,<8,735>,<9,1160>,<10,936>,<11,456>, <12,161>].

    Let (X,R) be a symmetric three-class association scheme. Then all adjacency matrices are symmetric. In this case, Eq (4.1) over I can be written as

    QI(r,s,t,u)=(ru)In+uJ+(su)A1+(tu)A2. (4.14)

    To study self-orthogonality of the codes CPI(r,s,t,u) and CBI(r,s,t,u), we need to calculate QI(r,s,t,u)QI(r,s,t,u)T. To do this, we make substantial use of the following lemma.

    Lemma 7. If (X,R) is a symmetric three-class association scheme, then the following equations hold:

    AiJ=JAi=κiJ,A2i=AiATi=κiIn+αiA1+βiA2+γi(JInA1A2),

    where κi=p0ii,αi=p1ii,βi=p2ii, and γi=p3ii.

    Proof. The equations follow immediately from Eqs (2.1) and (2.2).

    Lemma 8. Keep the notations in Lemma 7 and let QI=QI(r,s,t,u). Then,

    QIQTI=(r2+u2+(s2+u2)(κ1+γ1)+(t2+u2)(κ2+γ2))In+(nu2+(s2+u2)γ1+(t2+u2)γ2)J  +((s2+u2)(α1+γ1)+(t2+u2)(α2+γ2))A1+((s2+u2)(β1+γ1)+(t2+u2)(β2+γ2))A2.

    Proof. By Eq (4.14), Lemma 7 and the properties of I, we have

    QIQTI=((r+u)In+uJ+(s+u)A1+(t+u)A2)((r+u)In+uJ+(s+u)A1+(t+u)A2)T=((r+u)In+uJ+(s+u)A1+(t+u)A2)((r+u)In+uJ+(s+u)A1+(t+u)A2)=(r+u)2In+(r+u)uJ+(r+u)(s+u)A1+(r+u)(t+u)A2+u(r+u)J+u2J2  +u(s+u)JA1+u(t+u)JA2+(s+u)(r+u)A1+(s+u)uA1J+(s+u)2A21  +(s+u)(t+u)A1A2+(t+u)(r+u)A2+(t+u)uA2J+(t+u)(s+u)A2A1+(t+u)2A22=(r2+u2)In+u2J2+(s2+u2)A21+(t2+u2)A22=(r2+u2)In+nu2J+(s2+u2)(κ1In+α1A1+β1A2+γ1(JInA1A2))  +(t2+u2)(κ2In+α2A1+β2A2+γ2(JInA1A2))=(r2+u2+(s2+u2)(κ1+γ1)+(t2+u2)(κ2+γ2))In+(nu2+(s2+u2)γ1+(t2+u2)γ2)J  +((s2+u2)(α1+γ1)+(t2+u2)(α2+γ2))A1+((s2+u2)(β1+γ1)+(t2+u2)(β2+γ2))A2.

    In the next two theorems, all congruences are given in F2.

    Theorem 13. The code CPI(r,s,t,u) constructed from a symmetric three-class association scheme is QSD if and only if the parameters are as in Table 6.

    Table 6.  Conditions for linear codes over I formed from symmetric three-class association schemes by the pure construction to be QSD.
    r s t u CPI(r,s,t,u) is QSD
    {0,b} {0,b} {0,b} {0,b} never
    {0,b} {0,b} {0,b} {a,c} α1+α2β1+β2γ1+γ2κ1+κ2n
    {0,b} {0,b} {a,c} {0,b} α2β2γ2κ2+10
    {0,b} {0,b} {a,c} {a,c} α1β1γ1κ1n
    {0,b} {a,c} {0,b} {0,b} α1β1γ1κ1+10
    {0,b} {a,c} {0,b} {a,c} α2β2γ2κ2n
    {0,b} {a,c} {a,c} {0,b} α1+α2β1+β2γ1+γ2κ1+κ2+10
    {0,b} {a,c} {a,c} {a,c} n0
    {a,c} {0,b} {0,b} {0,b} always
    {a,c} {0,b} {0,b} {a,c} α1+α2β1+β2γ1+γ2κ1+κ2+1n
    {a,c} {0,b} {a,c} {0,b} α2β2γ2κ20
    {a,c} {0,b} {a,c} {a,c} α1β1γ1κ1+1n
    {a,c} {a,c} {0,b} {0,b} α1β1γ1κ10
    {a,c} {a,c} {0,b} {a,c} α2β2γ2κ2+1n
    {a,c} {a,c} {a,c} {0,b} α1+α2β1+β2γ1+γ2κ1+κ20
    {a,c} {a,c} {a,c} {a,c} never

     | Show Table
    DownLoad: CSV

    Proof. By Theorem 2, CPI(r,s,t,u) is a free code of type (n,0) and thus it has 22n codewords. Hence, to prove that CPI(r,s,t,u) is QSD, we only need to show that it is self-orthogonal.

    The code CPI(r,s,t,u) is self-orthogonal if and only if PI(r,s,t,u)PI(r,s,t,u)T=O which occurs if and only if QI(r,s,t,u)QI(r,s,t,u)T=bIn. Then, by Lemma 8, the code CPI(r,s,t,u) is self-orthogonal if and only if the following are satisfied:

    r2+u2+(s2+u2)(κ1+γ1)+(t2+u2)(κ2+γ2)=b, (4.15)
    nu2+(s2+u2)γ1+(t2+u2)γ2=0, (4.16)
    (s2+u2)(α1+γ1)+(t2+u2)(α2+γ2)=0, (4.17)
    (s2+u2)(β1+γ1)+(t2+u2)(β2+γ2)=0. (4.18)

    To determine when the codes are self-orthogonal, we need to find the solutions that satisfy Eqs (4.15)–(4.18). We consider four cases depending on the values of the scalars s and u:

    Case 1: s,u{0,b}.

    Then s2+u2=0 and Eqs (4.15)–(4.18) reduce to

    r2+t2(κ2+γ2)=b,t2γ2=0,t2(α2+γ2)=0,t2(β2+γ2)=0.

    If t{0,b}, then r{a,c}.

    If t{a,c}, then either r{0,b} and α2β2γ2κ2+10 (mod 2), or r{a,c} and α2β2γ2κ20 (mod 2).

    Case 2: s,u{a,c}.

    Then s2+u2=0 and Eqs (4.15)–(4.18) reduce to

    r2+b+(t2+b)(κ2+γ2)=b,nb+(t2+b)γ2=0,(t2+b)(α2+γ2)=0,(t2+b)(β2+γ2)=0.

    If t{a,c}, then r{0,b} and n is even.

    If t{0,b}, then either r{0,b} and α2β2γ2κ2n (mod 2), or r{a,c} and α2β2γ2κ2+1n (mod 2).

    Case 3: s{0,b} and u{a,c}.

    Then s2+u2=b and Eqs (4.15)–(4.18) reduce to

    r2+b(1+κ1+γ1)+(t2+b)(κ2+γ2)=b,b(n+γ1)+(t2+b)γ2=0,b(α1+γ1)+(t2+b)(α2+γ2)=0,b(β1+γ1)+(t2+b)(β2+γ2)=0.

    If r,t{0,b}, then κ1+κ2α1+α2β1+β2γ1+γ2n (mod 2).

    If r,t{a,c}, then κ1+1α1β1γ1n (mod 2).

    If r{0,b} and t{a,c}, then κ1α1β1γ1n (mod 2).

    If r{a,c} and t{0,b}, then κ1+κ2+1α1+α2β1+β2γ1+γ2n (mod 2).

    Case 4: u{0,b} and s{a,c}.

    Then s2+u2=b and Eqs (4.15)–(4.18) reduce to

    r2+b(κ1+γ1)+t2(κ2+γ2)=b,bγ1+t2γ2=0,b(α1+γ1)+t2(α2+γ2)=0,b(β1+γ1)+t2(β2+γ2)=0.

    If r,t{0,b}, then κ1+1α1β1γ10 (mod 2).

    If r,t{a,c}, then κ1+κ2α1+α2β1+β2γ1+γ20 (mod 2).

    If r{0,b} and t{a,c}, then κ1+κ2+1α1+α2β1+β2γ1+γ20 (mod 2).

    If r{a,c} and t{0,b}, then κ1α1β1γ10 (mod 2).

    Theorem 14. The code CBI(r,s,t,u) constructed from a symmetric three-class association scheme is QSD if and only if the parameters are as in Table 7.

    Table 7.  Conditions for linear codes over I formed from symmetric three-class association schemes by the bordered construction to be QSD.
    r s t u CBI(r,s,t,u) is QSD
    {0,b} {0,b} {0,b} {0,b} never
    {0,b} {0,b} {0,b} {a,c} α1+α2β1+β2γ1+γ2n+10
    {0,b} {0,b} {a,c} {0,b} α2β2γ2n1
    {0,b} {0,b} {a,c} {a,c} α1β1γ1n+10
    {0,b} {a,c} {0,b} {0,b} α1β1γ1n1
    {0,b} {a,c} {0,b} {a,c} α2β2γ2n+10
    {0,b} {a,c} {a,c} {0,b} α1+α2β1+β2γ1+γ2n1
    {0,b} {a,c} {a,c} {a,c} n1
    {a,c} I I I never

     | Show Table
    DownLoad: CSV

    Proof. By Theorem 2, CBI(r,s,t,u) is a free code of type (n+1,0) and thus it has 22n+2 codewords. Hence, to prove that CBI(r,s,t,u) is QSD, we only need to show that it is self-orthogonal.

    The code CBI(r,s,t,u) is self-orthogonal if and only if BI(r,s,t,u)BI(r,s,t,u)T=O which occurs if and only if the following are satisfied:

    (n+1)b=0,a(r+sκ1+tκ2+u(nκ1κ21))=0,QI(r,s,t,u)QI(r,s,t,u)T=b(In+J).

    Note that the first equation is the inner product of the top row with itself. The second equation is the inner product of the top row with any other row. The third equation ensures that the remaining rows are orthogonal to each other.

    The first equation requires n to be odd. Therefore, by Lemma 1, κ1 and κ2 are even. The other two equations then satisfy

    ar=0,QI(r,s,t,u)QI(r,s,t,u)T=b(In+J).

    Then, by Lemma 8, the code CBI(r,s,t,u) is self-orthogonal if and only if n is odd, κ1 and κ2 are even, r{0,b}, and the following are satisfied:

    u2+(s2+u2)γ1+(t2+u2)γ2=b, (4.19)
    (s2+u2)(α1+γ1)+(t2+u2)(α2+γ2)=0, (4.20)
    (s2+u2)(β1+γ1)+(t2+u2)(β2+γ2)=0. (4.21)

    To determine when the codes are self-orthogonal, we need to find the solutions that satisfy Eqs (4.19)–(4.21). We consider four cases depending on the values of the scalars s and u:

    Case 1: s,u{0,b}.

    Then s2+u2=0 and Eqs (4.19)–(4.21) reduce to

    t2γ2=b,t2(α2+γ2)=0,t2(β2+γ2)=0.

    The equations are satisfied when t{a,c} and α2β2γ21 (mod 2).

    Case 2: s,u{a,c}.

    Then s2+u2=0 and Eqs (4.19)–(4.21) reduce to

    b+(t2+b)γ2=b,(t2+b)(α2+γ2)=0,(t2+b)(β2+γ2)=0.

    The equations are satisfied when either t{a,c}, or t{0,b} together with γ2α2β20 (mod 2).

    Case 3: s{0,b} and u{a,c}.

    Then s2+u2=b and Eqs (4.19)–(4.21) reduce to

    b(1+γ1)+(t2+b)γ2=b,b(α1+γ1)+(t2+b)(α2+γ2)=0,b(β1+γ1)+(t2+b)(β2+γ2)=0.

    If t{0,b}, then γ1+γ2α1+α2β1+β20 (mod 2). If t{a,c}, then γ1α1β10 (mod 2).

    Case 4: s{a,c} and u{0,b}.

    Then s2+u2=b and Eqs (4.19)–(4.21) reduce to

    bγ1+t2γ2=b,b(α1+γ1)+t2(α2+γ2)=0,b(β1+γ1)+t2(β2+γ2)=0.

    If t{0,b}, then γ1α1β11 (mod 2). If t{a,c}, then γ1+γ2α1+α2β1+β21 (mod 2).

    Theorem 15. Every QSD code constructed from a symmetric three-class association scheme by either the pure or the bordered construction is quasi Type Ⅳ.

    Proof. Let C denote a QSD code constructed from a symmetric three-class association scheme by either the pure or the bordered construction. Then C is a free code by Theorem 2 and thus C is quasi Type Ⅳ by Corollary 1.

    The following remark will assist us in studying the conditions on QSD codes constructed from symmetric association schemes to be Type Ⅳ.

    Remark 2. Let (X,R) be a symmetric three-class association scheme. From the third condition in Definition 1, for any i,j,k{0,1,2,3}, pkij=pkji is a constant number which does not depend on the choice of x and y that satisfy (x,y)Rk. By the symmetry of each Ri, we have

    |{zX(x,z)Ri and (y,z)Rj}|=|{zX(x,z)Ri and (z,y)Rj}|=pkij=pkji=|{zX(x,z)Rj and (z,y)Ri}|=|{zX(x,z)Rj and (y,z)Ri}|.

    Hence, for ,mI, the number of occurrences of ( m)T is the same as the number of occurrences of (m )T in the columns of any two distinct rows of QI(r,s,t,u), as defined in the symmetric case. That is, any two rows x and y in QI(r,s,t,u) satisfy that n,m(x,y)=nm,(x,y).

    Lemma 9. Let C be a QSD code constructed from a symmetric three-class association scheme by either the pure or the bordered construction. If every row of the generator matrix of C has an even weight, then C is Type Ⅳ.

    Proof. By Theorem 3, it suffices to prove that wt(gigj) is even for every distinct pair of rows gi and gj of the generator matrices of CPI(r,s,t,u) and CBI(r,s,t,u). Let qi be the ith row of the matrix QI(r,s,t,u).

    In the pure construction, we have PI=(aIn,QI(r,s,t,u)). Hence, wt(gigj)=wt(qiqj). Let n,m=n,m(qi,qj). Then, by Remark 2, n,m=nm, and so

    wt(qiqj)=na,b+na,c+nb,a+nb,c+nc,a+nc,b=2(na,b+na,c+nb,c).

    Therefore wt(gigj)=wt(qiqj) is even. By Theorem 3, CPI(r,s,t,u) is Type Ⅳ.

    In the bordered construction, we have

    BI(r,s,t,u)=(a000aa0aaInQI(r,s,t,u)0a).

    Hence, for j>1,

    wt(g1gj)=nb(gj)+nc(gj)

    and for 2i,jn+1,

    wt(gigj)=wt(qi1qj1).

    By Theorem 14, n is odd. By Lemma 1, κ1,κ2, and nκ1κ21 are even. Observe that for j>1

    wt(gj)=2+wt(r)+wt(s)κ1+wt(t)κ2+wt(u)(nκ1κ21)

    which is an even number, by assumption. So we must have r=0. Hence, nb(gj) and nc(gj) are equal to any sum of the even values {0,κ1,κ2,nκ1κ21}. Hence, wt(g1gj) is even. By the same argument as in the pure construction, wt(gigj)=wt(qi1qj1) is even. By Theorem 3, CBI(r,s,t,u) is Type Ⅳ.

    Theorem 16. A QSD CPI(r,s,t,u) constructed from a symmetric three-class association scheme is Type Ⅳ if and only if either r,s,t,u{0,a,c} or at least one scalar is b and the parameters are as in Table 8, where all congruences are given in F2 and "" means the scalar is different from b.

    Table 8.  Conditions for QSD codes over I formed from symmetric three-class association schemes by the pure construction to be Type Ⅳ.
    r s t u CPI(r,s,t,u) is Type Ⅳ
    b nκ1+κ2+1
    b κ20
    b b nκ1+1
    b κ10
    b b nκ2+1
    b b κ1κ2
    b b b n1
    b never
    b b nκ1+κ2
    b b κ21
    b b b nκ1
    b b κ11
    b b b nκ2
    b b b κ1+κ21

     | Show Table
    DownLoad: CSV

    Proof. Since CPI(r,s,t,u) is self-orthogonal, by Lemma 3, wt(gi)nb(gi) (mod 2) for every row gi of the generator matrix PI(r,s,t,u). The quasi self-duality of CPI(r,s,t,u), by Theorem 13, requires that at least one scalar is different from b. In Table 9, we compute the congruence of the weights of every row gi in all possible cases.

    Table 9.  The weights of the rows of PI(r,s,t,u).
    r s t u wt(gi) (mod 2)
    0
    b n+κ1+κ2+1
    b κ2
    b b n+κ1+1
    b κ1
    b b n+κ2+1
    b b κ1+κ2
    b b b n+1
    b 1
    b b n+κ1+κ2
    b b κ2+1
    b b b n+κ1
    b b κ1+1
    b b b n+κ2
    b b b κ1+κ2+1

     | Show Table
    DownLoad: CSV

    From Table 9, it follows that wt(gi) is even if and only if either r,s,t,u{0,a,c} or at least one scalar is b and the parameters are as in Table 8. By Lemma 9, CPI(r,s,t,u) is Type Ⅳ. The converse follows immediately.

    Theorem 17. A QSD CBI(r,s,t,u) constructed from a symmetric three-class association scheme is Type Ⅳ if and only if r=0.

    Proof. Since CBI(r,s,t,u) is QSD, by Theorem 14, we know that r{0,b}.

    Assume that r=0. We will prove that CBI(r,s,t,u) is Type Ⅳ. Let gi be any arbitrary row of the generator matrix BI(0,s,t,u) for 1in+1. Observe that wt(g1)=n+1 and wt(gi)=2+wt(s)κ1+wt(t)κ2+wt(u)(nκ1κ21) for i>1. Since n is odd in the bordered construction, by Lemma 1, κ1 and κ2 are even. Hence, wt(gi) is even for all i. By Lemma 9, CBI(0,s,t,u) is Type Ⅳ.

    Now suppose that r=b. Then for i>1, wt(gi)=3+wt(s)κ1+wt(t)κ2+wt(u)(nκ1κ21). Since n is odd in the bordered construction, by Lemma 1, κ1 and κ2 are even and thus wt(gi) is odd. Hence, CBI(b,s,t,u) is not Type Ⅳ.

    Example 4. In Table 10, we present examples of (N,d) QSD codes over I of length N and minimum distance d satisfying the conditions in Theorems 13, 14, 16 and 17 constructed from symmetric three-class association schemes. The corresponding adjacency matrices with length n and parameters as defined in Lemma 7 of such schemes can be found in [15].

    Table 10.  QSD codes over I constructed from symmetric three-class association schemes.
    Construction (n,κ1,κ2) Code (N,d) Type Ⅳ
    (6,1,2) CPI(a,0,a,a) (12,4) yes
    (7,2,2) CPI(a,0,0,0) (14,2) yes
    (9,2,2) CPI(a,b,0,b) (18,2) yes
    (10,2,2) CPI(b,a,a,a) (20,4) no
    (12,1,5) CPI(b,0,a,b) (24,4) yes
    Pure (14,3,4) CPI(a,0,a,0) (28,6) yes
    (16,3,3) CPI(0,a,b,0) (32,4) no
    (18,2,4) CPI(c,c,0,c) (36,4) yes
    (26,4,9) CPI(a,a,0,a) (52,8) yes
    (28,3,12) CPI(b,a,b,a) (56,8) no
    (32,6,10) CPI(a,b,a,0) (64,8) yes
    (7,2,2) CBI(0,a,a,a) (16,4) yes
    (9,2,2) CBI(0,a,c,a) (20,4) yes
    (15,2,4) CBI(0,c,a,b) (32,8) yes
    Bordered (19,6,6) CBI(b,a,a,a) (40,4) no
    (21,4,8) CBI(0,a,b,c) (44,8) yes
    (27,2,8) CBI(0,c,a,0) (56,8) yes
    (33,2,10) CBI(0,c,c,c) (68,4) yes

     | Show Table
    DownLoad: CSV

    In this work, we have described two methods for constructing linear codes over two non-unital rings, denoted E and I, using the adjacency matrices of three-class association schemes. We proved that the two constructions, under some restrictions, yield QSD codes and Type Ⅳ codes. Drawing on the rich literature on association schemes with small vertices in [15], many QSD codes and Type Ⅳ codes with minimum distance exceeding 4 were constructed. New results related to free codes over the two rings were given. Based on these results and the forms of the two described constructions, we remark that all QSD codes over E from the two constructions can be regarded as QSD codes over I. Consequently, our investigation focused on codes over I.

    One possible direction for future research is to use m-class association schemes with m4 to construct QSD codes. Another direction is to consider the construction techniques presented in this paper over different non-unital rings that have been studied in the literature.

    The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.

    This project was funded by the Deanship of Scientific Research (DSR), King Abdulaziz University, Jeddah, Saudi Arabia under grant no. (KEP-PhD-66-130-42). The authors, therefore, acknowledge with thanks DSR for their technical and financial support.

    Prof. Patrick Solé is the Guest Editor of special issue "Mathematical Coding Theory and its Applications" for AIMS Mathematics. Prof. Patrick Solé was not involved in the editorial review and the decision to publish this article.

    All authors declare no conflicts of interest in this paper.



    [1] Z. Guo, K. Yu, A. K. Bashir, D. Zhang, Y. D. Al-Otaibi, M. Guizani, Deep information fusion-driven POI scheduling for mobile social networks, IEEE Network, 36 (2022), 210–216. https://doi.org/10.1109/MNET.102.2100394 doi: 10.1109/MNET.102.2100394
    [2] Q. Zhang, K. Yu, Z. Guo, S. Garg, J. Rodrigues, M. Hassan, et al., Graph neural networks-driven traffic forecasting for connected internet of vehicles, IEEE Trans. Network Sci. Eng., 9 (2022), 3015–3027. https://doi.org/10.1109/TNSE.2021.3126830 doi: 10.1109/TNSE.2021.3126830
    [3] Y. Li, H. Ma, L. Wang, S. Mao, G. Wang, Optimized content caching and user association for edge computing in densely deployed heterogeneous networks, IEEE Trans. Mob. Comput., 21 (2022), 2130–2142. https://doi.org/10.1109/TMC.2020.3033563 doi: 10.1109/TMC.2020.3033563
    [4] L. Huang, R. Nan, K. Chi, Q. Hua, K. Yu, N. Kumar, et al., Throughput guarantees for multi-cell wireless powered communication networks with non-orthogonal multiple access, IEEE Trans. Veh. Technol., 71 (2022), 12104–12116. https://doi.org/10.1109/TVT.2022.3189699 doi: 10.1109/TVT.2022.3189699
    [5] L. Zhao, Z. Yin, K. Yu, X. Tang, L. Xu, Z. Guo, et al., A fuzzy logic based intelligent multi-attribute routing scheme for two-layered SDVNs, IEEE Trans. Netw. Serv. Manage., 19 (2022), 4189–4200. https://doi.org/10.1109/TNSM.2022.3202741 doi: 10.1109/TNSM.2022.3202741
    [6] S. Xia, Z. Yao, Y. Li, S. Mao, Online distributed offloading and computing resource management with energy harvesting for heterogeneous MEC-Enabled IoT, IEEE Trans. Wireless Commun., 20 (2021), 6743–6757. https://doi.org/10.1109/TWC.2021.3076201 doi: 10.1109/TWC.2021.3076201
    [7] Z. Zhou, X. Dong, Z. Li, K. Yu, C. Ding, Y. Yang, Spatio-temporal feature encoding for traffic accident detection in VANET environment, IEEE Trans. Intell. Transp. Syst., 23 (2022), 19772–19781. https://doi.org/10.1109/TITS.2022.3147826 doi: 10.1109/TITS.2022.3147826
    [8] D. Peng, D. He, Y. Li, Z. Wang, Integrating terrestrial and satellite multibeam systems toward 6G: techniques and challenges for interference mitigation, IEEE Wireless Commun., 29 (2022), 24–31. https://doi.org/10.1109/MWC.002.00293 doi: 10.1109/MWC.002.00293
    [9] C. Chen, Z. Liao, Y. Ju, C. He, K. Yu, S. Wan, Hierarchical domain-based multi-controller deployment strategy in SDN-Enabled space-air-ground integrated network, IEEE Trans. Aerosp. Electron. Syst., 58 (2022), 4864–4879. https://doi.org/10.1109/TAES.2022.3199191 doi: 10.1109/TAES.2022.3199191
    [10] Z. Guo, K. Yu, Z. Lv, K. Choo, P. Shi, J. Rodrigues, Deep federated learning enhanced secure POI microservices for cyber-physical systems, IEEE Wireless Commun., 29 (2022), 22–29. https://doi.org/10.1109/MWC.002.2100272 doi: 10.1109/MWC.002.2100272
    [11] Z. Cai, X. Zheng, J. Yu, A differential-private framework for urban traffic flows estimation via taxi companies, IEEE Trans. Ind. Inf., 15 (2019), 6492–6499. https://doi.org/10.1109/TII.2019.2911697 doi: 10.1109/TII.2019.2911697
    [12] Z. Guo, K. Yu, A. Jolfaei, F. Ding, N. Zhang, Fuz-Spam: Label smoothing-based fuzzy detection of spammers in Internet of Things, IEEE Trans. Fuzzy Syst., 30 (2021), 4543–4554. https://doi.org/10.1109/TFUZZ.2021.3130311 doi: 10.1109/TFUZZ.2021.3130311
    [13] X. Zheng, Z. Cai, Privacy-preserved data sharing towards multiple parties in industrial IoTs, IEEE J. Sel. Areas Commun., 38 (2020), 968–979. https://doi.org/10.1109/JSAC.2020.2980802 doi: 10.1109/JSAC.2020.2980802
    [14] Z. Guo, C. Tang, W. Niu, Y. Fu, T. Wu, H. Xia, et al., Fine-grained recommendation mechanism to curb astroturfing in crowdsourcing systems, IEEE Access, 5 (2017), 15529–15541. https://doi.org/10.1109/ACCESS.2017.2731360 doi: 10.1109/ACCESS.2017.2731360
    [15] J. Wei, Q. Zhu, Q. Li, L. Nie, Z. Shen, K. Choo, et al., A redactable blockchain framework for secure federated learning in industrial Internet-of-Things, IEEE Internet Things J., 9 (2022), 17901–17911. https://doi.org/10.1109/JIOT.2022.3162499 doi: 10.1109/JIOT.2022.3162499
    [16] Z. Cai, Z. Duan, W. Li, Exploiting multi-dimensional task diversity in distributed auctions for mobile crowdsensing, IEEE Trans. Mob. Comput., 20 (2021), 2576–2591. https://doi.org/10.1109/TMC.2020.2987881 doi: 10.1109/TMC.2020.2987881
    [17] D. Niu, K. Wang, J. Wu, Can China achieve its 2030 carbon emissions commitment? Scenario analysis based on an improved general regression neural network, J. Cleaner Prod., 243 (2020), 118558. https://doi.org/10.1016/j.jclepro.2019.118558 doi: 10.1016/j.jclepro.2019.118558
    [18] X. Zhang, Construction and simulation of financial audit model based on convolutional neural network, Comput. Intell. Neurosci., 2021 (2021). https://doi.org/10.1155/2021/1182557 doi: 10.1155/2021/1182557
    [19] H. Bohušová, Possible way of fraud detection in accounting and financial reporting, Fraud in Accounting and Taxation and Its Detection, 2022.
    [20] M. Zupan, S. Letinic, V. Budimir, Accounting journal reconstruction with variational autoencoders and long short-term memory architecture, in Sistemi Evoluti per Basi di Dati, (2020), 88–99.
    [21] X. Chen, X. Huang, Application of price competition model based on computational neural network in risk prediction of transnational investment, Comput. Intell. Neurosci., 2022 (2022). https://doi.org/10.1155/2022/8906385 doi: 10.1155/2022/8906385
    [22] J. Horak, J. Vrbka, P. Suler, Support vector machine methods and artificial neural networks used for the development of bankruptcy prediction models and their comparison, J. Risk Financ. Manage., 13 (2020). https://doi.org/10.3390/jrfm13030060 doi: 10.3390/jrfm13030060
    [23] B. Mabusela‐Motsosi, S. Myeni, E. Munapo, Development of base tax liability insurance premium calculator for the South African construction industry—A machine learning approach, in Handbook of Intelligent Computing and Optimization for Sustainable Development, Wiley, (2022), 371–383. https://doi.org/10.1002/9781119792642.ch19
    [24] X. Zhang, Z. Min, An empirical study on big data stock volatility forecasting algorithm based on multivariate hybrid criterion fuzzy model, Int. J. Electr. Eng. Educ., 2021 (2021).
    [25] X. Y. Shen, G. L. Shi, H. Ren, W. Zhang, Biomimetic vision for zoom object detection based on improved vertical grid number YOLO algorithm, Front. Bioeng. Biotechnol., 10 (2022). https://doi.org/10.3389/fbioe.2022.905583 doi: 10.3389/fbioe.2022.905583
    [26] T. Liu, Z. Zheng, Y. Du, Evaluation on regional science and technology resources allocation in China based on the zero sum gains data envelopment analysis, J. Intell. Manuf., 32 (2021), 1729–1737. https://doi.org/10.1007/s10845-020-01622-w doi: 10.1007/s10845-020-01622-w
  • Reader Comments
  • © 2023 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1855) PDF downloads(69) Cited by(0)

Figures and Tables

Figures(8)  /  Tables(2)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog