Results 1 to 10 of about 74,437 (278)
Error characterization and error correction approaches in combinatorial DNA-based storage [PDF]
Data storage in DNA has recently emerged as a promising archival solution, offering space-efficient and long-lasting digital storage. DNA’s ultra-high density and durability make it an attractive medium for long-term data storage.
Inbal Preuss +5 more
doaj +2 more sources
Combinatorial design-based quasi-cyclic LDPC codes with girth eight
This paper presents a novel regular Quasi-Cyclic (QC) Low Density Parity Check (LDPC) codes with column-weight three and girth at least eight. These are designed on the basis of combinatorial design in which subsets applied for the construction of ...
Sina Vafi, Narges Rezvani Majid
doaj +3 more sources
Fractional Repetition Codes With Flexible Repair From Combinatorial Designs [PDF]
Fractional repetition (FR) codes are a class of regenerating codes for distributed storage systems with an exact (table-based) repair process that is also uncoded, i.e., upon failure, a node is regenerated by simply downloading packets from the surviving
Oktay Olmez, Aditya Ramamoorthy
exaly +4 more sources
Combinatorial Alphabet-Dependent Bounds for Locally Recoverable Codes
Locally recoverable (LRC) codes have recently been a focus point of research in coding theory due to their theoretical appeal and applications in distributed storage systems.
Abhishek Agarwal +2 more
exaly +3 more sources
Quantum XYZ Product Codes [PDF]
We study a three-fold variant of the hypergraph product code construction, differing from the standard homological product of three classical codes. When instantiated with 3 classical LDPC codes, this "XYZ product" yields a non CSS quantum LDPC code ...
Anthony Leverrier +2 more
doaj +1 more source
Down-step statistics in generalized Dyck paths [PDF]
The number of down-steps between pairs of up-steps in $k_t$-Dyck paths, a generalization of Dyck paths consisting of steps $\{(1, k), (1, -1)\}$ such that the path stays (weakly) above the line $y=-t$, is studied.
Andrei Asinowski +2 more
doaj +1 more source
CBFISKD: A Combinatorial-Based Fuzzy Inference System for Keylogger Detection
A keylogger is a type of spyware that records keystrokes from the user’s keyboard to steal confidential information. The problems with most keylogger methods are the lack of simulated keylogger patterns, the failure to maintain a database of current ...
Femi Emmanuel Ayo +5 more
doaj +1 more source
Enumeration of Optimal Equidistant Codes
Problems of search and enumeration of binary and ternary equidistant codes are considered in the paper. We investigate some combinatorial algorithms and develop specialized computer packages to find non-equivalent optimal binary and ternary equidistant ...
Galina Bogdanova, Todor Todorov
doaj +1 more source
On Some Families of Codes Related to the Even Linear Codes Meeting the Grey–Rankin Bound
Bounds for the parameters of codes are very important in coding theory. The Grey–Rankin bound refers to the cardinality of a self-complementary binary code. Codes meeting this bound are associated with families of two-weight codes and other combinatorial
Iliya Bouyukliev +2 more
doaj +1 more source
Combinatorial designs have many interesting and genuine wide applications in areas including analysis and design of algorithms, cryptography, analysis and design of experiments, storage system design, tournament scheduling, optical communications, and ...
A. El-Mesady +2 more
doaj +1 more source

