Results 11 to 20 of about 307,945 (311)

On the Construction of Quantum and LCD Codes from Cyclic Codes over the Finite Commutative Rings

open access: yesAxioms, 2023
Let Fq be a field of order q, where q is a power of an odd prime p, and α and β are two non-zero elements of Fq. The primary goal of this article is to study the structural properties of cyclic codes over a finite ring R=Fq[u1,u2]/⟨u12−α2,u22−β2,u1u2 ...
Shakir Ali   +5 more
doaj   +1 more source

Using Hamming Network to Decoding Binary Cyclic Code [PDF]

open access: yesEngineering and Technology Journal, 2011
This work, efforts are concentrated on solving the problem of decoding binary cyclic code, using hamming neural network. Therefore, this work shows the ability of hamming network in solving one of the important problems in coding theory.
Hind Abd Al-Razzaq
doaj   +1 more source

Reducing vulnerability of modified LSB algorithm to a chosen statistic attacks [PDF]

open access: yesBiuletyn Wojskowej Akademii Technicznej, 2014
[b]Abstract[/b]. The LSB algorithm is one of the most studied steganographic algorithms. There are several types of attacks that can detect the fact of conducting cover communication — chi-square attack and RS. This paper presents modification of the LSB
Kamil Kaczyński
doaj   +1 more source

Quasi-Cyclic Codes

open access: yes, 2020
arXiv admin note: text overlap with arXiv:1906 ...
Güneri, Cem, Ling, San, Özkaya, Buket
openaire   +4 more sources

From Skew-Cyclic Codes to Asymmetric Quantum Codes [PDF]

open access: yes, 2010
We introduce an additive but not $\mathbb{F}_4$-linear map $S$ from $\mathbb{F}_4^{n}$ to $\mathbb{F}_4^{2n}$ and exhibit some of its interesting structural properties.
A. R. Calderbank   +16 more
core   +1 more source

Novel Indexing of Cyclic Codes With Run-Length Applications

open access: yesIEEE Access, 2019
Any cyclic code over a finite field can be considered as a sum of some non-degenerate irreducible cyclic codes. We use the traditional trace function representation of irreducible cyclic codes to suggest a similar representation to any cyclic code.
Hai Q. Dinh   +2 more
doaj   +1 more source

A decoding method of an n length binary BCH code through (n + 1)n length binary cyclic code

open access: yesAnais da Academia Brasileira de Ciências, 2013
For a given binary BCH code Cn of length n = 2 s - 1 generated by a polynomial of degree r there is no binary BCH code of length (n + 1)n generated by a generalized polynomial of degree 2r. However, it does exist a binary cyclic code C (n+1)n of
TARIQ SHAH   +2 more
doaj   +1 more source

Numerical simulation of cyclic oxidation kinetics with automatic fitting of experimental data [PDF]

open access: yes, 2007
This paper proposes a model, based on a Monte Carlo method, to assess cyclic oxidation tests. The numerical code fits automatically the experimental net mass change curves.
Monceau, Daniel   +2 more
core   +2 more sources

Construction of Cyclic DNA Codes Over the Ring Z4 + vZ4

open access: yesIEEE Access, 2020
In this work, we investigate DNA codes of odd length over the finite ring $R=\mathbb {Z}_{4}+v \mathbb {Z}_{4},v^{2}=v$ . Firstly, we give a map $\Phi $ from $R^{n}$ to $\{A, T, G,C\}^{2n}$ .
Jie Liu, Hualu Liu
doaj   +1 more source

Home - About - Disclaimer - Privacy