Results 51 to 60 of about 2,120,403 (275)
Cell wall target fragment discovery using a low‐cost, minimal fragment library
LoCoFrag100 is a fragment library made up of 100 different compounds. Similarity between the fragments is minimized and 10 different fragments are mixed into a single cocktail, which is soaked to protein crystals. These crystals are analysed by X‐ray crystallography, revealing the binding modes of the bound fragment ligands.
Kaizhou Yan +5 more
wiley +1 more source
Reversible Codes in
Reversible codes play an essential role in coding theory because of their structural symmetry and broad applications in error control, cryptography, and DNA computing.
Bodigiri Sai Gopinadh, Venkatrajam Marka
doaj +1 more source
Constructions of some secret sharing schemes based on linear codes [PDF]
There are perfect and ideal threshold secret sharing schemes, for example, Shamir’s secret sharing scheme. For the case of general secret sharing schemes with an arbitrary access structure, it is possible to construct a perfect scheme for any
Ratseev, Sergey Mihailovich
doaj +1 more source
Geometric representations of linear codes
We say that a linear code C over a field F is triangular representable if there exists a two dimensional simplicial complex $\Delta$ such that C is a punctured code of the kernel ker $\Delta$ of the incidence matrix of $\Delta$ over F and there is a ...
Cimasoni +8 more
core +1 more source
We reconstituted Synechocystis glycogen synthesis in vitro from purified enzymes and showed that two GlgA isoenzymes produce glycogen with different architectures: GlgA1 yields denser, highly branched glycogen, whereas GlgA2 synthesizes longer, less‐branched chains.
Kenric Lee +3 more
wiley +1 more source
How to Find the Equivalence Classes in a Set of Linear Codes in Practice?
An algorithm for equivalence of linear codes over finite fields is presented. Its main advantage is that it can extract exactly one representative from each equivalence class among a large number of linear codes.
Stefka Bouyuklieva, Iliya Bouyukliev
doaj +1 more source
Code multiplexing using linear block codes [PDF]
This paper explores the application of code multiplexing using linear block codes in communication systems. Through a comprehensive analysis of contemporary literature on switching methods and signal modeling, the study investigates the principles of ...
Rabin Alexey +2 more
doaj +1 more source
Self-Orthogonal Codes Constructed from Posets and Their Applications in Quantum Communication
It is an important issue to search for self-orthogonal codes for construction of quantum codes by CSS construction (Calderbank-Sho-Steane codes); in quantum error correction, CSS codes are a special type of stabilizer codes constructed from classical ...
Yansheng Wu, Yoonjin Lee
doaj +1 more source
Random linear codes in steganography [PDF]
Syndrome coding using linear codes is a technique that allows improvement in the steganographic algorithms parameters. The use of random linear codes gives a great flexibility in choosing the parameters of the linear code.
Kamil Kaczyński
doaj +1 more source
Rank equivalent and rank degenerate skew cyclic codes
Two skew cyclic codes can be equivalent for the Hamming metric only if they have the same length, and only the zero code is degenerate. The situation is completely different for the rank metric, where lengths of codes correspond to the number of outgoing
Martínez-Peñas, Umberto
core +1 more source

