Results 41 to 50 of about 1,005,908 (254)
Optimal Locally Repairable Linear Codes [PDF]
Linear erasure codes with local repairability are desirable for distributed data storage systems. An [n, k, d] code having all-symbol (r, \delta})-locality, denoted as (r, {\delta})a, is considered optimal if it also meets the minimum Hamming distance ...
Dau, Son Hoang +3 more
core
Punctured Low-Bias Codes Behave Like Random Linear Codes
Punctured low-bias codes behave like random linear codes, Discrete Analysis 2024:4, 37 pp. A binary _error-correcting code_, often referred to simply as a code, is a subset $A$ of $\{0,1\}^n$ with the property that any two distinct elements of $A$ are ...
Venkatesan Guruswami, Jonathan Mosheiff
doaj +1 more source
ABSTRACT Background Chronic kidney disease is a growing public health problem worldwide, and the number of patients requiring renal replacement therapy is steadily increasing. Türkiye has experienced a similar rise in both the incidence and prevalence of renal replacement therapy over the past decades; however, national‐level projections of future ...
Arzu Akgül +2 more
wiley +1 more source
An intracellular transporter mitigates the CO2‐induced decline in iron content in Arabidopsis shoots
This study identifies a gene encoding a transmembrane protein, MIC, which contributes to the reduction of shoot Fe content observed in plants under elevated CO2. MIC is a putative Fe transporter localized to the Golgi and endosomal compartments. Its post‐translational regulation in roots may represent a potential target for improving plant nutrition ...
Timothy Mozzanino +7 more
wiley +1 more source
Binary Cyclic Codes from Explicit Polynomials over $\gf(2^m)$
Cyclic codes are a subclass of linear codes and have applications in consumer electronics, data storage systems, and communication systems as they have efficient encoding and decoding algorithms. In this paper, monomials and trinomials over finite fields
Ding, Cunsheng, Zhou, Zhengchun
core +2 more sources
Secure and Compact: A New Variant of McEliece Cryptosystem
This paper introduces a variant of the McEliece cryptosystem and employs the $(C_{1}, C_{1} + C_{2})$ -construction to generate a new code from two arbitrary linear codes. We propose an efficient hard-decision decoding algorithm for linear codes derived
Ekta Bindal, Abhay Kumar Singh
doaj +1 more source
A Multisecret-Sharing Scheme Based on LCD Codes
Secret sharing is one of the most important cryptographic protocols. Secret sharing schemes (SSS) have been created to that end. This protocol requires a dealer and several participants.
Adel Alahmadi +5 more
doaj +1 more source
Molecular bases of circadian magnesium rhythms across eukaryotes
Circadian rhythms in intracellular [Mg2+] exist across eukaryotic kingdoms. Central roles for Mg2+ in metabolism suggest that Mg2+ rhythms could regulate daily cellular energy and metabolism. In this Perspective paper, we propose that ancestral prokaryotic transport proteins could be responsible for mediating Mg2+ rhythms and posit a feedback model ...
Helen K. Feord, Gerben van Ooijen
wiley +1 more source
Fuzzy linear codes based on nested linear codes
In this paper, we describe a correspondence between a fuzzy linear code and a family of nested linear codes. We also describe the arithmetic of fuzzy linear codes. As a special class of nested linear codes, we consider a family of nested self-orthogonal codes.
openaire +3 more sources
Linear Codes over $\mathbb{Z}_{p}\mathcal{R}_{1} \mathcal{R}_{2}$ and their Applications
In the paper, we explore the simplex and MacDonald codes over the finite ring $\mathbb{Z}_{p}\mathcal{R}_{1} \mathcal{R}_{2}$. Our investigation focuses on the unique properties of these codes, with the particular attention to their weight distributions ...
K. Chatouh
doaj +1 more source

