Results 41 to 50 of about 1,011,482 (281)

Linear transformations on codes

open access: yesDiscrete Mathematics, 2006
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
David G. Glynn   +2 more
openaire   +2 more sources

PM1 steganographic algorithm using ternary Hamming Code [PDF]

open access: yesBiuletyn Wojskowej Akademii Technicznej, 2015
PM1 algorithm is a modification of well-known LSB steganographic algorithm. It has increased resistance to selected steganalytic attacks and increased embedding efficiency.
Kamil Kaczyński
doaj   +1 more source

On MDS Negacyclic LCD Codes

open access: yes, 2018
Linear codes with complementary duals (LCD) have a great deal of significance amongst linear codes. Maximum distance separable (MDS) codes are also an important class of linear codes since they achieve the greatest error correcting and detecting ...
Koroglu, Mehmet E., Sarı, Mustafa
core   +1 more source

Linear Repairing Codes and Side-Channel Attacks

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
To strengthen the resistance of countermeasures based on secret sharing,several works have suggested to use the scheme introduced by Shamir in 1978, which proposes to use the evaluation of a random d-degree polynomial into n ≥ d + 1 public points to ...
Hervé Chabanne   +2 more
doaj   +1 more source

Preferences of Pediatric Patients and Their Caregivers for Chemotherapy‐Induced Nausea and Vomiting Control Endpoints: A Mixed Methods Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Although not always achieved, complete chemotherapy‐induced nausea and vomiting (CINV) control is the conventional goal of CINV prophylaxis. In this two‐center, mixed‐methods study, we sought to understand the preferences of adolescent patients and family caregivers for CINV control endpoints.
Haley Newman   +8 more
wiley   +1 more source

Secure and Compact: A New Variant of McEliece Cryptosystem

open access: yesIEEE Access
This paper introduces a variant of the McEliece cryptosystem and employs the $(C_{1}, C_{1} + C_{2})$ -construction to generate a new code from two arbitrary linear codes. We propose an efficient hard-decision decoding algorithm for linear codes derived
Ekta Bindal, Abhay Kumar Singh
doaj   +1 more source

Optimal Locally Repairable Linear Codes [PDF]

open access: yes, 2013
Linear erasure codes with local repairability are desirable for distributed data storage systems. An [n, k, d] code having all-symbol (r, \delta})-locality, denoted as (r, {\delta})a, is considered optimal if it also meets the minimum Hamming distance ...
Dau, Son Hoang   +3 more
core  

Additive Codes From Linear Codes

open access: yesIEEE Transactions on Information Theory
We introduce two constructions of additive codes over finite fields. Both constructions start with a linear code over a field with $q$ elements and give additive codes over the field with $q^h$ elements whose minimum distance is demonstrably good.
Simeon Ball, Tabriz Popatia
openaire   +2 more sources

Inpatient Food Insecurity and Pediatric Hematology Oncology Hospitalization Outcomes

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Children with cancer and blood disorders are at risk for food insecurity (FI). We aimed to describe the association of inpatient food insecurity (IFI) and hospitalization outcomes among patients admitted to the pediatric hematology oncology service. Of 325 caregivers screened for IFI, 60 (18.6%) screened positive.
Joanna M. Robles   +4 more
wiley   +1 more source

Linear Codes over $\mathbb{Z}_{p}\mathcal{R}_{1} \mathcal{R}_{2}$ and their Applications

open access: yesМатематичні Студії
In the paper, we explore the simplex and MacDonald codes over the finite ring $\mathbb{Z}_{p}\mathcal{R}_{1} \mathcal{R}_{2}$. Our investigation focuses on the unique properties of these codes, with the particular attention to their weight distributions ...
K. Chatouh
doaj   +1 more source

Home - About - Disclaimer - Privacy