Results 31 to 40 of about 764,565 (289)

On double cyclic codes over $ \mathbb{Z}_2+u\mathbb{Z}_2 $

open access: yesAIMS Mathematics
In this paper, we introduced double cyclic codes over $ R^r\times R^s $, where $ R = \mathbb{Z}_{2}+u\mathbb{Z}_{2} = \{0, 1, u, 1+u\} $ is the ring with four elements and $ u^2 = 0 $.
Ismail Aydogdu
doaj   +1 more source

Patient‐Level Barriers and Facilitators to Inpatient Physical Therapy in Adolescents and Young Adults With a Hematological Malignancy: A Qualitative Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Despite their increased risk for functional impairment resulting from cancer and its treatments, few adolescents and young adults (AYAs) with a hematological malignancy receive the recommended or therapeutic dose of exercise per week during inpatient hospitalizations.
Jennifer A. Kelleher   +8 more
wiley   +1 more source

Optimal GQPC Codes over the Finite Field Fq

open access: yesMathematics
This paper presents the algebraic structure of generalized quasi-polycyclic (GQPC) codes, which is a generalization of the right quasi-polycyclic (QPC) and generalized quasi-cyclic (GQC) codes over a finite field Fq.
Kundan Suxena   +3 more
doaj   +1 more source

On authentication codes based on orthogonal tables

open access: yesVestnik Samarskogo Gosudarstvennogo Tehničeskogo Universiteta. Seriâ: Fiziko-Matematičeskie Nauki, 2014
The authentication codes resistant to messages imitation and substitution are investigated. The case when the probabilities of imitation and substitution reach the lower limits has been highlighted. Such authentication codes are called optimal.
Sergey M Ratseev, Olga I Cherevatenko
doaj   +1 more source

An Embedding Strategy Using Q-Ary Convolutional Codes for Large and Small Payloads

open access: yesMathematics, 2021
Matrix embedding (ME) code is a commonly used steganography technique, which uses linear block codes to improve embedding efficiency. However, its main disadvantage is the inability to perform maximum likelihood decoding due to the high complexity of ...
Jyun-Jie Wang   +4 more
doaj   +1 more source

Optimal Linear and Cyclic Locally Repairable Codes over Small Fields

open access: yes, 2015
We consider locally repairable codes over small fields and propose constructions of optimal cyclic and linear codes in terms of the dimension for a given distance and length.
Yaakobi, Eitan, Zeh, Alexander
core   +1 more source

Sparse Regression Codes for Multi-terminal Source and Channel Coding [PDF]

open access: yes, 2012
We study a new class of codes for Gaussian multi-terminal source and channel coding. These codes are designed using the statistical framework of high-dimensional linear regression and are called Sparse Superposition or Sparse Regression codes.
Tatikonda, Sekhar, Venkataramanan, Ramji
core   +1 more source

Developmental Disorders in Children Recently Diagnosed With Cancer

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Neurocognitive deficits in adult survivors of childhood cancer are well established, but less is known about developmental disorders (DD) arising shortly after cancer diagnosis. Using 2016–2019 linked Ohio cancer registry and Medicaid data, we compared DD among 324 children with cancer and 606,913 cancer‐free controls.
Jamie Shoag   +5 more
wiley   +1 more source

Optimal Ferrers Diagram Rank-Metric Codes [PDF]

open access: yes, 2014
Optimal rank-metric codes in Ferrers diagrams are considered. Such codes consist of matrices having zeros at certain fixed positions and can be used to construct good codes in the projective space.
Etzion, Tuvi, Wachter-Zeh, Antonia
core  

Optimal Networks from Error Correcting Codes

open access: yes, 2013
To address growth challenges facing large Data Centers and supercomputing clusters a new construction is presented for scalable, high throughput, low latency networks.
Tomic, Ratko V.
core   +1 more source

Home - About - Disclaimer - Privacy