• No results found

Coding Theory

Analysis of Coding Theory Based Models for Initiating Protein Translation in Prokaryotic Organisms

Analysis of Coding Theory Based Models for Initiating Protein Translation in Prokaryotic Organisms

... The results of this work and results from previous work (see Section 2.2) show that we can construct (3, 1, 4) table-based, convolutional code models that: 1) Have decoding gmasks with high similarity to the 3’ end of ...

193

APPLICATION OF FUZZY INFORMATION MEASURE TO CODING THEORY

APPLICATION OF FUZZY INFORMATION MEASURE TO CODING THEORY

... Some other pioneer who extended their results towards the development of coding theory are Korada and Urbanke [15], Szpankowski [28], Merhav [21] etc. Recently, Kapur [14] has established relationships ...

10

Notes on Coding Theory   J I Hall pdf

Notes on Coding Theory J I Hall pdf

... In the late 1940’s Claude Shannon was developing information theory and cod- ing as a mathematical model for communication. At the same time, Richard Hamming, a colleague of Shannon’s at Bell Laboratories, found a ...

204

Coding theory and hyper BCK-algebras

Coding theory and hyper BCK-algebras

... The main purpose of this paper is to study coding theory in the context of hyper BCK-algebras. This work is organized as follows: In section 2, we present some basic notions about hyper BCK-algebraic that ...

12

A  Provably  Secure  Short  Signature  Scheme  from  Coding  Theory

A Provably Secure Short Signature Scheme from Coding Theory

... Abstract—Signatures with partially message recovery in which some parts of messages are not transmitted with signatures to make them shorter are useful where bandwidth is one of the crucial concern and especially in case ...

9

Quotients of orders in algebras obtained from skew polynomials with applications to coding theory

Quotients of orders in algebras obtained from skew polynomials with applications to coding theory

... We do not strive for completeness and refrain from investigating all possible cases of nonassociative finite rings which can be obtained as quotients of natural orders. It is clear how to proceed after seeing the ...

22

Modeling  Soft  Analytical  Side-Channel  Attacks  from  a  Coding  Theory  Viewpoint

Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint

... Abstract. One important open question in side-channel analysis is to find out whether all the leakage samples in an implementation can be exploited by an adversary, as suggested by masking security proofs. For attacks ...

30

Coding theory on (h(x); g(y)) extension of Fibonacci p numbers polynomials

Coding theory on (h(x); g(y)) extension of Fibonacci p numbers polynomials

... (> 0), g(y) (> 0) coincide with the relations among the code matrix for all values of p and h(x) = m(> 0) and g(y) = t(> 0) [8]. Also, the relations among the code matrix elements for h(x) = 1 and g(y) = 1, ...

5

Algebraic Techniques in Coding Theory: Entropy Vectors, Frames, and Constrained Coding

Algebraic Techniques in Coding Theory: Entropy Vectors, Frames, and Constrained Coding

... action theory and representation theory to construct various codes with coveted properties, thereby giving us some algebraic structural insight into the problems at ...

155

Network source coding: theory and code design for broadcast and multiple access networks

Network source coding: theory and code design for broadcast and multiple access networks

... where several transmitters cooperation among the transmitters is not In this chapter, I present the properties of instantaneous and uniquely decodable multiple access source codes and ge[r] ...

151

Distributed Source Coding Theory, Algorithms and Applications tqw  darksiderg pdf

Distributed Source Coding Theory, Algorithms and Applications tqw darksiderg pdf

... video coding: A single video stream is encoded, frame by frame, and the encoder treats past and future frames as side information when encoding the current ...

340

Pseduo-Inequality Application in Coding Theory using $\delta$–Norm Inaccuracy Measure

Pseduo-Inequality Application in Coding Theory using $\delta$–Norm Inaccuracy Measure

... Abstract. In this paper we prove two pseudo-generalizations of Shannon inequality for the case of norm Inaccuracy Measure and norm entropy. Further, we establish a result on noiseless coding theorem for the ...

10

Adapting Nonverbal Coding Theory to Mobile Mediated Communication: An Analysis of Emoji and Other Digital Nonverbals

Adapting Nonverbal Coding Theory to Mobile Mediated Communication: An Analysis of Emoji and Other Digital Nonverbals

... Keywords: communication, nonverbal communication, nonverbal coding, kinesics, vocalics, chronemics, emoji, digital, mobile-mediated communication (MMC), texting, computer-mediated comm[r] ...

110

A coding theory foundation for the analysis of general unconditionally secure proof of retrievability schemes for cloud storage

A coding theory foundation for the analysis of general unconditionally secure proof of retrievability schemes for cloud storage

... order of underlying finite field message message block message space length of a message encoded message encoded message space length of an encoded message distance of the encoded messag[r] ...

27

Network Coding Theory   Raymond Yeung pdf

Network Coding Theory Raymond Yeung pdf

... network coding problem. Unlike single- source network coding which already has explicit algebraic code con- structions, the current understanding of multi-source network coding is quite far from ...

155

Coding Theory   John C  Bowman pdf

Coding Theory John C Bowman pdf

... The theory of error-correcting codes originated with Claude Shannon’s famous 1948 paper “A Mathematical Theory of Communication” and has grown to connect to many areas of mathematics, including algebra and ...

71

On Boolean functions, symmetric cryptography and algebraic coding theory

On Boolean functions, symmetric cryptography and algebraic coding theory

... In the first part we study a particular type of trapdoors, which can be embedded in a block cipher. Block ciphers combine simple operations to construct a complex encryption transformation. This tradition has its roots ...

147

ALGEBRAIC CODING THEORY IN THE QUEST FOR EFFICIENT DIGITAL INDIA

ALGEBRAIC CODING THEORY IN THE QUEST FOR EFFICIENT DIGITAL INDIA

... The objective of this paper is to demonstrate the application of Algebraic Coding towards achievement of “Efficiency” of this huge Central Government Initiative.Digital India is a Government of India initiative ...

9

Show all 10000 documents...

Related subjects