Coding Theory
4,289 Followers
Recent papers in Coding Theory
Il coding nell’interdisciplinarietà tra le discipline umanistiche e le STEM: il progetto Il progetto si pone come percorso interdisciplinare, mirato a potenziare le competenze umanistico – linguistiche delle studentesse del primo ciclo... more
In this work, we proposed a new approach called integer sub-decomposition (ISD) based on the GLV idea to compute any multiple kP of a point P of order n lying on an elliptic curve E. This approach uses two fast endomorphisms ψ 1 and ψ 2... more
The increasing opening of French freemasonry to lower social classes raises the question of how individuals from different social backgrounds can be assimilated into the practice of context‐independent ways of speaking and writing. I... more
3rd International Conference on Signal Processing and Machine Learning (SIGML 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Signal Processing and... more
Mathematical Proof/ Data-Correlation
Scope & Topics 10 th International Conference on Information Theory (IT 2021) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Information Theory. The goal of this... more
This paper aims to answer two questions. The first is how screen captures in software manuals should be used to support learning. Four functions of screen captures in software manuals are presented. Three studies report the influence of... more
Words and pictures were studied, and recognition tests were given in which each studied object was to be recognized in both word and picture format. The main dependent variable was the latency of the recognition decision. The purpose was... more
To date, a number of researchers are seeking for and/or designing novel molecules which function as arithmetic molecular engines. Biomolecules such as deoxyribonucleic acid (DNA) and proteins are examples of promising candidate molecules.... more
In our article we will focus on the analytic possibilities offered by a particular CAQDAS (Computer Assisted Qualitative Data Analysis Software) tool - MAXQDA 10 - in securityrelated research. First, we will present a brief overview of... more
Random bipartite graphs, random lifts of bipartite protographs, and random cyclic lifts of bipartite protographs are used to represent random low-density parity-check (LDPC) codes, randomly constructed protograph-based LDPC codes, and... more
The McEliece and the Niederreiter public key cryptosystems (PKC) are supposed secure in a post quantum world (4) because there is no ecient quantum algorithm for the underlying problems upon which these cryptosystems are built. The CFS,... more
In this study, we consider linear and especially cyclic codes over the non-chain ring $Z_p[v]/<v^p − v>$ where $p$ is a prime. This is a generalization of the case $p = 3.$ Further, in this work the structure of constacyclic codes are... more
REVIEW OF THE 1.SYMPOSIUM: VIRTUAL SPACE-CONTEMPORARY SPACE
Zagreb, Croatia, 4 December, 2016.
Autor of symposium
doctor of arts Robert Kuhar, professor
Zagreb, Croatia, 4 December, 2016.
Autor of symposium
doctor of arts Robert Kuhar, professor
This chapter review presents two ideas and techniques in solving Systems of Linear Equations in the most simple minded straightforward manner to enable the student as well as the instructor to follow it independently with very little... more