Displaying 21 – 40 of 47

Showing per page

n -T-quasigroup codes with one check symbol and their error detection capabilities

Gary L. Mullen, Viktor Alekseevich Shcherbakov (2004)

Commentationes Mathematicae Universitatis Carolinae

It is well known that there exist some types of the most frequent errors made by human operators during transmission of data which it is possible to detect using a code with one check symbol. We prove that there does not exist an n -T-code that can detect all single, adjacent transposition, jump transposition, twin, jump twin and phonetic errors over an alphabet that contains 0 and 1. Systems that detect all single, adjacent transposition, jump transposition, twin, jump twin errors and almost all...

Nonassociative algebras: some applications.

Santos González, Consuelo Martínez (2003)

Revista Matemática Iberoamericana

Nonassociative algebras can be applied, either directly or using their particular methods, to many other branches of Mathematics and other Sciences. Here emphasis will be given to two concrete applications of nonassociative algebras. In the first one, an application to group theory in the line of the Restricted Burnside Problem will be considered. The second one opens a door to some applications of non-associative algebras to Error correcting Codes and Cryptography.

On codes with finite interpreting delay: a defect theorem

Yannick Guesnet (2010)

RAIRO - Theoretical Informatics and Applications

We introduce two new classes of codes, namely adjacent codes and codes with finite interpreting delay. For each class, we establish an extension of the defect theorem.

On extremal additive 𝔽 4 codes of length 10 to 18

Christine Bachoc, Philippe Gaborit (2000)

Journal de théorie des nombres de Bordeaux

In this paper we consider the extremal even self-dual 𝔽 4 -additive codes. We give a complete classification for length 10 . Under the hypothesis that at least two minimal words have the same support, we classify the codes of length 14 and we show that in length 18 such a code is equivalent to the unique 𝔽 4 -hermitian code with parameters [18,9,8]. We construct with the help of them some extremal 3 -modular lattices.

On Multiple Deletion Codes

Landjev, Ivan, Haralambiev, Kristiyan (2007)

Serdica Journal of Computing

In 1965 Levenshtein introduced the deletion correcting codes and found an asymptotically optimal family of 1-deletion correcting codes. During the years there has been a little or no research on t-deletion correcting codes for larger values of t. In this paper, we consider the problem of finding the maximal cardinality L2(n;t) of a binary t-deletion correcting code of length n. We construct an infinite family of binary t-deletion correcting codes. By computer search, we construct t-deletion codes...

On the number of zero trace elements in polynomial bases for F2n.

Igor E. Shparlinski (2005)

Revista Matemática Complutense

Let Fq denote the finite field of q elements. O. Ahmadi and A. Menezes have recently considered the question about the possible number of elements with zero trace in polynomial bases of F2n over F2. Here we show that the Weil bound implies that there is such a basis with n + O(log n) zero-trace elements.

Currently displaying 21 – 40 of 47