Journal articles on the topic 'Algebraic Coding Theory'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Algebraic Coding Theory.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
SAKATA, Shojiro. "Algebraic Coding Theory." IEICE ESS Fundamentals Review 1, no. 3 (2008): 3_44–3_57. http://dx.doi.org/10.1587/essfr.1.3_44.
Full textMATSUI, Hajime. "Algebraic Methods in Coding Theory." IEICE ESS Fundamentals Review 8, no. 3 (2015): 151–61. http://dx.doi.org/10.1587/essfr.8.151.
Full textWood, Jay A. "Spinor groups and algebraic coding theory." Journal of Combinatorial Theory, Series A 51, no. 2 (July 1989): 277–313. http://dx.doi.org/10.1016/0097-3165(89)90053-8.
Full textCampillo, Antonio, Patrick Fitzpatrick, Edgar Martínez-Moro, and Ruud Pellikaan. "Special issue algebraic coding theory and applications." Journal of Symbolic Computation 45, no. 7 (July 2010): 721–22. http://dx.doi.org/10.1016/j.jsc.2010.03.006.
Full textHirschfeld, J. W. P. "INTRODUCTION TO CODING THEORY AND ALGEBRAIC GEOMETRY." Bulletin of the London Mathematical Society 23, no. 5 (September 1991): 498–500. http://dx.doi.org/10.1112/blms/23.5.498.
Full textYang, Guomin, Chik How Tan, Yi Mu, Willy Susilo, and Duncan S. Wong. "Identity based identification from algebraic coding theory." Theoretical Computer Science 520 (February 2014): 51–61. http://dx.doi.org/10.1016/j.tcs.2013.09.008.
Full textNagaraj, S. V. "Review of Algebraic Coding Theory Revised Edition by Elwyn Berlekamp." ACM SIGACT News 48, no. 1 (March 10, 2017): 23–26. http://dx.doi.org/10.1145/3061640.3061645.
Full textAstola, Jaakko. "Digital signal processing, applications to communications and algebraic coding theory." Signal Processing 23, no. 2 (May 1991): 215–16. http://dx.doi.org/10.1016/0165-1684(91)90076-u.
Full textChen, Fuxing, Hui Li, Xuesong Tan, and Shuo-Yen Robert Li. "Multicast Switching Fabric Based on Network Coding and Algebraic Switching Theory." IEEE Transactions on Communications 64, no. 7 (July 2016): 2999–3010. http://dx.doi.org/10.1109/tcomm.2016.2577679.
Full textCouvreur, Alain. "Sums of residues on algebraic surfaces and application to coding theory." Journal of Pure and Applied Algebra 213, no. 12 (December 2009): 2201–23. http://dx.doi.org/10.1016/j.jpaa.2009.03.009.
Full textHeß, Florian. "Harald Niederreiter and Chaoping Xing: “Algebraic Geometry in Coding Theory and Cryptography”." Jahresbericht der Deutschen Mathematiker-Vereinigung 113, no. 2 (May 3, 2011): 117–19. http://dx.doi.org/10.1365/s13291-011-0019-6.
Full textNguemo, Miradain Atontsa, and Calvin Tcheka. "Sheaf cohomology on network codings: maxflow-mincut theorem." Applied General Topology 18, no. 2 (October 2, 2017): 219. http://dx.doi.org/10.4995/agt.2017.3371.
Full textYuanxing, Li, Cheng Jian, and Wang Xinmei. "A joint signature encryption and error correction public-key cryptosystem based on algebraic coding theory." Journal of Electronics (China) 9, no. 1 (January 1992): 33–39. http://dx.doi.org/10.1007/bf02778590.
Full textLiu, Ce Lun, Kai Zhang, Sen Quan Fan, and Yan Dong Huang. "Research on Synchronous Parallel Coding Algorithm of Medium Length BCH and FPGA Implementation." Advanced Materials Research 846-847 (November 2013): 1084–87. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1084.
Full textHE, MATTHEW, and SERGEY PETOUKHOV. "THE GENETIC CODE, HADAMARD MATRICES AND ALGEBRAIC BIOLOGY." Journal of Biological Systems 18, spec01 (October 2010): 159–75. http://dx.doi.org/10.1142/s0218339010003688.
Full textMuhiuddin, G., D. Al-Kadi, W. A. Khan, and C. Jana. "Hybrid Structures Applied to Subalgebras of BCH-Algebras." Security and Communication Networks 2021 (July 16, 2021): 1–8. http://dx.doi.org/10.1155/2021/8960437.
Full textLI, ZHE, SHUGONG ZHANG, and TIAN DONG. "FINITE SETS OF AFFINE POINTS WITH UNIQUE ASSOCIATED MONOMIAL ORDER QUOTIENT BASES." Journal of Algebra and Its Applications 11, no. 02 (April 2012): 1250025. http://dx.doi.org/10.1142/s021949881100549x.
Full textReyes, Alex D. "Mathematical framework for place coding in the auditory system." PLOS Computational Biology 17, no. 8 (August 2, 2021): e1009251. http://dx.doi.org/10.1371/journal.pcbi.1009251.
Full textFujita, Hachiro. "Quantum McEliece public-key cryptosystem." Quantum Information and Computation 12, no. 3&4 (March 2012): 181–203. http://dx.doi.org/10.26421/qic12.3-4-1.
Full textSemerenko, Vasyl, and Oleksandr Voinalovich. "The simplification of computationals in error correction coding." Technology audit and production reserves 3, no. 2(59) (June 30, 2021): 24–28. http://dx.doi.org/10.15587/2706-5448.2021.233656.
Full textArora, Sanjeev, Yuanzhi Li, Yingyu Liang, Tengyu Ma, and Andrej Risteski. "Linear Algebraic Structure of Word Senses, with Applications to Polysemy." Transactions of the Association for Computational Linguistics 6 (December 2018): 483–95. http://dx.doi.org/10.1162/tacl_a_00034.
Full textKöck, Bernhard, and Joseph Tait. "Faithfulness of Actions on Riemann-Roch Spaces." Canadian Journal of Mathematics 67, no. 4 (August 1, 2015): 848–69. http://dx.doi.org/10.4153/cjm-2014-015-2.
Full textÇalışkan, Basri, and Kemal Balıkçı. "Counting Z2 Z4 Z8-additive Codes." European Journal of Pure and Applied Mathematics 12, no. 2 (April 29, 2019): 668–79. http://dx.doi.org/10.29020/nybg.ejpam.v12i2.3419.
Full textLiu, Qian, and Yujuan Sun. "Several classes of permutation trinomials from Niho exponents over finite fields of characteristic 3." Journal of Algebra and Its Applications 18, no. 04 (March 25, 2019): 1950069. http://dx.doi.org/10.1142/s0219498819500695.
Full textGünlü, Onur, and Rafael Schaefer. "An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions." Entropy 23, no. 1 (December 24, 2020): 16. http://dx.doi.org/10.3390/e23010016.
Full textDömösi, Pál, Carolin Hannusch, and Géza Horváth. "A Cryptographic System Based on a New Class of Binary Error-Correcting Codes." Tatra Mountains Mathematical Publications 73, no. 1 (August 1, 2019): 83–96. http://dx.doi.org/10.2478/tmmp-2019-0007.
Full textSIRA-RAMÍREZ, HEBERTT, and MICHEL FLIESS. "AN ALGEBRAIC STATE ESTIMATION APPROACH FOR THE RECOVERY OF CHAOTICALLY ENCRYPTED MESSAGES." International Journal of Bifurcation and Chaos 16, no. 02 (February 2006): 295–309. http://dx.doi.org/10.1142/s0218127406014812.
Full textHOSSEINI, A., and A. RAHNAMAI BARGHI. "TABLE ALGEBRAS OF RANK 3 AND ITS APPLICATIONS TO STRONGLY REGULAR GRAPHS." Journal of Algebra and Its Applications 12, no. 05 (May 7, 2013): 1250216. http://dx.doi.org/10.1142/s0219498812502167.
Full textRiznyk, V. V. "FORMALIZATION CODING METHODS OF INFORMATION UNDER TOROIDAL COORDINATE SYSTEMS." Radio Electronics, Computer Science, Control, no. 2 (July 7, 2021): 144–53. http://dx.doi.org/10.15588/1607-3274-2021-2-15.
Full textMuhiuddin, G., and Abdulaziz M. Alanazi. "(m, n)-Ideals in Semigroups Based on Int-Soft Sets." Journal of Mathematics 2021 (July 7, 2021): 1–10. http://dx.doi.org/10.1155/2021/5546596.
Full textNadal, Jean-Pierre, and Nestor Parga. "Redundancy Reduction and Independent Component Analysis: Conditions on Cumulants and Adaptive Approaches." Neural Computation 9, no. 7 (October 1, 1997): 1421–56. http://dx.doi.org/10.1162/neco.1997.9.7.1421.
Full textBarbay, Jérémy. "Optimal Prefix Free Codes with Partial Sorting." Algorithms 13, no. 1 (December 31, 2019): 12. http://dx.doi.org/10.3390/a13010012.
Full textLipnitskij, V. A., and A. V. Serada. "PROPERTIES OF GROUPS G OF DOUBLE ERRORS AND ITS INVARIANTS IN BCH CODES." «System analysis and applied information science», no. 2 (August 7, 2018): 40–46. http://dx.doi.org/10.21122/2309-4923-2018-2-40-46.
Full textKang, Kyung Tae, Seok-Zun Song, and Young Bae Jun. "Multipolar Intuitionistic Fuzzy Set with Finite Degree and Its Application in BCK/BCI-Algebras." Mathematics 8, no. 2 (February 2, 2020): 177. http://dx.doi.org/10.3390/math8020177.
Full textRiznyk, V. V., and D. Yu Skrybaylo-Leskiv. "IMPROVEMENT OF CYCLIC CODES EFFECTIVENESS BY COMBINATORIAL OPTIMIZATION METHODS." Ukrainian Journal of Information Technology 2, no. 1 (2020): 66–72. http://dx.doi.org/10.23939/ujit2020.02.066.
Full textMartins Rodrigues, P., and J. Sousa Ramos. "Symbolic Representations and ${\mathbb T}^n$ Automorphisms." International Journal of Bifurcation and Chaos 13, no. 07 (July 2003): 2005–10. http://dx.doi.org/10.1142/s0218127403007849.
Full textRaigorodskii, A. M. "Combinatorial Geometry and Coding Theory*." Fundamenta Informaticae 145, no. 3 (August 19, 2016): 359–69. http://dx.doi.org/10.3233/fi-2016-1365.
Full textWADA, MASAAKI. "CODING LINK DIAGRAMS." Journal of Knot Theory and Its Ramifications 02, no. 02 (June 1993): 233–37. http://dx.doi.org/10.1142/s0218216593000143.
Full textBouyukliev, Iliya, Stanislav Bulygin, and Edgar Martínez-Moro. "Foreword: computer algebra in coding theory and cryptography." Applicable Algebra in Engineering, Communication and Computing 24, no. 3-4 (June 20, 2013): 157–58. http://dx.doi.org/10.1007/s00200-013-0199-7.
Full textLaigle-Chapuy, Yann. "Permutation polynomials and applications to coding theory." Finite Fields and Their Applications 13, no. 1 (January 2007): 58–70. http://dx.doi.org/10.1016/j.ffa.2005.08.003.
Full textXing, Chaoping. "Special issue on algebra and coding theory." Finite Fields and Their Applications 12, no. 4 (November 2006): 493. http://dx.doi.org/10.1016/j.ffa.2006.09.002.
Full textMoreno, Carlos J., and Oscar Moreno. "An improved Bombieri-Weil bound and applications to coding theory." Journal of Number Theory 42, no. 1 (September 1992): 32–46. http://dx.doi.org/10.1016/0022-314x(92)90106-y.
Full textDing, Cunsheng, and Chaoping Xing. "Special issue on cryptography and coding theory." Journal of Complexity 20, no. 2-3 (April 2004): 133. http://dx.doi.org/10.1016/j.jco.2003.12.002.
Full textFlaut, Cristina. "Some application of difference equations in Cryptography and Coding Theory." Journal of Difference Equations and Applications 25, no. 7 (May 21, 2019): 905–20. http://dx.doi.org/10.1080/10236198.2019.1619713.
Full textPuchinger, Sven, and Antonia Wachter-Zeh. "Fast operations on linearized polynomials and their applications in coding theory." Journal of Symbolic Computation 89 (November 2018): 194–215. http://dx.doi.org/10.1016/j.jsc.2017.11.012.
Full textBoucher, Delphine, and Felix Ulmer. "Coding with skew polynomial rings." Journal of Symbolic Computation 44, no. 12 (December 2009): 1644–56. http://dx.doi.org/10.1016/j.jsc.2007.11.008.
Full textKENDZIORRA, ANDREAS, and STEFAN E. SCHMIDT. "NETWORK CODING WITH MODULAR LATTICES." Journal of Algebra and Its Applications 10, no. 06 (December 2011): 1319–42. http://dx.doi.org/10.1142/s0219498811005208.
Full textTzanakis, Nikos, and John Wolfskill. "The diophantine equation x2 = 4qa2 + 4q + 1, with an application to coding theory." Journal of Number Theory 26, no. 1 (May 1987): 96–116. http://dx.doi.org/10.1016/0022-314x(87)90099-0.
Full textQuistorff, Jörn. "Fundamentals of coding type problems." Journal of Discrete Mathematical Sciences and Cryptography 10, no. 1 (February 2007): 9–39. http://dx.doi.org/10.1080/09720529.2007.10698106.
Full textPumplün, Susanne. "Quotients of orders in algebras obtained from skew polynomials with applications to coding theory." Communications in Algebra 46, no. 11 (September 19, 2018): 5053–72. http://dx.doi.org/10.1080/00927872.2018.1461882.
Full text