Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (17)

Search Parameters:
Keywords = maximum distance separable codes

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
19 pages, 329 KB  
Article
Symbol-Pair Distances of a Class of Repeated-Root Constacyclic Codes of Length nps over Fpm and over Fpm+uFpm
by Wei Zhao, Weixian Li and Hui Chen
Axioms 2025, 14(5), 327; https://doi.org/10.3390/axioms14050327 - 24 Apr 2025
Viewed by 434
Abstract
Symbol-pair codes are a class of block codes with symbol-pair metrics designed to protect against pair errors that may occur in high-density data storage systems. Maximum distance separable (MDS) symbol-pair codes are optimal in the sense that they can attain the highest pair-error [...] Read more.
Symbol-pair codes are a class of block codes with symbol-pair metrics designed to protect against pair errors that may occur in high-density data storage systems. Maximum distance separable (MDS) symbol-pair codes are optimal in the sense that they can attain the highest pair-error correctability within the same code length and code size. Constructing MDS symbol-pair codes is one of the main topics in symbol-pair code research. In this paper, we investigate and characterize the symbol-pair distances of constacyclic codes of arbitrary lengths over finite fields and finite chain rings. Using the characterization of the symbol-pair distance, we present three new classes of MDS symbol-pair constacyclic codes that exhibit large minimum distances. Full article
(This article belongs to the Section Algebra and Number Theory)
12 pages, 1233 KB  
Article
Establishment of Real-Time PCR Method to Differentiate Phlebotomus sichuanensis (Diptera, Psychodidae) from P. chinensis s.s. Based on Whole Mitochondrial Genome Analysis
by Haowei Dong, Wenqi Shan, Hao Yuan, Qiuming Zhou, Wenbing Zhong, Maimaitijiang Wumaier, Kang Wang, Anjie Yang, Bing Rui, Hua Shi, Huiying Chen, Xiangyu Li, Yajun Ma and Heng Peng
Life 2024, 14(12), 1610; https://doi.org/10.3390/life14121610 - 5 Dec 2024
Viewed by 980
Abstract
Phlebotomus sichuanensis, considered a potential vector for visceral leishmaniasis (VL), is distributed in the southern Gansu and northern Sichuan regions in China. However, the high similarity in the morphology of P. sichuanensis and P. chinensis s.s. poses unresolved taxonomic challenges. In this [...] Read more.
Phlebotomus sichuanensis, considered a potential vector for visceral leishmaniasis (VL), is distributed in the southern Gansu and northern Sichuan regions in China. However, the high similarity in the morphology of P. sichuanensis and P. chinensis s.s. poses unresolved taxonomic challenges. In this study, phlebotomine sand flies were collected from three locations in the southern Gansu and northern Sichuan regions (SCB group) and three locations that are the dominant distribution areas of P. chinensis s.s. (ZHB group). Their whole mitochondrial genomes were sequenced and analyzed. The differential analysis revealed that there were 339 fixed differential sites in the mitochondrial genome-coding region of P. chinensis s.s. and P. sichuanensis, among which the COI gene had the most differential sites (57), followed by ND5 (46), ND4 (38), and CYTB (37), while ATP8 had the least differential sites (4). The molecular genetic p-distance was calculated based on 13 protein-coding regions, and the genetic distance ranged from 0.001 to 0.018 in the ZHB group and from 0.001 to 0.006 in the SCB group, while the interspecies molecular genetic distance was 0.464–0.466 between the two groups. A phylogenetic maximum likelihood tree was constructed from 16 samples via tandem sequence of 13 protein-coding regions, and the topology showed that the ZHB and SCB groups formed separate clusters. A real-time PCR method was established based on the differences in the COI fragment, which can identify P. sichuanensis from P. chinensis s.s. effectively. This study presents objective evidence of the genetic differentiation between P. sichuanensis and P. chinensis s.s., and provides a method for identifying these two morphologically highly similar VL-transmitting sandflies. Full article
(This article belongs to the Special Issue Evolutionary and Conservation Genetics: 3rd Edition)
Show Figures

Figure 1

11 pages, 234 KB  
Article
Decoding of MDP Convolutional Codes over the Erasure Channel under Linear Systems Point of View
by Maria Isabel García-Planas and Laurence E. Um
Mathematics 2024, 12(14), 2159; https://doi.org/10.3390/math12142159 - 10 Jul 2024
Viewed by 859
Abstract
This paper attempts to highlight the decoding capabilities of MDP convolutional codes over the erasure channel by defining them as discrete linear dynamical systems, with which the controllability property and the observability characteristics of linear system theory can be applied, in particular those [...] Read more.
This paper attempts to highlight the decoding capabilities of MDP convolutional codes over the erasure channel by defining them as discrete linear dynamical systems, with which the controllability property and the observability characteristics of linear system theory can be applied, in particular those of output observability, easily described using matrix language. Those are viewed against the decoding capabilities of MDS block codes over the same channel. Not only is the time complexity better but the decoding capabilities are also increased with this approach because convolutional codes are more flexible in handling variable-length data streams than block codes, where they are fixed-length and less adaptable to varying data lengths without padding or other adjustments. Full article
(This article belongs to the Special Issue Algebraic Coding and Control Theory)
33 pages, 16165 KB  
Article
Quantitative Assessment of Bed-Separation Dynamic Development Caused by Inclined Coal Seam Longwall Mining
by Yaxing Li, Keming Yang, Xiangping Wei, Wei Tang and Kegui Jiang
Mathematics 2024, 12(13), 1960; https://doi.org/10.3390/math12131960 - 24 Jun 2024
Viewed by 943
Abstract
Coal mining under the Quaternary thick loose layer affects key strata breakage, Bed-separations development, ground subsidence, and other studies. This paper presents a method for solving the deflection of a large-deflection inclined thin plate under a thick loose-layer cover with additional lateral loads [...] Read more.
Coal mining under the Quaternary thick loose layer affects key strata breakage, Bed-separations development, ground subsidence, and other studies. This paper presents a method for solving the deflection of a large-deflection inclined thin plate under a thick loose-layer cover with additional lateral loads and midplane forces. The methods presented are based on the principle of large-deflection of thin-plate, energy method, and fracture mechanics theory. The 7225 work face in Anhui Province, China, was studied. Combined with the large-deflection inclined thin plate model, the initial breakage distance within the main roof plate was calculated to be 33 m with the initial breakage angle of 61.2°, and the period breakage distance was calculated to be 21 m with the period breakage angle of 55.4°. The distribution range of “Vertical Three Zones” from 7225 working face to the ground, including the height of the caved zone is 38.07 m, the height of the fractured zone is 41.13 m, and the height of the curved zone with the thick loose layer removed is 187.56 m. During the dynamic development of the principal key strata (PKS), the deflection value develops from 0 mm to 2714 mm with 7225 working face mining, and the maximum value of the spatial volume is 56,485 m3, which is verified by Three-dimensional Discrete Element Code (3DEC) numerical simulation. The dynamic development of Bed-separation within the overlying strata, with a maximum development height of 545.2 mm and a maximum volume of 11,228.1 m3 of the Bed-separation cavity. The dynamic development of the Bed-separation height and the cavity under different mining length and width conditions of the working face are also discussed. The large-deflection inclined thin plate model proposed in this paper effectively explores the dynamic deflection and fragmentation law of the overlying strata induced by the inclined working face of Longwall mining and provides a theoretical basis and computational model for quantitatively evaluating the dynamic development of the Bed-separation cavity. Full article
Show Figures

Graphical abstract

13 pages, 313 KB  
Article
Skew Constacyclic Codes over a Non-Chain Ring
by Mehmet Emin Köroğlu and Mustafa Sarı
Entropy 2023, 25(3), 525; https://doi.org/10.3390/e25030525 - 17 Mar 2023
Cited by 2 | Viewed by 2267
Abstract
In this paper, we investigate the algebraic structure of the non-local ring Rq=Fq[v]/v2+1 and identify the automorphisms of this ring to study the algebraic structure of the skew constacyclic [...] Read more.
In this paper, we investigate the algebraic structure of the non-local ring Rq=Fq[v]/v2+1 and identify the automorphisms of this ring to study the algebraic structure of the skew constacyclic codes and their duals over this ring. Furthermore, we give a necessary and sufficient condition for the skew constacyclic codes over Rq to be linear complementary dual (LCD). We present some examples of Euclidean LCD codes over Rq and tabulate the parameters of Euclidean LCD codes over finite fields as the Φ-images of these codes over Rq, which are almost maximum distance separable (MDS) and near MDS. Eventually, by making use of Hermitian linear complementary duals of skew constacyclic codes over Rq and the map Φ, we give a class of entanglement-assisted quantum error correcting codes (EAQECCs) with maximal entanglement and tabulate parameters of some EAQECCs with maximal entanglement over finite fields. Full article
(This article belongs to the Special Issue Advances in Information and Coding Theory)
Show Figures

Figure 1

8 pages, 2150 KB  
Communication
CASPER: Covert Channel Using Internal Speakers
by Hyeongjun Choi, Ji Hyuk Jung and Ji Won Yoon
Sensors 2023, 23(6), 2970; https://doi.org/10.3390/s23062970 - 9 Mar 2023
Cited by 2 | Viewed by 3419
Abstract
In recent years, researchers have studied various methods for transferring data in a network-separated environment, and the most representative method is the use of inaudible frequency signals like ultrasonic waves. This method has the advantage of being able to transfer data without other [...] Read more.
In recent years, researchers have studied various methods for transferring data in a network-separated environment, and the most representative method is the use of inaudible frequency signals like ultrasonic waves. This method has the advantage of being able to transfer data without other people noticing, but it has the disadvantage that speakers must exist. In a laboratory or company, external speakers may not be attached to each computer. Therefore, this paper presents a new covert channel attack that transfers data using internal speakers on the computer’s motherboard. The internal speaker can also produce a sound of the desired frequency, and, therefore, data can be transferred using high frequency sounds. We encode data into Morse code or binary code and transfer it. Then we record it using a smartphone. At this time, the location of the smartphone can be any distance within 1.5 m when the length per bit is longer than 50 ms, such as on the computer body or on the desk. Data are obtained by analyzing the recorded file. Our results show that data is transferred from a network-separated computer using an internal speaker with 20 bits/s in maximum. Full article
Show Figures

Figure 1

13 pages, 378 KB  
Article
Three Efficient All-Erasure Decoding Methods for Blaum–Roth Codes
by Weijie Zhou and Hanxu Hou
Entropy 2022, 24(10), 1499; https://doi.org/10.3390/e24101499 - 20 Oct 2022
Cited by 1 | Viewed by 1934
Abstract
Blaum–Roth Codes are binary maximum distance separable (MDS) array codes over the binary quotient ring F2[x]/(Mp(x)), where [...] Read more.
Blaum–Roth Codes are binary maximum distance separable (MDS) array codes over the binary quotient ring F2[x]/(Mp(x)), where Mp(x)=1+x++xp1, and p is a prime number. Two existing all-erasure decoding methods for Blaum–Roth codes are the syndrome-based decoding method and the interpolation-based decoding method. In this paper, we propose a modified syndrome-based decoding method and a modified interpolation-based decoding method that have lower decoding complexity than the syndrome-based decoding method and the interpolation-based decoding method, respectively. Moreover, we present a fast decoding method for Blaum–Roth codes based on the LU decomposition of the Vandermonde matrix that has a lower decoding complexity than the two modified decoding methods for most of the parameters. Full article
(This article belongs to the Special Issue Information Theory and Network Coding II)
9 pages, 278 KB  
Article
More Constructions of Light MDS Transforms Based on Known MDS Circulant Matrices
by Jin-Bo Wang, You Wu and Yu Zhou
Information 2022, 13(7), 347; https://doi.org/10.3390/info13070347 - 18 Jul 2022
Cited by 2 | Viewed by 1887
Abstract
Maximum distance separable (MDS) codes have the maximum branch number in cryptography, and they are generally used in diffusion layers of symmetric ciphers. The diffusion layer of the Advanced Encryption Standard (AES) uses the circulant MDS matrix with the row element of [...] Read more.
Maximum distance separable (MDS) codes have the maximum branch number in cryptography, and they are generally used in diffusion layers of symmetric ciphers. The diffusion layer of the Advanced Encryption Standard (AES) uses the circulant MDS matrix with the row element of {2;3;1;1} in F28. It is the simplest MDS matrix in  F2n4, recorded as A=Circ(2;3;1;1). In this paper, we study the more extensive MDS constructions of A in F2n4. By transforming the element multiplication operation in the finite field into the bit-level operation, we propose a multivariable operation definition based on simple operations, such as cyclic shift, shift, and XOR. We apply this multivariable operation to more lightweight MDS constructions of A and discuss the classification of the MDS clusters. We also give an example of the MDS cluster of A. Without changing the structure, elements, and the implementation cost of the known MDS matrix, the number of existing MDS transformations is expanded to n2/2 times that of its original. The constructions in this paper provide rich component materials for the design of lightweight cryptographic algorithms. Full article
18 pages, 390 KB  
Article
Generalized Concatenated Codes over Gaussian and Eisenstein Integers for Code-Based Cryptography
by Johann-Philipp Thiers and Jürgen Freudenberger
Cryptography 2021, 5(4), 33; https://doi.org/10.3390/cryptography5040033 - 29 Nov 2021
Cited by 7 | Viewed by 3792
Abstract
The code-based McEliece and Niederreiter cryptosystems are promising candidates for post-quantum public-key encryption. Recently, q-ary concatenated codes over Gaussian integers were proposed for the McEliece cryptosystem, together with the one-Mannheim error channel, where the error values are limited to the Mannheim weight one. [...] Read more.
The code-based McEliece and Niederreiter cryptosystems are promising candidates for post-quantum public-key encryption. Recently, q-ary concatenated codes over Gaussian integers were proposed for the McEliece cryptosystem, together with the one-Mannheim error channel, where the error values are limited to the Mannheim weight one. Due to the limited error values, the codes over Gaussian integers achieve a higher error correction capability than maximum distance separable (MDS) codes with bounded minimum distance decoding. This higher error correction capability improves the work factor regarding decoding attacks based on information-set decoding. The codes also enable a low complexity decoding algorithm for decoding beyond the guaranteed error correction capability. In this work, we extend this coding scheme to codes over Eisenstein integers. These codes have advantages for the Niederreiter system. Additionally, we propose an improved code construction based on generalized concatenated codes. These codes extend to the rate region, where the work factor is beneficial compared to MDS codes. Moreover, generalized concatenated codes are more robust against structural attacks than ordinary concatenated codes. Full article
(This article belongs to the Special Issue Public-Key Cryptography in the Post-quantum Era)
Show Figures

Figure 1

32 pages, 406 KB  
Article
On the Existence of XOR-Based Codes for Private Information Retrieval with Private Side Information
by Murali Krishnan K. H. and Jagadeesh Harshan
Entropy 2021, 23(10), 1287; https://doi.org/10.3390/e23101287 - 30 Sep 2021
Cited by 3 | Viewed by 2365
Abstract
We consider the problem of Private Information Retrieval with Private Side Information (PIR-PSI), wherein the privacy of the demand and the side information are jointly preserved. Although the capacity of the PIR-PSI setting is known, we observe that the underlying capacity-achieving code construction [...] Read more.
We consider the problem of Private Information Retrieval with Private Side Information (PIR-PSI), wherein the privacy of the demand and the side information are jointly preserved. Although the capacity of the PIR-PSI setting is known, we observe that the underlying capacity-achieving code construction uses Maximum Distance Separable (MDS) codes therefore contributing to high computational complexity when retrieving the demand. Pointing at this drawback of MDS-based PIR-PSI codes, we propose XOR-based PIR-PSI codes for a simple yet non-trivial setting of two non-colluding databases and two side information files at the user. Although our codes offer substantial reduction in complexity when compared to MDS-based codes, the code-rate marginally falls short of the capacity of the PIR-PSI setting. Nevertheless, we show that our code-rate is strictly higher than that of XOR-based codes for PIR with no side information. As a result, our codes can be useful when privately downloading a file especially after having downloaded a few other messages privately from the same database at an earlier time-instant. Full article
(This article belongs to the Special Issue Information-Theoretic Approach to Privacy and Security)
Show Figures

Figure 1

15 pages, 946 KB  
Article
Dimensionless Correlations for Natural Convection Heat Transfer from a Pair of Vertical Staggered Plates Suspended in Free Air
by Alessandro Quintino, Marta Cianfrini, Ivano Petracci, Vincenzo Andrea Spena and Massimo Corcione
Appl. Sci. 2021, 11(14), 6511; https://doi.org/10.3390/app11146511 - 15 Jul 2021
Cited by 2 | Viewed by 2730
Abstract
Buoyancy-induced convection from a pair of staggered heated vertical plates suspended in free air is studied numerically with the main scope to investigate the basic heat and momentum transfer features and to determine in what measure any independent variable affects the thermal performance [...] Read more.
Buoyancy-induced convection from a pair of staggered heated vertical plates suspended in free air is studied numerically with the main scope to investigate the basic heat and momentum transfer features and to determine in what measure any independent variable affects the thermal performance of each plate and both plates. A computational code based on the SIMPLE-C algorithm for pressure-velocity coupling is used to solve the system of the governing conservation equations of mass, momentum and energy. Numerical simulations are carried out for different values of the Rayleigh number based on the plate length, as well as of the horizontal separation distance between the plates and their vertical alignment, which are both normalized by the plate length. It is observed that an optimal separation distance between the plates for the maximum heat transfer rate related to the Rayleigh number and the vertical alignment of the plates does exist. Based on the results obtained, suitable dimensionless heat transfer correlations are developed for each plate and for the entire system. Full article
(This article belongs to the Topic Industrial Engineering and Management)
Show Figures

Figure 1

14 pages, 383 KB  
Article
A New Class of Q-Ary Codes for the McEliece Cryptosystem
by Jürgen Freudenberger and Johann-Philipp Thiers
Cryptography 2021, 5(1), 11; https://doi.org/10.3390/cryptography5010011 - 15 Mar 2021
Cited by 12 | Viewed by 4891
Abstract
The McEliece cryptosystem is a promising candidate for post-quantum public-key encryption. In this work, we propose q-ary codes over Gaussian integers for the McEliece system and a new channel model. With this one Mannheim error channel, errors are limited to weight one. [...] Read more.
The McEliece cryptosystem is a promising candidate for post-quantum public-key encryption. In this work, we propose q-ary codes over Gaussian integers for the McEliece system and a new channel model. With this one Mannheim error channel, errors are limited to weight one. We investigate the channel capacity of this channel and discuss its relation to the McEliece system. The proposed codes are based on a simple product code construction and have a low complexity decoding algorithm. For the one Mannheim error channel, these codes achieve a higher error correction capability than maximum distance separable codes with bounded minimum distance decoding. This improves the work factor regarding decoding attacks based on information-set decoding. Full article
(This article belongs to the Special Issue Public-Key Cryptography in the Post-quantum Era)
Show Figures

Figure 1

19 pages, 425 KB  
Article
On Grid Quorums for Erasure Coded Data
by Frédérique Oggier and Anwitaman Datta
Entropy 2021, 23(2), 177; https://doi.org/10.3390/e23020177 - 30 Jan 2021
Cited by 1 | Viewed by 2125
Abstract
We consider the problem of designing grid quorum systems for maximum distance separable (MDS) erasure code based distributed storage systems. Quorums are used as a mechanism to maintain consistency in replication based storage systems, for which grid quorums have been shown to produce [...] Read more.
We consider the problem of designing grid quorum systems for maximum distance separable (MDS) erasure code based distributed storage systems. Quorums are used as a mechanism to maintain consistency in replication based storage systems, for which grid quorums have been shown to produce optimal load characteristics. This motivates the study of grid quorums in the context of erasure code based distributed storage systems. We show how grid quorums can be built for erasure coded data, investigate the load characteristics of these quorum systems, and demonstrate how sequential consistency is achieved even in the presence of storage node failures. Full article
Show Figures

Figure 1

16 pages, 331 KB  
Article
Breaking the MDS-PIR Capacity Barrier via Joint Storage Coding
by Hua Sun and Chao Tian
Information 2019, 10(9), 265; https://doi.org/10.3390/info10090265 - 22 Aug 2019
Cited by 19 | Viewed by 3725
Abstract
The capacity of private information retrieval (PIR) from databases coded using maximum distance separable (MDS) codes was previously characterized by Banawan and Ulukus, where it was assumed that the messages are encoded and stored separably in the databases. This assumption was also usually [...] Read more.
The capacity of private information retrieval (PIR) from databases coded using maximum distance separable (MDS) codes was previously characterized by Banawan and Ulukus, where it was assumed that the messages are encoded and stored separably in the databases. This assumption was also usually made in other related works in the literature, and this capacity is usually referred to as the MDS-PIR capacity colloquially. In this work, we considered the question of if and when this capacity barrier can be broken through joint encoding and storing of the messages. Our main results are two classes of novel code constructions, which allow joint encoding, as well as the corresponding PIR protocols, which indeed outperformed the separate MDS-coded systems. Moreover, we show that a simple, but novel expansion technique allows us to generalize these two classes of codes, resulting in a wider range of the cases where this capacity barrier can be broken. Full article
(This article belongs to the Special Issue Private Information Retrieval: Techniques and Applications)
12 pages, 273 KB  
Article
MDS Self-Dual Codes and Antiorthogonal Matrices over Galois Rings
by Sunghyu Han
Information 2019, 10(4), 153; https://doi.org/10.3390/info10040153 - 25 Apr 2019
Cited by 2 | Viewed by 3576
Abstract
In this study, we explore maximum distance separable (MDS) self-dual codes over Galois rings G R ( p m , r ) with p 1 ( mod 4 ) and odd r. Using the building-up construction, we construct MDS self-dual [...] Read more.
In this study, we explore maximum distance separable (MDS) self-dual codes over Galois rings G R ( p m , r ) with p 1 ( mod 4 ) and odd r. Using the building-up construction, we construct MDS self-dual codes of length four and eight over G R ( p m , 3 ) with ( p = 3 and m = 2 , 3 , 4 , 5 , 6 ), ( p = 7 and m = 2 , 3 ), ( p = 11 and m = 2 ), ( p = 19 and m = 2 ), ( p = 23 and m = 2 ), and ( p = 31 and m = 2 ). In the building-up construction, it is important to determine the existence of a square matrix U such that U U T = I , which is called an antiorthogonal matrix. We prove that there is no 2 × 2 antiorthogonal matrix over G R ( 2 m , r ) with m 2 and odd r. Full article
(This article belongs to the Section Information Theory and Methodology)
Back to TopTop