Spelling suggestions: "subject:"duas modes""
1 |
A brief survey of self-dual codesOktavia, Rini 2009 August 1900 (has links)
This report is a survey of self-dual binary codes. We present
the fundamental MacWilliams identity and Gleason’s theorem
on self-dual binary codes. We also examine the upper bound of
minimum weights of self-dual binary codes using the extremal
weight enumerator formula. We describe the shadow code of a
self-dual code and the restrictions of the weight enumerator of
the shadow code. Then using the restrictions, we calculate the
weight enumerators of self-dual codes of length 38 and 40 and we
obtain the known weight enumerators of this lengths. Finally, we
investigate the Gaborit-Otmani experimental construction of selfdual
binary codes. This construction involves a fixed orthogonal
matrix, and we compare the result to the results obtained using
other orthogonal matrices. / text
|
2 |
Codes Related to and Derived from Hamming GraphsMuthivhi, Thifhelimbilu Ronald January 2013 (has links)
Masters of Science / Codes Related to and Derived from Hamming Graphs
T.R Muthivhi
M.Sc thesis, Department of Mathematics, University of Western Cape
For integers n; k 1; and k n; the graph k
n has vertices the 2n vectors
of Fn2
and adjacency de ned by two vectors being adjacent if they di er in k
coordinate positions. In particular, 1
n is the classical n-cube, usually denoted
by H1(n; 2): This study examines the codes (both binary and p-ary for p an odd
prime) of the row span of adjacency and incidence matrices of these graphs.
We rst examine codes of the adjacency matrices of the n-cube. These have
been considered in [14]. We then consider codes generated by both incidence
and adjacency matrices of the Hamming graphs H1(n; 3) [12]. We will also
consider codes of the line graphs of the n-cube as in [13].
Further, the automorphism groups of the codes, designs and graphs will be
examined, highlighting where there is an interplay. Where possible, suitable
permutation decoding sets will be given.
|
3 |
Codes Related to and Derived from Hamming GraphsMuthivhi, Thifhelimbilu Ronald January 2013 (has links)
>Magister Scientiae - MSc / For integers n, k 2:: 1, and k ~ n, the graph r~has vertices the 2n vectors of lF2 and adjacency defined by two vectors being adjacent if they differ in k coordinate positions. In particular, r~is the classical n-cube, usually denoted by Hl (n, 2). This study examines the codes (both binary and p-ary for p an odd prime) of the row span of adjacency and incidence matrices of these graphs. We first examine codes of the adjacency matrices of the n-cube. These have been considered in [14]. We then consider codes generated by both incidence and adjacency matrices of the Hamming graphs Hl(n,3) [12]. We will also consider codes of the line graphs of the n-cube as in [13]. Further, the automorphism groups of the codes, designs and graphs will be examined, highlighting where there is an interplay. Where possible, suitable permutation decoding sets will be given.
|
4 |
Quantum stabilizer codes and beyondSarvepalli, Pradeep Kiran 10 October 2008 (has links)
The importance of quantum error correction in paving the way to build a practical
quantum computer is no longer in doubt. Despite the large body of literature in quantum
coding theory, many important questions, especially those centering on the issue of "good
codes" are unresolved. In this dissertation the dominant underlying theme is that of constructing
good quantum codes. It approaches this problem from three rather different but
not exclusive strategies. Broadly, its contribution to the theory of quantum error correction
is threefold.
Firstly, it extends the framework of an important class of quantum codes - nonbinary
stabilizer codes. It clarifies the connections of stabilizer codes to classical codes over
quadratic extension fields, provides many new constructions of quantum codes, and develops
further the theory of optimal quantum codes and punctured quantum codes. In particular
it provides many explicit constructions of stabilizer codes, most notably it simplifies
the criteria by which quantum BCH codes can be constructed from classical codes.
Secondly, it contributes to the theory of operator quantum error correcting codes also
called as subsystem codes. These codes are expected to have efficient error recovery
schemes than stabilizer codes. Prior to our work however, systematic methods to construct
these codes were few and it was not clear how to fairly compare them with other classes of
quantum codes. This dissertation develops a framework for study and analysis of subsystem
codes using character theoretic methods. In particular, this work established a close
link between subsystem codes and classical codes and it became clear that the subsystem codes can be constructed from arbitrary classical codes.
Thirdly, it seeks to exploit the knowledge of noise to design efficient quantum codes
and considers more realistic channels than the commonly studied depolarizing channel.
It gives systematic constructions of asymmetric quantum stabilizer codes that exploit the
asymmetry of errors in certain quantum channels. This approach is based on a Calderbank-
Shor-Steane construction that combines BCH and finite geometry LDPC codes.
|
5 |
Securing Wireless Communication via Information-Theoretic Approaches: Innovative Schemes and Code Design TechniquesShoushtari, Morteza 21 June 2023 (has links) (PDF)
Historically, wireless communication security solutions have heavily relied on computational methods, such as cryptographic algorithms implemented in the upper layers of the network stack. Although these methods have been effective, they may not always be sufficient to address all security threats. An alternative approach for achieving secure communication is the physical layer security approach, which utilizes the physical properties of the communication channel through appropriate coding and signal processing. The goal of this Ph.D. dissertation is to leverage the foundations of information-theoretic security to develop innovative and secure schemes, as well as code design techniques, that can enhance security and reliability in wireless communication networks. This dissertation includes three main phases of investigation. The first investigation analyzes the finite blocklength coding problem for the wiretap channel model which is equipped with the cache. The objective was to develop and analyze a new wiretap coding scheme that can be used for secure communication of sensitive data. Secondly, an investigation was conducted into information-theoretic security solutions for aeronautical mobile telemetry (AMT) systems. This included developing a secure coding technique for the integrated Network Enhanced Telemetry (iNET) communications system, as well as examining the potential of post-quantum cryptography approaches as future secrecy solutions for AMT systems. The investigation focused on exploring code-based techniques and evaluating their feasibility for implementation. Finally, the properties of nested linear codes in the wiretap channel model have been explored. Investigation in this phase began by exploring the duality relationship between equivocation matrices of nested linear codes and their corresponding dual codes. Then a new coding algorithm to construct the optimum nested linear secrecy codes has been invented. This coding algorithm leverages the aforementioned duality relationship by starting with the worst nested linear secrecy codes from the dual space. This approach enables us to derive the optimal nested linear secrecy code more efficiently and effectively than through a brute-force search for the best nested linear secrecy codes directly.
|
Page generated in 0.079 seconds