A [49 16 6 ]-Linear Code as Product Of The [7 4 2 ] Code Due to Aunu and the Hamming [7 4 3 ] Code

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

High capacity data hiding scheme based on (7, 4) Hamming code.

Aiming to embed large amount of data while minimize the sum of costs of all changed pixels, a novel high capacity data hiding scheme based on (7, 4) Hamming code is realized by a family of algorithms. Firstly, n (n = 1, 2, 3) cover pixels are assigned to one set according to the payload. Then, 128 binary strings of length seven are divided into eight sets according to the syndrome of every bina...

متن کامل

Lecture 7 : Explicit Linear Code Constructions

and α0, . . . , αn−1 are distinct elements in Fq. Typically, q = n and the αi’a are all thje elements of Fq, or n = q − 1 and the αi’s are all the nonzero elements of of Fq. The linearity of an RS code C can be easily verified by checking the conditions for closure under addition and scalar multiplication. Let c, c′ ∈ C be codewords corresponding to the messages m = (m0, . . . ,mk−1) and m′ = (...

متن کامل

Legal Status of Treaties in Interpretation and Application of Article 7 of the Iranian Civil Code

Nowadays there are many aliens’ populations living in other countries. Forced Migration and Study of Religious Sciences are two main reasons introducing Iran as a host country. This paper Intends to clarify some questions about enforcement of Iranian civil code which determines the applicable law on the personal status of foreigners. There are some disagreements about the law governing personal...

متن کامل

Syndrome measurement strategies for the [[7, 1, 3]] code

Quantum error correction requires the measurement of error syndromes to properly locate and identify errors. Here we compare three syndrome measurement strategies for the [[7,1,3]] quantum error correction code: Shor states, Steane states, and one ancilla qubit. The first two of these strategies are fault tolerant while the third is not. For each strategy we compare the fidelities of applying 5...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: General Letters in Mathematics

سال: 2018

ISSN: 2519-9269,2519-9277

DOI: 10.31559/glm2018.4.3.4