-
21
The Cyclically Resolvable Steiner Triple Systems of Order 57
Published 2025-01-01“…Cyclically resolvable STS(<i>v</i>)s have important applications in Coding Theory. They have been classified up to <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>v</mi><mo>=</mo><mn>45</mn></mrow></semantics></math></inline-formula> and before the present work <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>v</mi><mo>=</mo><mn>57</mn></mrow></semantics></math></inline-formula> was the first open case. …”
Get full text
Article -
22
A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme
Published 2020-01-01“…One of them is based on coding theory. In this work, we construct a secret-sharing scheme that realizes an access structure by using linear codes, in which any element of the access structure can reconstruct the secret key. …”
Get full text
Article -
23
Blockchain sharding storage scheme based on concatenated coding
Published 2024-07-01“…Existing research has reduced the storage overhead of blockchain based on erasure coding theory, but it brings high computational and communication spending during the decoding and recovery of blocks. …”
Get full text
Article -
24
Quantum Speedup of the Dispersion and Codebook Design Problems
Published 2024-01-01“…Dispersion problems are combinatorial optimization problems classified as NP-hard, which appear often in coding theory and wireless communications applications involving optimal codebook design. …”
Get full text
Article -
25
Trellis Decoding for Qudit Stabilizer Codes and Its Application to Qubit Topological Codes
Published 2024-01-01“…Here, we improve the scalability and practicality of their theory, show that it has strong structure, extend the results using classical coding theory as a guide, and demonstrate a canonical form from which the structural properties of the decoding graph may be computed. …”
Get full text
Article -
26
STUDY OF COMPATIBILITY OF METHODS AND TECHNOLOGIES OF HIGH-LEVEL PROTOCOLS AND ERROR-CORRECTING CODES
Published 2024-12-01“…Polar codes have since been integrated into 5G systems due to their efficiency and low complexity, marking a milestone in modern coding theory. Advances in decoding methods, such as belief propagation and successive cancellation, further enhanced the utility of these codes in practical applications. …”
Get full text
Article -
27
Reproduction of Privilege: The Intersection of Middle and Upper Class Educational Models
Published 2022-11-01“…The data was generated through interviews with 26 students and 10 teachers from different private high schools. The Code Theory of Basil Bernstein was the theoretical framework for analysing the data. …”
Get full text
Article -
28
Critical Literacy Sustainability: What Pedagogical Practices? Whose Role?
Published 2024-12-01“…The study employed a mixed-methods approach, drawing on two theoretical frameworks: Legitimation Code Theory and Constructivism. Data collection involved tests, questionnaires, document analysis, focus groups, and observations, with analysis conducted using thematic (Atlas.ti), Excel and ANCOVA via Stata17 in SPSS. …”
Get full text
Article -
29
A virtual-reality (VR) cognitive pupillometry analysis of auditory and visual phonemic awareness tasks involving ‘th’ sound variations
Published 2024-09-01“…Rooted in the Cognitive Load (CL) and Dual Coding theories, this sequential explanatory study examined the CL levels experienced by 36 available Iranian pre-intermediate English as a Foreign Language (EFL) learners in auditory and visual Phonemic Awareness Tasks (PATs). …”
Get full text
Article