Showing 1 - 20 results of 457 for search 'Code Geass~', query time: 3.08s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    VI-2 class of Hamming weight of -aryq linear codes with dimension 5 by Guo-xiang HU, Huan-guo ZHANG

    Published 2016-02-01
    “…The Hamming weight hierarchy of a linear [n,k;q] code c over GF(q)is the sequence(d<sub>1</sub>,d<sub>2</sub>,…,d<sub>k</sub>),where d<sub>r</sub> is the smallest support weight of an r-dimensional subcode of c.According to some new necessary conditions,the VI class Hamming weight hierarchies of q -ary linear codes of dimension 5 can be divided into six subclasses. …”
    Get full text
    Article
  5. 5

    Construction of a new class of (2k, k, 1) convolutional codes by Cheng-chang ZHENG, Wan-quan PENG, Bo WEI

    Published 2014-06-01
    “…A new class of (2k,k,1) convolutional codes are created by combining double cyclic codes and (2,1,1) convolu-tional codes, and also a new method for creation long codes with short ones was proposed. …”
    Get full text
    Article
  6. 6
  7. 7

    CODE – MIXING IN ENGLISH CLASSES OF SMPN 14 KOTA BENGKULU: VIEWS FROM THE TEACHERS by Tri Ramadhaniarti, Safnil Arsyad, Arono Arono

    Published 2018-10-01
    “…Teachers sometimes  use code-mixing in their  classroom  instructions. This study is conducted to investigate Code – Mixing in English Classes of SMPN 14 Kota Bengkulu: Views From the Teachers. …”
    Get full text
    Article
  8. 8
  9. 9
  10. 10
  11. 11

    Tool Refactoring Otomatis untuk Menangani Lazy Class Code Smell dengan Pendekatan Software Metrics by Umi Sa'adah, Desy Intan Permatasari, Fadilah Fahrul Hardiansyah, Andhik Ampuh Yunanto, Jauari Akhmad Nur Hasim, Irma Wulandari, Muhammad Reza Pahlevi, Dufan Quraish Shihab

    Published 2022-08-01
    “… Keberadaan lazy class sebagai code smell dapat meningkatkan jumlah class yang tidak begitu perlu pada perangkat lunak, sehingga meningkatkan biaya pemeliharaan dari segi waktu dan usaha. …”
    Get full text
    Article
  12. 12
  13. 13
  14. 14
  15. 15

    Study of FEC at edge node of optical code label switching network by Yu-bao WANG, Shao-yu ZHI

    Published 2012-05-01
    “…The structure block of the optical code label switching network was built,and the design scheme for the forwarding equivalent classes (FEC)was proposed employing OCDM technology which was appropriate for variable packets transmission and allow the label processed in parallel in core node.The overhead between the duration of control bits and the duration of payload was investigated based on the above design scheme.The fixed slot algorithm (FSA) was employed to assemble the incoming packets in the assemble queue,simulation results and analysis were given between the relation of arrival ratio/assemble slot and packets loss ratio.…”
    Get full text
    Article
  16. 16
  17. 17

    Semi-random and semi-algebraic structural design for IRA-LDPC codes by Li PENG, Qi ZHANG, Bo WANG, Tao CHEN

    Published 2014-03-01
    Subjects: “…irregular repeat-accumulate codes…”
    Get full text
    Article
  18. 18
  19. 19

    New bound of algebraic immunity of a class of Boolean function by Ye TIAN, Yu-qing ZHANG, Yu-pu HU, Gao-fei WU

    Published 2016-10-01
    “…Algebraic immunity quantified the resistance of a Boolean function to the algebraic attack.Recently,Mesnager,et al showed that there were direct linked between the annihilators used in algebraic attacks and the coding theory.They showed that the lower bound of the algebraic immunity of Boolean functions could been derived from the minimum distance of the associated cyclic codes.An open problem proposed by Mesnager is settled with a detailed proof.Also,a lower bound of algebraic immunity of a class of Boolean functions will be introduced.…”
    Get full text
    Article
  20. 20