In this paper we consider two pointsets in PG(2, q n ) arising from a linear set L of rank n contained in a line of PG(2, q n ): the first one is a linear blocking set of Rédei type, the second one extends the construction of translation... more
In this paper we consider two pointsets in PG(2, q n ) arising from a linear set L of rank n contained in a line of PG(2, q n ): the first one is a linear blocking set of Rédei type, the second one extends the construction of translation... more
The effect of boundaries on the force distributions in granular media is illustrated by simulations of 2D packings of frictionless, Hertzian spheres. To elucidate discrepancies between experimental observations and theoretical... more
Let R = F 2 + uF 2 + u 2 F 2 be a non-chain finite commutative ring, where u 3 = u. In this paper, we mainly study the construction of quantum codes from cyclic codes over R. We obtained self-orthogonal codes over F 2 as gray images of... more
We give an attribute-based encryption system for Turing Machines that is provably secure assuming only the existence of identity-based encryption (IBE) for large identity spaces. Currently, IBE is known to be realizable from most... more
Functional Encryption (FE) is a powerful notion of encryption which enables computations and partial message recovery of encrypted data. In FE, each decryption key is associated with a function f such that decryption recovers the function... more
In terms of socioeconomic damage, floods are one of the most destructive natural disasters. However, by conducting flood modeling prior to an event, their impacts can be mitigated and better managed. This study aims to assess flood risk... more
In this paper, an expression for the asymptotic growth rate of the number of small linear-weight codewords of irregular doubly-generalized LDPC (D-GLDPC) codes is derived. The expression is compact and generalizes existing results for... more
Up to a new invariant µ(b), the complete b-symbol weight distribution of a particular kind of two-weight irreducible cyclic codes, was recently obtained by Zhu et al. [Des. Codes Cryptogr., 90 (2022) 1113-1125]. The purpose of this paper... more
We study q-ary linear codes C obtained from Veronese surfaces over finite fields. We show how one can find the higher weight spectra of these codes, or equivalently, the weight distribution of all extension codes of C over all field... more
This paper explores the application of ordered weighted averaging (OWA) operators to develop water quality index, which incorporates an attitudinal dimension in the aggregation process. The major thrust behind selecting the OWA operator... more
Consider a website containing a collection of webpages with data such as in Yahoo or the Open Directory project. Each page is associated with a weight representing the frequency with which that page is accessed by users. In the tree... more
Measuring the size of a project has always been a challenge in all the disciplines involved in project management. In software project management, defining a measurement unit for a project is even more difficult since the unique... more
We compute the weight distribution of the R(4, 9) by combining the approach described in D. V. Sarwate's Ph.D. thesis from 1973 with knowledge on the affine equivalence classification of Boolean functions. To solve this problem posed,... more
The notion of a projective system, defined as a set X of n-points in a projective space over a finite field, was introduced by Tsfasman and Vlaˇdut. By this notion, the weight distribution of a nondegenerate linear code can be computed by... more
A seleção de semeadoras adubadoras montadas envolve o conhecimento de diversas especificações técnicas, entre estas o peso máximo da máquina, de forma que proporcione estabilidade e direção do trator. O presente trabalho teve o objetivo... more
The relation between packing geometry and force network statistics is studied for granular media. Based on simulations of two-dimensional packings of Hertzian spheres, we develop a geometrical framework relating the distribution of... more
Instructions are provided for users of the program RENU which provides methodology for determining the effects of changes in truck size, weight, and configuration on pavement performance and for relating these effects to pavement... more
In this paper, we derive the average weight distributions for the irregular non-binary cluster low-density parity-check (LDPC) code ensembles. Moreover, we give the exponential growth rate of the average weight distribution in the limit... more
In this paper, we explicitly formulate the average weight and the stopping set distributions and their asymptotic exponents of twoedge type LDPC code ensembles. We also show some characteristics such as the symmetry and the conditions for... more
The multi-edge type LDPC codes, introduced by Richardson and Urbanke, present the general class of structured LDPC codes. In this paper, we derive the average weight distributions of the multi-edge type LDPC code ensembles. Furthermore,... more
Stroke is the third most common cause of death in the world and most common cause of adult disability of the survivors. Balance problems in stroke is very common, and they have been implicated in the poor recovery of activities of daily... more
This paper is the first part of an investigation if the capacity of a binary-input binary-output memoryless symmetric channel under ML decoding can be achieved asymptotically by using non-binary LDPC codes. We consider (l, r)-regular LDPC... more
In this paper, we study the average symbol and bit-weight distributions for ensembles of non-binary low-density parity-check codes defined on GF(2 p ). Moreover, we derive the asymptotic exponential growth rate of the weight distributions... more
Determining the size of nanoparticles accurately, quickly and easily is becoming more and more important as the use of such particles increases. One of the common techniques for measuring the size of particles in suspension is dynamic... more
A new Intact Stability Code, the so-called Second Generation of Intact Stability Criteria, is currently under development and validation by the International Maritime Organization (IMO). The criteria are separated into five failure modes,... more
Optimization of machine learning architectures is essential in determining the efficacy and the applicability of any neural architecture to real world problems. In this work a generalized Newton's method (GNM) is presented as a powerful... more
A new very fast algorithm for synthesis of a new structure of discrele-time neural networks (NN) is proposed. For this purpose the following concepts are employed: ((i) combination of input and output activation functions, (ii) input... more
Background: Specific weightbearing instructions continue to be a part of routine orthopaedic clinical practice on an injured or postoperative extremity. Researchers and clinicians have struggled to define the best weightbearing strategies... more
A new method for constructing minimum-redundancy prefix codes is described. This method does not build a Huffman tree; instead it uses a property of optimal codes to find the codeword length of each weight. The running time of the... more
We investigate how suitable a weighted network is for gossip spreading. The proposed model is based on the gossip spreading model introduced by Lind et.al. on unweighted networks. Weight represents "friendship. Potential spreader prefers... more
In this work, we analyze gossip spreading on weighted networks. We try to define a new metric to classify weighted complex networks using our model. The model proposed here is based on the gossip spreading model introduced by Lind et al.... more
This study investigated the impact of body armor weight and load magnitude and distribution on the lower extremities during walking. Range of motion (ROM) was assessed while seven healthy, male, right-handed, military university students... more
In this paper Raptor code ensembles with linear random precodes in a fixed-rate setting are considered. An expression for the average distance spectrum is derived and this expression is used to obtain the asymptotic exponent of the weight... more
The physically disabled who have mobility impairments in lower limbs or lumbar due to congenital or acquired injuries, hypofunction or spinal injury hope to move without help. The shifting machines can achive the goal by holding those... more
Let F 2 m be a finite field of cardinality 2 m , λ and k be integers satisfying For any odd positive integer n, we give an explicit representation and enumeration for all distinct (δ +αu 2 )-constacyclic codes over R of length 2 k n, and... more
Let F 2 m be a finite field of cardinality 2 m , λ and k be integers satisfying For any odd positive integer n, we give an explicit representation and enumeration for all distinct (δ +αu 2 )-constacyclic codes over R of length 2 k n, and... more
This paper describes a complex networks approach to study the failure tolerance of mechatronic software systems under various types of hardware and/or software failures. We produce synthetic system architectures based on evidence of... more
In this paper, we study and discuss the concept of Smarandache anti zero divisor (SAZD) element of the ring ℤ 𝑛 and the group ring ℤ 𝑛 𝐺, where 𝐺 is a cyclic group of order 𝑚 generated by 𝑔. Moreover, we introduce and discuss the concept... more
In this paper we describe LiveNet, a flexible wearable platform intended for long-term ambulatory health monitoring with real-time data streaming and context classification. Based on the MIT Wearable Computing Group's distributed mobile... more
In this paper we describe LiveNet, a flexible wearable platform intended for long-term ambulatory health monitoring with real-time data streaming and context classification. Based on the MIT Wearable Computing Group's distributed... more
In the above correspondence?, in the right column on page 291, the fifth line under the Asymptotic Result should have read Fig. 2. Check matrix AN of (4,l) code with u = 1. 5exp2[nH(v)]+2b-1, ~#2, 2w<b+3 Consider a type-B2 burst of r = u... more
We study directed last passage percolation on the planar square lattice whose weights have general distributions, or equivalently, queues in series with general service distributions. Each row of the last passage model has its own... more
Codes over the ring of integers modulo 4 have been studied by many researchers. Negacyclic codes such that the length of the code is odd have been characterized over the alphabet 4 , and furthermore, have been generalized to the case of... more
In recent time, the idea of collecting and combining large public data sets and services became more and more popular. The special characteristics of such systems and the requirements of the participants demand for strictly decentralized... more
In this paper we investigate linear codes with complementary dual (LCD) codes and formally self-dual codes over the ring R = F q + vF q + v 2 F q , where v 3 = v, for q odd. We give conditions on the existence of LCD codes and present... more
In this paper we investigate linear codes with complementary dual (LCD) codes and formally self-dual codes over the ring $R=\F_{q}+v\F_{q}+v^{2}\F_{q}$, where $v^{3}=v$, for $q$ odd. We give conditions on the existence of LCD codes and... more