Search

Showing total 253 results
253 results

Search Results

1. Guest editorial: Special issue on Mathematics of Zero-Knowledge.

2. Big textual data research for operations management: topic modelling with grounded theory.

3. Some Applications of Fuzzy Sets in Residuated Lattices.

4. Structure of CSS and CSS-T quantum codes.

5. Matrix Factorization and Some Fast Discrete Transforms.

6. Design of Regenerating Code Based on Security Level in Cloud Storage System.

8. Development, Insults and Predisposing Factors of the Brain's Predictive Coding System to Chronic Perceptual Disorders—A Life-Course Examination.

9. GAUSSIAN LEONARDO POLYNOMIALS AND APPLICATIONS OF LEONARDO NUMBERS TO CODING THEORY.

10. Some constructions and existence conditions for Hermitian self-dual skew codes.

11. LINEAR CODES OVER ZpR1R2 AND THEIR APPLICATIONS.

12. Fundamental Limits of Distributed Linear Encoding.

13. The Application of Constructivist Grounded Theory Methodology in an Urban Planning Doctoral Thesis.

14. Current and Future Trends of Resource Misallocation in the Construction Industry: A Bibliometric Review with Grounded Theory.

15. On Linear Codes over Finite Singleton Local Rings.

16. Iterative Message Passing Algorithm for Vertex-Disjoint Shortest Paths.

17. Subset sums and block designs in a finite vector space.

18. Energy efficient power allocation for ultra‐reliable and low‐latency communications via unsupervised learning.

19. Code-based encryption techniques with distributed cluster head and energy consumption routing protocol.

20. Further projective binary linear codes derived from two-to-one functions and their duals.

21. Bijective soft rings with applications.

22. Some Results on Self-Complementary Linear Codes.

23. The second step in characterizing a three-word code.

24. Minimal Linear Codes Constructed from Sunflowers.

25. Polar code-based cryptosystem: comparative study and analysis of efficiency.

26. Limiting Misleading ideas about the History of Grounded Theory Methodology.

27. Acyclic Coloring of Certain Graphs.

28. Advanced proof testing for structural ceramics.

29. A Novel Application of Boolean Functions With High Algebraic Immunity in Minimal Codes.

30. Encoder Blind Combinatorial Compressed Sensing.

31. Packaging paradoxes in food supply chains: exploring characteristics, underlying reasons and management strategies.

32. Online Control Method of Small- and Medium-Sized Electromechanical Equipment Based on Deep Neural Network.

33. Lattices in real quadratic fields and associated theta series arising from codes over F4 and F2×F2.

34. Differential spectrum of a class of APN power functions.

35. Snake Graphs Arising from Groves with an Application in Coding Theory.

36. Convertible Codes: Enabling Efficient Conversion of Coded Data in Distributed Storage.

37. Shortened Linear Codes From APN and PN Functions.

38. Two or Three Weight Linear Codes From Non-Weakly Regular Bent Functions.

39. Translational framework for implementation evaluation and research: a normalisation process theory coding manual for qualitative research and instrument development.

40. Constructions for new orthogonal arrays based on large sets of orthogonal arrays.

41. Complementary Assets, Organizational Modularization, and Platform Enterprise Value Innovation.

42. Several classes of new weakly regular bent functions outside RF, their duals and some related (minimal) codes with few weights.

43. The semiotic paradox of the improbability of communication.

44. Modified Evolutionary Test Data Generation Algorithm Based on Dynamic Change in Fitness Function Weights †.

45. The Research Question in Hermeneutic Phenomenology and Grounded Theory Research.

46. Contributions by Aart Blokhuis to finite geometry, discrete mathematics, and combinatorics.

47. Fundamental Properties of Sum-Rank-Metric Codes.

48. Four-Term Recurrence for Fast Krawtchouk Moments Using Clenshaw Algorithm.

49. Audio Compression using a Modified Vector Quantization algorithm for Mastering Applications.

50. Blockchain Data Availability Scheme with Strong Data Privacy Protection.