[go: up one dir, main page]

 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (15)

Search Parameters:
Keywords = Galois rings

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
19 pages, 2015 KiB  
Article
Peculiarities of Applying Partial Convolutions to the Computation of Reduced Numerical Convolutions
by Ibragim Suleimenov, Aruzhan Kadyrzhan, Dinara Matrassulova and Yelizaveta Vitulyova
Appl. Sci. 2024, 14(14), 6388; https://doi.org/10.3390/app14146388 - 22 Jul 2024
Viewed by 597
Abstract
A method is proposed that reduces the computation of the reduced digital convolution operation to a set of independent convolutions computed in Galois fields. The reduced digital convolution is understood as a modified convolution operation whose result is a function taking discrete values [...] Read more.
A method is proposed that reduces the computation of the reduced digital convolution operation to a set of independent convolutions computed in Galois fields. The reduced digital convolution is understood as a modified convolution operation whose result is a function taking discrete values in the same discrete scale as the original functions. The method is based on the use of partial convolutions, reduced to computing a modulo integer q0, which is the product of several prime numbers: q0=p1p2pn. It is shown that it is appropriate to use the expansion of the number q0, to q=p0p1p2pn, where p0 is an additional prime number, to compute the reduced digital convolution. This corresponds to the use of additional digits in the number system used to convert to partial convolutions. The inverse procedure, i.e., reducing the result of calculations modulo q to the result corresponding to calculations modulo q0, is provided by the formula that used only integers proved in this paper. The possibilities of practical application of the obtained results are discussed. Full article
Show Figures

Figure 1

Figure 1
<p>Illustration of the lemma proof; <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>w</mi> </mrow> <mrow> <mn>1</mn> </mrow> </msub> <mo>=</mo> <mn>19</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>w</mi> </mrow> <mrow> <mn>2</mn> </mrow> </msub> <mo>=</mo> <mn>17</mn> </mrow> </semantics></math>, curve 1 (blue)—calculations of <span class="html-italic">q</span> by formula (31), i.e., through the operation of calculating the integer part of the number, curve 2 (red)—values of the sum <span class="html-italic">q</span> + 3, where <span class="html-italic">q</span> is calculated by formula (32), i.e., using only modulo operations.</p>
Full article ">Figure 2
<p>Illustration of the lemma proof; <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>w</mi> </mrow> <mrow> <mn>1</mn> </mrow> </msub> <mo>=</mo> <mn>11</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>w</mi> </mrow> <mrow> <mn>2</mn> </mrow> </msub> <mo>=</mo> <mn>9</mn> </mrow> </semantics></math>, curve 1 (blue)—calculations of <span class="html-italic">q</span> by formula (31), i.e., through the operation of calculating the integer part of the number, curve 2 (red)—values of the sum <span class="html-italic">q</span> + 3, where <span class="html-italic">q</span> is calculated by formula (32), i.e., using only modulo operations.</p>
Full article ">Figure 3
<p>Model function <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>f</mi> </mrow> <mrow> <mn>1</mn> </mrow> </msub> </mrow> </semantics></math> (curve 1, red dots) and the result of applying the moving average calculation operation to it (curve 2, green dots).</p>
Full article ">Figure 4
<p>Model function <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>f</mi> </mrow> <mrow> <mn>1</mn> </mrow> </msub> </mrow> </semantics></math> smoothed using the moving average method (curve 1, green dots) and the result of calculating the analogue using formula (51), curve 2, red dots.</p>
Full article ">Figure 5
<p>Plots of partial convolutions for three digits of number representation modulo 110; (<b>a</b>–<b>c</b>) correspond to partial convolutions in Galois fields <math display="inline"><semantics> <mrow> <mi mathvariant="normal">G</mi> <mi mathvariant="normal">F</mi> <mo>(</mo> <mn>2</mn> <mo>)</mo> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi mathvariant="normal">G</mi> <mi mathvariant="normal">F</mi> <mo>(</mo> <mn>5</mn> <mo>)</mo> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi mathvariant="normal">G</mi> <mi mathvariant="normal">F</mi> <mo>(</mo> <mn>11</mn> <mo>)</mo> </mrow> </semantics></math>, respectively.</p>
Full article ">
14 pages, 282 KiB  
Article
Full Classification of Finite Singleton Local Rings
by Sami Alabiad and Yousef Alkhamees
Axioms 2024, 13(5), 290; https://doi.org/10.3390/axioms13050290 - 25 Apr 2024
Viewed by 728
Abstract
The main objective of this article is to classify all finite singleton local rings, which are associative rings characterized by a unique maximal ideal and a distinguished basis consisting of a single element. These rings are associated with four positive integer invariants [...] Read more.
The main objective of this article is to classify all finite singleton local rings, which are associative rings characterized by a unique maximal ideal and a distinguished basis consisting of a single element. These rings are associated with four positive integer invariants p,n,s, and t, where p is a prime number. In particular, we aim to classify these rings and count them up to isomorphism while maintaining the same set of invariants. We have found interesting cases of finite singleton local rings with orders of p6 and p7 that hold substantial importance in the field of coding theory. Full article
11 pages, 285 KiB  
Article
On Automorphisms of Chain Rings
by Sami Alabiad, Yousef Alkhamees and Alhanouf Ali Alhomaidhi
Symmetry 2023, 15(8), 1482; https://doi.org/10.3390/sym15081482 - 26 Jul 2023
Viewed by 616
Abstract
Suppose R is a finite chain ring with invaraints p,n,r,k,k,m. Suppose G is also the subset of all φ Aut(R), the automorphism group of R, [...] Read more.
Suppose R is a finite chain ring with invaraints p,n,r,k,k,m. Suppose G is also the subset of all φ Aut(R), the automorphism group of R, such that φ(πk)=πk, where π is a generator of the maximal ideal of R. It was found that G is a group that is, in some sense, the set of all symmetries of {πk}. The main purpose of this article is to describe the structure of G. The subgroup G helps us understand the structure of Aut(R) in the general case which in turn provides immediate results in classifying chain rings. Full article
10 pages, 286 KiB  
Article
On J-Diagrams for the One Groups of Finite Chain Rings
by Sami Alabiad and Yousef Alkhamees
Symmetry 2023, 15(3), 720; https://doi.org/10.3390/sym15030720 - 14 Mar 2023
Cited by 1 | Viewed by 972
Abstract
Let R be a finite commutative chain ring with invariants p,n,r,k,m. The purpose of this article is to study j-diagrams for the one group H=1+J(R) of [...] Read more.
Let R be a finite commutative chain ring with invariants p,n,r,k,m. The purpose of this article is to study j-diagrams for the one group H=1+J(R) of R, where J(R)=(π) is Jacobson radical of R. In particular, we prove the existence and uniqueness of j-diagrams for such one group. These j-diagrams help us to solve several problems related to chain rings such as the structure of their unit groups and a group of all symmetries of {πk}, where kk. The invariants p,n,r,k,m and the Eisenstein polynomial by which R is constructed over its Galois subring determine fully the j-diagram for H. Full article
10 pages, 279 KiB  
Article
The Structure of Local Rings with Singleton Basis and Their Enumeration
by Yousef Alkhamees and Sami Alabiad
Mathematics 2022, 10(21), 4040; https://doi.org/10.3390/math10214040 - 31 Oct 2022
Cited by 3 | Viewed by 1070
Abstract
A local ring is an associative ring with unique maximal ideal. We associate with each Artinian local ring with singleton basis four invariants (positive integers) p,n,s,t. The purpose of this article is to describe the structure [...] Read more.
A local ring is an associative ring with unique maximal ideal. We associate with each Artinian local ring with singleton basis four invariants (positive integers) p,n,s,t. The purpose of this article is to describe the structure of such rings and classify them (up to isomorphism) with the same invariants. Every local ring with singleton basis can be constructed over its coefficient subring by a certain polynomial called the associated polynomial. These polynomials play significant role in the enumeration. Full article
14 pages, 326 KiB  
Article
A Unique Representation of Cyclic Codes over GR(pn,r)
by Sami Alabiad and Yousef Alkhamees
Axioms 2022, 11(10), 519; https://doi.org/10.3390/axioms11100519 - 1 Oct 2022
Cited by 1 | Viewed by 1214
Abstract
Let R be a Galois ring, GR(pn,r), of characteristic pn and of order pnr. In this article, we study cyclic codes of arbitrary length, N, over R. We use [...] Read more.
Let R be a Galois ring, GR(pn,r), of characteristic pn and of order pnr. In this article, we study cyclic codes of arbitrary length, N, over R. We use discrete Fourier transform (DFT) to determine a unique representation of cyclic codes of length, N, in terms of that of length, ps, where s=vp(N) and vp are the p-adic valuation. As a result, Hamming distance and dual codes are obtained. In addition, we compute the exact number of distinct cyclic codes over R when n=2. Full article
15 pages, 288 KiB  
Article
Three Authentication Schemes without Secrecy over Finite Fields and Galois Rings
by Juan Carlos Ku-Cauich and Miguel Angel Márquez-Hidalgo
Mathematics 2021, 9(9), 942; https://doi.org/10.3390/math9090942 - 23 Apr 2021
Viewed by 1397
Abstract
We provide three new authentication schemes without secrecy. The first two on finite fields and Galois rings, using Gray map for this link. The third construction is based on Galois rings. The main achievement in this work is to obtain optimal impersonation and [...] Read more.
We provide three new authentication schemes without secrecy. The first two on finite fields and Galois rings, using Gray map for this link. The third construction is based on Galois rings. The main achievement in this work is to obtain optimal impersonation and substitution probabilities in the schemes. Additionally, in the first and second scheme, we simplify the source space and obtain a better relationship between the size of the message space and the key space than the one given in a recent paper. Finally, we provide a third scheme on Galois rings. Full article
(This article belongs to the Special Issue Algebra and Number Theory)
12 pages, 294 KiB  
Article
On Automorphism Groups of Finite Chain Rings
by Sami Alabiad and Yousef Alkhamees
Symmetry 2021, 13(4), 681; https://doi.org/10.3390/sym13040681 - 14 Apr 2021
Cited by 4 | Viewed by 1352
Abstract
A finite ring with an identity is a chain ring if its lattice of left ideals forms a unique chain. Let R be a finite chain ring with invaraints p,n,r,k,k,m. If [...] Read more.
A finite ring with an identity is a chain ring if its lattice of left ideals forms a unique chain. Let R be a finite chain ring with invaraints p,n,r,k,k,m. If n=1, the automorphism group Aut(R) of R is known. The main purpose of this article is to study the structure of Aut(R) when n>1. First, we prove that Aut(R) is determined by the automorphism group of a certain commutative chain subring. Then we use this fact to find the automorphism group of R when pk. In addition, Aut(R) is investigated under a more general condition; that is, R is very pure and p need not divide k. Based on the j-diagram introduced by Ayoub, we were able to give the automorphism group in terms of a particular group of matrices. The structure of the automorphism group of a finite chain ring depends essentially on its invaraints and the associated j-diagram. Full article
19 pages, 1343 KiB  
Article
True Random Number Generator Based on Fibonacci-Galois Ring Oscillators for FPGA
by Pietro Nannipieri, Stefano Di Matteo, Luca Baldanzi, Luca Crocetti, Jacopo Belli, Luca Fanucci and Sergio Saponara
Appl. Sci. 2021, 11(8), 3330; https://doi.org/10.3390/app11083330 - 7 Apr 2021
Cited by 29 | Viewed by 5736
Abstract
Random numbers are widely employed in cryptography and security applications. If the generation process is weak, the whole chain of security can be compromised: these weaknesses could be exploited by an attacker to retrieve the information, breaking even the most robust implementation of [...] Read more.
Random numbers are widely employed in cryptography and security applications. If the generation process is weak, the whole chain of security can be compromised: these weaknesses could be exploited by an attacker to retrieve the information, breaking even the most robust implementation of a cipher. Due to their intrinsic close relationship with analogue parameters of the circuit, True Random Number Generators are usually tailored on specific silicon technology and are not easily scalable on programmable hardware, without affecting their entropy. On the other hand, programmable hardware and programmable System on Chip are gaining large adoption rate, also in security critical application, where high quality random number generation is mandatory. The work presented herein describes the design and the validation of a digital True Random Number Generator for cryptographically secure applications on Field Programmable Gate Array. After a preliminary study of literature and standards specifying requirements for random number generation, the design flow is illustrated, from specifications definition to the synthesis phase. Several solutions have been studied to assess their performances on a Field Programmable Gate Array device, with the aim to select the highest performance architecture. The proposed designs have been tested and validated, employing official test suites released by NIST standardization body, assessing the independence from the place and route and the randomness degree of the generated output. An architecture derived from the Fibonacci-Galois Ring Oscillator has been selected and synthesized on Intel Stratix IV, supporting throughput up to 400 Mbps. The achieved entropy in the best configuration is greater than 0.995. Full article
(This article belongs to the Special Issue AI and Security in Cyber Physical System Design)
Show Figures

Figure 1

Figure 1
<p>Transition-Effect Ring Oscillator.</p>
Full article ">Figure 2
<p>Metastable Ring Oscillator.</p>
Full article ">Figure 3
<p>Fibonacci Linear Feedback Shift Registers.</p>
Full article ">Figure 4
<p>Galois Linear Feedback Shift Register.</p>
Full article ">Figure 5
<p>Fibonacci Ring Oscillator with enable port.</p>
Full article ">Figure 6
<p>Galois ring oscillator with enable port.</p>
Full article ">Figure 7
<p>Fibonacci-Galois Ring Oscillator (FiGaRO) four elements architecture.</p>
Full article ">Figure 8
<p>Number of oscillations histogram for <math display="inline"><semantics> <msup> <mn>10</mn> <mn>5</mn> </msup> </semantics></math> trigger events for Transition Effect Ring Oscillator (TERO) True-Random Number Generator (TRNG).</p>
Full article ">Figure 9
<p>Sampling strategy for Meta-RO assessment.</p>
Full article ">Figure 10
<p>Output values histograms for eight parallel Meta-RO elements.</p>
Full article ">Figure 11
<p>Fibonacci Ring Oscillator with state sampling. The output bus is XORed together to form a 1-bit output in the higher level.</p>
Full article ">Figure 12
<p>Galois Ring Oscillator with state sampling. The output bus is XORed together to form a 1-bit output in the higher level.</p>
Full article ">Figure 13
<p>Histograms of the first run and of the second run of acquisitions for the FiGaRO TRNG.</p>
Full article ">Figure 14
<p>Hardware implementation of the repetition count test for a binary random source.</p>
Full article ">Figure 15
<p>Hardware implementation of the adaptive proportion test for a binary random source.</p>
Full article ">Figure 16
<p>Overall architecture of the implemented FiGaRO Random Number Generator (RNG).</p>
Full article ">Figure 17
<p>Entropy assessment results (two different runs of acquisition).</p>
Full article ">
9 pages, 268 KiB  
Article
Recapturing the Structure of Group of Units of Any Finite Commutative Chain Ring
by Sami Alabiad and Yousef Alkhamees
Symmetry 2021, 13(2), 307; https://doi.org/10.3390/sym13020307 - 11 Feb 2021
Cited by 6 | Viewed by 1607
Abstract
A finite ring with an identity whose lattice of ideals forms a unique chain is called a finite chain ring. Let R be a commutative chain ring with invariants p,n,r,k,m. It is known that [...] Read more.
A finite ring with an identity whose lattice of ideals forms a unique chain is called a finite chain ring. Let R be a commutative chain ring with invariants p,n,r,k,m. It is known that R is an Eisenstein extension of degree k of a Galois ring S=GR(pn,r). If p1 does not divide k, the structure of the unit group U(R) is known. The case (p1)k was partially considered by M. Luis (1991) by providing counterexamples demonstrated that the results of Ayoub failed to capture the direct decomposition of U(R). In this article, we manage to determine the structure of U(R) when (p1)k by fixing Ayoub’s approach. We also sharpen our results by introducing a system of generators for the unit group and enumerating the generators of the same order. Full article
12 pages, 273 KiB  
Article
MDS Self-Dual Codes and Antiorthogonal Matrices over Galois Rings
by Sunghyu Han
Information 2019, 10(4), 153; https://doi.org/10.3390/info10040153 - 25 Apr 2019
Cited by 1 | Viewed by 3038
Abstract
In this study, we explore maximum distance separable (MDS) self-dual codes over Galois rings G R ( p m , r ) with p 1 ( mod 4 ) and odd r. Using the building-up construction, we construct MDS self-dual [...] Read more.
In this study, we explore maximum distance separable (MDS) self-dual codes over Galois rings G R ( p m , r ) with p 1 ( mod 4 ) and odd r. Using the building-up construction, we construct MDS self-dual codes of length four and eight over G R ( p m , 3 ) with ( p = 3 and m = 2 , 3 , 4 , 5 , 6 ), ( p = 7 and m = 2 , 3 ), ( p = 11 and m = 2 ), ( p = 19 and m = 2 ), ( p = 23 and m = 2 ), and ( p = 31 and m = 2 ). In the building-up construction, it is important to determine the existence of a square matrix U such that U U T = I , which is called an antiorthogonal matrix. We prove that there is no 2 × 2 antiorthogonal matrix over G R ( 2 m , r ) with m 2 and odd r. Full article
(This article belongs to the Section Information Theory and Methodology)
14 pages, 277 KiB  
Article
Normal Bases on Galois Ring Extensions
by Aixian Zhang and Keqin Feng
Symmetry 2018, 10(12), 702; https://doi.org/10.3390/sym10120702 - 3 Dec 2018
Viewed by 1820
Abstract
Normal bases are widely used in applications of Galois fields and Galois rings in areas such as coding, encryption symmetric algorithms (block cipher), signal processing, and so on. In this paper, we study the normal bases for Galois ring extension [...] Read more.
Normal bases are widely used in applications of Galois fields and Galois rings in areas such as coding, encryption symmetric algorithms (block cipher), signal processing, and so on. In this paper, we study the normal bases for Galois ring extension R / Z p r , where R = GR ( p r , n ) . We present a criterion on the normal basis for R / Z p r and reduce this problem to one of finite field extension R ¯ / Z ¯ p r = F q / F p ( q = p n ) by Theorem 1. We determine all optimal normal bases for Galois ring extension. Full article
40 pages, 461 KiB  
Article
Quantum Information: A Brief Overview and Some Mathematical Aspects
by Maurice R. Kibler
Mathematics 2018, 6(12), 273; https://doi.org/10.3390/math6120273 - 22 Nov 2018
Cited by 1 | Viewed by 3744
Abstract
The aim of the present paper is twofold. First, to give the main ideas behind quantum computing and quantum information, a field based on quantum-mechanical phenomena. Therefore, a short review is devoted to (i) quantum bits or qubits (and more generally qudits), [...] Read more.
The aim of the present paper is twofold. First, to give the main ideas behind quantum computing and quantum information, a field based on quantum-mechanical phenomena. Therefore, a short review is devoted to (i) quantum bits or qubits (and more generally qudits), the analogues of the usual bits 0 and 1 of the classical information theory, and to (ii) two characteristics of quantum mechanics, namely, linearity, which manifests itself through the superposition of qubits and the action of unitary operators on qubits, and entanglement of certain multi-qubit states, a resource that is specific to quantum mechanics. A, second, focus is on some mathematical problems related to the so-called mutually unbiased bases used in quantum computing and quantum information processing. In this direction, the construction of mutually unbiased bases is presented via two distinct approaches: one based on the group SU(2) and the other on Galois fields and Galois rings. Full article
(This article belongs to the Special Issue Computer Algebra in Scientific Computing)
13 pages, 320 KiB  
Article
An Authentication Code over Galois Rings with Optimal Impersonation and Substitution Probabilities
by Juan Carlos Ku-Cauich, Guillermo Morales-Luna and Horacio Tapia-Recillas
Math. Comput. Appl. 2018, 23(3), 46; https://doi.org/10.3390/mca23030046 - 6 Sep 2018
Cited by 1 | Viewed by 2488
Abstract
Two new systematic authentication codes based on the Gray map over a Galois ring are introduced. The first introduced code attains optimal impersonation and substitution probabilities. The second code improves space sizes, but it does not attain optimal probabilities. Additionally, it is conditioned [...] Read more.
Two new systematic authentication codes based on the Gray map over a Galois ring are introduced. The first introduced code attains optimal impersonation and substitution probabilities. The second code improves space sizes, but it does not attain optimal probabilities. Additionally, it is conditioned to the existence of a special class of bent maps on Galois rings. Full article
736 KiB  
Article
Construction of New Fractional Repetition Codes from Relative Difference Sets with λ=1
by Young-Sik Kim, Hosung Park and Jong-Seon No
Entropy 2017, 19(10), 563; https://doi.org/10.3390/e19100563 - 22 Oct 2017
Cited by 6 | Viewed by 3942
Abstract
Fractional repetition (FR) codes are a class of distributed storage codes that replicate and distribute information data over several nodes for easy repair, as well as efficient reconstruction. In this paper, we propose three new constructions of FR codes based on relative difference [...] Read more.
Fractional repetition (FR) codes are a class of distributed storage codes that replicate and distribute information data over several nodes for easy repair, as well as efficient reconstruction. In this paper, we propose three new constructions of FR codes based on relative difference sets (RDSs) with λ = 1 . Specifically, we propose new ( q 2 - 1 , q , q ) FR codes using cyclic RDS with parameters ( q + 1 , q - 1 , q , 1 ) constructed from q-ary m-sequences of period q 2 - 1 for a prime power q, ( p 2 , p , p ) FR codes using non-cyclic RDS with parameters ( p , p , p , 1 ) for an odd prime p or p = 4 and ( 4 l , 2 l , 2 l ) FR codes using non-cyclic RDS with parameters ( 2 l , 2 l , 2 l , 1 ) constructed from the Galois ring for a positive integer l. They are differentiated from the existing FR codes with respect to the constructable code parameters. It turns out that the proposed FR codes are (near) optimal for some parameters in terms of the FR capacity bound. Especially, ( 8 , 3 , 3 ) and ( 9 , 3 , 3 ) FR codes are optimal, that is, they meet the FR capacity bound for all k. To support various code parameters, we modify the proposed ( q 2 - 1 , q , q ) FR codes using decimation by a factor of the code length q 2 - 1 , which also gives us new good FR codes. Full article
(This article belongs to the Section Information Theory, Probability and Statistics)
Show Figures

Figure 1

Figure 1
<p>Structure of a <math display="inline"> <semantics> <mrow> <mo>[</mo> <mo>(</mo> <mn>7</mn> <mo>,</mo> <mn>6</mn> <mo>)</mo> <mo>,</mo> <mn>3</mn> <mo>,</mo> <mo>(</mo> <mn>7</mn> <mo>,</mo> <mn>3</mn> <mo>,</mo> <mn>3</mn> <mo>)</mo> <mo>]</mo> </mrow> </semantics> </math> distributed replication-based exact simple storage (DRESS) code.</p>
Full article ">Figure 2
<p>Comparison of the number of data symbols to be stored in the proposed fractional repetition (FR) codes with the minimum bandwidth regenerating (MBR) capacity and the FR capacity bound. (<b>a</b>) <math display="inline"> <semantics> <mrow> <mo>(</mo> <mn>8</mn> <mo>,</mo> <mn>3</mn> <mo>,</mo> <mn>3</mn> <mo>)</mo> </mrow> </semantics> </math> and <math display="inline"> <semantics> <mrow> <mo>(</mo> <mn>9</mn> <mo>,</mo> <mn>3</mn> <mo>,</mo> <mn>3</mn> <mo>)</mo> </mrow> </semantics> </math> FR codes; (<b>b</b>) <math display="inline"> <semantics> <mrow> <mo>(</mo> <mn>15</mn> <mo>,</mo> <mn>4</mn> <mo>,</mo> <mn>4</mn> <mo>)</mo> </mrow> </semantics> </math> and <math display="inline"> <semantics> <mrow> <mo>(</mo> <mn>16</mn> <mo>,</mo> <mn>4</mn> <mo>,</mo> <mn>4</mn> <mo>)</mo> </mrow> </semantics> </math> FR codes; (<b>c</b>) <math display="inline"> <semantics> <mrow> <mo>(</mo> <mn>24</mn> <mo>,</mo> <mn>5</mn> <mo>,</mo> <mn>5</mn> <mo>)</mo> </mrow> </semantics> </math> and <math display="inline"> <semantics> <mrow> <mo>(</mo> <mn>25</mn> <mo>,</mo> <mn>5</mn> <mo>,</mo> <mn>5</mn> <mo>)</mo> </mrow> </semantics> </math> FR codes.</p>
Full article ">Figure 2 Cont.
<p>Comparison of the number of data symbols to be stored in the proposed fractional repetition (FR) codes with the minimum bandwidth regenerating (MBR) capacity and the FR capacity bound. (<b>a</b>) <math display="inline"> <semantics> <mrow> <mo>(</mo> <mn>8</mn> <mo>,</mo> <mn>3</mn> <mo>,</mo> <mn>3</mn> <mo>)</mo> </mrow> </semantics> </math> and <math display="inline"> <semantics> <mrow> <mo>(</mo> <mn>9</mn> <mo>,</mo> <mn>3</mn> <mo>,</mo> <mn>3</mn> <mo>)</mo> </mrow> </semantics> </math> FR codes; (<b>b</b>) <math display="inline"> <semantics> <mrow> <mo>(</mo> <mn>15</mn> <mo>,</mo> <mn>4</mn> <mo>,</mo> <mn>4</mn> <mo>)</mo> </mrow> </semantics> </math> and <math display="inline"> <semantics> <mrow> <mo>(</mo> <mn>16</mn> <mo>,</mo> <mn>4</mn> <mo>,</mo> <mn>4</mn> <mo>)</mo> </mrow> </semantics> </math> FR codes; (<b>c</b>) <math display="inline"> <semantics> <mrow> <mo>(</mo> <mn>24</mn> <mo>,</mo> <mn>5</mn> <mo>,</mo> <mn>5</mn> <mo>)</mo> </mrow> </semantics> </math> and <math display="inline"> <semantics> <mrow> <mo>(</mo> <mn>25</mn> <mo>,</mo> <mn>5</mn> <mo>,</mo> <mn>5</mn> <mo>)</mo> </mrow> </semantics> </math> FR codes.</p>
Full article ">Figure 3
<p>Comparison of the number of data symbols to be stored in the proposed (24, 4, 4) FR codes with the MBR capacity and the FR capacity bound with the same size.</p>
Full article ">
Back to TopTop