Zobrazeno 1 - 10
of 3 365
pro vyhledávání: '"SHARMA, R. K."'
The classification performance of the random vector functional link (RVFL), a randomized neural network, has been widely acknowledged. However, due to its shallow learning nature, RVFL often fails to consider all the relevant information available in
Externí odkaz:
http://arxiv.org/abs/2409.04743
Autor:
Agrawal, Astha, Sharma, R. K.
This article explores additive codes with one-rank hull, offering key insights and constructions. The article introduces a novel approach to finding one-rank hull codes over finite fields by establishing a connection between self-orthogonal elements
Externí odkaz:
http://arxiv.org/abs/2310.08074
Autor:
Choudhary, Aakash, Sharma, R. K.
Given $\mathbb{F}_{q^{n}}$, a field with $q^n$ elements, where $q $ is a prime power and $n$ is positive integer. For $r_1,r_2,m_1,m_2 \in \mathbb{N}$, $k_1,k_2 \in \mathbb{N}\cup \{0\}$, a rational function $F = \frac{F_1}{F_2}$ in $\mathbb{F}_{q}[x
Externí odkaz:
http://arxiv.org/abs/2304.08749
Autor:
Agrawal, Astha, Sharma, R. K.
The applications of additive codes mainly lie in quantum error correction and quantum computing. Due to their applications in quantum codes, additive codes have grown in importance. In addition to this, additive codes allow the implementation of a va
Externí odkaz:
http://arxiv.org/abs/2304.07529
Autor:
Verma, Gyanendra K., Sharma, R. K.
Shi et al. [Additive complementary dual codes over F4. Designs, Codes and Cryptography, 2022.] studied additive codes over the finite field F4 with respect to trace Hermitian and trace Euclidean inner products. In this article, we define additive cod
Externí odkaz:
http://arxiv.org/abs/2302.11791
Autor:
Choudhary, Aakash, Sharma, R. K.
Given $F= \mathbb{F}_{p^{t}}$, a field with $p^t$ elements, where $p $ is a prime power, $t\geq 7$, $n$ are positive integers and $f=f_1/f_2$ is a rational function, where $f_1, f_2$ are relatively prime, irreducible polynomials with $deg(f_1) + deg(
Externí odkaz:
http://arxiv.org/abs/2301.02381
Autor:
Arora, Neha, Sharma, R. K.
A designated verifier signature scheme allows a signer to generate a signature that only the designated verifier can verify. This paper proposes multi-signer strong designated multi-verifier signature schemes based on multiple cryptographic algorithm
Externí odkaz:
http://arxiv.org/abs/2209.03682
A $(t,m)$-threshold secret sharing and multisecret-sharing scheme based on Shamir's SSS are introduced with two-level security using a one-way function. Besides we give its application in smart contract-enabled consortium blockchain network. The prop
Externí odkaz:
http://arxiv.org/abs/2209.03670
In this article, first we present a method for constructing many Hermitian LCD codes from a given Hermitian LCD code, and then provide several methods which utilize either a given [n, k, d] linear code or a given [n, k, d] Galois LCD code to construc
Externí odkaz:
http://arxiv.org/abs/2208.07708