We investigate the counterparts of random walk in universal quantum computing and their implementation using standard quantum circuits. Quantum walk have been recently well investigated for traversing graphs with certain oracles. We focus... more
Quantum error-correcting code for higher dimensional systems can, in general, be directly constructed from the codes for qubit systems. What remains unknown is whether there exist efficient code design techniques for higher dimensional... more
Multi-valued quantum systems can store more information than binary ones for a given number of quantum states. For reliable operation of multi-valued quantum systems, error correction is mandated. In this paper, we propose a 5qutrit... more
Quantum states have high affinity for errors and hence error correction is of utmost importance to realise a quantum computer. Laflamme showed that 5 qubits are necessary to correct a single error on a qubit. In a Pauli error model, four... more
Quantum error-correcting code for higher dimensional systems can, in general, be directly constructed from the codes for qubit systems. What remains unknown is whether there exist efficient code design techniques for higher dimensional... more
Errors in surface code have typically been decoded by Minimum Weight Perfect Matching (MWPM) based method. Recently, neural-network-based Machine Learning (ML) techniques have been employed for this purpose, although how an ML decoder... more
Science is a subject that sparks curiosity and nurtures analytical skills in children, yet many young learners struggle. A good science tuition centre for primary provides structured guidance, simplified explanations, and engaging lessons... more
A procedure is developed to automatically correct the bit flip and the arbitrary phase change errors in Generalized Bell states (GBS). The phase and parity characteristics of the GBS are encoded in ancilla bits without altering the state... more
Quantum error correcting codes (QECC) are the key ingredients both for fault-tolerant quantum computation and quantum communication. Teleportation-based error correction (TEC) helps in detecting and correcting operational and erasure... more
Quantum Simulation of Klein Gordon Equation and Observation of Klein Paradox in IBM Quantum Computer
The Klein Gordon equation was the first attempt at unifying special relativity and quantum mechanics. While initially discarded this equation of "many fathers" can be used in understanding spinless particles that consequently... more
Experimental realization of automated error correction is demonstrated through IBM Quantum Experience for Bell and GHZ states using a measurement based approach upon ancilla qubits. The measurement automatically activates error correcting... more
In this letter, we conceive a multi-layered coding scheme for the recently proposed Layered Asymmetrically Clipped Optical Orthogonal Frequency Division Multiplexing (LACO-OFDM) system, which exploits its layered structure for protecting... more
Based on internal predictions, action-errors can be detected relatively early. Different kinds of sensory feedback further provide information about the occurrence of errors later on. To investigate the mechanisms underlying error... more
The parameters of the codes in Section 4 of our article are not correctly stated. The inequality in Proposition 5 should be with respect to the dual code C ⊥ s . The correct statement of Proposition 5 is Proposition 5 Assume that a... more
This paper studies the problem of increasing the efficiency in controlling burst errors that are caused by external noise in the context of digital data transmission. For this purpose, the utilization of special weighted check sum... more
Spectral Minutiae (SM) representation enables the combination of minutiae-based fingerprint recognition systems with template protection schemes based on fuzzy commitment, but it requires error-correcting codes that can handle high bit... more
The current error correction layer of IEEE 802.11a WLAN is designed for worst case scenarios, which often do not apply. In this paper, we propose a new opportunistic error correction layer based on Fountain codes and a resolution adaptive... more
Traditional Optical Character Recognition (OCR) systems that generate text of highly inflectional Indic languages like Hindi tend to suffer from poor accuracy due to a wide alphabet set, compound characters and difficulty in segmenting... more
A system for soft error detection and correction is proposed for digital Integrated Circuit (IC) implementation of convolution. The convolution is implemented in a Residue Number System using Fermat Number Theoretic Transforms. The... more
One of the main problems in quantum information systems is the presence of errors due to noise, and for this reason quantum error-correcting codes (QECCs) play a key role. While most of the known codes are designed for correcting generic... more
The component-wise or Schur product C ∗C of two linear error correcting codes C and C over certain finite field is the linear code spanned by all component-wise products of a codeword in C with a codeword in C. When C = C, we call the... more
A new strategy is proposed for implementing computationally intensive high-throughput decoders based on the long length irregular LDPC codes adopted in the DVB-S2 standard. It is supported on manycore graphics processing unit (GPU)... more
The authors present a new hybrid method for performing modular exponentiation using a hybrid ternaryquinary number system. A recent result concerning performing modular exponentiation with precomputation was presented by Dimitrov and... more
The error-resilient for video transmission over the Internet in which regarded as the packet erasure channel is always a tough task and has gained lots of attentions. The main contradictory problem lies between error-resilient and... more
Next Generation Sequencing (NGS) technologies produce massive amount of low cost data that is very much useful in genomic study and research. However, data produced by NGS is affected by different errors such as substitutions, deletions... more
In an attempt to enrich the lives of billions of people by providing proper information, security and a way of communicating with others, the need for efficient and improved satellites is constantly growing. Thus, there is an increasing... more
The error recovery problem in wireless sensor networks is studied from a generic resource‐constrained energy‐optimization perspective. To characterize the features of error recovery schemes that suit the majority of applications, an... more
Large-scale quantum computers will inevitably need quantum error correction to protect information against decoherence. Traditional error correction typically requires many qubits, along with high-efficiency error syndrome measurement and... more
Processing quantum information using quantum three-level systems or qutrits as the fundamental unit is an alternative to contemporary qubit-based architectures with the potential to provide significant computational advantages. We... more
Processing quantum information using quantum three-level systems or qutrits as the fundamental unit is an alternative to contemporary qubit-based architectures with the potential to provide significant computational advantages. We... more
Large-scale quantum computers will inevitably need quantum error correction to protect information against decoherence. Traditional error correction typically requires many qubits, along with high-efficiency error syndrome measurement and... more
Large-scale quantum computers will inevitably need quantum error correction (QEC) to protect information against decoherence. Given that the overhead of such error correction is often formidable, autonomous quantum error correction (AQEC)... more
The P-Bigram method is a string comparison methods base on an internal two characters-based similarity measure. The edit distance between two strings is the minimal number of elementary editing operations required to transform one string... more
A n ecient multicast hybrid ARQ scheme is proposed by incorporating the generalized minimum distance (GMD) decoding of maximum distance separable (MDS) codes with Metzner's scheme . Erroneous frames are stored in the receiver buer and... more
In this paper, we introduced a new type of Encryption and Error Correction scheme, which is called "A Combined Encryption and Turbo Coding Scheme: AES-TURBO". Although in previous studies error correction and encryption are handled... more
The universal secure network coding presented by Silva et al. realizes secure and reliable transmission of a secret message over any underlying network code, by using maximum rank distance codes. Inspired by their result, this paper... more
Transferring data is one of the key operations performed by millions of users every day. Users do this by issuing direct commands, such as file transfer commands, or indirectly as a feature invoked by numerous end-user applications. The... more
In this paper, we propose an Automatic Repeat reQuest (ARQ) technique for enhancing the reliability and throughput of broadband wireless Internet access applications, and provide examples of its performance. ARQ is a method for making a... more
Regenerating codes provide an efficient way to recover data at failed nodes in distributed storage systems. It has been shown that regenerating codes can be designed to minimize the per-node storage (called MSR) or minimize the... more
We describe a new way to organize a full search vector quantization codebook so that images encoded with it can be sent progressively and have resilience to channel noise. The codebook organization guarantees that the most signicant bits... more
A class of two-bit bit flipping algorithms for decoding low-density parity-check codes over the binary symmetric channel was proposed in . Initial results showed that decoders which employ a group of these algorithms operating in parallel... more
A new class of bit flipping algorithms for lowdensity parity-check codes over the binary symmetric channel is proposed. Compared to the regular (parallel or serial) bit flipping algorithms, the proposed algorithms employ one additional... more
Novel bitwise retransmission schemes are devised which retransmit only the bits received with small reliability. The retransmissions are used to accumulate the reliabilities of individual bits. Unlike the conventional automatic repeat... more
Novel bitwise retransmission schemes are devised which retransmit only the bits received with small reliability. The retransmissions are used to accumulate the reliabilities of individual bits. Unlike the conventional automatic repeat... more
This paper experimentally evaluates and models the error-caused security vulnerabilities and the resulting security violations on two Linux kernel firewalls: IPChains and Netfilter. There are two major aspects to this work: to conduct... more
Next Generation Sequencing (NGS) technologies produce massive amount of low cost data that is very much useful in genomic study and research. However, data produced by NGS is affected by different errors such as substitutions, deletions... more