Published in last 50 years
Articles published on Dual Code
- New
- Research Article
- 10.1103/qzd2-b2mx
- Nov 5, 2025
- Physical Review A
- En-Jui Chang
Quantum dual extended Hamming code immune to collective coherent errors
- Research Article
- 10.20516/classic.2025.70.5
- Aug 31, 2025
- The Research of the Korean Classic
- Eun-Il Kim
This study aims to analyze the reception and significance of the character Gwak Bunyang in the Mongokssangbongyeonrok and GwakJangYangmunrok Series. This series is a Korean full-length novel depicting the story of Jang Hong and his descendants. Its literary and historical value is underscored by the fact that Lady Seong, a royal concubine of King Jeongjo, transcribed GwakJangYangmunrok, which enables scholars to estimate the time of its transcription and offers insight into the appreciation of Korean long novels within the royal court. The series consists of two parts: Mongokssangbongyeonrok, which centers on the heroic deeds and marriage of Jang Hong, and GwakJangYangmunrok, which focuses on the marriages of his descendants. Since Gwak Bunyang’s family is portrayed as one of the key families connected to Jang Hong and his descendants through marriage, it is essential to examine how Gwak Bunyang is depicted in the narrative. The modes of reception of Gwak Bunyang in Mongokssangbongyeonrok and GwakJangYangmunrok differ. In Mongokssangbongyeonrok, he is framed chiefly as a military hero. On the other hand, in GwakJangYangmunrok, he is cast as the head of the lineage. This contrast aligns with late-Joseon patterns of cultural enjoyment in the court and literati households. The shift visible in Gwak Bunyang Haengnakdo—from emphasizing martial prowess to highlighting prosperity and blessing—parallels the series’ separate narrativization of “heroic” and “prosperous” Gwak Bunyang. Haengnakdo was especially popular at court and among elites, a fact that resonates with the palace transcription of the Mongokssang- bongyeonrok-GwakJangYangmunrok series. This indicates that the cultural code centered on Gwak Bunyang operated not only in painting but also in narrative; the series likely mobilized that code as a narrative strategy. Whereas paintings and short fiction tend to isolate a single code, the linked form of the series keeps the “military” and “prosperity/blessing” strands apart at the work level yet integrates them as a dual code at the level of the whole. Accordingly, the series is significant not only to the history of the Korean long novel but also to broader cultural-historical currents.
- Research Article
- 10.1097/mm9.0000000000000021
- Aug 13, 2025
- MedMat
- Wenzhen Yin + 3 more
ECM hybrid scaffolds decipher the dual code of organ aging
- Research Article
- 10.3390/math13152491
- Aug 2, 2025
- Mathematics
- Stefka Bouyuklieva + 1 more
The hull of a linear code C is the intersection of C with its dual code. The goal is to study the dimensions of the hulls of optimal binary and ternary linear codes for a given length and dimension. The focus is on the lengths at which self-orthogonal (respectively, LCD) optimal codes exist at fixed dimension.
- Research Article
- 10.1016/j.chaos.2025.116475
- Aug 1, 2025
- Chaos, Solitons & Fractals
- Gang Zhang + 3 more
Denoising-enhanced differential chaos shift keying with joint dual orthogonal codes and time-frequency index modulation
- Research Article
- 10.11591/ijai.v14.i4.pp2776-2787
- Aug 1, 2025
- IAES International Journal of Artificial Intelligence (IJ-AI)
- Hicham Tahiri Alaoui + 2 more
<span lang="EN-US">This paper proposes a new approach to soft decoding for linear block codes called dual simulated annealing soft decoder (DSASD) which utilizes the dual code instead of the original code, using the <a name="_Hlk199254578"></a>simulated annealing algorithm as presented in a previously developed work. The DSASD algorithm demonstrates superior decoding performance across a wide range of codes, outperforming classical simulated annealing and several other tested decoders. We conduct a comprehensive evaluation of the proposed algorithm's performance, optimizing its parameters to achieve the best possible results. Additionally, we compare its decoding performance and algorithmic complexity with other decoding algorithms in its category. Our results demonstrate a gain in performance of approximately 2.5 dB at a bit error rate (BER) of 6×10⁻⁶ for the LDPC (60,30) code.</span>
- Research Article
- 10.1007/s40314-025-03287-8
- Jun 30, 2025
- Computational and Applied Mathematics
- Sihem Mesnager + 1 more
The construction of linear codes from functions in finite fields has been widely studied in the literature. There are two generic construction methods: the first and second generic construction methods for generating linear codes from functions over finite fields. In this paper, we first define the augmented code construction of the variation of the second generic construction method and then present new infinite families of four- and five-weight self-orthogonal divisible codes derived from trace functions. Moreover, by using the augmented code construction based on the first generic construction method, we construct new infinite families of three-weight and four-weight self-orthogonal divisible codes from weakly regular plateaued functions. We determine all parameters of the constructed self-orthogonal codes as well as their dual codes over the odd characteristic finite fields. We present Hamming weights and their weight distributions for the constructed self-orthogonal codes. Additionally, we utilise the constructed p-ary self-orthogonal codes to develop p-ary Linear Complementary Dual (LCD) codes and determine the parameters of the obtained LCD codes and their dual codes.
- Research Article
- 10.1145/3728952
- Jun 22, 2025
- Proceedings of the ACM on Software Engineering
- Yuan Xiao + 9 more
Watermarking is a technique to help identify the source of data points, which can be used to help prevent the misuse of protected datasets. Existing methods on code watermarking, leveraging the idea from the backdoor research, embed stealthy triggers as watermarks. Despite their high resilience against dilution attacks and backdoor detections, the robustness has not been fully evaluated. To fill this gap, we propose DeCoMa , a dual-channel approach to De tect and purify Co de dataset water Ma rks. To overcome the high barrier created by the stealthy and hidden nature of code watermarks, DeCoMa leverages dual-channel constraints on code to generalize and map code samples into standardized templates. Subsequently, DeCoMa extracts hidden watermarks by identifying outlier associations between paired elements within the standardized templates. Finally, DeCoMa purifies the watermarked dataset by removing all samples containing the detected watermark, enabling the silent appropriation of protected code. We conduct extensive experiments to evaluate the effectiveness and efficiency of DeCoMa, covering 14 types of code watermarks and 3 representative intelligent code tasks (a total of 14 scenarios). Experimental results demonstrate that DeCoMa achieves a stable recall of 100% in 14 code watermark detection scenarios, significantly outperforming the baselines. Additionally, DeCoMa effectively attacks code watermarks with embedding rates as low as 0.1%, while maintaining comparable model performance after training on the purified dataset. Furthermore, as DeCoMa requires no model training for detection, it achieves substantially higher efficiency than all baselines, with a speedup ranging from 31.5 to 130.9×. The results call for more advanced watermarking techniques for code models, while DeCoMa can serve as a baseline for future evaluation.
- Research Article
- 10.1007/s12190-025-02539-4
- Jun 17, 2025
- Journal of Applied Mathematics and Computing
- Yan Liu + 3 more
Formally self-dual linear complementary dual codes associated with Toeplitz matrices
- Research Article
- 10.1007/s11424-025-4313-2
- Jun 1, 2025
- Journal of Systems Science and Complexity
- Yansheng Wu + 2 more
Linear Complementary Dual Codes Constructed from Reinforcement Learning
- Research Article
- 10.1007/s00200-025-00693-7
- May 21, 2025
- Applicable Algebra in Engineering, Communication and Computing
- Gyanendra K Verma + 1 more
Construction of additive complementary dual codes over finite fields
- Research Article
- 10.1007/s00200-025-00687-5
- Apr 15, 2025
- Applicable Algebra in Engineering, Communication and Computing
- Virginio Fratianni
Dual and Hull code in the first two generic constructions and relationship with the Walsh transform of cryptographic functions
- Research Article
- 10.1142/s1793830925500454
- Apr 5, 2025
- Discrete Mathematics, Algorithms and Applications
- Juan Li + 1 more
In this paper, we study a type of mixed alphabet codes, called [Formula: see text]-linear codes, where [Formula: see text] with [Formula: see text]. First, we define and discuss several weight enumerators of [Formula: see text]-linear codes, including Hamming weight, Lee weight and symmetrized weight enumerators. MacWilliams identity connects the weight enumerator of codes and their dual codes. Further, we present the MacWilliams identities about Lee weight and complete weight over the ring [Formula: see text]. Finally, several examples are presented to illustrate our main results.
- Research Article
- 10.56557/ajomcor/2025/v32i39228
- Apr 5, 2025
- Asian Journal of Mathematics and Computer Research
- Ke Wang
Let \(\mathbb{F}\)q be a finite field with q elements where q be a prime power. Among the classes of constacyclic codes of length 5ℓps over \(\mathbb{F}\)q we define an equivalence relation such that the classes of constacyclic codes which have the same structure are viewed to be equivalent. In this paper we classify the classes of constacyclic codes of length 5ℓ and give the explicit generator polynomials of all the constacyclic codes and their dual codes.
- Research Article
- 10.1016/j.jmb.2025.169130
- Apr 1, 2025
- Journal of molecular biology
- Clil Regev + 2 more
ERK Allosteric Activation: The Importance of Two Ordered Phosphorylation Events.
- Research Article
- 10.1101/2025.02.27.640630
- Mar 2, 2025
- bioRxiv
- Clil Regev + 2 more
ERK, a coveted proliferation drug target, is a pivotal kinase in the Ras/ERK signaling cascade. Despite this, crucial questions about its activation have not been fully explored on the foundational, conformational level. Such questions include (i)Why ERK’s activation demands dual phosphorylation; (ii)What is the role of each phosphorylation site in the activation loop; and (iii)Exactly how the (ordered) phosphorylation steps affect the conformational ensembles of the activation loop,their propensities and restriction to a narrower range favoring ERK’s catalytic action. Here we used explicit molecular dynamics simulations to study ERK’s stability and the conformational changes in different stages along the activation process. The initial monophosphorylation event elongates the activation loop to enable the successive phosphorylations, which reintroduce stability/compactness through newly formed salt bridges. The interactions formed by the monophosphorylation are site-dependent, with threonine’s phosphorylation presenting stronger electrostatic interactions compared to tyrosine’s. Dual phosphorylated ERKs revealed a compact kinase structure which allows the HRD catalytic motif to stabilize the ATP. We further observe that the hinge and the homodimerization binding site responded to a tri-state signaling code based solely on the phosphorylation degree (unphosphorylated, monophosphorylated, dual phosphorylated) of the activation loop, confirming that the activation loop can allosterically influence distant regions. Last, our findings indicate that threonine phosphorylation as the second step is necessary for ERK to become effectively activated and that activation depends on the phosphorylation order. Collectively, we offer ERK’s dual allosteric phosphorylation code in activation and explain why the phosphorylation site order is crucial.
- Research Article
- 10.1109/tit.2024.3521094
- Mar 1, 2025
- IEEE Transactions on Information Theory
- Alonso S Castellanos + 2 more
Linear Complementary Dual Codes and Linear Complementary Pairs of AG Codes in Function Fields
- Research Article
- 10.1142/s0219498825410105
- Feb 13, 2025
- Journal of Algebra and Its Applications
- G Lavanya + 1 more
On quasi-abelian codes over finite commutative chain rings and their dual codes
- Research Article
3
- 10.1109/tpami.2024.3467130
- Jan 1, 2025
- IEEE transactions on pattern analysis and machine intelligence
- Bin Zhang + 6 more
Hashing technology has exhibited great cross-modal retrieval potential due to its appealing retrieval efficiency and storage effectiveness. Most current supervised cross-modal retrieval methods heavily rely on accurate semantic supervision, which is intractable for annotations with ever-growing sample sizes. By comparison, the existing unsupervised methods rely on accurate sample similarity preservation strategies with intensive computational costs to compensate for the lack of semantic guidance, which causes these methods to lose the power to bridge the semantic gap. Furthermore, both kinds of approaches need to search for the nearest samples among all samples in a large search space, whose process is laborious. To address these issues, this paper proposes an unsupervised dual deep hashing (UDDH) method with semantic-index and content-code for cross-modal retrieval. Deep hashing networks are utilized to extract deep features and jointly encode the dual hashing codes in a collaborative manner with a common semantic index and modality content codes to simultaneously bridge the semantic and heterogeneous gaps for cross-modal retrieval. The dual deep hashing architecture, comprising the head code on semantic index and tail codes on modality content, enhances the efficiency for cross-modal retrieval. A query sample only needs to search for the retrieved samples with the same semantic index, thus greatly shrinking the search space and achieving superior retrieval efficiency. UDDH integrates the learning processes of deep feature extraction, binary optimization, common semantic index, and modality content code within a unified model, allowing for collaborative optimization to enhance the overall performance. Extensive experiments are conducted to demonstrate the retrieval superiority of the proposed approach over the state-of-the-art baselines.
- Research Article
- 10.1109/tit.2024.3487227
- Jan 1, 2025
- IEEE Transactions on Information Theory
- Chunyu Gan + 4 more
Improved Lower Bounds on the Minimum Distances of the Dual Codes of Primitive Narrow-Sense BCH Codes