Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Aspects of coding theory with two recent applications
Download
index.pdf
Date
2019
Author
Bodur, Şeyma
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
232
views
85
downloads
Cite This
Coding Theory is a deep subject having a lot of applications in different areas. In this thesis we explain some background for two recent applications: Code base Cryptography, Entanglement Assisted Quantum Error-Correcting Codes (EAQECC).
Subject Keywords
Coding theory.
,
Code Equivalence
,
Entaglement-Assisted Quantum Error Correcting Codes
,
Linear l-intersection pairs
,
Hulls
,
etc.
URI
http://etd.lib.metu.edu.tr/upload/12623641/index.pdf
https://hdl.handle.net/11511/43969
Collections
Graduate School of Applied Mathematics, Thesis
Suggestions
OpenMETU
Core
Computing cryptographic properties of Boolean functions from the algebraic normal orm representation
Çalık, Çağdaş; Doğanaksoy, Ali; Department of Cryptography (2013)
Boolean functions play an important role in the design and analysis of symmetric-key cryptosystems, as well as having applications in other fields such as coding theory. Boolean functions acting on large number of inputs introduces the problem of computing the cryptographic properties. Traditional methods of computing these properties involve transformations which require computation and memory resources exponential in the number of input variables. When the number of inputs is large, Boolean functions are ...
Investigation of Students’ Cognitive Processes in Computer Programming: A Cognitive Ethnography Study
Doğan, Sibel; Aslan, Orhan; Yıldırım, İbrahim Soner (2019-01-01)
The aim of the current study is to investigate how cognitive processes of students categorized as novice, semi-expert and expert differ in terms of creating pseudocode for a given programming task. To conduct this aim, cognitive ethnography research design was employed to reveal the cognitive process of the participants behind the specified task. In the study, three undergraduate students from a Computer Education and Instructional Technology (CEIT) department were included as participants. These students w...
Computation of Spectra of Large Networks
Erdem, Özge; Karasözen, Bülent (2010-11-27)
Many interacting complex systems in biology, physics, technology and social systems can be represented in a form of large networks. The networks are mathematically represented by graphs. A graph is usually represented by adjacency or Laplacian matrix. Many important features of the underlying structure and dynamics of them can be extracted from the analysis of the spectrum of graphs. Spectral analysis of the so called normalized Laplacian matrix of large networks has become popular in recent years. The Lapl...
Constructions of maximum rank distance codes, cyclic constant dimension codes, and subspace packings
Otal, Kamil; Özbudak, Ferruh; Department of Cryptography (2018)
In this thesis, we aim to introduce main contributions to solve three main problems in coding theory. The first problem investigates the construction of inequivalent maximum rank distance (MRD) codes. Namely, we look for the constructions of the largest possible sets of $mtimes n$ matrices over a finite field $F_q$, such that the rank of the subtraction of any two different matrices in the set cannot be smaller than a certain number. Constructions of such codes under a suitable equivalence notion have taken...
Evaluation of Agility Assessment Tools: A Multiple Case Study
Adali, Onat Ege; Özcan Top, Özden; Demirors, Onur (2016-06-10)
Agile software development has been one of the most important paradigms of software engineering community. Agile methods that are shaped around Agile Manifesto and principles, provide promising results when applied properly in software organizations. Agile assessment models and tools have potential to indicate agile adoption problems at project level or organization level. In the scope of this study, we identified 37 agility assessment tools. Among those tools, we evaluated 11 agility assessment tools based...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
Ş. Bodur, “Aspects of coding theory with two recent applications,” Thesis (M.S.) -- Graduate School of Applied Mathematics. Cryptography., Middle East Technical University, 2019.