This paper discusses the problem of decoding codeword in Reed- Muller Codes. We will use the Hadamard matrices as a method to decode codeword in Reed- Muller codes.In addition Reed- Muller Codes are defined and encoding matrices are discussed. Finally, a method of decoding is explained and an example is given to clarify this method, as well as, this method is compared with the classical method which is called Hamming distance.
MDS code is a linear code that achieves equality in the Singleton bound, and projective MDS (PG-MDS) is MDS code with independents property of any two columns of its generator matrix. In this paper, elementary methods for modifying a PG-MDS code of dimensions 2, 3, as extending and lengthening, in order to find new incomplete PG-MDS codes have been used over . Also, two complete PG-MDS codes over of length and 28 have been found.
Many of the elementary transformations of determinants which are used in their evaluation and in the solution of linear equations may by expressed in the notation of matrices. In this paper, some new interesting formulas of special matrices are introduced and proved that the determinants of these special matrices have the values zero. All formulation has been coded in MATLAB 7.
Future wireless systems aim to provide higher transmission data rates, improved spectral efficiency and greater capacity. In this paper a spectral efficient two dimensional (2-D) parallel code division multiple access (CDMA) system is proposed for generating and transmitting (2-D CDMA) symbols through 2-D Inter-Symbol Interference (ISI) channel to increase the transmission speed. The 3D-Hadamard matrix is used to generate the 2-D spreading codes required to spread the two-dimensional data for each user row wise and column wise. The quadrature amplitude modulation (QAM) is used as a data mapping technique due to the increased spectral efficiency offered. The new structure simulated using MATLAB and a comparison of performance for ser
... Show MoreHomomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show MoreIn this research, the possibility of using waste wooden materials (reed and sawdust) was studied to produce sustainable and thermal insulation lightweight building units , which has economic and environmental advantages. This study is intended to produce light weight building units with low thermal conductivity, so it can be used as partitions to improve the thermal insulation in buildings. Waste wooden materials were used as a partial replacement of natural sand, in different percentages (10, 20, 30, and 40) % . The mix proportions were (1:2.5) (cement: fine aggregate) with w/c of 0.4. The values of 28 days oven dry density ranged between (2060-1693) kg/m3.The thermal conductivity decreased from (0.745 to 0.2
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreThis study investigated the feasibility of anaerobic co-digestion of giant reed (GR) inoculated with waste manure as a co-substrate for biogas production. The performance of co-digestion was evaluated in 4 anaerobic digesters operated in batch mode at different conditions. The effects of alkali pretreatment with NaOH (4% w/v) solution, inoculum type, and thermal condition were studied. The results demonstrated that the alkali-pretreatment of GR enhanced the biogas generation by about 15% at mesophilic conditions. Thermophilic conditions enhanced the biogas recovery from both alkali-free and alkali pretreated GR by 15% and 127%, respectively. The kinetic study of the co-digestion process of GR for biogas recovery suggeste
... Show More