159 research outputs found

    On ZpZp[u, v]-additive cyclic and constacyclic codes

    Full text link
    Let Zp\mathbb{Z}_{p} be the ring of residue classes modulo a prime pp. The ZpZp[u,v]\mathbb{Z}_{p}\mathbb{Z}_{p}[u,v]-additive cyclic codes of length (α,β)(\alpha,\beta) is identify as Zp[u,v][x]\mathbb{Z}_{p}[u,v][x]-submodule of Zp[x]/⟨xα−1⟩×Zp[u,v][x]/⟨xβ−1⟩\mathbb{Z}_{p}[x]/\langle x^{\alpha}-1\rangle \times \mathbb{Z}_{p}[u,v][x]/\langle x^{\beta}-1\rangle where Zp[u,v]=Zp+uZp+vZp\mathbb{Z}_{p}[u,v]=\mathbb{Z}_{p}+u\mathbb{Z}_{p}+v\mathbb{Z}_{p} with u2=v2=uv=vu=0u^{2}=v^{2}=uv=vu=0. In this article, we obtain the complete sets of generator polynomials, minimal generating sets for cyclic codes with length β\beta over Zp[u,v]\mathbb{Z}_{p}[u,v] and ZpZp[u,v]\mathbb{Z}_{p}\mathbb{Z}_{p}[u,v]-additive cyclic codes with length (α,β)(\alpha,\beta) respectively. We show that the Gray image of ZpZp[u,v]\mathbb{Z}_{p}\mathbb{Z}_{p}[u,v]-additive cyclic code with length (α,β)(\alpha,\beta) is either a QC code of length 4α4\alpha with index 44 or a generalized QC code of length (α,3β)(\alpha,3\beta) over Zp\mathbb{Z}_{p}. Moreover, some structural properties like generating polynomials, minimal generating sets of ZpZp[u,v]\mathbb{Z}_{p}\mathbb{Z}_{p}[u,v]-additive constacyclic code with length (α,p−1)(\alpha,p-1) are determined.Comment: It is submitted to the journa

    An anti-malware product test orchestration solution for multiple pluggable environments

    Get PDF
    The term automation gets thrown around a lot these days in the software industry. However, the recent change in test automation in the software engineering process is driven by multiple factors such as environmental factors, both external and internal as well as industry-driven factors. Simply, what we all understand about automation is - the use of some technologies to operate a task. The choice of the right tools, be it in-house or any third-party software, can increase effectiveness, efficiency and coverage of the security product testing. Often, test environments are maintained at various stages in the testing process. Developer’s test, dedicated test, integration test and pre-production or business readiness test are some common phrases in software testing. On the other hand, abstraction is often included between different architectural layers, ever-changing providers of virtualization platforms such as VMWare, OpenStack, AWS as test execution environments and many others with a different state of maintainability. As there is an obvious mismatch in configuration between development, testing and production environment; software testing process is often slow and tedious for many organizations due to the lack of collaboration between IT Operations and Software Development teams. Because of this, identifying and addressing test environmentrelated compatibility becomes a major concern for QA teams. In this context, this thesis presents a DevOps approach and implementation method of an automated test execution solution named OneTA that can interact with multiple test environments including isolated malware test environments. The study was performed to identify a common way of preparing test environments in in-house and publicly available virtualization platforms where distributed tests can run on a regular basis. The current solution allows security product testing in multiple pluggable environments in a single setup utilizing the modern DevOps practice to result minimum efforts. This thesis project was carried out in collaboration with F-Secure, a leading cyber security company in Finland. The project deals with the company’s internal environments for test execution. It explores the available infrastructures so that software development team can use this solution as a test execution tool

    New Quantum and LCD Codes over Finite Fields of Even Characteristic

    Get PDF
    For an integer m ≥ 1, we study cyclic codes of length l over a commutative non-chain ring F2m + uF2m , where u2 = u . With a new Gray map and Euclidean dual-containing cyclic codes, we provide many new and superior codes to the best-known quantum error-correcting codes. Also, we characterise LCD codes of length l with respect to their generator polynomials and prove that F2m − image of an LCD code of length l is an LCD code of length 2l . Finally, we provide several optimal LCD codes from the Gray images of LCD codes over F2m + uF2m . &nbsp

    Constacyclic codes of length 4ps4p^s over the Galois ring GR(pa,m)GR(p^a,m)

    Full text link
    For prime pp, GR(pa,m)GR(p^a,m) represents the Galois ring of order pamp^{am} and characterise pp, where aa is any positive integer. In this article, we study the Type (1) λ\lambda-constacyclic codes of length 4ps4p^s over the ring GR(pa,m)GR(p^a,m), where λ=ξ0+pξ1+p2z\lambda=\xi_0+p\xi_1+p^2z, ξ0,ξ1∈T(p,m)\xi_0,\xi_1\in T(p,m) are nonzero elements and z∈GR(pa,m)z\in GR(p^a,m). In first case, when λ\lambda is a square, we show that any ideal of Rp(a,m,λ)=GR(pa,m)[x]⟨x4ps−λ⟩\mathcal{R}_p(a,m,\lambda)=\frac{GR(p^a,m)[x]}{\langle x^{4p^s}-\lambda\rangle} is the direct sum of the ideals of GR(pa,m)[x]⟨x2ps−δ⟩\frac{GR(p^a,m)[x]}{\langle x^{2p^s}-\delta\rangle} and GR(pa,m)[x]⟨x2ps+δ⟩\frac{GR(p^a,m)[x]}{\langle x^{2p^s}+\delta\rangle}. In second, when λ\lambda is not a square, we show that Rp(a,m,λ)\mathcal{R}_p(a,m,\lambda) is a chain ring whose ideals are ⟨(x4−α)i⟩⊆Rp(a,m,λ)\langle (x^4-\alpha)^i\rangle\subseteq \mathcal{R}_p(a,m,\lambda), for 0≤i≤aps0\leq i\leq ap^s where αps=ξ0\alpha^{p^s}=\xi_0. Also, we prove the dual of the above code is ⟨(x4−α−1)aps−i⟩⊆Rp(a,m,λ−1)\langle (x^4-\alpha^{-1})^{ap^s-i}\rangle\subseteq \mathcal{R}_p(a,m,\lambda^{-1}) and present the necessary and sufficient condition for these codes to be self-orthogonal and self-dual, respectively. Moreover, the Rosenbloom-Tsfasman (RT) distance, Hamming distance and weight distribution of Type (1) λ\lambda-constacyclic codes of length 4ps4p^s are obtained when λ\lambda is not a square.Comment: This article has 18 pages and ready to submit in a journa

    Impact of Correlation and Pointing Error on Secure Outage Performance over Arbitrary Correlated Nakagami Turbulent Fading Mixed RF-FSO Channel

    Get PDF
    Funding Information: Manuscript received September 8, 2020; revised February 11, 2021; accepted February 14, 2021. Date of publication February 16, 2021; date of current version March 10, 2021. This research was supported in part by the National Research Foundation of Korea grant funded by the Korean government (Ministry of Science and ICT; 2019R1A2C1083988), in part by the Ministry of Science and ICT, Korea, under the Information Technology Research Center support program (IITP-2020-2016-0-00313) supervised by the Institute for Information & Communications Technology Planning & Evaluation, and in part by Sejong University through its faculty research program (20212023). (Sheikh Habibul Islam, A. S. M. Badrud-duza, and S. M. R. Islam contributed equally to this work and co-first authors.) Corresponding authors: A. S. M. Badrudduza; Heejung Yu (e-mail: [email protected]; [email protected]).)Peer reviewedPublisher PD

    Semi Wireless Underwater Rescue Drone with Robotic Arm

    Get PDF
    Wireless communication with underwater drones plays a vital role in rescuing an after-ship accident, and it is considered one of the most challenging technologies nowadays. The wireless underwater drone also contributes significantly to navy, gas and oil companies, underwater infrastructure, aquaculture industry, commercial diving, and deep archeological investigations. Bangladesh, a developing country with many rivers and seashores used by many water transport vehicles, faces boat and ship accidents as a typical scenario every year. Many lives, dead bodies, ships, boats, and valuable objects do not get rescued because of the lifetime risk of the divers or the rescue team. The rescue operation is exceptionally troublesome because of the absence of wireless underwater drone technology at the cheapest cost, whose innovation and function are very challenging for Bangladesh. Considering these problematic situations, in this paper, we have proposed a prototype of a semi wireless underwater drone designed and structured with the best quality PVC pipe of 6mm diameter, considering the weight as lowest as possible, maintaining its buoyancy properly. In this prototype, we have used three propellers, each connected with three servo motors, to move it up, down, back, and forth. A robotic arm is also utilized to rescue objects from under the water, and a 4K HD EKEN camera and two waterproof fog lights to search and visualize underwater objects on the mobile screen from the land. For wireless communication between the controller and the drone, we have used two nRF24L01 modules; one is for the controller, and the other is for the drone’s receiver to send and obtain the signals from the controller to the drone. 12V and 24V lithium-ion batteries are employed as power sources for the controller and receiver, respectively. Finally, real experimental tests of the proposed underwater device were performed in a swimming pool facility
    • …
    corecore