Contents


Preface

Coding theory consists of techniques that enable the reliable delivery of digital data over unreliable communication channels. Such techniques allow coding, while decoding enables the reconstruction of the original data in many cases. These techniques have various applications in a variety of fields including computer science and telecommunication. These techniques also enrich the areas of information theory and error detection with various other real-life applications. This comprehensive book explores the latest developments, methods, approaches, and applications of coding theory in a wide variety of fields and endeavors. It is compiled with a view to provide researchers, academicians, and other interested readers with an in-depth discussion of the latest advances in the field. It consists

Chapter 1, "Abel and Euler Summation Formulas for *SBV*() Functions" by

Chapter 3, "Dynamic HUB Selection Process in Wireless Body Area Network

Chapter 4, "How Do Web-Active End-User Programmers Forage?" by Sandeep Kaur Kuttal, Abim Sedhain, and Benjamin Riethmeier, discusses the programming behavior of web-active end-users and informs researchers and professionals on how to create better support for the debugging process, which can be adapted by researchers to understand other aspects of programming such as implementing,

Chapter 5, "A Public Key Cryptosystem Using Cyclotomic Matrices " by Md. Helal Ahmed, Jagmohan Tanti and Sumant Pushp, proposes an arithmetic approach for

Chapter 6, "Conversational Code Analysis: The Future of Secure Coding" by Fitzroy Nembhard and Marco M. Carvalho looks at the limitations of existing approaches to secure coding and proposes a methodology that allows programmers to scan and fix vulnerabilities in program code by communicating with virtual

Sergio Venturini, focuses on the natural setting for various Abel and Euler-Maclaurin

Chapter 2, "Algebraic Approximations to Partial Group Structures" by Özen Özer, algebraically demonstrates some structures of partial groups (Clifford Semigroup).

(WBAN)" by Mahammad Firose Shaik, M. Monica Subhashini and G. Jaya Amrutha, deals with wireless sensor nodes placed in, on, or around the human body to create wireless body area networks (WBANs), which are used for collecting physiological

of seven chapters that address a variety of subjects.

summation formulas and their applications.

and vital signals from humans in real-time.

reusing, and maintaining code.

assistants on their smart devices.

designing asymmetric key cryptography.
