Results 241 to 250 of about 2,148,225 (286)
Maximal avoidable sets of words(Algebraic Theory of Codes and Related Topics)
openaire
An Application of Set Theory to Coding Theory
"As high-speed electronic communication becomes commonplace, there is a tremendous need for better transmission schemes-ones that minimize the effect of inevitable transmission errors, ones that protect confidential or secret messages, ones that route messages most efficiently.
Noca Alon, Andy Liu
+4 more sources
Finding maximum independent sets in graphs arising from coding theory
New results are presented concerning binary correcting codes, such as deletion-correcting codes, transposition-correction codes, and codes for the Z-channel. These codes are important due to the possibility of packet loss and corruption on internet transmissions.
Sergiy Butenko +4 more
+4 more sources
Unknown Malicious Codes Detection Based on Rough Set Theory and Support Vector Machine
For detecting malicious codes, a classification method of support vector machine (SVM) based on rough set theory (RST) is proposed. The original sample data is preprocessed with the knowledge reduction algorithm of RST, and the redundant features and conflicting samples are eliminated from the working sample dataset to reduce space dimension of sample ...
null Boyun Zhang +4 more
+4 more sources
Application of coding theory to the construction of the Singer difference sets†
In this paper we give a new and simple construction for the cyclic [(q m − 1)/(q − 1), q m−1, q m−2(q− 1)]—difference sets (q = p γ is a prime power) using the methods of coding theory. The construction is such that, in the case q = 2, the 2-ranks of both the incidence matrix and its complementary matrix are easily determined.
HARRY T. HSU, JOHN E. OLSON
openaire +2 more sources
Probabilistic approach to attributes coding in the rough sets theory
Objects in an information system analyzed by the rough sets theory methods are characterized by attributes, which can take on a finite set of values only. In diagnostic experiments, condition attributes are usually treated as continuous variables, taking values from certain intervals.
A. Lenarcik, Z. Piasta, M. Masternak
openaire +2 more sources
Toward a Source Coding Theory for Sets
The problem of communicating (unordered) sets, rather than (ordered) sequences is formulated. Elementary results in all major branches of source coding theory, including lossless coding, high-rate and low-rate quantization, and rate distortion theory are presented. In certain scenarios, rate savings of log n!
L.R. Varshney, V.K. Goyal
openaire +2 more sources
New Malicious Code Detection Based on N-Gram Analysis and Rough Set Theory
Motivated by the standard signature-based technique for detecting viruses, we explore the idea of automatically detecting malicious code using the N-gram analysis. The method is based on statistical learning and not strictly dependent on certain viruses. We propose the use of rough set theory (RST) to reduce the feature dimension.
Boyun Zhang +4 more
openaire +2 more sources
This paper presents a novel approach to classification of decomposed cortical evoked potentials (EPs). The decomposition is based on learning of a sparse set of basis functions using an artificial neural network (ANN). The basis functions are generated according to a probabilistic model of the data.
G.M. Boratyn +3 more
openaire +2 more sources
A set $${\fancyscript{K}}$$ in $$\hbox {PG}(r,4), r \ge 2$$ ,
Taichiro Tanaka, Tatsuya Maruta
openaire +2 more sources

