Results 291 to 300 of about 3,822,513 (334)

Maximal avoidable sets of words(Algebraic Theory of Codes and Related Topics)

open access: yesMaximal avoidable sets of words(Algebraic Theory of Codes and Related Topics)
openaire  

An Application of Set Theory to Coding Theory

open access: closedMathematics Magazine, 1989
"As high-speed electronic communication becomes commonplace, there is a tremendous need for better transmission schemes-ones that minimize the effect of inevitable transmission errors, ones that protect confidential or secret messages, ones that route messages most efficiently.
Noca Alon, Andy Liu
  +5 more sources

Application of coding theory to the construction of the Singer difference sets†

open access: closedInternational Journal of Control, 1973
In this paper we give a new and simple construction for the cyclic [(q m − 1)/(q − 1), q m−1, q m−2(q− 1)]—difference sets (q = p γ is a prime power) using the methods of coding theory. The construction is such that, in the case q = 2, the 2-ranks of both the incidence matrix and its complementary matrix are easily determined.
John E. Olson, Harry T. Hsu
openaire   +3 more sources

Finding maximum independent sets in graphs arising from coding theory

open access: closedProceedings of the 2002 ACM symposium on Applied computing, 2002
New results are presented concerning binary correcting codes, such as deletion-correcting codes, transposition-correction codes, and codes for the Z-channel. These codes are important due to the possibility of packet loss and corruption on internet transmissions.
Panos M. Pardalos   +4 more
  +5 more sources

Probabilistic approach to attributes coding in the rough sets theory

open access: closedProceedings ICCI `92: Fourth International Conference on Computing and Information, 2003
Objects in an information system analyzed by the rough sets theory methods are characterized by attributes, which can take on a finite set of values only. In diagnostic experiments, condition attributes are usually treated as continuous variables, taking values from certain intervals.
M. Masternak   +2 more
openaire   +3 more sources

Unknown Malicious Codes Detection Based on Rough Set Theory and Support Vector Machine

open access: closedThe 2006 IEEE International Joint Conference on Neural Network Proceedings, 2006
For detecting malicious codes, a classification method of support vector machine (SVM) based on rough set theory (RST) is proposed. The original sample data is preprocessed with the knowledge reduction algorithm of RST, and the redundant features and conflicting samples are eliminated from the working sample dataset to reduce space dimension of sample ...
Jinbo Hao   +4 more
  +5 more sources

Code Profiling Analysis of Rough Set Theory on DSP and Embedded Processors for IoT Application

open access: closed, 2020
Rough set theory is a powerful artificial intelligence based tool used for data analysis and mining inconsistent information systems. In the presence of inconsistent, incomplete, imprecise, or vague data, normal statistical based data analytic techniques lag behind. This paper discusses the code profiling for rough set theory on DSP and ARM processors.
R. A. Patil   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy