Assessment of Free Energies From Electrostatic Embedding Density Functional Tight Binding-Based/Molecular Mechanics in Periodic Boundary Conditions. [PDF]
Bonfrate S+5 more
europepmc +1 more source
Unified Framework for Molecular Response Functions of Different Electronic-Structure Models. [PDF]
Gao B, Ringholm M.
europepmc +1 more source
Maximal avoidable sets of words(Algebraic Theory of Codes and Related Topics)
openaire
An Application of Set Theory to Coding Theory
"As high-speed electronic communication becomes commonplace, there is a tremendous need for better transmission schemes-ones that minimize the effect of inevitable transmission errors, ones that protect confidential or secret messages, ones that route messages most efficiently.
Noca Alon, Andy Liu
+5 more sources
Application of coding theory to the construction of the Singer difference sets†
In this paper we give a new and simple construction for the cyclic [(q m − 1)/(q − 1), q m−1, q m−2(q− 1)]—difference sets (q = p γ is a prime power) using the methods of coding theory. The construction is such that, in the case q = 2, the 2-ranks of both the incidence matrix and its complementary matrix are easily determined.
John E. Olson, Harry T. Hsu
openaire +3 more sources
Finding maximum independent sets in graphs arising from coding theory
New results are presented concerning binary correcting codes, such as deletion-correcting codes, transposition-correction codes, and codes for the Z-channel. These codes are important due to the possibility of packet loss and corruption on internet transmissions.
Panos M. Pardalos+4 more
+5 more sources
Probabilistic approach to attributes coding in the rough sets theory
Objects in an information system analyzed by the rough sets theory methods are characterized by attributes, which can take on a finite set of values only. In diagnostic experiments, condition attributes are usually treated as continuous variables, taking values from certain intervals.
M. Masternak+2 more
openaire +3 more sources
Unknown Malicious Codes Detection Based on Rough Set Theory and Support Vector Machine
For detecting malicious codes, a classification method of support vector machine (SVM) based on rough set theory (RST) is proposed. The original sample data is preprocessed with the knowledge reduction algorithm of RST, and the redundant features and conflicting samples are eliminated from the working sample dataset to reduce space dimension of sample ...
Jinbo Hao+4 more
+5 more sources
Code Profiling Analysis of Rough Set Theory on DSP and Embedded Processors for IoT Application
Rough set theory is a powerful artificial intelligence based tool used for data analysis and mining inconsistent information systems. In the presence of inconsistent, incomplete, imprecise, or vague data, normal statistical based data analytic techniques lag behind. This paper discusses the code profiling for rough set theory on DSP and ARM processors.
R. A. Patil+2 more
openaire +3 more sources