نتایج جستجو برای: digit codes

تعداد نتایج: 91610  

2016
PANKAJ KUMAR DAS LALIT K. VASHISHT

In this paper, we obtain lower and upper bounds on the number of parity check digits of a linear code that corrects e or less errors within a subblock. An example of such a code is provided. We introduce blockwise-tensor product of matrices and using this, we propose classes of error locating codes (or EL-codes) that can detect e or less errors within a sub-block and locate several such corrupt...

Journal: :Bulletin of the World Health Organization 2004
Fanny Janssen Anton E Kunst

OBJECTIVE To evaluate how often coding changes between and within revisions of the International Classification of Diseases (ICD) complicate the description of long-term trends in cause-specific mortality. METHODS Data on cause-specific mortality between 1950 and 1999 for men and women aged 60 and older were obtained from Denmark, England and Wales, Finland, the Netherlands, Norway and Sweden...

Journal: :CoRR 2012
Somdip Dey

In this paper the author present a new technique of using QR Codes (commonly known as ‘Quick Respond Codes’) in the field of Cryptography. QR Codes are mainly used to convey or store messages because they have higher or large storage capacity than any other normal conventional ‘barcodes’. In this paper the primary focus will be on storing messages in encrypted format with a password and send it...

Journal: :IEEE Trans. Information Theory 1986
Gadiel Seroussi Ron M. Roth

AbsrructAn ( n, k, d) linear code over F = GF( q) is said to be ntcrximunt dktunce separable (MDS) if d = n k + 1. It is shown that an (II, k, FI k + 1) generalized Reed-Solomon code such that 2 I k 5 n 1 ((I 1)/2] (k + 3 if q is even) can be extended by one digit while preserving the MDS property if and only if the resulting extended code is also a generalized Reed-Solomon code. It follows tha...

Journal: :IACR Cryptology ePrint Archive 2012
Antonino Simone Boris Skoric

We investigate False Positive (FP) accusation probabilities for q-ary Tardos codes in the Restricted Digit Model. We employ a computation method recently introduced by us, to which we refer as Convolution and Series Expansion (CSE). We present a comparison of several collusion attacks on q-ary codes: majority voting, minority voting, Interleaving, μ̃-minimizing and Random Symbol (the q-ary equiv...

2012
Justin R. Pierce Peter K. Schott

Monitoring changes to product classification systems is an important component of a wide range of empirical research. In this article we develop an alogorithm for concording periodic revisions to the ten-digit Harmonized System (HS) codes used by U.S. statistical agencies to categorize international trade since 1989. We use this algorithm to construct the first comprehensive concordance of HS c...

Journal: :IEEE Trans. Information Theory 1963
Shimon Even

less, for any burst of length 11 or less induces at most a burst of length 3 or less and one of length 8 or less in the respective classes of digit positions. Some codes obtained along the same lines are listed in Table II, where (b,, bz) and (n, + n,) mean that the code is a combination of a burst-b, code with code-length n, and a burst-b, code with code-length n 2, each of which is generated ...

2010
P. AHAMED

In this research, the recognition accuracy of triangle-area representation (TAR) based shape feature is measured in recognizing the totally unconstrained handwritten digits. The TAR features for different triangles of variable side lengths that are formed by taking the combinations of different contour points were computed. The set of contour points that yielded the best features was experiment...

Journal: :Nature Reviews Neuroscience 2017

Journal: :Türkiye Fiziksel Tip ve Rehabilitasyon Dergisi 2014

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید