Polymer Identification Code

2020 ◽  
pp. 117-123
Author(s):  
Robert A. Wesolowski ◽  
Anthony P. Wesolowski ◽  
Roumiana S. Petrova
Keyword(s):  
2020 ◽  
pp. 001316442093845 ◽  
Author(s):  
Jon Agley ◽  
David Tidd ◽  
Mikyoung Jun ◽  
Lori Eldridge ◽  
Yunyu Xiao ◽  
...  

Prospective longitudinal data collection is an important way for researchers and evaluators to assess change. In school-based settings, for low-risk and/or likely-beneficial interventions or surveys, data quality and ethical standards are both arguably stronger when using a waiver of parental consent—but doing so often requires the use of anonymous data collection methods. The standard solution to this problem has been the use of a self-generated identification code. However, such codes often incorporate personalized elements (e.g., birth month, middle initial) that, even when meeting the technical standard for anonymity, may raise concerns among both youth participants and their parents, potentially altering willingness to participate, response quality, or generating outrage. There may be value, therefore, in developing a self-generated identification code and matching approach that not only is technically anonymous but also appears anonymous to a research-naive individual. This article provides a proof of concept for a novel matching approach for school-based longitudinal data collection that potentially accomplishes this goal.


Entropy ◽  
2020 ◽  
Vol 22 (10) ◽  
pp. 1067
Author(s):  
Sencer Derebeyoğlu ◽  
Christian Deppe ◽  
Roberto Ferrara

In this paper, we analyze the construction of identification codes. Identification codes are based on the question: “Is the message I have just received the one I am interested in?”, as opposed to Shannon’s transmission, where the receiver is interested in not only one, but any, message. The advantage of identification is that it allows rates growing double exponentially in the blocklength at the cost of not being able to decode every message, which might be beneficial in certain applications. We focus on a special identification code construction based on two concatenated Reed-Solomon codes and have a closer look at its implementation, analyzing the trade-offs of identification with respect to transmission and the trade-offs introduced by the computational cost of identification codes.


Sign in / Sign up

Export Citation Format

Share Document