Rank and Select Operations on Binary Strings, 1974; Elias

2008 ◽  
pp. 748-751 ◽  
Author(s):  
Naila Rahman ◽  
Rajeev Raman

2003 ◽  
Vol 68 (1) ◽  
pp. 139-177 ◽  
Author(s):  
Vladimír Kvasnička ◽  
Jiří Pospíchal

A simplified model of Darwinian evolution at the molecular level is studied by applying the methods of artificial chemistry. A chemical reactor (chemostat) contains molecules that are represented by binary strings, the strings being capable of replication with a probability proportional to their fitness. Moreover, the process of replication is not fully precise, sporadic mutations may produce new offspring strings, which are slightly different from their parent templates. The dynamics of such an autoreplicating system is described by Eigen's differential equations. These equations have a unique asymptotically stable state, which corresponds to those strings that have the highest rate constants (fitness). Fitness of binary string is calculated as a graph-theory similarity between a folding (phenotype) of respective string and the so-called required folding. The presented method offers a detailed view of mechanisms of the molecular Darwinian evolution, in particular of the meaning and importance of neutral mutations.


2008 ◽  
Vol 19 (01) ◽  
pp. 195-203 ◽  
Author(s):  
FRANTISEK FRANEK ◽  
QIAN YANG
Keyword(s):  

An asymptotic lower bound for the maxrun function ρ(n) = max {number of runs in string x | all strings x of length n} is presented. More precisely, it is shown that for any ε > 0, (α−ε)n is an asymptotic lower bound, where [Formula: see text]. A recent construction of an increasing sequence of binary strings “rich in runs” is modified and extended to prove the result.


Traditional encryption systems and techniques have always been vulnerable to brute force cyber-attacks. This is due to bytes encoding of characters utf8 also known as ASCII characters. Therefore, an opponent who intercepts a cipher text and attempts to decrypt the signal by applying brute force with a faulty pass key can detect some of the decrypted signals by employing a mixture of symbols that are not uniformly dispersed and contain no meaningful significance. Honey encoding technique is suggested to curb this classical authentication weakness by developing cipher-texts that provide correct and evenly dispersed but untrue plaintexts after decryption with a false key. This technique is only suitable for passkeys and PINs. Its adjustment in order to promote the encoding of the texts of natural languages such as electronic mails, records generated by man, still remained an open-end drawback. Prevailing proposed schemes to expand the encryption of natural language messages schedule exposes fragments of the plaintext embedded with coded data, thus they are more prone to cipher text attacks. In this paper, amending honey encoded system is proposed to promote natural language message encryption. The main aim was to create a framework that would encrypt a signal fully in binary form. As an end result, most binary strings semantically generate the right texts to trick an opponent who tries to decipher an error key in the cipher text. The security of the suggested system is assessed..


10.37236/4252 ◽  
2014 ◽  
Vol 21 (4) ◽  
Author(s):  
Simon Aumann ◽  
Katharina A.M. Götz ◽  
Andreas M. Hinz ◽  
Ciril Petr

In contrast to the widespread interest in the Frame-Stewart conjecture (FSC) about the optimal number of moves in the classical Tower of Hanoi task with more than three pegs, this is the first study of the question of investigating shortest paths in Hanoi graphs $H_p^n$ in a more general setting. Here $p$ stands for the number of pegs and $n$ for the number of discs in the Tower of Hanoi interpretation of these graphs. The analysis depends crucially on the number of largest disc moves (LDMs). The patterns of these LDMs will be coded as binary strings of length $p-1$ assigned to each pair of starting and goal states individually. This will be approached both analytically and numerically. The main theoretical achievement is the existence, at least for all $n\geqslant p(p-2)$, of optimal paths where $p-1$ LDMs are necessary. Numerical results, obtained by an algorithm based on a modified breadth-first search making use of symmetries of the graphs, lead to a couple of conjectures about some cases not covered by our ascertained results. These, in turn, may shed some light on the notoriously open FSC.


2015 ◽  
Vol 14 (06) ◽  
pp. 1215-1242 ◽  
Author(s):  
Chun-Hao Chen ◽  
Tzung-Pei Hong ◽  
Yeong-Chyi Lee ◽  
Vincent S. Tseng

Since transactions may contain quantitative values, many approaches have been proposed to derive membership functions for mining fuzzy association rules using genetic algorithms (GAs), a process known as genetic-fuzzy data mining. However, existing approaches assume that the number of linguistic terms is predefined. Thus, this study proposes a genetic-fuzzy mining approach for extracting an appropriate number of linguistic terms and their membership functions used in fuzzy data mining for the given items. The proposed algorithm adjusts membership functions using GAs and then uses them to fuzzify the quantitative transactions. Each individual in the population represents a possible set of membership functions for the items and is divided into two parts, control genes (CGs) and parametric genes (PGs). CGs are encoded into binary strings and used to determine whether membership functions are active. Each set of membership functions for an item is encoded as PGs with real-number schema. In addition, seven fitness functions are proposed, each of which is used to evaluate the goodness of the obtained membership functions and used as the evolutionary criteria in GA. After the GA process terminates, a better set of association rules with a suitable set of membership functions is obtained. Experiments are made to show the effectiveness of the proposed approach.


Kybernetes ◽  
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Hamed Fazlollahtabar ◽  
Navid Kazemitash

Purpose However, due to the huge number of studies and on the other hand to be new and creative, the represented models and methods – as the two main parts of this field – have been got more complicated, which consequently have been turned into unpractical research studies for the realistic situations. Therefore, the purpose of this study is the representation of a novel and simple method to deal with the aforementioned gap. Design/methodology/approach To this end, Fazl-Tash method have been proposed, in which a thorough and complete model including 114 criteria and a simple technique to rank and select the best supplier have been presented. Sustainability and resiliency are considered in collecting criteria effective on supplier selection. Findings The method was carried out in a case study in an industrial company. The efficiency of the proposed method is evaluated in comparison with other conventional approaches. Originality/value As selecting the supplier plays a crucial role to bring some important advantages for companies, such as coping with the cost and time problems and influencing the majority of contemporary markets’ requirements, in recent years, there have been representing more effective studies in the supplier selection literature.


Sign in / Sign up

Export Citation Format

Share Document