Search results for "error detection"

showing 9 items of 39 documents

A simple comparative analysis of exact and approximate quantum error correction

2014

We present a comparative analysis of exact and approximate quantum error correction by means of simple unabridged analytical computations. For the sake of clarity, using primitive quantum codes, we study the exact and approximate error correction of the two simplest unital (Pauli errors) and nonunital (non-Pauli errors) noise models, respectively. The similarities and differences between the two scenarios are stressed. In addition, the performances of quantum codes quantified by means of the entanglement fidelity for different recovery schemes are taken into consideration in the approximate case. Finally, the role of self-complementarity in approximate quantum error correction is briefly ad…

Statistics and ProbabilityQuantum PhysicsComputationFOS: Physical sciencesStatistical and Nonlinear PhysicsQuantum capacityQuantum entanglementNoise (electronics)symbols.namesakePauli exclusion principleQuantum error correctionSimple (abstract algebra)symbolsApplied mathematicsError detection and correctionQuantum Physics (quant-ph)AlgorithmMathematical PhysicsMathematics
researchProduct

Quantum Walk Search through Potential Barriers

2015

An ideal quantum walk transitions from one vertex to another with perfect fidelity, but in physical systems, the particle may be hindered by potential energy barriers. Then the particle has some amplitude of tunneling through the barriers, and some amplitude of staying put. We investigate the algorithmic consequence of such barriers for the quantum walk formulation of Grover's algorithm. We prove that the failure amplitude must scale as $O(1/\sqrt{N})$ for search to retain its quantum $O(\sqrt{N})$ runtime; otherwise, it searches in classical $O(N)$ time. Thus searching larger "databases" requires increasingly reliable hop operations or error correction. This condition holds for both discre…

Statistics and ProbabilityQuantum PhysicsComputer sciencePhysical systemGeneral Physics and AstronomyFOS: Physical sciencesStatistical and Nonlinear Physics01 natural sciencesPotential energy010305 fluids & plasmasVertex (geometry)AmplitudeModeling and Simulation0103 physical sciencesQuantum walkStatistical physics010306 general physicsError detection and correctionQuantum Physics (quant-ph)QuantumMathematical PhysicsQuantum tunnelling
researchProduct

kmcEx: memory-frugal and retrieval-efficient encoding of counted k-mers.

2018

Abstract Motivation K-mers along with their frequency have served as an elementary building block for error correction, repeat detection, multiple sequence alignment, genome assembly, etc., attracting intensive studies in k-mer counting. However, the output of k-mer counters itself is large; very often, it is too large to fit into main memory, leading to highly narrowed usability. Results We introduce a novel idea of encoding k-mers as well as their frequency, achieving good memory saving and retrieval efficiency. Specifically, we propose a Bloom filter-like data structure to encode counted k-mers by coupled-bit arrays—one for k-mer representation and the other for frequency encoding. Exper…

Statistics and ProbabilitySource codeComputer sciencemedia_common.quotation_subject0206 medical engineeringHash function02 engineering and technologyBiochemistry03 medical and health sciencesEncoding (memory)Molecular BiologyTime complexity030304 developmental biologyBlock (data storage)media_common0303 health sciencesSequence Analysis DNAData structureComputer Science ApplicationsComputational MathematicsComputational Theory and MathematicsError detection and correctionAlgorithmSequence Alignment020602 bioinformaticsAlgorithmsSoftwareBioinformatics (Oxford, England)
researchProduct

Systematic Error Correction of a 3D Laser Scanning Measurement Device

2011

International audience; Non-contact measurement techniques using laser scanning have the advantage of fast acquiring large numbers of points. However, compared to their contact-based counterparts, these techniques are known to be less accurate. The work presented in this paper aims at improving the accuracy of these techniques through an error correction procedure based on an experimental process that concerns mechanical parts. The influence of the three parameters defining the relative position and the orientation between the sensor and the surface is studied. The process used to build an experimental global model of error is presented and applied to a typical part composed of planes or sk…

Surface (mathematics)[ SPI.MECA.GEME ] Engineering Sciences [physics]/Mechanics [physics.med-ph]/Mechanical engineering [physics.class-ph]0209 industrial biotechnologyWork (thermodynamics)Laser scanningComputer science[PHYS.MECA.GEME]Physics [physics]/Mechanics [physics]/Mechanical engineering [physics.class-ph]02 engineering and technology01 natural sciences010309 optics3D inspection020901 industrial engineering & automationOpticsPosition (vector)0103 physical sciencesElectrical and Electronic EngineeringLaser scanningOrientation (computer vision)business.industryMechanical EngineeringProcess (computing)uncertaintieserrors correctionAtomic and Molecular Physics and OpticsElectronic Optical and Magnetic Materials[SPI.MECA.GEME]Engineering Sciences [physics]/Mechanics [physics.med-ph]/Mechanical engineering [physics.class-ph][ PHYS.MECA.GEME ] Physics [physics]/Mechanics [physics]/Mechanical engineering [physics.class-ph]Measurement uncertaintyError detection and correctionbusinessAlgorithm
researchProduct

Learning the structure of HMM's through grammatical inference techniques

2002

A technique is described in which all the components of a hidden Markov model are learnt from training speech data. The structure or topology of the model (i.e. the number of states and the actual transitions) is obtained by means of an error-correcting grammatical inference algorithm (ECGI). This structure is then reduced by using an appropriate state pruning criterion. The statistical parameters that are associated with the obtained topology are estimated from the same training data by means of the standard Baum-Welch algorithm. Experimental results showing the applicability of this technique to speech recognition are presented. >

Training setbusiness.industryComputer scienceEstimation theorySpeech recognitionMarkov processComputer Science::Computation and Language (Computational Linguistics and Natural Language and Speech Processing)Pattern recognitionGrammar inductionsymbols.namesakeRule-based machine translationsymbolsArtificial intelligencePruning (decision trees)businessBaum–Welch algorithmHidden Markov modelError detection and correctionInternational Conference on Acoustics, Speech, and Signal Processing
researchProduct

Presentations of constrained systems with unconstrained positions

2005

International audience; We give a polynomial-time construction of the set of sequences that satisfy a finite-memory constraint defined by a finite list of forbidden blocks, with a specified set of bit positions unconstrained. Such a construction can be used to build modulation/error-correction codes (ECC codes) like the ones defined by the Immink-Wijngaarden scheme in which certain bit positions are reserved for ECC parity. We give a lineartime construction of a finite-state presentation of a constrained system defined by a periodic list of forbidden blocks. These systems, called periodic-finite-type systems, were introduced by Moision and Siegel. Finally, we present a linear-time algorithm for con…

[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]finite-memory systemperiodic-finite-type (PFT) system[INFO.INFO-DS] Computer Science [cs]/Data Structures and Algorithms [cs.DS]0102 computer and information sciences02 engineering and technologyLibrary and Information Sciences01 natural sciencesModulation coding0202 electrical engineering electronic engineering information engineeringMathematicsDiscrete mathematicsChannel codefinite-state encodermodulation codeDAWG020206 networking & telecommunicationsDirected graphDirected acyclic graphforbidden blockComputer Science ApplicationsFinite sequence010201 computation theory & mathematicscodeError detection and correctionrun-length limited (RLL) codesInformation SystemsCoding (social sciences)maximum transition run (MTR)
researchProduct

Learning from Errors: Detecting ZigBee Interference in WiFi Networks

2014

In this work we show how to detect ZigBee interference on commodity WiFi cards by monitoring the reception errors, such as synchronization errors, invalid header formats, too long frames, etc., caused by ZigBee transmissions. Indeed, in presence of non-WiFi modulated signals, the occurrence of these types of errors follows statistics that can be easily recognized. Moreover, the duration of the error bursts depends on the transmission interval of the interference source, while the error spacing depends on the receiver implementation. On the basis of these considerations, we propose the adoption of hidden Markov chains for characterizing the behavior of WiFi receivers in presence of controlle…

business.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computingwlan 802.11 802.15.4 frame error detection wireless coexistenceInterval (mathematics)Interference (wave propagation)SynchronizationLearning from errorsTransmission (telecommunications)HeaderbusinessHidden Markov modelComputer networkNeuRFon
researchProduct

Node co-activations as a means of error detection : Towards fault-tolerant neural networks

2022

Context: Machine learning has proved an efficient tool, but the systems need tools to mitigate risks during runtime. One approach is fault tolerance: detecting and handling errors before they cause harm. Objective: This paper investigates whether rare co-activations – pairs of usually segregated nodes activating together – are indicative of problems in neural networks (NN). These could be used to detect concept drift and flagging untrustworthy predictions. Method: We trained four NNs. For each, we studied how often each pair of nodes activates together. In a separate test set, we counted how many rare co-activations occurred with each input, and grouped the inputs based on whether its class…

machine learningkoneoppiminenerror detectionvirheetfault toleranceneuroverkotneural networksconcept driftluotettavuusdependability
researchProduct

Analysis of the psicometric properties of a multiplication and division processes assessment scale

2019

Esta comunicación se encuentra disponible en la siguiente URL: http://www.infad.eu/RevistaINFAD/OJS/index.php/IJODAEP/article/view/1464/1321 Este número está dedicado a la "Psicología de la Educación y Saberes Originarios". The domain of multiplication and division operations depends on both algorithm management and the ability to identify the semantic structure of the problem and to translate it into mathematical language. Many students present difficulties in identifying the semantic structure of the problem but not applying the algorithm when the problem is presented numericaly. The aim of the study is to validate an assessment tool of the processes involved in multiplication and divisio…

multiplicationword problemStructure (mathematical logic)Matemáticas - Problemas y ejercicios.Algorithms - Problems exercises etc.algorithmComputer sciencelcsh:BF1-990Language of mathematicsDivision (mathematics)Domain (software engineering)Algebra - Problems exercises etc.Identification (information)lcsh:PsychologyMathematics - Problems exercises etc.mistakesAlgoritmos - Problemas y ejercicios.divisionMultiplicationÁlgebra - Problemas y ejercicios.ArithmeticError detection and correctionReliability (statistics)
researchProduct