نتایج جستجو برای: dfa

تعداد نتایج: 2483  

Journal: :Zeitschrift fur Naturforschung. C, Journal of biosciences 2008
Young-Bum Yoo Kyeong Ryong Lee Seung-Whan Kim Kisang Kwon Tae-Won Goo O-Yu Kwon

Deferoxamine (DFA, N'-[5-(acetyl-hydroxy-amino)-pentyl]-N-[5-[3-(5-aminopentyl-hydroxy-carbamoyl) propanoylamino]pentyl]-N-hydroxy-butane diamide) is a chelating agent used to remove excess iron from the body and to reduce organ and tissue damage. DFA enhances both iron regulatory protein 1 (IRP1) expression and its endoplasmic reticulum (ER) membrane-binding activity, as occurs in hypoxia, an ...

2015
Dana Angluin Dongqu Chen

Deterministic finite automata (DFA) have long served as a fundamental computational model in the study of theoretical computer science, and the problem of learning a DFA from given input data is a classic topic in computational learning theory. In this paper we study the learnability of a random DFA and propose a computationally efficient algorithm for learning and recovering a random DFA from ...

2014
Pamela Galvin Sarah Gildea Maura Nelly Michelle Quinlivan Sean Arkins Cathal Walsh Ann Cullinane

BACKGROUND Equine influenza (EI) is a highly contagious respiratory disease of horses. OBJECTIVES The aim of this study was to evaluate two rapid antigen detection kits (Directigen or DFA, and Espline) and a commercial ELISA for the detection of EI nucleoprotein in nasal swabs. METHOD Nasal swab samples from naturally and experimentally infected horses were used to compare the sensitivity a...

2010
M. Ignaccolo M. Latka B. J. West

Detrended fluctuation analysis (DFA) is one of the most frequently used fractal time series algorithms. DFA has also become the tool of choice for analysis of the short-time fluctuations despite the fact that its validity in this domain has never been demonstrated. We adopt an Ornstein-Uhlenbeck Langevin equation to generate a time series which exhibits short-time powerlaw scaling and incorpora...

Journal: :Journal of clinical microbiology 2009
James B Mahony Gord Blackhouse Jesse Babwah Marek Smieja Sonya Buracond Sylvia Chong William Ciccotelli Tim O'Shea Daifallah Alnakhli May Griffiths-Turner Ron Goeree

We performed a cost analysis study using decision tree modeling to determine whether the use of multiplex PCR testing for respiratory viruses (xTAG RVP test) is a more or less costly strategy than the status quo testing methods used for the diagnosis of respiratory virus infections in pediatric patients. The decision tree model was constructed by using four testing strategies for respiratory vi...

Journal: :RAIRO - Theor. Inf. and Applic. 2010
Marco Almeida Nelma Moreira Rogério Reis

We present a new incremental algorithm for minimising deterministic finite automata. It runs in quadratic time for any practical application and may be halted at any point, returning a partially minimised automaton. Hence, the algorithm may be applied to a given automaton at the same time as it is processing a string for acceptance. We also include some experimental comparative results.

Journal: :Inf. Process. Lett. 2008
Jorge Almeida Marc Zeitoun

We establish linear-time reductions between the minimization of a deterministic finite automaton (DFA) and the conjunction of 3 subproblems: the minimization of a strongly connected DFA, the isomorphism problem for a set of strongly connected minimized DFAs, and the minimization of a connected DFA consisting in two strongly connected components, both of which are minimized. We apply this proced...

2007
A. N. Trahtman

A word w is called synchronizing (recurrent, reset, directable) word of deterministic finite automaton (DFA) if w brings all states of the automaton to an unique state. Černy conjectured in 1964 that every nstate synchronizable automaton possesses a synchronizing word of length at most (n− 1). The problem is still open. It will be proved that the minimal length of synchronizing word is not grea...

Journal: :IACR Cryptology ePrint Archive 2003
Christophe Giraud

In this paper we describe two different DFA attacks on the AES. The first one uses a theoretical fault model that induces a fault on only one bit of an intermediate result, hence allowing us to obtain the key by using 50 faulty ciphertexts for an AES-128. The second attack uses a more realistic fault model: we assume that we may induce a fault on a whole byte. For an AES-128, this second attack...

Journal: :International Journal of Computer Applications 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید