[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

A New Integer Programming Model about Counterfeit Coin Problem Based on Information Processing Method and Its General Solution

  • Conference paper
Information and Automation (ISIA 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 86))

Included in the following conference series:

Abstract

Based on the Counterfeit Coin Problem that is often met in ordinary life, this paper looks weighting coins as an information processing process, introduce some interrelated information processing knowledge in Information Theory and use it to establish a new Integer Programming model based on information processing method. Its detailed logic inference process, general solution is discussed, its universal laws and specific academic explainer are also presented, so this problem is solved, these can expand the application scope of information processing method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 71.50
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 89.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Born, A., Hurkens, C.A.J., Woeginger, G.J.: How to detect a counterfeit coin: Adaptive versus non-adaptive solutions. Information Processing Letters 86(3), 137–141 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  2. Liu, W.-A., Zhang, Q.-M., Nie, Z.-K.: Searching for a counterfeit coin with two unreliable weightings. Discrete Applied Mathematics 150(1-3), 160–181 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  3. Xiao, X.-p.: A Non-Adaptive Algorithm for the General Counterfeit Coin Problem. Journal of University of Electronic Science and Technology of China (S1), 451–453 (2007)

    Google Scholar 

  4. Qi, M.N., Li, W.: Unified search procedure with two devices for equilibrium models of two-counterfeit coin problem. System Engineering Theory and Practice 21(9), 73 (2001)

    Google Scholar 

  5. Alon, N., Kozlov, D.N.: Coins with Arbitrary Weights. Journal of Algorithms 25(1), 162–176 (1997)

    Article  MathSciNet  MATH  Google Scholar 

  6. Xiao, X.-P.: Non-adaptive Solutions to the General Counterfeit Coin Problem. Journal of Nanjing University (Natural Sciences) (5), 506–511 (2006)

    Google Scholar 

  7. Li, W., Pan, P.: Unified search procedure with two devices on equilibrium models of two-counterfeit-coin problem. Journal of Southeast University (Natural Science Edition) 3, 536–540 (2002)

    MathSciNet  MATH  Google Scholar 

  8. Wang, X.-d.: Dynamic programming algorithm for counterfeit coin problem. Mini-micro Systems (12), 1301–1308 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Xiaoping, B., Rui, K. (2011). A New Integer Programming Model about Counterfeit Coin Problem Based on Information Processing Method and Its General Solution. In: Qi, L. (eds) Information and Automation. ISIA 2010. Communications in Computer and Information Science, vol 86. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19853-3_74

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-19853-3_74

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-19852-6

  • Online ISBN: 978-3-642-19853-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics