-
21
Trace Copilot: Automatically Locating Cryptographic Operations in Side-Channel Traces by Firmware Binary Instrumenting
Published 2024-12-01“…In contrast, obtaining the (partial) binary firmware is more prevalent in practical attacks on embedded devices. While binary code theoretically encapsulates necessary information for side-channel attacks on software-implemented cryptographic algorithms, there is no systematic study on leveraging this information to facilitate side-channel analysis. …”
Get full text
Article -
22
Nearest neighbor search algorithm for high dimensional data based on weighted self-taught hashing
Published 2017-06-01“…Because of efficiency in query and storage,learning hash is applied in solving the nearest neighbor search problem.The learning hash usually converts high-dimensional data into binary codes.In this way,the similarities between binary codes from two objects are conserved as they were in the original high-dimensional space.In practical applications,a lot of data which have the same distance from the query point but with different code will be returned.How to reorder these candidates is a problem.An algorithm named weighted self-taught hashing was proposed.Experimental results show that the proposed algorithm can reorder the different binary codes with the same Hamming distances efficiently.Compared to the naive algorithm,the F1-score of the proposed algorithm is improved by about 2 times and it is better than the homologous algorithms,furthermore,the time cost is reduced by an order of magnitude.…”
Get full text
Article -
23
Combinatorial polarization, code loops, and codes of high level
Published 2004-01-01“…The construction yields binary codes of high divisibility level with prescribed Hamming weights of intersections of codewords.…”
Get full text
Article -
24
Short Blocklength Nonbinary Raptor-Like LDPC Coding Systems Design and Simulation
Published 2025-01-01“…In conclusion, this investigation shows that the Raptor-Like nonbinary coding, when the code and the transmission scheme are designed with proper optimizations, exhibits a performance improvement over the counterpart binary coding.…”
Get full text
Article -
25
Extending measurement range for three-dimensional structured light imaging with digital exponential fringe pattern
Published 2020“…This approach exploits the fact that at low levels of defocusing, exponential binary-coded fringe pattern exhibits a quasi-sinusoidal form having intact binary structures with reduced or negligible errors owing to high-order harmonic robustness during fringe generation. …”
Get full text
Article -
26
Research and development of hash retrieval technology based on deep learning
Published 2018-10-01“…In the era of big data,data shows the characteristics of high dimension,large amount and rapid growth.How to efficiently retrieve similar data from a large amount of complex data is a research hotspot.By mapping data to binary codes,the hashing technique can significantly accelerate the similarity calculation and reduce storage and communication overhead during the retrieval process.In recent years,deep learning has shown excellent performance in extracting data features.Deep learning-based hash retrieval technique has the advantages of high speed and accuracy.The methods and advanced development of deep learning hashing were mainly summarized,and the future of research direction was briefly discussed.…”
Get full text
Article -
27
A ranking hashing algorithm based on listwise supervision
Published 2019-05-01“…Recently,learning to hash technology has been used for the similarity search of large-scale data.It can simultaneous increase the search speed and reduce the storage cost through transforming the data into binary codes.At present,most ranking hashing algorithms compare the consistency of data in the Euclidean space and the Hamming space to construct the loss function.However,because the Hamming distance is a discrete integer value,there may be many data points sharing the same Hamming distance result in the exact ranking cannot be performed.To address this challenging issue,the encoded data was divided into several subspaces with the same length.Each subspace was set with different weights.The Hamming distance was calculated according to different subspace weights.The experimental results show that this algorithm can effectively sort the data in the Hamming space and improve the accuracy of the query compared with other learning to hash algorithms.…”
Get full text
Article -
28
A cutting-edge neural network approach for predicting the thermoelectric efficiency of defective gamma-graphyne nanoribbons
Published 2025-01-01“…Abstract This study predicts the thermoelectric figure of merit (ZT) for defective gamma-graphyne nanoribbons (γ-GYNRs) using binary coding, convolutional neural networks (CNN), long short-term memory networks (LSTM), and multi-scale feature fusion. …”
Get full text
Article -
29
Global crisis governance in response to scientific information
Published 2024-10-01“…A functional sub-system is constituted by binary codes, embodying the sub-system’s key logic. Sub-systems respond to information triggering their logics. …”
Get full text
Article -
30
An Experimental Realization of a Chaos-Based Secure Communication Using Arduino Microcontrollers
Published 2015-01-01“…In the receiver side, the binary-coded message is decrypted using the encrypted key signal that is sent through one of the communication channels. …”
Get full text
Article -
31
Solving Ambiguity in Target Detection for BPSK-Based MIMO FMCW Radar System
Published 2023-01-01“…First, at the receiving end, a received signal is demodulated using a specific code orthogonal to binary codes used to modulate transmitted signals. Due to the Doppler shift caused by the spectrum of the code used at the receiving end, only ghost targets remain in the demodulated received signal. …”
Get full text
Article -
32
A Comparative Study of Genetic and Firefly Algorithms for Sensor Placement in Structural Health Monitoring
Published 2015-01-01“…To overcome the drawback related to the inapplicability of the FA in optimization problems with discrete variables, some improvements are proposed, including the one-dimensional binary coding system, the Hamming distance between any two fireflies, and the semioriented movement scheme; also, a simple discrete firefly algorithm (SDFA) is developed. …”
Get full text
Article -
33
Deep Binary Representation for Efficient Image Retrieval
Published 2017-01-01“…Hashing method, which means representing images in binary codes and using Hamming distance to judge similarity, is widely accepted for its advantage in storage and searching speed. …”
Get full text
Article -
34
Unifying error-correcting code/Narain CFT correspondences via lattices over integers of cyclotomic fields
Published 2025-03-01“…This code-lattice construction is a generalization of more familiar ones such as Construction AC for ternary codes and (after the generalization stated below) Construction A for binary codes, containing them as special cases. This code-lattice construction is redescribed in terms of root and weight lattices of Lie algebras, which allows to construct lattices for codes over rings Zq with non-prime q. …”
Get full text
Article -
35
Development of Digital Flow Valve Applied to Aero-Engine Fuel Control and Research on Performance of Its Flow Characteristics
Published 2024-12-01“…However, for high-precision flow control, incremental digital valves require a high-precision, high-dynamic servomotor drive; binary-coded digital valves require many on/off valves; and high-speed switching digital valves can cause flow shock and pulsation. …”
Get full text
Article -
36
Mendel: corroboration of the idea of binary trait coding by methods of statistical physics
Published 2015-07-01“…On the one hand, the Mendelian idea of binary coding of a character was inspired by Christian Doppler, with whose department Mendel was contacting for seven years. …”
Get full text
Article -
37
A Novel Discrete Global-Best Harmony Search Algorithm for Solving 0-1 Knapsack Problems
Published 2014-01-01“…In order to better solve discrete 0-1 knapsack problems, a novel global-best harmony search algorithm with binary coding, called DGHS, is proposed. First, an initialization based on a greedy mechanism is employed to improve the initial solution quality in DGHS. …”
Get full text
Article -
38
On McEliece-Type Cryptosystems Using Self-Dual Codes With Large Minimum Weight
Published 2023-01-01“…We determine the parameters of binary codes with large minimum distance, which, if implemented into a McEliece-type cryptosystem, would provide a security level respectively of 80, 128, and 256 bits. …”
Get full text
Article -
39
Probe‐Based Mechanical Data Storage on Polymers Made by Inverse Vulcanization
Published 2025-02-01“…This ternary coding increases the data density four‐fold over binary coding. Furthermore, the coding can be done at room temperature which is rare for mechanical information storage. …”
Get full text
Article -
40
Intelligent reactive power control of a renewable integrated hybrid energy system model using static synchronous compensators and soft computing techniques
Published 2024-12-01“…Another comparison has been done between the multiple applied soft computing techniques (oppositional harmonic search, ant lion optimization, binary-coded genetic algorithm, and symbiosis organisms search) that optimize the parameters of the controller of WDHPSM.…”
Get full text
Article