Showing 21 - 40 results of 45 for search '"binary code"', query time: 0.32s Refine Results
  1. 21

    Trace Copilot: Automatically Locating Cryptographic Operations in Side-Channel Traces by Firmware Binary Instrumenting by Shipei Qu, Yuxuan Wang, Jintong Yu, Chi Zhang, Dawu Gu

    Published 2024-12-01
    “…In contrast, obtaining the (partial) binary firmware is more prevalent in practical attacks on embedded devices. While binary code theoretically encapsulates necessary information for side-channel attacks on software-implemented cryptographic algorithms, there is no systematic study on leveraging this information to facilitate side-channel analysis. …”
    Get full text
    Article
  2. 22

    Nearest neighbor search algorithm for high dimensional data based on weighted self-taught hashing by Cong PENG, Jiangbo QIAN, Huahui CHEN, Yihong DONG

    Published 2017-06-01
    “…Because of efficiency in query and storage,learning hash is applied in solving the nearest neighbor search problem.The learning hash usually converts high-dimensional data into binary codes.In this way,the similarities between binary codes from two objects are conserved as they were in the original high-dimensional space.In practical applications,a lot of data which have the same distance from the query point but with different code will be returned.How to reorder these candidates is a problem.An algorithm named weighted self-taught hashing was proposed.Experimental results show that the proposed algorithm can reorder the different binary codes with the same Hamming distances efficiently.Compared to the naive algorithm,the F1-score of the proposed algorithm is improved by about 2 times and it is better than the homologous algorithms,furthermore,the time cost is reduced by an order of magnitude.…”
    Get full text
    Article
  3. 23

    Combinatorial polarization, code loops, and codes of high level by Petr Vojtechovský

    Published 2004-01-01
    “…The construction yields binary codes of high divisibility level with prescribed Hamming weights of intersections of codewords.…”
    Get full text
    Article
  4. 24

    Short Blocklength Nonbinary Raptor-Like LDPC Coding Systems Design and Simulation by Jakub Hyla, Wojciech Sulek

    Published 2025-01-01
    “…In conclusion, this investigation shows that the Raptor-Like nonbinary coding, when the code and the transmission scheme are designed with proper optimizations, exhibits a performance improvement over the counterpart binary coding.…”
    Get full text
    Article
  5. 25

    Extending measurement range for three-dimensional structured light imaging with digital exponential fringe pattern by Abel, Kamagara

    Published 2020
    “…This approach exploits the fact that at low levels of defocusing, exponential binary-coded fringe pattern exhibits a quasi-sinusoidal form having intact binary structures with reduced or negligible errors owing to high-order harmonic robustness during fringe generation. …”
    Get full text
    Article
  6. 26

    Research and development of hash retrieval technology based on deep learning by Mingwen YUAN, Jiangbo QIAN, Yihong DONG, Huahui CHEN

    Published 2018-10-01
    “…In the era of big data,data shows the characteristics of high dimension,large amount and rapid growth.How to efficiently retrieve similar data from a large amount of complex data is a research hotspot.By mapping data to binary codes,the hashing technique can significantly accelerate the similarity calculation and reduce storage and communication overhead during the retrieval process.In recent years,deep learning has shown excellent performance in extracting data features.Deep learning-based hash retrieval technique has the advantages of high speed and accuracy.The methods and advanced development of deep learning hashing were mainly summarized,and the future of research direction was briefly discussed.…”
    Get full text
    Article
  7. 27

    A ranking hashing algorithm based on listwise supervision by Anbang YANG, Jiangbo QIAN, Yihong DONG, Huahui CHEN

    Published 2019-05-01
    “…Recently,learning to hash technology has been used for the similarity search of large-scale data.It can simultaneous increase the search speed and reduce the storage cost through transforming the data into binary codes.At present,most ranking hashing algorithms compare the consistency of data in the Euclidean space and the Hamming space to construct the loss function.However,because the Hamming distance is a discrete integer value,there may be many data points sharing the same Hamming distance result in the exact ranking cannot be performed.To address this challenging issue,the encoded data was divided into several subspaces with the same length.Each subspace was set with different weights.The Hamming distance was calculated according to different subspace weights.The experimental results show that this algorithm can effectively sort the data in the Hamming space and improve the accuracy of the query compared with other learning to hash algorithms.…”
    Get full text
    Article
  8. 28

    A cutting-edge neural network approach for predicting the thermoelectric efficiency of defective gamma-graphyne nanoribbons by Jiayi Guo, Chunfeng Cui, Tao Ouyang, Juexian Cao, Xiaolin Wei

    Published 2025-01-01
    “…Abstract This study predicts the thermoelectric figure of merit (ZT) for defective gamma-graphyne nanoribbons (γ-GYNRs) using binary coding, convolutional neural networks (CNN), long short-term memory networks (LSTM), and multi-scale feature fusion. …”
    Get full text
    Article
  9. 29

    Global crisis governance in response to scientific information by Karin Buhmann, Jingjing Wu

    Published 2024-10-01
    “…A functional sub-system is constituted by binary codes, embodying the sub-system’s key logic. Sub-systems respond to information triggering their logics. …”
    Get full text
    Article
  10. 30

    An Experimental Realization of a Chaos-Based Secure Communication Using Arduino Microcontrollers by Mauricio Zapateiro De la Hoz, Leonardo Acho, Yolanda Vidal

    Published 2015-01-01
    “…In the receiver side, the binary-coded message is decrypted using the encrypted key signal that is sent through one of the communication channels. …”
    Get full text
    Article
  11. 31

    Solving Ambiguity in Target Detection for BPSK-Based MIMO FMCW Radar System by Junho Kim, Young-Jun Yoon, Seongwook Lee

    Published 2023-01-01
    “…First, at the receiving end, a received signal is demodulated using a specific code orthogonal to binary codes used to modulate transmitted signals. Due to the Doppler shift caused by the spectrum of the code used at the receiving end, only ghost targets remain in the demodulated received signal. …”
    Get full text
    Article
  12. 32

    A Comparative Study of Genetic and Firefly Algorithms for Sensor Placement in Structural Health Monitoring by Guang-Dong Zhou, Ting-Hua Yi, Huan Zhang, Hong-Nan Li

    Published 2015-01-01
    “…To overcome the drawback related to the inapplicability of the FA in optimization problems with discrete variables, some improvements are proposed, including the one-dimensional binary coding system, the Hamming distance between any two fireflies, and the semioriented movement scheme; also, a simple discrete firefly algorithm (SDFA) is developed. …”
    Get full text
    Article
  13. 33

    Deep Binary Representation for Efficient Image Retrieval by Xuchao Lu, Li Song, Rong Xie, Xiaokang Yang, Wenjun Zhang

    Published 2017-01-01
    “…Hashing method, which means representing images in binary codes and using Hamming distance to judge similarity, is widely accepted for its advantage in storage and searching speed. …”
    Get full text
    Article
  14. 34

    Unifying error-correcting code/Narain CFT correspondences via lattices over integers of cyclotomic fields by Shun'ya Mizoguchi, Takumi Oikawa

    Published 2025-03-01
    “…This code-lattice construction is a generalization of more familiar ones such as Construction AC for ternary codes and (after the generalization stated below) Construction A for binary codes, containing them as special cases. This code-lattice construction is redescribed in terms of root and weight lattices of Lie algebras, which allows to construct lattices for codes over rings Zq with non-prime q. …”
    Get full text
    Article
  15. 35

    Development of Digital Flow Valve Applied to Aero-Engine Fuel Control and Research on Performance of Its Flow Characteristics by Yuesong Li

    Published 2024-12-01
    “…However, for high-precision flow control, incremental digital valves require a high-precision, high-dynamic servomotor drive; binary-coded digital valves require many on/off valves; and high-speed switching digital valves can cause flow shock and pulsation. …”
    Get full text
    Article
  16. 36

    Mendel: corroboration of the idea of binary trait coding by methods of statistical physics by О. V. Trapezov

    Published 2015-07-01
    “…On the one hand, the Mendelian idea of binary coding of a character was inspired by Christian Doppler, with whose department Mendel was contacting for seven years. …”
    Get full text
    Article
  17. 37

    A Novel Discrete Global-Best Harmony Search Algorithm for Solving 0-1 Knapsack Problems by Wan-li Xiang, Mei-qing An, Yin-zhen Li, Rui-chun He, Jing-fang Zhang

    Published 2014-01-01
    “…In order to better solve discrete 0-1 knapsack problems, a novel global-best harmony search algorithm with binary coding, called DGHS, is proposed. First, an initialization based on a greedy mechanism is employed to improve the initial solution quality in DGHS. …”
    Get full text
    Article
  18. 38

    On McEliece-Type Cryptosystems Using Self-Dual Codes With Large Minimum Weight by Luca Mariot, Stjepan Picek, Radinka Yorgova

    Published 2023-01-01
    “…We determine the parameters of binary codes with large minimum distance, which, if implemented into a McEliece-type cryptosystem, would provide a security level respectively of 80, 128, and 256 bits. …”
    Get full text
    Article
  19. 39

    Probe‐Based Mechanical Data Storage on Polymers Made by Inverse Vulcanization by Abigail K. Mann, Samuel J. Tonkin, Pankaj Sharma, Christopher T. Gibson, Justin M. Chalker

    Published 2025-02-01
    “…This ternary coding increases the data density four‐fold over binary coding. Furthermore, the coding can be done at room temperature which is rare for mechanical information storage. …”
    Get full text
    Article
  20. 40

    Intelligent reactive power control of a renewable integrated hybrid energy system model using static synchronous compensators and soft computing techniques by Pabitra Kumar Guchhait, Samrat Chakraborty, Debottam Mukherjee, Ramashis Banerjee

    Published 2024-12-01
    “…Another comparison has been done between the multiple applied soft computing techniques (oppositional harmonic search, ant lion optimization, binary-coded genetic algorithm, and symbiosis organisms search) that optimize the parameters of the controller of WDHPSM.…”
    Get full text
    Article