-
21
EFH:an online unsupervised hash learning algorithm
Published 2020-03-01“…Many unsupervised learning to hash algorithm needs to load all data to memory in the training phase,which will occupy a large memory space and cannot be applied to streaming data.An unsupervised online learning to hash algorithm called evolutionary forest hash (EFH) was proposed.In a large-scale data retrieval scenario,the improved evolution tree can be used to learn the spatial topology of the data.A path coding strategy was proposed to map leaf nodes to similarity-preserved binary code.To further improve the querying performance,ensemble learning was combined,and an online evolving forest hashing method was proposed based on the evolving trees.Finally,the feasibility of this method was proved by experiments on two widely used data sets.…”
Get full text
Article -
22
Research progress in code reuse attacking and defending
Published 2018-03-01“…Code reuse attacks make use of binary code existed in the attacked target to perform attack action,such technique breaks out the traditional assumption that malicious behavior always be introduced from the outside,it is representative sample of the advanced memory corruption techniques and also the focus of attention in the software security research field.The generation background and implementation principle were described firstly,and then the recent progresses of the technique,including improvement and variants,implementation methods under the different architecture platforms,automatic construction and important extension including blind ROP and non-control data attacks based on code reuse attacks,were introduced respectively.Various defense mechanisms and possible counter-defense methods for code reuse attacks were also discussed.Finally a perspective of the future work in this research area was discussed.…”
Get full text
Article -
23
基于透视不变二值特征描述子的图像匹配算法
Published 2015-04-01“…Current local feature based image matching algorithms are usually less robust to image perspective transformation.Aiming to solve this problem,a new perspective invariant binary code (PIBC) based image matching algorithm is proposed.Firstly,FAST corners are detected on the pyramid images,those corners with non-maximum Harris corner response value and the edge points are further eliminated.And then,by simulating the perspective transformations of images taken from different viewpoints,a single FAST corner is described with binary descriptors under different viewpoint transformations,which makes the descriptor could describe the identical feature point on different perspective transform images.Experimental results show its robustness to image perspective transformation,while its complexity is similar with SURF.…”
Get full text
Article -
24
Some results on free Euclidean self-dual codes over F2+vF2
Published 2019-12-01“…By using the distance preserving Gray map fromF2+ v F2to F2xF2,the generator matrix of the binary code which corresponds the code over theringF2+ v F2is obtained. …”
Get full text
Article -
25
A colony multiplex quantitative PCR-Based 3S3DBC method and variations of it for screening DNA libraries.
Published 2015-01-01“…After describing pooling strategies and issues that should be considered in DNA library screening, here we report an efficient colony multiplex quantitative PCR-based 3-step, 3-dimension, and binary-code (3S3DBC) method we used to screen genes from a planarian genomic DNA fosmid library. …”
Get full text
Article -
26
A Novel Proposal for All Optical Analog-to-Digital Converter Based on Photonic Crystal Structures
Published 2017-01-01“…Then, an optical coder was used to generate a 2-bit standard binary code out of the discrete levels coming from the nonlinear demultiplexer. …”
Get full text
Article -
27
DETERMINING THE SIZE OF THE POPULATION OF THE GENETIC ALGORITHM FOR THE PROBLEMS OF DISCRETE OPTIMIZATION IN CAD
Published 2018-10-01“…The problem is solved for a genetic algorithm, where the genotype is represented by a chromosome in binary code, and the phenotype by a decimal integer code of values of independent variables. …”
Get full text
Article -
28
LI-FI TECHNOLOGY AND THE NEW CONCEPT OF DATA TRANSFER SECURITY
Published 2017-05-01“…It works basically like an incredibly advanced form of Morse code - flicking an LED on and off at extreme speeds and can be used to write and transmit things in binary code. The benefit of Li-Fi over Wi-Fi, other than potentially much faster speeds, is that because light cannot pass through walls, it makes it a whole lot more secure.…”
Get full text
Article -
29
Syntactic–Semantic Detection of Clone-Caused Vulnerabilities in the IoT Devices
Published 2024-11-01“…This has a positive impact on the ability to apply the proposed method to large sets of binary code. In an experimental study, the developed method—compared to BinDiff, Gemini, and Asteria tools—has demonstrated the highest efficiency.…”
Get full text
Article -
30
Ultrasensitive Chemical Analysis on Gold Nano Popcorn Substrate Using Digital Surface-Enhanced Raman Scattering
Published 2025-03-01“…To overcome this challenge, we used a binary code-based data analysis approach. Gold nano popcorn substrates were utilized for high-sensitivity detection, with malachite green isothiocyanate (MGITC) as the target molecule. …”
Get full text
Article -
31
New Canonic Active RC Sinusoidal Oscillator Circuits Using Second-Generation Current Conveyors with Application as a Wide-Frequency Digitally Controlled Sinusoid Generator
Published 2011-01-01“…Application of the proposed circuits as a wide-frequency range digitally controlled sinusoid generator is exhibited wherein the digital frequency control has been enabled by replacing both the capacitors by two identical variable binary capacitor banks tunable by means of the same binary code. SPICE simulations of the CMOS implementation of the oscillators using 0.35 μm TSMC CMOS technology parameters and bipolar implementation of the oscillators using process parameters for NR200N-2X (NPN) and PR200N-2X (PNP) of bipolar arrays ALA400-CBIC-R have validated their workability. …”
Get full text
Article -
32
Internet, Big data y nuevas tecnologías: repercusiones y respuestas del ordenamiento jurídico | Internet, Big data and new tecnologies: implications and responses from the legal s...
Published 2019-05-01“…Abstract: Each of the movements that occur in the network generates information that is digitized in binary code and it is stored massively. The arbitrariness with which the Big Data corporations operate as well as the opacity of the algorithms used by artificial intelligence have given rise to new forms of violation of rights, where intimacy and honour have been the first victims. …”
Get full text
Article -
33
Solid state Ka-band pulse oscillator with frequency electronic switching
Published 2015-08-01“…Radiation frequency is controlled by a three-digit binary code in OOL levels. Synchronized amplifier made on IMPATT diodes provides microwave power up to 20 W in oscillator output with microwave pulse duration of 100 – 300 ns in an operating band. …”
Get full text
Article -
34
Iris Recognition System Based on Wavelet Transform
Published 2009-07-01“…The encoded data by wavelet filters are converted to binary code to represent the biometric template. The Hamming distance is used to classify the iris templates, and the False Accept Rate (FAR), False Reject Rate (FRR) and recognition rate (RR) are calculated [1]. …”
Get full text
Article -
35
Internet, Big data y nuevas tecnologías: repercusiones y respuestas del ordenamiento jurídico | Internet, Big data and new tecnologies: implications and responses from the legal s...
Published 2019-05-01“…Abstract: Each of the movements that occur in the network generates information that is digitized in binary code and it is stored massively. The arbitrariness with which the Big Data corporations operate as well as the opacity of the algorithms used by artificial intelligence have given rise to new forms of violation of rights, where intimacy and honour have been the first victims. …”
Get full text
Article -
36
Interface as Inverted Divination: The Modes of Yijing, L. Tolstoy and J. Cage
Published 2025-05-01“…We use the modes of interaction with divination as they exist in the reception of the Yijing in Europe, from Leibniz with his binary code that was fundamental to the creation of the digital interface, to the playful, artistic adaptation of the Yijing by J. …”
Get full text
Article -
37
Artificial fingerprints engraved through block-copolymers as nanoscale physical unclonable functions for authentication and identification
Published 2024-12-01“…Results show that morphological features can be exploited to encode fingerprint-like nanopatterns in binary code matrices representing a unique bit stream of information characterized by high uniqueness and entropy. …”
Get full text
Article -
38
Static detection method for multi-level network source code vulnerabilities based on knowledge graph technology
Published 2025-06-01“…Abstract The current static detection method of network source code vulnerabilities mainly relies on the static analysis of binary code. However, due to the failure to fully simulate the actual operating environment of programs, some vulnerabilities that trigger only under specific conditions are difficult to be found by static detection tools. …”
Get full text
Article -
39
BCI-DRONE CONTROL BASED ON THE CONCENTRATION LEVEL AND EYE BLINK SIGNALS USING A NEUROSKY HEADSET
Published 2025-07-01“…The eye blinking generates a binary code to control the drone's motions. The accuracy of this code is improved through Artificial Neural Networks and Machine Learning techniques. …”
Get full text
Article -
40
Heuristic Model of Forecasting of Operating State of Semiconductor Devices
Published 2022-03-01“…The threshold logic method used for electronic products when assessing their reliability in the form of predicting the performance class of products for a given operating time (K1 is a class of operable ones, K0 is a class of inoperable copies) provides for the transformation into a binary code of informative parameters obtained at the initial moment of time, and allows to build a forecasting model in the form of a table showing which code combinations correspond to the instances of the K1 class. …”
Get full text
Article