-
41
Adaptive Measurement and Parameter Estimation for Low-SNR PRBC-PAM Signal Based on Adjusting Zero Value and Chaotic State Ratio
Published 2024-10-01“…Accurately estimating the modulation parameters of pseudorandom binary code–pulse amplitude modulation (PRBC–PAM) signals damaged by strong noise poses a significant challenge in emitter identification and countermeasure. …”
Get full text
Article -
42
Measurements of Periodic Signals Phase Shifts with Application of Direct Digital Synthesis
Published 2019-06-01“…The use of statistical accumulation of pulse coincidence in the basis of the work allowed eliminating the restrictions on the duration of pulses of known non-ionic meters.On the basis of the obtained results, a high-bit converter of phase shifts of high-frequency periodic signals into a binary code with high speed for problems of industrial tomography, radar and radionavigation can be developed.…”
Get full text
Article -
43
Enhanced Performance of Intensity Modulation With Direct Detection Using Golay Encoded Nyquist Pulses and Electronic Dispersion Compensation
Published 2024-01-01“…A 24-dimensional (24D) extended Golay binary code effectively transforms each incoming 12-bit message into a 24-bit codeword, achieving a coding efficiency of 0.5 bits per symbol for a 56 Gb/s on-off keying (OOK) transmission over 80 km of single mode fiber. …”
Get full text
Article -
44
Composite Mapping for Peptide‐Based Data Storage with Higher Coding Density and Fewer Synthesis Cycles
Published 2025-07-01“…However, conventional mapping of one amino acid (AA) to one binary code has limited the improvement of coding density by increasing the total number of different AAs. …”
Get full text
Article -
45
Trace Copilot: Automatically Locating Cryptographic Operations in Side-Channel Traces by Firmware Binary Instrumenting
Published 2024-12-01“…In contrast, obtaining the (partial) binary firmware is more prevalent in practical attacks on embedded devices. While binary code theoretically encapsulates necessary information for side-channel attacks on software-implemented cryptographic algorithms, there is no systematic study on leveraging this information to facilitate side-channel analysis. …”
Get full text
Article -
46
Nearest neighbor search algorithm for high dimensional data based on weighted self-taught hashing
Published 2017-06-01“…Because of efficiency in query and storage,learning hash is applied in solving the nearest neighbor search problem.The learning hash usually converts high-dimensional data into binary codes.In this way,the similarities between binary codes from two objects are conserved as they were in the original high-dimensional space.In practical applications,a lot of data which have the same distance from the query point but with different code will be returned.How to reorder these candidates is a problem.An algorithm named weighted self-taught hashing was proposed.Experimental results show that the proposed algorithm can reorder the different binary codes with the same Hamming distances efficiently.Compared to the naive algorithm,the F1-score of the proposed algorithm is improved by about 2 times and it is better than the homologous algorithms,furthermore,the time cost is reduced by an order of magnitude.…”
Get full text
Article -
47
Nearest neighbor search algorithm for high dimensional data based on weighted self-taught hashing
Published 2017-06-01“…Because of efficiency in query and storage,learning hash is applied in solving the nearest neighbor search problem.The learning hash usually converts high-dimensional data into binary codes.In this way,the similarities between binary codes from two objects are conserved as they were in the original high-dimensional space.In practical applications,a lot of data which have the same distance from the query point but with different code will be returned.How to reorder these candidates is a problem.An algorithm named weighted self-taught hashing was proposed.Experimental results show that the proposed algorithm can reorder the different binary codes with the same Hamming distances efficiently.Compared to the naive algorithm,the F1-score of the proposed algorithm is improved by about 2 times and it is better than the homologous algorithms,furthermore,the time cost is reduced by an order of magnitude.…”
Get full text
Article -
48
RESEARCH OF CHARACTERISTICS OF THE MODIFIED NOISEPROOF CODES ON THE BASIS OF COMPUTING EXPERIMENTS
Published 2007-09-01“…In the paper various methods of updating of noiseproof codes are presented, computing experiments on research of characteristics of the modified noiseproof block binary codes are spent.…”
Get full text
Article -
49
Cross-Modal Hashing Retrieval Based on Density Clustering
Published 2025-01-01“…However, most of the existing hashing methods have the problem of how to precisely learn potential correlations between different modalities from binary codes with minimal loss. In addition, solving binary codes in different modalities is an NP-hard problem. …”
Get full text
Article -
50
Short Blocklength Nonbinary Raptor-Like LDPC Coding Systems Design and Simulation
Published 2025-01-01“…In conclusion, this investigation shows that the Raptor-Like nonbinary coding, when the code and the transmission scheme are designed with proper optimizations, exhibits a performance improvement over the counterpart binary coding.…”
Get full text
Article -
51
Orbifolds of chiral fermionic CFTs and their duality
Published 2025-05-01“…For lattices based on binary error-correcting codes, we show the duality between reflection and shift orbifolds using a triality structure inherited from the binary codes. Additionally, we systematically compute the partition functions of the orbifold theories for both binary and nonbinary codes. …”
Get full text
Article -
52
Extending measurement range for three-dimensional structured light imaging with digital exponential fringe pattern
Published 2020“…This approach exploits the fact that at low levels of defocusing, exponential binary-coded fringe pattern exhibits a quasi-sinusoidal form having intact binary structures with reduced or negligible errors owing to high-order harmonic robustness during fringe generation. …”
Get full text
Article -
53
Multiobjective Coverage Control Strategy for Energy-Efficient Wireless Sensor Networks
Published 2012-04-01“…A new evolutionary algorithm named Multiobjective free search algorithm (MOFS) is designed for WSN optimization problem based on fitness functions and binary coding schemes. The proposed strategy is used to estimate the number of active nodes because individual nodes cannot have their working state information readily. …”
Get full text
Article -
54
A ranking hashing algorithm based on listwise supervision
Published 2019-05-01“…Recently,learning to hash technology has been used for the similarity search of large-scale data.It can simultaneous increase the search speed and reduce the storage cost through transforming the data into binary codes.At present,most ranking hashing algorithms compare the consistency of data in the Euclidean space and the Hamming space to construct the loss function.However,because the Hamming distance is a discrete integer value,there may be many data points sharing the same Hamming distance result in the exact ranking cannot be performed.To address this challenging issue,the encoded data was divided into several subspaces with the same length.Each subspace was set with different weights.The Hamming distance was calculated according to different subspace weights.The experimental results show that this algorithm can effectively sort the data in the Hamming space and improve the accuracy of the query compared with other learning to hash algorithms.…”
Get full text
Article -
55
Global crisis governance in response to scientific information
Published 2024-10-01“…A functional sub-system is constituted by binary codes, embodying the sub-system’s key logic. Sub-systems respond to information triggering their logics. …”
Get full text
Article -
56
Solar Cell Parameters Extraction from a Current-Voltage Characteristic Using Genetic Algorithm
Published 2013-05-01“…In this paper, we propose a computational based binary-coded genetic algorithm (GA) to extract the parameters (I0, Iph and n) for a single diode model of solar cell from its current-voltage (I-V) characteristic. …”
Get full text
Article -
57
Upper bounds of differential branch number of $$n$$ n -bit permutations
Published 2025-05-01“…This paper analyses the existence problem of binary codes with a specified dimension and minimum distance using combinatorial inequality. …”
Get full text
Article -
58
Reconfigurable Photonic Generation of Binary Modulated Microwave Signals
Published 2020-01-01“…The scheme is highly reconfigurable, amplitude keying signal (ASK), phase-shift keying signal (PSK) or frequency-shift keying (FSK) signal can be generated by appropriately setting the amplitude of the binary coding signal. The coding signal and local oscillator (LO) signals are independent with each other, binary modulated microwave signals can be generated with arbitrary coding rate and carrier frequency. …”
Get full text
Article -
59
Unsupervised Contrastive Graph Kolmogorov–Arnold Networks Enhanced Cross-Modal Retrieval Hashing
Published 2025-06-01“…To address modality heterogeneity and accelerate large-scale retrieval, cross-modal hashing strategies generate compact binary codes that enhance computational efficiency. Existing approaches often struggle with suboptimal feature learning due to fixed activation functions and limited cross-modal interaction. …”
Get full text
Article -
60
Theoretical investigation of photonic spin Hall effect based on layered metastructure with graphene regulation by WOA for encoding and encryption
Published 2025-07-01“…At a frequency of 7.186 THz, the three-digit binary coding is demonstrated, where the three dimensions of encoding are the type of PSHE displacement (the longitudinal displacement code is 0, and the transverse displacement code is 1), the displacement value (the displacement amplitude is 0 when it is less than 13λ, and 1 when it is larger than 13λ), and the angular range of the largest PSHE displacement (0–45°, and 45–90°, respectively). …”
Get full text
Article