Periodic binary codes, which are compressed to a signal with a width of several subpulses and small sidelobes, are searched using simulated annealing and hill climbing methods, because they can not be found by exhaust...
详细信息
ISBN:
(纸本)9781467348218
Periodic binary codes, which are compressed to a signal with a width of several subpulses and small sidelobes, are searched using simulated annealing and hill climbing methods, because they can not be found by exhaustive searches. We found new codes with lengths of 53 and 55 and that the peak-sidelobe to peak-mainlobe ratios are smaller than such conventional codes as M-sequences.
In this paper, a binary to gray code converter based on graphene-plasmonic waveguides using the interference effect is proposed. The plasmonic waveguides are made of graphene nano-ribbons located on the dielectric lay...
详细信息
In this paper, a binary to gray code converter based on graphene-plasmonic waveguides using the interference effect is proposed. The plasmonic waveguides are made of graphene nano-ribbons located on the dielectric layer. The use of graphene leads to high confinement of light, relatively low losses, and working in the mid-infrared to THz region. Based on the proposed structure, two-bit and three-bit binary to gray code converters are designed and their performance is evaluated using the finite-difference time-domain (FDTD) method. The calculated values of extinction ratio (ER) for two-bit converter are 7.22 dB and 14.83 dB for G0 and G1 bits and 8.82 dB, 5.72 dB, and 11.27 dB for G0, G1, and G2 bits in the three-bit converter. Time responses indicate the high performance of the proposed converters. Moreover, the dimensions of the two-bit and three-bit structures are 2.6 mu m(2) and 4 mu m(2), respectively, representing the high potential of these devices for use in integrated photonic systems. It is worthy to note that the converters with more bits can also be implemented using the proposed structure.
The paper discusses the idea of iterating the conversion of a continuous-tone picture from binary to Gray code representation. A simple recursive function is defined by means of which the value of the ith bit represen...
详细信息
security is considered vital aspects that are employed to protect user credentials and digital information from cyber security threats. A Caesar cipher is an ancient cryptography algorithm, and it is susceptible to be...
详细信息
security is considered vital aspects that are employed to protect user credentials and digital information from cyber security threats. A Caesar cipher is an ancient cryptography algorithm, and it is susceptible to being easily broken and vulnerable to brute-force attack. Brute-force attack is a cyberattack that uses trial and error to crack passwords, login credentials, and encryption keys to unauthorized access and illegal to a system and individual accounts. However, several research has been developed to defeat the existing vulnerabilities in Caesar cipher, but are still suffering from their limitations and failing to provide a high level of attack detection and encryption strength. Therefore, Modified Caesar Cipher Algorithm Based on binary codes (MCBC) has been proposed to mitigate brute-force attack more optimistically based on different scenarios. First scenario, converting message to binary numbering system and the second scenario, employ binary shifting technique and then convert it to hexadecimal code. The performance metrics that were taken into consideration to evaluate the MCBC proposed algorithm are detection rate, strength rate, true positive rate and time required for decryption. The experimental results show that the proposed approach MCBC performance metrics outperformed other algorithms against brute force attack by ensuring the confidentiality of information.
We introduce a new technique, called homogenization, for a systematic construction of augmented codes of binary linear codes, using the defining set approach in connection to multivariable functions. We explicitly det...
详细信息
We introduce a new technique, called homogenization, for a systematic construction of augmented codes of binary linear codes, using the defining set approach in connection to multivariable functions. We explicitly determine the parameters and the weight distribution of the homogenized codes when the defining set is either a simplicial complex generated by any finite number of elements, or the difference of two simplicial complexes, each of which is generated by a single maximal element. Using this homogenization technique, we produce several infinite families of optimal codes, self-orthogonal codes, minimal codes, and self-complementary codes. As applications, we obtain some best known quantum errorcorrecting codes, infinite families of intersecting codes (used in the construction of covering arrays), and we compute the Trellis complexity (required for decoding) for several families of codes as well. (c) 2025 Elsevier Inc. All rights are reserved, including those for text and data mining, AI training, and similar technologies.
PLC, as the core of industrial control systems, has been turned into a focal point of research for attackers targeting industrial control systems. However, current researched methods for attacking PLCs suffer from iss...
详细信息
PLC, as the core of industrial control systems, has been turned into a focal point of research for attackers targeting industrial control systems. However, current researched methods for attacking PLCs suffer from issues such as lack of precision and limited specificity. This paper proposes a novel attack method called AOIFF. Specially, AOIFF extracts the binary control logic code from a running PLC and reverses the binary code into assemble code. And then awareness of industrial field information is extracted from assemble code. Finally, it is based on awareness that attack code is generated and injected into a PLC, which can disrupt the normal control logic and then launch precise attacks on industrial control systems. Experimental results demonstrate that AOIFF can effectively perceive information in industrial field and initiate precise and targeted attacks on industrial control systems. Additionally, AOIFF achieves excellent results in the reverse engineering of binary code, enabling effective analysis of binary code.
Let G be a graph and M c V(G). Vertices x, y E Mare M-visible if there exists a shortest x, y-path of G that does not pass through any vertex of M \ {x,y}. We say that M is a mutual-visibility set if each pair of vert...
详细信息
Let G be a graph and M c V(G). Vertices x, y E Mare M-visible if there exists a shortest x, y-path of G that does not pass through any vertex of M \ {x,y}. We say that M is a mutual-visibility set if each pair of vertices of M is M-visible, while the size of any largest mutual-visibility set of G is the mutual-visibility number of G. If some additional combinations for pairs of vertices x, y are required to be M-visible, we obtain the total (every x, y E V(G) are M-visible), the outer (every x E M and every y E V(G) \ M are M-visible), and the dual (every x, y E V(G) \ M are M-visible) mutual-visibility set of G. The cardinalities of the largest of the above defined sets are known as the total, the outer, and the dual mutual-visibility number of G, respectively. We present results on the variety of mutual-visibility problems in hypercubes.
It has been demonstrated that characters can be written by proton beams in various materials. In contributing to the rapid development of proton beam writing technology, we introduce a new method for binary code stora...
详细信息
It has been demonstrated that characters can be written by proton beams in various materials. In contributing to the rapid development of proton beam writing technology, we introduce a new method for binary code storage and data encryption by writing binary codes of characters (BCC) in substrates with single proton beam writing technology. In this study, two kinds of BCC (ASCII BCC and long bit encrypted BCC) were written in CR-39 by a 2.6 MeV single proton beam. Our results show that in comparison to directly writing character shapes, writing ASCII BCC turned out to be about six times faster and required about one fourth the area in substrates. The approach of writing long bit encrypted BCC by single proton beams supports preserving confidential information in substrates. Additionally, binary codes fabricated by MeV single proton beams in substrates are more robust than those formed by lasers, since MeV single proton beams can make much deeper pits in the substrates. (c) 2006 Elsevier B.V. All rights reserved.
For a set omega = {1, 2, . . . , n} where n = 2k >= 6, let omega({k}) denote the set of all subsets of omega of size k. We examine the binary codes from the row span of biadjacency matrices of bipartite graphs with...
详细信息
For a set omega = {1, 2, . . . , n} where n = 2k >= 6, let omega({k}) denote the set of all subsets of omega of size k. We examine the binary codes from the row span of biadjacency matrices of bipartite graphs with bipartition (omega({k}), omega({k)(+1)(})) and two vertices as k-subsets and (k+1)-subsets of omega being adjacent if they have one element in common. We show that S2k is contained in the automorphism group of the graphs and the codes, respectively. In addition, we determine the duals of the codes, and by identifying suitable information sets, we construct 2-PD sets for the dual codes.
暂无评论