75,328 results on '"Binary number"'
Search Results
2. Game-Based Learning Mobile-App for Teaching the Binary Numeral System .
- Author
-
Ong, Lee-Yeng, Leow, Meng-Chew, and Tan, Chin-Keong
- Subjects
EDUCATIONAL games ,COVID-19 pandemic ,MOBILE apps ,BINARY number system ,MATHEMATICS education ,ACTIVE learning - Abstract
The binary numeral system is a fundamental and necessary knowledge for people who work within the computer related professional fields such as IT and Engineering. Almost every technological device that we use in our daily life today is operating on the binary numeral system because of its straightforward implementation in the digital electronic circuitry using logic gates. However, many beginners are facing difficulties in learning the binary numeral system, such as misunderstanding the concept, having insufficient time to practice their understanding or having difficulty in grasping the arithmetic procedures. With the fast development of digital devices, people nowadays are learning through interactive and personalized game-plays. Compared to traditional learning, game-based learning (GBL) creates a more attractive channel for knowledge transfer, ensuring more effective learning outcome. This study aims to design a GBL mobile-app for binary numeral system for beginners. The proposed mobile-app adopts James Paul Gee's 16 principles of GBL design methodology and follows the optimal GBL design factors provided by Olsson and Mozelius (2017). Four difficulty levels (beginner, intermediate, expert, and hidden) are available, with the random question generator matching the specific difficulty level. The difficulty level will increase gradually for three basic game modes (decimal, octal, and hexadecimal). The questions can be formulated into twoway conversions, with arithmetic operations covering addition, subtraction, multiplication, and division. Instead of asking users to input the binary number, the inversed questions will ask users to input the decimal number for the given binary number. There were a total of 37 responses collected from the beta testing. The survey questions were divided into three sections, namely the questions on the principles for GBL (12 questions), the questions on user experience (6 questions), and the questions on system integrity (5 questions). Majority of the participants gave positive feedback on the application of the principles for GBL design into the game development and on system integrity. They were satisfied with the user experience. 30 participants felt that the GBL approach is most suitable for learning Mathematics. In addition, the experiment also found that 46% of the participants preferred a better visual experience among other modalities from the VARK model. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
3. Value certainty in drift-diffusion models of preferential choice
- Author
-
Marius Usher and Douglas Lee
- Subjects
Empirical data ,Preferential choice ,Computer science ,media_common.quotation_subject ,Binary number ,Function (mathematics) ,Certainty ,Decision maker ,Consistency (database systems) ,Component (UML) ,Mental representation ,Econometrics ,sort ,Decision model ,Value (mathematics) ,General Psychology ,Mathematics ,media_common - Abstract
Decision models such as the drift-diffusion model (DDM) are widely used and broadly accepted for their ability to account remarkably well for binary choices between perceptual hypotheses about a stimulus or for preferential decisions between valued options (such as snacks or consumer products), and for their response time (RT) distributions, as a function of the stimulus or the option values. The DDM is built on an evidence accumulation to bound concept, where, in the value domain, a decision maker repeatedly samples the mental representations of the values of the options on offer until satisfied that there is enough evidence in favor of one option over the other. As the value signals that drive the DDM evidence are derived from value estimates that are not known to the decision maker with certainty, repeated sequential samples are necessary to average out noise. The classic DDM typically does not allow for different options to have different levels of variability in their value representations. However, recent value-based decision studies have shown that decision makers often report levels of certainty regarding value estimates that vary across choice options. There is therefore a need to extend the DDM to include an option-specific value certainty component. We present several such DDM extensions and validate them against empirical data from four previous studies. The data supports best a DDM version in which the drift of the accumulation is based on a sort of signal-to-noise ratio of value for each option (rather than a mere accumulation of samples from the corresponding value distributions). This DDM variant accounts for the positive impact of value certainty on choice consistency and for the negative impact of value certainty on RT.
- Published
- 2023
4. Digital and Quantum Computers
- Author
-
Fano, Guido, Blinder, S. M., Cini, Michele, Series editor, Ferrari, Attilio, Series editor, Forte, Stefano, Series editor, Montagna, Guido, Series editor, Nicrosini, Oreste, Series editor, Peliti, Luca, Series editor, Rotondi, Alberto, Series editor, Biscari, Paolo, Series editor, Manini, Nicola, Series editor, Hjorth-Jensen, Morten, Series editor, Fano, Guido, and Blinder, S M
- Published
- 2017
- Full Text
- View/download PDF
5. Unsigned Arithmetic
- Author
-
Seiffertt, John and Seiffertt, John
- Published
- 2017
- Full Text
- View/download PDF
6. Signed Numbers
- Author
-
Seiffertt, John and Seiffertt, John
- Published
- 2017
- Full Text
- View/download PDF
7. What Is Boolean Logic and How It Works
- Author
-
Zohuri, Bahman, Moghaddam, Masoud, Zohuri, Bahman, and Moghaddam, Masoud
- Published
- 2017
- Full Text
- View/download PDF
8. Number Systems
- Author
-
Kneusel, Ronald T. and Kneusel, Ronald T.
- Published
- 2017
- Full Text
- View/download PDF
9. From Chaos to Pseudorandomness: A Case Study on the 2-D Coupled Map Lattice
- Author
-
Fabio Pareschi, Yong Wang, Zhuo Liu, Gianluca Setti, Leo Yu Zhang, and Guanrong Chen
- Subjects
FOS: Computer and information sciences ,Computer Science - Cryptography and Security ,random number generator ,Computer science ,chaos ,Pseudorandomness ,Orbits ,Encryption ,Binary number ,Lyapunov exponent ,Chaos theory ,Radix point ,symbols.namesake ,Least significant bit ,Electrical and Electronic Engineering ,2-D coupled map lattice ,Pseudorandom number generator ,Arithmetic ,secure communication ,Lattices ,Chaotic communication ,Chaos ,Telecommunications ,Lyapunov exponent (LE) ,Computer Science Applications ,Human-Computer Interaction ,Control and Systems Engineering ,symbols ,Cryptography and Security (cs.CR) ,Algorithm ,Software ,Information Systems ,Coupled map lattice - Abstract
Applying chaos theory for secure digital communications is promising and it is well acknowledged that in such applications the underlying chaotic systems should be carefully chosen. However, the requirements imposed on the chaotic systems are usually heuristic, without theoretic guarantee for the resultant communication scheme. Among all the primitives for secure communications, it is well-accepted that (pseudo) random numbers are most essential. Taking the well-studied two-dimensional coupled map lattice (2D CML) as an example, this paper performs a theoretical study towards pseudo-random number generation with the 2D CML. In so doing, an analytical expression of the Lyapunov exponent (LE) spectrum of the 2D CML is first derived. Using the LEs, one can configure system parameters to ensure the 2D CML only exhibits complex dynamic behavior, and then collect pseudo-random numbers from the system orbits. Moreover, based on the observation that least significant bit distributes more evenly in the (pseudo) random distribution, an extraction algorithm E is developed with the property that, when applied to the orbits of the 2D CML, it can squeeze uniform bits. In implementation, if fixed-point arithmetic is used in binary format with a precision of $z$ bits after the radix point, E can ensure that the deviation of the squeezed bits is bounded by $2^{-z}$ . Further simulation results demonstrate that the new method not only guide the 2D CML model to exhibit complex dynamic behavior, but also generate uniformly distributed independent bits. In particular, the squeezed pseudo random bits can pass both NIST 800-22 and TestU01 test suites in various settings. This study thereby provides a theoretical basis for effectively applying the 2D CML to secure communications., Comment: 10 pages, 11figures
- Published
- 2023
10. On the linear complexity and autocorrelation of generalized cyclotomic binary sequences with period $ 4p^n $
- Author
-
Lin Yi, Zhimin Sun, Xiangyong Zeng, and Shasha Zhang
- Subjects
Discrete mathematics ,Linear complexity ,Algebra and Number Theory ,Computer Networks and Communications ,Computer Science::Information Retrieval ,Applied Mathematics ,Autocorrelation ,Binary number ,020206 networking & telecommunications ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Microbiology ,Pseudorandom binary sequence ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Discrete Mathematics and Combinatorics ,Period (music) ,Mathematics - Abstract
In this paper, a new class of generalized cyclotomic binary sequences with period \begin{document}$ 4p^n $\end{document} is proposed. These sequences are almost balanced, and the explicit formulas of their linear complexity and autocorrelation are presented.
- Published
- 2023
11. Some subfield codes from MDS codes
- Author
-
Jinquan Luo and Can Xiang
- Subjects
Class (set theory) ,Authentication ,Algebra and Number Theory ,Computer Networks and Communications ,Applied Mathematics ,Binary number ,020206 networking & telecommunications ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Microbiology ,Linear code ,Dual (category theory) ,Algebra ,Association scheme ,Finite field ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Discrete Mathematics and Combinatorics ,Mathematics - Abstract
Subfield codes of linear codes over finite fields have recently received a lot of attention, as some of these codes are optimal and have applications in secrete sharing, authentication codes and association schemes. In this paper, a class of binary subfield codes is constructed from a special family of MDS codes, and their parameters are explicitly determined. The parameters of their dual codes are also studied. Some of the codes presented in this paper are optimal or almost optimal.
- Published
- 2023
12. Deep learning binary fruit fly algorithm for identifying SYN flood attack from TCP/IP
- Author
-
D. Ravikumar, Vankayalapati Nagaraju, V. Rajendran, and Arun Raaza
- Subjects
Handshake ,Artificial neural network ,computer.internet_protocol ,Computer science ,business.industry ,Deep learning ,Process (computing) ,Binary number ,Denial-of-service attack ,General Medicine ,Internet protocol suite ,Artificial intelligence ,SYN flood ,business ,computer ,Algorithm - Abstract
SYN Flood Attack is one form of distributed denial of service attack that attains the handshake process of TCP. This attack consumes all available server resources and provokes legitimate traffic which aims to make the server unavailable. It causes serious damage to cloud server and networking protocols. The main objective of this research work is to train the neural network for detecting the attack and to secure network connection. A novel binary fruit fly optimization algorithm with deep learning is proposed to predict the syn flood attack. The proposed algorithm is implemented using the KDD cup dataset. DL- BFFA algorithm has achieved 99.96% detection accuracy for detecting the SYN Flood Attack. A comparison study is conducted to validate the proposed model.
- Published
- 2023
13. New type i binary [72, 36, 12] self-dual codes from composite matrices and R1 lifts
- Author
-
Serap Sahinkaya, Adrian Korban, and Deniz Ustun
- Subjects
Ring (mathematics) ,Algebra and Number Theory ,Computer Networks and Communications ,Applied Mathematics ,Identity matrix ,Binary number ,Type (model theory) ,Microbiology ,Omega ,Lift (mathematics) ,Combinatorics ,Discrete Mathematics and Combinatorics ,Generator matrix ,Mathematics ,Group ring - Abstract
In this work, we define three composite matrices derived from group rings. We employ these composite matrices to create generator matrices of the form \begin{document}$ [I_n \ | \ \Omega(v)], $\end{document} where \begin{document}$ I_n $\end{document} is the identity matrix and \begin{document}$ \Omega(v) $\end{document} is a composite matrix and search for binary self-dual codes with parameters \begin{document}$ [36,18, 6 \ \text{or} \ 8]. $\end{document} We next lift these codes over the ring \begin{document}$ R_1 = \mathbb{F}_2+u\mathbb{F}_2 $\end{document} to obtain codes whose binary images are self-dual codes with parameters \begin{document}$ [72,36,12]. $\end{document} Many of these codes turn out to have weight enumerators with parameters that were not known in the literature before. In particular, we find \begin{document}$ 30 $\end{document} new Type I binary self-dual codes with parameters \begin{document}$ [72,36,12]. $\end{document}
- Published
- 2023
14. Residual Quantization for Low Bit-Width Neural Networks
- Author
-
Wenjun Zhang, Bingbing Ni, Zefan Li, Wen Gao, Teng Li, and Xiaokang Yang
- Subjects
Artificial neural network ,Computer science ,Quantization (signal processing) ,Binary number ,Maximization ,Residual ,Computer Science Applications ,Acceleration ,Compression (functional analysis) ,Signal Processing ,Media Technology ,Electrical and Electronic Engineering ,Representation (mathematics) ,Algorithm - Abstract
Neural network quantization has shown to be an effective way for network compression and acceleration. However, existing binary or ternary quantization methods suffer from two major issues. First, low bit-width input/activation quantization easily results in severe prediction accuracy degradation. Second, network training and quantization are always treated as two non-related tasks, leading to accumulated parameter training error and quantization error. In this work, we introduce a novel scheme, named Residual Quantization, to train a neural network with both weights and inputs constrained to low bit-width, e.g., binary or ternary values. On one hand, by recursively performing residual quantization, the resulting binary/ternary network is guaranteed to approximate the full-precision network with much smaller errors. On the other hand, we mathematically re-formulate the network training scheme in an EM-like manner, which iteratively performs network quantization and parameter optimization. During expectation, the low bit-width network is encouraged to approximate the full-precision network. During maximization, the low bit-width network is further tuned to gain better representation capability. Extensive experiments well demonstrate that the proposed quantization scheme outperforms previous low bit-width methods and achieves much closer performance to the full-precision counterpart.
- Published
- 2023
15. Signs of Life from Earth
- Author
-
Linde, Peter, Beech, Martin, Series editor, and Linde, Peter
- Published
- 2016
- Full Text
- View/download PDF
16. Numerical Representation
- Author
-
Khoury, Richard, Harder, Douglas Wilhelm, Khoury, Richard, and Harder, Douglas Wilhelm
- Published
- 2016
- Full Text
- View/download PDF
17. Analog-to-Digital Conversion
- Author
-
N. Makarov, Sergey, Ludwig, Reinhold, Bitar, Stephen J., N. Makarov, Sergey, Ludwig, Reinhold, and Bitar, Stephen J.
- Published
- 2016
- Full Text
- View/download PDF
18. Some Assembler Programs
- Author
-
Paul, Wolfgang J., Baumann, Christoph, Lutsyk, Petro, Schmaltz, Sabine, Paul, Wolfgang J., Baumann, Christoph, Lutsyk, Petro, and Schmaltz, Sabine
- Published
- 2016
- Full Text
- View/download PDF
19. Base 2, 8, and 16 Notations
- Author
-
Di Cataldo, Giuseppe and Di Cataldo, Giuseppe
- Published
- 2016
- Full Text
- View/download PDF
20. Learning Binary Hash Codes Based on Adaptable Label Representations
- Author
-
Cheng-Hao Tu, Chu-Song Chen, and Huei-Fang Yang
- Subjects
Theoretical computer science ,Computer Networks and Communications ,Computer science ,Hash function ,Binary number ,Construct (python library) ,Class (biology) ,Computer Science Applications ,Image (mathematics) ,ComputingMethodologies_PATTERNRECOGNITION ,Discriminative model ,Artificial Intelligence ,Binary code ,Hamming code ,Software - Abstract
The goal of supervised hashing is to construct hash mappings from collections of images and semantic annotations such that semantically relevant images are embedded nearby in the learned binary hash representations. Existing deep supervised hashing approaches that employ classification frameworks with a classification training objective for learning hash codes often encode class labels as one-hot or multi-hot vectors. We argue that such label encodings do not well reflect semantic relations among classes and instead, effective class label representations ought to be learned from data, which could provide more discriminative signals for hashing. In this article, we introduce Adaptive Labeling Deep Hashing (AdaLabelHash) that learns binary hash codes based on learnable class label representations. We treat the class labels as the vertices of a K -dimensional hypercube, which are trainable variables and adapted together with network weights during the backward network training procedure. The label representations, referred to as codewords, are the target outputs of hash mapping learning. In the label space, semantically relevant images are then expressed by the codewords that are nearby regarding Hamming distances, yielding compact and discriminative binary hash representations. Furthermore, we find that the learned label representations well reflect semantic relations. Our approach is easy to realize and can simultaneously construct both the label representations and the compact binary embeddings. Quantitative and qualitative evaluations on several popular benchmarks validate the superiority of AdaLabelHash in learning effective binary codes for image search.
- Published
- 2022
21. Multiset Membership Lookup in Large Datasets
- Author
-
Lin Chen and Jihong Yu
- Subjects
Multiset ,Theoretical computer science ,Computer science ,Binary number ,Construct (python library) ,Bloom filter ,Load balancing (computing) ,Data structure ,Computer Science Applications ,Compact space ,Computational Theory and Mathematics ,Computer Science::Networking and Internet Architecture ,Algorithm design ,Computer Science::Databases ,Information Systems - Abstract
Given a dataset $\cal S$ composed of g subsets with each data items belonging to one of them, $\textit{multiset membership lookup}$ takes an item e as input and outputs a binary answer whether $e\in{\cal S}$ and, in case of yes, the ID of the subset to which e belongs. Overlaid upon while more sophisticated than the canonical membership lookup, multiset membership lookup emerges as a pivotal functionality in many computing and networking paradigms. The quest to achieve high-speed, high-accuracy lookup with limited memory cost makes lookup algorithm design a challenging task, particularly when the data items arrive as a stream. In this paper, we devise compact data structures and lookup algorithms that are amendable for hardware implementation, while guaranteeing high lookup accuracy and supporting interactive query processing. We first propose $\textit{multi-hash color table}$ , a variant of Bloom filter, to encode subset IDs compactly and map the ID of an item to its subset ID. We further construct a more balanced data structure called $\textit{balanced multi-hash color table}$ to improve the compactness by integrating the state-of-the-art load balancing technique. We complete our work by addressing the case of $\textit{batch arrivals}$ and design a batched recording algorithm optimizing the memory efficiency.
- Published
- 2022
22. Hash Bit Selection Based on Collaborative Neurodynamic Optimization
- Author
-
Jun Wang, Sam Kwong, and Xinqi Li
- Subjects
Mathematical optimization ,Computer science ,Hash function ,Particle swarm optimization ,Binary number ,Models, Theoretical ,Computer Science Applications ,Human-Computer Interaction ,Cardinality ,Control and Systems Engineering ,Mutation (genetic algorithm) ,Astrophysics::Solar and Stellar Astrophysics ,Quadratic programming ,Electrical and Electronic Engineering ,Algorithms ,Software ,Selection (genetic algorithm) ,Information Systems ,Premature convergence - Abstract
Hash bit selection determines an optimal subset of hash bits from a candidate bit pool. It is formulated as a zero-one quadratic programming problem subject to binary and cardinality constraints. In this article, the problem is equivalently reformulated as a global optimization problem. A collaborative neurodynamic optimization (CNO) approach is applied to solve the problem by using a group of neurodynamic models initialized with particle swarm optimization iteratively in the CNO. Lévy mutation is used in the CNO to avoid premature convergence by ensuring initial state diversity. A theoretical proof is given to show that the CNO with the Lévy mutation operator is almost surely convergent to global optima. Experimental results are discussed to substantiate the efficacy and superiority of the CNO-based hash bit selection method to the existing methods on three benchmarks.
- Published
- 2022
23. Coupling physics in machine learning to investigate the solution behavior of binary Mg alloys
- Author
-
Qian Gao, Yuan Yuan, Tao Chen, Fusheng Pan, Aitao Tang, Tingyu Li, Andy Watson, Qian Xi, and Tingting Liu
- Subjects
Work (thermodynamics) ,Materials science ,business.industry ,Decision tree learning ,Minor (linear algebra) ,Metals and Alloys ,Binary number ,Machine learning ,computer.software_genre ,Random forest ,Electronegativity ,Atomic radius ,Mechanics of Materials ,Phase (matter) ,Artificial intelligence ,business ,computer - Abstract
The solution behavior of a second element in the primary phase (α(Mg)) is important in the design of high-performance alloys. In this work, three sets of features have been collected: a) interaction features of solutes and Mg obtained from first-principles calculation, b) intrinsic physical properties of the pure elements and c) structural features. Based on the maximum solid solubility values, the solution behavior of elements in α(Mg) are classified into four types, e.g., miscible, soluble, sparingly-soluble and slightly-soluble. The machine learning approach, including random forest and decision tree algorithm methods, is performed and it has been found that four features, e.g., formation energy, electronegativity, non-bonded atomic radius, and work function, can together determine the classification of the solution behavior of an element in α(Mg). The mathematical correlations, as well as the physical relationships among the selected features have been analyzed. This model can also be applied to other systems following minor modifications of the defined features, if required.
- Published
- 2022
24. Solution of Simultaneous Higher Order Equations Based on DNA Strand Displacement Circuit
- Author
-
Tongtong Mao, Junwei Sun, and Yanfeng Wang
- Subjects
Quantitative Biology::Biomolecules ,Artificial neural network ,Analogue electronics ,Logic ,Computer science ,Computation ,Biomedical Engineering ,Pharmaceutical Science ,Medicine (miscellaneous) ,Binary number ,Bioengineering ,DNA ,Catalysis ,Computer Science Applications ,Computers, Molecular ,Quadratic equation ,Simultaneous equations ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,Applied mathematics ,Electrical and Electronic Engineering ,Software verification ,Biotechnology ,Dna strand displacement - Abstract
Currently, DNA strand displacement is often used to build neural networks or solve logical problems. While there are few studies on the use of DNA strand displacement to solve the higher order equations. In this paper, the catalysis, degradation, annihilation and adjusted reaction modules are built through DNA strand displacement. The chemical reaction networks of the corresponding higher order equations and simultaneous equations are established through these modules, and these chemical reaction networks can be used to build analog circuits to solve binary primary simultaneous equations and binary quadratic simultaneous equations. Finally, through Visual DSD software verification, this design can realize the solution of binary primary simultaneous equations and binary quadratic simultaneous equations, which provides a reference for DNA computation in the future.
- Published
- 2022
25. Asymptotic analysis and upper semicontinuity with respect to delay term of attractors to binary mixtures of solids
- Author
-
J.L.L. Almeida, M. M. Freitas, M. J. Dos Santos, L.G.R. Miranda, and A. J. A. Ramos
- Subjects
Physics ,Asymptotic analysis ,General Mathematics ,Attractor ,Applied mathematics ,Binary number ,Term (time) - Abstract
We investigated the asymptotic dynamics of a nonlinear system modeling binary mixture of solids with delay term. Using the recent quasi-stability methods introduced by Chueshov and Lasiecka, we prove the existence, smoothness and finite dimensionality of a global attractor. We also prove the existence of exponential attractors. Moreover, we study the upper semicontinuity of global attractors with respect to small perturbations of the delay terms.
- Published
- 2022
26. Real-Time 2D-to-3D Conversion for Television Broadcasting Based on Embedded System
- Author
-
Shih Chang Hsia, Ho-Cheng Tsai, and Szu-Hong Wang
- Subjects
Liquid-crystal display ,Computer science ,business.industry ,Frame (networking) ,Binary number ,2D to 3D conversion ,Stereo display ,Object (computer science) ,Signal ,Computer Science Applications ,law.invention ,Human-Computer Interaction ,Hardware and Architecture ,law ,Embedded system ,Electrical and Electronic Engineering ,business ,Communication channel - Abstract
In this paper, we present an efficient 3D display technique that employs current 2D TV channels. First, a gradient background depth is generated for the still region. To create a stereo effect, multiple objects are detected and segmented using the binary format. Object depth is estimated according to the object size and its location. Depth value is assigned as a proportion of the object size using the linear quantitative method. Each object size is calculated and its depth value is proportional to the size parameter. If an object is the largest one and is located in the central region, the maximum depth value is assigned. For real-time implementation, dual ARM cores perform the task using the algorithm of the proposed stereo conversion. Our results show that a low-cost embedded system can perform the proposed 3D algorithm, with a processing time of 43ms per frame. The signal from a TV channel can be sampled and converted to a 3D format display on a conventional LCD screen.
- Published
- 2022
27. Identification of significant bio-markers from high-dimensional cancerous data employing a modified multi-objective meta-heuristic algorithm
- Author
-
Puspanjali Mohapatra and Prajna Paramita Debata
- Subjects
General Computer Science ,Computer science ,Chaotic ,Sorting ,Binary number ,020206 networking & telecommunications ,02 engineering and technology ,High dimensional ,Filter (signal processing) ,Identification (information) ,Scoring algorithm ,0202 electrical engineering, electronic engineering, information engineering ,Meta heuristic ,020201 artificial intelligence & image processing ,Algorithm - Abstract
Identification of the most prominent bio-markers or genes with high classification accuracy in the high-dimensional cancerous data, is still remained as an emerging challenge for the machine learning researchers. As this challenge has two objectives, i.e. minimizing the number of genes (NoG) and maximizing the classification accuracy percentage (CAP), this problem can be modeled as binary multi-objective approach. In this work, a modified version of multi-objective Jaya algorithm, multi-objective chaotic Jaya (MOCJaya), is suggested to select the minimum NoG with high CAP. Initially, a filter approach, namely Fisher score is applied to pre-select the informative genes. Then, MOCJaya algorithm is employed for both selecting key genes and classifying the cancer data. To assess the efficacy of the designed algorithm, ten binary and multi-class cancerous datasets are considered. Here, the suggested algorithm has been compared with multi-objective chaotic Genetic Algorithm (MOCGA), multi-objective chaotic particle swarm optimization (MOCPSO), multi-objective Jaya (MOJaya), multi-objective PSO (MOPSO), and non-dominated sorting GA (NSGA-II) models. Moreover, a comparison of MOCJaya algorithm with other seventeen existing models, is also performed here. The experimental results and comparison analysis reveal that MOCJaya classifies both the positive and negative samples of the cancer datasets in high CAP with a smaller NoG.
- Published
- 2022
28. On bounded basis of integers
- Author
-
Jin-Hui Fang
- Subjects
Set (abstract data type) ,Combinatorics ,Algebra and Number Theory ,Integer ,Bounded function ,Binary number ,Basis (universal algebra) ,Mathematics - Abstract
Let Z be the set of integers and N the set of positive integers. For a nonempty set A of integers and any integer n, denote r A ( n ) by the number of representations of n of the form n = a + a ′ , where a ⩽ a ′ and a , a ′ ∈ A , and d A ( n ) by the number of ( a , a ′ ) with a , a ′ ∈ A such that n = a − a ′ . The binary support of a positive integer n is defined as the subset S ( n ) of nonnegative integers consisting of the exponents in the binary expansion of n, and S ( n ) = − S ( | n | ) for negative integers n. In 2004, Nesetřil and Serra (2004) [6] proved that there is a set A of integers satisfying r A ( n ) = 1 for all integers n and | S ( x ) ⋃ S ( y ) | ⩽ 4 | S ( x + y ) | for x , y ∈ A . In this paper, we obtain a stronger result by adding the restriction that d A ( n ) = 1 for all positive integers n. Furthermore, we also prove that, (i) there is a set A 1 of integers satisfying r A 1 ( n ) = 1 for all n ∈ Z , the set consisting of positive integers n with d A 1 ( n ) = 0 has density one, and | S ( x ) ⋃ S ( y ) | ⩽ 4 | S ( x + y ) | for x , y ∈ A 1 ; (ii) there is a set A 2 of integers satisfying d A 2 ( n ) = 1 for all n ∈ N , the set consisting of integers n with r A 2 ( n ) = 0 has density one, and | S ( x ) ⋃ S ( y ) | ⩽ 4 | S ( x + y ) | for x , y ∈ A 2 .
- Published
- 2022
29. Pareto-scheduling of two competing agents with their own equal processing times
- Author
-
Jinjiang Yuan, Yuan Zhang, Rubing Chen, Zhichao Geng, and Lingfa Lu
- Subjects
Mathematical optimization ,Information Systems and Management ,General Computer Science ,Work (electrical) ,Computer science ,Modeling and Simulation ,Tardiness ,Pareto principle ,Binary number ,Management Science and Operations Research ,Completion time ,Industrial and Manufacturing Engineering ,Scheduling (computing) - Abstract
We consider the Pareto-scheduling of two competing agents on a single machine, in which the jobs of each agent have their “own equal processing times” (shortly, OEPT). In the literature, two special versions of the OEPT model, in which the jobs have either unit or equal processing times, have been well studied, where the criteria are given by various regular objective functions without including the late work criteria. However, for equal processing times, the exact complexity of three problems is still unaddressed. Two-agent scheduling related to late work criteria is also a hot topic in recent years. This inspires our research by also including the total (weighted) late work as criteria. We show that, for equal processing times, all the problems are binary NP-hard if the criterion of one agent is the total tardiness or the total late work and the criterion of the other agent is either the total tardiness or the total late work or the weighted number of tardy jobs or the total weighted completion time. As a result, complexity classification for equal processing times is completely addressed. We further show that all the problems under the OEPT model are either polynomially solvable or ordinary NP-hard, which results in a complete complexity classification for the OEPT model.
- Published
- 2022
30. Ultra low power design of multi-valued logic circuit for binary interfaces
- Author
-
Ratnesh Mohan and Mansi Jhamb
- Subjects
General Computer Science ,Basis (linear algebra) ,Computer science ,Binary number ,020206 networking & telecommunications ,02 engineering and technology ,Power (physics) ,CMOS ,Simple (abstract algebra) ,Logic gate ,0202 electrical engineering, electronic engineering, information engineering ,Electronic engineering ,020201 artificial intelligence & image processing ,Radix ,Ternary operation - Abstract
From the dawn of the computer age, man has mass produced binary components for computers, due to which ternary or higher radix computers are not yet commercially used. It has been proved that ternary logic can be more efficient than binary logic and there are many devices in development that operate on more than two internal states. Therefore an efficient method to produce multi-valued logic on the basis of binary input provided is needed. In this article, an effective, simple, flexible, and low power consumption implementation has been proposed that can convert any binary number to a number of chosen radix. The proposed design is implemented in 32 nm TSMC CMOS. The proposed design is then evaluated in power/delay space and its performances are compared with the latest state of art designs. The proposed circuit exhibits power saving up to 92 % over previous models.
- Published
- 2022
31. On a multiple Dirichlet series associated to binary cubic forms
- Author
-
Ramin Takloo-Bighash and Eun Hye Lee
- Subjects
symbols.namesake ,Pure mathematics ,Algebra and Number Theory ,symbols ,Binary number ,Dirichlet series ,Mathematics - Published
- 2022
32. On Orbits and Bi-invariant Subsets of Binary $G$-Spaces
- Author
-
P. S. Gevorgyan and A. A. Nazaryan
- Subjects
Pure mathematics ,Group (mathematics) ,Distributivity ,General Mathematics ,54H15, 57S99 ,General Topology (math.GN) ,FOS: Mathematics ,Binary number ,Invariant (mathematics) ,Space (mathematics) ,Action (physics) ,Mathematics ,Mathematics - General Topology - Abstract
Orbits and bi-invariant subsets of binary $G$-spaces are studied. The problem of the distributivity of a binary action of a group $G$ on a space $X$, which was posed in 2016 by one of the authors, is solved., 11 pages
- Published
- 2023
33. Units and Measurement
- Author
-
Malthe-Sørenssen, Anders, Ashby, Neil, Series editor, Brantley, William, Series editor, Fowler, Michael, Series editor, Hjorth-Jensen, Morten, Series editor, Inglis, Michael, Series editor, Klose, Heinz, Series editor, Sherif, Helmy, Series editor, and Malthe-Sørenssen, Anders
- Published
- 2015
- Full Text
- View/download PDF
34. Computational Systems
- Author
-
Mobus, George E., Kalton, Michael C., Abarbanel, Henry, Series editor, Braha, Dan, Series editor, Érdi, Péter, Series editor, Friston, Karl, Series editor, Haken, Hermann, Series editor, Jirsa, Viktor, Series editor, Kacprzyk, Janusz, Series editor, Kaneko, Kunihiko, Series editor, Kelso, Scott, Series editor, Kirkilionis, Markus, Series editor, Kurths, Jürgen, Series editor, Nowak, Andrzej, Series editor, Reichl, Linda, Series editor, Schuster, Peter, Series editor, Schweitzer, Frank, Series editor, sornette, didier, Series editor, Thurner, Stefan, Series editor, Mobus, George E., and Kalton, Michael C.
- Published
- 2015
- Full Text
- View/download PDF
35. Numbers
- Author
-
Vince, John and Vince, John
- Published
- 2015
- Full Text
- View/download PDF
36. Number Systems
- Author
-
Kneusel, Ronald T. and Kneusel, Ronald T.
- Published
- 2015
- Full Text
- View/download PDF
37. Number Systems and Data Communication
- Author
-
Elahi, Ata, Arjeski, Trevor, Elahi, Ata, and Arjeski, Trevor
- Published
- 2015
- Full Text
- View/download PDF
38. Assortment optimization in omni-channel retailing
- Author
-
Alexander Hübner and Jonas Hense
- Subjects
Mathematical optimization ,Information Systems and Management ,General Computer Science ,Computer science ,Heuristic (computer science) ,Substitution (logic) ,Binary number ,Management Science and Operations Research ,Space (commercial competition) ,Industrial and Manufacturing Engineering ,Profit (economics) ,Modeling and Simulation ,Computer Science::Information Theory ,Communication channel - Abstract
Nowadays the majority of retail customers use multiple channels. We investigate the assortment, space and inventory problem for an omni-channel retailer operating with interconnected bricks-and-mortar stores and an online shop. For this problem it becomes essential to consider customers’ demand interactions across channels. Current literature mainly focuses on single-channel assortments and ignores cross-channel substitution. We contribute the first integrated omni-channel model that determines assortments for the online and bricks-and-mortar channel with stochastic, space-elastic and out-of-assortment and out-of-stock demand both for in-channel substitution and cross-channel substitution. A specialized heuristic is developed that is based on an iterative solution of a binary problem and demand updates. Our approach achieves near-optimal results for small instances and higher objective values as an alternative heuristic for larger instances. With the full integration of channels, omni-channel retailers can realize a profit increase that mainly depends on the magnitude of substitution rates. We further show numerically that in-channel substitution has a stronger impact on profits than cross-channel substitution when costs are equal across channels.
- Published
- 2022
39. Bilevel integer programming on a Boolean network for discovering critical genetic alterations in cancer development and therapy
- Author
-
Steve Kwon, Sunil Chopra, Kangbok Lee, and Kyungduk Moon
- Subjects
Information Systems and Management ,Theoretical computer science ,General Computer Science ,Branch and bound ,Computer science ,Genetic Alteration ,Binary number ,Management Science and Operations Research ,Industrial and Manufacturing Engineering ,Boolean network ,Integer programming model ,Modeling and Simulation ,Cancer development ,Logical inference ,Integer programming - Abstract
Boolean network is a modeling tool that describes a dynamic system with binary variables and their logical transition formulas. Recent studies in precision medicine use a Boolean network to discover critical genetic alterations that may lead to cancer or target genes for effective therapies to individuals. In this paper, we study a logical inference problem in a Boolean network to find all such critical genetic alterations in a minimal (parsimonious) way. We propose a bilevel integer programming model to find a single minimal genetic alteration. Using the bilevel integer programming model, we develop a branch and bound algorithm that effectively finds all of the minimal alterations. Through a computational study with eleven Boolean networks from the literature, we show that the proposed algorithm finds solutions much faster than the state-of-the-art algorithms in large data sets.
- Published
- 2022
40. An Innovative Formulation Tightening Approach for Job-Shop Scheduling
- Author
-
Mikhail A. Bragin, Peter B. Luh, and Bing Yan
- Subjects
Convex hull ,Continuous variable ,Mathematical optimization ,Job shop scheduling ,Linear programming ,Control and Systems Engineering ,Computer science ,Scheduling (production processes) ,Much difficulty ,Binary number ,Electrical and Electronic Engineering ,Integer programming - Abstract
Job shops are an important production environment for low-volume high-variety manufacturing. Its scheduling has recently been formulated as an Integer Linear Programming (ILP) problem to take advantages of popular Mixed-Integer Linear Programming (MILP) methods, e.g., branch-and-cut. When considering a large number of parts, MILP methods may experience difficulties. To address this, a critical but much overlooked issue is formulation tightening. The idea is that if problem constraints can be transformed to directly delineate the problem convex hull in the data pre-processing stage, then a solution can be obtained by using linear programming methods without much difficulty. The tightening process, however, is NP hard because of the existence of integer variables. In this paper, an innovative and systematic approach is established for the first time to tighten the formulations of individual parts, each with multiple operations, in the data pre-processing stage. It is a major extension from our previous work on problems with binary and continuous variables to integer variables. The idea is to first link integer variables to binary variables by innovatively combining constraints so that the integer variables are uniquely determined by binary variables. With binary variables and continuous only, the vertices of the convex hull can be obtained based on the vertices of the linear problem after relaxing binary requirements with proved tightness. These vertices are then converted to tight constraints for general use. This approach significantly improves and extends our previous results on tightening single-operation parts without actually achieving tightness. Numerical results demonstrate significant benefits on solution quality and computational efficiency. This approach also applies to other ILP problems with similar characteristics and fundamentally changes the way how such problems are formulated and solved.
- Published
- 2022
41. Stabilizing Control Structures: An Optimization Framework
- Author
-
Hesamoddin Mosalli and Maryam Babazadeh
- Subjects
Structure (mathematical logic) ,LTI system theory ,Set (abstract data type) ,Class (set theory) ,Mathematical optimization ,Control and Systems Engineering ,Generalization ,Computer science ,Binary number ,Electrical and Electronic Engineering ,Decentralised system ,Equivalence (measure theory) ,Computer Science Applications - Abstract
This paper presents a new optimization-based approach to determine the class of stabilizing control structures with the necessary set of feedback links for interconnected systems. The proposed approach relies on a graph theoretic interpretation and its equivalence in terms of binary linear programs (BLP). To carry out the primary goal, first, the stabilizability of an LTI system under the decentralized control structure is presented in terms of a BLP. Next, two graph-based criteria are proposed to characterize stabilizing control structures with the required feedback links. Finally, all possible stabilizing control structures with the necessary feedback links are derived via solving a set of BLPs. In addition to the analysis of stabilizing control structures, the proposed graph-theoretic approach offers a versatile set of tools to find the simplest control structures capable of assigning the closed-loop spectrum in a totally arbitrary desired region. Simulation results illustrate the assessment of stabilizing control structures, the required additional feedback links, and the elegant generalization of the proposed approach to regional pole-placement.
- Published
- 2022
42. Hybrid Binary Butterfly Optimization Algorithm and Simulated Annealing for Feature Selection Problem
- Author
-
Raees Ahmad Khan, Fawaz Alsolami, and Mohd Faizan
- Subjects
Statistics and Probability ,Control and Optimization ,Optimization algorithm ,Computer science ,Binary number ,Feature selection ,Computer Science Applications ,Computational Mathematics ,Computational Theory and Mathematics ,Modeling and Simulation ,Butterfly ,Simulated annealing ,Decision Sciences (miscellaneous) ,Algorithm - Abstract
Feature selection is performed to eliminate irrelevant features to reduce computational overheads. Metaheuristic algorithms have become popular for the task of feature selection due to their effectiveness and flexibility. Hybridization of two or more such metaheuristics has become popular in solving optimization problems. In this paper, we propose a hybrid wrapper feature selection technique based on binary butterfly optimization algorithm (bBOA) and Simulated Annealing (SA). The SA is combined with the bBOA in a pipeline fashion such that the best solution obtained by the bBOA is passed on to the SA for further improvement. The SA solution improves the best solution obtained so far by searching in its neighborhood. Thus the SA tries to enhance the exploitation property of the bBOA. The proposed method is tested on twenty datasets from the UCI repository and the results are compared with five popular algorithms for feature selection. The results confirm the effectiveness of the hybrid approach in improving the classification accuracy and selecting the optimal feature subset.
- Published
- 2022
43. A maximum-margin multisphere approach for binary Multiple Instance Learning
- Author
-
Matteo Avolio, Antonio Fuduli, and Annabella Astorino
- Subjects
Fixed-center margin maximization ,Information Systems and Management ,General Computer Science ,Basis (linear algebra) ,Computer science ,Heuristic ,Multiple Instance Learning ,Binary number ,Management Science and Operations Research ,Type (model theory) ,Industrial and Manufacturing Engineering ,Machine Learning ,Set (abstract data type) ,Support vector machine ,Spherical separation ,Margin (machine learning) ,Modeling and Simulation ,Benchmark (computing) ,Algorithm - Abstract
We propose a heuristic approach for solving binary Multiple Instance Learning (MIL) problems, whose objective is to categorize bags of instances. Considering the case with two classes of instances, on the basis of the standard MIL assumption, a bag is classified positive if it contains at least a positive instance and negative if all its instances are negative. Inspired by a well-established MIL Support Vector Machine type approach, our technique is based on iteratively separating the bags by means of successive maximum-margin spheres. Such spheres, whose number is automatically determined, are generated by computing, for each of them, the optimal radius in correspondence to a prefixed center. Numerical results are presented on a set of benchmark test problems, showing the effectiveness of our approach.
- Published
- 2022
44. Computationally Efficient Long Binary Sequence Designs With Low Autocorrelation Sidelobes
- Author
-
Ronghao Lin and Yutao Chen
- Subjects
Aperiodic graph ,Computer science ,Autocorrelation ,Metric (mathematics) ,Convergence (routing) ,Fast Fourier transform ,Aerospace Engineering ,Binary number ,Penalty method ,Electrical and Electronic Engineering ,Algorithm ,Pseudorandom binary sequence - Abstract
The design of binary sequences with low autocorrelation sidelobes is critically important to diverse applications including, radar and sonar as well as communications. Many computational methods have been proposed recently to design binary sequences through optimizing the integrated sidelobe level (ISL, which is a commonly used optimization metric. However, due to the high computational complexities, few of them can be used for long binary sequence designs, which are needed in, for example, low-cost commercial automotive radar systems. To improve the performance of the recently introduced FFT-based CANARY algorithm for long aperiodic binary sequence designs, we introduce a new penalty function into the ISL metric and also propose a new framework of double-loop iterations. These new ideas are also extended to design long periodic binary sequences with low autocorrelation sidelobes and long aperiodic and periodic binary sequences with low correlation zones (LCZs . The associated cost functions are still optimized efficiently via FFT-based iterations, making the proposed algorithms computationally efficient and hence suitable for long binary sequence designs. Moreover, the convergence properties and the computational complexities of these algorithms are analyzed. Numerical examples are provided to demonstrate the effectiveness of the proposed algorithms.
- Published
- 2022
45. Microstructure and Fatigue Life of the Binary Lead-free Alloys with High Zn Content
- Author
-
Krystyna Pietrzak, A. Klasik, N. Sobczak, and M. Maj
- Subjects
010302 applied physics ,Materials science ,Lead (geology) ,0103 physical sciences ,Metallurgy ,Metals and Alloys ,Binary number ,02 engineering and technology ,021001 nanoscience & nanotechnology ,0210 nano-technology ,Microstructure ,01 natural sciences ,Industrial and Manufacturing Engineering - Published
- 2023
46. Modelling agreement for binary intensive longitudinal data
- Author
-
Sophie Vanbelle, Emmanuel Lesaffre, RS: CAPHRI - R6 - Promoting Health & Personalised Care, and FHML Methodologie & Statistiek
- Subjects
Statistics and Probability ,time-event sequential data ,Science & Technology ,Computer science ,Longitudinal data ,Statistics & Probability ,Measure (physics) ,Binary number ,WEIGHTED KAPPA ,PARAMETERS ,Reliability engineering ,transient event ,Mental condition ,Physical Sciences ,RELIABILITY ,Continuous recording ,Statistics, Probability and Uncertainty ,time series ,COEFFICIENT ,Reliability (statistics) ,Mathematics ,continuous recording - Abstract
Devices that measure our physical, medical and mental condition have entered our daily life recently. Such devices measure our status in a continuous manner and can be useful in predicting future medical events or can guide us towards a healthier life. It is therefore important to establish that such devices record our behaviour in a reliable manner and measure what we believe they measure. In this article, we propose to measure the reliability and validity of a newly developed measuring device in time using a longitudinal model for sequential kappa statistics. We propose a Bayesian estimation procedure. The method is illustrated by a validation study of a new accelerometer in cardiopulmonary rehabilitation patients.
- Published
- 2023
47. Strength-dilatancy and critical state behaviours of binary mixtures of graded sands influenced by particle size ratio and fines content
- Author
-
Yibing Deng, Ching S. Chang, Aydin Gokce, and Yuksel Yilmaz
- Subjects
Dilatant ,Materials science ,Shear strength (soil) ,Content (measure theory) ,Soil water ,Earth and Planetary Sciences (miscellaneous) ,Binary number ,Gradation ,Deformation (engineering) ,Composite material ,Geotechnical Engineering and Engineering Geology ,Particle size ratio - Abstract
© 2021 Thomas Telford Ltd.Binary granular soil mixtures, as common heterogeneous soils, are ubiquitous in nature and man-made deposits. Fines content and particle size ratio are two important gradation parameters for a binary mixture, which have potential influences on mechanical behaviours. However, experimental studies on drained shear behaviour considering the whole range of fines content and different particle size ratios are scarce in the literature. For this purpose, a series of drained triaxial compression tests was performed on dense binary silica sand mixtures with four different particle size ratios to investigate systematically the effects of fines content and particle size ratio on the drained shear behaviours. Based on these tests, the strength-dilation behaviour and critical state behaviour were examined. It was observed that both fines content and particle size ratio have significant influence on the stress-strain response, the critical state void ratio, the critical state friction angle, the maximum dilation angle, the peak friction angle and the stress-dilatancy relation. The underlying mechanism for the effects of fines content and particle size ratio was discussed from the perspective of the kinematic movements at particle level.
- Published
- 2023
48. Data Representation on Bio-molecular Computer
- Author
-
Chang, Weng-Long, Vasilakos, Athanasios V., Kacprzyk, Janusz, Series editor, Chang, Weng-Long, and Vasilakos, Athanasios V.
- Published
- 2014
- Full Text
- View/download PDF
49. A Relational Representation of Belief Functions
- Author
-
Liu, Liping, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Kobsa, Alfred, Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Goebel, Randy, Series editor, Tanaka, Yuzuru, Series editor, Wahlster, Wolfgang, Series editor, Siekmann, Jörg, Series editor, and Cuzzolin, Fabio, editor
- Published
- 2014
- Full Text
- View/download PDF
50. Basic Ideas
- Author
-
Horton, Ivor and Horton, Ivor
- Published
- 2014
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.