377 results on '"Binary strings"'
Search Results
2. A fusing framework of shortcut convolutional neural networks
- Author
-
Zahid Halim, Zhaoying Liu, Shanshan Tu, Zhu Han, Yujian Li, Ting Zhang, Muhammad Waqas, and Sadaqat Ur Rehman
- Subjects
Information Systems and Management ,business.industry ,Computer science ,Pooling ,Stability (learning theory) ,Scale (descriptive set theory) ,Pattern recognition ,Convolutional neural network ,Computer Science Applications ,Theoretical Computer Science ,Artificial Intelligence ,Control and Systems Engineering ,Benchmark (computing) ,Fuse (electrical) ,Artificial intelligence ,Binary strings ,business ,Software - Abstract
Convolutional neural networks (CNNs) have proven to be very successful in learning task-specific computer vision features. To integrate features from different layers in standard CNNs, we present a fusing framework of shortcut convolutional neural networks (S-CNNs). This framework can fuse arbitrary scale features by adding weighted shortcut connections to the standard CNNs. Besides the framework, we propose a shortcut indicator (SI) of binary string to stand for a specific S-CNN shortcut style. Additionally, we design a learning algorithm for the proposed S-CNNs. Comprehensive experiments are conducted to compare its performances with standard CNNs on multiple benchmark datasets for different visual tasks. Empirical results show that if we choose an appropriate fusing style of shortcut connections with learnable weights, S-CNNs can perform better than standard CNNs regarding accuracy and stability in different activation functions and pooling schemes initializations, and occlusions. Moreover, S-CNNs are competitive with ResNets and can outperform GoogLeNet, DenseNets, Multi-scale CNN, and DeepID.
- Published
- 2021
3. An Efficient Matching Algorithm for Encoded DNA Sequences and Binary Strings
- Author
-
Faro, Simone, Lecroq, Thierry, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Kucherov, Gregory, editor, and Ukkonen, Esko, editor
- Published
- 2009
- Full Text
- View/download PDF
4. Self-assembly of and optimal encoding within thin rectangles at temperature-1 in 3D
- Author
-
Scott M. Summers, David Furcy, and Christian Wendlandt
- Subjects
General Computer Science ,0102 computer and information sciences ,02 engineering and technology ,Sense (electronics) ,01 natural sciences ,Theoretical Computer Science ,Combinatorics ,Perimeter ,Dimension (vector space) ,010201 computation theory & mathematics ,Encoding (memory) ,visual_art ,0202 electrical engineering, electronic engineering, information engineering ,visual_art.visual_art_medium ,020201 artificial intelligence & image processing ,Rectangle ,Tile ,Binary strings ,Constant (mathematics) ,Mathematics - Abstract
In this paper, we study the self-assembly of rectangles in a non-cooperative, 3D version of Winfree's abstract Tile Assembly Model. We prove two results. First, we give the full details for the proof of a general construction for the efficient self-assembly of thin rectangles that was first reported by Furcy, Summers and Wendlandt (2019). This construction is non-cooperative and “just-barely” 3D in the sense that it places tiles at most one step into the third dimension. Second, we give a non-cooperative, just-barely 3D optimal encoding construction that self-assembles the bits of a given binary string along the perimeter of a thin rectangle of constant height.
- Published
- 2021
5. The number of short cycles in Fibonacci cubes
- Author
-
Ömer Eğecioğlu, Zülfükar Saygı, and Elif Saygı
- Subjects
Combinatorics ,Interconnection ,Mathematics::Combinatorics ,General Computer Science ,Fibonacci cube ,TheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITY ,Hypercube ,Binary strings ,MathematicsofComputing_DISCRETEMATHEMATICS ,Theoretical Computer Science ,Mathematics - Abstract
The Fibonacci cube is the subgraph of the hypercube induced by the vertices whose binary string representations do not contain two consecutive 1s. These cubes were presented as an alternative interconnection network. In this paper, we calculate the number of induced paths and cycles of small length in Fibonacci cubes by using the recursive structure of these graphs.
- Published
- 2021
6. A Novel Approach for Prediction of Stock Market Behavior Using Bioinformatics Techniques
- Author
-
Birendra Kumar Nayak, Prakash Kumar Sarangi, and Sachidananda Dehuri
- Subjects
Smith–Waterman algorithm ,Computer science ,Stock market ,Data mining ,Binary strings ,computer.software_genre ,computer ,DNA sequencing - Published
- 2021
7. Stock Market Price Behavior Prediction Using Markov Models: A Bioinformatics Approach
- Author
-
Birendra Kumar Nayak, Sachidananda Dehuri, and Prakash Kumar Sarangi
- Subjects
Finite-state machine ,Computer science ,Econometrics ,Stock market price ,Binary strings ,Markov model ,Hidden Markov model - Published
- 2021
8. SQUARE-FREE INTEGERS CODIFIED INTO THE BINARY STRINGS AND THEIR ASSOCIATED GROUPS
- Author
-
Shahid Nawaz, Salman Khan, and Đặng Võ Phúc
- Subjects
Combinatorics ,Algebra and Number Theory ,Square-free integer ,Binary strings ,Mathematics - Published
- 2020
9. Efficient hash maps to $${\mathbb {G}}_2$$ on BLS curves
- Author
-
Alessandro Budroni and Federico Pintore
- Subjects
021110 strategic, defence & security studies ,Algebra and Number Theory ,Degree (graph theory) ,Applied Mathematics ,0211 other engineering and technologies ,Order (ring theory) ,02 engineering and technology ,Hash table ,Combinatorics ,Elliptic curve ,Finite field ,Pairing ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Binary strings ,Twist ,Mathematics - Abstract
When a pairing $$e: {\mathbb {G}}_1 \times {\mathbb {G}}_2 \rightarrow {\mathbb {G}}_{T}$$ e : G 1 × G 2 → G T , on an elliptic curve E defined over a finite field $${\mathbb {F}}_q$$ F q , is exploited for an identity-based protocol, there is often the need to hash binary strings into $${\mathbb {G}}_1$$ G 1 and $${\mathbb {G}}_2$$ G 2 . Traditionally, if E admits a twist $${\tilde{E}}$$ E ~ of order d, then $${\mathbb {G}}_1=E({\mathbb {F}}_q) \cap E[r]$$ G 1 = E ( F q ) ∩ E [ r ] , where r is a prime integer, and $${\mathbb {G}}_2={\tilde{E}}({\mathbb {F}}_{q^{k/d}}) \cap {\tilde{E}}[r]$$ G 2 = E ~ ( F q k / d ) ∩ E ~ [ r ] , where k is the embedding degree of E w.r.t. r. The standard approach for hashing into $${\mathbb {G}}_2$$ G 2 is to map to a general point $$P \in {\tilde{E}}({\mathbb {F}}_{q^{k/d}})$$ P ∈ E ~ ( F q k / d ) and then multiply it by the cofactor $$c=\#{\tilde{E}}({\mathbb {F}}_{q^{k/d}})/r$$ c = # E ~ ( F q k / d ) / r . Usually, the multiplication by c is computationally expensive. In order to speed up such a computation, two different methods—by Scott et al. (International conference on pairing-based cryptography. Springer, Berlin, pp 102–113, 2009) and by Fuentes-Castaneda et al. (International workshop on selected areas in cryptography)—have been proposed. In this paper we consider these two methods for BLS pairing-friendly curves having $$k \in \{12,24,30,42,48\}$$ k ∈ { 12 , 24 , 30 , 42 , 48 } , providing efficiency comparisons. When $$k=42,48$$ k = 42 , 48 , the application of Fuentes et al. method requires expensive computations which were infeasible for the computational power at our disposal. For these cases, we propose hashing maps that we obtained following Fuentes et al. idea.
- Published
- 2020
10. Detecting Deletions and Insertions in Concatenated Strings with Optimal Redundancy
- Author
-
Serge Kas Hanna and Rawad Bitar
- Subjects
FOS: Computer and information sciences ,Discrete mathematics ,Computer science ,Computer Science - Information Theory ,Information Theory (cs.IT) ,020206 networking & telecommunications ,02 engineering and technology ,Construct (python library) ,Information theory ,Asymptotically optimal algorithm ,Converse ,Data_FILES ,0202 electrical engineering, electronic engineering, information engineering ,Redundancy (engineering) ,Binary strings - Abstract
We study codes that can detect the exact number of deletions and insertions in concatenated binary strings. We construct optimal codes for the case of detecting up to $\del$ deletions. We prove the optimality of these codes by deriving a converse result which shows that the redundancy of our codes is asymptotically optimal in $\del$ among all families of deletion detecting codes, and particularly optimal among all block-by-block decodable codes. For the case of insertions, we construct codes that can detect up to $2$ insertions in each concatenated binary string., Comment: Shorter version accepted in ISIT 2021
- Published
- 2021
11. Divergence Scaling for Distribution Matching
- Author
-
Gerhard Kramer
- Subjects
FOS: Computer and information sciences ,Matching (graph theory) ,Distribution (number theory) ,Information Theory (cs.IT) ,Computer Science - Information Theory ,Computer Science::Computer Vision and Pattern Recognition ,Statistical physics ,Binary strings ,Divergence (statistics) ,Information theory ,Scaling ,Block (data storage) ,Mathematics - Abstract
Distribution matchers for finite alphabets are shown to have informational divergences that grow logarithmically with the block length, generalizing a basic result for binary strings., 2021 IEEE International Symposium on Information Theory
- Published
- 2021
12. A Study of Detection Probabilities and Real-World Testing of a Human Immunity Inspired Intrusion Detection System
- Author
-
Patryk Widulinski and Krzysztof Wawryn
- Subjects
Negative selection algorithm ,Artificial immune system ,Computer science ,Virtual machine ,Malware ,Intrusion detection system ,Data mining ,Binary strings ,computer.software_genre ,computer - Abstract
In the paper, a study of detection probabilities and experimental tests of an intrusion detection system (IDS) utilizing the artificial immune system (AIS) based on the negative selection approach are presented. The algorithm uses binary strings called receptors to detect intrusions in programs in the operating system. In the work, a statistical approach is used to calculate the probabilities of detecting the intrusions and the results are compared with the experimental tests. New experiments are conducted using a virtual machine as the environment to check the effectiveness of the proposed IDS. For this purpose, real-world malware samples are launched in the virtual machine. The research of the IDS is then presented, analyzed and concluded.
- Published
- 2021
13. Security aspects of the Cayley hash function using discrete heisenberg group
- Author
-
P. L. Lilly and V. Vibitha Kochamani
- Subjects
Discrete mathematics ,Algebra and Number Theory ,Computer science ,Applied Mathematics ,Hash function ,010103 numerical & computational mathematics ,02 engineering and technology ,01 natural sciences ,Running time ,Goodness of fit ,0202 electrical engineering, electronic engineering, information engineering ,Heisenberg group ,Cryptographic hash function ,020201 artificial intelligence & image processing ,0101 mathematics ,Binary strings ,Analysis - Abstract
We execute the average running time of the various binary strings of different length and evaluate the other useful characteristics of a hash function which is to be Pseudo-Randomness of a ...
- Published
- 2019
14. Collatz on the Dyadic Rationals in [0.5, 1) with Fractals: How Bit Strings Change Their Length Under 3x + 1
- Author
-
Patrick Chisan Hew
- Subjects
Discrete mathematics ,Rational number ,General Mathematics ,010102 general mathematics ,0102 computer and information sciences ,Function (mathematics) ,Bit array ,01 natural sciences ,Collatz conjecture ,Bit (horse) ,Fractal ,010201 computation theory & mathematics ,0101 mathematics ,Binary strings ,Mathematics ,Integer (computer science) - Abstract
The reduced Collatz map (Syracuse function) can be stated as “for any odd positive integer x, calculate 3x+1 and then divide by 2 until the result is odd.” We calculate the change in bit string len...
- Published
- 2019
15. Cube-complements of generalized Fibonacci cubes
- Author
-
Aleksander Vesel
- Subjects
Discrete mathematics ,Mathematics::Combinatorics ,Fibonacci cube ,Induced subgraph ,Median graph ,020206 networking & telecommunications ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Graph ,Substring ,Theoretical Computer Science ,Combinatorics ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Discrete Mathematics and Combinatorics ,Hypercube ,Binary strings ,Mathematics - Abstract
The generalized Fibonacci cube Q h ( f ) is the graph obtained from the h -cube Q h by removing all vertices that contain a given binary string f as a substring. If G is an induced subgraph of Q h , then the cube-complement of G is the graph induced by the vertices of Q h which are not in G . In particular, the cube-complement of a generalized Fibonacci cube Q h ( f ) is the subgraph of Q h induced by the set of all vertices that contain f as a substring. The questions whether a cube-complement of a generalized Fibonacci cube is (i) connected, (ii) an isometric subgraph of a hypercube or (iii) a median graph are studied. Questions (ii) and (iii) are completely solved, i.e. the sets of binary strings that allow a graph of this class to be an isometric subgraph of a hypercube or a median graph are given. The cube-complement of a daisy cube is also studied.
- Published
- 2019
16. Metric Dimension of Graph Join P2 and Pt
- Author
-
Nurdin Nurdin, Hasmawati Hasmawati, and Loeky Haryanto
- Subjects
Combinatorics ,Binary strings ,Graph ,Substring ,Computer search ,Mathematics ,Metric dimension - Abstract
The following metric dimension of join two paths $P_2 + P_t$ is determined as follows. For every $k = 1, 2, 3, ...$ and $t = 2 + 5k$ or $t = 3 + 5k$, the dimension of $P_2 + P_t$ is $2 + 2k$ whereas for $t = 4 + 5k, t = 5(k+1)$ or $t = 1 + 5(k+1)$, the dimension is $3 + 2k$. In case $t \geq 7$, the dimension is determined by a chosen (maximal) ordered basis for $P_2 + P_t$ in which the integers 1, 2 are the two consecutive vertices of $P_2$ and the next integers $3, 4, ..., t + 2$ are the $t$ consecutive vertices of $P_t$. If $t \geq 10$, the ordered binary string contains repeated substrings of length 5. For $t < 7$, the dimension is easily found using a computer search, or even just using hand computations.
- Published
- 2019
17. Prefix and suffix transreversals on binary and ternary strings.
- Author
-
Khaledur Rahman, Md. and Sohel Rahman, M.
- Abstract
The problem of sorting by a genome rearrangement event asks for the minimum number of that event required to sort the elements of a given permutation. In this paper, we study a variant of the rearrangement event called prefix and suffix transreversal. A transreversal is an operation which reverses the first block before exchanging two adjacent blocks in a permutation. A prefix (suffix) transreversal always reverses and moves a prefix (suffix) of the permutation to another location. Interestingly, we will apply transreversal not on permutations but on strings over an alphabet of fixed size. We determine the minimum number of prefix and suffix transreversals required to sort the binary and ternary strings, with polynomial time algorithms for these sorting problems. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
18. Computing on binary strings.
- Author
-
Bu, Tian-Ming, Yuan, Chen, and Zhang, Peng
- Subjects
- *
STRING theory , *COMPUTER science , *SET theory , *COMPUTER algorithms , *BOOLEAN functions , *NP-hard problems - Abstract
Many problems in Computer Science can be abstracted to the following question: given a set of objects and rules respectively, which new objects can be produced? In the paper, we consider a succinct version of the question: given a set of binary strings and several operations like conjunction and disjunction , which new binary strings can be generated? Although it is a fundamental problem, to the best of our knowledge, the problem hasn't been studied yet. In this paper, an O ( m 2 n ) algorithm is presented to determine whether a string s is representable by a set W , where n is the number of strings in W and each string has the same length m . However, looking for the minimum subset to represent a given string is shown to be NP -hard. Also, finding the smallest subset to represent each string in the original set is NP -hard. We establish tight inapproximability results and approximation algorithms for these NP -hard problems. In addition, we prove that counting the number of representable strings is # P -complete. We then explore how the problems change when the operator negation is available. For example, if the operator negation can be used, the counting problem is as simple as some power of 2. This difference may help us to better understand the problem. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
19. On the formalisation of Kolmogorov complexity
- Author
-
Elliot Catt and Michael Norrish
- Subjects
Algorithmic information theory ,TheoryofComputation_COMPUTATIONBYABSTRACTDEVICES ,Theoretical computer science ,Kolmogorov complexity ,Computer science ,business.industry ,Computability ,020207 software engineering ,Cryptography ,02 engineering and technology ,Coding theory ,computer.software_genre ,020202 computer hardware & architecture ,Intelligent agent ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,Binary strings ,business ,computer - Abstract
Kolmogorov complexity is an essential tool in the study of algorithmic information theory, and is used in the fields of Artificial Intelligence, cryptography, and coding theory. The formalisation of the theorems of Kolmogorov complexity is also key to proving results in the theory of Intelligent Agents, specifically the results in Universal Artificial Intelligence. In this paper, we present a mechanisation of some of these fundamental results. In particular, building on HOL4's existing model of computability, we provide a formal definition of the complexity of a binary string, and then prove (i) that Kolmogorov complexity is uncomputable; (ii) the Kolmogorov Complexity invariance theorem; (iii) the Kraft and Kolmogorov-Kraft inequalities; and (iv) key Kolmogorov Complexity inequalities.
- Published
- 2021
20. Conversions Used in MATLAB for Cryptography
- Author
-
Marius Iulian Mihailescu and Stefania Loredana Nita
- Subjects
Mechanism (engineering) ,business.industry ,Computer science ,Field (mathematics) ,Cryptography ,Binary strings ,MATLAB ,business ,computer ,computer.programming_language ,Computational science - Abstract
The goal of this chapter is to provide a quick overview of the main conversion mechanism for numbers and strings that are specific to the cryptography field. Representing numbers and binary strings in different bases is one of the most critical steps in cryptography. This chapter covers the main steps and discusses how they are done properly in MATLAB.
- Published
- 2021
21. The Coolest Way to Generate Binary Strings.
- Author
-
Stevens, Brett and Williams, Aaron
- Subjects
- *
STRING theory , *BINARY number system , *SET theory , *ALGORITHMS , *LEXICOGRAPHY , *COMBINATORICS - Abstract
Pick a binary string of length n and remove its first bit b. Now insert b after the first remaining 10, or insert $\overline{b}$ at the end if there is no remaining 10. Do it again. And again. Keep going! Eventually, you will cycle through all 2 of the binary strings of length n. For example, [InlineEquation not available: see fulltext.][InlineEquation not available: see fulltext.][InlineEquation not available: see fulltext.][InlineEquation not available: see fulltext.][InlineEquation not available: see fulltext.][InlineEquation not available: see fulltext.][InlineEquation not available: see fulltext.][InlineEquation not available: see fulltext.][InlineEquation not available: see fulltext.][InlineEquation not available: see fulltext.][InlineEquation not available: see fulltext.][InlineEquation not available: see fulltext.][InlineEquation not available: see fulltext.][InlineEquation not available: see fulltext.][InlineEquation not available: see fulltext.][InlineEquation not available: see fulltext.] are the binary strings of length n=4, where [InlineEquation not available: see fulltext.] and [InlineEquation not available: see fulltext.]. And if you only want strings with weight (number of 1s) between ℓ and u? Just insert b instead of $\overline{b}$ when the result would have too many 1s or too few 1s. For example, [InlineEquation not available: see fulltext.][InlineEquation not available: see fulltext.][InlineEquation not available: see fulltext.][InlineEquation not available: see fulltext.][InlineEquation not available: see fulltext.][InlineEquation not available: see fulltext.][InlineEquation not available: see fulltext.][InlineEquation not available: see fulltext.][InlineEquation not available: see fulltext.][InlineEquation not available: see fulltext.][InlineEquation not available: see fulltext.] are the strings with n=4, ℓ=0 and u=2. This generalizes 'cool-lex' order by Ruskey and Williams ( The coolest way to generate combinations, Discrete Mathematics) and we present two applications of our 'cooler' order. First, we give a loopless algorithm for generating binary strings with any weight range in which successive strings have Levenshtein distance two. Second, we construct de Bruijn sequences for (i) ℓ=0 and any u (maximum specified weight), (ii) any ℓ and u= n (minimum specified weight), and (iii) odd u− ℓ (even size weight range). For example, all binary strings with n=6, ℓ=1, and u=4 appear once (cyclically) in [InlineEquation not available: see fulltext.]. We also investigate the recursive structure of our order and show that it shares certain sublist properties with lexicographic order. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
22. Efficient implied alignment
- Author
-
Ward C. Wheeler and Alex J. Washburn
- Subjects
0106 biological sciences ,Tree alignment ,Homology (mathematics) ,lcsh:Computer applications to medicine. Medical informatics ,010603 evolutionary biology ,01 natural sciences ,Biochemistry ,Multiple string alignment ,Combinatorics ,03 medical and health sciences ,Sequence alignment ,Structural Biology ,Binary strings ,lcsh:QH301-705.5 ,Molecular Biology ,Time complexity ,030304 developmental biology ,Mathematics ,Implied alignment ,0303 health sciences ,Binary tree ,Applied Mathematics ,Methodology Article ,Computer Science Applications ,Phylogenetics ,Tree traversal ,lcsh:Biology (General) ,Dynamic homology ,lcsh:R858-859.7 ,Algorithms - Abstract
Background Given a binary tree $\mathcal {T}$ T of n leaves, each leaf labeled by a string of length at most k, and a binary string alignment function ⊗, an implied alignment can be generated to describe the alignment of a dynamic homology for $\mathcal {T}$ T . This is done by first decorating each node of $\mathcal {T}$ T with an alignment context using ⊗, in a post-order traversal, then, during a subsequent pre-order traversal, inferring on which edges insertion and deletion events occurred using those internal node decorations. Results Previous descriptions of the implied alignment algorithm suggest a technique of “back-propagation” with time complexity $\mathcal {O}\left (k^{2} * n^{2}\right)$ O k 2 ∗ n 2 . Here we describe an implied alignment algorithm with complexity $\mathcal {O}\left (k * n^{2}\right)$ O k ∗ n 2 . For well-behaved data, such as molecular sequences, the runtime approaches the best-case complexity of Ω(k∗n). Conclusions The reduction in the time complexity of the algorithm dramatically improves both its utility in generating multiple sequence alignments and its heuristic utility.
- Published
- 2020
23. High Entropy Random Selection Protocols
- Author
-
Nikolay Vereshchagin, Harry Buhrman, Boaz Patt-Shamir, Michal Koucký, Matthias Christandl, Zvi Lotker, and Logic and Computation (ILLC, FNWI/FGw)
- Subjects
General Computer Science ,02 engineering and technology ,0102 computer and information sciences ,Data_CODINGANDINFORMATIONTHEORY ,01 natural sciences ,Combinatorics ,0202 electrical engineering, electronic engineering, information engineering ,Computer Science::Networking and Internet Architecture ,Entropy (information theory) ,Analytic number theory ,0101 mathematics ,Binary strings ,Randomness ,Mathematics ,Computer Science::Cryptography and Security ,Discrete mathematics ,Conjecture ,Applied Mathematics ,Random string ,010102 general mathematics ,Shannon entropy ,Min entropy ,TheoryofComputation_GENERAL ,KAKEYA SETS ,Binary logarithm ,Computer Science Applications ,Number theory ,Random string ds ,010201 computation theory & mathematics ,Theory of computation ,020201 artificial intelligence & image processing ,Security parameter - Abstract
We study the two party problem of randomly selecting a common string among all the strings of length n. We want the protocol to have the property that the output distribution has high Shannon entropy or high min entropy, even when one of the two parties is dishonest and deviates from the protocol. We develop protocols that achieve high, close to n, Shannon entropy and simultaneously min entropy close to n/2. In the literature the randomness guarantee is usually expressed in terms of “resilience”. The notion of Shannon entropy is not directly comparable to that of resilience, but we establish a connection between the two that allows us to compare our protocols with the existing ones. We construct an explicit protocol that yields Shannon entropy $$n - O(1)$$ and has $$O(\log ^* n)$$ rounds, improving over the protocol of Goldreich et al. (SIAM J Comput 27: 506–544, 1998) that also achieves this entropy but needs O(n) rounds. Both these protocols need $$O(n^2)$$ bits of communication. Next we reduce the number of rounds and the length of communication in our protocols. We show the existence, non-explicitly, of a protocol that has 6 rounds, O(n) bits of communication and yields Shannon entropy $$n- O(\log n)$$ and min entropy $$n/2 - O(\log n)$$ . Our protocol achieves the same Shannon entropy bound as, also non-explicit, protocol of Gradwohl et al. (in: Dwork (ed) Advances in Cryptology—CRYPTO ‘06, 409–426, Technical Report , 2006), however achieves much higher min entropy: $$n/2 - O(\log n)$$ versus $$O(\log n)$$ . Finally we exhibit a very simple 3-round explicit “geometric” protocol with communication length O(n). We connect the security parameter of this protocol with the well studied Kakeya problem motivated by Harmonic Analysis and Analytic Number Theory. We prove that this protocol has Shannon entropy $$n-o(n)$$ . Its relation to the Kakeya problem follows a new and different approach to the random selection problem than any of the previously known protocols.
- Published
- 2020
24. Algorithms, Information, and Chance
- Author
-
Edward Beltrami
- Subjects
Discrete mathematics ,Turing machine ,symbols.namesake ,Algorithmic complexity ,Computer science ,Random string ,Mathematics::History and Overview ,String (computer science) ,symbols ,Binary strings ,Physics::History of Physics - Abstract
During the decade of the 1960s several individuals independently arrived at a notion that a binary string is random if its shortest description is the string itself. Among the main protagonists in this story is the celebrated Russian mathematician Andrei Kolmogorov, whom we met earlier, and Gregory Chaitin, information theorist and computer scientist.
- Published
- 2020
25. Revealing the predictability of intrinsic structure in complex networks
- Author
-
Jia-Rong Xie, Ling Feng, Yanqing Hu, Xiao Ma, Dashun Wang, and Jiachen Sun
- Subjects
Computer science ,Science ,Structure (category theory) ,Complex networks ,General Physics and Astronomy ,Network science ,02 engineering and technology ,01 natural sciences ,General Biochemistry, Genetics and Molecular Biology ,Article ,Compression (functional analysis) ,0103 physical sciences ,Machine learning ,0202 electrical engineering, electronic engineering, information engineering ,Binary strings ,Predictability ,010306 general physics ,lcsh:Science ,Multidisciplinary ,General Chemistry ,Complex network ,Prediction algorithms ,Linear relationship ,020201 artificial intelligence & image processing ,lcsh:Q ,Algorithm - Abstract
Structure prediction is an important and widely studied problem in network science and machine learning, finding its applications in various fields. Despite the significant progress in prediction algorithms, the fundamental predictability of structures remains unclear, as networks’ complex underlying formation dynamics are usually unobserved or difficult to describe. As such, there has been a lack of theoretical guidance on the practical development of algorithms for their absolute performances. Here, for the first time, we find that the normalized shortest compression length of a network structure can directly assess the structure predictability. Specifically, shorter binary string length from compression leads to higher structure predictability. We also analytically derive the origin of this linear relationship in artificial random networks. In addition, our finding leads to analytical results quantifying maximum prediction accuracy, and allows the estimation of the network dataset potential values through the size of the compressed network data file., The likelihood of linking within a complex network is of importance to solve real-world problems, but it is challenging to predict. Sun et al. show that the link predictability limit can be well estimated by measuring the shortest compression length of a network without a need of prediction algorithm.
- Published
- 2020
26. A Note on the Probability of Rectangles for Correlated Binary Strings
- Author
-
Ofer Shayevitz, Or Ordentlich, and Yury Polyanskiy
- Subjects
Physics ,FOS: Computer and information sciences ,Functional analysis ,Computer Science - Information Theory ,Information Theory (cs.IT) ,020206 networking & telecommunications ,02 engineering and technology ,Library and Information Sciences ,Upper and lower bounds ,Computer Science Applications ,Combinatorics ,0202 electrical engineering, electronic engineering, information engineering ,FOS: Mathematics ,Mathematics - Combinatorics ,Combinatorics (math.CO) ,Binary strings ,Random variable ,Information Systems - Abstract
Consider two sequences of ${n}$ independent and identically distributed fair coin tosses, ${X}=({X}_{1},\ldots,{X}_{n})$ and ${Y}=({Y}_{1},\ldots,{Y}_{n})$ , which are $\rho $ -correlated for each ${j}$ , i.e. $\mathbb {P}[{X}_{j}={Y}_{j}] = {\frac{1+\rho }{ 2}}$ . We study the question of how large (small) the probability $\mathbb {P}[{X} \in {A}, {Y}\in {B}]$ can be among all sets ${A},{B}\subset \{0,1\}^{n}$ of a given cardinality. For sets $|{A}|,|{B}| = \Theta (2^{n})$ it is well known that the largest (smallest) probability is approximately attained by concentric (anti-concentric) Hamming balls, and this can be proved via the hypercontractive inequality (reverse hypercontractivity). Here we consider the case of $|{A}|,|{B}| = 2^{\Theta ({n})}$ . By applying a recent extension of the hypercontractive inequality of Polyanskiy-Samorodnitsky (J. Functional Analysis, 2019), we show that Hamming balls of the same size approximately maximize $\mathbb {P}[{X} \in {A}, {Y}\in {B}]$ in the regime of $\rho \to 1$ . We also prove a similar tight lower bound, i.e. show that for $\rho \to 0$ the pair of opposite Hamming balls approximately minimizes the probability $\mathbb {P}[{X} \in {A}, {Y}\in {B}]$ .
- Published
- 2020
27. Graph presentation of binary strings
- Author
-
Valdete Rexhëbeqaj Hamiti and Qefsere Doko Gjonbalaj
- Subjects
Theoretical computer science ,Computer science ,lcsh:T57-57.97 ,010401 analytical chemistry ,Computational mechanics ,lcsh:Applied mathematics. Quantitative methods ,Graph (abstract data type) ,02 engineering and technology ,Binary strings ,021001 nanoscience & nanotechnology ,0210 nano-technology ,01 natural sciences ,0104 chemical sciences - Published
- 2018
28. Hamiltonian cycles and paths in hypercubes with disjoint faulty edges
- Author
-
Janusz Dybizbański and Andrzej Szepietowski
- Subjects
FOS: Computer and information sciences ,Discrete Mathematics (cs.DM) ,0102 computer and information sciences ,02 engineering and technology ,Disjoint sets ,01 natural sciences ,Computer Science Applications ,Theoretical Computer Science ,Vertex (geometry) ,Combinatorics ,010201 computation theory & mathematics ,Signal Processing ,FOS: Mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Mathematics - Combinatorics ,020201 artificial intelligence & image processing ,Combinatorics (math.CO) ,Hypercube ,Binary strings ,Undirected graph ,Parity (mathematics) ,Computer Science - Discrete Mathematics ,MathematicsofComputing_DISCRETEMATHEMATICS ,Information Systems ,Mathematics - Abstract
We consider hypercubes with pairwise disjoint faulty edges. An n-dimensional hypercube Q n is an undirected graph with 2 n nodes, each labeled with a distinct binary string of length n. The parity of the vertex is 0 if the number of ones in its label is even, and is 1 if the number of ones is odd. Two vertices a and b are connected by an edge iff a and b differ in one position. If a and b differ in position i, then we say that the edge ( a , b ) goes in dimension i and we define the parity of the edge as the parity of the end with 0 on the position i. It was already known that Q n is not Hamiltonian if all edges going in one dimension and of the same parity are faulty. In this paper we show that if n ≥ 4 then all other hypercubes are Hamiltonian. In other words, every cube Q n , with n ≥ 4 and disjoint faulty edges is Hamiltonian if and only if for each dimension there are two healthy crossing edges of different parity.
- Published
- 2021
29. Hamming distance from irreducible polynomials over $\mathbb {F}_2$
- Author
-
Gilbert Lee, Frank Ruskey, and Aaron Williams
- Subjects
irreducible polynomials ,random polynomials ,hamming distance ,finite fields ,binary strings ,asymptotics ,exhaustive enumeration ,[info.info-ds] computer science [cs]/data structures and algorithms [cs.ds] ,[info.info-dm] computer science [cs]/discrete mathematics [cs.dm] ,[math.math-co] mathematics [math]/combinatorics [math.co] ,[info.info-cg] computer science [cs]/computational geometry [cs.cg] ,Mathematics ,QA1-939 - Abstract
We study the Hamming distance from polynomials to classes of polynomials that share certain properties of irreducible polynomials. The results give insight into whether or not irreducible polynomials can be effectively modeled by these more general classes of polynomials. For example, we prove that the number of degree $n$ polynomials of Hamming distance one from a randomly chosen set of $\lfloor 2^n/n \rfloor$ odd density polynomials, each of degree $n$ and each with non-zero constant term, is asymptotically $(1-e^{-4}) 2^{n-2}$, and this appears to be inconsistent with the numbers for irreducible polynomials. We also conjecture that there is a constant $c$ such that every polynomial has Hamming distance at most $c$ from an irreducible polynomial. Using exhaustive lists of irreducible polynomials over $\mathbb{F}_2$ for degrees $1 ≤ n ≤ 32$, we count the number of polynomials with a given Hamming distance to some irreducible polynomial of the same degree. Our work is based on this "empirical" study.
- Published
- 2007
- Full Text
- View/download PDF
30. Exact distributions of constrained ( k, ℓ) strings of failures between subsequent successes.
- Author
-
Makri, Frosso and Psillakis, Zaharias
- Subjects
DISTRIBUTION (Probability theory) ,STRING theory ,MATHEMATICAL sequences ,BINARY number system ,RANDOM variables ,MOMENTS method (Statistics) - Abstract
Consider a sequence of binary (success-failure) random variables (RVs) ordered on a line. The number of strings with a constrained number of consecutive failures between two subsequent successes is studied under an overlapping enumeration scheme. The respective waiting time is examined as well. The study is first developed on sequences of independent and identically distributed RVs. It is extended then on sequences of dependent, exchangeability and Markovian dependency is considered, and independent, not necessarily identically distributed, RVs. Exact probabilities and moments are obtained by means of combinatorial analysis and via recursive schemes. An explicit expression of the mean value of the number of strings for both independent and dependent sequences is derived. An application in system reliability is provided. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
31. On the Enumeration of Non-Crossing Pairings of Well-Balanced Binary Strings.
- Author
-
Schumacher, Paul and Yan, Catherine
- Subjects
- *
BINARY codes , *LATTICE theory , *SET theory , *NUMBER systems , *MATHEMATICAL bounds , *DIFFERENTIAL dimension polynomials , *BINARY number system - Abstract
A non-crossing pairing on a binary string pairs ones and zeroes such that the arcs representing the pairings are non-crossing. A binary string is well-balanced if it is of the form $${1^{a_1} 0^{a_1}1^{a_2} 0^{a_2} . . .1^{a_r} 0^{a_r}}$$. In this paper we establish connections between non-crossing pairings of well-balanced binary strings and various lattice paths in plane. We show that for well-balanced binary strings with a ≤ a ≤ . . . ≤ a, the number of non-crossing pairings is equal to the number of lattice paths on the plane with certain right boundary, and hence can be enumerated by differential Goncarov polynomials. For the regular binary strings S = (10), the number of non-crossing pairings is given by the ( k + 1)-Catalan numbers. We present a simple bijective proof for this case. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
32. The coolest way to generate combinations
- Author
-
Ruskey, Frank and Williams, Aaron
- Subjects
- *
COMBINATORICS , *BINARY number system , *ITERATIVE methods (Mathematics) , *RECURSIVE functions , *COMPUTER arithmetic , *MATHEMATICAL analysis - Abstract
Abstract: We present a practical and elegant method for generating all -combinations (binary strings with zeros and ones): Identify the shortest prefix ending in 010 or 011 (or the entire string if no such prefix exists), and rotate it by one position to the right. This iterative rule gives an order to -combinations that is circular and genlex. Moreover, the rotated portion of the string always contains at most four contiguous runs of zeros and ones, so every iteration can be achieved by transposing at most two pairs of bits. This leads to an efficient loopless and branchless implementation that consists only of two variables and six assignment statements. The order also has a number of striking similarities to colex order, especially its recursive definition and ranking algorithm. In the light of these similarities we have named our order cool-lex! [Copyright &y& Elsevier]
- Published
- 2009
- Full Text
- View/download PDF
33. The self-concatenation of isometric strings is isometric
- Author
-
Jianxin Wei, Guangfu Wang, and Yujun Yang
- Subjects
Discrete mathematics ,Mathematics::Functional Analysis ,Fibonacci number ,Mathematics::Operator Algebras ,010102 general mathematics ,0102 computer and information sciences ,Isometric exercise ,01 natural sciences ,Substring ,Graph ,Theoretical Computer Science ,Combinatorics ,High Energy Physics::Theory ,010201 computation theory & mathematics ,Mathematics::Metric Geometry ,Discrete Mathematics and Combinatorics ,Mathematics::Differential Geometry ,0101 mathematics ,Binary strings ,Mathematics - Abstract
The generalized Fibonacci Q d ( f ) is defined as the graph obtained from the d -cube Q d by removing all vertices that contain a given binary string f as a contiguous substring. This idea was introduced by Ilic, Klavžar and Rho. A binary string f is called isometric if Q d ( f ) is an isometric subgraph of Q d for all d ≥ 1 , otherwise it is called non-isometric. In this paper, we prove that a string f is isometric if and only if f n is isometric for any n ≥ 1 . This result can help us to construct more isometric strings and significantly increase the number of isometric strings.
- Published
- 2017
34. Short lists with short programs from programs of functions and strings
- Author
-
Nikolai K. Vereshchagin
- Subjects
Discrete mathematics ,0209 industrial biotechnology ,0102 computer and information sciences ,02 engineering and technology ,Arbitrary function ,01 natural sciences ,Numbering ,Theoretical Computer Science ,Combinatorics ,020901 industrial engineering & automation ,Computable function ,Computational Theory and Mathematics ,010201 computation theory & mathematics ,Gödel numbering ,Theory of computation ,Binary strings ,Mathematics - Abstract
Let {φ p } be an optimal Godel numbering of the family of computable functions (in Schnorr’s sense), where p ranges over binary strings. Assume that a list of strings L(p) is computable from p and for all p contains a φ-program for φ p whose length is at most e bits larger than the length of the shortest φ-programs for φ p . We show that for infinitely many p the list L(p) must have 2|p|−e−O(1) strings. Here e is an arbitrary function of p.
- Published
- 2017
35. XML Compaction Improvements Based on Binary String Encodings
- Author
-
Ramez Alkhatib
- Subjects
Theoretical computer science ,Computer science ,computer.internet_protocol ,Compaction ,Binary strings ,computer ,XML - Published
- 2017
36. On Limited Length Binary Strings with an Application in Statistical Control
- Author
-
Frosso S. Makri and Zaharias M. Psillakis
- Subjects
Markov chain ,Stochastic process ,05 social sciences ,Statistical process control ,01 natural sciences ,010104 statistics & probability ,0502 economics and business ,Probability mass function ,0101 mathematics ,Binary strings ,Algorithm ,050203 business & management ,Statistic ,±1-sequence ,Mathematics - Abstract
In a 0 - 1 sequence of Markov dependent trials we consider a statistic which counts strings of a limited length run of 0s between subsequent 1s. Its probability mass function is used to determine the chance that a stochastic process remains or not in statistical control. Illustrative numerics are presented.
- Published
- 2017
37. A negative answer to a problem on generalized Fibonacci cubes
- Author
-
Jianxin Wei and Heping Zhang
- Subjects
Discrete mathematics ,Fibonacci cube ,020206 networking & telecommunications ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Substring ,Graph ,Theoretical Computer Science ,Combinatorics ,Negative - answer ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Discrete Mathematics and Combinatorics ,Hypercube ,Binary strings ,Isometric embedding ,Mathematics - Abstract
Generalized Fibonacci cube Q n ( f ) is the graph obtained from the n -cube Q n by removing all vertices that contain a given binary string f as a consecutive substring. A binary string f is called bad if Q n ( f ) is not an isometric subgraph of Q n for some n , and the smallest such integer n , denoted by B ( f ) , is called the index of f . Ilic, Klavžar and Rho posed a problem that if Q n ( f ) is not an isometric subgraph of Q n , is there a dimension n ′ such that Q n ( f ) can be isometrically embedded into Q n ′ ? We give a negative answer to this problem by showing that if f is bad, then for any n ≥ B ( f ) , Q n ( f ) cannot be isometrically embedded to any hypercube.
- Published
- 2017
38. Hamiltonian paths in hypercubes with local traps
- Author
-
Andrzej Szepietowski and Janusz Dybizbański
- Subjects
Discrete mathematics ,Information Systems and Management ,05 social sciences ,050301 education ,0102 computer and information sciences ,01 natural sciences ,Hamiltonian path ,Computer Science Applications ,Theoretical Computer Science ,Vertex (geometry) ,Hypercube graph ,Combinatorics ,symbols.namesake ,010201 computation theory & mathematics ,Artificial Intelligence ,Control and Systems Engineering ,Bipartite graph ,symbols ,Hypercube ,Binary strings ,Hamiltonian (quantum mechanics) ,0503 education ,Software ,Distance ,Mathematics - Abstract
We consider hypercube Qn with one or two vertices of degree one.In such cubes some pairs of vertices can be connected by Hamiltonian paths.We show that they can be connected even if n - 3 additional edges are faulty. The n-dimensional hypercube Qn is a graph with 2n vertices, each labeled with a distinct binary string of length n. The vertices are connected by an edge if and only if their labels differ in one bit. The hypercube is bipartite, the set of nodes is the union of two sets: nodes of parity 0 (the number of ones in their labels is even) and nodes of parity 1 (the number of ones is odd). We consider Hamiltonian paths in hypercubes with faulty edges and prove the following: (1) If Qn has one vertex u of degree 1, then u can be connected by a Hamiltonian path with every vertex v that is of a parity different than u and that is not connected with u by a healthy edge. (2) If Qn with n ? 4 has two vertices u and v of degree 1, then they can be connected by a Hamiltonian path if the distance between u and v is odd and greater than 1 or if u and v are connected by the faulty edge. (3) If Qn contains a cycle (u, v, w, x) in which all edges going away from the cycle from u and w are faulty, then u or w can be connected by a Hamiltonian path with any vertex outside the cycle that is of different parity than u and w.Moreover, in all three cases, the thesis remains true even if Qn has n - 3 additional faulty edges. Furthermore, in all three cases, no other Hamiltonian paths are possible.
- Published
- 2017
39. Graphs induced by Gray codes
- Author
-
Wilmer, Elizabeth L. and Ernst, Michael D.
- Subjects
- *
GRAPH theory , *BINARY number system - Abstract
We disprove a conjecture of Bultena and Ruskey (Electron. J. Combin. 3 (1996) R11), that all trees which are cyclic graphs of cyclic Gray codes have diameter 2 or 4, by producing codes whose cyclic graphs are trees of arbitrarily large diameter. We answer affirmatively two other questions from (Electron. J. Combin. 3 (1996) R11), showing that strongly
Pn×Pn -compatible codes exist and that it is possible for a cyclic code to induce a cyclic digraph with no bidirectional edge. A major tool in these proofs is our introduction of supercomposite Gray codes; these generalize the standard reflected Gray code by allowing shifts. We find supercomposite Gray codes which induce large diameter trees, but also show that many trees are not induced by supercomposite Gray codes. We also find the first infinite family of connected graphs known not to be induced by any Gray code—trees of diameter 3 with no vertices of degree 2. [Copyright &y& Elsevier]- Published
- 2002
- Full Text
- View/download PDF
40. Tissue-Like P System with Mutational Symport/Antiport Rules and Trigger Mechanism
- Author
-
Xiao Sang and Xiyu Liu
- Subjects
Computer science ,Mechanism (biology) ,Antiporter ,Symporter ,Computational biology ,Binary strings ,Object (computer science) ,P system ,Genetic Materials - Abstract
In order to describe and study the communication between the cells or between cells and environment, tissue P system with symport/antiport rules and tissue-like P system with evolutional symport/antiport rules was introduced as a class of distributed parallel computing model, the object can change their location or evolve in the communication process. But the objects and evolutional rules are not specific, so in this paper, a new computing model for P system called tissue-like P system with mutational symport/antiport rules and trigger mechanism (TPMTM) is proposed, where all genetic materials are encoded by binary strings and the evolutional rules are defined by mutational rules. The TPMTM' s computational power is testified. Extraordinary, tissue-like P system with one cell what executing mutational antiport rules of length of mutational position at most 5 or executing mutational symport rules of length of mutational position at most 7 are testified Turing universal. So, this tissue P system with mutational communication rules that we proposed is computable.
- Published
- 2019
41. traj2bits
- Author
-
Chen Wang, Yueqi Zhou, Jiming Guo, Rui Zhang, and Hongbo Jiang
- Subjects
Data encoding ,business.industry ,Computer science ,Data management ,Search engine indexing ,computer.file_format ,computer.software_genre ,Data query ,Bitmap ,Data mining ,Binary strings ,business ,Disk space ,computer ,Mobile device - Abstract
With the popularity of mobile devices and the rapid development of position acquisition technology, the amount of trajectory data has soared dramatically. It is time-consuming to manage and mine massive trajectory data, because we need to access different trajectory samples or different parts of a trajectory for multiple times. Therefore, it is necessary to devise an efficient data management technology to fast retrieve the desired trajectories. In general, building indexes is a basic step for solving query problems. However, traditional spatial indexing technologies are mostly designed for moving objects, and thus are unable to achieve fast trajectory data query and efficient computing analysis. In this regard, we propose traj2bits, a bitmap-based trajectory data encoding schema, to convert trajectories into binary strings. Based on traj2bits, we also design a trajectory query method. Experiments on two real datasets have shown that traj2bits improves the spatio-temporal efficiency of trajectory query. Compared with other schemes, traj2bitsuery encoding occupies less than 1/10 of the disk space, its encoding efficiency is at least four times faster and its range query time is reduced by at least 65%.
- Published
- 2019
42. The query complexity of a permutation-based variant of Mastermind
- Author
-
Manindra Agrawal, Benjamin Doerr, Kasper Green Larsen, Carola Doerr, Kurt Mehlhorn, Peyman Afshani, Department of Computer Science [Aarhus], Aarhus University [Aarhus], Indian Institute of Technology Kanpur (IIT Kanpur), Laboratoire d'informatique de l'École polytechnique [Palaiseau] (LIX), École polytechnique (X)-Centre National de la Recherche Scientifique (CNRS), Recherche Opérationnelle (RO), LIP6, Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS)-Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS), Max-Planck-Institut für Informatik (MPII), Max-Planck-Gesellschaft, and Centre National de la Recherche Scientifique (CNRS)-École polytechnique (X)
- Subjects
FOS: Computer and information sciences ,Matching (graph theory) ,Hidden permutation ,[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS] ,0211 other engineering and technologies ,0102 computer and information sciences ,02 engineering and technology ,[INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM] ,[INFO.INFO-NE]Computer Science [cs]/Neural and Evolutionary Computing [cs.NE] ,01 natural sciences ,Upper and lower bounds ,Combinatorics ,Permutation ,Log-log plot ,Query complexity ,Computer Science - Data Structures and Algorithms ,Discrete Mathematics and Combinatorics ,Data Structures and Algorithms (cs.DS) ,Neural and Evolutionary Computing (cs.NE) ,Binary strings ,Time complexity ,Mathematics ,Black-box complexity ,Applied Mathematics ,LCP array ,Order (ring theory) ,Computer Science - Neural and Evolutionary Computing ,021107 urban & regional planning ,LEADINGONES ,010201 computation theory & mathematics - Abstract
We study the query complexity of a permutation-based variant of the guessing game Mastermind. In this variant, the secret is a pair $(z,\pi)$ which consists of a binary string $z \in \{0,1\}^n$ and a permutation $\pi$ of $[n]$. The secret must be unveiled by asking queries of the form $x \in \{0,1\}^n$. For each such query, we are returned the score \[ f_{z,\pi}(x):= \max \{ i \in [0..n]\mid \forall j \leq i: z_{\pi(j)} = x_{\pi(j)}\}\,;\] i.e., the score of $x$ is the length of the longest common prefix of $x$ and $z$ with respect to the order imposed by $\pi$. The goal is to minimize the number of queries needed to identify $(z,\pi)$. This problem originates from the study of black-box optimization heuristics, where it is known as the \textsc{LeadingOnes} problem. In this work, we prove matching upper and lower bounds for the deterministic and randomized query complexity of this game, which are $\Theta(n \log n)$ and $\Theta(n \log \log n)$, respectively., Comment: Full version of a result previously announced in 2013. Accepted subject to minor revision at Discrete Applied Mathematics
- Published
- 2019
43. A Convenient Method for Learning to Classify Biomedical and Other Complex Signals based on Neuronal Boolean Complexity
- Author
-
Radu Dogaru and Ioana Dogaru
- Subjects
Microcontroller ,Statistical classification ,business.industry ,Computer science ,Feature vector ,Pattern recognition ,Artificial intelligence ,Binary strings ,business ,Boolean function ,Internet of Things ,Classifier (UML) ,Extreme learning machine - Abstract
This paper proposes a novel method for fast and compact recognition of biomedical and other complex signals. It is essentially based on decomposing the signal sequences to be recognized into binary strings. Then each binary string is divided into smaller strings corresponding to Boolean functions. Based on complexities for neural implementation of Boolean functions a feature vector is computed by counting the occurrences of functions with certain complexities. Using enough labeled signal sequences, a classifier can be easily trained and then used for the automatic recognition of the signals. To decrease costs, a hardware oriented Extreme Learning Machine is used. Herein, in addition to describing the method, we consider the widely used Bonn dataset for epileptic seizure detection to demonstrate that our method offers good accuracies (more than 97%) with the advantage of very low implementation costs. Given its convenience and simplicity, the proposed method can be easily integrated in low cost portable equipment, to be operated, for instance, in the context of Internet of Things.
- Published
- 2019
44. Evolution of interface binding strengths in simplified model of protein quaternary structure
- Author
-
Alexander S. Leonard, Sebastian E. Ahnert, Leonard, Alexander S [0000-0001-8425-5630], and Apollo - University of Cambridge Repository
- Subjects
0301 basic medicine ,Decision Analysis ,Computer science ,Markov Processes ,Biochemistry ,0302 clinical medicine ,Protein structure ,Lattice (order) ,Macromolecular Structure Analysis ,Natural Selection ,Biology (General) ,Binary strings ,Ecology ,Statistics ,Computational Theory and Mathematics ,Modeling and Simulation ,Physical Sciences ,symbols ,Engineering and Technology ,Structural Proteins ,Evolutionary selection ,Biological system ,Management Engineering ,Algorithms ,Research Article ,Protein Binding ,Protein Structure ,Evolutionary Processes ,QH301-705.5 ,Markov process ,Research and Analysis Methods ,Molecular Evolution ,Protein–protein interaction ,Evolution, Molecular ,03 medical and health sciences ,Cellular and Molecular Neuroscience ,symbols.namesake ,Molecular evolution ,Genetics ,Protein Interactions ,Protein Structure, Quaternary ,Molecular Biology ,Ecology, Evolution, Behavior and Systematics ,Evolutionary Biology ,Decision Trees ,Biology and Life Sciences ,Proteins ,Protein Complexes ,Computational Biology ,Probability Theory ,030104 developmental biology ,Protein quaternary structure ,030217 neurology & neurosurgery ,Mathematics - Abstract
The self-assembly of proteins into protein quaternary structures is of fundamental importance to many biological processes, and protein misassembly is responsible for a wide range of proteopathic diseases. In recent years, abstract lattice models of protein self-assembly have been used to simulate the evolution and assembly of protein quaternary structure, and to provide a tractable way to study the genotype-phenotype map of such systems. Here we generalize these models by representing the interfaces as mutable binary strings. This simple change enables us to model the evolution of interface strengths, interface symmetry, and deterministic assembly pathways. Using the generalized model we are able to reproduce two important results established for real protein complexes: The first is that protein assembly pathways are under evolutionary selection to minimize misassembly. The second is that the assembly pathway of a complex mirrors its evolutionary history, and that both can be derived from the relative strengths of interfaces. These results demonstrate that the generalized lattice model offers a powerful new idealized framework to facilitate the study of protein self-assembly processes and their evolution., Author summary Protein complexes assemble by joining individual proteins together through interacting binding sites. Because of the long time scales of biological evolution, it can be difficult to reconstruct how these interactions change over time. We use simplified representations of proteins to simulate the evolution of these complexes on a computer. In some cases the order in which the complex assembles is crucial. We show that biological evolution increases the strength of interactions that must occur earlier, and decreases the strength of later interactions. Similar knowledge of interactions being preferred to be stronger or weaker can also help to predict the evolutionary ancestry of a complex. While these simulations are too idealized to make exact predictions, this general link between ordered pathways in assembly and evolution matches well-established observations that have been made in real protein complexes. This means that our model provides a powerful framework to help study protein complex assembly and evolution.
- Published
- 2019
45. A computable analysis of variable words theorems
- Author
-
Ludovic Patey, Benoit Monin, Lu Liu, Central South University, Laboratoire d'Algorithmique Complexité et Logique (LACL), Université Paris-Est Créteil Val-de-Marne - Paris 12 (UPEC UP12), Algèbre, géométrie, logique (AGL), Institut Camille Jordan [Villeurbanne] (ICJ), École Centrale de Lyon (ECL), Université de Lyon-Université de Lyon-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-Université Jean Monnet [Saint-Étienne] (UJM)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-École Centrale de Lyon (ECL), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS), Centre National de la Recherche Scientifique (CNRS), Central South University [Changsha], Université de Lyon-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université Jean Monnet [Saint-Étienne] (UJM)-Centre National de la Recherche Scientifique (CNRS)-École Centrale de Lyon (ECL), and Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université Jean Monnet [Saint-Étienne] (UJM)-Centre National de la Recherche Scientifique (CNRS)
- Subjects
Discrete mathematics ,Lemma (mathematics) ,Applied Mathematics ,General Mathematics ,010102 general mathematics ,Mathematics - Logic ,0102 computer and information sciences ,16. Peace & justice ,01 natural sciences ,Computable analysis ,[MATH.MATH-LO]Mathematics [math]/Logic [math.LO] ,010201 computation theory & mathematics ,Homogeneous ,FOS: Mathematics ,Reverse mathematics ,Ramsey's theorem ,0101 mathematics ,Binary strings ,Logic (math.LO) ,Mathematics - Abstract
The Carlson-Simpson lemma is a combinatorial statement occurring in the proof of the Dual Ramsey theorem. Formulated in terms of variable words, it informally asserts that given any finite coloring of the strings, there is an infinite sequence with infinitely many variables such that for every valuation, some specific set of initial segments is homogeneous. Friedman, Simpson, and Montalban asked about its reverse mathematical strength. We study the computability-theoretic properties and the reverse mathematics of this statement, and relate it to the finite union theorem. In particular, we prove the Ordered Variable word for binary strings in ACA0., 9 pages
- Published
- 2019
46. Edge Exploration of a Graph by Mobile Agent
- Author
-
Kaushik Mondal, Shaswati Patra, Rishi Ranjan Singh, Amit Kumar Dhar, and Barun Gorain
- Subjects
Theoretical computer science ,Computer science ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Graph ,Oracle ,Computer Science::Multiagent Systems ,010201 computation theory & mathematics ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,A priori and a posteriori ,Mobile agent ,Binary strings - Abstract
In this paper, we study the problem of edge exploration of an n node graph by a mobile agent. The nodes of the graph are unlabeled, and the ports at a node of degree d are arbitrarily numbered \(0,\dots , d-1\). A mobile agent, starting from some node, has to visit all the edges of the graph and stop. The time of the exploration is the number of edges the agent traverses before it stops. The task of exploration can not be performed even for a class of cycles if no additional information, called advice, is provided to the agent a priori. Following the paradigm of algorithms with advice, this priori information is provided to the agent by an Oracle in the form of a binary string. The Oracle knows the graph, but does not have the knowledge of the starting point of the agent. In this paper, we consider the following two problems of edge exploration. The first problem is: “how fast is it possible to explore an n node graph regardless of the size of advice provided to the agent?”
- Published
- 2019
47. Encoding Binary Arithmetic Operations in Integer Programming Formulations.
- Author
-
Conejeros, Raul, Vassiliadis, Vassilios, and Pogiatzis, Thomas
- Abstract
This paper presents the encoding of binary arithmetic operations within Integer Programming (IP) formulations, specifically the encoding of binary multiplication and addition/subtraction. This allows the direct manipulation of integer quantities represented as binary strings of arbitrary size. Many articles published in the past within the Chemical Engineering community have used this representation of integer quantities within Mixed-Integer formulations for Process Optimization and Design. Applications such as these can benefit from the formulations derived in this work. As a demonstrative application we consider the simple number factorization problem, according to which given an odd number C factors A and B are to be found such that C equals their product. If any such factors are found the number is factorable, else it is proven to be prime. An IP formulation is derived involving upper and lower bounding logical constraints to encode for the value of the binary string digits. The formulation involves ${\cal O}(\log C)$ binary variables, ${\cal O}((\log C)^{2})$ continuous variables, and ${\cal O}((\log C)^{2})$ constraints to describe the problem. Computational results demonstrate the validity of this approach, highlighting also the fact that such formulations are not very tight thus resulting in large numbers of iterations of the Branch and Bound algorithm used. It is also observed that the formulations become significantly tighter if logical upper bounding constraints forcing continuous variables involved to be zero are included. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
48. Working in binary protects the repetends of 1/3 : Comment on Colussi's ‘The convergence classes of Collatz function’
- Author
-
Patrick Chisan Hew
- Subjects
Discrete mathematics ,General Computer Science ,010102 general mathematics ,Concatenation ,Binary number ,0102 computer and information sciences ,Function (mathematics) ,01 natural sciences ,Theoretical Computer Science ,Collatz conjecture ,Combinatorics ,010201 computation theory & mathematics ,Fraction (mathematics) ,0101 mathematics ,Binary strings ,Representation (mathematics) ,Mathematics ,Integer (computer science) - Abstract
Colussi (2011) described the binary strings that iterate to 1 under the Collatz map.We confirm Colussi's description via elementary methods.Colussi's strings hold the repetends of 1 / 3 h , optionally rotated and replicated.It is only in binary that we see the repetends of 1 / 3 h .We see the Collatz map as multiplying up a fraction, versus reducing a large number. The Collatz function can be stated as 'for any odd positive integer x, calculate 3 x + 1 and then divide by 2 until the result is odd'. Colussi (2011) discovered and proved that if x attains 1 on the kth iteration of the Collatz function, then its binary representation can be written as the concatenation of strings s k s k - 1 ? s 1 where each s h is a finite and contiguous extract from the representation of 1 3 h . We provide an elementary confirmation of Colussi's finding, and comment on how working in binary 'protects' the repetends of 1 3 h as formed into each s h .
- Published
- 2016
49. Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of Internet history
- Author
-
C. S. Ierotheou, Diane Gan, David Gresty, and George Loukas
- Subjects
Jaccard index ,Computer science ,Digital forensics ,World wide web ,02 engineering and technology ,Multi-user ,computer.software_genre ,Session (web analytics) ,0202 electrical engineering, electronic engineering, information engineering ,Binary strings ,Multimedia ,business.industry ,Internet history analysis ,020207 software engineering ,Computer Science Applications ,Pattern of life ,Medical Laboratory Technology ,Context analysis ,020201 artificial intelligence & image processing ,The Internet ,business ,Session-to-session analysis ,Law ,computer ,Test data - Abstract
This paper proposes a new approach to the forensic investigation of Internet history artefacts by aggregating the history from a recovered device into sessions and comparing those sessions to other sessions to determine whether they are one-time events or form a repetitive or habitual pattern. We describe two approaches for performing the session aggregation: fixed-length sessions and variable-length sessions. We also describe an approach for identifying repetitive pattern of life behaviour and show how such patterns can be extracted and represented as binary strings. Using the Jaccard similarity coefficient, a session-to-session comparison can be performed and the sessions can be analysed to determine to what extent a particular session is similar to any other session in the Internet history, and thus is highly likely to correspond to the same user. Experiments have been conducted using two sets of test data, where multiple users have access to the same computer. By identifying patterns of Internet usage that are unique to each user, our approach exhibits a high success rate in attributing particular sessions of the Internet history to the correct user. This can provide considerable help to a forensic investigator trying to establish which user was using the computer when a web-related crime was committed.
- Published
- 2016
50. Analyzing the theoretical capacity of railway networks with a radial-backbone topology
- Author
-
J. David Canca Ortiz, Eva Barrena, Francisco A. Ortega Riejos, and Gilbert Laporte
- Subjects
Optimal design ,050210 logistics & transportation ,Engineering ,021103 operations research ,business.industry ,05 social sciences ,0211 other engineering and technologies ,Railway transportation ,Transportation ,02 engineering and technology ,Radial line ,Management Science and Operations Research ,Topology ,Frequency plan ,Scheduling (computing) ,Effective algorithm ,0502 economics and business ,Binary strings ,business ,Civil and Structural Engineering - Abstract
In this work we propose a mechanism to optimize the capacity of the main corridor within a railway network with a radial-backbone or X-tree structure. The radial-backbone (or X-tree) structure is composed of two types of lines: the primary lines that travel exclusively on the common backbone (main corridor) and radial lines which, starting from the common backbone, branch out to individual locations. We define possible line configurations as binary strings and propose operators on them for their analysis, yielding an effective algorithm for generating an optimal design and train frequencies. We test our algorithm on real data for the high speed line Madrid–Seville. A frequency plan consistent with the optimal capacity is then proposed in order to eliminate the number of transfers between lines as well as to minimize the network fleet size, determining the minimum number of vehicles needed to serve all travel demand at maximum occupancy.
- Published
- 2016
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.