Results 221 to 230 of about 4,192 (267)
Some of the next articles are maybe not open access.
Binary generalized synchronization
Chaos, Solitons & Fractals, 2016zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Alexey A. Koronovskii +4 more
openaire +1 more source
Formal Pattern Analysis & Applications, 2004
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Haft, M., Hofman, R., Tresp, V.
openaire +1 more source
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Haft, M., Hofman, R., Tresp, V.
openaire +1 more source
Generalized Binary Udaya–Siddiqi Sequences
IEEE Transactions on Information Theory, 2004In this correspondence, we present a family of binary 2n sequences of period 2(2n-1) where n is an integer, which can be seen as a generalization of nonlinear binary sequences obtained from Z4 sequences and recently constructed GKW (Gold, Kasami, and Welch)-like sequences.
TANG, X., PARAMPALLI, U., FAN, P.
openaire +1 more source
On the Generalized Binary System
IEEE Transactions on Computers, 1982In this correspondence we derive algorithms for multioperand addition of Koren's generalized number system. A carry-lookahead adder for fast addition of two operands in generalized binary numbers is developed. Truncation errors for this type of representation are examined and rounding algorithms are presented to reduce these errors.
Bhuyan, Laxmi N., Agrawal, Dharma P.
openaire +1 more source
Pseudorandom Binary Key Generation from Binary Files
2011 International Conference on Computational Intelligence and Communication Networks, 2011This paper presents an algorithm to generate a long pseudorandom binary key using a binary file downloaded from the Internet as seed or input. This file can be of any type i.e. video, audio, text, image etc. The output is a long pseudorandom binary key.
Raghava Nallanthighal, Vijeta Rani
openaire +1 more source
Binary computer-generated holograms
Applied Optics, 1979Binary computer-generated holograms are similar to interferograms with fringe patterns hardclipped by a photographic process. Therefore the fringe locations in the binary hologram can be determined by solving a grating equation. However, there are two difficulties in using this approach to make binary Fourier transform holograms.
openaire +2 more sources
Generalized binary split trees
Acta Informatica, 1984zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Huang, Shou-Hsuan Stephen, Wong, C. K.
openaire +2 more sources
2008 46th Annual Allerton Conference on Communication, Control, and Computing, 2008
This paper studies a generalization of the classic binary search problem of locating a desired value within a sorted list. The classic problem can be viewed as determining the correct one-dimensional, binary-valued threshold function from a finite class of such functions based on queries taking the form of point samples of the function.
openaire +1 more source
This paper studies a generalization of the classic binary search problem of locating a desired value within a sorted list. The classic problem can be viewed as determining the correct one-dimensional, binary-valued threshold function from a finite class of such functions based on queries taking the form of point samples of the function.
openaire +1 more source
Computer-generated Binary Holograms
IBM Journal of Research and Development, 1969Holograms synthesized by computer are used for constructing optical wavefronts from numerically specified objects. Elimination of the need for a physical object has made new applications possible, for example, three-dimensional computer output displays, synthetic prototypes for interferometric testing, and filters for various optical data processing ...
B. R. Brown, A. W. Lohmann
openaire +1 more source
Binary Discriminant Analysis for Generating Binary Face Template
IEEE Transactions on Information Forensics and Security, 2012Although biometrics is more reliable, robust and convenient than traditional methods, security and privacy concerns are growing. Biometric templates stored in databases are vulnerable to attacks if they are not protected. To solve this problem, a biometric cryptosystem approach that combines cryptography and biometrics has been proposed.
Y. C. Feng, P. C. Yuen
openaire +1 more source

