Search results for "Binary code"

showing 6 items of 6 documents

Design of efficient codes for the AWGN channel based on decomposable binary lattices

1998

This work is concerned with the use of binary decomposable lattice codes over the QAM Gaussian channel. First, we investigate the structure of such class of lattices: we derive consistency conditions for the binary codes appearing in their decomposition and express their nominal coding gain and some bounds for their error coefficient in terms of the parameters of the component codes. Then we describe a general multistage bounded‐distance decoding algorithm with low complexity and we evaluate its performance. Finally, we develop a design example and report the corresponding simulation results; as a reference some comparisons with standard TCM codes are also presented.

Block codeTheoretical computer scienceApplied MathematicsConcatenated error correction codeBinary numberLinear codeCoding gainComputer Science Applicationssymbols.namesakeAdditive white Gaussian noiseComputational Theory and MathematicssymbolsBinary codeElectrical and Electronic EngineeringAlgorithmDecoding methodsMathematics
researchProduct

On the weight distribution of perfect binary codes

2021

In this paper, we give a new proof of the closed-form formula for the weight distribution of a perfect binary single-error-correcting code.

Discrete mathematicsAlgebra and Number TheoryPerfect codes Binary codes Hamming codes Weight distribution.Hamming boundApplied MathematicsBinary numberTheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESSettore MAT/05 - Analisi MatematicaWeight distributionCode (cryptography)Binary codeSettore MAT/03 - GeometriaHamming codeAnalysisMathematics
researchProduct

On the loopless generation of binary tree sequences

1998

Weight sequences were introduced by Pallo in 1986 for coding binary trees and he presented a constant amortized time algorithm for their generation in lexicographic order. A year later, Roelants van Baronaigien and Ruskey developed a recursive constant amortized time algorithm for generating Gray code for binary trees in Pallo's representation. It is common practice to find a loopless generating algorithm for a combinatorial object when enunciating a Gray code for this object. In this paper we regard weight sequences as variations and apply a Williamson algorithm in order to obtain a loopless generating algorithm for the Roelants van Baronaigien and Ruskey's Gray code for weight sequences.

Discrete mathematicsAmortized analysisBinary treeLexicographical orderPseudorandom binary sequenceComputer Science ApplicationsTheoretical Computer ScienceGray codeCombinatoricsSignal ProcessingBinary codeInformation SystemsCoding (social sciences)MathematicsInformation Processing Letters
researchProduct

More restrictive Gray codes for necklaces and Lyndon words

2008

In the last years, the order induced by the Binary Reflected Gray Code or its generalizations shown an increasing interest. In this note we show that the BRGC order induces a cyclic 2-Gray code on the set of binary necklaces and Lyndon words and a cyclic 3-Gray code on the unordered counterparts. This is an improvement and a generalization to unlabeled words of the result in [V. Vajnovszki, Gray code order for Lyndon words, Discrete Math. Theoret. Comput. Sci. 9 (2) (2007) 145-152; M. Weston, V. Vajnovszki, Gray codes for necklaces and Lyndon words of arbitrary base, Pure Mathematics and Applications/Algebra and Theoretical Computer Science, in press]; however an algorithmic implementation …

Open problemBase (topology)Computer Science ApplicationsTheoretical Computer ScienceCombinatoricsSet (abstract data type)Gray codeCombinatorics on wordsAlgorithmicsSignal ProcessingCode (cryptography)Binary codeInformation SystemsMathematicsInformation Processing Letters
researchProduct

ISAdetect

2020

Static and dynamic binary analysis techniques are actively used to reverse engineer software's behavior and to detect its vulnerabilities, even when only the binary code is available for analysis. To avoid analysis errors due to misreading op-codes for a wrong CPU architecture, these analysis tools must precisely identify the Instruction Set Architecture (ISA) of the object code under analysis. The variety of CPU architectures that modern security and reverse engineering tools must support is ever increasing due to massive proliferation of IoT devices and the diversity of firmware and malware targeting those devices. Recent studies concluded that falsely identifying the binary code's ISA ca…

Reverse engineeringprosessoritComputer scienceFirmware02 engineering and technologycomputer.file_formatcomputer.software_genrehaittaohjelmatInstruction setObject codeComputer engineering020204 information systemsEndianness0202 electrical engineering electronic engineering information engineeringMalwareesineiden internet020201 artificial intelligence & image processingBinary codeExecutabletietoturvacomputerProceedings of the Tenth ACM Conference on Data and Application Security and Privacy
researchProduct

Multiple-Output Walsh Function Generation for Minimum Orthogonality Error

1978

A hazard-free multiple-output Walsh function generator is presented which requires a minimum amount of hardware and is as fast as the integrated logic family employed for the implementation. However, the main characteristic of the instrument is the optimum performance from the viewpoint of the orthogonality of the function generated, as it is shown by the experimental verifications reported.

Signal processingSignal generatorComputer scienceFast Fourier transformLogic familyOrthogonal functionsOrthogonality principleFunction (mathematics)Logic synthesisOrthogonalityWalsh functionBinary codeElectrical and Electronic EngineeringInstrumentationAlgorithmIEEE Transactions on Instrumentation and Measurement
researchProduct