The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It has been shown by Indyk and Sidiropoulos that any graph of genus g > 0 can be stochastically embedded into a distribution over planar graphs with distortion 2O(g). This bound was later improved to O(g2) by Borradaile, Lee and Sidiropoulos. We give an embedding with distortion O(log g), which is asymptotically optimal. Apart from the improved distortion, another advantage of our embedding is...
In this paper we give the first construction of a pseudorandom generator, with seed length O(log n), for CC0[p], the class of constant-depth circuits with unbounded fan-in MODp gates, for some prime p. More accurately, the seed length of our generator is O(log n) for any constant error ϵ > 0. In fact, we obtain our generator by fooling distributions generated by low degree polynomials, over Fp,...
Program verification based on invariant generation is a central issue in recent years. Invariants are key to deductive verification of imperative programs. In this paper, depending on linear invariants and polynomial loop invariants, we present a practical program verification framework. The safety property and the termination property can be verified automatically. The experimental results demonstrate...
This study presents the design of subsidence monitoring system for industrial machine alignment based on magnetic field method. The system was developed to demonstrate the level of land subsidence in the area of the industrial machine located. A computer was used to collect the data and to display the angles of subsidence over operation period. The measurement module consists of two thin-and-curve...
We consider the problem of compression of multiple correlated sources. It is assumed that the sources are given as a sequence with neighbouring sources correlated in terms of Hamming distance. In previous work we derived a general distributed source coding (DSC) framework that uses the parity check matrix of a suitably chosen block code C1. In this paper we focus on the special case that C1 is a cyclic...
A non-blind two-channel time-frequency digital bits audio watermarking scheme with error-correcting code is described in this paper. The proposed method operates by encoding the watermark bits with cyclic code before embedding them into the audio signal. Time-frequency compression-expansion technique is used to embed the watermark bits. The coefficients to be deleted or added for the time-frequency...
Stream ciphers are widely used for information security. The keystream produced by a cipher must be unpredictable. Attacks on stream ciphers typically exploit some underlying patterns existing in the keystream. The objective of this paper is to develop such an attack with the help of machine learning algorithms. The Linear Feedback Shift Register (LFSR) has been solved for several test cases using...
The maximal length pseudo random binary sequence is known as m-sequence. The m-sequence of domain {0, 1} can be represented in bipolar form of sequence in domain {-1, 1}. The m-sequences are used for watermarking because of their very good correlation properties, noise like characteristics and resistance to interference. This paper investigates a new locking condition in the operations of an m-sequence...
The classification of quaternary [21s+t,3,d] codes with dges16s and without zero coordinates is reduced to the classification of quaternary [21c(3,s,t)+t,k,d] code for sges1 and 0lestles20, where c(3,s,t)les min{s, 3t} is a function of 3, s, and t. Quaternary optimal Hermitian self-orthogonal codes are characterized by systems of linear equations. Based on these two results, the complete classification...
The classification of quaternary [21s+t,3,d] codes with dges16s and without zero coordinates is reduced to the classification of quaternary [21c(3,s,t)+t,k,d] code for sges1 and 0lestles20, where c(3,s,t)les min{s, 3t} is a function of 3, s, and t. Quaternary optimal Hermitian self-orthogonal codes are characterized by systems of linear equations. Based on these two results, the complete classification...
A method for identification of a synchronous generator is suggested in this paper. The method uses the theoretical relations of machine parameters and the new wavelet network structure combining a polynomial model with multi-resolution half-complex wavelet decomposition to find the state space model of the system. The proposed structure takes the advantage of both polynomial models and wavelet networks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.