Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (32)

Search Parameters:
Keywords = Hamming bound

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
23 pages, 614 KB  
Article
Two-Factor Cancelable Biometric Key Binding via Euclidean Challenge–Response Pair Mechanism
by Michael Logan Garrett, Mahafujul Alam, Michael Partridge and Julie Heynssens
J. Cybersecur. Priv. 2026, 6(2), 42; https://doi.org/10.3390/jcp6020042 - 2 Mar 2026
Viewed by 224
Abstract
This work proposes a lightweight biometric key-binding scheme that adapts a PUF-style challenge–response mechanism to face geometry: a two-factor password and session nonce generate random challenge points, Gray-coded Euclidean distances to facial landmarks form responses, and a random key is bound by discarding [...] Read more.
This work proposes a lightweight biometric key-binding scheme that adapts a PUF-style challenge–response mechanism to face geometry: a two-factor password and session nonce generate random challenge points, Gray-coded Euclidean distances to facial landmarks form responses, and a random key is bound by discarding selected positions so only a reduced subset, the nonce, and a key hash are stored. At authentication, a fresh response set is compared to the subset with a Hamming-distance tolerance, and bounded local search corrects residual errors; each successful session rotates the nonce and refreshes the ephemeral key. We frame this as a conceptual exploration of an interpretable, on-device, controlled-capture design niche—a per-session nonce-driven cancelable biometric key-binding mechanism—and we quantify the resulting security–usability trade-offs. Empirically, the scheme works under stable capture conditions with carefully tuned thresholds, and it is naturally suited to tightly controlled deployments (e.g., access kiosks) where it can also incorporate user-driven micro-gestures as an extra behavioral factor. While the construction is fragile under broader variability and leans on the second factor for security, it offers an alternative to existing mechanisms and a clear niche, and we present it as a conceptual exploration showing how CRP mechanisms can inform cancelable biometrics with per-session revocability. Full article
(This article belongs to the Section Security Engineering & Applications)
Show Figures

Figure 1

11 pages, 290 KB  
Article
Optimal One-Coincidence Sequence Sets with a Large Alphabet and Prime Length
by Jin-Ho Chung, Duehee Lee and Dongsup Jin
Mathematics 2026, 14(2), 214; https://doi.org/10.3390/math14020214 - 6 Jan 2026
Viewed by 266
Abstract
The performance of a frequency-hopping spread-spectrum system is mainly dependent on the mathematical properties of its hopping sequences, which are designed to minimize interference between different users. The one-coincidence sequence frequency-hopping sequence (OC-FHS) set is one of the primary types, because it achieves [...] Read more.
The performance of a frequency-hopping spread-spectrum system is mainly dependent on the mathematical properties of its hopping sequences, which are designed to minimize interference between different users. The one-coincidence sequence frequency-hopping sequence (OC-FHS) set is one of the primary types, because it achieves the lowest possible values regarding Hamming auto- and cross-correlation. In this work, we propose an OC-FHS set of a prime length p and alphabet size pq for two primes p and q using a block structure modulo pq. In particular, when p=q, our construction provides a significantly larger set size compared with a previously known OC-FHS set with the same length and the same alphabet size. Moreover, the set size is optimal with respect to the bound established by Cao, Ge, and Miao. This extended set size can be applied to FHMA systems that need to accommodate a large number of users. Full article
(This article belongs to the Special Issue Advances in Mathematics: Equations, Algebra, and Discrete Mathematics)
29 pages, 2805 KB  
Article
Probabilistic Links Between Quantum Classification of Patterns of Boolean Functions and Hamming Distance
by Theodore Andronikos, Constantinos Bitsakos, Konstantinos Nikas, Georgios I. Goumas and Nectarios Koziris
Stats 2026, 9(1), 5; https://doi.org/10.3390/stats9010005 - 1 Jan 2026
Viewed by 486
Abstract
This article investigates the probabilistic relationship between quantum classification of Boolean functions and their Hamming distance. By integrating concepts from quantum computing, information theory, and combinatorics, we explore how Hamming distance serves as a metric for analyzing deviations in function classification. Our extensive [...] Read more.
This article investigates the probabilistic relationship between quantum classification of Boolean functions and their Hamming distance. By integrating concepts from quantum computing, information theory, and combinatorics, we explore how Hamming distance serves as a metric for analyzing deviations in function classification. Our extensive experimental results confirm that the Hamming distance is a pivotal metric for validating nearest neighbors in the process of classifying random functions. One of the significant conclusions we arrived is that the successful classification probability decreases monotonically with the Hamming distance. However, key exceptions were found in specific classes, revealing intra-class heterogeneity. We have established that these deviations are not random but are systemic and predictable. Furthermore, we were able to quantify these irregularities, turning potential errors into manageable phenomena. The most important novelty of this work is the demarcation, for the first time to the best of our knowledge, of precise Hamming distance intervals for the classification probability. These intervals bound the possible values the probability can assume, and provide a new foundational tool for probabilistic assessment in quantum classification. Practitioners can now endorse classification results with high certainty or dismiss them with confidence. This framework can significantly enhance any quantum classification algorithm’s reliability and decision-making capability. Full article
Show Figures

Figure 1

11 pages, 267 KB  
Article
On the Characterization of the Unitary Cayley Graphs of the Upper Triangular Matrix Rings
by Waldemar Hołubowski, Bogdana Oliynyk and Viktoriia Solomko
Symmetry 2025, 17(12), 2180; https://doi.org/10.3390/sym17122180 - 18 Dec 2025
Viewed by 447
Abstract
There are several graphs naturally associated with rings. The unitary Cayley graph of a ring R is the graph with vertex set R, where two elements x,yR are adjacent if and only if xy is a [...] Read more.
There are several graphs naturally associated with rings. The unitary Cayley graph of a ring R is the graph with vertex set R, where two elements x,yR are adjacent if and only if xy is a unit of R. We show that the unitary Cayley graph CTn(F) of the ring Tn(F) of all upper triangular matrices over a finite field F is isomorphic to a semistrong product of a complete graph and the antipodal graph of a Hamming graph. In particular, when |F|=2, the graph CTn(F) has a highly symmetric structure: it is the union of 2n1 complete bipartite graphs. Moreover, we prove that the clique number and the chromatic number of CTn(F) are both equal to |F|, and we establish tight upper and lower bounds for the domination number of CTn(F). Full article
(This article belongs to the Special Issue Symmetry in Numerical Analysis and Applied Mathematics)
10 pages, 1409 KB  
Article
Pre-Emphasis for 1.2 Tb/s DP-64QAM Transmission Simulated in OptiSystem
by Abdullah S. Karar, Ahmad Atieh and Xin Chen
Photonics 2025, 12(12), 1152; https://doi.org/10.3390/photonics12121152 - 24 Nov 2025
Cited by 1 | Viewed by 576
Abstract
We investigate analog and digital pre-emphasis for ultra-high-bit-rate coherent dual-polarization 64-QAM (DP-64QAM) transmission using OptiSystem. Two representative single-wavelength configurations are studied: 64 Gbaud (600 Gb/s payload, 768 Gb/s line rate) and 100 Gbaud (1000 Gb/s payload, 1.2 Tb/s line rate). The transmitter employs [...] Read more.
We investigate analog and digital pre-emphasis for ultra-high-bit-rate coherent dual-polarization 64-QAM (DP-64QAM) transmission using OptiSystem. Two representative single-wavelength configurations are studied: 64 Gbaud (600 Gb/s payload, 768 Gb/s line rate) and 100 Gbaud (1000 Gb/s payload, 1.2 Tb/s line rate). The transmitter employs raised-cosine pulse shaping (roll-off 0.1) and a 9-bit DAC, while the receiver uses a 9-bit ADC; bandwidth-limiting Bessel/Gaussian filters emulate practical transmitter (Tx) and receiver (Rx) front-end constraints. Analog pre-emphasis (APE) is realized by uploading a measured analog filter response immediately after the DAC to compensate high-frequency roll-off. Digital pre-emphasis (DPE) is implemented before the DAC as a finite-impulse-response (FIR) pre-distortion stage, with taps obtained from the measured frequency response via spectrum mirroring, inverse FFT, Hamming-window smoothing, and normalization. We compare four cases: (i) ideal reference without bandwidth limits; (ii) bandwidth-limited without pre-emphasis; (iii) APE; and (iv) DPE. Bit-error-rate–versus–optical signal-to-noise ratio (OSNR) results show that both APE and DPE substantially mitigate bandwidth-induced penalties and approach the theoretical bound, reducing the OSNR gap to 5.8 dB at 64 Gbaud and 6.6 dB at 100 Gbaud, with operation near the forward error correction (FEC) threshold (BER=102). While DPE offers full programmability, it increases peak-to-average power ratio (PAPR) and may require additional gain headroom. Overall, APE provides an effective rapid-prototyping step prior to DPE deployment, confirming the feasibility of 768 Gb/s and 1.2 Tb/s DP-64QAM links with commercially realistic components, including a 150 GSa/s DAC operating at 1.5 samples/symbol for 100 Gbaud. Full article
Show Figures

Figure 1

12 pages, 290 KB  
Article
Efficient Algorithms for Permutation Arrays from Permutation Polynomials
by Sergey Bereg, Brian Malouf, Linda Morales and Ivan Hal Sudborough
Entropy 2025, 27(10), 1031; https://doi.org/10.3390/e27101031 - 1 Oct 2025
Viewed by 780
Abstract
We develop algorithms for computing permutation polynomials (PPs) using normalization, so-called F-maps and G-maps, and the Hermite criterion. This allows for a more efficient computation of PPs for larger degrees and for larger finite fields. We use this to improve some lower bounds [...] Read more.
We develop algorithms for computing permutation polynomials (PPs) using normalization, so-called F-maps and G-maps, and the Hermite criterion. This allows for a more efficient computation of PPs for larger degrees and for larger finite fields. We use this to improve some lower bounds for M(n,D), the maximum number of permutations on n symbols with a pairwise Hamming distance of D. Full article
(This article belongs to the Special Issue Discrete Math in Coding Theory, 2nd Edition)
15 pages, 342 KB  
Article
On the Application of a Hybrid Incomplete Exponential Sum to Aperiodic Hamming Correlation of Some Frequency-Hopping Sequences
by Peihua Li and Hongyu Han
Entropy 2025, 27(9), 988; https://doi.org/10.3390/e27090988 - 21 Sep 2025
Viewed by 643
Abstract
Frequency-hopping sequences are essential in frequency-hopping spread spectrum communication systems due to their strong anti-interference capabilities, low probability of interception, and high confidentiality. Existing research has predominantly focused on the periodic Hamming correlation properties of sequences, whereas the aperiodic Hamming correlation performance more [...] Read more.
Frequency-hopping sequences are essential in frequency-hopping spread spectrum communication systems due to their strong anti-interference capabilities, low probability of interception, and high confidentiality. Existing research has predominantly focused on the periodic Hamming correlation properties of sequences, whereas the aperiodic Hamming correlation performance more accurately reflects the actual system performance. Owing to the complexity of its application scenarios and considerable research challenges, results in this area remain scarce. In this paper, we utilize exponential sums over finite fields to derive an upper bound on a hybrid incomplete exponential sum. Then, based on this upper bound, we derive bounds on the aperiodic Hamming correlation of some frequency-hopping sequence sets constructed by trace functions. Finally, by analyzing the maximum estimation error between the average and actual frequency collision numbers of such sequence sets, the validity of the derived bound is demonstrated. Full article
(This article belongs to the Special Issue Coding Theory and Its Applications)
Show Figures

Figure 1

20 pages, 406 KB  
Article
Reduction and Efficient Solution of ILP Models of Mixed Hamming Packings Yielding Improved Upper Bounds
by Péter Naszvadi, Peter Adam and Mátyás Koniorczyk
Mathematics 2025, 13(16), 2633; https://doi.org/10.3390/math13162633 - 16 Aug 2025
Viewed by 1097
Abstract
We consider mixed Hamming packings, addressing the maximal cardinality of codes with a minimum codeword Hamming distance. We do not rely on any algebraic structure of the alphabets. We extend known-integer linear programming models of the problem to be efficiently tractable using standard [...] Read more.
We consider mixed Hamming packings, addressing the maximal cardinality of codes with a minimum codeword Hamming distance. We do not rely on any algebraic structure of the alphabets. We extend known-integer linear programming models of the problem to be efficiently tractable using standard ILP solvers. This is achieved by adopting the concept of contact graphs from classical continuous sphere packing problems to the present discrete context, resulting in a reduction technique for the models which enables their efficient solution as well as their decomposition to smaller subproblems. Based on our calculations, we provide a systematic summary of all lower and upper bounds for packings in the smallest Hamming spaces. The known results are reproduced, with some bounds found to be sharp, and the upper bounds improved in some cases. Full article
Show Figures

Figure 1

10 pages, 1357 KB  
Article
Design of Balanced Wide Gap No-Hit Zone Sequences with Optimal Auto-Correlation
by Duehee Lee, Seho Lee and Jin-Ho Chung
Mathematics 2025, 13(15), 2454; https://doi.org/10.3390/math13152454 - 30 Jul 2025
Viewed by 709
Abstract
Frequency-hopping multiple access is widely adopted to blunt narrow-band jamming and limit spectral disclosure in cyber–physical systems, yet its practical resilience depends on three sequence-level properties. First, balancedness guarantees that every carrier is occupied equally often, removing spectral peaks that a jammer or [...] Read more.
Frequency-hopping multiple access is widely adopted to blunt narrow-band jamming and limit spectral disclosure in cyber–physical systems, yet its practical resilience depends on three sequence-level properties. First, balancedness guarantees that every carrier is occupied equally often, removing spectral peaks that a jammer or energy detector could exploit. Second, a wide gap between successive hops forces any interferer to re-tune after corrupting at most one symbol, thereby containing error bursts. Third, a no-hit zone (NHZ) window with a zero pairwise Hamming correlation eliminates user collisions and self-interference when chip-level timing offsets fall inside the window. This work introduces an algebraic construction that meets the full set of requirements in a single framework. By threading a permutation over an integer ring and partitioning the period into congruent sub-blocks tied to the desired NHZ width, we generate balanced wide gap no-hit zone frequency-hopping (WG-NHZ FH) sequence sets. Analytical proofs show that (i) each sequence achieves the Lempel–Greenberger bound for auto-correlation, (ii) the family and zone sizes satisfy the Ye–Fan bound with equality, (iii) the hop-to-hop distance satisfies a provable WG condition, and (iv) balancedness holds exactly for every carrier frequency. Full article
Show Figures

Figure 1

27 pages, 660 KB  
Article
Integrating Group Setup Time Deterioration Effects and Job Processing Time Learning Effects with Group Technology in Single-Machine Green Scheduling
by Na Yin, Hongyu He, Yanzhi Zhao, Yu Chang and Ning Wang
Axioms 2025, 14(7), 480; https://doi.org/10.3390/axioms14070480 - 20 Jun 2025
Cited by 12 | Viewed by 852
Abstract
We study single-machine group green scheduling considering group setup time deterioration effects and job-processing time learning effects, where the setup time of a group is a general deterioration function on its starting setup time and the processing time of a job is a [...] Read more.
We study single-machine group green scheduling considering group setup time deterioration effects and job-processing time learning effects, where the setup time of a group is a general deterioration function on its starting setup time and the processing time of a job is a non-increasing function on its position. We focus on confirming the job schedule for each group and group schedule for minimizing the total weighted completion time. It is proved that this problem is NP-hard. According to the problem’s NP-hardness, we present some optimal properties (including lower and upper bounds) and then propose a branch-and-bound algorithm and two heuristic algorithms (including the modified Nawaz–Enscore–Ham algorithm and simulated annealing algorithm). Finally, numerical simulations are provided to indicate the effectiveness of these algorithms, which demonstrates that the branch-and-bound algorithm can solve random instances of 100 jobs and 14 groups within reasonable time and that simulated annealing is more accurate than the modified Nawaz–Enscore–Ham algorithm. Full article
(This article belongs to the Special Issue Advances in Mathematical Optimization Algorithms and Its Applications)
Show Figures

Figure 1

17 pages, 1697 KB  
Article
Block-Cipher No-Hit-Zone Sequence-Assisted Spectrum Control Scheme for Distributed Systems
by Wendong Gao, Lei Guan, Pei Hui, Hanwen Zhang and Zan Li
Electronics 2025, 14(9), 1802; https://doi.org/10.3390/electronics14091802 - 28 Apr 2025
Cited by 1 | Viewed by 657
Abstract
In distributed systems, the dense access of wireless devices introduces significant challenges, including severe quasi-synchronous multiple access interference (MAI) and transmission security threats, which limit the effectiveness of traditional orthogonality-based spectrum control schemes. To address these challenges, this paper proposes a new block-cipher [...] Read more.
In distributed systems, the dense access of wireless devices introduces significant challenges, including severe quasi-synchronous multiple access interference (MAI) and transmission security threats, which limit the effectiveness of traditional orthogonality-based spectrum control schemes. To address these challenges, this paper proposes a new block-cipher no-hit-zone (BC-NHZ) sequence-assisted spectrum control transmission scheme, aimed at enhancing privacy protection and improving overall communication capacity for distributed systems. The BC-NHZ scheme employs block cipher encryption and establishes control sequences to represent the spectrum usage scheme. Moreover, we mathematically prove that the parameters of the BC-NHZ scheme achieve optimal results with respect to the bound of the Hamming correlation. Numerical analysis and simulation results validate the practical feasibility of the BC-NHZ scheme, demonstrating its reliability to relax synchronous requirements while providing enhanced transmission privacy protection performance. Full article
(This article belongs to the Special Issue Security and Privacy in Distributed Machine Learning)
Show Figures

Figure 1

8 pages, 252 KB  
Article
A Construction of Optimal One-Coincidence Frequency-Hopping Sequences via Generalized Cyclotomy
by Minfeng Shao and Ying Miao
Entropy 2024, 26(11), 935; https://doi.org/10.3390/e26110935 - 31 Oct 2024
Cited by 3 | Viewed by 1131
Abstract
Frequency-hopping sequences (FHSs) with low Hamming correlation are essential for synchronization and multiple-access communication systems. In this paper, we propose a novel construction of FHSs using generalized cyclotomy. Our results reveal that the constructed FHSs exhibit a one-coincidence property, meaning that the smallest [...] Read more.
Frequency-hopping sequences (FHSs) with low Hamming correlation are essential for synchronization and multiple-access communication systems. In this paper, we propose a novel construction of FHSs using generalized cyclotomy. Our results reveal that the constructed FHSs exhibit a one-coincidence property, meaning that the smallest correlation between different FHSs, aside from the trivial case, is minimized. Additionally, the new sets of FHSs achieve an optimal size in relation to a known theoretical bound. Full article
(This article belongs to the Special Issue Advances in Information and Coding Theory, the Third Edition)
11 pages, 293 KB  
Article
Perfect Codes over Non-Prime Power Alphabets: An Approach Based on Diophantine Equations
by Pedro-José Cazorla García
Mathematics 2024, 12(11), 1642; https://doi.org/10.3390/math12111642 - 23 May 2024
Viewed by 1463
Abstract
Perfect error-correcting codes allow for an optimal transmission of information while guaranteeing error correction. For this reason, proving their existence has been a classical problem in both pure mathematics and information theory. Indeed, the classification of the parameters of e-error correcting perfect [...] Read more.
Perfect error-correcting codes allow for an optimal transmission of information while guaranteeing error correction. For this reason, proving their existence has been a classical problem in both pure mathematics and information theory. Indeed, the classification of the parameters of e-error correcting perfect codes over q-ary alphabets was a very active topic of research in the late 20th century. Consequently, all parameters of perfect e-error-correcting codes were found if e3, and it was conjectured that no perfect 2-error-correcting codes exist over any q-ary alphabet, where q>3. In the 1970s, this was proved for q a prime power, for q=2r3s and for only seven other values of q. Almost 50 years later, it is surprising to note that there have been no new results in this regard and the classification of 2-error-correcting codes over non-prime power alphabets remains an open problem. In this paper, we use techniques from the resolution of the generalised Ramanujan–Nagell equation and from modern computational number theory to show that perfect 2-error-correcting codes do not exist for 172 new values of q which are not prime powers, substantially increasing the values of q which are now classified. In addition, we prove that, for any fixed value of q, there can be at most finitely many perfect 2-error-correcting codes over an alphabet of size q. Full article
(This article belongs to the Special Issue Codes, Designs, Cryptography and Optimization, 2nd Edition)
45 pages, 691 KB  
Article
Deterministic K-Identification for Future Communication Networks: The Binary Symmetric Channel Results
by Mohammad Javad Salariseddigh, Ons Dabbabi, Christian Deppe and Holger Boche
Future Internet 2024, 16(3), 78; https://doi.org/10.3390/fi16030078 - 26 Feb 2024
Cited by 1 | Viewed by 2595
Abstract
Numerous applications of the Internet of Things (IoT) feature an event recognition behavior where the established Shannon capacity is not authorized to be the central performance measure. Instead, the identification capacity for such systems is considered to be an alternative metric, and has [...] Read more.
Numerous applications of the Internet of Things (IoT) feature an event recognition behavior where the established Shannon capacity is not authorized to be the central performance measure. Instead, the identification capacity for such systems is considered to be an alternative metric, and has been developed in the literature. In this paper, we develop deterministic K-identification (DKI) for the binary symmetric channel (BSC) with and without a Hamming weight constraint imposed on the codewords. This channel may be of use for IoT in the context of smart system technologies, where sophisticated communication models can be reduced to a BSC for the aim of studying basic information theoretical properties. We derive inner and outer bounds on the DKI capacity of the BSC when the size of the goal message set K may grow in the codeword length n. As a major observation, we find that, for deterministic encoding, assuming that K grows exponentially in n, i.e., K=2nκ, where κ is the identification goal rate, then the number of messages that can be accurately identified grows exponentially in n, i.e., 2nR, where R is the DKI coding rate. Furthermore, the established inner and outer bound regions reflects impact of the input constraint (Hamming weight) and the channel statistics, i.e., the cross-over probability. Full article
(This article belongs to the Special Issue Featured Papers in the Section Internet of Things)
Show Figures

Figure 1

10 pages, 387 KB  
Article
DNA Code Design Based on the Cosets of Codes over Z4
by Adel N. Alahmadi, Fatimah Anas Melibari and Manish K. Gupta
Mathematics 2023, 11(23), 4732; https://doi.org/10.3390/math11234732 - 22 Nov 2023
Cited by 1 | Viewed by 2052
Abstract
DNA code design is a challenging problem, and it has received great attention in the literature due to its applications in DNA data storage, DNA origami, and DNA computing. The primary focus of this paper is in constructing new DNA codes using the [...] Read more.
DNA code design is a challenging problem, and it has received great attention in the literature due to its applications in DNA data storage, DNA origami, and DNA computing. The primary focus of this paper is in constructing new DNA codes using the cosets of linear codes over the ring Z4. The Hamming distance constraint, GC-content constraint, and homopolymers constraint are all considered. In this study, we consider the cosets of Simplex alpha code, Kerdock code, Preparata code, and Hadamard code. New DNA codes of lengths four, eight, sixteen, and thirty-two are constructed using a combination of an algebraic coding approach and a variable neighborhood search approach. In addition, good lower bounds for DNA codes that satisfy important constraints have been successfully established using Magma software V2.24-4 and Python 3.10 programming in our comprehensive methodology. Full article
(This article belongs to the Section E: Applied Mathematics)
Show Figures

Figure 1

Back to TopTop