Skip to main content

Showing 1–4 of 4 results for author: Sultanow, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2209.09283  [pdf, other

    math.NT cs.LG hep-th

    Machine Learning Class Numbers of Real Quadratic Fields

    Authors: Malik Amir, Yang-Hui He, Kyu-Hwan Lee, Thomas Oliver, Eldar Sultanow

    Abstract: We implement and interpret various supervised learning experiments involving real quadratic fields with class numbers 1, 2 and 3. We quantify the relative difficulties in separating class numbers of matching/different parity from a data-scientific perspective, apply the methodology of feature analysis and principal component analysis, and use symbolic classification to develop machine-learned form… ▽ More

    Submitted 19 September, 2022; originally announced September 2022.

    Comments: 26 pages, 20 figures

    MSC Class: 11R29; 11R80; 62R99

  2. arXiv:2206.03960  [pdf, other

    quant-ph cs.LG

    Predict better with less training data using a QNN

    Authors: Barry D. Reese, Marek Kowalik, Christian Metzl, Christian Bauckhage, Eldar Sultanow

    Abstract: Over the past decade, machine learning revolutionized vision-based quality assessment for which convolutional neural networks (CNNs) have now become the standard. In this paper, we consider a potential next step in this development and describe a quanvolutional neural network (QNN) algorithm that efficiently maps classical image data to quantum states and allows for reliable image analysis. We pra… ▽ More

    Submitted 8 June, 2022; originally announced June 2022.

    Comments: 23 pages, 15 figures

    MSC Class: 81P68 ACM Class: I.5.1

  3. arXiv:2203.12466  [pdf, other

    cs.CR

    Which programming languages do hackers use? A survey at the German Chaos Computer Club

    Authors: Christian Koch, Katharina Müller, Eldar Sultanow

    Abstract: There are numerous articles about the programming languages most commonly used by hackers. Among them, however, there are hardly any scientific studies. One reason might be that hackers mainly operate anonymously and are difficult to reach. This paper aims to shed light on this interesting and relevant research question. In order to find answers, we conducted a survey among the members of the Germ… ▽ More

    Submitted 23 March, 2022; originally announced March 2022.

    Comments: 14 pages, 11 tables

  4. arXiv:2107.08363  [pdf, other

    math.NT cs.DM

    Rotating Binaries

    Authors: Anant Gupta, Idriss J. Aberkane, Sourangshu Ghosh, Adrian Abold, Alexander Rahn, Eldar Sultanow

    Abstract: This paper investigates the behaviour of rotating binaries. A rotation by $r$ digits to the left of a binary number $B$ exhibits in particular cases the divisibility $l\mid N_1(B)\cdot r+1$, where $l$ is the bit-length of $B$ and $N_1(B)$ is the Hamming weight of $B$, that is the number of ones in $B$. The integer $r$ is called the left-rotational distance. We investigate the connection between th… ▽ More

    Submitted 18 July, 2021; originally announced July 2021.

    Comments: 16 Pages, 5 Tables, 12 References

    MSC Class: 11-11; 11D72 (Primary) 11D45; 68R99 (Secondary)