Efficient Privacy-Preserving Binary Tree Search

  • Conference paper
  • First Online: 11 November 2020
  • Cite this conference paper

Book cover

  • Ruidi Yang   ORCID: orcid.org/0000-0003-1012-4595 12 &
  • Maohua Sun   ORCID: orcid.org/0000-0002-7474-7268 12 , 13  

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12486))

Included in the following conference series:

  • International Conference on Machine Learning for Cyber Security

1130 Accesses

Binary search tree is a common structure in computer programming and is currently widely used in many scenarios, such as routing search engine in routers, massive data concurrent query, set/multiset, map in C++ STL, and Linux Such technology is applied to memory management and the like. However, with the development of network technology, people’s demand for privacy protection has gradually increased. The leakage of many key information will cause serious consequences, and also restrict the application and development of network technology. In the process of binary tree search, it is easy to have such a problem: the searched party may only want to provide the location of the searched data without exposing all the data in the entire binary search tree; at the same time, the searcher does not want to expose itself The information you need to find. This leads to issues related to the privacy protection of binary search trees. In response to the above problems, we have proposed a binary tree search solution that can protect privacy, which is used to solve the data leakage problem that may exist during the search process of the binary tree. The feature of the scheme proposed in the text is that it integrates two technologies of binary search tree and obfuscation circuit, so as to effectively protect the binary search tree and perform the search without leaking data. And the security analysis shows that the protocol we proposed is very safe and efficient, which can protect the data beneficially.

  • Binary search tree; privacy-preserving
  • Oblivious transfer
  • Garbled circuit

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Available as EPUB and PDF
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Adelson-velskii, G.M., Landis, E.Nl.: Doklady akademia nauk sssr (1962)

Google Scholar  

Chang, S.K.: Parallel balancing of binary search trees. IEEE Trans. Comput. 23 , 441–445 (1974)

Article   Google Scholar  

Haq, E., Cheng, Y., Iyengar, S.S.: New algorithms for balancing binary search trees. In: IEEE Conference Proceedings, pp. 378–382 (1988)

Bayer, R.: Symmetric binary B-trees: data structure and maintenance algorithms. Acfa Inf. 1 (4), 290–306 (1972)

MathSciNet   MATH   Google Scholar  

Guibas, L.J., Sedgewick, R.: A dichromatic framework for balanced trees. In: Proceedings of the 19th Symposium on the Foundations of Computer Science (1978)

Borovskiy, V., Müller, J., Schapranow, M.P., Zeier, A.: Binary search tree visualization algorithm. IEEE (2009)

Ramachandran, R.: Kakkot Tree — A Binary Search Tree with caching. IEEE (2012)

Chinnaiyan, R., Kumar, A.: Construction of estimated level based balanced binary search tree. In: ICECA (2017)

Shekhar, A., Goyal, J.: Parallel binary search trees for rapid IP lookup using graphic processors. In: Proceedings of IMKE, pp. 176–179 (2013)

Rabin, M.O.: How to exchange secrets by oblivious transfer, Aiken Computation Lab, University Harvard, USA, Technical Report TR-81 (1981)

Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Commun. ACM 28 , 637–647 (1985)

Article   MathSciNet   Google Scholar  

Yao, A.: Protocols for secure computation. In: Proceedings 23rd Annual Symposium on Foundations of Computer Science (FOCS), pp. 160–164 (1982)

Kolesnikov, V., Sadeghi, A., Schneider, T.T.: Improved garbled circuit building blocks and applications to auctions and computing minima. Crypt. Network Secur. (2009)

Goldreich, O., Micali, S., Wigderson, A.: How to Solve any Protocol Problem. In: Proceedings of STOC (1987)

Damgård, I., Pastro, V., Smart, N., Zakarias, S.: Multiparty computation from somewhat homomorphic encryption. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 643–662. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32009-5_38

Chapter   Google Scholar  

Download references

Author information

Authors and affiliations.

School of Management and Engineering, Capital University of Economics and Business, Beijing, 100070, China

Ruidi Yang & Maohua Sun

Project of High-Level Teachers in Beijing Municipal Universities in the Period of 13th Five-Year Plan (CN), Grant Numbers: CIT&TCD201904097; CUEB Supporting Plan for the Youth Backbone Teachers, Beijing, China

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Maohua Sun .

Editor information

Editors and affiliations.

Xidian University, Xi'an, China

Xiaofeng Chen

Guangzhou University, Guangzhou, China

Hongyang Yan

Michigan State University, East Lansing, MI, USA

Division of Computer, Electrical and Mathematical Sciences and Engineering, King Abdullah University of Science, Thuwal, Saudi Arabia

Xiangliang Zhang

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Cite this paper.

Yang, R., Sun, M. (2020). Efficient Privacy-Preserving Binary Tree Search. In: Chen, X., Yan, H., Yan, Q., Zhang, X. (eds) Machine Learning for Cyber Security. ML4CS 2020. Lecture Notes in Computer Science(), vol 12486. Springer, Cham. https://doi.org/10.1007/978-3-030-62223-7_37

Download citation

DOI : https://doi.org/10.1007/978-3-030-62223-7_37

Published : 11 November 2020

Publisher Name : Springer, Cham

Print ISBN : 978-3-030-62222-0

Online ISBN : 978-3-030-62223-7

eBook Packages : Computer Science Computer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

A Survey on Lock-free Binary Search Tree

Ieee account.

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

binary search algorithm Recently Published Documents

Total documents.

  • Latest Documents
  • Most Cited Documents
  • Contributed Authors
  • Related Sources
  • Related Keywords

A Low-Jitter Harmonic-Free All-Digital Delay-Locked Loop for Multi-Channel Vernier TDC

This paper presents a low jitter All-Digital Delay-Locked Loop (ADDLL) with fast lock time and process immunity. A coarse locking algorithm is proposed to prevent harmonic locking with just a small increase in hardware resources. In order to effectively solve the dithering phenomenon after locking, a replica delay line and a modified binary search algorithm with two modes were introduced in our ADDLL, which can significantly reduce the peak-to-peak jitter of the replica delay line. In addition, digital codes for a replica delay line can be conveniently applied to the delay line of multi-channel Vernier TDC while maintaining consistency between channels. The proposed ADDLL has been designed in 55 nm CMOS technology. In addition, the post-layout simulation results show that when operated at 1.2 V, the proposed ADDLL locks within 37 cycles and has a closed-loop characteristic, the peak-to-peak and root-mean-square jitter at 800 MHz are 6.5 ps and 1.18 ps, respectively. The active area is 0.024 mm2 and the power consumption at 800 MHz is 6.92 mW. In order to verify the performance of the proposed ADDLL, an architecture of dual ADDLL is applied to Vernier TDC to stabilize the Vernier delay lines against the process, voltage, and temperature (PVT) variations. With a 600 MHz operating frequency, the TDC achieves a 10.7 ps resolution, and the proposed ADDLL can keep the resolution stable even if PVT varies.

Inverse design of multifunctional metamaterial based on modified direct binary search algorithm

Runtime compensation coefficient estimation techniques using binary search algorithm for low-power active noise cancelling systems, aplikasi belajar tajwid menggunakan binary search.

ABSTRAK Tajwid dapat diartikan sebagai aturan atau tata cara untuk membaca Al-Quran dengan benar. seorang muslim biasanya mulai belajar tajwid sejak usianya masih dini, namun dewasa ini motivasi untuk mempelajarinya makin turun. Salah satu penyebabnya adalah cara pembelajaran yang konvensional dan kurang begitu memanfaatkan teknologi. Oleh karena itu, penelitian ini bertujuan untuk membangun aplikasi pembelajaran tajwid berbasis website dan menerapkan algoritma binary search untuk memperoleh hasil yang lebih optimal. Pencarian biner atau binary search adalah suatu algoritma yang bekerja dengan mencari posisi elemen dalam array yang telah diurutkan sebelumnya dan kemudian membandingkan nilainya. Ruang pencarian dibagi menjadi dua, kemudian nilai yang dicari dibandingkan dengan elemen tengah array. Operasi ini diulang terus sampai ada kecocokan diantara dua nilai tersebut. Aplikasi pembelajaran tajwid yang dibuat terdiri dari tiga menu yaitu materi, latihan, dan info. Menu materi berisi mata kuliah yang berkaitan dengan hukum membaca Al-Quran. Menu latihan memungkinkan pengguna untuk melatih pemahaman yang telah mereka pelajari di menu teori, sedangkan menu info berisi instruksi manual penggunaan aplikasi. ABSTRACT Tajweed is set of rules for reciting Al-Quran properly. Muslim start learning tajweed from their early age, but currently motivation to learn tajweed is decreasing. One of the reason is the conventional learning and less use digital technology. Therefore, the aim of this study is to construct tajweed learning application based on website and applied binary search algorithm for better result. Binary search is a search algorithm that works by finding the position of elements in a sorted array and comparing their values. The search space is divided into half, then compared the value searched with the middle element of the Array.  This operation is repeated until they match. Tajweed learning application consist of three menus: theory, exercise, and info. Theory menu contains courses related to the law of reciting Al-Quran. Exercise menu allows user to train the understanding they has learned in theory menu, while info menu contains user instruction manual.

COMPARISON OF SOFTWARE COMPLEXITY OF SEARCH ALGORITHM USING CODE BASED COMPLEXITY METRICS

Measures of software complexity are essential part of software engineering. Complexity metrics can be used to forecast key information regarding the testability, reliability, and manageability of software systems from study of the source code. This paper presents the results of three distinct software complexity metrics that were applied to two searching algorithms (Linear and Binary search algorithm). The goal is to compare the complexity of linear and binary search algorithms implemented in (Python, Java, and C++ languages) and measure the sample algorithms using line of code, McCabe and Halstead metrics. The findings indicate that the program difficulty of Halstead metrics has minimal value for both linear and binary search when implemented in python. Analysis of Variance (ANOVA) was adopted to determine whether there is any statistically significant differences between the search algorithms when implemented in the three programming languages and it was revealed that the three (3) programming languages do not vary considerably for both linear and binary search techniques which implies that any of the (3) programming languages is suitable for coding linear and binary search algorithms.

A binary search algorithm for univariate data approximation and estimation of extrema by piecewise monotonic constraints

Error estimation for the methods of correlated colour temperature calculation.

To date, a lot of methods have been developed for calculating correlated colour temperature (CCT). There are both numerical solutions (Robertson’s method, Yoshi Ohno method, binary search algorithm) and analytical (Javier Hernandez-Andres’s method, McCamy’s method). At the same time, the information about their accuracy is of a segmental fragmentary nature, therefore, it is very difficult to develop recommendations for the application of methods for certain radiators. In this connection, it seems extremely interesting to compare the error of the most well-known CCT calculating methods, using a single universal approach. The paper proposes an algorithm for researching the error of the methods for calculating correlated colour temperature, based on the method for plotting lines of constant CCT of a given length. Temperatures corresponding to these lines are taken as true, and the chromaticity lying on them are used as input data for the researched method. The paper proposes an approach when first the distribution of the error in the entire range of determination of CCT is determined, followed by bilinear interpolation for the required chromaticity. Using this approach, the absolute errors of the following methods for calculating CCT: McCamy, Javier Hernandez, Robertson, and Yoshi Ohno were estimated. The error was estimated in the range occupied by quadrangles of possible values from ANSI C78.377 chromaticity standard, developed by American National Standards Institute for LED lamps for indoor lightning. The tabular and graphical distribution of the absolute error for each investigated method was presented in the range of (2000–7000) K. In addition, to clarify the applicability of the methods for calculating CCT of the sky, the calculation of the distribution of the relative error up to 100000 K was performed. The results of the study can be useful for developers of standards and measurement procedures and for software developers of measuring equipment.

Pencarian Data Barang Produk Atribut Sekolah Menggunakan Algoritma Binary Search

ABSTRACTTechnology and information that is growing and sophisticated must be balanced according to the needs. For it was made the application of binary algorithms for the search data goods production of school attributes. Many methods in search with the goal of making it easier to search, e.g. search data of production items of school attributes with binary search method. Convection in the search of production goods using the manual way by looking for the archive data written in the notebook, the purpose of this research is to create a data retrieval system of goods that will be applied as a data retrieval tool of goods, as well as change the system manual to the computing system. In this research using Binary Search algorithm. Binary search algorithm is a technique applied only on the sorted element (sorted). This research using method of binary search algorithm with analysis stage, system design, coding/construction, testing, and implementation. In the analysis stage, the collection of data conducted is observation and literature study. At the system design stage using Unified Modelling Language (UML) include the use case diagram, activity diagram, Sequence diagram, and Diagram class. At the construction stage using the Java programming language using Netbeans and MySQL Server tools while the implementation of this system is the application of data retrieval of goods. To know the eligibility of a system, it is necessary to test against the search time of 210 data each time duration, 0.0004 seconds, 0.0005 seconds, 0.0006 seconds, 0.0007 seconds, 0.0008 seconds, 0.0009 seconds, 0.0010 seconds, 0.0012 seconds, 0.0014 seconds, 0.00117 seconds. The final result of this study is the application of search for production goods with Binary Search Algorithm Method.

Bayesian direct-binary-search algorithm for the efficient design of mosaic-based power splitters

A binary search algorithm based optimal sizing of photovoltaic and energy storage systems, export citation format, share document.

Captcha Page

We apologize for the inconvenience...

To ensure we keep this website safe, please can you confirm you are a human by ticking the box below.

If you are unable to complete the above request please contact us using the below link, providing a screenshot of your experience.

https://ioppublishing.org/contacts/

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

paper cover thumbnail

Binary Search Trees

Profile image of Talha Shah

Related Papers

Fernanda Argota

research paper binary search

By applying object-oriented design to the definition of a binary search tree, Berman and Duvall [1] designed a data structure comprised of three classes: (i) an EmptyBST class to model empty binary search trees, (ii) a NonEmptyBST class to model non-empty binary search trees, and (iii) a BST base class for common attributes of EmptyBST and NonEmptyBST objects. That paper noted the problem of inserting new values into such a structure: since insertions occur at an EmptyBST object, an EmptyBST would have to "turn into " a NonEmptyBST; a behavior beyond the capabilities of the classes in most languages. This paper presents three C++ solutions to the insertion problem in their order of development. The first solution uses a procedural programming technique, with the second and third solutions shifting to a more object-oriented approach. This chronology illustrates the author's ongoing battle to shift from procedural to object-oriented thinking.

ACM SIGCSE Bulletin

Information Processing Letters

Sukhamay Kundu

South African Computer Journal

Brink Van Der Merwe

We consider two ways of inserting a key into a binary search tree: leaf insertion which is the standard method, and root insertion which involves additional rotations. Although the respective cost of constructing leaf and root insertion binary search trees trees, in terms of comparisons, are the same in the average case, we show that in the worst case the construction of a root insertion binary search tree needs approximately 50% of the number of comparisons required by leaf insertion.

Robert Duvall

The Binary Search Tree serves as an important example when teaching data structures. We explore new approaches to understanding the implementation of a Binary Search Tree, using concepts from Object-Oriented Programming and C++. The Binary Search Tree illustrates how adopting a new approach and a new language can lead to a new way of thinking about a familiar problem.

jagannadha varma Pinnamaraju

Srinidhi Deshpande

A data structure is proposed to maintain a collection of vertex-disjoint trees under a sequence of two kinds of operations: a link operation that combines two trees into one by adding an edge, and a cut operation that divides one tree into two by deleting an edge. The tree is one of the most powerful of the advanced data structures and it often pops up in even more advanced subjects such as AI and compiler design. Surprisingly though the tree is important in a much more basic application-namely the keeping of an efficient index. This research paper gives us brief description of importance of tree in data structure, types of trees, implementation with their examples.

Discrete Mathematics & Theoretical Computer Science

Alois Panholzer

There are three classical algorithms to visit all the nodes of a binary tree - preorder, inorder and postorder traversal. From this one gets a natural labelling of the internal nodes of a binary tree by the numbers , indicating the sequence in which the nodes are visited. For given (size of the tree) and (a number between 1 and

RELATED PAPERS

attlee m'buka

Flavien Pac

Revista Latinoamericana De Educacion Inclusiva

Nicole Diaz

Cardiologia Croatica

Bosko Skoric

Renjana Pendidikan Dasar

heri hadi saputra

INTERNATIONAL JOURNAL OF COMPUTER APPLICATION

purbo santosa

The International Journal of Psychiatry in Medicine

Italian Journal of Animal Science

alberto stanislao atzori

Journal of Biogeography

Rafael Hurtado

The EMBO Journal

Frontiers in Climate

Rob Bellamy

Cahiers d'études africaines

2019 URSI Asia-Pacific Radio Science Conference (AP-RASC)

Manas Srivastava

Plant and Cell Physiology

Patricia Ortega-Rodes

Medical hypotheses

Saeid Raoofi

Ignazio Ciufolini

Research, Society and Development

Bruna Pires

Journal of Membrane Science

Jeremiah Zartman

Ana Cabral Rodrigues

European Journal for Philosophy of Religion

Bruce Langtry

Journal of American History

Barbara Tomblin

Nazifah Nasution

Cropp Breeding and Applied Biotechnology

Sudhir shukla

Annals of Punjab Medical College

Md Shahid Nadeem

Research and Reviews: Journal of Microbiology and Biotechnology

Olga Petrova

See More Documents Like This

RELATED TOPICS

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

To revisit this article, visit My Profile, then View saved stories .

  • Backchannel
  • Newsletters
  • WIRED Insider
  • WIRED Consulting

Will Knight

Apple’s MM1 AI Model Shows a Sleeping Giant Is Waking Up

The Apple logo on the exterior of an Apple store building with a yellow overlay effect

While the tech industry went gaga for generative artificial intelligence , one giant has held back: Apple. The company has yet to introduce so much as an AI-generated emoji, and according to a New York Times report today and earlier reporting from Bloomberg, it is in preliminary talks with Google about adding the search company’s Gemini AI model to iPhones .

Yet a research paper quietly posted online last Friday by Apple engineers suggests that the company is making significant new investments into AI that are already bearing fruit. It details the development of a new generative AI model called MM1 capable of working with text and images. The researchers show it answering questions about photos and displaying the kind of general knowledge skills shown by chatbots like ChatGPT. The model’s name is not explained but could stand for MultiModal 1. MM1 appears to be similar in design and sophistication to a variety of recent AI models from other tech giants, including Meta’s open source Llama 2 and Google’s Gemini . Work by Apple’s rivals and academics shows that models of this type can be used to power capable chatbots or build “agents” that can solve tasks by writing code and taking actions such as using computer interfaces or websites. That suggests MM1 could yet find its way into Apple’s products.

“The fact that they’re doing this, it shows they have the ability to understand how to train and how to build these models,” says Ruslan Salakhutdinov , a professor at Carnegie Mellon who led AI research at Apple several years ago. “It requires a certain amount of expertise.”

MM1 is a multimodal large language model, or MLLM, meaning it is trained on images as well as text. This allows the model to respond to text prompts and also answer complex questions about particular images.

One example in the Apple research paper shows what happened when MM1 was provided with a photo of a sun-dappled restaurant table with a couple of beer bottles and also an image of the menu. When asked how much someone would expect to pay for “all the beer on the table,” the model correctly reads off the correct price and tallies up the cost.

When ChatGPT launched in November 2022, it could only ingest and generate text, but more recently its creator OpenAI and others have worked to expand the underlying large language model technology to work with other kinds of data. When Google launched Gemini (the model that now powers its answer to ChatGPT ) last December, the company touted its multimodal nature as beginning an important new direction in AI. “After the rise of LLMs, MLLMs are emerging as the next frontier in foundation models,” Apple’s paper says.

MM1 is a relatively small model as measured by its number of “parameters,” or the internal variables that get adjusted as a model is trained. Kate Saenko , a professor at Boston University who specializes in computer vision and machine learning, says this could make it easier for Apple’s engineers to experiment with different training methods and refinements before scaling up when they hit on something promising.

Saenko says the MM1 paper provides a surprising amount of detail on how the model was trained for a corporate publication. For instance, the engineers behind MM1 describe tricks for improving the performance of the model including increasing the resolution of images and mixing text and image data. Apple is famed for its secrecy, but it has previously shown unusual openness about AI research as it has sought to lure the talent needed to compete in the crucial technology.

The Earth Will Feast on Dead Cicadas

Adrienne So

The Next Heat Pump Frontier? NYC Apartment Windows

Saenko says it’s hard to draw too many conclusions about Apple’s plans from the research paper. Multimodal models have proven adaptable to many different use cases. But she suggests that MM1 could perhaps be a step toward building “some type of multimodal assistant that can describe photos, documents, or charts and answer questions about them.”

Apple’s flagship product, the iPhone, already has an AI assistant—Siri. The rise of ChatGPT and its rivals has quickly made the once revolutionary helper look increasingly limited and out-dated. Amazon and Google have said they are integrating LLM technology into their own assistants, Alexa and Google Assistant. Google allows users of Android phones to replace the Assistant with Gemini. Reports from The New York Times and Bloomberg that Apple may add Google’s Gemini to iPhones suggest Apple is considering expanding the strategy it has used for search on mobile devices to generative AI. Rather than develop web search technology in-house, the iPhone maker leans on Google, which reportedly pays more than $18 billion to make its search engine the iPhone default. Apple has also shown it can build its own alternatives to outside services, even when it starts from behind. Google Maps used to be the default on iPhones but in 2012 Apple replaced it with its own maps app .

Apple CEO Tim Cook has promised investors that the company will reveal more of its generative AI plans this year. The company faces pressure to keep up with rival smartphone makers, including Samsung and Google, that have introduced a raft of generative AI tools for their devices.

Apple could end up tapping both Google and its own, in-house AI, perhaps by introducing Gemini as a replacement for conventional Google Search while also building new generative AI tools on top of MM1 and other homegrown models. Last September, several of the researchers behind MM1 published details of MGIE , a tool that uses generative AI to manipulate images based on a text prompt.

Salakhutdinov believes his former employer may focus on developing LLMs that can be installed and run securely on Apple devices. That would fit with the company’s past emphasis on using “on-device” algorithms to safeguard sensitive data and avoid sharing it with other companies. A number of recent AI research papers from Apple concern machine-learning methods designed to preserve user privacy. “I think that's probably what Apple is going to do,” he says.

When it comes to tailoring generative AI to devices, Salakhutdinov says, Apple may yet turn out to have a distinct advantage because of its control over the entire software-hardware stack. The company has included a custom “neural engine” in the chips that power its mobile devices since 2017, with the debut of the iPhone X. “Apple is definitely working in that space, and I think at some point they will be in the front, because they have phones, the distribution.”

In a thread on X, Apple researcher Brandon McKinzie, lead author of the MM1 paper wrote : “This is just the beginning. The team is already hard at work on the next generation of models.”

You Might Also Like …

In your inbox: Will Knight's Fast Forward explores advances in AI

This shadowy firm enables businesses to operate in near-total secrecy

Scientists are inching closer to bringing back the woolly mammoth

The first rule of the Extreme Dishwasher Loading Facebook group is …

Phones for every budget: These devices stood up to WIRED’s testing

research paper binary search

Morgan Meaker

Europe Is Breaking Open the Empires of Big Tech

Makena Kelly

The US Sues Apple in an iPhone Antitrust Blockbuster

Vittoria Elliott

Forget Chatbots. AI Agents Are the Future

  • Program Finder
  • Admissions Services
  • Course Directory
  • Academic Calendar
  • Hybrid Campus
  • Lecture Series
  • Convocation
  • Strategy and Development
  • Implementation and Impact
  • Integrity and Oversight
  • In the School
  • In the Field
  • In Baltimore
  • Resources for Practitioners
  • Articles & News Releases
  • In The News
  • Statements & Announcements
  • At a Glance
  • Student Life
  • Strategic Priorities
  • Inclusion, Diversity, Anti-Racism, and Equity (IDARE)
  • What is Public Health?

Research Identifies Characteristics of Cities That Would Support Young People’s Mental Health

Survey responses from global panel that included young people provide insights into what would make cities mental health-friendly for youth

As cities around the world continue to draw young people for work, education, and social opportunities, a new study identifies characteristics that would support young urban dwellers’ mental health. The findings, based on survey responses from a global panel that included adolescents and young adults, provide a set of priorities that city planners can adopt to build urban environments that are safe, equitable, and inclusive. 

To determine city characteristics that could bolster youth mental health, researchers administered an initial survey to a panel of more than 400, including young people and a multidisciplinary group of researchers, practitioners, and advocates. Through two subsequent surveys, participants prioritized six characteristics that would support young city dwellers’ mental health: opportunities to build life skills; age-friendly environments that accept young people’s feelings and values; free and safe public spaces where young people can connect; employment and job security; interventions that address the social determinants of health; and urban design with youth input and priorities in mind. 

The paper was published online February 21 in  Nature .

The study’s lead author is Pamela Collins, MD, MPH, chair of the Johns Hopkins Bloomberg School of Public Health’s Department of Mental Health. The study was conducted while Collins was on the faculty at the University of Washington. The paper was written by an international, interdisciplinary team, including citiesRISE, a global nonprofit that works to transform mental health policy and practice in cities, especially for young people.

Cities have long been a draw for young people. Research by UNICEF projects that cities will be home to 70 percent of the world’s children by 2050. Although urban environments influence a broad range of health outcomes, both positive and negative, their impacts manifest unequally. Mental disorders are the leading causes of disability among 10- to 24-year-olds globally. Exposure to urban inequality, violence, lack of green space, and fear of displacement disproportionately affects marginalized groups, increasing risk for poor mental health among urban youth.

“Right now, we are living with the largest population of adolescents in the world’s history, so this is an incredibly important group of people for global attention,” says Collins. “Investing in young people is an investment in their present well-being and future potential, and it’s an investment in the next generation—the children they will bear.” 

Data collection for the study began in April 2020 at the start of the COVID-19 pandemic. To capture its possible impacts, researchers added an open-ended survey question asking panelists how the pandemic influenced their perceptions of youth mental health in cities. The panelists reported that the pandemic either shed new light on the inequality and uneven distribution of resources experienced by marginalized communities in urban areas, or confirmed their preconceptions of how social vulnerability exacerbates health outcomes. 

For their study, the researchers recruited a panel of more than 400 individuals from 53 countries, including 327 young people ages 14 to 25, from a cross-section of fields, including education, advocacy, adolescent health, mental health and substance use, urban planning and development, data and technology, housing, and criminal justice. The researchers administered three sequential surveys to panelists beginning in April 2020 that asked panelists to identify elements of urban life that would support mental health for young people.

The top 37 characteristics were then grouped into six domains: intrapersonal, interpersonal, community, organizational, policy, and environment. Within these domains, panelists ranked characteristics based on immediacy of impact on youth mental health, ability to help youth thrive, and ease or feasibility of implementation. 

Taken together, the characteristics identified in the study provide a comprehensive set of priorities that policymakers and urban planners can use as a guide to improve young city dwellers' mental health. Among them: Youth-focused mental health and educational services could support young people’s emotional development and self-efficacy. Investment in spaces that facilitate social connection may help alleviate young people’s experiences of isolation and support their need for healthy, trusting relationships. Creating employment opportunities and job security could undo the economic losses that young people and their families experienced during the pandemic and help cities retain residents after a COVID-era exodus from urban centers.  

The findings suggest that creating a mental health-friendly city for young people requires investments across multiple interconnected sectors like transportation, housing, employment, health, and urban planning, with a central focus on social and economic equity. They also require urban planning policy approaches that commit to systemic and sustained collaboration, without magnifying existing privileges through initiatives like gentrification and developing green spaces at the expense of marginalized communities in need of affordable housing.

The authors say this framework underscores that responses by cities should include young people in the planning and design of interventions that directly impact their mental health and well-being. 

“ Making cities mental health friendly for adolescents and young adults ” was co-authored by an international, interdisciplinary team of 31 researchers led by the University of Washington Consortium for Global Mental Health, Urban@UW, the University of Melbourne, and citiesRISE. Author funding is listed in the Acknowledgements section of the paper.

Related Content

Two black women dressed in business attire smile at the camera as they stand next to each other.

Student Spotlight: Glendedora Dolce

A child drinking water from tap with her hands.

Study Estimates Nearly 70 Percent of Children Under Six in Chicago May Be Exposed to Lead-Contaminated Tap Water

A girl sits alone in a school cafeteria with little to no food for lunch

Hidden Food Insecurity: The Adolescents Who Aren’t Getting Enough to Eat

A child looks out at a hazy skyline from an overlook in midtown Manhattan on July 19, 2023 in New York City.

A Zero-Emissions Transition Would Save Kids’ Lives

Sahil, a 7-month-old child suffering from diarrhea, lies in a bed at the district hospital on May 21, 2022 in Mirzapur, Uttar Pradesh, India.

Child Diarrhea Has a Cheap and Easy Fix—Why Isn’t It Reaching Patients?

Help | Advanced Search

Astrophysics > High Energy Astrophysical Phenomena

Title: the mass density of merging binary black holes over cosmic time.

Abstract: The connection between the binary black hole (BBH) mergers observed by LIGO-Virgo-KAGRA (LVK) and their stellar progenitors remains uncertain. Specifically, the fraction $\epsilon$ of stellar mass that ends up in BBH mergers and the delay time $\tau$ between star formation and BBH merger carry information about the astrophysical processes that give rise to merging BBHs. We model the BBH merger rate in terms of the cosmic star formation history, coupled with a metallicity-dependent efficiency $\epsilon$ and a distribution of delay times $\tau$, and infer these parameters with data from the Third Gravitational-Wave Transient Catalog (GWTC-3). We find that the progenitors to merging BBHs preferentially form in low metallicity environments with a low metallicity efficiency of $\log_{10}\epsilon_{<Z_t}=-3.99^{+0.68}_{-0.87}$ and a high metallicity efficiency of $\log_{10}\epsilon_{<Z_t}=-4.60^{+0.30}_{-0.34}$ at the 90% credible level. The data also prefer short delay times. For a power-law distribution $p(\tau)\propto \tau^\alpha$, we find $\tau_\text{min}<1.9 $ Gyr and $\alpha<-1.32$ at 90% credibility. Our model allows us to extrapolate the mass density in BBHs out to high redshifts. We cumulatively integrate our modelled density rate over cosmic time to get the total mass density of merging stellar mass BBHs as a function of redshift. Today, stellar-mass BBH mergers make up only $\sim 0.01\%$ of the total stellar mass density created by high-mass ($>10\,M_\odot$) progenitors. However, because massive stars are so short-lived, there may be more mass in merging BBHs than in living massive stars as early as $\sim 2.5$ Gyr ago. We also compare to the mass in supermassive BHs, finding that the mass densities were comparable $\sim 12.5$ Gyr ago, but the mass density in SMBHs quickly increased to $\sim 75$ times the mass density in merging stellar mass BBHs by $z\sim 1$.

Submission history

Access paper:.

  • HTML (experimental)
  • Other Formats

References & Citations

  • INSPIRE HEP
  • Google Scholar
  • Semantic Scholar

BibTeX formatted citation

BibSonomy logo

Bibliographic and Citation Tools

Code, data and media associated with this article, recommenders and search tools.

  • Institution

arXivLabs: experimental projects with community collaborators

arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.

Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.

Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs .

IMAGES

  1. PPT

    research paper binary search

  2. Schematic illustration of binary data collection from paper search

    research paper binary search

  3. Solved The following diagram shows a binary search tree.

    research paper binary search

  4. Binary Search Trees

    research paper binary search

  5. Binary Search

    research paper binary search

  6. Binary Search Tree (BST)

    research paper binary search

VIDEO

  1. 26- Binary Search

  2. Understanding The Binary Search Algorithm In Less Than 1 Minute

  3. || OPTIMAL BINARY SEARCH TREE || DATA STRUCTURES AND APPLICATIONS ||

  4. MASTERING OPTIMAL BINARY SEARCH TREE || DATA STRUCTURE

  5. All About Binary Search

  6. Binary Search Algorithm l Beginners Course

COMMENTS

  1. (PDF) Modified Binary Search Algorithm

    Abstract and Figures. This paper proposes a modification to the traditional binary search algorithm in which it checks the presence of the input element with the middle element of the given set of ...

  2. Interpolated binary search: An efficient hybrid search algorithm on

    Interpolated Binary Search (IBS) 1: procedure IBS array, left, right, X. 2: array is the array that required to search. 3: left is the index of left most element in array. 4: right is the index of right most element in array. 5: X is the element that we are searching for. 6: while left < right do.

  3. binary search tree Latest Research Papers

    In this paper, the Dijkstra-ant colony algorithm (ACO) with binary search tree (BST) has been proposed. Dijkstra and ACO are integrated to produce the smart guidance algorithm for the indoor parking system. Dijkstra algorithm initials the paths to finding the shortest path while ACO optimizes the paths.

  4. (PDF) Comparative Performance Analysis of Binary Search ...

    In this research paper, it provides a detailed study of Binary Search and how the time complexity of Binary Search can be reduced by using Odd Even Based Binary Search Algorithm, which is an ...

  5. A Survey on Balanced Binary Search Trees methods

    Binary Search Trees (BSTs) are fundamental data structures in computer science; because of their implicit key sorting and linked node structure, they provide effective sorting and simple update operations. They achieve their highest performance when they are balanced. A non-balanced Binary Search Tree is no more efficient than a regular linked list. In the present literature, multiple methods ...

  6. PDF A Fast Parallelizable Algorithm for Constructing Balanced Binary Search

    We present a new non-recursive algorithm for construct-ing a binary search tree. The algorithm has O(N) time and O(1) auxiliary memory complexity if the given array of N numbers is sorted. We use an array-based representation of the BST. The O(1) auxiliary memory complexity means that, except for the resulting arrays used to store the tree, we.

  7. An improved algorithm to maintain the Binary Search Tree dynamically

    Binary Search Tree (BST) is an acyclic graph that is widely used to arrange the data for optimal search. In order to maintain the binary search tree in optimal shape several algorithms have been proposed. A recently proposed technique [1] applies single and double rotations to balance the binary search tree. However, due to double rotation it takes almost double time as compared to single ...

  8. Binary Search in Graphs Revisited

    The classical binary search algorithm detects an unknown target (or "treasure") t on a path with n vertices by asking at most \(\log n\) queries to an oracle which always returns the direction from the queried vertex to t.To achieve this upper bound on the number of queries, the algorithm maintains a set of candidates for the place of t; this set is always a sub-path, and initially it is ...

  9. PDF Verifying Time Complexity of Binary Search using Dafny

    Figure 1: A running example of binary search. i.e., 9c >0 and 9n 0 >0 s:t: 8n: n n 0)T(n) clog 2n (4) In this paper we demonstrate the use of Dafny [13] for specifying and proving time complexity of the binary search algorithm; i.e., our main goal is to prove that the binary search time complexity belongs to O(log 2n). Dafny is an imperative ...

  10. Efficient Privacy-Preserving Binary Tree Search

    Early research on the binary search tree algorithm mainly focused on solving the problem of BST tree balance. ... In this paper, based on the perfect binary search tree and combining obfuscation circuits, a novel and efficient privacy-preserving binary tree search scheme is proposed. The obfuscation circuits we use are MUP and GMW, which play a ...

  11. A Survey on Lock-free Binary Search Tree

    Binary Search Tree is the data structure that has fast search speed and easy addition, removal of elements. Due to these advantages, binary search tree (BST) is one of the frequently used data structures of these days. However, most binary search tree schemes use locking technique to support multiple access of multiple threads for synchronization. Unfortunately, this locking techniques ...

  12. [PDF] Binary search algorithm

    In this research paper, this research paper would see how binary search algorithm help in different languages. :- - In computer science, a binary search or half-interval search algorithm finds the position of a specified input value within an array sorted by key value. For binary search, the array should be arranged in ascending or descending order. Advantages of binary search method are that ...

  13. binary search algorithm Latest Research Papers

    Binary search algorithm is a technique applied only on the sorted element (sorted). This research using method of binary search algorithm with analysis stage, system design, coding/construction, testing, and implementation. In the analysis stage, the collection of data conducted is observation and literature study.

  14. [1406.1677] Modified Binary Search Algorithm

    This paper proposes a modification to the traditional binary search algorithm in which it checks the presence of the input element with the middle element of the given set of elements at each iteration. Modified binary search algorithm optimizes the worst case of the binary search algorithm by comparing the input element with the first & last element of the data set along with the middle ...

  15. Learning a binary search with a recurrent neural network. A novel

    Deep neural networks are a family of computational models that are naturally suited to the analysis of hierarchical data such as, for instance, sequential data with the use of recurrent neural networks. In the other hand, ordinal regression is a well-known predictive modelling problem used in fields as diverse as psychometry to deep neural network based voice modelling. Their specificity lies ...

  16. PDF Binary Search

    The Problem ‣ Observation #1 ‣ we can stop searching for 11 if we reach 12 ‣ we can stop searching for x if we reach y > x ‣ Why? ‣ since array is sorted, 11 can't be after 12 ‣ since array is sorted, x can't be after y ‣ But what if we're looking for 25? 9 1 1 3 4 7 8 101012181921232324

  17. Comparison Searching Process of Linear, Binary and Interpolation

    Abstract. Searching is a process that cannot be issued for a transaction and communication process, many search algorithms that can be used to facilitate the search, linear, binary, and interpolation algorithms are some searching algorithms that can be utilized, the comparison of the three algorithms is performed by testing to search data with ...

  18. PDF E-ART: A New Encryption Algorithm Based on the Reflection of Binary

    E-ART has five levels. Node 64 is the root, with children 32 and 96. Node 32 has two children, as does node 96, and so on. The branch of the tree can be defined as the link between parent-child nodes. For instance, one of the branches is 64-32, and another branch is 88-92, marked with a red line in Figure1.

  19. PDF Binary Trees

    also obey the binary search tree constraint: in the (1, 3, 4) subtree, the 3 is the root, the 1 <= 3 and 4 > 3. Watch out for the exact wording in the problems -- a "binary search tree" is different from a "binary tree". The nodes at the bottom edge of the tree have empty subtrees and are called "leaf" nodes (1, 4, 6) while the others

  20. (PDF) Binary Search Trees

    See Full PDFDownload PDF. Binary Search Trees • A Binary Search Tree (BST) is a special type of binary tree - it represents information is an ordered format - A binary tree is binary search tree if for every node w, all keys in the left subtree of i have values less than the key of w and all keys in the right subtree have values greater ...

  21. MM1: Methods, Analysis & Insights from Multimodal LLM Pre-training

    In this work, we discuss building performant Multimodal Large Language Models (MLLMs). In particular, we study the importance of various architecture components and data choices. Through careful and comprehensive ablations of the image encoder, the vision language connector, and various pre-training data choices, we identified several crucial design lessons. For example, we demonstrate that ...

  22. Apple's MM1 AI Model Shows a Sleeping Giant Is Waking Up

    A research paper quietly released by Apple describes an AI model called MM1 that can answer questions and analyze images. It's the biggest sign yet that Apple is developing generative AI ...

  23. Research Identifies Characteristics of Cities That Would Support Young

    The study was conducted while Collins was on the faculty at the University of Washington. The paper was written by an international, interdisciplinary team, including citiesRISE, a global nonprofit that works to transform mental health policy and practice in cities, especially for young people. Cities have long been a draw for young people.

  24. [2403.19534] Locate, Assign, Refine: Taming Customized Image Inpainting

    Prior studies have made significant progress in image inpainting guided by either text or subject image. However, the research on editing with their combined guidance is still in the early stages. To tackle this challenge, we present LAR-Gen, a novel approach for image inpainting that enables seamless inpainting of masked scene images, incorporating both the textual prompts and specified ...

  25. [2403.17076] Dual AGNs: Precursors of Binary Supermassive Black Hole

    The presence of dual active galactic nuclei (AGN) on scales of a few tens of kpc can be used to study merger-induced accretion on supermassive black holes (SMBHs) and offer insights about SMBH mergers, using dual AGNs as merger precursors. In this study, we use the Romulus25 cosmological simulation to investigate the properties and evolution of dual AGNs. We first analyze the properties of ...

  26. The Mass Density of Merging Binary Black Holes Over Cosmic Time

    The connection between the binary black hole (BBH) mergers observed by LIGO-Virgo-KAGRA (LVK) and their stellar progenitors remains uncertain. Specifically, the fraction $ε$ of stellar mass that ends up in BBH mergers and the delay time $τ$ between star formation and BBH merger carry information about the astrophysical processes that give rise to merging BBHs. We model the BBH merger rate in ...