Search

Your search keyword '"*HAMMING distance"' showing total 358 results

Search Constraints

Start Over You searched for: Descriptor "*HAMMING distance" Remove constraint Descriptor: "*HAMMING distance" Publication Year Range Last 3 years Remove constraint Publication Year Range: Last 3 years
358 results on '"*HAMMING distance"'

Search Results

1. On constacyclic codes of length 9ps over pm and their optimal codes.

2. Silicon Vacancies Diamond/Silk/PVA Hierarchical Physical Unclonable Functions for Multi‐Level Encryption.

3. An improved binary snake optimizer with Gaussian mutation transfer function and hamming distance for feature selection.

4. Quantum circuits for computing Hamming distance requiring fewer T gates.

5. Developing a novel causal inference algorithm for personalized biomedical causal graph learning using meta machine learning.

6. Hadamard Error-Correcting Codes and Their Application in Digital Watermarking.

7. Novel Three-way Decision Models Based on Bayes Decision Theory with Neutrosophic Sets.

8. A novel quantum protocol for secure hamming distance computation.

9. On sums of two Fibonacci numbers that are powers of numbers with limited hamming weight.

10. On Minimizers and Convolutional Filters: Theoretical Connections and Applications to Genome Analysis.

11. Chaotic behavior in Lotka–Volterra and May–Leonard models of biodiversity.

12. A method for calculating the difference between two iris codes.

13. Multilevel Encoding Physically Unclonable Functions Based on The Multispecies Structure in Diamonds.

14. Investigating Methods for ASPmT-Based Design Space Exploration in Evolutionary Product Design.

15. Fast shape recognition via a bi-level restraint reduction of contour coding.

16. Efficient similar waveform search using short binary codes obtained through a deep hashing technique.

17. Research on ciphertext speech biohashing authentication based on chaotic system and improved public chain.

18. A Novel Test Pattern Optimization Method Using Recurrent Neural Network.

19. Quasi-Equilibrium States and Phase Transitions in Biological Evolution.

20. Nonparametric Cognitive Diagnosis When Attributes Are Polytomous.

21. A group decision framework for core competitiveness evaluation of small and medium-sized foreign trade enterprises under probabilistic linguistic term sets.

22. Joint Representation Learning for Retrieval and Annotation of Genomic Interval Sets.

23. RIGID MATRICES FROM RECTANGULAR PCPs.

24. Polygon Boolean operations and physical unclonable functions implemented by an Ag-embedded sodium-alginate-based memristor for image encryption/decryption.

25. 基于博弈论和云模型的滑坡危险性评价.

26. Bayesian network structure learning based on HC-PSO algorithm.

27. Evaluation of digital commercial bank security under uncertainty: A multiphase approach based on intuitionistic fuzzy CRITIC and EDAS framework.

28. An integrated framework for spherical fuzzy MAGDM and applications to english blended teaching quality evaluation.

29. A novel hashing-inverted index for secure content-based retrieval with massive encrypted speeches.

30. Design of Quantum Associative Classifier based on Hamming Distance and Grover’s Algorithm.

31. An efficient multimodality framework for locker protection with live image authentication.

32. A High-Efficiency FPGA-Based ORB Feature Matching System.

33. Prevention efficacy of the broadly neutralizing antibody VRC01 depends on HIV-1 envelope sequence features.

34. Low complexity smart grid security protocol based on elliptic curve cryptography, biometrics and hamming distance.

35. Measuring criticality in control of complex biological networks.

36. A review of digital watermarking techniques: Current trends, challenges and opportunities.

37. Systematic study on the dependence of the warm-start quantum approximate optimization algorithm on approximate solutions.

38. Reconfigurable Architecture for Image Encryption Using a Three-Layer Artificial Neural Network.

39. Smart algorithmic solutions for audience service quality evaluation for large-scale sports-events through harnessing interval neutrosophic EDAS and CRITIC Technique.

40. Optimized distance measures on hesitant fuzzy numbers: An application.

41. An integrated methodology for enterprise financial management capability evaluation based on EDAS technique and group decision making.

42. CEMIG: prediction of the cis-regulatory motif using the de Bruijn graph from ATAC-seq.

43. A robust image steganography based on a novel technique by using improved DNA and modified chaotic approach.

44. Secure Genomic String Search with Parallel Homomorphic Encryption.

45. Runtime Analysis for Permutation-based Evolutionary Algorithms.

46. Towards Topological Geospatial Conflation: An Optimized Node-Arc Conflation Model for Road Networks.

47. Antichain codes.

48. A comprehensive MAGDM-based approach using EDAS and CRITIC as an auxiliary tool for quality evaluation of ceramic product modeling design.

49. A novel method for solving "Entrepreneurship and Entrepreneurship" career ability evaluation of local college students with triangular neutrosophic numbers.

50. A novel group decision making model based on Interval neutrosophic sets for product modeling design quality evaluation.

Catalog

Books, media, physical & digital resources