Search

Your search keyword '"Permutation"' showing total 5,434 results

Search Constraints

Start Over You searched for: Descriptor "Permutation" Remove constraint Descriptor: "Permutation" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed
5,434 results on '"Permutation"'

Search Results

3. 12⋯t-Permutation Avoiding (0, 1)-Matrices.

4. On the Permutations that Strongly Avoid the Pattern 312 or 231.

5. A Secure and Efficient Multi-Step Multi-Index Image Encryption Scheme Using Hybrid Combination of Substitution, Permutation and Hyperchaotic Structure.

6. A difference-based method for testing no effect in nonparametric regression: A difference-based method for testing..: Z. Li et al.

7. Counting the number of connected components of multi-curves through corresponding permutations.

8. Permutation Test for Image‐on‐Scalar Regression With an Application to Breast Cancer.

9. Does Remdesivir Lower COVID‐19 Mortality? A Subgroup Analysis of Hospitalized Adults Receiving Supplemental Oxygen.

10. Using cluster‐based permutation tests to estimate MEG/EEG onsets: How bad is it?

11. Cuntz algebra automorphisms: Graphs and stability of permutations.

12. Sophie Germain prime p and the permutation of product of first p cycles.

13. LPHD: A low power and high diffusion lightweight block cipher.

14. Windmills of the Minds: A Hopping Algorithm for Fermat’s Two Squares Theorem.

15. Image encryption algorithm based on factorial decomposition.

16. Linear preservers of rc-majorization on matrices.

17. Between Weak and Bruhat: The Middle Order on Permutations.

18. A novel one-dimensional Cosine within Sine chaotic map and novel permutation–diffusion based medical image encryption.

19. Key feature identification of internal kink mode using machine learning.

20. Bounds on the maximum nonlinearity of permutations on the rings Zp and Z2p.

21. Provably secure color image encryption algorithm based on FO 4D-HCS and ACM: Provably secure color image encryption...: S. Ullah et al.

22. Continued fractions for cycle-alternating permutations.

23. Expressing even permutations as commutators.

24. On the Modeling and Prediction of High-Dimensional Functional Time Series.

25. Selective encryption of video frames using the one-time random key algorithm and permutation techniques for secure transmission over the content delivery network.

26. Permutations and Oblong Numbers in the Theravāda-vinaya : A New Intersection of Buddhism and Indian Mathematics.

27. Realization of even permutations of even degree by products of four involutions without fixed points.

28. An Image Encryption Method Based on a High-performance and Efficient Block Cipher.

29. A protrusive ordering of 5 points not witnessed by any finite multiset.

30. On supmodular matrices.

31. Asymptotic Distribution-Free Independence Test for High-Dimension Data.

32. Order-Preserving Mappings Induced by Parabolic Decompositions on Coxeter Groups.

33. Parameterized Complexity of Streaming Diameter and Connectivity Problems.

34. THE PERMUTATIONS WITH n NON-FIXED POINTS AND THE SEQUENCES WITH LENGTH n OF A SET.

39. Assessing agreement between permutation and dropout variable importance methods for regression and random forest models

40. A novel efficient S-box design algorithm based on a new chaotic map and permutation.

41. About the determinant of complete non-ambiguous trees.

42. Evidence of stable preferential affiliative relationships in the domestic pig.

43. Assessing agreement between permutation and dropout variable importance methods for regression and random forest models.

44. A Monte Carlo permutation procedure for testing variance components in generalized linear regression models.

45. Parallel String Permutation using MPI.

46. Multiparty semi-quantum secret sharing protocol based on single photon sequence and permutation.

47. Large file encryption in a Reduced-Round Permutation-Based AES file management system.

48. Connecting primitive roots and permutations.

49. Some theoretical foundations for the design and analysis of randomized experiments

50. Key feature identification of internal kink mode using machine learning

Catalog

Books, media, physical & digital resources