Search

Your search keyword '"*HAMMING distance"' showing total 1,262 results

Search Constraints

Start Over You searched for: Descriptor "*HAMMING distance" Remove constraint Descriptor: "*HAMMING distance"
1,262 results on '"*HAMMING distance"'

Search Results

1. Silicon Vacancies Diamond/Silk/PVA Hierarchical Physical Unclonable Functions for Multi‐Level Encryption.

2. Quantum circuits for computing Hamming distance requiring fewer T gates.

3. Developing a novel causal inference algorithm for personalized biomedical causal graph learning using meta machine learning.

4. Hadamard Error-Correcting Codes and Their Application in Digital Watermarking.

5. A novel quantum protocol for secure hamming distance computation.

6. Chaotic behavior in Lotka–Volterra and May–Leonard models of biodiversity.

7. Novel Three-way Decision Models Based on Bayes Decision Theory with Neutrosophic Sets.

8. On Minimizers and Convolutional Filters: Theoretical Connections and Applications to Genome Analysis.

9. On sums of two Fibonacci numbers that are powers of numbers with limited hamming weight.

10. Multilevel Encoding Physically Unclonable Functions Based on The Multispecies Structure in Diamonds.

11. Fast shape recognition via a bi-level restraint reduction of contour coding.

12. Efficient similar waveform search using short binary codes obtained through a deep hashing technique.

13. Investigating Methods for ASPmT-Based Design Space Exploration in Evolutionary Product Design.

14. A method for calculating the difference between two iris codes.

15. On constacyclic codes of length 9ps over pm and their optimal codes.

16. Research on ciphertext speech biohashing authentication based on chaotic system and improved public chain.

17. A Novel Test Pattern Optimization Method Using Recurrent Neural Network.

18. RIGID MATRICES FROM RECTANGULAR PCPs.

19. Nonparametric Cognitive Diagnosis When Attributes Are Polytomous.

20. A group decision framework for core competitiveness evaluation of small and medium-sized foreign trade enterprises under probabilistic linguistic term sets.

21. Joint Representation Learning for Retrieval and Annotation of Genomic Interval Sets.

22. Quasi-Equilibrium States and Phase Transitions in Biological Evolution.

23. Polygon Boolean operations and physical unclonable functions implemented by an Ag-embedded sodium-alginate-based memristor for image encryption/decryption.

24. A novel hashing-inverted index for secure content-based retrieval with massive encrypted speeches.

25. Bayesian network structure learning based on HC-PSO algorithm.

26. Evaluation of digital commercial bank security under uncertainty: A multiphase approach based on intuitionistic fuzzy CRITIC and EDAS framework.

27. An integrated framework for spherical fuzzy MAGDM and applications to english blended teaching quality evaluation.

28. 基于博弈论和云模型的滑坡危险性评价.

29. Design of Quantum Associative Classifier based on Hamming Distance and Grover’s Algorithm.

30. A High-Efficiency FPGA-Based ORB Feature Matching System.

31. Prevention efficacy of the broadly neutralizing antibody VRC01 depends on HIV-1 envelope sequence features.

32. Low complexity smart grid security protocol based on elliptic curve cryptography, biometrics and hamming distance.

33. A review of digital watermarking techniques: Current trends, challenges and opportunities.

34. Measuring criticality in control of complex biological networks.

35. Systematic study on the dependence of the warm-start quantum approximate optimization algorithm on approximate solutions.

36. Reconfigurable Architecture for Image Encryption Using a Three-Layer Artificial Neural Network.

37. Runtime Analysis for Permutation-based Evolutionary Algorithms.

38. CEMIG: prediction of the cis-regulatory motif using the de Bruijn graph from ATAC-seq.

39. Smart algorithmic solutions for audience service quality evaluation for large-scale sports-events through harnessing interval neutrosophic EDAS and CRITIC Technique.

40. Optimized distance measures on hesitant fuzzy numbers: An application.

41. An integrated methodology for enterprise financial management capability evaluation based on EDAS technique and group decision making.

42. A robust image steganography based on a novel technique by using improved DNA and modified chaotic approach.

43. Towards Topological Geospatial Conflation: An Optimized Node-Arc Conflation Model for Road Networks.

44. Secure Genomic String Search with Parallel Homomorphic Encryption.

45. An efficient multimodality framework for locker protection with live image authentication.

46. Unsupervised Classification under Uncertainty: The Distance-Based Algorithm.

47. DNA Code Design Based on the Cosets of Codes over Z 4.

48. A comprehensive MAGDM-based approach using EDAS and CRITIC as an auxiliary tool for quality evaluation of ceramic product modeling design.

49. A novel method for solving "Entrepreneurship and Entrepreneurship" career ability evaluation of local college students with triangular neutrosophic numbers.

50. A novel group decision making model based on Interval neutrosophic sets for product modeling design quality evaluation.

Catalog

Books, media, physical & digital resources