Search

Your search keyword '"Hamming distance"' showing total 8,786 results

Search Constraints

Start Over You searched for: Descriptor "Hamming distance" Remove constraint Descriptor: "Hamming distance"
8,786 results on '"Hamming distance"'

Search Results

1. Proximity Gaps for Reed--Solomon Codes.

2. Discrete orca predation algorithm for the traveling salesman problem.

3. Quantitative and qualitative similarity measure for data clustering analysis.

4. A fast and efficient large-scale near duplicate image retrieval system using double perceptual hashing.

5. Hamming distances of unsaturated orthogonal arrays.

6. A New Distance Measurement Method for Perceptual Image Hashing.

7. Information Measures on Linear Diophantine Fuzzy Soft Sets with Their Applications to the Medical Diagnosis.

8. Some self-dual codes and isodual codes constructed by matrix product codes.

9. When does the mean network capture the topology of a sample of networks?

10. Nonbinary code-based graphs and applications.

11. Synergistic Commutative Algorithm for Securing Vector Spatial Data via GD‐PBIBD Fingerprint Encoding and Data Encryption.

12. Machine learning and Bayesian network analyses identifies associations with insomnia in a national sample of 31,285 treatment-seeking college students.

13. A review of digital watermarking techniques: Current trends, challenges and opportunities.

14. Multi‐modal video search by examples—A video quality impact analysis.

15. Elastic-Degenerate String Matching with 1 Error or Mismatch.

16. One hundred years of influenza A evolution.

17. Probabilistic Hesitant Fuzzy MEREC-TODIM Decision-Making Based on Improved Distance Measures.

18. 融合多元信息的激光 SLAM 回环检测方法.

19. Glaucoma detection in retinal fundus images using residual network architecture.

20. Two-dimensional cyclic codes over a finite chain ring

21. Modified firefly algorithm with comparative analysis for constraint satisfaction problem variants.

22. Grey Relational Analysis Framework with 2-Tuple Linguistic Neutrosophic Set for Building Material Supplier Selection.

23. Single-Valued Neutrosophic ExpTODIM Technique for Quality Evaluation of MPPT Controller Design for Photovoltaic Systems.

24. Evaluating University Crisis Management: A Neutrosophic LogTODIM Framework for Public Opinion.

25. A new approach for production project scheduling with time-cost-quality trade-off considering multi-mode resource-constraints under interval uncertainty.

26. Difference Measure for Controlled Random Tests

27. Development, study, and comparison of models of cross-immunity to the influenza virus using statistical methods and machine learning

28. Constacyclic codes over 𝔽q𝒮𝒯 and their applications

29. Various distance between generalized Diophantine fuzzy sets using multiple criteria decision making and their real life applications

30. A class of error-detecting codes based on T-quasigroups.

31. A Criterion of Properness for a Family of Functions.

32. Some robust inverse median problems on trees with interval costs.

33. Model-Based Clustering of Categorical Data Based on the Hamming Distance.

34. Construction of uniform designs for high-dimensional screening <italic>via</italic> an adjusted multiple quadrupling algorithm.

35. Generating of A Dynamic and Secure S-Box for AES Block Cipher System Based on Modified Hexadecimal Playfair Cipher.

36. Dynamic Programming-Based White Box Adversarial Attack for Deep Neural Networks.

37. Hamming distances of tight orthogonal arrays.

38. A heuristic for the non‐unicost set covering problem using local branching.

39. RETRIEVAL OF TELUGU WORD FROM HAND WRITTEN TEXT USING DENSENET-CNN.

40. Theoretical proof for the number of errors that one linear code detects/corrects when linear quasigroups of order 4 are used for coding.

41. The sequence reconstruction problem for permutations with the Hamming distance.

42. Various distance between generalized Diophantine fuzzy sets using multiple criteria decision making and their real life applications.

43. On b-symbol distance, Hamming distance and RT distance of Type 1 λ-constacyclic codes of length 8ps over 픽pm[u]/〈uk〉.

44. Investigation of Silicon Aging Effects in Dopingless PUF for Reliable Security Solution.

45. Group strategy-proof rules in multidimensional binary domains.

46. Classification of cellular automata based on the Hamming distance.

47. Dynamic Injection and Permutation Coding for Enhanced Data Transmission.

48. Metabolic Network Analysis Reveals Human Impact on Urban Nitrogen Cycles.

49. Multi‐Dimensional Physically Unclonable Functions: Optoelectronic Variation‐Induced Multi‐Key Generation from Small Molecule PN Heterostructures.

50. Benchmarking quantum versions of the kNN algorithm with a metric based on amplitude-encoded features.

Catalog

Books, media, physical & digital resources