Results 71 to 80 of about 74,857 (256)
APPLICATION OF INTERVAL VALUED INTUITIONISTIC FUZZY SOFT SETS OF ROOT TYPE IN DECISION MAKING [PDF]
In this paper we introduce the concentration and dilation operators on interval valued intuitionistic fuzzy soft sets of root type which is a generalization of fuzzy set, intuitionistic fuzzy set, interval valued intuitionistic fuzzy set and ...
S Anita Shanthi +2 more
doaj
Power analysis attack resilient block cipher implementation based on 1‐of‐4 data encoding
Side‐channel attacks pose an inevitable challenge to the implementation of cryptographic algorithms, and it is important to mitigate them. This work identifies a novel data encoding technique based on 1‐of‐4 codes to resist differential power analysis ...
Shanthi Rekha Shanmugham +1 more
doaj +1 more source
Hamming distance and mobility behavior in generalized rock-paper-scissors models
This work reports on two related investigations of stochastic simulations which are widely used to study biodiversity and other related issues. We first deal with the behavior of the Hamming distance under the increase of the number of species and the ...
Bazeia, D. +3 more
core +1 more source
The intractability of computing the Hamming distance
The Hamming distance of a string \(x\) to a language \(L\) is the minimum Hamming distance of \(x\) to any string in \(L\). The paper presents a number of results on the complexity of computing the Hamming distance. Namely, there exist a language in AC\(^0\) such that both Hamming distance and edit distance to this language are hard to approximate ...
Manthey, Bodo, Reischuk, Rüdiger
openaire +1 more source
This study shows anti‐CEACAM5 CAR T‐cells are ineffective against colorectal cancer (CRC) because of CEACAM5 sequestration at intercellular junctions and the thick tumour cell glycocalyx. Enzymatic treatments of CRC cell monolayer/tissue section with trypsin or hyaluronidase restore CEACAM5 availability, enhance CAR T‐cell activation, increase ...
Debasis Banik +13 more
wiley +1 more source
In this article codes over lattice valued intuitionistic fuzzy set type-3 (LIFS-3) are defined. Binary block codes and linear codes are constructed over LIFS-3. Hamming distance and related properties of these newly established codes are examined.
Asra Riaz +4 more
doaj +1 more source
Combined local search strategy for learning in networks of binary synapses
Learning in networks of binary synapses is known to be an NP-complete problem. A combined stochastic local search strategy in the synaptic weight space is constructed to further improve the learning performance of a single random walker.
Huang, Haiping, Zhou, Haijun
core +2 more sources
In this paper, we present and study the \emph{Hamming distance oracle problem}. In this problem, the task is to preprocess two strings $S$ and $T$ of lengths $n$ and $m$, respectively, to obtain a data-structure that is able to answer queries regarding the Hamming distance between a substring of $S$ and a substring of $T$. For a constant size alphabet
Boneh, Itai +3 more
openaire +2 more sources
CDK4/6 inhibition promotes CD8+ T cell expansion through tumor‐macrophage crosstalk by activating HIF‐1α and enhancing MIF‐CD44/CD74 signaling. This reprograms TAMs to boost MHC‐I antigen presentation, and CDK4/6 inhibitor‐trained M1 TAM supernatant therapy synergizes with low‐dose PD‐1 blockade to restore antitumor immunity.
Lin He +17 more
wiley +1 more source
Let p ≠ 3 be any prime. The structures of all λ-constacyclic codes of length 3ps over the finite commutative chain ring Fpm + uFpm (u2 = 0) are established in the term of their generator polynomials.
Hai Q. Dinh +2 more
doaj +1 more source

