Results 71 to 80 of about 74,220 (257)
Hamming Distance Encoding Multihop Relation Knowledge Graph Completion
Knowledge graphs (KGs) play an important role in many real-world applications like information retrieval, question answering, relation extraction, etc. To reveal implicit knowledge from a knowledge graph (KG), viz.
Panfeng Chen +4 more
doaj +1 more source
Hamming distance and mobility behavior in generalized rock-paper-scissors models
This work reports on two related investigations of stochastic simulations which are widely used to study biodiversity and other related issues. We first deal with the behavior of the Hamming distance under the increase of the number of species and the ...
Bazeia, D. +3 more
core +1 more source
The intractability of computing the Hamming distance
The Hamming distance of a string \(x\) to a language \(L\) is the minimum Hamming distance of \(x\) to any string in \(L\). The paper presents a number of results on the complexity of computing the Hamming distance. Namely, there exist a language in AC\(^0\) such that both Hamming distance and edit distance to this language are hard to approximate ...
Manthey, Bodo, Reischuk, Rüdiger
openaire +1 more source
Endocytic Control of Cell‐Autonomous and Non‐Cell‐Autonomous Functions of p53
NUMB Ex3‐containing isoforms localize to the plasma membrane, where they recruit p53 through SNX9 and direct it to multivesicular bodies and exosomes. Exported p53 is taken up by neighboring cells and activates nuclear programs, revealing an intercellular, exosome‐based pathway that might help establish a tumor‐suppressive microenvironment.
Roberta Cacciatore +20 more
wiley +1 more source
APPLICATION OF INTERVAL VALUED INTUITIONISTIC FUZZY SOFT SETS OF ROOT TYPE IN DECISION MAKING [PDF]
In this paper we introduce the concentration and dilation operators on interval valued intuitionistic fuzzy soft sets of root type which is a generalization of fuzzy set, intuitionistic fuzzy set, interval valued intuitionistic fuzzy set and ...
S Anita Shanthi +2 more
doaj
Power analysis attack resilient block cipher implementation based on 1‐of‐4 data encoding
Side‐channel attacks pose an inevitable challenge to the implementation of cryptographic algorithms, and it is important to mitigate them. This work identifies a novel data encoding technique based on 1‐of‐4 codes to resist differential power analysis ...
Shanthi Rekha Shanmugham +1 more
doaj +1 more source
Aplikasi Pengenalan Karakter Alfanumerik Menggunakan Algoritma Hamming Distance [PDF]
Karakter Alfanumerik merupakan perpaduan antara karakter huruf dan angka, karakter alfanumerik ini pun sudah dikenal dan diketahui oleh semua orang. Tetapi masalah yang dihadapi dalam kondisi ini adalah bagaimana melakukan pengenalan karakter alfanumerik
Manurung, M. (Monica) +2 more
core
In this paper, we present and study the \emph{Hamming distance oracle problem}. In this problem, the task is to preprocess two strings $S$ and $T$ of lengths $n$ and $m$, respectively, to obtain a data-structure that is able to answer queries regarding the Hamming distance between a substring of $S$ and a substring of $T$. For a constant size alphabet
Boneh, Itai +3 more
openaire +2 more sources
General schematic of the approach. Abstract Conventional Silver/Silver Chloride (Ag/AgCl) electrodes remain the clinical standard for electrophysiological monitoring but are hindered by poor skin conformity, mechanical rigidity, and signal degradation, particularly under motion or sweat.
Nazmi Alsaafeen +11 more
wiley +1 more source
Skew and linearized Reed-Solomon codes and maximum sum rank distance codes over any division ring
Reed-Solomon codes and Gabidulin codes have maximum Hamming distance and maximum rank distance, respectively. A general construction using skew polynomials, called skew Reed-Solomon codes, has already been introduced in the literature.
Martínez-Peñas, Umberto
core +1 more source

