Results 71 to 80 of about 74,857 (256)

APPLICATION OF INTERVAL VALUED INTUITIONISTIC FUZZY SOFT SETS OF ROOT TYPE IN DECISION MAKING [PDF]

open access: yesICTACT Journal on Soft Computing, 2016
In this paper we introduce the concentration and dilation operators on interval valued intuitionistic fuzzy soft sets of root type which is a generalization of fuzzy set, intuitionistic fuzzy set, interval valued intuitionistic fuzzy set and ...
S Anita Shanthi   +2 more
doaj  

Power analysis attack resilient block cipher implementation based on 1‐of‐4 data encoding

open access: yesETRI Journal, 2021
Side‐channel attacks pose an inevitable challenge to the implementation of cryptographic algorithms, and it is important to mitigate them. This work identifies a novel data encoding technique based on 1‐of‐4 codes to resist differential power analysis ...
Shanthi Rekha Shanmugham   +1 more
doaj   +1 more source

Hamming distance and mobility behavior in generalized rock-paper-scissors models

open access: yes, 2017
This work reports on two related investigations of stochastic simulations which are widely used to study biodiversity and other related issues. We first deal with the behavior of the Hamming distance under the increase of the number of species and the ...
Bazeia, D.   +3 more
core   +1 more source

The intractability of computing the Hamming distance

open access: yesTheoretical Computer Science, 2003
The Hamming distance of a string \(x\) to a language \(L\) is the minimum Hamming distance of \(x\) to any string in \(L\). The paper presents a number of results on the complexity of computing the Hamming distance. Namely, there exist a language in AC\(^0\) such that both Hamming distance and edit distance to this language are hard to approximate ...
Manthey, Bodo, Reischuk, Rüdiger
openaire   +1 more source

Enzymatic Remodelling of Tumour Microenvironment Enhances Anti‐CEACAM5 CAR T‐Cell Efficacy Against Colorectal Cancer

open access: yesAdvanced Science, EarlyView.
This study shows anti‐CEACAM5 CAR T‐cells are ineffective against colorectal cancer (CRC) because of CEACAM5 sequestration at intercellular junctions and the thick tumour cell glycocalyx. Enzymatic treatments of CRC cell monolayer/tissue section with trypsin or hyaluronidase restore CEACAM5 availability, enhance CAR T‐cell activation, increase ...
Debasis Banik   +13 more
wiley   +1 more source

Codes over Lattice-Valued Intuitionistic Fuzzy Set Type-3 with Application to the Complex DNA Analysis

open access: yesComplexity, 2022
In this article codes over lattice valued intuitionistic fuzzy set type-3 (LIFS-3) are defined. Binary block codes and linear codes are constructed over LIFS-3. Hamming distance and related properties of these newly established codes are examined.
Asra Riaz   +4 more
doaj   +1 more source

Combined local search strategy for learning in networks of binary synapses

open access: yes, 2011
Learning in networks of binary synapses is known to be an NP-complete problem. A combined stochastic local search strategy in the synaptic weight space is constructed to further improve the learning performance of a single random walker.
Huang, Haiping, Zhou, Haijun
core   +2 more sources

Hamming Distance Oracle

open access: yes
In this paper, we present and study the \emph{Hamming distance oracle problem}. In this problem, the task is to preprocess two strings $S$ and $T$ of lengths $n$ and $m$, respectively, to obtain a data-structure that is able to answer queries regarding the Hamming distance between a substring of $S$ and a substring of $T$. For a constant size alphabet
Boneh, Itai   +3 more
openaire   +2 more sources

CDK4/6 Inhibition Induces CD8+ T Cell Antitumor Immunity via MIF‐Induced Functional Orchestration of Tumor‐Associated Macrophages

open access: yesAdvanced Science, EarlyView.
CDK4/6 inhibition promotes CD8+ T cell expansion through tumor‐macrophage crosstalk by activating HIF‐1α and enhancing MIF‐CD44/CD74 signaling. This reprograms TAMs to boost MHC‐I antigen presentation, and CDK4/6 inhibitor‐trained M1 TAM supernatant therapy synergizes with low‐dose PD‐1 blockade to restore antitumor immunity.
Lin He   +17 more
wiley   +1 more source

Constacyclic Codes of Length 3ps Over Fpm + uFpm and Their Application in Various Distance Distributions

open access: yesIEEE Access, 2020
Let p ≠ 3 be any prime. The structures of all λ-constacyclic codes of length 3ps over the finite commutative chain ring Fpm + uFpm (u2 = 0) are established in the term of their generator polynomials.
Hai Q. Dinh   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy