• No results found

binary string

CBSL - A Compressed Binary String Labeling Scheme for Dynamic Update of XML documents

CBSL - A Compressed Binary String Labeling Scheme for Dynamic Update of XML documents

... the binary strings labeling scheme characterized by labeling the root with an empty ...(Improved Binary String Labeling). Each label in this scheme uses binary bit strings, while the scheme ...

16

Object Detection and Recognition: A Survey

Object Detection and Recognition: A Survey

... distinctive binary descriptor, called local difference binary ...a binary string for an image patch using simple intensity and gradient difference tests on pair wise grid cells within the ...

5

Volume 3, Issue 4, April 2014 Page 211

Volume 3, Issue 4, April 2014 Page 211

... The Genetic Algorithm is a probabilistic search algorithm that iteratively transforms a set (population) of mathematical objects (fixed length binary string), each with an asso[r] ...

6

Improving Efficiency of Apriori Algorithm using Cache Database

Improving Efficiency of Apriori Algorithm using Cache Database

... a Binary string for per line(or per transaction) in the database so our Cached Database is a database of binary strings ...the binary string per line is as follows: ...

6

A Novel Graph Based Encryption Technique for Information Security

A Novel Graph Based Encryption Technique for Information Security

... Step 5: Complement value of each position of any one matrix (row matrix or column matrix) except diagonal. Step 6: Now create a binary string from this matrix by applying some rules [r] ...

9

Complex Stochastic Boolean Systems: New Properties of the Intrinsic Order Graph

Complex Stochastic Boolean Systems: New Properties of the Intrinsic Order Graph

... bilities –by using (1)– and ordering them in decreasing or increasing order of their values is only possible in practice for small values of the number n of basic variables. However, for large values of n, to overcome ...

6

Secure Image encryption through key hashing and wavelet transform techniques

Secure Image encryption through key hashing and wavelet transform techniques

... In this paper, a new way of image encryption scheme has been proposed which utilizes the hash value of the secret key. In the proposed encryption process, for creating confusion the image wavelet transform is first ...

6

A Secure and Optimal Method of Steganography Using Bit Combination and Dynamical Rotation over Addresses.

A Secure and Optimal Method of Steganography Using Bit Combination and Dynamical Rotation over Addresses.

... and binary string concatenation by combining bits to optimize time of transmission, using multiple transmitters and receivers addresses, for example email addresses, mail addresses, phone numbers, or ...

16

Calculating Hamming distance with the IBM Q Experience

Calculating Hamming distance with the IBM Q Experience

... a binary string in just one only query to an oracle and we can use it to determinate if two binary strings have the same Hamming weight or the Hamming distance equals to cero more efficiently than a ...

7

Partitioning the Intrinsic Order Graph for Complex Stochastic Boolean Systems

Partitioning the Intrinsic Order Graph for Complex Stochastic Boolean Systems

... Pr { (0 , 1 , 1 , 0) } = (1 − p 1 ) p 2 p 3 (1 − p 4 ) = 0 . 0324 . The behavior of a CSBS is determined by the ordering between the current values of the 2 n associated binary n- tuple probabilities Pr {u}. ...

6

The scaling function at strong coupling from the quantum string Bethe equations

The scaling function at strong coupling from the quantum string Bethe equations

... As a further check, one would like to recover at strong coupling the asymptotic behav- ior of the scaling function, as predicted by the usual semiclassical expansions of spinning string solutions [23, 24, 25]. ...

26

Comparative Study of SA string Matching Algorithm with other Familiar String Matching Algorithm

Comparative Study of SA string Matching Algorithm with other Familiar String Matching Algorithm

... We assume that the text is an array T[1…n] of length n and that the pattern is an array P[1…m] of length m<=n . We further assume that the elements of P and t are drawn from a finite alphabet ∑ . We say that pattern P ...

5

Datashare 3 Course pdf

Datashare 3 Course pdf

... String Length Not Less Than Source String Length EQUAL D of Chars Compared are Equal NOT LESS Dest.. String Length Not Less Than Source String Length..[r] ...

63

CSL 113 Lab10

CSL 113 Lab10

...  Print a new string “Testing: This program is to test several string function” using concatenation of string 1 and strin2.  Find the size of string1 and string2 using string function[r] ...

7

Title: Adapters for Service Version Compatibility

Title: Adapters for Service Version Compatibility

... Input: string accountCode Input: string password Output: List<S1.Transaction> S1.Transaction string AccCode DateTime Date decimal Amount string Description getTransactions.[r] ...

20

Scripting elements calling servlet code directly Scripting elements calling servlet code indirectly (by means of utility (classes) Beans Servlet/JSP combo (MVC) MVC with JSP expression language Custom tags MVC with beans, custom tags, and a framework like

Scripting elements calling servlet code directly Scripting elements calling servlet code indirectly (by means of utility (classes) Beans Servlet/JSP combo (MVC) MVC with JSP expression language Custom tags MVC with beans, custom tags, and a framework like Struts or JSF

... Java-Based Tags: Code Tag with Body public class HeadingTag extends SimpleTagSupport { private String align; private String bgColor; private String border; private String fgColor; privat[r] ...

32

Creating Custom JSP Tag Libraries: The Basics

Creating Custom JSP Tag Libraries: The Basics

... Java-Based Tags: Code Tag with Body public class HeadingTag extends SimpleTagSupport { private String align; private String bgColor; private String border; private String fgColor; privat[r] ...

33

Finding the Most Probable String and the Consensus String: an Algorithmic Study

Finding the Most Probable String and the Consensus String: an Algorithmic Study

... ble string for a distribution generated by a weighted finite automaton or a probabilistic grammar is related to a number of important questions: computing the distance between two distributions or finding the best ...

11

Simulation analysis of the oil pipe between injection production system packers

Simulation analysis of the oil pipe between injection production system packers

... injection-production string withstands packer's seating axial force, internal pressure, external pressure of oil and multi-load conditions, thereby resulting in the bending deformation of oil tube, and then ...

6

Survey Paper on String Transformation using Probabilistic Approach

Survey Paper on String Transformation using Probabilistic Approach

... The string is given as an input to the system generates the k most likely output strings corresponding to the input ...to string transformation, which is both accurate and ...output string and a rule ...

5

Show all 6190 documents...

Related subjects