These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

94 related articles for article (PubMed ID: 11017688)

  • 1. Cryptographical properties of Ising spin systems.
    Kabashima Y; Murayama T; Saad D
    Phys Rev Lett; 2000 Feb; 84(9):2030-3. PubMed ID: 11017688
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Typical performance of gallager-type error-correcting codes.
    Kabashima Y; Murayama T; Saad D
    Phys Rev Lett; 2000 Feb; 84(6):1355-8. PubMed ID: 11017517
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Statistical physics of regular low-density parity-check error-correcting codes.
    Murayama T; Kabashima Y; Saad D; Vicente R
    Phys Rev E Stat Phys Plasmas Fluids Relat Interdiscip Topics; 2000 Aug; 62(2 Pt A):1577-91. PubMed ID: 11088619
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Finite-connectivity systems as error-correcting codes.
    Vicente R; Saad D; Kabashima Y
    Phys Rev E Stat Phys Plasmas Fluids Relat Interdiscip Topics; 1999 Nov; 60(5 Pt A):5352-66. PubMed ID: 11970404
    [TBL] [Abstract][Full Text] [Related]  

  • 5. High-performance multimedia encryption system based on chaos.
    Hasimoto-Beltrán R
    Chaos; 2008 Jun; 18(2):023110. PubMed ID: 18601477
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Asymmetric cryptosystem based on phase-truncated Fourier transforms.
    Qin W; Peng X
    Opt Lett; 2010 Jan; 35(2):118-20. PubMed ID: 20081940
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Cryptanalysis of an "asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition".
    Wu J; Liu W; Liu Z; Liu S
    Appl Opt; 2015 Oct; 54(30):8921-4. PubMed ID: 26560380
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Numerically exact correlations and sampling in the two-dimensional Ising spin glass.
    Thomas CK; Middleton AA
    Phys Rev E Stat Nonlin Soft Matter Phys; 2013 Apr; 87(4):043303. PubMed ID: 23679544
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Novel public key encryption technique based on multiple chaotic systems.
    Bose R
    Phys Rev Lett; 2005 Aug; 95(9):098702. PubMed ID: 16197262
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Ciphertext-only attack on the JTC-based cryptosystem with sizes and locations of the plaintext and the key code unknown.
    Cai J; Shen X; Wu H; Lin C
    Appl Opt; 2015 May; 54(15):4760-4. PubMed ID: 26192512
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A theoretical application of selectable markers in bacterial episomes for a DNA cryptosystem.
    Morford L
    J Theor Biol; 2011 Mar; 273(1):100-2. PubMed ID: 21195092
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Cryptosystem for plaintext messages utilizing optical properties of gratings.
    Chen YB; Chen JS
    Appl Opt; 2010 Apr; 49(11):2041-6. PubMed ID: 20390002
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Thermodynamics of spin systems on small-world hypergraphs.
    Bollé D; Heylen R; Skantzos NS
    Phys Rev E Stat Nonlin Soft Matter Phys; 2006 Nov; 74(5 Pt 2):056111. PubMed ID: 17279972
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Nonbacktracking operator for the Ising model and its applications in systems with multiple states.
    Zhang P
    Phys Rev E Stat Nonlin Soft Matter Phys; 2015 Apr; 91(4):042120. PubMed ID: 25974451
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A cubic map chaos criterion theorem with applications in generalized synchronization based pseudorandom number generator and image encryption.
    Yang X; Min L; Wang X
    Chaos; 2015 May; 25(5):053104. PubMed ID: 26026316
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Chaos-based secure communications in a large community.
    Wang S; Kuang J; Li J; Luo Y; Lu H; Hu G
    Phys Rev E Stat Nonlin Soft Matter Phys; 2002 Dec; 66(6 Pt 2):065202. PubMed ID: 12513338
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Cryptographic scheme using genetic algorithm and optical responses of periodic structures.
    Chen JS; Chen YB; Hsu PF; Nguyen-Huu N; Lo YL
    Opt Express; 2011 Apr; 19(9):8187-99. PubMed ID: 21643069
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Small-network approximations for geometrically frustrated Ising systems.
    Zhuang B; Lannert C
    Phys Rev E Stat Nonlin Soft Matter Phys; 2012 Mar; 85(3 Pt 1):031107. PubMed ID: 22587038
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Nonequilibrium dynamics of random field Ising spin chains: exact results via real space renormalization group.
    Fisher DS; Le Doussal P; Monthus C
    Phys Rev E Stat Nonlin Soft Matter Phys; 2001 Dec; 64(6 Pt 2):066107. PubMed ID: 11736236
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Optical asymmetric cryptography based on elliptical polarized light linear truncation and a numerical reconstruction technique.
    Lin C; Shen X; Wang Z; Zhao C
    Appl Opt; 2014 Jun; 53(18):3920-8. PubMed ID: 24979424
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 5.