1 |
Lee, JeeYoung, "A study on research trend analysis and topic class prediction of digital transformation using text mining," International journal of advanced smart convergence, Vol. 8, No. 2, pp. 183-190, 2019.
DOI
|
2 |
Hahm, Sangwoo, and Linlin Chen, "The Role of Professors' Intellectual Stimulation for Intellectual Growth among Chinese Students Who Study in Korea: The Moderating Effect of Growth Need Strength," International Journal of Advanced Culture Technology, Vol. 8, No. 3, pp. 45-53, 2020.
DOI
|
3 |
Welke, Pascal, Tamas Horvath, and Stefan Wrobel, "Min-hashing for probabilistic frequent subtree feature spaces," in International Conference on Discovery Science, Springer, Cham, pp.67-82, Oct, 2016.
|
4 |
Russell, Paul F., and T. Ramachandra Rao, "On habitat and association of species of anopheline larvae in south-eastern Madras," Journal of the Malaria Institute of India, Vol. 3, No. 1, 1940.
|
5 |
Sneath, P. H., and R. R. Sokal, "Numerical taxonomy," Bergey's manual of systematic bacteriology 1, pp. 39-42, 2006.
|
6 |
Choi, Seung-Seok, Sung-Hyuk Cha, and Charles C. Tappert, "A survey of binary similarity and distance measures," Journal of systemics, cybernetics and informatics, Vol. 8, No. 1, pp. 43-48, 2010.
|
7 |
Jung, Soo-Mok, "Image Watermarking Algorithm using Spatial Encryption," The Journal of the Convergence on Culture Technology, Vol. 6, No. 1, pp. 485-488, 2020.
DOI
|
8 |
Koslicki, David, and Hooman Zabeti, "Improving minhash via the containment index with applications to metagenomic analysis," Applied Mathematics and Computation, Vol. 354, pp. 206-215, 2019
DOI
|
9 |
Chum, Ondrej, James Philbin, and Andrew Zisserman, "Near duplicate image detection: Min-hash and TF-IDF weighting," in Bmvc. Vol. 810. pp. 812-815, Sep, 2008.
|
10 |
Lee, David C., Qifa Ke, and Michael Isard, "Partition min-hash for partial duplicate image discovery," in European Conference on Computer Vision, Springer, Berlin, Heidelberg, pp. 648-662, Sep, 2010.
|
11 |
Almutairi, Nawal, Frans Coenen, and Keith Dures, "K-means clustering using homomorphic encryption and an updatable distance matrix: secure third party data clustering with limited data owner interaction," in International Conference on Big Data Analytics and Knowledge Discovery, Springer, Cham, pp. 274-285, Aug, 2017
|
12 |
Seifoddini, Hamid, "A note on the similarity coefficient method and the problem of improper machine assignment in group technology applications," The international journal of production research, Vol. 27, No. 7, pp. 1161-1165, 1989.
DOI
|
13 |
Tsiounis, Yiannis, and Moti Yung, "On the security of ElGamal based encryption," in International Workshop on Public Key Cryptography. Springer, Berlin, Heidelberg, pp. 117-134, Feb, 1998.
|
14 |
Pan, Miao, Jinyuan Sun, and Yuguang Fang, "Purging the back-room dealing: Secure spectrum auction leveraging paillier cryptosystem," IEEE Journal on Selected Areas in Communications, Vol. 29, No. 4, pp. 866-876, 2011.
DOI
|
15 |
Jeong, Yunsong, Joon Sik Kim, and Dong Hoon Lee, "Privacy-Preserving k-means Clustering of Encrypted Data," Journal of the Korea Institute of Information Security & Cryptology, Vol. 28, No. 6, pp. 1401-1414, 2018.
DOI
|
16 |
Syropoulos, Apostolos, "Mathematics of multisets," in Workshop on Membrane Computing, Springer, Berlin, Heidelberg, pp. 347-358, Aug, 2000.
|