• All Solutions All Solutions Caret
    • Editage

      One platform for all researcher needs

    • Paperpal

      AI-powered academic writing assistant

    • R Discovery

      Your #1 AI companion for literature search

    • Mind the Graph

      AI tool for graphics, illustrations, and artwork

    Unlock unlimited use of all AI tools with the Editage Plus membership.

    Explore Editage Plus
  • Support All Solutions Support
    discovery@researcher.life
Discovery Logo
Paper
Search Paper
Cancel
Ask R Discovery
Explore

Feature

  • menu top paper My Feed
  • library Library
  • translate papers linkAsk R Discovery
  • chat pdf header iconChat PDF
  • audio papers link Audio Papers
  • translate papers link Paper Translation
  • chrome extension Chrome Extension

Content Type

  • preprints Preprints
  • conference papers Conference Papers
  • journal articles Journal Articles

More

  • resources areas Research Areas
  • topics Topics
  • resources Resources
git a planGift a Plan

Hamming Distance Research Articles

  • Share Topic
  • Share on Facebook
  • Share on Twitter
  • Share on Mail
  • Share on SimilarCopy to clipboard
Follow Topic R Discovery
By following a topic, you will receive articles in your feed and get email alerts on round-ups.
Overview
2860 Articles

Published in last 50 years

Related Topics

  • Squared Euclidean Distance
  • Squared Euclidean Distance
  • Levenshtein Distance
  • Levenshtein Distance
  • Edit Distance
  • Edit Distance
  • Euclidean Distance
  • Euclidean Distance

Articles published on Hamming Distance

Authors
Select Authors
Journals
Select Journals
Duration
Select Duration
2850 Search results
Sort by
Recency
Personalized experience: The relationship between customer preference prediction and emotional satisfaction in homestay inn design

The improvement of people's living standards has led to changes in consumer attitudes, which have transformed customers' expectations of the lodging experience from a single functional demand to the pursuit of a personalized and emotional all-round experience. As an emerging form of accommodation, the personalization of its design and service has become a highlight to attract customers. This study adopts a mixed-method research design, combining qualitative interviews and quantitative questionnaires to comprehensively analyze the design preferences and emotional experiences of homestay inn customers. Not only that, this paper also develops a customer preference prediction model based on support vector machines and quantifies the relationship between design elements and emotional satisfaction through statistical analysis methods. The results of the study show that key elements in homestay inn design, including room layout, decorative style, and personalized service, are significantly and positively related to customers' emotional satisfaction. The highest Hamming loss of only 0.11, together with the high percentage of model stability, verifies the accuracy and reliability of the customer preference prediction model. The application of the emotional satisfaction scale reveals specific customer preferences for design elements, providing homestay inn operators with an empirical basis for optimizing design and service.

Read full abstract
  • Journal IconEdelweiss Applied Science and Technology
  • Publication Date IconMay 10, 2025
  • Author Icon Huanhuan Tian
Just Published Icon Just Published
Cite IconCite
Save

HIERARCHICAL CLUSTERING USING REVERSIBLE BINARY CELLULAR AUTOMATA FOR HIGH-DIMENSIONAL DATA

This work proposes a hierarchical clustering algorithm for high-dimensional datasets using the cyclic space of reversible finite cellular automata. In cellular automaton (CA)-based clustering, if two objects belong to the same cycle, they are closely related and considered as part of the same cluster. However, if a high-dimensional dataset is clustered using the cycles of one CA, closely related objects may belong to different cycles. This paper identifies the relationship between objects in two different cycles based on the median of all elements in each cycle so that they can be grouped in the next stage. Further, to minimize the number of intermediate clusters which in turn reduces the computational cost, a rule selection strategy is taken to find the best rules based on information propagation and cycle structure. After encoding the dataset using frequency-based encoding such that the consecutive data elements maintain a minimum Hamming distance in encoded form, our proposed clustering algorithm iterates over three stages to finally cluster the data elements into the desired number of clusters given by user. When verified over standard benchmark datasets with various performance metrics, our algorithm is at par with the existing algorithms with quadratic time complexity.

Read full abstract
  • Journal IconAdvances in Complex Systems
  • Publication Date IconMay 9, 2025
  • Author Icon C J Baby + 1
Just Published Icon Just Published
Cite IconCite
Save

Integration of Grab Methods with Artificial Neural Networks for Enhanced Decision-Making Systems

This study explores the architecture, development, and practical applications of artificial neural networks (ANNs), with advances in Gray Relational Analysis (GRA) techniques. ANNs are computational models designed to model biological neural systems, consisting of layers of interconnected neurons—i.e., input, hidden, and output layers—connected by synaptic weights. Operating through a connectionist approach, these networks effectively mimic the four basic functions of biological neurons: receiving input, integrating information, processing data, and generating output. Traditional ANNs, although powerful, face limitations in embedded systems due to their reliance on high-precision digital information transfer and the resulting resource demands. This has prompted the development of more efficient alternatives, such as spiking neural networks (SNNs), which use event-driven spiking signals to reduce power consumption and memory usage. The field has advanced further by incorporating theoretical models for quantum neural computing and the use of genetic algorithms employing various crossovers and mutation techniques. The versatility of ANNs is evident in a variety of applications. In healthcare, they aid in pattern recognition associated with conditions such as breast cancer and diabetes. For water resource management, ANN models predict relationships between rainfall and water levels. In financial sectors, they analyze complex economic conditions and assess credit risk for small business loans. Industrial applications include modelling complex systems in manufacturing plants, although widespread adoption in this field is limited. Complementing neural network advances, GRA methods have emerged to address multi-criteria decision-making challenges. Notable advances include the GRAS techniques have been developed to correct matrices with negative values, while fuzzy GRA methods now include interval-valued triangular fuzzy numbers and probabilistically uncertain linguistic word sets. Recent advances include innovations such as score values and normalized Hamming distances within single-valued neutrosophic fuzzy stein summary, these computational approaches offer powerful ways to solve complex, multidimensional problems, with recent studies highlighting improved performance and promising prospects for future application.

Read full abstract
  • Journal IconREST Journal on Data Analytics and Artificial Intelligence
  • Publication Date IconMay 5, 2025
Just Published Icon Just Published
Cite IconCite
Save

Integration of Grab Methods with Artificial Neural Networks for Enhanced Decision-Making Systems

This study explores the architecture, development, and practical applications of artificial neural networks (ANNs), with advances in Gray Relational Analysis (GRA) techniques. ANNs are computational models designed to model biological neural systems, consisting of layers of interconnected neurons—i.e., input, hidden, and output layers—connected by synaptic weights. Operating through a connectionist approach, these networks effectively mimic the four basic functions of biological neurons: receiving input, integrating information, processing data, and generating output. Traditional ANNs, although powerful, face limitations in embedded systems due to their reliance on high-precision digital information transfer and the resulting resource demands. This has prompted the development of more efficient alternatives, such as spiking neural networks (SNNs), which use event-driven spiking signals to reduce power consumption and memory usage. The field has advanced further by incorporating theoretical models for quantum neural computing and the use of genetic algorithms employing various crossovers and mutation techniques. The versatility of ANNs is evident in a variety of applications. In healthcare, they aid in pattern recognition associated with conditions such as breast cancer and diabetes. For water resource management, ANN models predict relationships between rainfall and water levels. In financial sectors, they analyze complex economic conditions and assess credit risk for small business loans. Industrial applications include modelling complex systems in manufacturing plants, although widespread adoption in this field is limited. Complementing neural network advances, GRA methods have emerged to address multi-criteria decision-making challenges. Notable advances include the GRAS techniques have been developed to correct matrices with negative values, while fuzzy GRA methods now include interval-valued triangular fuzzy numbers and probabilistically uncertain linguistic word sets. Recent advances include innovations such as score values and normalized Hamming distances within single-valued neutrosophic fuzzy stein summary, these computational approaches offer powerful ways to solve complex, multidimensional problems, with recent studies highlighting improved performance and promising prospects for future application.

Read full abstract
  • Journal IconREST Journal on Data Analytics and Artificial Intelligence
  • Publication Date IconMay 5, 2025
Just Published Icon Just Published
Cite IconCite
Save

Online weighted hashing for cross-modal retrieval

Online weighted hashing for cross-modal retrieval

Read full abstract
  • Journal IconPattern Recognition
  • Publication Date IconMay 1, 2025
  • Author Icon Zining Jiang + 4
Just Published Icon Just Published
Cite IconCite
Save

Constructing Controlled Random Tests with a Small Number of Test Patterns

The article considers the issues of testing computing systems and their components. A class of controlled probabilistic tests with a small number of tests patterns is identified and studied. A method for constructing controlled probabilistic tests with a given Hamming distance is presented, the basis of which is one-dimensional scaling of templates representing tests of small bit depth. It is proposed to use exhaustive and pseudo-exhaustive tests as templates for obtaining controlled probabilistic tests. The properties of the generated tests and approaches to their use as an alternative to probabilistic tests are studied. The efficiency of the method for constructing controlled probabilistic tests is experimentally analyzed and confirmed for the case of testing memory devices for the presence of complex code-sensitive faults.

Read full abstract
  • Journal IconDoklady BGUIR
  • Publication Date IconApr 29, 2025
  • Author Icon V N Yarmolik + 2
Just Published Icon Just Published
Cite IconCite
Save

Nanoseed-based physically unclonable function for on-demand encryption.

A physically unclonable function (PUF) is a promising hardware-based cryptographic primitive to prevent confidential information leakage. However, conventional techniques, such as weak and strong PUFs, have limitations in overcoming the trade-off between security and storage volume. This study introduces nanoseed-based PUFs that overcome the drawbacks of conventional PUFs using optical and electrical randomness originated from nanoseeds and a unique on-demand cryptographic algorithm. Ideally mixed PbS quantum dots and Ag nanocrystals in the same medium are exploited as nanoseeds to simultaneously promote independent optical and electrical randomness. The number of secured keys that can be generated on-demand by combining the optical and electrical features in parallel using shuffling method is almost infinite (>1058741 per square millimeter). The proposed PUF achieves a near-ideal Hamming distance in uniqueness and randomness tests, validating its cryptographic efficacy. Last, storage-free and on-demand PUF with the shuffling method are demonstrated using smartphones, realizing manufacturer-/user-friendly cryptography system.

Read full abstract
  • Journal IconScience advances
  • Publication Date IconApr 25, 2025
  • Author Icon Junhyuk Ahn + 7
Open Access Icon Open AccessJust Published Icon Just Published
Cite IconCite
Save

Correcting a Graph Into a Linegraph Minimizing Hamming Distance Edition Is NP-Complete and FPT by Treewidth

Since Beineke's work in 1968 on linegraphs, attention has focused on the classification of graphs as linegraphs. It is known that every graph $G$ is the linegraph of an hypergraph, and the question is to characterize that root graph. We introduce the $C_{p,q}$ classes, defined as sets of graphs where each vertex can be covered by at most $p$ cliques, and each edge belongs to at most $q$ cliques. These classes provide a comprehensive classification of linegraphs through a unified and parameterized approach. They describe previously known graph classes - such as linegraphs of simple graphs, $p$-uniform hypergraphs and $p$-uniform $1$-linear hypergraphs - while being capable of generalization. We study the complexity of determining the membership and edit distance of a graph to one of these classes. We prove the first Fixed Parameter Tractable algorithm with respect to treewidth to compute the edit distance.

Read full abstract
  • Journal IconJournal of Graph Algorithms and Applications
  • Publication Date IconApr 24, 2025
  • Author Icon Dominique Barth + 2
Just Published Icon Just Published
Cite IconCite
Save

Determining an approach to iris recognition depending on shooting conditions

The object of this study is the development and evaluation of image processing and analysis methods for iris recognition, which can be integrated into human-machine interaction (HMI) systems based on biometric data or other contactless interaction approaches. Enabling high accuracy and reliability of biometric iris recognition systems under variable imaging conditions remains an open scientific challenge. One of the primary difficulties is the impact of changing lighting conditions, head tilt, and partial eye openness on identification results. This study assesses the effect of preprocessing methods (Equalization Histogram, CLAHE) on iris image quality and compares the algorithmic method (Hamming Distance) with neural network models (CNN, DenseNet) based on key metrics, including accuracy, False Match Rate, False Non-Match Rate, and Equal Error Rate. Additionally, the influence of training dataset structure and neural network hyperparameters on classification performance was analyzed. The results demonstrate that the Hamming Distance method (HD = 0.35) achieves 95.5 % accuracy, making it a competitive alternative to neural networks. It was established that combining CLAHE and Equalization Histogram effectively reduces noise and enhances segmentation accuracy. Furthermore, it was determined that the DenseNet-201 neural network achieves an accuracy of 99.93 % when using an optimal dataset split (70 %:15 %:15 %). The study confirms that preprocessing techniques such as normalization and adaptive contrast enhancement significantly reduce recognition errors under varying lighting conditions. The proposed solution holds significant potential for assistive technologies for individuals with visual impairments, the automotive industry, as well as security systems

Read full abstract
  • Journal IconEastern-European Journal of Enterprise Technologies
  • Publication Date IconApr 22, 2025
  • Author Icon Olesia Barkovska + 4
Just Published Icon Just Published
Cite IconCite
Save

ConceptSearch: Towards Efficient Program Search Using LLMs for Abstraction and Reasoning Corpus (ARC)

The Abstraction and Reasoning Corpus (ARC) poses a significant challenge to artificial intelligence, demanding broad generalization and few-shot learning capabilities that remain elusive for current deep learning methods, including large language models (LLMs). While LLMs excel in program synthesis, their direct application to ARC yields limited success. To address this, we introduce ConceptSearch, a novel function-search algorithm that leverages LLMs for program generation and employs a concept-based scoring method to guide the search efficiently. Unlike simplistic pixel-based metrics like Hamming distance, ConceptSearch evaluates programs on their ability to capture the underlying transformation concept reflected in the input-output examples. We explore three scoring functions: Hamming distance, a CNN-based scoring function, and an LLM-based natural language scoring function. Experimental results demonstrate the effectiveness of ConceptSearch, achieving a significant performance improvement over direct prompting with GPT-4. Moreover, our novel concept-based scoring exhibits up to 30\% greater efficiency compared to Hamming distance, measured in terms of the number of iterations required to reach the correct solution. These findings highlight the potential of LLM-driven program search when integrated with concept-based guidance for tackling challenging generalization problems like ARC.

Read full abstract
  • Journal IconProceedings of the AAAI Conference on Artificial Intelligence
  • Publication Date IconApr 11, 2025
  • Author Icon Kartik Singhal + 1
Open Access Icon Open Access
Cite IconCite
Save

HaCore: Efficient Coreset Construction with Locality Sensitive Hashing for Vertical Federated Learning

Vertical federated learning (VFL) trains model when the features of data samples are scattered over multiple clients. To improve efficiency, a promising approach is to find a coreset of the data samples and use it as a smaller training set. However, existing methods produce a large coreset when there are many clients and have long running time. To address these problems, we propose HaCore for efficient coreset construction in VFL setting. HaCore first employs locality sensitive hashing (LSH) to map features to bit signatures locally on the clients, and then merges the local signatures for k-medoids clustering. Data samples that correspond to the medoids are added to the coreset. The core idea is that the distance of original data samples can be approximated by the Hamming distance between their LSH-based bit signatures. To accelerate k-medoids, we utilize an inverted index to search the nearest medoid and a bit-counting method to quickly compute the aggregate distance from many signatures to a medoid. We evaluate HaCore on 5 datasets and compare with state-of-the-art coreset construction methods for VFL. The results show that HaCore accelerates the best-performing baseline by over 45x and matches the accuracy of training with all samples.

Read full abstract
  • Journal IconProceedings of the AAAI Conference on Artificial Intelligence
  • Publication Date IconApr 11, 2025
  • Author Icon Qinbo Zhang + 7
Open Access Icon Open Access
Cite IconCite
Save

ConceptSearch: Towards Efficient Program Search Using LLMs for Abstraction and Reasoning Corpus (ARC) (Student Abstract)

The Abstraction and Reasoning Corpus (ARC) poses a significant challenge to artificial intelligence, demanding broad generalization and few-shot learning capabilities that remain elusive for current deep learning methods, including large language models (LLMs) (Chollet 2019). While LLMs excel in program synthesis, their direct application to ARC yields limited success. To address this, we introduce ConceptSearch, a novel function-search algorithm that leverages LLMs for program generation and employs a concept-based scoring method to guide the search efficiently. Experimental results demonstrate that ConceptSearch outperforms direct GPT-4 prompting, with our novel scoring function boosting efficiency by ~30% compared to the baseline Hamming distance scoring. Code at https://github.com/kksinghal/concept-search

Read full abstract
  • Journal IconProceedings of the AAAI Conference on Artificial Intelligence
  • Publication Date IconApr 11, 2025
  • Author Icon Kartik Singhal + 1
Cite IconCite
Save

Primitive idempotents of a-constacyclic codes over đť”˝q and their minimum Hamming distances

Primitive idempotents of <i>a</i>-constacyclic codes over đť”˝<sub><i>q</i></sub> and their minimum Hamming distances

Read full abstract
  • Journal IconDiscrete Mathematics, Algorithms and Applications
  • Publication Date IconApr 4, 2025
  • Author Icon Supakarn Rakphon + 2
Cite IconCite
Save

Sequence analysis of local indicators of spatio-temporal association for evolutionary pattern discovery

ABSTRACT The Local Indicators of Spatial Association (LISA) is one of the most widely used methods for identifying local patterns of spatial association in geographical elements. However, the dynamic trends of spatial-temporal (S-T) autocorrelation remain poorly understood, yet capturing these patterns is essential for analyzing the evolution of spatial processes. To fill the gap, we propose a novel S-T LISA methodology to automatically discover co-occurrences LISA subsequences over time by incorporating sequence analysis techniques. First, we extend the classical LISA to a dynamic context, and clarify the definition, properties, and classification of S-T LISA sequences. Second, we adopt an enhanced Hamming distance to quantify the similarity of LISA sequences, followed by hierarchical clustering to group similar LISA sequences. Next, an improved FP-Growth algorithm is applied to identify frequent patterns. Finally, we conduct experiments using grid-scale social media check-in records and city-scale carbon emission data to discover significant evolutionary patterns. The results verified the applicability of the proposed method in both human and physical geography. The proposed approach outperforms traditional S-T cube methods in its ability to automatically capture dynamic, complex, and transient S-T association trends as well as irregular outliers. The integration of sequence analysis with LISA statistics presented in this article provides an effective framework for identifying evolutionary patterns of S-T association.

Read full abstract
  • Journal IconGIScience & Remote Sensing
  • Publication Date IconApr 2, 2025
  • Author Icon Jianing Yu + 4
Cite IconCite
Save

An improved key scheduling for advanced encryption standard with expanded round constants and non-linear property of cubic polynomials

The advanced encryption standard (AES) offers strong symmetric key encryption, ensuring data security in cloud computing environments during transmission and storage. However, its key scheduling algorithm is known to have flaws, including vulnerabilities to related-key attacks, inadequate nonlinearity, less complicated key expansion, and possible side-channel attack susceptibilities. This study aims to strengthen the independence among round keys generated by the key expansion process of AES—that is, the value of one round key does not reveal anything about the value of another round key—by improving the key scheduling process. Data sets of random, low, and high-density initial secret keys were used to evaluate the strength of the improved key scheduling algorithm through the National Institute of Standards and Technology (NIST) frequency test, the avalanche effect, and the Hamming distance between two consecutive round keys. A related-key analysis was performed to assess the robustness of the proposed key scheduling algorithm, revealing improved resistance to key-related cryptanalysis.

Read full abstract
  • Journal IconInternational Journal of Electrical and Computer Engineering (IJECE)
  • Publication Date IconApr 1, 2025
  • Author Icon Muthu Meenakshi Ganesan + 1
Cite IconCite
Save

A side-channel attack on a masked hardware implementation of CRYSTALS-Kyber

NIST has recently selected CRYSTALS-Kyber as a new public key encryption and key establishment algorithm to be standardized. This makes it important to evaluate the resistance of CRYSTALS-Kyber implementations to side-channel attacks. Software implementations of CRYSTALS-Kyber have already been thoroughly analysed. The discovered vulnerabilities have helped improve subsequently released versions and promoted stronger countermeasures against side-channel attacks. In this paper, we present the first attack on a protected hardware implementation of CRYSTALS-Kyber. We demonstrate a practical message (shared key) recovery attack on the first-order masked FPGA implementation of Kyber-512 by Kamucheka et al. (2022) using power analysis based on the Hamming distance leakage model. The presented attack exploits a vulnerability located in the masked message decoding function executed during the decryption step of decapsulation. The message recovery is performed using a profiled deep learning-assisted method which extracts the message directly, without explicitly retrieving each share. By repeating the same decapsulation multiple times, it is possible to increase the success rate of full shared key recovery to 99%. We also analyse the feasibility of recovering shared keys during encapsulation and propose a countermeasure against the presented attack that is also applicable to FPGA implementations of other cryptographic algorithms.

Read full abstract
  • Journal IconJournal of Cryptographic Engineering
  • Publication Date IconApr 1, 2025
  • Author Icon Yanning Ji + 1
Cite IconCite
Save

Sparse Code With Minimum Hamming Distances of 4 and 5 for Increasing the Density of STT-MRAM Cells

Sparse Code With Minimum Hamming Distances of 4 and 5 for Increasing the Density of STT-MRAM Cells

Read full abstract
  • Journal IconIEEE Transactions on Magnetics
  • Publication Date IconApr 1, 2025
  • Author Icon Thien An Nguyen + 1
Cite IconCite
Save

The expression of insulin signaling and N-methyl-D-aspartate receptor genes in areas of gray matter atrophy is associated with cognitive function in type 2 diabetes.

Type 2 diabetes (T2DM) is associated with brain abnormalities and cognitive dysfunction, including increased risk for Alzheimer's disease. However, the mechanisms of T2DM-related dementia remain poorly understood. We obtained retrospective data from the Mayo Clinic Study of Aging for 271 individuals with T2DM and 542 demographically matched non-diabetic controls (age 51-89, 62% male). We identified regions of significant gray matter atrophy in the T2DM group and then determined which genes were significantly expressed in these brain regions using imaging transcriptomics. We selected 15 candidate genes involved in insulin signaling, lipid metabolism, amyloid processing, N-methyl-D-aspartate-mediated neurotransmission, and calcium signaling. The T2DM group demonstrated significant gray matter atrophy in regions of the default mode, frontal-parietal, and sensorimotor networks (p < 0.05 cluster threshold corrected for false discovery rate, FDR). IRS1, AKT1, PPARG, PRKAG2 , and GRIN2B genes were significantly expressed in these same regions (R 2 > 0.10, p < 0.03, FDR corrected). Bayesian network analysis indicated significant directional paths among all 5 genes as well as the Clinical Dementia Rating score. Directional paths among genes were significantly altered in the T2DM group (Structural Hamming Distance = 12, p = 0.004), with PPARG expression becoming more important in the context of T2DM-related pathophysiology. Alterations of brain transcriptome patterns occurred in the absence of significant cognitive deficit or amyloid accumulation, potentially representing an early biomarker of T2DM-related dementia.

Read full abstract
  • Journal IconmedRxiv : the preprint server for health sciences
  • Publication Date IconApr 1, 2025
  • Author Icon Shelli R Kesler + 4
Open Access Icon Open Access
Cite IconCite
Save

Non-experimental rapid identification of lower respiratory tract infections in patients with chronic obstructive pulmonary disease using multi-label learning.

Non-experimental rapid identification of lower respiratory tract infections in patients with chronic obstructive pulmonary disease using multi-label learning.

Read full abstract
  • Journal IconComputer methods and programs in biomedicine
  • Publication Date IconApr 1, 2025
  • Author Icon Hangzhi He + 7
Open Access Icon Open Access
Cite IconCite
Save

Implementation of Chaotic Rossler system in Cryptography

Security is the major important factor in data communication and networking. Cellular Networks are more vulnerable to security attacks and hence considerable security requirement is required. Hence, to meet up the security requirements in this proposed paper Rossler equation based new cryptographic technique is presented. This paper mainly focuses on encrypting the data transferred between mobile and base stations to ensure high secure environment for transmission of data across cellular networks. In the proposed method, Rossler equations are utilized to produce some numbers and S boxes are generated using random numbers, are required for the encryption of the data. Data is encrypted using KASUMI block cipher, which is the extended version of the MISTY1cipher. The obtained random numbers from Rossler equations are tested on NIST test suite to verify the randomness. Then security of the encrypted data is tested on security parameters like Hamming Distance, Balanced Output and Avalanche effect. The proposed system gives the improved avalanche effect with best randomness result.

Read full abstract
  • Journal IconInternational Journal of Management, Technology, and Social Sciences
  • Publication Date IconMar 26, 2025
  • Author Icon Mahesh Tubaki + 1
Cite IconCite
Save

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • .
  • .
  • .
  • 10
  • 1
  • 2
  • 3
  • 4
  • 5

Popular topics

  • Latest Artificial Intelligence papers
  • Latest Nursing papers
  • Latest Psychology Research papers
  • Latest Sociology Research papers
  • Latest Business Research papers
  • Latest Marketing Research papers
  • Latest Social Research papers
  • Latest Education Research papers
  • Latest Accounting Research papers
  • Latest Mental Health papers
  • Latest Economics papers
  • Latest Education Research papers
  • Latest Climate Change Research papers
  • Latest Mathematics Research papers

Most cited papers

  • Most cited Artificial Intelligence papers
  • Most cited Nursing papers
  • Most cited Psychology Research papers
  • Most cited Sociology Research papers
  • Most cited Business Research papers
  • Most cited Marketing Research papers
  • Most cited Social Research papers
  • Most cited Education Research papers
  • Most cited Accounting Research papers
  • Most cited Mental Health papers
  • Most cited Economics papers
  • Most cited Education Research papers
  • Most cited Climate Change Research papers
  • Most cited Mathematics Research papers

Latest papers from journals

  • Scientific Reports latest papers
  • PLOS ONE latest papers
  • Journal of Clinical Oncology latest papers
  • Nature Communications latest papers
  • BMC Geriatrics latest papers
  • Science of The Total Environment latest papers
  • Medical Physics latest papers
  • Cureus latest papers
  • Cancer Research latest papers
  • Chemosphere latest papers
  • International Journal of Advanced Research in Science latest papers
  • Communication and Technology latest papers

Latest papers from institutions

  • Latest research from French National Centre for Scientific Research
  • Latest research from Chinese Academy of Sciences
  • Latest research from Harvard University
  • Latest research from University of Toronto
  • Latest research from University of Michigan
  • Latest research from University College London
  • Latest research from Stanford University
  • Latest research from The University of Tokyo
  • Latest research from Johns Hopkins University
  • Latest research from University of Washington
  • Latest research from University of Oxford
  • Latest research from University of Cambridge

Popular Collections

  • Research on Reduced Inequalities
  • Research on No Poverty
  • Research on Gender Equality
  • Research on Peace Justice & Strong Institutions
  • Research on Affordable & Clean Energy
  • Research on Quality Education
  • Research on Clean Water & Sanitation
  • Research on COVID-19
  • Research on Monkeypox
  • Research on Medical Specialties
  • Research on Climate Justice
Discovery logo
FacebookTwitterLinkedinInstagram

Download the FREE App

  • Play store Link
  • App store Link
  • Scan QR code to download FREE App

    Scan to download FREE App

  • Google PlayApp Store
FacebookTwitterTwitterInstagram
  • Universities & Institutions
  • Publishers
  • R Discovery PrimeNew
  • Ask R Discovery
  • Blog
  • Accessibility
  • Topics
  • Journals
  • Open Access Papers
  • Year-wise Publications
  • Recently published papers
  • Pre prints
  • Questions
  • FAQs
  • Contact us
Lead the way for us

Your insights are needed to transform us into a better research content provider for researchers.

Share your feedback here.

FacebookTwitterLinkedinInstagram
Cactus Communications logo

Copyright 2025 Cactus Communications. All rights reserved.

Privacy PolicyCookies PolicyTerms of UseCareers