Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Hashed methods

J. H. Hash, "Methods in Enzymology. XIIII, Antibiotics," Academic Press, New York, N.Y. (1975). [Pg.117]

Look in a print or electronic media source and find an example of a correspondence between two sets. The hashing method does not need to be made explicit. Simply iind an example where each item in one set corresponds to an item in another set. Write a few sentences that describe the correspondence you found. [Pg.73]

In addition to the necessity of defining similarity, one other major choice must be made in developing library searching approaches. This involves the use of sequential search, the use of inverted (sorted) files, employing hashing methods, or the use of hierarchical trees. Each of these methods has its advantages and is suitable in some circumstances. [Pg.186]

Hash coding is an established method in computer science, e.g., in registration procedures [94, 95. In chemoinformatics the structure input occurs as a sequence of characters (names) or numbers (which may also be obtained, e.g., from a connection table (see Section 2.4) by conversion of a structure drawing). Both names and numbers may be quite large and may not be usable as an address... [Pg.72]

This is recommended to anyone who wants to smuggle or otherwise conceal grass or hash. One hundred kilos of grass will convert to about two or three kilos of resin, which can later be redissolved and absorbed on alfalfa, etc. See Lloydia 33,453(1970) for a method of large scale extraction. [Pg.25]

Bit vectors of this size are not handled directly because many of the components are zero, and methods such as hashing (39) are used to reduce the size of the stored information. [Pg.11]

Hash and fire points by Cleveland open cup method 6 F80-F82... [Pg.628]

DEMINERALIZATION. Removal from water of mineral contaminants, usually present in ionized form. The methods used include ion-exchange techniques, Hash distillation, or electrodialysis. Acid mine wastes may be purified in this way, thus alleviating the pollution problem. [Pg.473]

O 22.19%. Several isomers are known. A liq mixt of isomeric butylene oxides has the props bp 62-5°, Hash p 5°F, pour p -150°, d 0.826 at 25°, vap d 2.49 highly toxic liq dangerous when exposed to heat or flame expl range 1.5 to 18.3%(Ref 2). Other props methods of prepn are given in the Refs. The 1,4-isomer (tetrahydrofuran or tetramethylene oxide) is described in detail in the Refs. Butylene oxides are used as solvs as org intermediates Refs l)Beil 17, 10, (5) [l5l 2)Sax(l957), 405 1166 3)CondChemDict(196l), 186 1122... [Pg.382]

In case the attacker has access to agent s code and data as well as to all environmental information the agent is able to gather, the attacker may try to analyze what the agent searches for and forge this information. One of the methods to prevent such analysis is the use of hash functions [2] in a way that the agent does not reveal the required environmental information, i.e., searched information is not embedded in agent s code or carried data. [Pg.333]

Chemists often want to draw these two conformations quickly and two different methods are commonly used, each with its own merits. In the first method, we simply draw the side view of the molecule and use wedged and hashed lines to show bonds not in the plane of the paper (as you saw in Chapter 16). Particular attention must be paid to which of the bonds are in the plane and which go into and out of the plane. [Pg.450]

One approach, belonging to the first group of methods mentioned above, for performing searches using 3D templates is TESS (template search and superimposition) [67]. TESS is based on a geometrical hashing algorithm and allows... [Pg.108]

Figure 7.1 N-gram hashing sequence encoding method. Figure 7.1 N-gram hashing sequence encoding method.

See other pages where Hashed methods is mentioned: [Pg.178]    [Pg.78]    [Pg.81]    [Pg.138]    [Pg.138]    [Pg.470]    [Pg.645]    [Pg.620]    [Pg.368]    [Pg.106]    [Pg.188]    [Pg.178]    [Pg.78]    [Pg.81]    [Pg.138]    [Pg.138]    [Pg.470]    [Pg.645]    [Pg.620]    [Pg.368]    [Pg.106]    [Pg.188]    [Pg.129]    [Pg.191]    [Pg.661]    [Pg.661]    [Pg.694]    [Pg.191]    [Pg.139]    [Pg.133]    [Pg.159]    [Pg.160]    [Pg.139]    [Pg.339]    [Pg.150]    [Pg.83]    [Pg.22]    [Pg.12]    [Pg.412]    [Pg.412]    [Pg.311]    [Pg.313]    [Pg.370]    [Pg.51]    [Pg.60]    [Pg.112]   
See also in sourсe #XX -- [ Pg.620 ]




SEARCH



Hashing

Hashing methods

Hashing methods

© 2024 chempedia.info