Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Euclidean Distance Measurement

Known as: 2-norm Distance, Euclidean Distance 
A generalization of the Pythagorean theorem to more than two coordinates. It is what would be obtained if the distance between two points were… Expand
National Institutes of Health

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
IntroductionK-nearest neighbor (k-NN) classification is conventional non-parametric classifier, which has been used as the… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2014
Highly Cited
2014
Communication between neuronal populations in the human brain is characterized by complex functional interactions across time and… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2014
Highly Cited
2014
This paper proposes new combined methods to classify normal and epileptic seizure EEG signals using wavelet transform (WT), phase… Expand
  • table 1
  • table 2
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2013
2013
Alongside the validation, the concept of applicability domain (AD) is probably one of the most important aspects which determine… Expand
Is this relevant?
2013
2013
We address the problem of efficient execution of a computation pattern, referred to here as the irregular wavefront propagation… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2011
2011
A bstractThe emergence of fractal features in the microscopic structure of space-time is a common theme in many approaches to… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2010
Highly Cited
2010
This paper presents positioning algorithms for WLAN environments based on RSSI-fingerprinting and Euclidean Distance (EDA). The… Expand
  • table I
  • figure 1
  • figure 2
  • figure 3
  • table II
Is this relevant?
2008
2008
In order to conceal malware, malware authors use the packing and encryption techniques. If the malware is packed or encrypted… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Natural disturbances affect spatial and temporal heterogeneity in plant communities, but effects vary depending on type of… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
1993
1993
The form of any object can be viewed as a combination of size and shape. A recently proposed method (euclidean distance matrix… Expand
Is this relevant?