Fig. 3: Encoding-decoding strategies. | npj Unconventional Computing