Results 21 to 30 of about 566,348 (288)

Novel Duplicate Address Detection with Hash Function. [PDF]

open access: yesPLoS ONE, 2016
Duplicate address detection (DAD) is an important component of the address resolution protocol (ARP) and the neighbor discovery protocol (NDP). DAD determines whether an IP address is in conflict with other nodes.
GuangJia Song, ZhenZhou Ji
doaj   +1 more source

Single- and Cross-Modality Near Duplicate Image Pairs Detection via Spatial Transformer Comparing CNN

open access: yesSensors, 2021
Recently, both single modality and cross modality near-duplicate image detection tasks have received wide attention in the community of pattern recognition and computer vision.
Yi Zhang   +3 more
doaj   +1 more source

Deep constrained siamese hash coding network and load-balanced locality-sensitive hashing for near duplicate image detection [PDF]

open access: yes, 2018
We construct a new efficient near duplicate image detection method using a hierarchical hash code learning neural network and load-balanced Locality Sensitive Hashing (LSH) indexing.
Cai, Z.   +5 more
core   +1 more source

Duplicate Literature Detection for Cross-Library Search

open access: yesCybernetics and Information Technologies, 2016
The proliferation of online digital libraries offers users a great opportunity to search their desired literatures on Web. Cross-library search applications can help users search more literature information from multiple digital libraries.
Liu Wei, Zeng Jianxun
doaj   +1 more source

Straightforward and sensitive RT-qPCR based gene expression analysis of FFPE samples [PDF]

open access: yes, 2016
Fragmented RNA from formalin-fixed paraffin-embedded (FFPE) tissue is a known obstacle to gene expression analysis. In this study, the impact of RNA integrity, gene-specific reverse transcription and targeted cDNA preamplification was quantified in terms
Cuvelier, Claude   +5 more
core   +2 more sources

Entropic Statistical Description of Big Data Quality in Hotel Customer Relationship Management

open access: yesEntropy, 2019
Customer Relationship Management (CRM) is a fundamental tool in the hospitality industry nowadays, which can be seen as a big-data scenario due to the large amount of recordings which are annually handled by managers.
Lydia González-Serrano   +4 more
doaj   +1 more source

WEB-BASED DUPLICATE RECORDS DETECTION WITH ARABIC LANGUAGE ENHANCEMENT [PDF]

open access: yesJournal of Engineering Research - Egypt, 2015
Sharing data between organizations has growing importance in many data mining projects. Data from various heterogeneous sources often has to be linked and aggregated in order to improve data quality.
Azza Higazy   +2 more
doaj   +1 more source

Standardization and application of microsatellite markers for variety identification in tomato and wheat [PDF]

open access: yes, 2001
The present study is part of a EU project that aims to demonstrate the technical viability of STMS markers for variety identification. As examples two important European crop species, tomato and wheat were chosen. Initially, about 30-40 STMS markers were
Bredemeijer, G.   +5 more
core   +2 more sources

Adversarial Domain Adaptation for Duplicate Question Detection

open access: yes, 2018
We address the problem of detecting duplicate questions in forums, which is an important step towards automating the process of answering new questions.
Lei, Tao   +4 more
core   +1 more source

Blind detection for image steganography using short du ate codes statistical model for Hilbert scanning sequences

open access: yesTongxin xuebao, 2013
By analyzing and proving the correlation between the detection capability of a short duplicate code statistical feature and the probability of cumulating short duplicate codes、the dimension of short duplicate codes,a method to improving the detection ...
Shang-ping ZHONG   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy