Results 11 to 20 of about 170,509 (285)

File Data Synchronization Method Based on Ordered Hash Chain [PDF]

open access: yesJisuanji gongcheng, 2023
This study aims to tackle the problems of low efficiency and local update difficulties in the existing file data synchronization transmission methods.To this end, it proposes a Hash chain construction and file data synchronization method.It takes the ...
ZENG Chang, JIANG Wenbao, GUO Yangnan
doaj   +1 more source

Hash Indexing-Based Image Matching for 3D Reconstruction

open access: yesApplied Sciences, 2023
Image matching is a basic task in three-dimensional reconstruction, which, in recent years, has attracted extensive attention in academic and industrial circles.
Mingwei Cao, Haiyan Jiang, Haifeng Zhao
doaj   +1 more source

Deep Hash Remote Sensing Image Retrieval with Hard Probability Sampling

open access: yesRemote Sensing, 2020
As satellite observation technology improves, the number of remote sensing images significantly and rapidly increases. Therefore, a growing number of studies are focusing on remote sensing image retrieval. However, having a large number of remote sensing
Xue Shan   +4 more
doaj   +1 more source

Digital signatures over HMAC entangled chains

open access: yesEngineering Science and Technology, an International Journal, 2022
In this work we present a new digital signature method based on hash chains and the hash message authentication code (HMAC). Unlike Blockchain technology, our approach establishes that the database of transactions is distributed among users, so each one ...
Luis Adrián Lizama-Pérez
doaj   +1 more source

Integrity verification for digital Holy Quran verses using cryptographic hash function and compression

open access: yesJournal of King Saud University: Computer and Information Sciences, 2020
Data Integrity is one of the primary concepts in information security. The main task of the cryptographic hash function is to assure the integrity of the transmitted data.
Mishal Almazrooie   +5 more
doaj   +1 more source

Non-Relaxation Deep Hashing Method for Fast Image Retrieval

open access: yesIEEE Access, 2023
Deep hashing methods utilize an end-to-end framework to mutually learn feature representations and hash codes, thereby achieving a better retrieval performance.
Xiaofei Li
doaj   +1 more source

MIHash: Online Hashing with Mutual Information [PDF]

open access: yes, 2017
Learning-based hashing methods are widely used for nearest neighbor retrieval, and recently, online hashing methods have demonstrated good performance-complexity trade-offs by learning hash functions from streaming data. In this paper, we first address a
Bargal, Sarah Adel   +3 more
core   +1 more source

A Survey on Deep Hashing Methods

open access: yesACM Transactions on Knowledge Discovery from Data, 2023
Nearest neighbor search aims at obtaining the samples in the database with the smallest distances from them to the queries, which is a basic task in a range of fields, including computer vision and data mining. Hashing is one of the most widely used methods for its computational and storage efficiency.
Xiao Luo   +6 more
openaire   +2 more sources

Cryptographic techniques used to provide integrity of digital content in long-term storage [PDF]

open access: yes, 2011
The main objective of the project was to obtain advanced mathematical methods to guarantee the verification that a required level of data integrity is maintained in long-term storage.
John, Ockendon   +9 more
core   +1 more source

A new hash function and its use in read mapping on genome [PDF]

open access: yesAUT Journal of Mathematics and Computing, 2020
Mapping reads onto genomes is an indispensable step in sequencing data analysis. A widely used method to speed up mapping is to index a genome by a hash table, in which genomic positions of $k$-mers are stored in the table.
Farzaneh Salari   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy