Results 31 to 40 of about 170,367 (287)

An Unsupervised Multicode Hashing Method for Accurate and Scalable Remote Sensing Image Retrieval [PDF]

open access: yes, 2019
© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new ...
Bruzzone, Lorenzo   +2 more
core   +1 more source

A General Two-Step Approach to Learning-Based Hashing [PDF]

open access: yes, 2013
Most existing approaches to hashing apply a single form of hash function, and an optimization process which is typically deeply coupled to this specific form.
Hengel, Anton van den   +3 more
core   +1 more source

Alternate Optimization Method for 3D Pulmonary Nodules Retrieval Based on Medical Sign

open access: yesTaiyuan Ligong Daxue xuebao, 2022
In order to solve the problems such as the complicated process of manual diagnosis and retrieval, high misdiagnosis rate, large amount of data, sparse Hash codes, a 3D ResNet network based on multi-label semantic supervision was proposed to quantify the ...
Yanan ZHANG   +4 more
doaj   +1 more source

Deep Hash Remote-Sensing Image Retrieval Assisted by Semantic Cues

open access: yesRemote Sensing, 2022
With the significant and rapid growth in the number of remote-sensing images, deep hash methods have become a research topic. The main work of deep hash method is to build a discriminate embedding space through the similarity relation between sample ...
Pingping Liu   +3 more
doaj   +1 more source

Compact Hash Codes for Efficient Visual Descriptors Retrieval in Large Scale Databases [PDF]

open access: yes, 2016
In this paper we present an efficient method for visual descriptors retrieval based on compact hash codes computed using a multiple k-means assignment. The method has been applied to the problem of approximate nearest neighbor (ANN) search of local and ...
Bertini, Marco   +2 more
core   +2 more sources

Semi-supervised hash learning method with consistency-based dimensionality reduction

open access: yesAdvances in Mechanical Engineering, 2019
With the explosive growth of surveillance data, exact match queries become much more difficult for its high dimension and high volume. Owing to its good balance between the retrieval performance and the computational cost, hash learning technique is ...
Fang Lv   +3 more
doaj   +1 more source

Unsupervised image hashing algorithm based on sparse-autoencoder [PDF]

open access: yesJisuanji gongcheng, 2019
The hash method is widely used in large-scale image retrieval due to its fast and low memory characteristics,but it lacks research on data sparsity in the construction of hash functions.To this end,an unsupervised sparse self-encoding image hash ...
DAI Yalan,HE Lang,HUANG Zhangcan
doaj   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Cycle-Consistent Deep Generative Hashing for Cross-Modal Retrieval

open access: yes, 2018
In this paper, we propose a novel deep generative approach to cross-modal retrieval to learn hash functions in the absence of paired training samples through the cycle consistency loss.
Shao, Ling, Wang, Yang, Wu, Lin
core   +1 more source

Trigonometric words ranking model for spam message classification

open access: yesIET Networks, EarlyView., 2022
Abstract The significant increase in the volume of fake (spam) messages has led to an urgent need to develop and implement a robust anti‐spam method. Several of the current anti‐spam systems depend mainly on the word order of the message in determining the spam message, which results in the system's inability to predict the correct type of message when
Suha Mohammed Hadi   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy