Results 71 to 80 of about 170,509 (285)

Deep Semantic Ranking Based Hashing for Multi-Label Image Retrieval

open access: yes, 2015
With the rapid growth of web images, hashing has received increasing interests in large scale image retrieval. Research efforts have been devoted to learning compact binary codes that preserve semantic similarity based on labels.
Huang, Yongzhen   +3 more
core   +1 more source

Accelerating Primary Screening of USP8 Inhibitors from Drug Repurposing Databases with Tree‐Based Machine Learning

open access: yesAdvanced Intelligent Discovery, EarlyView.
This study introduces a tree‐based machine learning approach to accelerate USP8 inhibitor discovery. The best‐performing model identified 100 high‐confidence repurposable compounds, half already approved or in clinical trials, and uncovered novel scaffolds not previously studied. These findings offer a solid foundation for rapid experimental follow‐up,
Yik Kwong Ng   +4 more
wiley   +1 more source

Scalable Hash-Based Estimation of Divergence Measures

open access: yes, 2018
We propose a scalable divergence estimation method based on hashing. Consider two continuous random variables $X$ and $Y$ whose densities have bounded support.
Hero III, Alfred O., Noshad, Morteza
core   +1 more source

Securing Generative Artificial Intelligence with Parallel Magnetic Tunnel Junction True Randomness

open access: yesAdvanced Intelligent Systems, EarlyView.
True random numbers can protect generative artificial intelligence (GAI) models from attacks. A highly parallel, spin‐transfer torque magnetic tunnel junction‐based system is demonstrated that generates high‐quality, energy‐efficient random numbers.
Youwei Bao, Shuhan Yang, Hyunsoo Yang
wiley   +1 more source

Secure Parallel Image Cryptographic Hash Function Using a Novel 2D High-Randomness Hyperchaotic Map

open access: yesMathematics
For image data, the processing of each pixel using a cryptographic hash function is linear, and the existing cryptographic hash function lacks parallel processing of image width and height.
Mingrui Qi, Dongdong Wang
doaj   +1 more source

An Improved Hashing Approach for Biological Sequence to Solve Exact Pattern Matching Problems

open access: yesApplied Computational Intelligence and Soft Computing, 2023
Pattern matching algorithms have gained a lot of importance in computer science, primarily because they are used in various domains such as computational biology, video retrieval, intrusion detection systems, and fraud detection.
Prince Mahmud   +2 more
doaj   +1 more source

FSL-BM: Fuzzy Supervised Learning with Binary Meta-Feature for Classification

open access: yes, 2017
This paper introduces a novel real-time Fuzzy Supervised Learning with Binary Meta-Feature (FSL-BM) for big data classification task. The study of real-time algorithms addresses several major concerns, which are namely: accuracy, memory consumption, and ...
CP Chen   +15 more
core   +1 more source

Voxel‐SLAM: A Complete, Accurate, and Versatile Light Detection and Ranging‐Inertial Simultaneous Localization and Mapping System

open access: yesAdvanced Intelligent Systems, EarlyView.
: In this work, Voxel‐SLAM (simultaneous localization and mapping) is introduced: a complete, accurate, and versatile LiDAR (light detection and ranging) ‐inertial SLAM system consisting of five modules: initialization, odometry, local mapping (LM), loop closure (LC), and global mapping (GM), all employing the same map representation, an adaptive voxel
Zheng Liu   +9 more
wiley   +1 more source

Performance Investigation of Eco‐Friendly Refrigerant Mixtures as an Alternative to R134a in Vapour‐Compression Refrigeration System

open access: yesAsia-Pacific Journal of Chemical Engineering, EarlyView.
ABSTRACT The growing impacts of climate change and energy scarcity demand environmentally sustainable refrigeration solutions. This study investigates eco‐friendly refrigerants (R152a, R290 and R600a) and their optimized ternary mixture as alternatives to R134a. Four blend compositions were analysed using experimental testing and REFPROP 10.0 modelling
M. Periyasamy, P. Senthilkumar
wiley   +1 more source

Can There Be a Two Way Hash Function?

open access: yesIEEE Access
It is computationally impossible for one-way hash functions to obtain the original data again. In this study, Two Way Hash Function (TWHF) is proposed which provides the security properties of one-way hash functions. TWHF aims to hash/encrypt and decrypt
Timucin Koroglu, Refik Samet
doaj   +1 more source

Home - About - Disclaimer - Privacy