Results 81 to 90 of about 170,367 (287)

Scalable Hash-Based Estimation of Divergence Measures

open access: yes, 2018
We propose a scalable divergence estimation method based on hashing. Consider two continuous random variables $X$ and $Y$ whose densities have bounded support.
Hero III, Alfred O., Noshad, Morteza
core   +1 more source

Automated Profiling of Social Behaviors to Assess the Genetic Basis of Evolution of Aggressive Behaviors in Astyanax mexicanus

open access: yesJournal of Experimental Zoology Part A: Ecological and Integrative Physiology, EarlyView.
ABSTRACT Across the animal kingdom, social behaviors such as aggression are critical for survival and reproductive success. While there is significant variation in social behaviors within and between species, the genetic mechanisms underlying natural variation in social behaviors are poorly understood.
Renee Mapa   +5 more
wiley   +1 more source

JAVASCRIPT SECURITY USING CRYPTOGRAPHIC HASH FUNCTIONS

open access: yesСучасні інформаційні системи, 2019
The subject of this research is the development of methods of protection against attacks on third-party JavaScript and the document object model (DOM).
Irada Rahimova   +3 more
doaj   +1 more source

ParaHox Genes Revisited: From Gut Patterning to Integrated Axial and Neural Organization in Rotifera

open access: yesJournal of Experimental Zoology Part B: Molecular and Developmental Evolution, EarlyView.
In rotifers, ParaHox genes show a dispersed genomic organization, with Xlox absent across gnathiferans. Exclusive neuronal expression of Gsx and Cdx reveals that ancestral ParaHox genes coordinated neural and epithelial development beyond gut patterning, suggesting an integrated role in early bilaterian body plan organization.
Andreas C. Fröbius   +2 more
wiley   +1 more source

Deep Hashing Similarity Learning for Cross-Modal Retrieval

open access: yesIEEE Access
In the realm of cross-modal retrieval research, hash methods have garnered significant attention from scholars due to their high retrieval efficiency and low storage costs. However, these methods often sacrifice a considerable amount of semantic features
Ying Ma   +3 more
doaj   +1 more source

Large-Scale Remote Sensing Image Retrieval Based on Semi-Supervised Adversarial Hashing

open access: yesRemote Sensing, 2019
Remote sensing image retrieval (RSIR), a superior content organization technique, plays an important role in the remote sensing (RS) community. With the number of RS images increases explosively, not only the retrieval precision but also the retrieval ...
Xu Tang   +5 more
doaj   +1 more source

Pseudo Labels and Soft Multi-Part Corresponding Similarity for Unsupervised Deep Hashing

open access: yesIEEE Access, 2020
In recent years, unsupervised deep hashing methods have achieved great success in large-scale image retrieval. However, these approaches still suffer two major problems in real world applications. On the one hand, due to the lack of effective supervision
Huiying Li   +4 more
doaj   +1 more source

Hash Embeddings for Efficient Word Representations

open access: yes, 2017
We present hash embeddings, an efficient method for representing words in a continuous vector form. A hash embedding may be seen as an interpolation between a standard word embedding and a word embedding created using a random hash function (the hashing ...
Hansen, Jonas Meinertz   +2 more
core  

Heat and Cold Waves in Brazil: An ERA5‐Based Analysis of Trends and Seasonality (1980–2024)

open access: yesInternational Journal of Climatology, EarlyView.
This study uses ERA5 reanalysis data to assess changes in extreme heat and cold events across Brazil from 1980 to 2024. Results reveal a sharp increase in heatwave frequency and a general decline in coldwave occurrences, though regional variations are substantial.
Alindomar Lacerda Silva, Scott Sheridan
wiley   +1 more source

Terminal power control method of power line carrier communication network based on adaptive hash function

open access: yesDianxin kexue, 2023
In the control of network terminal power, due to the overall low analysis of network state, the adaptive regulation ability of communication network terminal power is poor.Therefore, the power line carrier communication network terminal power control ...
Hong XUE   +4 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy