Results 101 to 110 of about 1,628,666 (344)
A Classification Retrieval Method for Encrypted Speech Based on Deep Neural Network and Deep Hashing
In order to improve the retrieval efficiency and accuracy of the existing encrypted speech retrieval methods, and improve the semantic representation of speech features and classification performance, a classification retrieval method for encrypted ...
Qiuyu Zhang, Xuejiao Zhao, Yingjie Hu
doaj +1 more source
In the modern era of multicore processors, utilizing cores is a tedious job. Synchronization and communication among processors involve high cost. Software transaction memory systems (STMs) addresses this issues and provide better concurrency in which ...
CH Papadimitriou+7 more
core +1 more source
ABSTRACT The Split Delivery Vehicle Routing Problem with Two‐dimensional Loading Constraints (2L‐SDVRP) integrates vehicle routing, split delivery, and two‐dimensional packing constraints. In the 2L‐SDVRP, customers can be served by multiple vehicles, and their demands consist of different two‐dimensional rectangular items that must be packed in the ...
Kamyla Maria Ferreira+4 more
wiley +1 more source
Fast Structural Alignment of Biomolecules Using a Hash Table, N-Grams and String Descriptors
This work presents a generalized approach for the fast structural alignment of thousands of macromolecular structures. The method uses string representations of a macromolecular structure and a hash table that stores n-grams of a certain size for ...
Robert Preissner+6 more
doaj +1 more source
We revisit the problem of building static hash tables on the GPU and design and build three bucketed hash tables that use different probing schemes. Our implementations are lock-free and offer efficient memory access patterns; thus, only the probing scheme is the factor affecting the performance of the hash table's different operations.
Awad, Muhammad A.+4 more
openaire +2 more sources
Fast Locality-Sensitive Hashing Frameworks for Approximate Near Neighbor Search
The Indyk-Motwani Locality-Sensitive Hashing (LSH) framework (STOC 1998) is a general technique for constructing a data structure to answer approximate near neighbor queries by using a distribution $\mathcal{H}$ over locality-sensitive hash functions ...
A Andoni+12 more
core +1 more source
This research introduces the preparation and analysis of a newly heterogeneous catalyst developed silica nanospheres supporting a ferrocene‐containing ionic liquid (SiO2@Benzothiazole‐Cl@Fc) for the A3 coupling reaction. The catalyst facilitates the efficient synthesis of 1,3,5‐trisubstituted pyrazoles from aromatic hydrazides, aldehydes, and aromatic ...
Fadhil Faez Sead+8 more
wiley +1 more source
Datacollection in Event-Driven Wireless Sensor Networks with Mobile Sinks
We present a two-tier distributed hash table-based scheme for data-collection in event-driven wireless sensor networks. The proposed method leverages mobile sinks to significantly extend the lifetime of the sensor network. We propose localized algorithms
Harshavardhan Sabbineni+1 more
doaj +1 more source
Rice is a critical crop for the delivery of calories and essential micronutrients to the human diet. Biofortification of rice with zinc (Zn) and iron (Fe) aims to combat the health issues associated with “hidden hunger”. Arbuscular mycorrhizal (AM) fungi have been explored for their potential to enhance Zn and Fe uptake in rice products.
Thi Diem Nguyen+7 more
wiley +1 more source
Hash in a Flash: Hash Tables for Solid State Devices
In recent years, information retrieval algorithms have taken center stage for extracting important data in ever larger datasets. Advances in hardware technology have lead to the increasingly wide spread use of flash storage devices. Such devices have clear benefits over traditional hard drives in terms of latency of access, bandwidth and random access ...
Clemons, Tyler+4 more
openaire +2 more sources