Results 61 to 70 of about 1,628,666 (344)

Trigonometric words ranking model for spam message classification

open access: yesIET Networks, EarlyView., 2022
Abstract The significant increase in the volume of fake (spam) messages has led to an urgent need to develop and implement a robust anti‐spam method. Several of the current anti‐spam systems depend mainly on the word order of the message in determining the spam message, which results in the system's inability to predict the correct type of message when
Suha Mohammed Hadi   +7 more
wiley   +1 more source

Integrity verification for digital Holy Quran verses using cryptographic hash function and compression

open access: yesJournal of King Saud University: Computer and Information Sciences, 2020
Data Integrity is one of the primary concepts in information security. The main task of the cryptographic hash function is to assure the integrity of the transmitted data.
Mishal Almazrooie   +5 more
doaj  

Towards a Highly Available Model for Processing Service Requests Based on Distributed Hash Tables

open access: yesMathematics, 2022
This work aims to identify techniques leading to a highly available request processing service by using the natural decentralization and the dispersion power of the hash function involved in a Distributed Hash Table (DHT).
Voichiţa Iancu, Nicolae Ţăpuş
doaj   +1 more source

On the insertion time of random walk cuckoo hashing

open access: yes, 2017
Cuckoo Hashing is a hashing scheme invented by Pagh and Rodler. It uses $d\geq 2$ distinct hash functions to insert items into the hash table. It has been an open question for some time as to the expected time for Random Walk Insertion to add items.
Frieze, Alan, Johansson, Tony
core   +1 more source

Blockchain‐Empowered H‐CPS Architecture for Smart Agriculture

open access: yesAdvanced Science, EarlyView.
This article reviews the current system architectures for smart agriculture and proposes a blockchain‐empowered hierarchical cyber‐physical system (H‐CPS) framework. It discusses the challenges and outlines future research directions, including the use of semantic blockchain to handle complex data and models.
Xiaoding Wang   +8 more
wiley   +1 more source

Hyperledger Fabric for the (digitalized) lifecycle of construction products: Applied review on fastening technology

open access: yesCivil Engineering Design, Volume 7, Issue 1, Page 9-22, March 2025.
Abstract Blockchain technology is a digital decentralized data ledger recording transactions in an encrypted format. Its implementation can potentially hold significant advantages for the built environment, particularly in manufacturing and building product usage aligned with Building Information Modeling (BIM). This paradigm shift toward decentralized
Aileen Pfeil   +2 more
wiley   +1 more source

Coverless VoIP Steganography Using Hash and Hash

open access: yesCybernetics and Information Technologies, 2020
Performing secure and robust embedding and extracting in real time voice streams without deteriorating the voice quality is a great challenge. This paper aims on hiding the secret data bits in the voice packets without modifying any data in the cover ...
Deepikaa S., Saravanan R.
doaj   +1 more source

Tight Thresholds for Cuckoo Hashing via XORSAT

open access: yes, 2010
We settle the question of tight thresholds for offline cuckoo hashing. The problem can be stated as follows: we have n keys to be hashed into m buckets each capable of holding a single key.
Dietzfelbinger, Martin   +5 more
core   +2 more sources

Fast Exact Search in Hamming Space with Multi-Index Hashing [PDF]

open access: yes, 2014
There is growing interest in representing image data and feature descriptors using compact binary codes for fast near neighbor search. Although binary codes are motivated by their use as direct indices (addresses) into a hash table, codes longer than 32 ...
Fleet, David J.   +2 more
core   +1 more source

Factors Influencing the Binding of HIV‐1 Protease Inhibitors: Insights from Machine Learning Models

open access: yesChemMedChem, EarlyView.
Machine learning unlocks the secrets of HIV‐1 protease inhibition, paving the way for data‐driven antiviral drug design. This study analyzes crystallographic data from hundreds of protein–ligand complexes, predicting ligand binding affinity with over 85% accuracy.
Yaffa Shalit, Inbal Tuvi‐Arad
wiley   +1 more source

Home - About - Disclaimer - Privacy