Results 1 to 10 of about 28,128 (285)

Multi-Label Weighted Contrastive Cross-Modal Hashing

open access: yesApplied Sciences, 2023
Due to the low storage cost and high computation efficiency of hashing, cross-modal hashing has been attracting widespread attention in recent years. In this paper, we investigate how supervised cross-modal hashing (CMH) benefits from multi-label and ...
Zeqian Yi   +5 more
doaj   +1 more source

Efficient computation of spaced seed hashing with block indexing

open access: yesBMC Bioinformatics, 2018
Background Spaced-seeds, i.e. patterns in which some fixed positions are allowed to be wild-cards, play a crucial role in several bioinformatics applications involving substrings counting and indexing, by often providing better sensitivity with respect ...
Samuele Girotto   +2 more
doaj   +1 more source

Robust image hashing via visual attention model and ring partition

open access: yesMathematical Biosciences and Engineering, 2019
Robustness is an important property of image hashing. Most of the existing hashing algorithms do not reach good robustness against large-angle rotation.
Zhenjun Tang   +5 more
doaj   +1 more source

Secure User Privacy in Population Physique Clustering and Prediction Based on Sport Questionnaires

open access: yesIEEE Access, 2020
Population physique is one of the key aspects for measuring and evaluating the healthy degree or living level of the population of a nation. Many population physique evaluation models or tools have been developed in the past decades, among which ...
Chunlan Tian   +3 more
doaj   +1 more source

Cache-Oblivious Hashing [PDF]

open access: yesAlgorithmica, 2010
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Pagh, Rasmus   +3 more
openaire   +4 more sources

Dispersing hash functions

open access: yesRandom Structures & Algorithms, 2000
AbstractWe define a family of functions F from a domain U to a range R to be dispersing if for every set S ⊆ U of a certain size and random h ∈ F, the expected value of ∣S∣ – ∣h[S]∣ is not much larger than the expectation if h had been chosen at random from the set of all functions from U to R.We give near‐optimal upper and lower bounds on the size of ...
openaire   +2 more sources

Enhancement Multiple-hashing Protection Method on Weak Password in Grain Storage Information System

open access: yesLiang you shipin ke-ji
The use of weak passwords is a significant vulnerability in computer information system security, and this issue is also present in the digital applications of grain storage information systems.
YAN Lei   +5 more
doaj   +1 more source

Hashing of Message

open access: yesAdvances in Electrical and Electronic Engineering, 2003
For identification of any message it is not necessary to have available all message, but it is sufficient for its autentication its hashing. Hashing is used at safe put passwords, decode keys, autentication its hashing.
Ladislav Schwartz, Dusan Trstensky
doaj  

DETEKSI KEBERADAAN KALIMAT SAMA SEBAGAI INDIKASI PENJIPLAKAN DENGAN ALGORITMA HASHING BERBASIS N-GRAM

open access: yesJurnal Ilmiah Kursor: Menuju Solusi Teknologi Informasi, 2011
Abundant cases of plagiarism committed by some intellectual people in the Indonesia’s education fields have became such tragedy. Due to the amount of information which is available online are things that make copy-paste without proper citation cause ...
Diana Purwitasari   +2 more
doaj   +2 more sources

ShinyAnonymizer Enhanced Version and Beyond: A Further Exploration of Privacy-Preserving Solutions in Health Data Management

open access: yesApplied Sciences
Healthcare institutions generate massive amounts of valuable patient data in the digital age. Finding the right balance between patient privacy and the demand for data-driven medical enhancements is essential.
Marios Vardalachakis   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy