Results 1 to 10 of about 28,128 (285)
Multi-Label Weighted Contrastive Cross-Modal Hashing
Due to the low storage cost and high computation efficiency of hashing, cross-modal hashing has been attracting widespread attention in recent years. In this paper, we investigate how supervised cross-modal hashing (CMH) benefits from multi-label and ...
Zeqian Yi +5 more
doaj +1 more source
Efficient computation of spaced seed hashing with block indexing
Background Spaced-seeds, i.e. patterns in which some fixed positions are allowed to be wild-cards, play a crucial role in several bioinformatics applications involving substrings counting and indexing, by often providing better sensitivity with respect ...
Samuele Girotto +2 more
doaj +1 more source
Robust image hashing via visual attention model and ring partition
Robustness is an important property of image hashing. Most of the existing hashing algorithms do not reach good robustness against large-angle rotation.
Zhenjun Tang +5 more
doaj +1 more source
Secure User Privacy in Population Physique Clustering and Prediction Based on Sport Questionnaires
Population physique is one of the key aspects for measuring and evaluating the healthy degree or living level of the population of a nation. Many population physique evaluation models or tools have been developed in the past decades, among which ...
Chunlan Tian +3 more
doaj +1 more source
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Pagh, Rasmus +3 more
openaire +4 more sources
AbstractWe define a family of functions F from a domain U to a range R to be dispersing if for every set S ⊆ U of a certain size and random h ∈ F, the expected value of ∣S∣ – ∣h[S]∣ is not much larger than the expectation if h had been chosen at random from the set of all functions from U to R.We give near‐optimal upper and lower bounds on the size of ...
openaire +2 more sources
Enhancement Multiple-hashing Protection Method on Weak Password in Grain Storage Information System
The use of weak passwords is a significant vulnerability in computer information system security, and this issue is also present in the digital applications of grain storage information systems.
YAN Lei +5 more
doaj +1 more source
For identification of any message it is not necessary to have available all message, but it is sufficient for its autentication its hashing. Hashing is used at safe put passwords, decode keys, autentication its hashing.
Ladislav Schwartz, Dusan Trstensky
doaj
Abundant cases of plagiarism committed by some intellectual people in the Indonesia’s education fields have became such tragedy. Due to the amount of information which is available online are things that make copy-paste without proper citation cause ...
Diana Purwitasari +2 more
doaj +2 more sources
Healthcare institutions generate massive amounts of valuable patient data in the digital age. Finding the right balance between patient privacy and the demand for data-driven medical enhancements is essential.
Marios Vardalachakis +2 more
doaj +1 more source

