Results 11 to 20 of about 94,016 (314)

hadge: a comprehensive pipeline for donor deconvolution in single-cell studies [PDF]

open access: yesGenome Biology
Single-cell multiplexing techniques (cell hashing and genetic multiplexing) combine multiple samples, optimizing sample processing and reducing costs.
Fabiola Curion   +11 more
doaj   +2 more sources

Comprehensive Performance Study of Hashing Functions [PDF]

open access: yesComputer Science Journal of Moldova, 2023
Most literature on hashing functions speaks in terms of hashing functions being either ‘good’ or ‘bad’. In this paper, we demonstrate how a hashing function that gives good results for one key set, performs badly for another.
G. M. Sridevi   +2 more
doaj   +1 more source

Optimizing Non-Differentiable Metrics for Hashing

open access: yesIEEE Access, 2021
Image hashing embeds the image to binary codes which can boost the efficiency of approximately nearest neighbors search. F-measure is a widely-used metric for evaluating the performance of hashing methods.
Yiwen Wei, Dayong Tian, Jiao Shi, Yu Lei
doaj   +1 more source

AAU-Net: Attention-Based Asymmetric U-Net for Subject-Sensitive Hashing of Remote Sensing Images

open access: yesRemote Sensing, 2021
The prerequisite for the use of remote sensing images is that their security must be guaranteed. As a special subset of perceptual hashing, subject-sensitive hashing overcomes the shortcomings of the existing perceptual hashing that cannot distinguish ...
Kaimeng Ding   +5 more
doaj   +1 more source

Online Hashing [PDF]

open access: yesIEEE Transactions on Neural Networks and Learning Systems, 2018
Although hash function learning algorithms have achieved great success in recent years, most existing hash models are off-line, which are not suitable for processing sequential or online data. To address this problem, this work proposes an online hash model to accommodate data coming in stream for online learning.
Long-Kai Huang   +2 more
openaire   +3 more sources

Comparison of hashing methods for supporting consistency in distributed databases

open access: yesAdaptivni Sistemi Avtomatičnogo Upravlinnâ, 2022
The object of research is the methods of ensuring consistency in distributed systems. Distributed systems allow you to use any service regardless of the user's geolocation while maintaining high performance.
В. Нікітін, Є. Крилов
doaj   +1 more source

Approximate Hashing for Bioinformatics [PDF]

open access: yes2021 Data Compression Conference (DCC), 2021
The paper extends ideas from data compression by deduplication to the Bioinformatic field. The specific problems on which we show our approach to be useful are the clustering of a large set of DNA strings and the search for approximate matches of long substrings, both based on the design of what we call an approximate hashing function.
Arbitman, Guy   +3 more
openaire   +5 more sources

A Novel Blockchain and Bi-Linear Polynomial-Based QCP-ABE Framework for Privacy and Security over the Complex Cloud Data

open access: yesSensors, 2021
As a result of the limited resources available in IoT local devices, the large scale cloud consumer’s data that are produced by IoT related machines are contracted out to the cloud. Cloud computing is unreliable, using it can compromise user privacy, and
Kranthi Kumar Singamaneni   +4 more
doaj   +1 more source

Comparative analysis of antibody- and lipid-based multiplexing methods for single-cell RNA-seq

open access: yesGenome Biology, 2022
Background Multiplexing of samples in single-cell RNA-seq studies allows a significant reduction of the experimental costs, straightforward identification of doublets, increased cell throughput, and reduction of sample-specific batch effects.
Viacheslav Mylka   +15 more
doaj   +1 more source

PalmHashNet: Palmprint Hashing Network for Indexing Large Databases to Boost Identification

open access: yesIEEE Access, 2021
Palmprint identification aims to establish the identity of a given query sample by comparing it with all the templates in the database and locating the most similar one. It becomes computationally expensive as the size of the database grows.
Geetika Arora   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy