Results 11 to 20 of about 28,128 (285)

FSH: fast spaced seed hashing exploiting adjacent hashes [PDF]

open access: yesAlgorithms for Molecular Biology, 2018
Background Patterns with wildcards in specified positions, namely spaced seeds, are increasingly used instead of k-mers in many bioinformatics applications that require indexing, querying and rapid similarity search, as they can provide better ...
Samuele Girotto   +2 more
doaj   +3 more sources

Comprehensive Performance Study of Hashing Functions [PDF]

open access: yesComputer Science Journal of Moldova, 2023
Most literature on hashing functions speaks in terms of hashing functions being either ‘good’ or ‘bad’. In this paper, we demonstrate how a hashing function that gives good results for one key set, performs badly for another.
G. M. Sridevi   +2 more
doaj   +1 more source

Optimizing Non-Differentiable Metrics for Hashing

open access: yesIEEE Access, 2021
Image hashing embeds the image to binary codes which can boost the efficiency of approximately nearest neighbors search. F-measure is a widely-used metric for evaluating the performance of hashing methods.
Yiwen Wei, Dayong Tian, Jiao Shi, Yu Lei
doaj   +1 more source

Online Hashing [PDF]

open access: yesIEEE Transactions on Neural Networks and Learning Systems, 2018
Although hash function learning algorithms have achieved great success in recent years, most existing hash models are off-line, which are not suitable for processing sequential or online data. To address this problem, this work proposes an online hash model to accommodate data coming in stream for online learning.
Long-Kai Huang   +2 more
openaire   +3 more sources

Comparison of hashing methods for supporting consistency in distributed databases

open access: yesAdaptivni Sistemi Avtomatičnogo Upravlinnâ, 2022
The object of research is the methods of ensuring consistency in distributed systems. Distributed systems allow you to use any service regardless of the user's geolocation while maintaining high performance.
В. Нікітін, Є. Крилов
doaj   +1 more source

A Novel Blockchain and Bi-Linear Polynomial-Based QCP-ABE Framework for Privacy and Security over the Complex Cloud Data

open access: yesSensors, 2021
As a result of the limited resources available in IoT local devices, the large scale cloud consumer’s data that are produced by IoT related machines are contracted out to the cloud. Cloud computing is unreliable, using it can compromise user privacy, and
Kranthi Kumar Singamaneni   +4 more
doaj   +1 more source

PalmHashNet: Palmprint Hashing Network for Indexing Large Databases to Boost Identification

open access: yesIEEE Access, 2021
Palmprint identification aims to establish the identity of a given query sample by comparing it with all the templates in the database and locating the most similar one. It becomes computationally expensive as the size of the database grows.
Geetika Arora   +3 more
doaj   +1 more source

A further analysis of Cuckoo Hashing with a Stash and Random Graphs of Excess r [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2010
Analysis of ...
Reinhard Kutzelnigg
doaj   +1 more source

Deep Attention-Guided Hashing

open access: yesIEEE Access, 2019
With the rapid growth of multimedia data (e.g., image, audio, and video) on the Web, the learning-based hashing techniques, such as deep supervised hashing, have proven to be very efficient for large-scale multimedia search.
Zhan Yang   +3 more
doaj   +1 more source

AAU-Net: Attention-Based Asymmetric U-Net for Subject-Sensitive Hashing of Remote Sensing Images

open access: yesRemote Sensing, 2021
The prerequisite for the use of remote sensing images is that their security must be guaranteed. As a special subset of perceptual hashing, subject-sensitive hashing overcomes the shortcomings of the existing perceptual hashing that cannot distinguish ...
Kaimeng Ding   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy