Results 21 to 30 of about 77,938 (281)
Deep Hashing Based Fusing Index Method for Large-Scale Image Retrieval
Hashing has been widely deployed to perform the Approximate Nearest Neighbor (ANN) search for the large-scale image retrieval to solve the problem of storage and retrieval efficiency.
Lijuan Duan +4 more
doaj +1 more source
Region-DH: Region-based Deep Hashing for Multi-Instance Aware Image Retrieval [PDF]
This paper introduces an instance-aware hashing approach Region-DH for large-scale multi-label image retrieval. The accurate object bounds can significantly increase the hashing performance of instance features.
Mtope, Franck Romuald Fotso, Wei, Bo
core +1 more source
HASHING ALGORITHM BASED ON TWO-DIMENSIONAL CHAOTIC MAPPINGS
A new hashing algorithm based on dynamic chaos is proposed. Owing to the use of chaotic mappings, this algorithm is irreversible and a search for two messages with identical hash-values becomes computationally difficult.
A. V. Sidorenko, I. V. Shakinko
doaj +1 more source
Data privacy regulations like the EU GDPR allow the use of hashing techniques to anonymize data that may contain personal information. However, cryptographic hashing is well-known to destroy any possibility of performing analytics.
Abdelrahman Almahmoud +2 more
doaj +1 more source
Fast Supervised Hashing with Decision Trees for High-Dimensional Data [PDF]
Supervised hashing aims to map the original features to compact binary codes that are able to preserve label based similarity in the Hamming space.
Hengel, Anton van den +4 more
core +3 more sources
Secure Medical Blockchain Model
The Internet of Medical Things (IoMT) uses wireless networks to help patients to communicate with healthcare professionals. Therefore, IoMT devices suffer from a lack of security controls, just like many Internet of Things (IoT) gadgets.
Ibrahim Shawky Farahat +4 more
doaj +1 more source
The overall effectiveness of a website as an e-commerce platform is influenced by how usable it is. This study aimed to find out if advanced web metrics, derived from Google Analytics software, could be used to evaluate the overall usability of e ...
Biresh Kumar +4 more
doaj +1 more source
On the Design of a Blockchain-based Fraud-prevention Performance Appraisal System
The job recruitment process takes a lot of process and number of documents. It is very well known for applicants to exaggerated and falsify their work history data. It may put a company at legal risk and significant commercial losses.
Bryan Andi Gerrardo +2 more
doaj +1 more source
Image hashing-based authentication methods have been widely studied with continuous advancements owing to the speed and memory efficiency. However, reference hash generation and threshold setting, which are used for similarity measures between original ...
Ling Du +4 more
doaj +1 more source
Approximately Minwise Independence with Twisted Tabulation [PDF]
A random hash function $h$ is $\varepsilon$-minwise if for any set $S$, $|S|=n$, and element $x\in S$, $\Pr[h(x)=\min h(S)]=(1\pm\varepsilon)/n$. Minwise hash functions with low bias $\varepsilon$ have widespread applications within similarity estimation.
A. Broder +6 more
core +1 more source

