Results 21 to 30 of about 77,938 (281)

Deep Hashing Based Fusing Index Method for Large-Scale Image Retrieval

open access: yesApplied Computational Intelligence and Soft Computing, 2017
Hashing has been widely deployed to perform the Approximate Nearest Neighbor (ANN) search for the large-scale image retrieval to solve the problem of storage and retrieval efficiency.
Lijuan Duan   +4 more
doaj   +1 more source

Region-DH: Region-based Deep Hashing for Multi-Instance Aware Image Retrieval [PDF]

open access: yes, 2020
This paper introduces an instance-aware hashing approach Region-DH for large-scale multi-label image retrieval. The accurate object bounds can significantly increase the hashing performance of instance features.
Mtope, Franck Romuald Fotso, Wei, Bo
core   +1 more source

HASHING ALGORITHM BASED ON TWO-DIMENSIONAL CHAOTIC MAPPINGS

open access: yesСистемный анализ и прикладная информатика, 2017
A new hashing algorithm based on dynamic chaos is proposed. Owing to the use of chaotic mappings, this algorithm is irreversible and a search for two messages with identical hash-values becomes computationally difficult.
A. V. Sidorenko, I. V. Shakinko
doaj   +1 more source

Hash-Comb: A Hierarchical Distance-Preserving Multi-Hash Data Representation for Collaborative Analytics

open access: yesIEEE Access, 2022
Data privacy regulations like the EU GDPR allow the use of hashing techniques to anonymize data that may contain personal information. However, cryptographic hashing is well-known to destroy any possibility of performing analytics.
Abdelrahman Almahmoud   +2 more
doaj   +1 more source

Fast Supervised Hashing with Decision Trees for High-Dimensional Data [PDF]

open access: yes, 2014
Supervised hashing aims to map the original features to compact binary codes that are able to preserve label based similarity in the Hamming space.
Hengel, Anton van den   +4 more
core   +3 more sources

Secure Medical Blockchain Model

open access: yesInformation, 2023
The Internet of Medical Things (IoMT) uses wireless networks to help patients to communicate with healthcare professionals. Therefore, IoMT devices suffer from a lack of security controls, just like many Internet of Things (IoT) gadgets.
Ibrahim Shawky Farahat   +4 more
doaj   +1 more source

E-Commerce Website Usability Analysis Using the Association Rule Mining and Machine Learning Algorithm

open access: yesMathematics, 2022
The overall effectiveness of a website as an e-commerce platform is influenced by how usable it is. This study aimed to find out if advanced web metrics, derived from Google Analytics software, could be used to evaluate the overall usability of e ...
Biresh Kumar   +4 more
doaj   +1 more source

On the Design of a Blockchain-based Fraud-prevention Performance Appraisal System

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2022
The job recruitment process takes a lot of process and number of documents. It is very well known for applicants to exaggerated and falsify their work history data. It may put a company at legal risk and significant commercial losses.
Bryan Andi Gerrardo   +2 more
doaj   +1 more source

An Image Hashing Algorithm for Authentication with Multi-Attack Reference Generation and Adaptive Thresholding

open access: yesAlgorithms, 2020
Image hashing-based authentication methods have been widely studied with continuous advancements owing to the speed and memory efficiency. However, reference hash generation and threshold setting, which are used for similarity measures between original ...
Ling Du   +4 more
doaj   +1 more source

Approximately Minwise Independence with Twisted Tabulation [PDF]

open access: yes, 2014
A random hash function $h$ is $\varepsilon$-minwise if for any set $S$, $|S|=n$, and element $x\in S$, $\Pr[h(x)=\min h(S)]=(1\pm\varepsilon)/n$. Minwise hash functions with low bias $\varepsilon$ have widespread applications within similarity estimation.
A. Broder   +6 more
core   +1 more source

Home - About - Disclaimer - Privacy