Results 31 to 40 of about 77,066 (262)

E-Commerce Website Usability Analysis Using the Association Rule Mining and Machine Learning Algorithm

open access: yesMathematics, 2022
The overall effectiveness of a website as an e-commerce platform is influenced by how usable it is. This study aimed to find out if advanced web metrics, derived from Google Analytics software, could be used to evaluate the overall usability of e ...
Biresh Kumar   +4 more
doaj   +1 more source

Tight Lower Bounds for Data-Dependent Locality-Sensitive Hashing [PDF]

open access: yes, 2015
We prove a tight lower bound for the exponent $\rho$ for data-dependent Locality-Sensitive Hashing schemes, recently used to design efficient solutions for the $c$-approximate nearest neighbor search. In particular, our lower bound matches the bound of $\
Andoni, Alexandr, Razenshteyn, Ilya
core   +3 more sources

On the Design of a Blockchain-based Fraud-prevention Performance Appraisal System

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2022
The job recruitment process takes a lot of process and number of documents. It is very well known for applicants to exaggerated and falsify their work history data. It may put a company at legal risk and significant commercial losses.
Bryan Andi Gerrardo   +2 more
doaj   +1 more source

MIHash: Online Hashing with Mutual Information [PDF]

open access: yes, 2017
Learning-based hashing methods are widely used for nearest neighbor retrieval, and recently, online hashing methods have demonstrated good performance-complexity trade-offs by learning hash functions from streaming data. In this paper, we first address a
Bargal, Sarah Adel   +3 more
core   +1 more source

Asymmetric Deep Supervised Hashing

open access: yes, 2017
Hashing has been widely used for large-scale approximate nearest neighbor search because of its storage and search efficiency. Recent work has found that deep supervised hashing can significantly outperform non-deep supervised hashing in many ...
Jiang, Qing-Yuan, Li, Wu-Jun
core   +1 more source

Deep Hashing Based on Class-Discriminated Neighborhood Embedding

open access: yesIEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 2020
Deep-hashing methods have drawn significant attention during the past years in the field of remote sensing (RS) owing to their prominent capabilities for capturing the semantics from complex RS scenes and generating the associated hash codes in an end-to-
Jian Kang   +4 more
doaj   +1 more source

Unsupervised Triplet Hashing for Fast Image Retrieval

open access: yes, 2017
Hashing has played a pivotal role in large-scale image retrieval. With the development of Convolutional Neural Network (CNN), hashing learning has shown great promise.
Huang, Shanshan   +3 more
core   +1 more source

Optimizing Ranking Measures for Compact Binary Code Learning [PDF]

open access: yes, 2014
Hashing has proven a valuable tool for large-scale information retrieval. Despite much success, existing hashing methods optimize over simple objectives such as the reconstruction error or graph Laplacian related loss functions, instead of the ...
Lin, Guosheng   +2 more
core   +2 more sources

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Scalable IoT Platform for Heterogeneous Devices in Smart Environments

open access: yesIEEE Access, 2020
The Internet of Things (IoT) is envisioned as a ubiquitous computing infrastructure in which everything becomes connected, enabling gigantic information exchange among Things and people.
Asad Javed   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy