Results 41 to 50 of about 94,016 (314)

Deep Cross-Modal Hashing With Hashing Functions and Unified Hash Codes Jointly Learning [PDF]

open access: yesIEEE Transactions on Knowledge and Data Engineering, 2022
Due to their high retrieval efficiency and low storage cost, cross-modal hashing methods have attracted considerable attention. Generally, compared with shallow cross-modal hashing methods, deep cross-modal hashing methods can achieve a more satisfactory performance by integrating feature learning and hash codes optimizing into a same framework ...
Rong-Cheng Tu   +6 more
openaire   +2 more sources

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

An Image Hashing Algorithm for Authentication with Multi-Attack Reference Generation and Adaptive Thresholding

open access: yesAlgorithms, 2020
Image hashing-based authentication methods have been widely studied with continuous advancements owing to the speed and memory efficiency. However, reference hash generation and threshold setting, which are used for similarity measures between original ...
Ling Du   +4 more
doaj   +1 more source

Tight Lower Bounds for Data-Dependent Locality-Sensitive Hashing [PDF]

open access: yes, 2015
We prove a tight lower bound for the exponent $\rho$ for data-dependent Locality-Sensitive Hashing schemes, recently used to design efficient solutions for the $c$-approximate nearest neighbor search. In particular, our lower bound matches the bound of $\
Andoni, Alexandr, Razenshteyn, Ilya
core   +3 more sources

MIHash: Online Hashing with Mutual Information [PDF]

open access: yes, 2017
Learning-based hashing methods are widely used for nearest neighbor retrieval, and recently, online hashing methods have demonstrated good performance-complexity trade-offs by learning hash functions from streaming data. In this paper, we first address a
Bargal, Sarah Adel   +3 more
core   +1 more source

Hash-Comb: A Hierarchical Distance-Preserving Multi-Hash Data Representation for Collaborative Analytics

open access: yesIEEE Access, 2022
Data privacy regulations like the EU GDPR allow the use of hashing techniques to anonymize data that may contain personal information. However, cryptographic hashing is well-known to destroy any possibility of performing analytics.
Abdelrahman Almahmoud   +2 more
doaj   +1 more source

Asymmetric Deep Supervised Hashing

open access: yes, 2017
Hashing has been widely used for large-scale approximate nearest neighbor search because of its storage and search efficiency. Recent work has found that deep supervised hashing can significantly outperform non-deep supervised hashing in many ...
Jiang, Qing-Yuan, Li, Wu-Jun
core   +1 more source

Secure Medical Blockchain Model

open access: yesInformation, 2023
The Internet of Medical Things (IoMT) uses wireless networks to help patients to communicate with healthcare professionals. Therefore, IoMT devices suffer from a lack of security controls, just like many Internet of Things (IoT) gadgets.
Ibrahim Shawky Farahat   +4 more
doaj   +1 more source

Unsupervised Triplet Hashing for Fast Image Retrieval

open access: yes, 2017
Hashing has played a pivotal role in large-scale image retrieval. With the development of Convolutional Neural Network (CNN), hashing learning has shown great promise.
Huang, Shanshan   +3 more
core   +1 more source

E-Commerce Website Usability Analysis Using the Association Rule Mining and Machine Learning Algorithm

open access: yesMathematics, 2022
The overall effectiveness of a website as an e-commerce platform is influenced by how usable it is. This study aimed to find out if advanced web metrics, derived from Google Analytics software, could be used to evaluate the overall usability of e ...
Biresh Kumar   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy