Results 71 to 80 of about 94,016 (314)

Robust image hashing via visual attention model and ring partition

open access: yesMathematical Biosciences and Engineering, 2019
Robustness is an important property of image hashing. Most of the existing hashing algorithms do not reach good robustness against large-angle rotation.
Zhenjun Tang   +5 more
doaj   +1 more source

Time‐Domain Content‐Addressable Memory Based on Single Ambipolar Ferroelectric Memcapacitor for High‐Density and Highly‐Precise Distance Function Computation

open access: yesAdvanced Electronic Materials, EarlyView.
A high‐density and highly‐reliable capacitive time‐domain (TD) content‐addressable memory (CAM) based on a single ambipolar ferroelectric memcapacitor with band‐reject‐filter‐shaped capacitance‐voltage characteristics is proposed. The proposed TD CAM performs linear Hamming distance computation via propagation delay modulation, achieving improved ...
Minjeong Ryu   +5 more
wiley   +1 more source

Multi-Label Weighted Contrastive Cross-Modal Hashing

open access: yesApplied Sciences, 2023
Due to the low storage cost and high computation efficiency of hashing, cross-modal hashing has been attracting widespread attention in recent years. In this paper, we investigate how supervised cross-modal hashing (CMH) benefits from multi-label and ...
Zeqian Yi   +5 more
doaj   +1 more source

A Lyra2 FPGA Core for Lyra2REv2-Based Cryptocurrencies

open access: yes, 2019
Lyra2REv2 is a hashing algorithm that consists of a chain of individual hashing algorithms and it is used as a proof-of-work function in several cryptocurrencies that aim to be ASIC-resistant.
Balatsoukas-Stimming, Alexios   +3 more
core   +1 more source

Hardware Security for Edge Computing Via CMOS‐Compatible Multi‐Level Flash Memory with Hash‐Based Key Generation

open access: yesAdvanced Electronic Materials, EarlyView.
A CMOS‐compatible flash memory structure with multi‐level programming produces reliable and reproducible physically unclonable functions (PUFs) for secure IoT applications. Device‐specific variations in flat‐band voltage enable scalable key generation without standby power.
Kyumin Sim   +6 more
wiley   +1 more source

Securing Generative Artificial Intelligence with Parallel Magnetic Tunnel Junction True Randomness

open access: yesAdvanced Intelligent Systems, EarlyView.
True random numbers can protect generative artificial intelligence (GAI) models from attacks. A highly parallel, spin‐transfer torque magnetic tunnel junction‐based system is demonstrated that generates high‐quality, energy‐efficient random numbers.
Youwei Bao, Shuhan Yang, Hyunsoo Yang
wiley   +1 more source

Scalable IoT Platform for Heterogeneous Devices in Smart Environments

open access: yesIEEE Access, 2020
The Internet of Things (IoT) is envisioned as a ubiquitous computing infrastructure in which everything becomes connected, enabling gigantic information exchange among Things and people.
Asad Javed   +3 more
doaj   +1 more source

Hashing for Similarity Search: A Survey [PDF]

open access: yes, 2014
Similarity search (nearest neighbor search) is a problem of pursuing the data items whose distances to a query item are the smallest from a large database.
Ji, Jianqiu   +3 more
core  

Harnessing Blockchain for Sustainable Business Strategy: A Case Study on Enhancing Accounting Practices

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT This study explores the practical application of blockchain technology in accounting through a single case study of TLAB SCF, an Italian financial consulting firm actively involved in national and European digital innovation initiatives. The research adopts the technology acceptance model to investigate how perceived usefulness and perceived ...
Paolo Pietro Biancone   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy