Results 71 to 80 of about 94,016 (314)
Robust image hashing via visual attention model and ring partition
Robustness is an important property of image hashing. Most of the existing hashing algorithms do not reach good robustness against large-angle rotation.
Zhenjun Tang +5 more
doaj +1 more source
A high‐density and highly‐reliable capacitive time‐domain (TD) content‐addressable memory (CAM) based on a single ambipolar ferroelectric memcapacitor with band‐reject‐filter‐shaped capacitance‐voltage characteristics is proposed. The proposed TD CAM performs linear Hamming distance computation via propagation delay modulation, achieving improved ...
Minjeong Ryu +5 more
wiley +1 more source
Multi-Label Weighted Contrastive Cross-Modal Hashing
Due to the low storage cost and high computation efficiency of hashing, cross-modal hashing has been attracting widespread attention in recent years. In this paper, we investigate how supervised cross-modal hashing (CMH) benefits from multi-label and ...
Zeqian Yi +5 more
doaj +1 more source
A Lyra2 FPGA Core for Lyra2REv2-Based Cryptocurrencies
Lyra2REv2 is a hashing algorithm that consists of a chain of individual hashing algorithms and it is used as a proof-of-work function in several cryptocurrencies that aim to be ASIC-resistant.
Balatsoukas-Stimming, Alexios +3 more
core +1 more source
A CMOS‐compatible flash memory structure with multi‐level programming produces reliable and reproducible physically unclonable functions (PUFs) for secure IoT applications. Device‐specific variations in flat‐band voltage enable scalable key generation without standby power.
Kyumin Sim +6 more
wiley +1 more source
Securing Generative Artificial Intelligence with Parallel Magnetic Tunnel Junction True Randomness
True random numbers can protect generative artificial intelligence (GAI) models from attacks. A highly parallel, spin‐transfer torque magnetic tunnel junction‐based system is demonstrated that generates high‐quality, energy‐efficient random numbers.
Youwei Bao, Shuhan Yang, Hyunsoo Yang
wiley +1 more source
Scalable IoT Platform for Heterogeneous Devices in Smart Environments
The Internet of Things (IoT) is envisioned as a ubiquitous computing infrastructure in which everything becomes connected, enabling gigantic information exchange among Things and people.
Asad Javed +3 more
doaj +1 more source
Hashing for Similarity Search: A Survey [PDF]
Similarity search (nearest neighbor search) is a problem of pursuing the data items whose distances to a query item are the smallest from a large database.
Ji, Jianqiu +3 more
core
ABSTRACT This study explores the practical application of blockchain technology in accounting through a single case study of TLAB SCF, an Italian financial consulting firm actively involved in national and European digital innovation initiatives. The research adopts the technology acceptance model to investigate how perceived usefulness and perceived ...
Paolo Pietro Biancone +3 more
wiley +1 more source

