Results 81 to 90 of about 94,016 (314)

Scalable Techniques for Similarity Search [PDF]

open access: yes, 2015
Document similarity is similar to the nearest neighbour problem and has applications in various domains. In order to determine the similarity / dissimilarity of the documents first they need to be converted into sets containing shingles. Each document is
Nagireddy, Siddartha Reddy
core   +1 more source

Hyperledger Fabric for the (digitalized) lifecycle of construction products: Applied review on fastening technology

open access: yesCivil Engineering Design, Volume 7, Issue 1, Page 9-22, March 2025.
Abstract Blockchain technology is a digital decentralized data ledger recording transactions in an encrypted format. Its implementation can potentially hold significant advantages for the built environment, particularly in manufacturing and building product usage aligned with Building Information Modeling (BIM). This paradigm shift toward decentralized
Aileen Pfeil   +2 more
wiley   +1 more source

Hashing of Message

open access: yesAdvances in Electrical and Electronic Engineering, 2003
For identification of any message it is not necessary to have available all message, but it is sufficient for its autentication its hashing. Hashing is used at safe put passwords, decode keys, autentication its hashing.
Ladislav Schwartz, Dusan Trstensky
doaj  

Trends and Insights in Arab Audit Research: A Bibliometric Exploration

open access: yesCanadian Journal of Administrative Sciences / Revue Canadienne des Sciences de l'Administration, EarlyView.
ABSTRACT This study employs bibliometric analysis to investigate audit research trends across five Arab countries—Jordan, Saudi Arabia, Egypt, Tunisia and the United Arab Emirates—each reflecting distinct sociopolitical, economic and legal contexts.
Zouhour Ben Hamadi, Peter Ghattas
wiley   +1 more source

Enhancement Multiple-hashing Protection Method on Weak Password in Grain Storage Information System

open access: yesLiang you shipin ke-ji
The use of weak passwords is a significant vulnerability in computer information system security, and this issue is also present in the digital applications of grain storage information systems.
YAN Lei   +5 more
doaj   +1 more source

The Impact of Environmental Information on Cryptocurrency Investment Allocation Decisions: An Experimental Survey Study

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT Despite the universal acknowledgment of financial profit expectations as an investment driver, environmental concern has been suggested as a factor influencing investors' decisions to purchase cryptocurrency. In this sense, this study investigates the impact of environmental information on investment allocation decisions to purchase different ...
Moritz Wendl   +2 more
wiley   +1 more source

Deep Hashing Based on Class-Discriminated Neighborhood Embedding

open access: yesIEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 2020
Deep-hashing methods have drawn significant attention during the past years in the field of remote sensing (RS) owing to their prominent capabilities for capturing the semantics from complex RS scenes and generating the associated hash codes in an end-to-
Jian Kang   +4 more
doaj   +1 more source

Unsupervised Generative Adversarial Cross-modal Hashing

open access: yes, 2017
Cross-modal hashing aims to map heterogeneous multimedia data into a common Hamming space, which can realize fast and flexible retrieval across different modalities. Unsupervised cross-modal hashing is more flexible and applicable than supervised methods,
Peng, Yuxin, Yuan, Mingkuan, Zhang, Jian
core   +1 more source

A continuous 500‐year sediment record of inundation by local and distant tsunamis in South‐Central Chile (40.1°S)

open access: yesThe Depositional Record, EarlyView.
Tsunami events over the past 500 years inundated Laguna Gemela West (Chile), leading to distinct sandy deposits in the lake record. This provides a complete perspective on tsunami inundation, including giant tsunamis, small local tsunamis and tsunamis that originated >100 km away from the site.
Jasper Moernaut   +8 more
wiley   +1 more source

DETEKSI KEBERADAAN KALIMAT SAMA SEBAGAI INDIKASI PENJIPLAKAN DENGAN ALGORITMA HASHING BERBASIS N-GRAM

open access: yesJurnal Ilmiah Kursor: Menuju Solusi Teknologi Informasi, 2011
Abundant cases of plagiarism committed by some intellectual people in the Indonesia’s education fields have became such tragedy. Due to the amount of information which is available online are things that make copy-paste without proper citation cause ...
Diana Purwitasari   +2 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy