Results 81 to 90 of about 94,016 (314)
Scalable Techniques for Similarity Search [PDF]
Document similarity is similar to the nearest neighbour problem and has applications in various domains. In order to determine the similarity / dissimilarity of the documents first they need to be converted into sets containing shingles. Each document is
Nagireddy, Siddartha Reddy
core +1 more source
Abstract Blockchain technology is a digital decentralized data ledger recording transactions in an encrypted format. Its implementation can potentially hold significant advantages for the built environment, particularly in manufacturing and building product usage aligned with Building Information Modeling (BIM). This paradigm shift toward decentralized
Aileen Pfeil +2 more
wiley +1 more source
For identification of any message it is not necessary to have available all message, but it is sufficient for its autentication its hashing. Hashing is used at safe put passwords, decode keys, autentication its hashing.
Ladislav Schwartz, Dusan Trstensky
doaj
Trends and Insights in Arab Audit Research: A Bibliometric Exploration
ABSTRACT This study employs bibliometric analysis to investigate audit research trends across five Arab countries—Jordan, Saudi Arabia, Egypt, Tunisia and the United Arab Emirates—each reflecting distinct sociopolitical, economic and legal contexts.
Zouhour Ben Hamadi, Peter Ghattas
wiley +1 more source
Enhancement Multiple-hashing Protection Method on Weak Password in Grain Storage Information System
The use of weak passwords is a significant vulnerability in computer information system security, and this issue is also present in the digital applications of grain storage information systems.
YAN Lei +5 more
doaj +1 more source
ABSTRACT Despite the universal acknowledgment of financial profit expectations as an investment driver, environmental concern has been suggested as a factor influencing investors' decisions to purchase cryptocurrency. In this sense, this study investigates the impact of environmental information on investment allocation decisions to purchase different ...
Moritz Wendl +2 more
wiley +1 more source
Deep Hashing Based on Class-Discriminated Neighborhood Embedding
Deep-hashing methods have drawn significant attention during the past years in the field of remote sensing (RS) owing to their prominent capabilities for capturing the semantics from complex RS scenes and generating the associated hash codes in an end-to-
Jian Kang +4 more
doaj +1 more source
Unsupervised Generative Adversarial Cross-modal Hashing
Cross-modal hashing aims to map heterogeneous multimedia data into a common Hamming space, which can realize fast and flexible retrieval across different modalities. Unsupervised cross-modal hashing is more flexible and applicable than supervised methods,
Peng, Yuxin, Yuan, Mingkuan, Zhang, Jian
core +1 more source
Tsunami events over the past 500 years inundated Laguna Gemela West (Chile), leading to distinct sandy deposits in the lake record. This provides a complete perspective on tsunami inundation, including giant tsunamis, small local tsunamis and tsunamis that originated >100 km away from the site.
Jasper Moernaut +8 more
wiley +1 more source
Abundant cases of plagiarism committed by some intellectual people in the Indonesia’s education fields have became such tragedy. Due to the amount of information which is available online are things that make copy-paste without proper citation cause ...
Diana Purwitasari +2 more
doaj +2 more sources

