Sign Up to like & get
recommendations!
1
Published in 2022 at "International Journal of Intelligent Systems"
DOI: 10.1002/int.23082
Abstract: Hashing techniques have attracted considerable attention owing to their advantages of efficient computation and economical storage. However, it is still a challenging problem to generate more compact binary codes for promising performance. In this paper,…
read more here.
Keywords:
vision transformer;
loss;
hash;
image ... See more keywords
Photo by usgs from unsplash
Sign Up to like & get
recommendations!
1
Published in 2017 at "Artificial Intelligence Review"
DOI: 10.1007/s10462-017-9591-1
Abstract: Plenty of data are available due to the growth of digital technology that creates a high expectation in retrieving the relevant images, accurately and efficiently for a given query image. For searching the relevant images…
read more here.
Keywords:
nearest neighbor;
hash;
image;
image retrieval ... See more keywords
Photo by usgs from unsplash
Sign Up to like & get
recommendations!
0
Published in 2018 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-018-6855-y
Abstract: Currently, due to the exponential growth of online images, it is necessary to consider image retrieval among large number of images, which is very time-consuming and unscalable. Although many hashing methods has been proposed, they…
read more here.
Keywords:
image;
hash;
linear discriminant;
image retrieval ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-020-08772-2
Abstract: Recently, research has been active in various fields in relation to multimedia data retrieval to reduce the accuracy and calculation costs of multimedia retrieval. In particular, various search methods using multimedia has been developed. However,…
read more here.
Keywords:
multimedia data;
information;
hash;
using iot ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "Computers in biology and medicine"
DOI: 10.1016/j.compbiomed.2021.104292
Abstract: Exact string matching algorithms involve finding all occurrences of a pattern P in a text T. These algorithms have been extensively studied in computer science, primarily because of their applications in various fields such as…
read more here.
Keywords:
hash;
dna sequences;
exact string;
string matching ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "Journal of King Saud University - Computer and Information Sciences"
DOI: 10.1016/j.jksuci.2021.04.005
Abstract: Abstract Data reduction has gained growing emphasis due to the rapidly unsystematic increase in digital data and has become a sensible approach to big data systems. Data deduplication is a technique to optimize the storage…
read more here.
Keywords:
hash;
system;
repeated patterns;
lightweight hash ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "Neurocomputing"
DOI: 10.1016/j.neucom.2019.12.078
Abstract: Abstract Hashing technology plays an important role in large-scale visual search due to its low memory and fast retrieval speed. Most existing deep hashing approaches first leverage the continuous relaxation strategy to learn continuous approximate…
read more here.
Keywords:
discrete hashing;
hash;
pairwise;
pairwise correlation ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "Neurocomputing"
DOI: 10.1016/j.neucom.2021.08.125
Abstract: Abstract In the research field of multimedia retrieval, unsupervised multi-modal hashing has received widespread attention because of its high retrieval efficiency, low storage cost and semantic label independence. However, there are still several problems that…
read more here.
Keywords:
hash;
multi;
tensor;
multi modal ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.3038219
Abstract: The design of cryptographic engines for the Internet of Things (IoT) edge devices and other ultralightweight devices is a crucial challenge. The emergence of such resource-constrained devices raises significant challenges to current cryptographic algorithms. PHOTON…
read more here.
Keywords:
hash;
photon hash;
architecture;
hash function ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3146422
Abstract: Today most people can’t live without electronic devices. And more and more new devices are coming to the market every day. Apps running on these devices often connect to one or several web-based server side…
read more here.
Keywords:
test improvement;
evaluation test;
new hash;
hash ... See more keywords
Sign Up to like & get
recommendations!
3
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3163433
Abstract: Small file processing in Hadoop is one of the challenging task. The performance of the Hadoop is quite good when dealing with large files because they require lesser metadata and consume less memory. But while…
read more here.
Keywords:
hash;
hadoop;
small file;
hadoop archive ... See more keywords