Deep hashing combines feature extraction or representation with hash coding jointly, which can significantly improve the speed of large-scale image retrieval. However, we notice that compared with traditional retrieva...
详细信息
Deep hashing combines feature extraction or representation with hash coding jointly, which can significantly improve the speed of large-scale image retrieval. However, we notice that compared with traditional retrieval methods, due to the reduction of dimension and information loss, the retrieval performance of binaryhash coding has declined to a certain extent. Most hash retrieval algorithms focus on the semantic similarity between image pairs, and ignore the ranking information between the returned samples. The returned samples should not only match the retrieved samples, but also rank the correct samples in front of the returned list. In addition, the performance difference of the deep model used in deep hash retrieval will also limit the efficiency of retrieval. To address such problem, we proposed an ensemble deep neural model robust framework for image retrieval, which can learn compact hash codes containing rich semantic information through hash constraints. The ensemble strategy is introduced, and the weighted voting is applied to integrate the ranking list. Comprehensive experiments on three benchmark datasets show that the proposed method achieves very competitive results. Codes are available at https://***/lidonggen-123/Ensemble_Deephash_Image_Retrieval.(c) 2022 Elsevier B.V. All rights reserved.
We consider random tries constructed from sequences of i.i.d. random variables with a common density $f$ on $\lbrack 0, 1 \rbrack$ (i.e., paths down the tree are carved out by the bits in the binary expansions of the ...
详细信息
We consider random tries constructed from sequences of i.i.d. random variables with a common density $f$ on $\lbrack 0, 1 \rbrack$ (i.e., paths down the tree are carved out by the bits in the binary expansions of the random variables). The depth of insertion of a node and the height of a node are studied with respect to their limit laws and their weak and strong convergence properties. In addition, laws of the iterated logarithm are obtained for the height of a random trie when $\int f^2 < \infty$. Finally, we study two popular improvements of the trie, the $\mathrm{PATRICIA}$ tree and the digital search tree, and show to what extent they improve over the trie.
Examines the detection of combined occurrences for a large number of changes of values of variables. Description of the two efficient solutions for the combined occurrences; Properties of the methods; Error analysis f...
详细信息
Examines the detection of combined occurrences for a large number of changes of values of variables. Description of the two efficient solutions for the combined occurrences; Properties of the methods; Error analysis for the second method.
Studies key-to-address transformation methods applied to a set of existing files. Correlation between the number of accesses required to get to a record and the number of overflows record created by a transformation; ...
详细信息
Studies key-to-address transformation methods applied to a set of existing files. Correlation between the number of accesses required to get to a record and the number of overflows record created by a transformation; Techniques of accessing a single record of a formatted file; Guidelines for the selection of an appropriate practical transform.
The article presents a study which discussed perfect hashing functions in computer science. The author said that possible difficulties in implementing Algorithm T may be avoided. The symbol \ indicates set difference....
详细信息
The article presents a study which discussed perfect hashing functions in computer science. The author said that possible difficulties in implementing Algorithm T may be avoided. The symbol \ indicates set difference. The value of d which is output in step (g) of Algorithm R corresponds only to the final rotation value discovered by Algorithm T, the rest having already been output by step (j) of T. It is more effective to modify step (j) of T to determine d if only one remainder reduction phf is desired.
Presents a method for computing machine independent in minimal perfect hash functions. Application of compilers in filtering high frequency words in natural language processing; Presentation of examples on English wor...
详细信息
Presents a method for computing machine independent in minimal perfect hash functions. Application of compilers in filtering high frequency words in natural language processing; Presentation of examples on English word abbreviation; Difficulty in computing perfect hash functions.
The article provides an analysis of key-to-address transformation techniques and the results of a performance study on large existing formatted files. The experimental results comparing six commonly used key-to-addres...
详细信息
The article provides an analysis of key-to-address transformation techniques and the results of a performance study on large existing formatted files. The experimental results comparing six commonly used key-to-address transformation techniques were presented by the researchers. One transformation in the study referred to as 'generalized radix transformation method' is an elaborate technique based on radix transformation. This method of transformation consists of a radix transformation algorithm as well as hardware implementation to carry out the steps of this transformation in an efficient manner. The intricacy of the generalized radix transformation method has motivated researchers to conduct further studies of the technique. The additional results are presented after a brief description of the basic algorithm used in this generalized radix transformation method. Additional experiments on the files showed that the distribution of the keys was particularly sensitive to the arbitrary selection of an 8-bit grouping.
This paper presents a new approach to the analysis of performance of the various key-to-address transformation methods. In this approach the keys in a file arc assumed to have been selected from the key space accordin...
详细信息
This paper presents a new approach to the analysis of performance of the various key-to-address transformation methods. In this approach the keys in a file arc assumed to have been selected from the key space according to a certain probabilistic selection algorithm. All files with the same number of keys selected from this key space will be suitably weighted in accordance with the algorithm, and the average performance of the transformation methods on these files will be used as the potential of these methods. Using this analysis, methods with the same overall performance can be classified and key distributions partial to certain transformations can be identified. All this can be done analytically. The approach is applied to a group of transformation methods using files whose keys are selected randomly. [ABSTRACT FROM AUTHOR]
暂无评论