咨询与建议

限定检索结果

文献类型

  • 24 篇 期刊文献
  • 6 篇 会议
  • 1 册 图书

馆藏范围

  • 31 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24 篇 工学
    • 21 篇 计算机科学与技术...
    • 10 篇 电气工程
    • 8 篇 信息与通信工程
    • 5 篇 软件工程
    • 4 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 土木工程
    • 2 篇 交通运输工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 测绘科学与技术
    • 1 篇 环境科学与工程(可...
  • 7 篇 理学
    • 5 篇 数学
    • 2 篇 生物学
    • 1 篇 地球物理学
    • 1 篇 统计学(可授理学、...
  • 2 篇 农学
  • 2 篇 医学
    • 1 篇 临床医学
    • 1 篇 药学(可授医学、理...
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...

主题

  • 31 篇 hashing algorith...
  • 4 篇 blockchain
  • 3 篇 image retrieval
  • 3 篇 binary codes
  • 3 篇 hash table
  • 2 篇 information hidi...
  • 2 篇 molecular hologr...
  • 2 篇 near-duplicate i...
  • 2 篇 collisions
  • 2 篇 approximate near...
  • 2 篇 coverless image ...
  • 2 篇 hqsar
  • 2 篇 pls
  • 2 篇 scalable cryptog...
  • 2 篇 watermarking
  • 2 篇 qsar
  • 1 篇 wordset hash
  • 1 篇 information syst...
  • 1 篇 cryptographic ar...
  • 1 篇 task scheduler

机构

  • 4 篇 jilin univ sch c...
  • 2 篇 minist educ key ...
  • 2 篇 shandong univ te...
  • 1 篇 nanjing inst tec...
  • 1 篇 peking univ shen...
  • 1 篇 dibon solut inc ...
  • 1 篇 univ windsor dep...
  • 1 篇 jilin univ key l...
  • 1 篇 zhejiang univ co...
  • 1 篇 eotvos lorand un...
  • 1 篇 kogakuin univ
  • 1 篇 szabist dubai de...
  • 1 篇 univ shanghai sc...
  • 1 篇 agh univ sci & t...
  • 1 篇 hohai univ coll ...
  • 1 篇 jilin univ key l...
  • 1 篇 natl dong hwa un...
  • 1 篇 chengdu univ inf...
  • 1 篇 department of el...
  • 1 篇 department of co...

作者

  • 5 篇 wang zhen
  • 4 篇 liu pingping
  • 3 篇 zhao hongwei
  • 2 篇 wu bin
  • 2 篇 wu nannan
  • 2 篇 yang xiaohan
  • 2 篇 tchorzewski jace...
  • 1 篇 zhang luming
  • 1 篇 qian chen
  • 1 篇 kamran rukshanda
  • 1 篇 shen jie
  • 1 篇 iacono mauro
  • 1 篇 liu wenhao
  • 1 篇 sun xingming
  • 1 篇 zhaoqing pan
  • 1 篇 ugochukwu nwosu ...
  • 1 篇 goyal s. b.
  • 1 篇 chen qiu
  • 1 篇 chawla varun
  • 1 篇 abdurrahman usma...

语言

  • 30 篇 英文
  • 1 篇 其他
检索条件"主题词=Hashing Algorithm"
31 条 记 录,以下是1-10 订阅
排序:
An Ann-Based Scalable hashing algorithm for Computational Clouds with Schedulers
收藏 引用
INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS AND COMPUTER SCIENCE 2021年 第4期31卷 697-712页
作者: Tchorzewski, Jacek Jakobik, Agnieszka Iacono, Mauro Cracow Univ Technol Fac Comp Sci & Telecommun Ul Warszawska 24 PL-31155 Krakow Poland AGH Univ Sci & Technol Fac Comp Sci Elect & Telecommun Al Mickiewicza 30 PL-30059 Krakow Poland Univ Campania Luigi Vanvitelli Dept Math & Phys Viale Lincoln 5 I-81100 Caserta Italy
The significant benefits of cloud computing (CC) resulted in an explosion of their usage in the last several years. From the security perspective, CC systems have to offer solutions that fulfil international standards... 详细信息
来源: 评论
Deep adversarial multi-label cross-modal hashing algorithm
收藏 引用
INTERNATIONAL JOURNAL OF MULTIMEDIA INFORMATION RETRIEVAL 2023年 第2期12卷 16-16页
作者: Yang, Xiaohan Wang, Zhen Liu, Wenhao Chang, Xinyi Wu, Nannan Shandong Univ Technol Sch Comp Sci & Technol Zibo 255000 Peoples R China Jilin Univ Key Lab Symbol Computat & Knowledge Engn Minist Educ Qianjin St Changchun 130012 Jilin Peoples R China
In recent years, more and more researchers employ the hashing algorithm to improve the large-scale cross-modal retrieval efficiency by mapping the floating-point feature into the compact binary code. However, the cros... 详细信息
来源: 评论
Coverless Image Steganography Using Histograms of Oriented Gradients-Based hashing algorithm
收藏 引用
JOURNAL OF INTERNET TECHNOLOGY 2017年 第5期18卷 1177-1184页
作者: Zhou, Zhili Wu, Q. M. Jonathan Yang, Ching-Nung Sun, Xingming Pan, Zhaoqing Nanjing Univ Informat Sci & Technol Jiangsu Engn Ctr Network Monitoring Nanjing Jiangsu Peoples R China Nanjing Univ Informat Sci & Technol Sch Comp & Software Nanjing Jiangsu Peoples R China Univ Windsor Dept Elect & Comp Engn Windsor ON Canada Natl Dong Hwa Univ Dept Comp Sci & Informat Engn Shoufeng Township Taiwan
The traditional image steganography approaches usually need a cover image so that the secret information can be imperceptibly embedded into it for secret communication. However, by utilizing the embedding traces left ... 详细信息
来源: 评论
Coverless Image Steganography Using Histograms of Oriented Gradients-Based hashing algorithm
收藏 引用
网际网路技术学刊 2017年 第5期18卷 1177-1184页
作者: Zhili Zhou Q. M. Jonathan Wu Ching-Nung Yang Xingming Sun Zhaoqing Pan
The traditional image steganography approaches usually need a cover image so that the secret information can be imperceptibly embedded into it for secret communication. However, by utilizing the embedding traces left ... 详细信息
来源: 评论
GXHash: High-Performance Non-Cryptographic hashing  17
GXHash: High-Performance Non-Cryptographic Hashing
收藏 引用
17th International Conference on Advanced Computer Theory and Engineering
作者: Chawla, Varun
GXHash is a promising fast and consistent non-cryptographic hashing algorithm optimized for high throughput and efficiency by leveraging modern Central Processing Unit (CPU) capabilities like Single Instruction, Multi... 详细信息
来源: 评论
Enhancing Logistics With the Internet of Things: A Secured and Efficient Distribution and Storage Model Utilizing Blockchain Innovations and Interplanetary File System
收藏 引用
IEEE ACCESS 2024年 12卷 4139-4152页
作者: Ugochukwu, Nwosu Anthony Goyal, S. B. Rajawat, Anand Singh Verma, Chaman Illes, Zoltan City Univ Fac Informat Technol Petaling Jaya 46100 Malaysia Sandip Univ Sch Comp Sci & Engn Nasik 422213 India Eotvos Lorand Univ Fac Informat Dept Media & Educ Informat H-1053 Budapest Hungary
Logistics transports, stores, and delivers goods from the producer to the final user. Logistics have become increasingly complex in today's globalized world, making it imperative to address data integrity, transpa... 详细信息
来源: 评论
Hash-Based Gaussian Mixture Model (HGMM) for Roadside LiDAR Smart Infrastructure Applications
收藏 引用
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 2024年 第10期25卷 12968-12979页
作者: Zhang, Tianya Terry Ge, Yi Chen, Anjiang Sartipi, Mina Jin, Peter J. Univ Tennessee Chattanooga UTC Comp Sci & Engn Dept Chattanooga TN 37403 USA Rutgers State Univ Dept Civil & Environm Engn CEE Piscataway NJ 08854 USA
This paper proposes a point cloud background filtering method and explores applications that integrate LiDAR technology into roadside sensor networks, addressing challenges in handling large volumes of sparse and unst... 详细信息
来源: 评论
Retargeting HR Aerial Photos Under Contaminated Labels With Application in Smart Navigation
收藏 引用
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 2024年 第1期25卷 349-358页
作者: Zhang, Luming Chen, Ming Tu, Bing Li, Yi Xia, Yingjie Jinhua Polytech Key Lab Crop Harvesting Equipment Technol Zhejiang Jinhua 321016 Peoples R China Hithink RoyalFlush Informat Network Co Ltd Hangzhou 310023 Peoples R China Nanjing Univ Informat Sci & Technol Inst Opt & Elect Jiangsu Key Lab Optoelect Detect Atmosphere & Ocea Nanjing 210044 Peoples R China Nanjing Univ Informat Sci & Technol Jiangsu Int Joint Lab Meteorol Photon & Optoelect Nanjing 210044 Peoples R China Wenzhou Univ Coll Comp Sci Wenzhou 325035 Peoples R China Zhejiang Univ Coll Comp Sci Hangzhou 310027 Zhejiang Peoples R China
Retargeting aims to shrink a photo wherein the perceptually prominent regions are appropriately kept. In practice, optimally shrinking a high resolution (HR) aerial photo is a useful tool for smart navigation. Nowaday... 详细信息
来源: 评论
Effective image registration model using optimized KAZE algorithm
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2024年 第11期83卷 33959-33984页
作者: Zhang, Sheng Shen, Jie Zheng, Shengnan Tang, Jingjing Hohai Univ Coll Comp & Informat Nanjing 211100 Peoples R China Nanjing Inst Technol Sch Comp Engn Nanjing 211167 Peoples R China
The incompatible problem with velocity and accuracy has been restricting the application of the KAZE algorithm. In order to resolve this shortage, we propose the effective image registration model using the optimized ... 详细信息
来源: 评论
Revolutionizing Security in Land Management System with Integration of Efficient Consensus and Smart Contract Enabled Blockchain in Land Registry Procedure
收藏 引用
SN Computer Science 2025年 第1期6卷 1-26页
作者: Shrivastava, Atul Lal Dwivedi, Rajendra Kumar Prakash, Shiva Department of ITCA Madan Mohan Malaviya University of Technology U.P. Gorakhpur 273010 India
The fourth industrial revolution is going to be propelled by blockchain technologies for establishing security. Due to this, many countries have begun to look into the possibility of applying the use of blockchain tec... 详细信息
来源: 评论