33   Artículos

« Anterior     Página: 1 de 2     Siguiente »

 
en línea
Wenxiao Li, Hongyan Mei, Yutian Li, Jiayao Yu, Xing Zhang, Xiaorong Xue and Jiahao Wang    
Due to the fast retrieval speed and low storage cost, cross-modal hashing has become the primary method for cross-modal retrieval. Since the emergence of deep cross-modal hashing methods, cross-modal retrieval significantly improved. However, the existin... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Hongming Li, Lilai Zhang, Hao Cao and Yirui Wu    
Deoxyribonucleic Acid (DNA) computing has demonstrated great potential in data encryption due to its capability of parallel computation, minimal storage requirement, and unbreakable cryptography. Focusing on high-dimensional image data for encryption wit... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Kunbolat Algazy, Kairat Sakan, Nursulu Kapalova, Saule Nyssanbayeva and Dilmukhanbet Dyusenbayev    
The article observes the new hashing algorithm HBC-256. The HBC-256 algorithm is based on the block cipher of the compression function CF (Compression Function) and produces a 256-bits hash value. Like any new cryptographic structure, the HBC-256 algorit... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Wei Wang, Xiaojing Yao and Jing Chen    
Tiled maps are one of the key GIS technologies used in the development and construction of WebGIS in the era of big data; there is an urgent need for high-performance tile map services hosted on big data GIS platforms. To address the current inefficiency... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Santiago Tapia-Fernández, Daniel García-García and Pablo García-Hernandez    
Most computer programs or applications need fast data structures. The performance of a data structure is necessarily influenced by the complexity of its common operations; thus, any data-structure that exhibits a theoretical complexity of amortized const... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Youmeng Luo, Wei Li, Xiaoyu Ma and Kaiqiang Zhang    
With the continuous progress of image retrieval technology, in the field of image retrieval, the speed of a search for a desired image from a great deal of image data becomes a hot issue. Convolutional Neural Networks (CNN) have been used in the field of... ver más
Revista: Information    Formato: Electrónico

 
en línea
Zhen Wang, Fuzhen Sun, Longbo Zhang, Lei Wang and Pingping Liu    
In recent years, binary coding methods have become increasingly popular for tasks of searching approximate nearest neighbors (ANNs). High-dimensional data can be quantized into binary codes to give an efficient similarity approximation via a Hamming dist... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Baocheng Wang, Zetao Li and Haibin Li    
As the core of blockchain technology, the consensus algorithm plays an important role in determining the security, data consistency, and efficiency of blockchain systems. The existing mainstream consensus algorithm is experiencing difficulties satisfying... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Kaimeng Ding, Yueming Liu, Qin Xu and Fuqiang Lu    
Data security technology is of great significance to the application of high resolution remote sensing image (HRRS) images. As an important data security technology, perceptual hash overcomes the shortcomings of cryptographic hashing that is not robust a... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Argyrios Sideris, Theodora Sanida and Minas Dasygenis    
Hash functions are an essential mechanism in today?s world of information security. It is common practice to utilize them for storing and verifying passwords, developing pseudo-random sequences, and deriving keys for various applications, including milit... ver más
Revista: Information    Formato: Electrónico

 
en línea
Jean Raphael Ngnie Sighom, Pin Zhang and Lin You    
In today?s society, cloud computing has significantly impacted nearly every section of our lives and business structures. Cloud computing is, without any doubt, one of the strategic directions for many companies and the most dominating infrastructure for... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Hasan Hashim, Ahmad Reda Alzighaibi, Amaal Farag Elessawy, Ibrahim Gad, Hatem Abdul-Kader and Asmaa Elsaid    
A zero-confirmation transaction is a transaction that has not yet been confirmed on the blockchain and is not yet part of the blockchain. The network propagates zero-confirmation transactions quickly, but they are not secured against double-spending atta... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Yaqian Chen, Jiangfeng She, Xingong Li, Shuhua Zhang and Junzhong Tan    
Cost distance is one of the fundamental functions in geographical information systems (GISs). 3D cost distance function makes the analysis of movement in 3D frictions possible. In this paper, we propose an algorithm and efficient data structures to accur... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Hengfu Yang, Jianping Yin and Mingfang Jiang    
Robustness and discriminability are the two most important features of perceptual image hashing (PIH) schemes. In order to achieve a good balance between perceptual robustness and discriminability, a novel PIH algorithm is proposed by combining latent lo... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ahmed Faeq Hussein, Abbas K. ALZubaidi, Qais Ahmed Habash and Mustafa Musa Jaber    
A crucial role is played by personal biomedical data when it comes to maintaining proficient access to health records by patients as well as health professionals. However, it is difficult to get a unified view pertaining to health data that have been sca... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ibrahim Shawky Farahat, Waleed Aladrousy, Mohamed Elhoseny, Samir Elmougy and Ahmed Elsaid Tolba    
The Internet of Medical Things (IoMT) uses wireless networks to help patients to communicate with healthcare professionals. Therefore, IoMT devices suffer from a lack of security controls, just like many Internet of Things (IoT) gadgets. Thus, in this pa... ver más
Revista: Information    Formato: Electrónico

 
en línea
Sergey Kurapov,Maxim Davidovsky     Pág. 1 - 8
In general, a universal algorithm for testing a pair of graphs G and H for isomorphism exists. It is grounded on the fact that the rows and the corresponding columns of the adjacency matrix of the graph G can be rearranged until it turns into another, eq... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Mohamad Ihwani     Pág. 15 - 20
Abstrak ? Kerahasiaan dan keamanan data yang merupakan hal yang sangat penting, sehingga untuk menjaga kerahasiaan dan keamanan data perusahaan tersebut dapat dilakukan salah satunya dengan menggunakan teknik kriptografi. Digital Signature Algorithm (DSA... ver más

 
en línea
Anastasiya Ilyukhina     Pág. 16 - 27
In 2001, a CFS signature scheme based on the Niederreiter cryptosystem was proposed. The signature algorithm is based on code cryptography, which makes the signature resistant to post-quantum attacks. However, there are certain difficulties in its implem... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Emmanuel A. Adeniyi, Peace Busola Falola, Mashael S. Maashi, Mohammed Aljebreen and Salil Bharany    
With the explosion of connected devices linked to one another, the amount of transmitted data grows day by day, posing new problems in terms of information security, such as unauthorized access to users? credentials and sensitive information. Therefore, ... ver más
Revista: Information    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »