Journal articles on the topic 'Hash Map'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Hash Map.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Laborde, Pierre, Steven Feldman, and Damian Dechev. "A Wait-Free Hash Map." International Journal of Parallel Programming 45, no. 3 (2015): 421–48. http://dx.doi.org/10.1007/s10766-015-0376-3.
Full textКолесніков, В. A. "VISUALIZATION OF HASH MAP DATA STRUCTURE." Visnyk of Zaporizhzhya National University Physical and Mathematical Sciences, no. 1 (May 30, 2024): 66–74. http://dx.doi.org/10.26661/2786-6254-2024-1-08.
Full textWang, Gangyi, Jian Li, and Xinguo Wei. "Star Identification Based on Hash Map." IEEE Sensors Journal 18, no. 4 (2018): 1591–99. http://dx.doi.org/10.1109/jsen.2017.2772272.
Full textYu-Jie Liu, Yu-Jie Liu, Jian-Dong Liu Yu-Jie Liu, Ming Zhong Jian-Dong Liu, Bo Li Ming Zhong, and Hao-Qiang Xu Bo Li. "Design and Analysis of Hash Function Based on Two-dimensional Integer Chaotic Map." 電腦學刊 33, no. 3 (2022): 085–97. http://dx.doi.org/10.53106/199115992022063303007.
Full textRani, P. Jhansi, and S. Durga Bhavani. "Keyed hash function using Bernoulli shift map." International Journal of Information and Computer Security 9, no. 3 (2017): 250. http://dx.doi.org/10.1504/ijics.2017.085141.
Full textBhavani, S. Durga, and P. Jhansi Rani. "Keyed hash function using Bernoulli shift map." International Journal of Information and Computer Security 9, no. 3 (2017): 250. http://dx.doi.org/10.1504/ijics.2017.10005909.
Full textWang, Shihong, and Gang Hu. "Hash function based on chaotic map lattices." Chaos: An Interdisciplinary Journal of Nonlinear Science 17, no. 2 (2007): 023119. http://dx.doi.org/10.1063/1.2735812.
Full textShan, Xue, Pingping Liu, Guixia Gou, Qiuzhan Zhou, and Zhen Wang. "Deep Hash Remote Sensing Image Retrieval with Hard Probability Sampling." Remote Sensing 12, no. 17 (2020): 2789. http://dx.doi.org/10.3390/rs12172789.
Full textQi, Mingrui, and Dongdong Wang. "Secure Parallel Image Cryptographic Hash Function Using a Novel 2D High-Randomness Hyperchaotic Map." Mathematics 13, no. 11 (2025): 1890. https://doi.org/10.3390/math13111890.
Full textLiu, Zhuo, Yong Wang, Gongkun Jiang, and Leo Yu Zhang. "Design and Analysis on a Parallel Chaos-Based Hash Function." International Journal of Bifurcation and Chaos 30, no. 13 (2020): 2050188. http://dx.doi.org/10.1142/s0218127420501886.
Full textFan, Zheng, Tian Xiao-Jian, Li Xue-Yan, and Wu Bin. "Hash function based on the generalized Henon map." Chinese Physics B 17, no. 5 (2008): 1685–90. http://dx.doi.org/10.1088/1674-1056/17/5/025.
Full textKanso, A., H. Yahyaoui, and M. Almulla. "Keyed hash function based on a chaotic map." Information Sciences 186, no. 1 (2012): 249–64. http://dx.doi.org/10.1016/j.ins.2011.09.008.
Full textAkhavan, A., A. Samsudin, and A. Akhshani. "Hash function based on piecewise nonlinear chaotic map." Chaos, Solitons & Fractals 42, no. 2 (2009): 1046–53. http://dx.doi.org/10.1016/j.chaos.2009.02.044.
Full textShan, Xue, Pingping Liu, Yifan Wang, Qiuzhan Zhou, and Zhen Wang. "Deep Hashing Using Proxy Loss on Remote Sensing Image Retrieval." Remote Sensing 13, no. 15 (2021): 2924. http://dx.doi.org/10.3390/rs13152924.
Full textWei, Peng Cheng, and Jun Jian Huang. "Using Segment Number Parameter of Piecewise Linear Chaotic Map Construct Novel Hash Scheme." Materials Science Forum 694 (July 2011): 479–84. http://dx.doi.org/10.4028/www.scientific.net/msf.694.479.
Full textOliveira, Manuelle R. T., Marcos T. Melo, Ignacio Llamas‐Garro, and Alfredo G. Neto. "Reconfigurable cross dipole: hash frequency selective surface." IET Microwaves, Antennas & Propagation 12, no. 2 (2018): 224–29. http://dx.doi.org/10.1049/iet-map.2017.0544.
Full textLiu, Hongjun, Abdurahman Kadir, Chao Ma, and Chengbo Xu. "Constructing Keyed Hash Algorithm Using Enhanced Chaotic Map with Varying Parameter." Mathematical Problems in Engineering 2020 (July 20, 2020): 1–10. http://dx.doi.org/10.1155/2020/4071721.
Full textMa, Xian-Qin, Chong-Chong Yu, Xiu-Xin Chen, and Lan Zhou. "Large-Scale Person Re-Identification Based on Deep Hash Learning." Entropy 21, no. 5 (2019): 449. http://dx.doi.org/10.3390/e21050449.
Full textWang, Dan. "Recognition and Error Correction Techniques for Piano Playing Music Based on Convolutional Cyclic Hashing Method." Wireless Communications and Mobile Computing 2022 (April 9, 2022): 1–11. http://dx.doi.org/10.1155/2022/5660961.
Full textZhen, Ping, Geng Zhao, Lequan Min, and Xiaodong Li. "Novel Hash Function Based on Coupled Chaotic Map Lattices." Chinese Journal of Electronics 23, no. 4 (2014): 836–41. https://doi.org/10.23919/cje.2014.10851995.
Full textWang, Yong, Kwok-Wo Wong, and Di Xiao. "Parallel hash function construction based on coupled map lattices." Communications in Nonlinear Science and Numerical Simulation 16, no. 7 (2011): 2810–21. http://dx.doi.org/10.1016/j.cnsns.2010.10.001.
Full textKWOK, H. S., and WALLACE K. S. TANG. "A CHAOS-BASED CRYPTOGRAPHIC HASH FUNCTION FOR MESSAGE AUTHENTICATION." International Journal of Bifurcation and Chaos 15, no. 12 (2005): 4043–50. http://dx.doi.org/10.1142/s0218127405014489.
Full textEl-Meligy, Nada E., Tamer O. Diab, Ashraf S. Mohra, Ashraf Y. Hassan, and Wageda I. El-Sobky. "A Novel Dynamic Mathematical Model Applied in Hash Function Based on DNA Algorithm and Chaotic Maps." Mathematics 10, no. 8 (2022): 1333. http://dx.doi.org/10.3390/math10081333.
Full textLv, Yin, Xuanrui Zhang, and Yong Wang. "Saliency Detection via Fusing Color Contrast and Hash Fingerprint." Journal of Electrical and Computer Engineering 2022 (September 14, 2022): 1–10. http://dx.doi.org/10.1155/2022/9476111.
Full textQin, Ke, and B. John Oommen. "On the Cryptanalysis of Two Cryptographic Algorithms That Utilize Chaotic Neural Networks." Mathematical Problems in Engineering 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/468567.
Full textRahardja, Untung, Achmad Nizar Hidayanto, Ninda Lutfiani, Dyah Ayu Febiani, and Qurotul Aini. "Immutability of Distributed Hash Model on Blockchain Node Storage." Scientific Journal of Informatics 8, no. 1 (2021): 137–43. http://dx.doi.org/10.15294/sji.v8i1.29444.
Full textYang, Huaqian, Kwok-Wo Wong, Xiaofeng Liao, Yong Wang, and Degang Yang. "One-way hash function construction based on chaotic map network." Chaos, Solitons & Fractals 41, no. 5 (2009): 2566–74. http://dx.doi.org/10.1016/j.chaos.2008.09.056.
Full textJabbar, Amira K., Ashwaq T. Hashim, and Qusay F. Al-Doori. "Secured Medical Image Hashing Based on Frequency Domain with Chaotic Map." Engineering and Technology Journal 39, no. 5A (2021): 711–22. http://dx.doi.org/10.30684/etj.v39i5a.1786.
Full textZHDANOV, D. D., A. I. LYSYKH, R. R. KHALIMOV, I. E. KINEV, and A. D. ZHDANOV. "USING MULTILEVEL HASH TABLES TO SPEED UP RENDERING." Программирование, no. 3 (May 1, 2023): 37–48. http://dx.doi.org/10.31857/s013234742303007x.
Full textCao, Xinle, Weiqi Feng, Jian Liu, et al. "Towards Practical Oblivious Map." Proceedings of the VLDB Endowment 18, no. 3 (2024): 688–701. https://doi.org/10.14778/3712221.3712235.
Full textChen, Yaxiong, and Xiaoqiang Lu. "A Deep Hashing Technique for Remote Sensing Image-Sound Retrieval." Remote Sensing 12, no. 1 (2019): 84. http://dx.doi.org/10.3390/rs12010084.
Full textWang, Wei, Xiaojing Yao, and Jing Chen. "A Map Tile Data Access Model Based on the Jump Consistent Hash Algorithm." ISPRS International Journal of Geo-Information 11, no. 12 (2022): 608. http://dx.doi.org/10.3390/ijgi11120608.
Full textMa, Tingchen, Lingxin Kong, Yongsheng Ou, and Sheng Xu. "Accurate 3D LiDAR SLAM System Based on Hash Multi-Scale Map and Bidirectional Matching Algorithm." Sensors 24, no. 12 (2024): 4011. http://dx.doi.org/10.3390/s24124011.
Full textSetiadi, De Rosal Ignatius Moses, and Nova Rijati. "An Image Encryption Scheme Combining 2D Cascaded Logistic Map and Permutation-Substitution Operations." Computation 11, no. 9 (2023): 178. http://dx.doi.org/10.3390/computation11090178.
Full textZou, Li, Baozhen Ge, and Lei Chen. "Range image registration based on hash map and moth-flame optimization." Journal of Electronic Imaging 27, no. 02 (2018): 1. http://dx.doi.org/10.1117/1.jei.27.2.023015.
Full textWang, Yong, Xiaofeng Liao, Di Xiao, and Kwok-Wo Wong. "One-way hash function construction based on 2D coupled map lattices." Information Sciences 178, no. 5 (2008): 1391–406. http://dx.doi.org/10.1016/j.ins.2007.10.008.
Full textChen, Mengyuan, and Wenchao Hu. "Research on BatSLAM Algorithm for UAV Based on Audio Perceptual Hash Closed-Loop Detection." International Journal of Pattern Recognition and Artificial Intelligence 33, no. 01 (2018): 1959002. http://dx.doi.org/10.1142/s021800141959002x.
Full textNkouankou, Aboubakar, Fotso Clarice, Wadoufey Abel, and René Ndoundam. "Pre-image attack of the MD5 hash function by proportional logic." International Journal of Research and Innovation in Applied Science 07, no. 08 (2022): 20–25. http://dx.doi.org/10.51584/ijrias.2022.7802.
Full textIsmael Abdul Sattar Jabbar, Hassan Kassim Albahadilyr, and Alaa A. Jabbar Altaay. "Design and Implementation Digital Invitation System Based on Secure Hash Algorithm 3." International Journal of Online and Biomedical Engineering (iJOE) 19, no. 05 (2023): 105–16. http://dx.doi.org/10.3991/ijoe.v19i05.37583.
Full textFang, Xuan, Cai Qiong, and Lan Fang. "A Hash Algorithm Construction Based on Generalized Chaotic Maps." Applied Mechanics and Materials 325-326 (June 2013): 1502–7. http://dx.doi.org/10.4028/www.scientific.net/amm.325-326.1502.
Full textChen, Yong, Shucui Xie, and Jianzhong Zhang. "A Hybrid Domain Image Encryption Algorithm Based on Improved Henon Map." Entropy 24, no. 2 (2022): 287. http://dx.doi.org/10.3390/e24020287.
Full textDong, Chang’e. "Asymmetric color image encryption scheme using discrete-time map and hash value." Optik 126, no. 20 (2015): 2571–75. http://dx.doi.org/10.1016/j.ijleo.2015.06.035.
Full textLi, Da, Gang Hu, and Shihong Wang. "A keyed hash function based on the modified coupled chaotic map lattice." Communications in Nonlinear Science and Numerical Simulation 17, no. 6 (2012): 2579–87. http://dx.doi.org/10.1016/j.cnsns.2011.10.030.
Full textLiu, Pingping, Zetong Liu, Xue Shan, and Qiuzhan Zhou. "Deep Hash Remote-Sensing Image Retrieval Assisted by Semantic Cues." Remote Sensing 14, no. 24 (2022): 6358. http://dx.doi.org/10.3390/rs14246358.
Full textSharma, Dr Sanjay. "Crowd Funding Android App Using Block Chain." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem45072.
Full textMohamed, Marwa Hussien, Mohamed Helmy Khafagy, and Mohamed Hasan Ibrahim. "Hash Semi Join Map Reduce to Join Billion Records in a Reasonable Time." Indian Journal of Science and Technology 11, no. 18 (2018): 1–9. http://dx.doi.org/10.17485/ijst/2018/v11i18/119112.
Full textXIAO, D., X. LIAO, and S. DENG. "One-way Hash function construction based on the chaotic map with changeable-parameter." Chaos, Solitons & Fractals 24, no. 1 (2005): 65–71. http://dx.doi.org/10.1016/s0960-0779(04)00456-4.
Full textLi, Yantao. "Collision analysis and improvement of a hash function based on chaotic tent map." Optik 127, no. 10 (2016): 4484–89. http://dx.doi.org/10.1016/j.ijleo.2016.01.176.
Full textWang, Shihong, and Gang Hu. "Coupled map lattice based hash function with collision resistance in single-iteration computation." Information Sciences 195 (July 2012): 266–76. http://dx.doi.org/10.1016/j.ins.2012.01.032.
Full textWang Ji-Zhi, Wang Mei-Qin, and Wang Ying-Long. "The collision of one keyed Hash function based on chaotic map and analysis." Acta Physica Sinica 57, no. 5 (2008): 2737. http://dx.doi.org/10.7498/aps.57.2737.
Full text