i know that Locality-Sensitive Hashing (LSH) is an algorithm for solving the approximate or exact Near Neighbor Search in high dimensional spaces.
Khi2(xi,xj)=sqrt(SUM_t=1^d (xit-xjt)2/(xit-xjt))
is an example of LSH function. It is a type of distance. Reference is also attached. you may check also this site: http://www.mit.edu/~andoni/LSH/.
Good Luck!
H.H. Mehne
This is a process of reduction of higher dimensional probabilistic data , most of use in computational cryptography
Hi Amal, I found interesting the following blog in StackOverfloe
http://stackoverflow.com/questions/12952729/how-to-understand-locality-sensitive-hashing
Perhaps it may be of further help.
Best, and good luck,
Sergio
create inverted index which consist of words mapping to files contain this words. then i want to encrypt this inverted index by using some encryption algorithm.
07 August 2019 3,615 7 View
When i compute the time complexity of cipher text policy attribute based encryption CP-ABE . I found it O(1) by tracing each step in code which mostly are assignments operations. Is it possible...
05 June 2019 4,143 6 View
iam already read about RC2 encryption algorithm but for mor explanation , i want an example that explain the algorithm.
06 July 2018 217 0 View
iam working in searching encrypted data, then retrieving from this data. i want to compute precision and recall so i want to know the formula to compute true positive , false positive , true...
03 April 2018 7,248 8 View
i write code contain vector of legth 1000 that vector split into two vectors of same length follow specific algorithm , this two vectors multiply into inverse of two matrices that should be the...
01 February 2018 8,944 5 View
I have binary vector of 0s and 1s that i want to encrypt it then make search in it. First i convert vector into hashmap Which key represent index of each dimension in this vector and value...
09 October 2017 4,098 2 View
iam working in searchable encryption. first i make index for set of files, the index is B+ tree , the leaf of this tree is bloom filter which represent the words in each file. each bloom filter...
09 October 2017 5,920 2 View
in the following code in euclidean hash some of the result of the rand.nextGaussian() implementation is negative when set dimension 100 and w is 2. which affect in the hash method. public...
06 July 2017 2,591 5 View
i want to implement Pseudo Random Function for these two functions in java: f(sk,.)={0,1}^* multiply sk ---> {0,1}^k, where sk is secret key (a random key). g(.,.)= {0,1}^k multiply {0,1}...
06 July 2017 4,431 3 View
he paper propose scheme for search in encrypted data using the tree of bloom filters as data structure to represent the index of the files then encrypted the leaves of the tree which consist of...
05 June 2017 1,504 2 View
Excessive rotation of nodes in node set ErrNodeExcessRotation-Step1
17 August 2021 0 0 View
How to calculate the RMSD values for a MD simulation using MOE?
07 August 2021 0 0 View
20 June 2021 0 0 View
When I tried to energy minimization my system, I got fatal error as below. Fatal error: Atomtype opls_116 not found Although I've already added this line: ; include water #include "oplsaa.ff/spc.itp" to [molecultype] directive in my topology.
16 June 2021 0 0 View
What this unit identifies for the ion exchange capacity ca. 0.92 meq. g-1. I am a newcomer in the membrane area. I just started. I highly appreciate your help
08 May 2021 0 0 View