2021
DOI: 10.1002/cpe.6355
|View full text |Cite
|
Sign up to set email alerts
|

Toward more efficient locality‐sensitive hashing via constructing novel hash function cluster

Abstract: Locality-sensitive hashing (LSH) is widely used in the context of nearest neighbor search of large-scale high-dimensions. However, there are serious imbalance problems between the efficiency of data index structure construction and the query accuracy of LSH methods. In this article, a novel higher-entropy-hyperplane clusters LSH (HEHC-LSH) algorithm is proposed, which we improve vector quantization to preprocess the data and greatly shortens the preprocessing time; We innovatively integrate the maximum entropy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 36 publications
(45 reference statements)
0
1
0
Order By: Relevance
“…This approach is often referred to as "cross-modal hashing" or "binary code hashing". There are many different techniques that can be used for CMR using binaryvalued representation, including deep learning-based approaches such as deep cross-modal hashing networks, as well as more traditional techniques such as binary code locality sensitive hashing (LSH) and iterative quantization [18] [19]. The choice of technique depends on the speci c requirements of the application and the available data.…”
Section: Introductionmentioning
confidence: 99%
“…This approach is often referred to as "cross-modal hashing" or "binary code hashing". There are many different techniques that can be used for CMR using binaryvalued representation, including deep learning-based approaches such as deep cross-modal hashing networks, as well as more traditional techniques such as binary code locality sensitive hashing (LSH) and iterative quantization [18] [19]. The choice of technique depends on the speci c requirements of the application and the available data.…”
Section: Introductionmentioning
confidence: 99%