The result was delete. -- Cirt (talk) 01:47, 23 July 2010 (UTC)[reply]
Article on a cryptographic hash function contributed by User:Aaboelela, who is almost certainly the Amr Aboelela credited in that article as the creator of the algorithm. Contains no independent references, no indication of notability, and almost no material on the specific hash algorithm itself, apart from promotional language and material that applies to any generic hash algorithm. Also, the externally linked images appear on an e-commerce site that appears related to the creator of the hash algorithm and the article on it. — Gavia immer (talk) 02:15, 16 July 2010 (UTC)[reply]
Gavia immer, yes it is true that the algorithm is developed by me. This algorithm is different from generic hashing algorithms, because as i explained in the page is that if you give other algorithms two similar items, you would get a totally different hash codes, as they are used for encryption or identification purposes. However, in the DHA if you give it two similar inputs (e.g. images), the algorithm would give you two similar hash codes, and that can help in indexing, sorting, and searching of the images. I believe this is the same way the brain work, it digests data as our stomach digest food.
I have master in Image Processing from UWO in Canada, hence this topic is related to my master research. Also i worked partially with a start up company called vufind to search for images and videos by content and not by text. This topic is hot right now in research. —Preceding unsigned comment added by Aaboelela (talk • contribs) 02:30, 16 July 2010 (UTC)[reply]