• 제목/요약/키워드: Hashing Function

검색결과 36건 처리시간 0.028초

Dynamic Hashing Algorithm for Retrieval Using Hangeul Name on Navigation System

  • Lee, Jung-Hwa
    • Journal of information and communication convergence engineering
    • /
    • 제9권3호
    • /
    • pp.282-286
    • /
    • 2011
  • Recently, a name retrieval function is widely used on navigation systems. In this paper, we propose the new dynamic hashing algorithm for a name retrieval function on it. The proposed dynamic hashing algorithm by constructing an index using the variance information of character is the better than existing methods in terms of storage capacity and retrieval speed. The algorithm proposed in this paper can be useful on systems that have limited resources as well as navigation systems.

Locality-Sensitive Hashing for Data with Categorical and Numerical Attributes Using Dual Hashing

  • Lee, Keon Myung
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • 제14권2호
    • /
    • pp.98-104
    • /
    • 2014
  • Locality-sensitive hashing techniques have been developed to efficiently handle nearest neighbor searches and similar pair identification problems for large volumes of high-dimensional data. This study proposes a locality-sensitive hashing method that can be applied to nearest neighbor search problems for data sets containing both numerical and categorical attributes. The proposed method makes use of dual hashing functions, where one function is dedicated to numerical attributes and the other to categorical attributes. The method consists of creating indexing structures for each of the dual hashing functions, gathering and combining the candidates sets, and thoroughly examining them to determine the nearest ones. The proposed method is examined for a few synthetic data sets, and results show that it improves performance in cases of large amounts of data with both numerical and categorical attributes.

Deep Hashing for Semi-supervised Content Based Image Retrieval

  • Bashir, Muhammad Khawar;Saleem, Yasir
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권8호
    • /
    • pp.3790-3803
    • /
    • 2018
  • Content-based image retrieval is an approach used to query images based on their semantics. Semantic based retrieval has its application in all fields including medicine, space, computing etc. Semantically generated binary hash codes can improve content-based image retrieval. These semantic labels / binary hash codes can be generated from unlabeled data using convolutional autoencoders. Proposed approach uses semi-supervised deep hashing with semantic learning and binary code generation by minimizing the objective function. Convolutional autoencoders are basis to extract semantic features due to its property of image generation from low level semantic representations. These representations of images are more effective than simple feature extraction and can preserve better semantic information. Proposed activation and loss functions helped to minimize classification error and produce better hash codes. Most widely used datasets have been used for verification of this approach that outperforms the existing methods.

키 기반 블록 표면 계수를 이용한 강인한 3D 모델 해싱 (Robust 3D Hashing Algorithm Using Key-dependent Block Surface Coefficient)

  • 이석환;권기룡
    • 전자공학회논문지CI
    • /
    • 제47권1호
    • /
    • pp.1-14
    • /
    • 2010
  • 3D 콘텐츠 산업 분야의 급격한 성장과 더불어, 3D 콘텐츠 인증 및 신뢰, 검색을 위한 콘텐츠 해싱 기술이 요구되어지고 있다. 그러나 영상 및 동영상과 같은 2D 콘텐츠 해싱에 비하여 3D 콘텐츠 해싱에 대한 연구가 아직까지 미비하다. 본 논문에서는 키 기반의 3D 표면 계수 분포를 이용한 강인한 3D 메쉬 모델 해싱 기법을 제안한다. 제안한 기법에서는 기본적인 Euclid 기하학 변환에 강인한 3D SSD와 표면 곡률의 평면계 기반의 블록 표면 계수를 특징 벡터로 사용하며, 이를 치환 키 및 랜덤 변수 키에 의하여 최종 이진 해쉬를 생성한다. 실험 결과로부터 제안한 해싱 기법은 다양한 기하학 및 위상학 공격에 강인하며, 모델 및 키별로 해쉬의 유일성을 확인하였다.

Cuckoo Hashing을 이용한 RCC에 대한 성능향상 (Enhancing RCC(Recyclable Counter With Confinement) with Cuckoo Hashing)

  • 장룡호;정창훈;김근영;양대헌;이경희
    • 한국통신학회논문지
    • /
    • 제41권6호
    • /
    • pp.663-671
    • /
    • 2016
  • 인터넷 트래픽양의 급증에 따라 고속 라우터의 수요가 많아졌다. 트래픽 통계 또는 보안 등의 목적으로 라우터에서 패킷을 측정해야 하는데 고속 라우터의 특성상 메모리공간이 제한적이다. RCC는 적은 메모리로 트래픽을 정확하고 효율적으로 측정하는 방법을 제시했다. RCC에서는 트래픽을 측정하는데 큰 Flow를 추가적인 Quadratic Probing 기반 해시 테이블에 누적하는 방법 사용한다. 그런데 Quadratic Probing은 적은 메모리 또는 메모리 사용률이 많은 상황에서 연산량이 많으며, 특히 갱신 또는 실시간 조회가 자주 발생하는 시스템에서 오버헤드가 크다. 이 논문에서는 RCC의 특성을 분석하고 실험을 통해 Quadratic Probing의 문제점을 증명하며 갱신 또는 조회에 효율적인 Cuckoo Hashing을 사용하여 RCC의 성능을 개선한다. 실험 결과에 따르면 RCC에서 Cuckoo Hashing을 사용할 때 메모리 사용률이 높은 상황에서도 높은 정확도를 보여주었고, 효율적으로 트래픽을 측정할 수 있었다.

CMAC 제어기를 위한 효과적인 메모리 매핑 함수 (An Effective Memory Mapping Function for CMAC Controller)

  • 권호열;변증남;서일홍
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1989년도 추계학술대회 논문집 학회본부
    • /
    • pp.488-493
    • /
    • 1989
  • In this paper, the structure of CMAC address mapping is first revisited, and the address hashing function and the random mapping is discussed in the conventional CMAC implementation. Then the effective size of CMAC memory is derived from the modulus property of the CMAC address vector, and a new hashing function for the effective memory mapping is proposed for a CMAC implementation with feasible memory size and no troublesome random mapping. Finally, the performance of the conventional CMAC learning algorithm and that of the proposed new CMAC scheme arc compared via simulations.

  • PDF

A Multi-Indexes Based Technique for Resolving Collision in a Hash Table

  • Yusuf, Ahmed Dalhatu;Abdullahi, Saleh;Boukar, Moussa Mahamat;Yusuf, Salisu Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • 제21권9호
    • /
    • pp.339-345
    • /
    • 2021
  • The rapid development of various applications in networking system, business, medical, education, and other domains that use basic data access operations such as insert, edit, delete and search makes data structure venerable and crucial in providing an efficient method for day to day operations of those numerous applications. One of the major problems of those applications is achieving constant time to search a key from a collection. A number of different methods which attempt to achieve that have been discovered by researchers over the years with different performance behaviors. This work evaluated these methods, and found out that almost all the existing methods have non-constant time for adding and searching a key. In this work, we designed a multi-indexes hashing algorithm that handles a collision in a hash table T efficiently and achieved constant time O(1) for searching and adding a key. Our method employed two-level of hashing which uses pattern extraction h1(key) and h2(key). The second hash function h2(key) is use for handling collision in T. Here, we eliminated the wasted slots in the search space T which is another problem associated with the existing methods.

엔트로피 연산자를 이용한 영상 해싱 기반 인식자 (Image Hashing based Identifier with Entropy Operator)

  • 박제호
    • 반도체디스플레이기술학회지
    • /
    • 제20권3호
    • /
    • pp.93-96
    • /
    • 2021
  • The desire for a technology that can mechanically acquire 2D images starting with the manual method of drawing has been making possible a wide range of modern image-based technologies and applications over a period. Moreover, this trend of the utilization of image-related technology as well as image-based information is likely to continue. Naturally, as like other technology areas, the function that humans produce and utilize by using images needs to be automated by using computing-based technologies. Surprisingly, technology using images in the future will be able to discover knowledge that humans have never known before through the information-related process that enables new perception, far beyond the scope of use that human has used before. Regarding this trend, the manipulation and configuration of massively distributed image database system is strongly demanded. In this paper, we discuss image identifier production methods based on the utilization of the image hashing technique which especially puts emphasis over an entropy operator.

A Dynamic Locality Sensitive Hashing Algorithm for Efficient Security Applications

  • Mohammad Y. Khanafseh;Ola M. Surakhi
    • International Journal of Computer Science & Network Security
    • /
    • 제24권5호
    • /
    • pp.79-88
    • /
    • 2024
  • The information retrieval domain deals with the retrieval of unstructured data such as text documents. Searching documents is a main component of the modern information retrieval system. Locality Sensitive Hashing (LSH) is one of the most popular methods used in searching for documents in a high-dimensional space. The main benefit of LSH is its theoretical guarantee of query accuracy in a multi-dimensional space. More enhancement can be achieved to LSH by adding a bit to its steps. In this paper, a new Dynamic Locality Sensitive Hashing (DLSH) algorithm is proposed as an improved version of the LSH algorithm, which relies on employing the hierarchal selection of LSH parameters (number of bands, number of shingles, and number of permutation lists) based on the similarity achieved by the algorithm to optimize searching accuracy and increasing its score. Using several tampered file structures, the technique was applied, and the performance is evaluated. In some circumstances, the accuracy of matching with DLSH exceeds 95% with the optimal parameter value selected for the number of bands, the number of shingles, and the number of permutations lists of the DLSH algorithm. The result makes DLSH algorithm suitable to be applied in many critical applications that depend on accurate searching such as forensics technology.

여러 개의 SRAM과 해슁을 이용한 병렬 IP 어드레스 검색에 대한 연구 (Parallel IP Address Lookup using Hashing with Multiple SRAMs)

  • 서지현;임혜숙;정여진;이승준
    • 한국통신학회논문지
    • /
    • 제28권2B호
    • /
    • pp.138-143
    • /
    • 2003
  • 컴퓨터간의 빠른 데이터 전송을 위해서는 링크 속도와 더불어 라우터에서의 패킷 전달율(forwarding rate) 이 중요하며, 이 중 어드레스 검색(address lookup) 은 패킷 전달 과정 중에서 매우 중요한 부분으로, 주요 시간 지연을 발생시키는 요인이라 할 것이다. 본 논문에서는 고속 라우터에 적합한 효율적인 어드레스 검색 하드웨어 구조를 제안하고자 한다. 본 논문에서 제안된 구조는 인터넷 어드레스의 프리픽스 길이별로 각각 다른 SRAM을 사용하여 여러 개의 어드레스 검색 테이블을 만들고, 각 테이블에 해슁(hashing)을 적용하여 동시에 어드레스 검색을 수행한 후, 각 테이블에서 일치되어 나온 엔트리 중 가장 길게 프리픽스가 일치하는 엔트리를 고르는 방식이다. 제안된 방식의 성능을 평가하기 위하여 MAE-WEST 라우터 예로 시뮬레이션을 수행하였다. 37000여 개의 라우팅 엔트리를 갖는 테이블 저장을 위해 약 300Kbyte의 메모리를 사용하였을 때, 패킷 당 1.93번의 메모리 접근 횟수를 갖는다.