Construction method based on hash table of memory, text searching method and corresponding device
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0036] Example one
[0037] figure 1 It is a schematic flow chart of a method for constructing a memory-based hash table provided by the first embodiment of the present invention. This embodiment is applicable to the case of constructing a hash table for finding whether text data exists in the memory. In the embodiment of the present invention, the text data may be data in any text format such as microblog comments. This method can be executed by a memory-based hash table construction device, which can be implemented by software and / or hardware. In view of the memory shortage problem when the traditional chain address method constructs a hash table of massive texts, this embodiment constructs each single-linked table in the chain address method by using multiple hash functions to achieve the purpose of further saving memory.
[0038] See figure 1 The method for constructing a memory-based hash table provided by this embodiment specifically includes the following operations:
[003...
Example Embodiment
[0055] Example two
[0056] Figure 2A It is a schematic flow diagram of a method for constructing a memory-based hash table provided in the second embodiment of the present invention. This embodiment provides a preferred embodiment on the basis of the first embodiment above. The method for constructing a memory-based hash table provided in this embodiment can be performed under the windows2008server system of an intel core i7 CPU with a main frequency of 2.2 GHz, a hardware environment with a memory of 32 GB, and a development environment based on Visual C++. See Figure 2A The method for constructing a memory-based hash table provided by this embodiment specifically includes the following operations:
[0057] Operation 210: Determine whether there is unobtained text data for searching in a preset data set. If yes, perform operation 220, otherwise end the process.
[0058] Operation 220: Obtain a piece of text data for searching from the data set. Perform operation 230.
[0059] ...
Example Embodiment
[0080] Example three
[0081] image 3 It is a schematic flowchart of a text search method provided in the third embodiment of the present invention. This embodiment further provides a method for searching text data after the method for constructing a memory-based hash table is executed. The method can be executed by a text search device, which is implemented by software and / or hardware. See image 3 , The text search method provided in this embodiment specifically includes the following operations:
[0082] Operation 310: Obtain the text data to be searched this time.
[0083] Operation 320: Use the preset main hash function to calculate the main hash value corresponding to the text data to be searched this time, and determine the hash table entry address corresponding to the main hash value according to the set mapping algorithm.
[0084] Operation 330: Use at least one preset slave hash function to calculate a slave hash value corresponding to the text data to be searched this tim...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap