Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

101 results about "Hash list" patented technology

In computer science, a hash list is typically a list of hashes of the data blocks in a file or set of files. Lists of hashes are used for many different purposes, such as fast table lookup (hash tables) and distributed databases (distributed hash tables).

Locality-sensitive-hashing-based high-dimensional indexing method for large-scale multimedia data

The invention relates to a locality-sensitive-hashing-based high-dimensional indexing method for large-scale multimedia data. The method includes the following steps of extracting high-dimensional features of the multimedia data at the offline indexing stage; establishing an internal storage index, storing the multimedia high-dimensional features in a feature storage area, calculating the locality sensitive hashing vectors of the high-dimensional features, and storing feature numbers and the locality sensitive hashing vectors corresponding to the features in a hashing list storage area, wherein the internal storage index comprises the feature storage area and the hashing list storage area; establishing a first-stage disk index, wherein the first-stage disk index comprises a feature storage area, an index storage area and a plurality of hashing list storage areas; establishing a second-stage disk index, wherein the second-stage disk index comprises a hashing barrel storage area; repeatedly executing the steps mentioned above till all multimedia input is indexed. At the online query stage, features of the multimedia data used for queries are extracted, the queries are conducted on the basis of the established indexes, and similar query results are returned. By means of the method, the scheduling performance of internal storage and disks is improved, and the indexing speed and the retrieving speed of the multimedia data are increased.
Owner:PEKING UNIV

Compression packet uploading and duplication-removing system and method

InactiveCN103873438AEffective deduplicationSave storage spaceTransmissionClient-sideHash list
Provided is a compression packet uploading and duplication-removing method which comprises that: a compression packet uploaded by a user is divided into multiple data blocks; Hash values of all the data blocks are calculated; information of whether the compression packet is the encrypted compression packet, the Hash value of the compression packet, the Hash values of all the data blocks and sequences of the data blocks are stored in one Hash table and then uploaded to a Hash database; when the Hash values in the Hash database are identical with the Hash values of the stored data blocks in a storage server, the data blocks corresponding to the Hash values in the Hash database are confirmed to be duplicated data blocks; corresponding client terminals are notified not to upload the data blocks and corresponding data block pointers of the duplicated data blocks are returned to users, and each data block is corresponding to one data block pointer according the position of the corresponding storage area; the storage area of each data block in the storage server after duplication removal is arranged; and the data blocks are uploaded to the corresponding storage areas in the storage server. The invention also provides a compression packet uploading and duplication-removing system. Storage space can be saved by utilizing the compression packet uploading and duplication-removing method.
Owner:HONG FU JIN PRECISION IND (SHENZHEN) CO LTD +1

Internal memory and file system mixing rearrangement method based on HASH algorithm

The invention relates to an implement method based on mixed tautology removal of an HASH algorithm memory and a file system, which adopts the combination of the tautology removal of the memory and the tautology removal of the file system so as to achieve a win-win result of data storage use space and processing efficiency. The implement method has the procedure that tautology removal information in a certain period of time is loaded into the memory and the tautology removal of the memory is adopted, and beyond the time the tautology removal of the document is adopted. The implement method mainly has the following steps: step 1. tautology removal configuration information (record format information, tautology removal types) is loaded into the memory; step 2. the tautology removal information in a certain period of time (configurable) is loaded into a private memory; step 3. the tautology removal of memory is performed, i.e., the tautology is removed according to the filtering information in the memory; and step 4. tautology removal of a file is performed, the tautology is removed according to the historical filtering information in the file. The storage structure of the information of the tautology removal in the memory has two characteristics of HASH lists and time window.
Owner:LINKAGE SYST INTEGRATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products