scholarly journals BagMinHash - Minwise Hashing Algorithm for Weighted Sets

Author(s):  
Otmar Ertl
2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Jinhua Fu ◽  
Sihai Qiao ◽  
Yongzhong Huang ◽  
Xueming Si ◽  
Bin Li ◽  
...  

Blockchain is widely used in encrypted currency, Internet of Things (IoT), supply chain finance, data sharing, and other fields. However, there are security problems in blockchains to varying degrees. As an important component of blockchain, hash function has relatively low computational efficiency. Therefore, this paper proposes a new scheme to optimize the blockchain hashing algorithm based on PRCA (Proactive Reconfigurable Computing Architecture). In order to improve the calculation performance of hashing function, the paper realizes the pipeline hashing algorithm and optimizes the efficiency of communication facilities and network data transmission by combining blockchains with mimic computers. Meanwhile, to ensure the security of data information, this paper chooses lightweight hashing algorithm to do multiple hashing and transforms the hash algorithm structure as well. The experimental results show that the scheme given in the paper not only improves the security of blockchains but also improves the efficiency of data processing.


Author(s):  
Ping Li ◽  
Anshumali Shrivastava ◽  
Arnd Christian König
Keyword(s):  

2013 ◽  
Vol 11 (1) ◽  
pp. 2182-2188
Author(s):  
Pallavali Radha ◽  
C Surekha ◽  
U Sesadri

To provide switching capacity in terabit or petabit uses core routers in multipath switching systems (MPS). Without disturbing the order of intra flow packets, the load balance across multiple paths is the main issue of MPS design phase. The performance is not good through heavy tailed flow size distribution in flow based hashing algorithm. Our proposed novel scheme consist the HA Proxy very fast and reliable solution offering high availability, load balancing, and proxying for TCP and HTTP-based applications. To process Layer7 of web site or to provide persistence to the website this scheme is very well suited for heavy load web sites crawling and flow slices are generated through Flow Slice (FS) that halt each flow at every intra flow spell larger than a slicing threshold and balances the load. The study analysis on traces of Internet, our scheme is optimal in load balancing performance through FS and the slicing threshold we set to 1 to 4 ms. We neglected out of order packets limits of probability 1/106 on three prominent MPSs with little hardware complexity and twice of the internal speedup. The theoretical analysis proved that this and trace driven prototype simulations are validated. 


2018 ◽  
Vol 7 (4.10) ◽  
pp. 295
Author(s):  
Murali S ◽  
Manimaran A ◽  
Selvakumar K ◽  
Dinesh Kumar S

The secured web-based voting framework is the need of the present time. We propose another secure authentication for the online voting framework by utilizing face recognition and hashing algorithm. A simple verification process is accomplished during the initial registration process via email and phone. The voter is asked to give a unique identification number (UIN) provided by the election authority and face image at the time of main registration. This UIN is converted into a secret key using the SHA algorithm. The face image that is saved in the Amazon web service (AWS) acts as an authentication mechanism which enables people to cast their vote secretly. The voters, who cast numerous votes amid the way toward voting is guaranteed to be counteracted by encrypted UIN.  The election organizers can see the election parallelly as the voting is saved in the real-time database. The privacy of the voter is maintained as the details are converted into the key. In this system, an individual can vote from outside of his/her allocated constituency.  


Sign in / Sign up

Export Citation Format

Share Document