SlideShare a Scribd company logo
Efficient Fuzzy Search Enabled Hash MapVasile TopacPhD StudentDepartment of Information Technology and Computer Science“Politehnica” University Of TimisoaraEmail: vasile.topac@aut.upt.ro4th International Workshop On Soft Computing Applications SOFA2010 – Arad, ROMANIA
How it all started&SOFA2010 – Arad, ROMANIA  - Efficient Fuzzy Search Enabled Hash Map - VasileTopac
Java HashMap widely used Java data structure
 stores (key, value) pairs
search by key
very fast
a hash function generates a hash code for indexation
 Uses equals method to compare trough the keys
only values for existing keyscan be retrieved SOFA2010 – Arad, ROMANIA  - Efficient Fuzzy Search Enabled Hash Map - VasileTopac
Java HashMapphone book exampleSOFA2010 – Arad, ROMANIA  - Efficient Fuzzy Search Enabled Hash Map - VasileTopac
Java HashMapCollisionSOFA2010 – Arad, ROMANIA  - Efficient Fuzzy Search Enabled Hash Map - VasileTopac
Java HashMapSearch for “Lisa Smith”hashMap.get(“Lisa Smith”);Result: “521-8976”SOFA2010 – Arad, ROMANIA  - Efficient Fuzzy Search Enabled Hash Map - VasileTopac
Problemonly values for existing keyscan be retrieved Search for “Lissa Smith”hashMap.get(“Lissa Smith”);Result: nullSOFA2010 – Arad, ROMANIA  - Efficient Fuzzy Search Enabled Hash Map - VasileTopac
Problem search for “Lissa Smith”Brute force solution: - iterate trough the set of entries and search approximate matches Works, but is time expensiveFuzzy data structures – currently available for database SOFA2010 – Arad, ROMANIA  - Efficient Fuzzy Search Enabled Hash Map - VasileTopac
Fuzzy Hash Map“ Soft computing (SC) is a collection of methodologies that are trying to cope with the main disadvantage of the conventional (hard) computing: the poor performances when working in uncertain conditions. ”SOFA2010 – Arad, ROMANIA  - Efficient Fuzzy Search Enabled Hash Map - VasileTopac
Fuzzy Hash MapUML Class DiagramSOFA2010 – Arad, ROMANIA  - Efficient Fuzzy Search Enabled Hash Map - VasileTopac
Fuzzy Hash MapHow it worksFuzzyKey overridden methods  hashCode()
prehashing-  create collisions to cluster data
 substring	substring(“Fuzzy Search”, 0, 4) = “Fuzz”
 soundexsoundex(“Fuzzy Search”) = F226
 equals(Object o)

More Related Content

PDF
Wi-fi Hacking
PDF
Hacking With Nmap - Scanning Techniques
PPTX
Understanding NMAP
PDF
Hacking SIP Like a Boss!
PPTX
Threat Hunting with Splunk
PDF
OWASP SD: Deserialize My Shorts: Or How I Learned To Start Worrying and Hate ...
PDF
A Threat Hunter Himself
PPT
SolarWinds IPAM vs MS Win Server 2012
Wi-fi Hacking
Hacking With Nmap - Scanning Techniques
Understanding NMAP
Hacking SIP Like a Boss!
Threat Hunting with Splunk
OWASP SD: Deserialize My Shorts: Or How I Learned To Start Worrying and Hate ...
A Threat Hunter Himself
SolarWinds IPAM vs MS Win Server 2012

What's hot (20)

PPTX
Threat Hunting with Splunk Hands-on
PPTX
Role of Forensic Triage In Cyber Security Trends 2021
PDF
From OSINT to Phishing presentation
PPTX
Zabbix
PPTX
Moussasambe projet de securite zabbix
ODP
Scanning with nmap
PDF
Security Analyst Workshop - 20190314
PDF
Présentation et démo ELK/SIEM/Wazuh
PPT
Hacking web applications
PPTX
Apresentacao zabbix
PDF
CCNP Security-Secure
PPTX
Six Steps to SIEM Success
PPT
Implementasi Sistem Monitoring Jaringan Komputer Dengan Menggunakan Cacti
PPTX
Industrial Training - Network Intrusion Detection System Using Snort
PDF
Manual de Operação Primme Acesso Henry - LojaTotalseg.com.br
PPT
Malware forensics
PPT
Network Intrusion Detection System Using Snort
PDF
HITCON FreeTalk 2022 - Zero Trust Architecture 讀書筆記
PPTX
EC8004 WIRELESS NETWORKS UNIT 5 - IMS
Threat Hunting with Splunk Hands-on
Role of Forensic Triage In Cyber Security Trends 2021
From OSINT to Phishing presentation
Zabbix
Moussasambe projet de securite zabbix
Scanning with nmap
Security Analyst Workshop - 20190314
Présentation et démo ELK/SIEM/Wazuh
Hacking web applications
Apresentacao zabbix
CCNP Security-Secure
Six Steps to SIEM Success
Implementasi Sistem Monitoring Jaringan Komputer Dengan Menggunakan Cacti
Industrial Training - Network Intrusion Detection System Using Snort
Manual de Operação Primme Acesso Henry - LojaTotalseg.com.br
Malware forensics
Network Intrusion Detection System Using Snort
HITCON FreeTalk 2022 - Zero Trust Architecture 讀書筆記
EC8004 WIRELESS NETWORKS UNIT 5 - IMS
Ad

Viewers also liked (20)

PDF
MR201403 consideration and evaluation of using fuzzy hashing
PPTX
Image search engine
PPTX
LIvRE: A Video Extension to the LIRE Content-Based Image Retrieval System
PDF
LIRE presentation at the ACM Multimedia Open Source Software Competition 2013
PDF
Binary Similarity : Theory, Algorithms and Tool Evaluation
PPTX
Using fuzzy cognitive maps as decision support tool for smart cities goraczek
PPT
Fuzzy cognitive mapping
KEY
Europeana Tech 2011
PPTX
CBIR with RF
PPT
Quality, Relevance and Importance in Information Retrieval with Fuzzy Semanti...
PDF
Unidade 2 conceitos, funções e objetivos do sp
PDF
Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Stro...
PDF
Microbiologia de pescados y mariscos
PDF
Semantic Search Over The Web
PPT
Narrative tenses new english file advanced, Past simple, Past Continuos, Pas...
PDF
Oficina de serviço social elaboração de relatórios e laudos.
PDF
PMP Chap 6 - Project Time management - Part2
PPT
APA template powerpoint
PPTX
ISOINMUNIZACION MATERNOFETAL
PPTX
Application Architecture Summit - Monitoring the Dynamic Cloud
MR201403 consideration and evaluation of using fuzzy hashing
Image search engine
LIvRE: A Video Extension to the LIRE Content-Based Image Retrieval System
LIRE presentation at the ACM Multimedia Open Source Software Competition 2013
Binary Similarity : Theory, Algorithms and Tool Evaluation
Using fuzzy cognitive maps as decision support tool for smart cities goraczek
Fuzzy cognitive mapping
Europeana Tech 2011
CBIR with RF
Quality, Relevance and Importance in Information Retrieval with Fuzzy Semanti...
Unidade 2 conceitos, funções e objetivos do sp
Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Stro...
Microbiologia de pescados y mariscos
Semantic Search Over The Web
Narrative tenses new english file advanced, Past simple, Past Continuos, Pas...
Oficina de serviço social elaboração de relatórios e laudos.
PMP Chap 6 - Project Time management - Part2
APA template powerpoint
ISOINMUNIZACION MATERNOFETAL
Application Architecture Summit - Monitoring the Dynamic Cloud
Ad

Similar to Fuzzy Hash Map (8)

PPTX
Hadoop World 2010 - BAH - Fuzzy Table
PPTX
SC Unit-1.pptx
PDF
Introduction to Soft Computing (intro to the building blocks of SC)
PPTX
Soft computing01
PPT
SoftComputingIntroduction.ppt
PPT
Nov 2010 HUG: Fuzzy Table - B.A.H
PPTX
An Introduction to Soft Computing
DOC
Soft computing from net
Hadoop World 2010 - BAH - Fuzzy Table
SC Unit-1.pptx
Introduction to Soft Computing (intro to the building blocks of SC)
Soft computing01
SoftComputingIntroduction.ppt
Nov 2010 HUG: Fuzzy Table - B.A.H
An Introduction to Soft Computing
Soft computing from net

Recently uploaded (20)

PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Encapsulation theory and applications.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Cloud computing and distributed systems.
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
KodekX | Application Modernization Development
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Machine learning based COVID-19 study performance prediction
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Encapsulation_ Review paper, used for researhc scholars
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Network Security Unit 5.pdf for BCA BBA.
Reach Out and Touch Someone: Haptics and Empathic Computing
“AI and Expert System Decision Support & Business Intelligence Systems”
Building Integrated photovoltaic BIPV_UPV.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Encapsulation theory and applications.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Cloud computing and distributed systems.
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
KodekX | Application Modernization Development
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Empathic Computing: Creating Shared Understanding
Digital-Transformation-Roadmap-for-Companies.pptx
MYSQL Presentation for SQL database connectivity
Unlocking AI with Model Context Protocol (MCP)
Machine learning based COVID-19 study performance prediction
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx

Fuzzy Hash Map