hash function

(redirected from Hash code)

hash function

(programming)
A hash coding function which assigns a data item distinguished by some "key" into one of a number of possible "hash buckets" in a hash table. The hash function is usually combined with another more precise function.

For example a program might take a string of letters and put it in one of twenty six lists depending on its first letter. Ideally, a hash function should distribute items evenly between the buckets to reduce the number of hash collisions. If, for example, the strings were names beginning with "Mr.", "Miss" or "Mrs." then taking the first letter would be a very poor hash function because all names would hash the same.
This article is provided by FOLDOC - Free Online Dictionary of Computing (foldoc.org)
References in periodicals archive ?
" On Monday evening, Smartmatic's Marlon Garcia changed a hash code of a data package containing elections results received by a Comelec server.
1 Each diploma or transcript is associated with a randomly generated hash code or key, which is embedded into the current credential on the blockchain and the credential before it.
He alleged a change in the 'hash code,' which turned out to be a fix for the letter 'n,' since the letter originally appeared as a '?'.
CMU-Q also arranges many learning opportunities for students, like outdoor training competitions and the CFA Research competition." CMU-Q students took part in a number of local and international competitions this year, including 'Quick Startup', an annual competition for young entrepreneurs to pitch their business ideas to a judging panel; 'Al Ruwad Business Case Competition', a premier inter-collegial business competition; 'Google Hash Code', a programming competition for students and industry professionals; and 'Hackathon', a 24-hour event where students work individually or in teams to build an application.
CMU-Q also arranges many learning opportunities for students, like outdoor training competitions and the CFA Research competition, which helps us to apply what we learn in university to real-life situations." CMU-Q students took part in a number of local and international competitions this year, including 'Quick Startup', an annual competition for young entrepreneurs to pitch their business ideas to a judging panel; 'Al Ruwad Business Case Competition', a premier inter-collegial business competition; 'Google Hash Code', a programming competition for students and industry professionals; and 'Hackathon', a 24-hour event where students work individually or in teams to build an application.
K is the number of hash code and d is the dimension of image feature.
Due to the one-way and binary property of hash code, secure CBIR that exploits the hash function to encrypt features is effective and efficient in the large-scale database [6].
Finally, it saves the report's ID and hash code generated during the stamping in Timestamp Database.
The salt (s) and initial value ([h.sub.i-1]) which were used to initialize the state are again used in the extraction of the hash code, but the counter is not used.
In order to solve the integrity issue; on the customer part the hash code is produced using SHA-1, of which is encrypted with the customer's private key.