Skip to main content

Advances, Systems and Applications

Table 2 R hash tables

From: Privacy-aware and Efficient Student Clustering for Sport Training with Hash in Cloud Environment

Student

\(\boldsymbol I\boldsymbol n\boldsymbol d\boldsymbol e{\boldsymbol x}_{\mathbf1}\)  

\(\boldsymbol I\boldsymbol n\boldsymbol d\boldsymbol e{\boldsymbol x}_{\mathbf2}\)  

\(\boldsymbol\cdots\)

\(\boldsymbol I\boldsymbol n\boldsymbol d\boldsymbol e{\boldsymbol x}_{\mathbf R}\)  

\(s_1\)

\(y_{1(1)1},\ldots , y_{1(p)1}\)

\(y_{1(1)2},\ldots , y_{1(p)2}\)

\(\cdots\)

\(y_{1(1)R},\ldots , y_{1(p)R}\)

\(s_2\)

\(y_{2(1)1},\ldots , y_{2(p)1}\)

\(y_{2(1)2},\ldots , y_{2(p)2}\)

\(\cdots\)

\(y_{2(1)R},\ldots , y_{2(p)R}\)

\(\cdots\)

\(\cdots\)

\(\cdots\)

\(\cdots\)

\(\cdots\)

\(s_n\)

\(y_{n(1)1},\ldots , y_{n(p)1}\)

\(y_{n(1)2},\ldots , y_{n(p)2}\)

\(\cdots\)

\(y_{n(1)R},\ldots , y_{n(p)R}\)