Skip to main content

Advances, Systems and Applications

Table 3 An example of PESC

From: Privacy-aware and Efficient Student Clustering for Sport Training with Hash in Cloud Environment

Random vector

Hash table 1

Hash table 2

\(\phi _1\)

(0.1, 0.4, -0.5, 0.3, -0.8, -0.6, 0.4, 0.3)

(-0.1, 0.5, -0.3, 0.5, -0.7, -0.6, 0.2, 0.2)

\(\phi _2\)

(-0.7, 0.2, 0.4, -0.3, 0.5, 0.2, -0.9, -0.5)

(-0.8, 0.3, -0.5, 0.2, -0.9, -0.6, 0.4, 0.1)

\(\phi _3\)

(-0.2, 0.8, -0.6, 0.7, -0.3, -0.9, 0.5, 0.2)

(0.6, 0.3, -0.7, 0.8, -0.1, -0.3, 0.7, 0.3)

\(y_1 = v(s_1) * \phi\)

(-2.4, -1.5, -0.9)

(-2.4, -8.4, 3.4)

\(y_2 = v(s_2) * \phi\)

(1.6, -7, 3.5)

(1.4, -4.1, 8.6)

\(y_3 = v(s_3) * \phi\)

(-2.4, -2.7, 1.5)

(-1.3, -6.1, 6.6)

\(y_1\)

(0, 0, 0)

(0, 0, 1)

\(y_2\)

(1, 0, 1)

(1, 0, 1)

\(y_3\)

(0, 0, 1)

(0, 0, 1)