Open Access   Article Go Back

A Novel Framework Using Structured Robustness Score in Keyword Quries Over Database by Feedback Algorithm and Profile Migration Scheme

K.Sivaranjani 1 , V.Geetha 2

Section:Review Paper, Product Type: Journal Paper
Volume-3 , Issue-8 , Page no. 143-147, Aug-2015

Online published on Aug 31, 2015

Copyright © K.Sivaranjani , V.Geetha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: K.Sivaranjani , V.Geetha, “A Novel Framework Using Structured Robustness Score in Keyword Quries Over Database by Feedback Algorithm and Profile Migration Scheme,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.143-147, 2015.

MLA Style Citation: K.Sivaranjani , V.Geetha "A Novel Framework Using Structured Robustness Score in Keyword Quries Over Database by Feedback Algorithm and Profile Migration Scheme." International Journal of Computer Sciences and Engineering 3.8 (2015): 143-147.

APA Style Citation: K.Sivaranjani , V.Geetha, (2015). A Novel Framework Using Structured Robustness Score in Keyword Quries Over Database by Feedback Algorithm and Profile Migration Scheme. International Journal of Computer Sciences and Engineering, 3(8), 143-147.

BibTex Style Citation:
@article{_2015,
author = {K.Sivaranjani , V.Geetha},
title = {A Novel Framework Using Structured Robustness Score in Keyword Quries Over Database by Feedback Algorithm and Profile Migration Scheme},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2015},
volume = {3},
Issue = {8},
month = {8},
year = {2015},
issn = {2347-2693},
pages = {143-147},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=625},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=625
TI - A Novel Framework Using Structured Robustness Score in Keyword Quries Over Database by Feedback Algorithm and Profile Migration Scheme
T2 - International Journal of Computer Sciences and Engineering
AU - K.Sivaranjani , V.Geetha
PY - 2015
DA - 2015/08/31
PB - IJCSE, Indore, INDIA
SP - 143-147
IS - 8
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2381 2300 downloads 2364 downloads
  
  
           

Abstract

Magic word questions on data bases offer simple accessibility to data, however for the most part endure from low positioning quality, i.e., low exactitude and/at that point again recall, as demonstrated in recent benchmarks. It’d be accommodating to spot questions that square measure presumably to own low positioning quality to make strides the customer satisfaction. at that point again example, the framework could recommend to the customer diverse questions at that point again such onerous queries.. We set forth a high-principled framework and proposed novel calculations to live the degree of the issue of a question over a dB, exploitation the positioning strength principle. Supported our framework, we tend to proposture novel calculations that with proficiency anticipate the adequacy of a magic word question. Our intensive tests show that the calculations anticipate the issue of a question with comparatively low errors and negligible time overheads.

Key-Words / Index Term

Inquiry Performance, Question Effectiveness, Magic Word Query, Robustness, Databases.

References

[1] I. F. Akyildiz, X. Wang, and W. Wang, “Wireless Mesh Networks: A Survey”, Computer Networks and ISDN Systems, Vol.47, Issue-2, 2005, pp.445-487.
[2] I. F. Akyildiz, and X. Wang, “A Survey on Wireless Mesh Networks”, IEEE Radio Communications, Vol.43, Issue-3, 2005, pp.23-30.
[3] M. Lee et al., “Emerging Standards for Wireless Mesh Technology”, IEEE Wireless Communications, Vol.13, Issue-4, 2006, pp.56-63.
[4] N.B. Salem, and J-P Hubaux, “Securing Wireless Mesh Networks”, IEEE Wireless Communications, Vol.13, Issue-2, 2006, pp.50-55.
[5] S. Han, E. Chang, L. Gao, T. Dillon, T., Taxonomy of Attacks on Wireless Sensor Networks, in the Proceedings of the 1st European Conference on Computer Network Defence (EC2ND), University of Glamorgan, UK, Springer Press, SpringerLink Date: December 2007.
[6] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks 1, 2003, pp. 293-315.
[7] Y. Yang, Y. Gu, X. Tan and L. Ma, “A New Wireless Mesh Networks Authentication Scheme Based on Threshold Method,” 9th International Conference for Young Computer Scientists (ICYCS-2008), 2008, pp. 2260-2265
[8] Tanaka, A. ; Miyazaki, T.,” Hardware Accelerator for BLAST”. Published in:Embedded Multicore Socs (MCSoC), 2012 IEEE 6th International Symposium onDate of Conference:20-22 Sept. 2012Page(s):16 – 22.
[9] Woojay Jeon,” Efficient speech indexing and search for embedded devices using uniterms”. Published in:Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference of Date of Conference:19-24 April 2000 Page(s):1297 – 1300.