A Novel Framework Using Structured Robustness Score in Keyword Quries Over Database by Feedback Algorithm and Profile Migration Scheme
K.Sivaranjani 1 , V.Geetha 2
Section:Review Paper, Product Type: Journal Paper
Volume-3 ,
Issue-8 , Page no. 143-147, Aug-2015
Online published on Aug 31, 2015
Copyright © K.Sivaranjani , V.Geetha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: K.Sivaranjani , V.Geetha, “A Novel Framework Using Structured Robustness Score in Keyword Quries Over Database by Feedback Algorithm and Profile Migration Scheme,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.143-147, 2015.
MLA Style Citation: K.Sivaranjani , V.Geetha "A Novel Framework Using Structured Robustness Score in Keyword Quries Over Database by Feedback Algorithm and Profile Migration Scheme." International Journal of Computer Sciences and Engineering 3.8 (2015): 143-147.
APA Style Citation: K.Sivaranjani , V.Geetha, (2015). A Novel Framework Using Structured Robustness Score in Keyword Quries Over Database by Feedback Algorithm and Profile Migration Scheme. International Journal of Computer Sciences and Engineering, 3(8), 143-147.
BibTex Style Citation:
@article{_2015,
author = {K.Sivaranjani , V.Geetha},
title = {A Novel Framework Using Structured Robustness Score in Keyword Quries Over Database by Feedback Algorithm and Profile Migration Scheme},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2015},
volume = {3},
Issue = {8},
month = {8},
year = {2015},
issn = {2347-2693},
pages = {143-147},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=625},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=625
TI - A Novel Framework Using Structured Robustness Score in Keyword Quries Over Database by Feedback Algorithm and Profile Migration Scheme
T2 - International Journal of Computer Sciences and Engineering
AU - K.Sivaranjani , V.Geetha
PY - 2015
DA - 2015/08/31
PB - IJCSE, Indore, INDIA
SP - 143-147
IS - 8
VL - 3
SN - 2347-2693
ER -
![]() |
![]() |
![]() |
2381 | 2300 downloads | 2364 downloads |
![](icone_social/Facebook.png)
![](icone_social/Twitter.png)
![](icone_social/Linkedin.png)
![](icone_social/Google+.png)
Abstract
Magic word questions on data bases offer simple accessibility to data, however for the most part endure from low positioning quality, i.e., low exactitude and/at that point again recall, as demonstrated in recent benchmarks. It’d be accommodating to spot questions that square measure presumably to own low positioning quality to make strides the customer satisfaction. at that point again example, the framework could recommend to the customer diverse questions at that point again such onerous queries.. We set forth a high-principled framework and proposed novel calculations to live the degree of the issue of a question over a dB, exploitation the positioning strength principle. Supported our framework, we tend to proposture novel calculations that with proficiency anticipate the adequacy of a magic word question. Our intensive tests show that the calculations anticipate the issue of a question with comparatively low errors and negligible time overheads.
Key-Words / Index Term
Inquiry Performance, Question Effectiveness, Magic Word Query, Robustness, Databases.
References
[1] I. F. Akyildiz, X. Wang, and W. Wang, “Wireless Mesh Networks: A Survey”, Computer Networks and ISDN Systems, Vol.47, Issue-2, 2005, pp.445-487.
[2] I. F. Akyildiz, and X. Wang, “A Survey on Wireless Mesh Networks”, IEEE Radio Communications, Vol.43, Issue-3, 2005, pp.23-30.
[3] M. Lee et al., “Emerging Standards for Wireless Mesh Technology”, IEEE Wireless Communications, Vol.13, Issue-4, 2006, pp.56-63.
[4] N.B. Salem, and J-P Hubaux, “Securing Wireless Mesh Networks”, IEEE Wireless Communications, Vol.13, Issue-2, 2006, pp.50-55.
[5] S. Han, E. Chang, L. Gao, T. Dillon, T., Taxonomy of Attacks on Wireless Sensor Networks, in the Proceedings of the 1st European Conference on Computer Network Defence (EC2ND), University of Glamorgan, UK, Springer Press, SpringerLink Date: December 2007.
[6] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks 1, 2003, pp. 293-315.
[7] Y. Yang, Y. Gu, X. Tan and L. Ma, “A New Wireless Mesh Networks Authentication Scheme Based on Threshold Method,” 9th International Conference for Young Computer Scientists (ICYCS-2008), 2008, pp. 2260-2265
[8] Tanaka, A. ; Miyazaki, T.,” Hardware Accelerator for BLAST”. Published in:Embedded Multicore Socs (MCSoC), 2012 IEEE 6th International Symposium onDate of Conference:20-22 Sept. 2012Page(s):16 – 22.
[9] Woojay Jeon,” Efficient speech indexing and search for embedded devices using uniterms”. Published in:Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference of Date of Conference:19-24 April 2000 Page(s):1297 – 1300.