A Novel Framework Using Structured Robustness Score in Keyword Quries Over Database by Feedback Algorithm and Profile Migration Scheme

Authors

  • K Sivaranjani Department of Computer Science, STET Women’s College, Mannargudi
  • V Geetha Department of Computer Science, STET Women’s College, Mannargudi

Keywords:

Inquiry Performance, Question Effectiveness, Magic Word Query, Robustness, Databases

Abstract

Magic word questions on data bases offer simple accessibility to data, however for the most part endure from low positioning quality, i.e., low exactitude and/at that point again recall, as demonstrated in recent benchmarks. It’d be accommodating to spot questions that square measure presumably to own low positioning quality to make strides the customer satisfaction. at that point again example, the framework could recommend to the customer diverse questions at that point again such onerous queries.. We set forth a high-principled framework and proposed novel calculations to live the degree of the issue of a question over a dB, exploitation the positioning strength principle. Supported our framework, we tend to proposture novel calculations that with proficiency anticipate the adequacy of a magic word question. Our intensive tests show that the calculations anticipate the issue of a question with comparatively low errors and negligible time overheads.

References

I. F. Akyildiz, X. Wang, and W. Wang, “Wireless Mesh Networks: A Survey”, Computer Networks and ISDN Systems, Vol.47, Issue-2, 2005, pp.445-487.

I. F. Akyildiz, and X. Wang, “A Survey on Wireless Mesh Networks”, IEEE Radio Communications, Vol.43, Issue-3, 2005, pp.23-30.

M. Lee et al., “Emerging Standards for Wireless Mesh Technology”, IEEE Wireless Communications, Vol.13, Issue-4, 2006, pp.56-63.

N.B. Salem, and J-P Hubaux, “Securing Wireless Mesh Networks”, IEEE Wireless Communications, Vol.13, Issue-2, 2006, pp.50-55.

S. Han, E. Chang, L. Gao, T. Dillon, T., Taxonomy of Attacks on Wireless Sensor Networks, in the Proceedings of the 1st European Conference on Computer Network Defence (EC2ND), University of Glamorgan, UK, Springer Press, SpringerLink Date: December 2007.

C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks 1, 2003, pp. 293-315.

Y. Yang, Y. Gu, X. Tan and L. Ma, “A New Wireless Mesh Networks Authentication Scheme Based on Threshold Method,” 9th International Conference for Young Computer Scientists (ICYCS-2008), 2008, pp. 2260-2265

Tanaka, A. ; Miyazaki, T.,” Hardware Accelerator for BLAST”. Published in:Embedded Multicore Socs (MCSoC), 2012 IEEE 6th International Symposium onDate of Conference:20-22 Sept. 2012 Page(s):16 – 22.

Woojay Jeon,” Efficient speech indexing and search for embedded devices using uniterms”. Published in:Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference of Date of Conference:19-24 April 2000 Page(s):1297 – 1300.

Downloads

Published

2025-11-10

How to Cite

[1]
K. Sivaranjani and V. Geetha, “A Novel Framework Using Structured Robustness Score in Keyword Quries Over Database by Feedback Algorithm and Profile Migration Scheme”, Int. J. Comp. Sci. Eng., vol. 3, no. 8, pp. 143–147, Nov. 2025.

Issue

Section

Review Article