A Novel Framework Using Structured Robustness Score in Keyword Quries Over Database by Feedback Algorithm and Profile Migration Scheme
Keywords:
Inquiry Performance, Question Effectiveness, Magic Word Query, Robustness, DatabasesAbstract
Magic word questions on data bases offer simple accessibility to data, however for the most part endure from low positioning quality, i.e., low exactitude and/at that point again recall, as demonstrated in recent benchmarks. It’d be accommodating to spot questions that square measure presumably to own low positioning quality to make strides the customer satisfaction. at that point again example, the framework could recommend to the customer diverse questions at that point again such onerous queries.. We set forth a high-principled framework and proposed novel calculations to live the degree of the issue of a question over a dB, exploitation the positioning strength principle. Supported our framework, we tend to proposture novel calculations that with proficiency anticipate the adequacy of a magic word question. Our intensive tests show that the calculations anticipate the issue of a question with comparatively low errors and negligible time overheads.
References
I. F. Akyildiz, X. Wang, and W. Wang, “Wireless Mesh Networks: A Survey”, Computer Networks and ISDN Systems, Vol.47, Issue-2, 2005, pp.445-487.
I. F. Akyildiz, and X. Wang, “A Survey on Wireless Mesh Networks”, IEEE Radio Communications, Vol.43, Issue-3, 2005, pp.23-30.
M. Lee et al., “Emerging Standards for Wireless Mesh Technology”, IEEE Wireless Communications, Vol.13, Issue-4, 2006, pp.56-63.
N.B. Salem, and J-P Hubaux, “Securing Wireless Mesh Networks”, IEEE Wireless Communications, Vol.13, Issue-2, 2006, pp.50-55.
S. Han, E. Chang, L. Gao, T. Dillon, T., Taxonomy of Attacks on Wireless Sensor Networks, in the Proceedings of the 1st European Conference on Computer Network Defence (EC2ND), University of Glamorgan, UK, Springer Press, SpringerLink Date: December 2007.
C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks 1, 2003, pp. 293-315.
Y. Yang, Y. Gu, X. Tan and L. Ma, “A New Wireless Mesh Networks Authentication Scheme Based on Threshold Method,” 9th International Conference for Young Computer Scientists (ICYCS-2008), 2008, pp. 2260-2265
Tanaka, A. ; Miyazaki, T.,” Hardware Accelerator for BLAST”. Published in:Embedded Multicore Socs (MCSoC), 2012 IEEE 6th International Symposium onDate of Conference:20-22 Sept. 2012 Page(s):16 – 22.
Woojay Jeon,” Efficient speech indexing and search for embedded devices using uniterms”. Published in:Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference of Date of Conference:19-24 April 2000 Page(s):1297 – 1300.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
