SlideShare a Scribd company logo
1 of 6
PANIMALAR ENGINEERING COLLEGE
CHENNAI-600123
Enhancement in Algorithms to Fasten Search for Path Queries
over Frequently Updated Route Collections
Guide : Robinson Joel
Email ID: joelnazareth@gmail.com1, pgsarathy23@gmail.com
Presentation : GokulSarathy P
Abstract- The increase in the usage of GPS devices has resulted in the generation of large
amounts of geo data which are otherwise called points of interest (POI) or way points.
Users make use of such data to find new routes or to search through existing routes. Many
algorithms have also been proposed in this regard. The recent proposed algorithms are
called the RTS (Route Traversal Search) and LTS (Link Traversal Search) algorithms.
These algorithms make use of inverted indices and a few data structures for their execution.
These algorithms however keep track of only a limited number of entered routes. This
paper proposes an enhancement that can be applied to these algorithms that can result in
faster execution of queries without performing the entire search that is required in normal
scenarios.
Index terms – Route collections, path queries
_______________________________
1. INTRODUCTION
Several applications involve storing and querying large volumes of data sequences. For
instance, the recent advances in the infrastructure of Geographic InformationS ystems
(GIS) and geodata services, and the proliferation of GPS technology, have resulted in the
abundance of user or machine generated geodata in the form of point of interest (POI)
sequences. We refer to sets of such sequences as route collections.
As an example, consider people visiting Athens, having GPS-enabled devices to track their
sightseeing and create routes through interesting places. Fig. 1 shows two routes in Athens.
The first, r1, starts from the National Technical University of Athens and ends at the new
Museum of Acropolis. The second, r2, starts
from the Omonia Square and ends at the Acropolis Entrance. Websites such
asShareMyRoutes.comand TravelByGPS.com maintain a huge collection of routes, like
the above, with POIs from all over the world, that are frequently updated as users
continuously share new interesting routes.
Given the availability of large route collections, the problem of identifying paths on the
route collection arises frequently. Given a route collection and two POIs, hereafter called
nodes, ns and nt, the path query returns a path, i.e., a sequence of nodes, that connects ns to
nt.
Figure 1: Examples of routes in a city
The existing work targets path query evaluation on large disk resident route collections that
are frequently updated. A route collection can be trivially transformed to a graph; hence,
path queries can be evaluated using standard graph search techniques. Such methods follow
one of two paradigms. The first employs graph traversal methods, such as depth first search
(DFS). The second compressesthe graph’s transitive closure, which contains reach ability
information, i.e., whether or not a path exists between any pair of nodes. Both paradigms
share their strengths and weaknesses. While the latter techniques are the fastest, they are
mostly suitable for data sets that are not frequently updated, or when the updates are
localized, since they require expensive precomputation. On the other hand, the former are
easily maintainable, but are slow as they may visit a large part of the graph.
Based on these observations, two generic search-based paradigms were proposed that
exploit transitivity information within the routes, and differ in their expansion phase. For
each route that contains the current search node, route traversal search (RTS)expands the
search considering all successornodes in the route, while link traversal search (LTS)
considers only the next link. Both paradigms terminate when they reach a route that leads
to the target, and are faster than conventional search.
All the algorithms used in the above
paradigms make use of inverted
indices, which is a very effective
method to retrieve data. In this paper
we proposethat the addition of newly
evaluated routes to the database
indices will reduce the search time
required in subsequent searches. This
may result in increased memory space
requirement but the tradeoff would
result in faster execution of the
algorithms.
The remainder of this paper is
structured as follows. Section 2
establishes the necessary background.
Section 3 discusses the route traversal
search and the link traversal search
paradigms. Then, Section 4 discusses
the modification proposed in detail
and Section 5 concludes the paper.
2. PRELIMINARIES
Let N denote a set of nodes, e.g.,
POIs, waypoints, etc.
Definition 2.1 (Route).Aroute r(n1, .
. . , nk) over N is a sequence of distinct
nodes (n1, . . . , nk) ε N.
We denote the set of nodes in a route
r as nodes(r), and its length as Lr=
|nodes(r)|.
Definition 2.2 (Route collection).A
route collection R over N is a set of
routes {r1, . . . , rm} over N.
We denote all nodes in a route
collection as nodes(R).
Definition 2.3 (Link).A node in
nodes(R) is called link if it is
contained in at least two routes in R.
Fig. 2. (a) A route collection R and an answer
to PATH(s, t). (b) Routes graph GR.
Example 2.1. Fig. 2a illustrates a
route collection R = {r1, r2, r3, r4, r5}.
Nodes a, b, c, d, f, s, t are links.
Definition 2.4 (Path).A path on a
route collection R is a sequence of
distinct nodes (n1, . . . , nk) ε
nodes(R), such thatfor every pair of
consecutive nodes (ni, ni+1), ni+1 is the
immediatesuccessor of ni in some
route of R.
Note that a path may involve parts of
routes from R.
Definition 2.5 (PATH queries). Let
R be a route collection, and ns and nt
be two nodes in nodes(R). The path
query PATH(ns, nt) returns a path
from ns to nt on R.
Example 2.2. Consider the route
collection in Fig. 2a. Path(s, w, a, c, d,
f, y, t) is an answer to query PATH(s,
t),constructed by 1) visiting the nodes
w and a after s inr3, then, 2) using link
a to change from route r3 to r2 and visit
c and d, and finally, 3) using link d to
change from route r2 to r1, visit f, y
and the target t.
A route collection R can be easily
mapped to a graph by merging all
routes in R.
Definition 2.6 (Routes graph).The
routes graph of a route collection R is
a labeled directed graph GR(N,E),
where N = nodes(R), and an edge(ni,
nj, rk) ε E if there exists a route rkε
R with nj immediately after ni.
Example 2.3. The collection R in Fig.
2a is mapped to routes graph GR in
Fig. 2b. The different line styles of the
edges denote the five routes in R.
Storing the route identifiers as labels
is necessary to handle deletions.
Therefore, multiple edges between
two nodes may exist, e.g., (t, s, r1) and
(t, s, r5) in Example 2.3.Note that
connectivity from t to s is only lost
when both routes are removed from
the collection.
The next section describes the RTS
and the LTS algorithms briefly
followed by the modification
proposed.
3. RTS AND LTS ALGORITHMS
3.1. RTS Algorithm
The RTS algorithm takes as inputs: a
route collection R, the R-Index, the
sourcens and target node nt and
returns a path from ns to nt, if one
exists, or null otherwise. The
algorithm uses the following data
structures: 1) a search stack Q, 2) a
history set H, which contains all
nodes that have been pushed in Q, and
3) an ancestorset A, which stores the
direct ancestor of each node in Q. H is
used to avoid cycles during the
traversal, and A to extract answer
paths.
Note that RTS visits each node once
and, thus, there is a single entry per
node in A. RTS proceeds similarly to
depth-first search. Initially, the stack
Q and H contain sourcenode ns,
while A is empty. RTS proceeds
iteratively popping a single node nq
from Q during each iteration. The
algorithm terminates when there
exists a route rc that contains both nq
and target nt, such that nt comes after
nq.
3.2 LTS Algorithm
The Link Traversal Search algorithm
features a termination condition
equivalent to that of RTS:the search
stops as soonas LTS visits a node
(link) that lies on the same route with
the target. To traverse the routes and
check for termination, the algorithm
employs an augmented inverted file
on the route collections, termed R-
Index+), which associates a node with
the routes that contain it and the
immediately following link.
The LTS algorithm is used for
evaluating a PATH(ns, nt) query.
Similar to RTS, it uses stack Q, and
sets H and A. Initially, Q contains the
sourcens. LTS constructs a target list
T that contains entries <ri : oti> for all
routes that contain the target nt. Then,
LTS proceeds iteratively until Q is
depleted. At each iteration, assuming
the current search link popped from
the stack is nq, LTS examines each
entry of routes+[nq].The algorithm
terminates if there exists an entry in T
indicating that nq lies before nt on a
common route, a condition which is
identical to that of RTS. In that case,
ConstructPathcomposes an answer
path using the information in A.
Otherwise, if the next link node n+q
has not been previously visited, it is
pushed in the stack and in H. Further,
the entry <n+q ; nq : ri : oqi> is inserted
in A indicating that n+q is reached
from nq following route ri. The
position oqi is used by ConstructPath
to quickly identify the subroute of ri
between links nq and n+q if required.
4. PROPOSEDMODIFICATION
The main objective of this paper is to
provide an enhancement that can be
included in the existing algorithm to
fasten subsequent searches for the
users. It is proposedthat once a new
route has been evaluated as per the
user’s query, the algorithm save this
new route into the database. Once
saved any subsequentrequests by
users for the same path will not
require the execution of the algorithm.
The path needs just to be retrieved
from the database.
However, some users may give
queries that producevery long routes.
Since the length of a given route in
the database is fixed, any newly
evaluated path that exceeds this value of length is not to be added to the database.
This will ensure that the database is not being overly populated. Also since users
may request queries over any region, it can be asserted that over a period of time,
the database will contain all possibilities of routes of a given length. This will in
turn result in speeding up the evaluation of subsequentsearches, since the user
need only wait for the value to be retrieved from the database.
5. CONCLUSION
This paper aimed at providing an enhancement to the existing paper that can result
in reducing subsequent search time for repeated queries by different users. The
technique is analogous to cache memory used in computer systems, which does
require additional memory but speeds up the overall execution.
6. REFERENCES
[1] P. Bouros, S. Skiadopoulos, T. Dalamagas, and D. Sacharidis, “Evaluating Path
Queries over Frequently Updated Route Collections” IEEE Transactions on
Knowledge and Data Engineering, pp 1276-1290, 2012.
[2] P. Bouros, S. Skiadopoulos, T. Dalamagas, D. Sacharidis, and T.K. Sellis,
“Evaluating Reachability Queries over Path Collections,” Proc. Int’l Conf.
Scientific and Statistical Database Management (SSDBM), pp. 398-416, 2009.
[3] J. Cheng, J.X. Yu, X. Lin, H. Wang, and P.S. Yu, “FastComputation of
Reachability Labeling for Large Graphs,”Proc. Int’l Conf. Extending Database
Technology (EDBT), pp. 961-979, 2006.
[4] J. Cheng, J.X. Yu, X. Lin, H. Wang, and P.S. Yu, “FastComputing
Reachability Labelings for Large Graphs with High CompressionRate,” Proc. Int’l
Conf. Extending Database Technology (EDBT), pp. 193-204, 2008.
[5] R. Agrawal, A. Borgida, and H.V. Jagadish, “Efficient Management of Transitive
Relationships in Large Data and Knowledge Bases,” Proc. ACMSIGMOD Int’lConf.
Management of Data, pp. 253-262,1989.

More Related Content

Viewers also liked

Comportamientos
ComportamientosComportamientos
Comportamientosjejito
 
El amor en la poesía de miguel
El amor en la poesía de miguelEl amor en la poesía de miguel
El amor en la poesía de miguelanazarbega
 
Las Redes Sociales y su Utilidad 2016
Las Redes Sociales y su Utilidad 2016Las Redes Sociales y su Utilidad 2016
Las Redes Sociales y su Utilidad 2016jejito
 
Revisão puc inverno2015
Revisão puc inverno2015Revisão puc inverno2015
Revisão puc inverno2015Carlos Priante
 
Lista de exercícios X Hidrocarbonetos
Lista de exercícios X HidrocarbonetosLista de exercícios X Hidrocarbonetos
Lista de exercícios X HidrocarbonetosCarlos Priante
 
Software challenges in Human Resources
Software challenges in Human ResourcesSoftware challenges in Human Resources
Software challenges in Human ResourcesScriptura Engage
 
Architectural standards
Architectural standardsArchitectural standards
Architectural standardsWeam Adam
 

Viewers also liked (9)

Comportamientos
ComportamientosComportamientos
Comportamientos
 
JUNO
JUNOJUNO
JUNO
 
El amor en la poesía de miguel
El amor en la poesía de miguelEl amor en la poesía de miguel
El amor en la poesía de miguel
 
Las Redes Sociales y su Utilidad 2016
Las Redes Sociales y su Utilidad 2016Las Redes Sociales y su Utilidad 2016
Las Redes Sociales y su Utilidad 2016
 
О.А.Хоменко. Формування критичного мислення на уроках трудового навчання
О.А.Хоменко. Формування критичного мислення на уроках трудового навчанняО.А.Хоменко. Формування критичного мислення на уроках трудового навчання
О.А.Хоменко. Формування критичного мислення на уроках трудового навчання
 
Revisão puc inverno2015
Revisão puc inverno2015Revisão puc inverno2015
Revisão puc inverno2015
 
Lista de exercícios X Hidrocarbonetos
Lista de exercícios X HidrocarbonetosLista de exercícios X Hidrocarbonetos
Lista de exercícios X Hidrocarbonetos
 
Software challenges in Human Resources
Software challenges in Human ResourcesSoftware challenges in Human Resources
Software challenges in Human Resources
 
Architectural standards
Architectural standardsArchitectural standards
Architectural standards
 

Similar to Search Path Algorithm

Amtr the ant based qos aware multipath temporally ordered routing algorithm ...
Amtr  the ant based qos aware multipath temporally ordered routing algorithm ...Amtr  the ant based qos aware multipath temporally ordered routing algorithm ...
Amtr the ant based qos aware multipath temporally ordered routing algorithm ...csandit
 
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...cscpconf
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Performance Analysis of Minimum Hop Source Routing Algorithm for Two Dimensio...
Performance Analysis of Minimum Hop Source Routing Algorithm for Two Dimensio...Performance Analysis of Minimum Hop Source Routing Algorithm for Two Dimensio...
Performance Analysis of Minimum Hop Source Routing Algorithm for Two Dimensio...IOSR Journals
 
Trajectory Segmentation and Sampling of Moving Objects Based On Representativ...
Trajectory Segmentation and Sampling of Moving Objects Based On Representativ...Trajectory Segmentation and Sampling of Moving Objects Based On Representativ...
Trajectory Segmentation and Sampling of Moving Objects Based On Representativ...ijsrd.com
 
COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1
COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1
COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1aishwaryaarrao3
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...ijasuc
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...ijasuc
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...ijasuc
 
A Simulated Behavioral Study of DSR Routing Protocol Using NS-2
A Simulated Behavioral Study of DSR Routing Protocol Using NS-2A Simulated Behavioral Study of DSR Routing Protocol Using NS-2
A Simulated Behavioral Study of DSR Routing Protocol Using NS-2IJERA Editor
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
 
AN EFFECT OF USING A STORAGE MEDIUM IN DIJKSTRA ALGORITHM PERFORMANCE FOR IDE...
AN EFFECT OF USING A STORAGE MEDIUM IN DIJKSTRA ALGORITHM PERFORMANCE FOR IDE...AN EFFECT OF USING A STORAGE MEDIUM IN DIJKSTRA ALGORITHM PERFORMANCE FOR IDE...
AN EFFECT OF USING A STORAGE MEDIUM IN DIJKSTRA ALGORITHM PERFORMANCE FOR IDE...ijcsit
 
A fast re route method
A fast re route methodA fast re route method
A fast re route methodSandhiyaL
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networksijcnes
 

Similar to Search Path Algorithm (20)

Amtr the ant based qos aware multipath temporally ordered routing algorithm ...
Amtr  the ant based qos aware multipath temporally ordered routing algorithm ...Amtr  the ant based qos aware multipath temporally ordered routing algorithm ...
Amtr the ant based qos aware multipath temporally ordered routing algorithm ...
 
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Performance Analysis of Minimum Hop Source Routing Algorithm for Two Dimensio...
Performance Analysis of Minimum Hop Source Routing Algorithm for Two Dimensio...Performance Analysis of Minimum Hop Source Routing Algorithm for Two Dimensio...
Performance Analysis of Minimum Hop Source Routing Algorithm for Two Dimensio...
 
Trajectory Segmentation and Sampling of Moving Objects Based On Representativ...
Trajectory Segmentation and Sampling of Moving Objects Based On Representativ...Trajectory Segmentation and Sampling of Moving Objects Based On Representativ...
Trajectory Segmentation and Sampling of Moving Objects Based On Representativ...
 
COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1
COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1
COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1
 
Ijtra130510
Ijtra130510Ijtra130510
Ijtra130510
 
D0441722
D0441722D0441722
D0441722
 
Ge3411331139
Ge3411331139Ge3411331139
Ge3411331139
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
 
Ijcatr04051012
Ijcatr04051012Ijcatr04051012
Ijcatr04051012
 
A Simulated Behavioral Study of DSR Routing Protocol Using NS-2
A Simulated Behavioral Study of DSR Routing Protocol Using NS-2A Simulated Behavioral Study of DSR Routing Protocol Using NS-2
A Simulated Behavioral Study of DSR Routing Protocol Using NS-2
 
Flex ch
Flex chFlex ch
Flex ch
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
AN EFFECT OF USING A STORAGE MEDIUM IN DIJKSTRA ALGORITHM PERFORMANCE FOR IDE...
AN EFFECT OF USING A STORAGE MEDIUM IN DIJKSTRA ALGORITHM PERFORMANCE FOR IDE...AN EFFECT OF USING A STORAGE MEDIUM IN DIJKSTRA ALGORITHM PERFORMANCE FOR IDE...
AN EFFECT OF USING A STORAGE MEDIUM IN DIJKSTRA ALGORITHM PERFORMANCE FOR IDE...
 
routing algo n
routing algo                                nrouting algo                                n
routing algo n
 
A fast re route method
A fast re route methodA fast re route method
A fast re route method
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
 

Recently uploaded

CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfhenrik385807
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...NETWAYS
 
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSebastiano Panichella
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringSebastiano Panichella
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfhenrik385807
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Salam Al-Karadaghi
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )Pooja Nehwal
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptssuser319dad
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...NETWAYS
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝soniya singh
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxmavinoikein
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Krijn Poppe
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Pooja Nehwal
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSebastiano Panichella
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024eCommerce Institute
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@vikas rana
 
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)Basil Achie
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...henrik385807
 

Recently uploaded (20)

CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
 
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation Track
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software Engineering
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.ppt
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptx
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@
 
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
 

Search Path Algorithm

  • 1. PANIMALAR ENGINEERING COLLEGE CHENNAI-600123 Enhancement in Algorithms to Fasten Search for Path Queries over Frequently Updated Route Collections Guide : Robinson Joel Email ID: joelnazareth@gmail.com1, pgsarathy23@gmail.com Presentation : GokulSarathy P Abstract- The increase in the usage of GPS devices has resulted in the generation of large amounts of geo data which are otherwise called points of interest (POI) or way points. Users make use of such data to find new routes or to search through existing routes. Many algorithms have also been proposed in this regard. The recent proposed algorithms are called the RTS (Route Traversal Search) and LTS (Link Traversal Search) algorithms. These algorithms make use of inverted indices and a few data structures for their execution. These algorithms however keep track of only a limited number of entered routes. This paper proposes an enhancement that can be applied to these algorithms that can result in faster execution of queries without performing the entire search that is required in normal scenarios. Index terms – Route collections, path queries _______________________________ 1. INTRODUCTION Several applications involve storing and querying large volumes of data sequences. For instance, the recent advances in the infrastructure of Geographic InformationS ystems (GIS) and geodata services, and the proliferation of GPS technology, have resulted in the abundance of user or machine generated geodata in the form of point of interest (POI) sequences. We refer to sets of such sequences as route collections. As an example, consider people visiting Athens, having GPS-enabled devices to track their sightseeing and create routes through interesting places. Fig. 1 shows two routes in Athens. The first, r1, starts from the National Technical University of Athens and ends at the new Museum of Acropolis. The second, r2, starts
  • 2. from the Omonia Square and ends at the Acropolis Entrance. Websites such asShareMyRoutes.comand TravelByGPS.com maintain a huge collection of routes, like the above, with POIs from all over the world, that are frequently updated as users continuously share new interesting routes. Given the availability of large route collections, the problem of identifying paths on the route collection arises frequently. Given a route collection and two POIs, hereafter called nodes, ns and nt, the path query returns a path, i.e., a sequence of nodes, that connects ns to nt. Figure 1: Examples of routes in a city The existing work targets path query evaluation on large disk resident route collections that are frequently updated. A route collection can be trivially transformed to a graph; hence, path queries can be evaluated using standard graph search techniques. Such methods follow one of two paradigms. The first employs graph traversal methods, such as depth first search (DFS). The second compressesthe graph’s transitive closure, which contains reach ability information, i.e., whether or not a path exists between any pair of nodes. Both paradigms share their strengths and weaknesses. While the latter techniques are the fastest, they are mostly suitable for data sets that are not frequently updated, or when the updates are localized, since they require expensive precomputation. On the other hand, the former are easily maintainable, but are slow as they may visit a large part of the graph. Based on these observations, two generic search-based paradigms were proposed that exploit transitivity information within the routes, and differ in their expansion phase. For each route that contains the current search node, route traversal search (RTS)expands the search considering all successornodes in the route, while link traversal search (LTS) considers only the next link. Both paradigms terminate when they reach a route that leads to the target, and are faster than conventional search.
  • 3. All the algorithms used in the above paradigms make use of inverted indices, which is a very effective method to retrieve data. In this paper we proposethat the addition of newly evaluated routes to the database indices will reduce the search time required in subsequent searches. This may result in increased memory space requirement but the tradeoff would result in faster execution of the algorithms. The remainder of this paper is structured as follows. Section 2 establishes the necessary background. Section 3 discusses the route traversal search and the link traversal search paradigms. Then, Section 4 discusses the modification proposed in detail and Section 5 concludes the paper. 2. PRELIMINARIES Let N denote a set of nodes, e.g., POIs, waypoints, etc. Definition 2.1 (Route).Aroute r(n1, . . . , nk) over N is a sequence of distinct nodes (n1, . . . , nk) ε N. We denote the set of nodes in a route r as nodes(r), and its length as Lr= |nodes(r)|. Definition 2.2 (Route collection).A route collection R over N is a set of routes {r1, . . . , rm} over N. We denote all nodes in a route collection as nodes(R). Definition 2.3 (Link).A node in nodes(R) is called link if it is contained in at least two routes in R. Fig. 2. (a) A route collection R and an answer to PATH(s, t). (b) Routes graph GR. Example 2.1. Fig. 2a illustrates a route collection R = {r1, r2, r3, r4, r5}. Nodes a, b, c, d, f, s, t are links. Definition 2.4 (Path).A path on a route collection R is a sequence of distinct nodes (n1, . . . , nk) ε nodes(R), such thatfor every pair of consecutive nodes (ni, ni+1), ni+1 is the immediatesuccessor of ni in some route of R. Note that a path may involve parts of routes from R.
  • 4. Definition 2.5 (PATH queries). Let R be a route collection, and ns and nt be two nodes in nodes(R). The path query PATH(ns, nt) returns a path from ns to nt on R. Example 2.2. Consider the route collection in Fig. 2a. Path(s, w, a, c, d, f, y, t) is an answer to query PATH(s, t),constructed by 1) visiting the nodes w and a after s inr3, then, 2) using link a to change from route r3 to r2 and visit c and d, and finally, 3) using link d to change from route r2 to r1, visit f, y and the target t. A route collection R can be easily mapped to a graph by merging all routes in R. Definition 2.6 (Routes graph).The routes graph of a route collection R is a labeled directed graph GR(N,E), where N = nodes(R), and an edge(ni, nj, rk) ε E if there exists a route rkε R with nj immediately after ni. Example 2.3. The collection R in Fig. 2a is mapped to routes graph GR in Fig. 2b. The different line styles of the edges denote the five routes in R. Storing the route identifiers as labels is necessary to handle deletions. Therefore, multiple edges between two nodes may exist, e.g., (t, s, r1) and (t, s, r5) in Example 2.3.Note that connectivity from t to s is only lost when both routes are removed from the collection. The next section describes the RTS and the LTS algorithms briefly followed by the modification proposed. 3. RTS AND LTS ALGORITHMS 3.1. RTS Algorithm The RTS algorithm takes as inputs: a route collection R, the R-Index, the sourcens and target node nt and returns a path from ns to nt, if one exists, or null otherwise. The algorithm uses the following data structures: 1) a search stack Q, 2) a history set H, which contains all nodes that have been pushed in Q, and 3) an ancestorset A, which stores the direct ancestor of each node in Q. H is used to avoid cycles during the traversal, and A to extract answer paths. Note that RTS visits each node once and, thus, there is a single entry per node in A. RTS proceeds similarly to depth-first search. Initially, the stack Q and H contain sourcenode ns,
  • 5. while A is empty. RTS proceeds iteratively popping a single node nq from Q during each iteration. The algorithm terminates when there exists a route rc that contains both nq and target nt, such that nt comes after nq. 3.2 LTS Algorithm The Link Traversal Search algorithm features a termination condition equivalent to that of RTS:the search stops as soonas LTS visits a node (link) that lies on the same route with the target. To traverse the routes and check for termination, the algorithm employs an augmented inverted file on the route collections, termed R- Index+), which associates a node with the routes that contain it and the immediately following link. The LTS algorithm is used for evaluating a PATH(ns, nt) query. Similar to RTS, it uses stack Q, and sets H and A. Initially, Q contains the sourcens. LTS constructs a target list T that contains entries <ri : oti> for all routes that contain the target nt. Then, LTS proceeds iteratively until Q is depleted. At each iteration, assuming the current search link popped from the stack is nq, LTS examines each entry of routes+[nq].The algorithm terminates if there exists an entry in T indicating that nq lies before nt on a common route, a condition which is identical to that of RTS. In that case, ConstructPathcomposes an answer path using the information in A. Otherwise, if the next link node n+q has not been previously visited, it is pushed in the stack and in H. Further, the entry <n+q ; nq : ri : oqi> is inserted in A indicating that n+q is reached from nq following route ri. The position oqi is used by ConstructPath to quickly identify the subroute of ri between links nq and n+q if required. 4. PROPOSEDMODIFICATION The main objective of this paper is to provide an enhancement that can be included in the existing algorithm to fasten subsequent searches for the users. It is proposedthat once a new route has been evaluated as per the user’s query, the algorithm save this new route into the database. Once saved any subsequentrequests by users for the same path will not require the execution of the algorithm. The path needs just to be retrieved from the database. However, some users may give queries that producevery long routes. Since the length of a given route in the database is fixed, any newly
  • 6. evaluated path that exceeds this value of length is not to be added to the database. This will ensure that the database is not being overly populated. Also since users may request queries over any region, it can be asserted that over a period of time, the database will contain all possibilities of routes of a given length. This will in turn result in speeding up the evaluation of subsequentsearches, since the user need only wait for the value to be retrieved from the database. 5. CONCLUSION This paper aimed at providing an enhancement to the existing paper that can result in reducing subsequent search time for repeated queries by different users. The technique is analogous to cache memory used in computer systems, which does require additional memory but speeds up the overall execution. 6. REFERENCES [1] P. Bouros, S. Skiadopoulos, T. Dalamagas, and D. Sacharidis, “Evaluating Path Queries over Frequently Updated Route Collections” IEEE Transactions on Knowledge and Data Engineering, pp 1276-1290, 2012. [2] P. Bouros, S. Skiadopoulos, T. Dalamagas, D. Sacharidis, and T.K. Sellis, “Evaluating Reachability Queries over Path Collections,” Proc. Int’l Conf. Scientific and Statistical Database Management (SSDBM), pp. 398-416, 2009. [3] J. Cheng, J.X. Yu, X. Lin, H. Wang, and P.S. Yu, “FastComputation of Reachability Labeling for Large Graphs,”Proc. Int’l Conf. Extending Database Technology (EDBT), pp. 961-979, 2006. [4] J. Cheng, J.X. Yu, X. Lin, H. Wang, and P.S. Yu, “FastComputing Reachability Labelings for Large Graphs with High CompressionRate,” Proc. Int’l Conf. Extending Database Technology (EDBT), pp. 193-204, 2008. [5] R. Agrawal, A. Borgida, and H.V. Jagadish, “Efficient Management of Transitive Relationships in Large Data and Knowledge Bases,” Proc. ACMSIGMOD Int’lConf. Management of Data, pp. 253-262,1989.