SlideShare a Scribd company logo
1 of 3
Download to read offline
IJSRD - International Journal for Scientific Research & Development| Vol. 3, Issue 10, 2015 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 137
Efficient Filtering Algorithms for Location- Aware Publish/Subscribe
Dnyanda Pandharinath Bhosale1
Pallavi Bharat Dongare2
Pooja Prashant Vinchu3
Anjali
Sanjivanrao More4
1,2,3,4
Department of Computer Engineering
1,2,3,4
SBPCOE Indapur
Abstract— Location-based services have been mostly used
in many systems. preceding systems uses a pull model or
user-initiated model, where a user arrival a query to a server
which gives response with location-aware answers. To offer
outcomes to users with fast responses, a push model or
server-initiated model is flattering an important computing
model in the next-generation location-based services. In the
push model, subscribers arrive spatio-textual subscriptions
to fastening their curiosities, and publishers send spatio-
textual messages. It is used for a high-performance location-
aware publish/subscribe system to send publishers‟
messages to valid subscribers. In this paper, we find the
exploration happenstances that start in manipulative a
location-aware publish/subscribe system. We recommend an
R-tree based index by merging textual descriptions into R-
tree nodes. We design efficient filtering algorithms and
effective pruning techniques to accomplish high
performance. This method can support likewise conjunctive
queries and ranking queries.
Key words: LBS, Spatial-Context, MBR Filter, Token Filter,
Ranking Query, R t-Tree
I. INTRODUCTION
Location based services have involved important with more
curiosity from correspondingly industrial and academic
groups. Many LBS services such as Foursquare and Google
Maps have been broadly recognized because they can
convey users with location-aware actions. The preceding
LBS systems use a pull model or user-initiated model,
where a user arrive a query to a server which answers with
location aware outcome. For example, if a mobile user
wants to pursuit writer with their city, then they have a
query “writer name” to an LBS system, which proceeds
outcome based on user‟s location and keywords
II. LITERATURE SURVEY
In the base paper the author presents infected fruit part
detection using k-means clustering segmentation technique
[1]. K-means is used to decide the natural grouping of pixels
presents in the ima Reference entitled “Matching events in
a content-based subscription system”, included How to
professionally match high volumes of events conflicting to
large numbers of subscriptions is a key issue for large-scale
content-based publish/subscribe systems. In this paper we
extant an efficient and applied matching algorithm that uses
multi-dimensional indexing mechanism for rise a speed up
constraints query and exploits the covering relations
between constraints to minimize the excessive matching.
Experiments show that our algorithm is considerably more
efficient and scalable than other common used matching
algorithms. [1]
Reference entitled “Efficient filtering of XML
documents for selective dissemination of information”,
included Information Propagation applications are
acquisition improving popularity due to dramatic
improvements in communications bandwidth and ubiquity.
The sheer volume of data available necessary to the use of
selective nearly to propagation in order to discount emphasis
users with redundant information. The preceding
mechanisms for selective propagation typically rely on
simple keyword matching or "bag of words" information
ahead techniques. The advent of XML as a standard for
information transformation and the development of query
languages for XML data enables the development of more
advanced filtering mechanisms that take building
information into account. We have developed several index
organizations and search algorithms for performing efficient
filtering of XML documents for large-scale information
dissemination systems. In this paper we describe these
techniques and examine their performance across a range of
document, workload, and scale scenarios[2]
Reference entitled “Models and issues in data
stream systems” included In this overview paper we inspire
the need for and research issues get up from a new model of
data processing. In this model, data does not take the form
of tenacious relations, but rather arrives in multiple,
continuous, rapid, time-varying data streams. In addition to
revising preceding work related to data stream systems and
current projects in the area, the paper explores topics in
stream query languages, new requirements and encounters
in query processing, and algorithmic issues.[3]
Reference entitled “Retrieving top-k prestige based
relevant spatial web objects”, include The location-aware
keyword query gives ranked objects that are near a query
location and that have textual explanations that match query
keywords. This query presents intrinsic in many types of
mobile and old-style web services and applications, e.g.,
Yellow Pages and Maps services. Preceding work think
about the potential outcomes of such a query as being
sovereign when ranking them. However, a related outcome
object with nearby objects that are also related to the query
is likely to be desirable over a related object without
relevant nearby objects. The paper proposes the concept of
prestige-based relevance to fastening both the textual
relevance of an object to a query and the effects of adjacent
objects. Based on this, a new type of query, the Location-
aware top-k Prestige-based Text retrieval (LkPT) query, is
proposed that retrieves the top-k spatial web objects ranked
according to both prestige-based relevance and location
nearness. We propose two algorithms that compute LkPT
queries.[4]
III. PROPOSED SYSTEM
To address the encounters, a token-based R-tree index
organized an idea by in escalating each R-tree node with a
collection of tokens selected from subscriptions. Using the
Rt
-tree, a filter-and-verification framework is organized for
able to sending a message. To decrease the number of
tokens connected with Rt
-tree nodes, select some high-
Efficient Filtering Algorithms for Location- Aware Publish/Subscribe
(IJSRD/Vol. 3/Issue 10/2015/029)
All rights reserved by www.ijsrd.com 138
quality illustrative tokens from subscriptions and associate
them with Rt
-tree nodes.
IV. RT
-TREE ALGORITHM
Rt
- Tree Indexing
Input: S, A subscription set, message m
Output: R, Outcomes of m
Step 1: Publisher publishes message m
Step 2: Build Rt
- tree index by collecting all message m
from „n‟ publishers
{p1, p2,…pn }
Step 3: Initialize a HashMap M
Step 4: return Rt
-tree++
Rt
- Tree Pruning
Input: r, An Rt
-tree node, „m‟ a message, „R‟ outcome of m,
HashMap M
Output: R, Outcomes of m
Step 1: Visit flag = false;
Step 2: for each entry n in node r do
Step 3: Check location of node and filter message in
location R
Step 4: Check curiosity of node and filter message of
curiosity m
Step 5: prune outcome R and m
Step 6: Outcome of Rt
-tree prune to node.
V. LOCATION DETAILS
We consider location specific approach for
publish/subscribe system. The region is considered to be
rectangle, which we specify a numeric value for example 0-
100 meant for one location and 100-200 meant for other
location. Given a set of subscriptions S and a message m, a
location-aware publish/ subscribe system delivers m to si Є
S if si. R∩m. R≠f and si:T⊆ m:T.
A. R-TREE Indexing:
As the standard R-tree has no textual pruning power, a
token-based R-tree, called Rt
-tree, by mounting tokens of
subscriptions into R-tree nodes. Rt
-tree is a balanced search
tree. Each leaf node contains between b and B data entries,
where each entry is a subscription. Each internal node is
between b and B node entries. Each entry is a triple h Child,
MBR, TokenSeti, where Child is a pointer to its child node,
MBR is the minimum bounding rectangle of all admissions
within this child, and TokenSet is a set of tokens selected
from subscriptions. The outputs for subscriber are
processing using Rt
- tree indexing and then filtered for
further output processing.
B. MBR Filter:
Least bound rectangle filter for checks the location of the
subscriber. This model filters the outcomes Rt
-tree index by
examination the users location and publisher location. The
location based outcome set conveys more location specific
outcome, which does not consider the subscriber curiosities.
These outcomes are used for further processing to get
subscriber outcome.
C. Token Filter:
It is used to checks for the textual constraint. Subscriber‟s
curiosity is considered for token filter. This model filters the
outcomes Rt
-tree index by checking the users location and
publisher location. The location based outcome set carry
more curiosity specific outcome, which does not consider
the location of subscriber. These outcomes are used for
additional processing to get subscriber‟s location based
outcome.
D. Outcome Push To Subscriber:
In the push model, subscribers enter spatio-textual
subscriptions to fastening their curiosities, and publishers
send spatio-textual messages. The outcomes from the
upstairs two methods, MBR filter and token filter, spatio-
textual outcomes are filtered and send to subscriber. The
server impetuses the outcome to subscriber instead of
responding every time when subscriber queries.
VI. ADVANTAGES
Advantages of our proposed system are as follows,
1) It Reduces index sizes and also improves the
performance.
2) This method can support both conjunctive queries
and ranking queries.
3) Efficient filtering algorithms are used.
4) Effective pruning technique is used to improve the
performance.
5) It supports dynamic updates efficiently.
VII. APPLICATION
There are many applications using location-aware LBS
services:
1) First is Groupon, in which users arrive their troubled
nearby locations and keywords. For every Group on
message, the system provider delivers the message to
the users who may be integrally curiosity in the
message by notify the spatial nearness and textual
applicability between subscriptions and the message.
2) Second is location-aware AdSense, which escalation
the old-style AdSense to support location-aware LBS
services. The advertisers arrive their location-based
commercials in the system. The system forces
applicable advertisements to mobile clients depends
up on their locations and contents which they want to
find
3) Third is tweet delivery. Accept response of their
goods at a specific location from Twitter, market
analysts arrive their curiosities. For every tweet, the
system forces the tweet to valid analysts whose
spatio-textual subscriptions match the tweet.
VIII. SYSTEM ARCHITECTURE
Fig. 1: System Architecture
Efficient Filtering Algorithms for Location- Aware Publish/Subscribe
(IJSRD/Vol. 3/Issue 10/2015/029)
All rights reserved by www.ijsrd.com 139
IX. CONCLUSION
The location-aware publish/subscribe problem is studied. An
effective index structure algorithm is proposed Rt
-tree by
integrating textual description into R-tree nodes. A filter-
and-verification framework is proposed and devised
efficient filtering algorithms. Reducing the number of
tokens in each node is proposed, which not only reduces
index sizes but improves performance. An efficient
algorithm to directly find answers without the verification
step is defined.
ACKNOWLEDGE
We are thankful to our principal Dr. P. D. Nemade, project
guide and HOD of computer department prof. More A.S.,
and project coordinator prof. Gavali A. B., for their
guidance and support in the successful completion of this
study. We are also thankful to all our friends for their
positive support
REFERENCES
[1] M. K. Aguilera, R. E. Strom, D. C. Sturman, M.
Astley, and T. D. Chandra, “Matching events in a
content-based subscription system,” in Proc. 18th Annu.
ACM Symp. Principles Distrib. Comput., 1999, pp.
53–61.
[2] M. Altinel and M. J. Franklin, “Efficient filtering of
XML documents for selective dissemination of
information,” in Proc. 26th
Int. Conf. Very Large Data
Bases, 2000, pp. 53–64.
[3] B. Babcock, S. Babu, M. Datar, R. Motwani, and J.
Widom, “Models and issues in data stream systems,” in
Proc. 21st ACM SIGMOD-SIGACT-SIGART Symp.
Principles Database Syst., 2002, pp. 1–16.
[4] X. Cao, G. Cong, and C. S. Jensen, “Retrieving top-k
prestige based relevant spatial web objects,” Proc.
VLDB Endowment, vol. 3, no. 1, pp. 373–384, 2010.
[5] X. Cao, G. Cong, C. S. Jensen, and B. C. Ooi,
“Collective spatial keyword querying,” in Proc. ACM
SIGMOD Int. Conf. Manage. Data, 2011, pp. 373–384.
[6] X. Chen, Y. Chen, and F. Rao, “An efficient spatial
publish/ subscribe system for intelligent location-based
services,” in Proc. 2nd Int. Workshop Distrib. Event-
Based Syst., 2003, pp. 1–6.
[7] Y.-Y. Chen, T. Suel, and A. Markowetz, “Efficient
query processing in geographic web search engines,” in
Proc. ACM SIGMOD Int. Conf. Manage. Data, 2006,
pp. 277–288.
[8] G. Cong, C. S. Jensen, and D. Wu, “Efficient retrieval
of the top-k most relevant spatial web objects,” Proc.
VLDB, vol. 2, no. 1, pp. 337–348, 2009
[9] P. Costa and G. P. Picco, “Semi-probabilistic content-
based publish-subscribe,” in Proc. 25th IEEE Int. Conf.
Distrib. Comput. Syst., 2005, pp. 575–585.
[10]G. Cugola and J. E. M. de Cote, “On introducing
location awareness in publish-subscribe middleware,”
in Proc. IEEE Int. Conf. Distrib. Compute. Syst.
Workshops, 2005, pp. 377–382.

More Related Content

What's hot

A rough set based hybrid method to text categorization
A rough set based hybrid method to text categorizationA rough set based hybrid method to text categorization
A rough set based hybrid method to text categorizationNinad Samel
 
IRJET- Review on Information Retrieval for Desktop Search Engine
IRJET-  	  Review on Information Retrieval for Desktop Search EngineIRJET-  	  Review on Information Retrieval for Desktop Search Engine
IRJET- Review on Information Retrieval for Desktop Search EngineIRJET Journal
 
Approaches for Keyword Query Routing
Approaches for Keyword Query RoutingApproaches for Keyword Query Routing
Approaches for Keyword Query RoutingIJERA Editor
 
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Universitas Pembangunan Panca Budi
 
Approximating Source Accuracy Using Dublicate Records in Da-ta Integration
Approximating Source Accuracy Using Dublicate Records in Da-ta IntegrationApproximating Source Accuracy Using Dublicate Records in Da-ta Integration
Approximating Source Accuracy Using Dublicate Records in Da-ta IntegrationIOSR Journals
 
Improved Text Mining for Bulk Data Using Deep Learning Approach
Improved Text Mining for Bulk Data Using Deep Learning Approach Improved Text Mining for Bulk Data Using Deep Learning Approach
Improved Text Mining for Bulk Data Using Deep Learning Approach IJCSIS Research Publications
 
PhD Consortium ADBIS presetation.
PhD Consortium ADBIS presetation.PhD Consortium ADBIS presetation.
PhD Consortium ADBIS presetation.Giuseppe Ricci
 
Ensure Security and Scalable Performance in Multiple Relay Networks
Ensure Security and Scalable Performance in Multiple Relay NetworksEnsure Security and Scalable Performance in Multiple Relay Networks
Ensure Security and Scalable Performance in Multiple Relay NetworksEditor IJCATR
 
Survey on scalable continual top k keyword search in relational databases
Survey on scalable continual top k keyword search in relational databasesSurvey on scalable continual top k keyword search in relational databases
Survey on scalable continual top k keyword search in relational databaseseSAT Journals
 
25.ranking on data manifold with sink points
25.ranking on data manifold with sink points25.ranking on data manifold with sink points
25.ranking on data manifold with sink pointsVenkatesh Neerukonda
 
Survey on scalable continual top k keyword search in
Survey on scalable continual top k keyword search inSurvey on scalable continual top k keyword search in
Survey on scalable continual top k keyword search ineSAT Publishing House
 
Using Page Size for Controlling Duplicate Query Results in Semantic Web
Using Page Size for Controlling Duplicate Query Results in Semantic WebUsing Page Size for Controlling Duplicate Query Results in Semantic Web
Using Page Size for Controlling Duplicate Query Results in Semantic WebIJwest
 

What's hot (20)

A rough set based hybrid method to text categorization
A rough set based hybrid method to text categorizationA rough set based hybrid method to text categorization
A rough set based hybrid method to text categorization
 
IRJET- Review on Information Retrieval for Desktop Search Engine
IRJET-  	  Review on Information Retrieval for Desktop Search EngineIRJET-  	  Review on Information Retrieval for Desktop Search Engine
IRJET- Review on Information Retrieval for Desktop Search Engine
 
Approaches for Keyword Query Routing
Approaches for Keyword Query RoutingApproaches for Keyword Query Routing
Approaches for Keyword Query Routing
 
Ceis 1
Ceis 1Ceis 1
Ceis 1
 
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
 
Svv
SvvSvv
Svv
 
Approximating Source Accuracy Using Dublicate Records in Da-ta Integration
Approximating Source Accuracy Using Dublicate Records in Da-ta IntegrationApproximating Source Accuracy Using Dublicate Records in Da-ta Integration
Approximating Source Accuracy Using Dublicate Records in Da-ta Integration
 
PhD defense
PhD defense PhD defense
PhD defense
 
Improved Text Mining for Bulk Data Using Deep Learning Approach
Improved Text Mining for Bulk Data Using Deep Learning Approach Improved Text Mining for Bulk Data Using Deep Learning Approach
Improved Text Mining for Bulk Data Using Deep Learning Approach
 
PhD Consortium ADBIS presetation.
PhD Consortium ADBIS presetation.PhD Consortium ADBIS presetation.
PhD Consortium ADBIS presetation.
 
Ensure Security and Scalable Performance in Multiple Relay Networks
Ensure Security and Scalable Performance in Multiple Relay NetworksEnsure Security and Scalable Performance in Multiple Relay Networks
Ensure Security and Scalable Performance in Multiple Relay Networks
 
Survey on scalable continual top k keyword search in relational databases
Survey on scalable continual top k keyword search in relational databasesSurvey on scalable continual top k keyword search in relational databases
Survey on scalable continual top k keyword search in relational databases
 
A Comparison between Flooding and Bloom Filter Based Multikeyword Search in P...
A Comparison between Flooding and Bloom Filter Based Multikeyword Search in P...A Comparison between Flooding and Bloom Filter Based Multikeyword Search in P...
A Comparison between Flooding and Bloom Filter Based Multikeyword Search in P...
 
25.ranking on data manifold with sink points
25.ranking on data manifold with sink points25.ranking on data manifold with sink points
25.ranking on data manifold with sink points
 
Survey on scalable continual top k keyword search in
Survey on scalable continual top k keyword search inSurvey on scalable continual top k keyword search in
Survey on scalable continual top k keyword search in
 
adcom2013_submission_59
adcom2013_submission_59adcom2013_submission_59
adcom2013_submission_59
 
Using Page Size for Controlling Duplicate Query Results in Semantic Web
Using Page Size for Controlling Duplicate Query Results in Semantic WebUsing Page Size for Controlling Duplicate Query Results in Semantic Web
Using Page Size for Controlling Duplicate Query Results in Semantic Web
 
Sub1522
Sub1522Sub1522
Sub1522
 
Final Report(SuddhasatwaSatpathy)
Final Report(SuddhasatwaSatpathy)Final Report(SuddhasatwaSatpathy)
Final Report(SuddhasatwaSatpathy)
 
E0322035037
E0322035037E0322035037
E0322035037
 

Viewers also liked

Декларация Павла Назаренко за 2015 год
Декларация Павла Назаренко за 2015 годДекларация Павла Назаренко за 2015 год
Декларация Павла Назаренко за 2015 годВся Власть
 
Tethering Users to your App- The Guidelines
Tethering Users to your App- The GuidelinesTethering Users to your App- The Guidelines
Tethering Users to your App- The GuidelinesSuyati Technologies
 
Cloud Bursting with A10 Lightning ADS
Cloud Bursting with A10 Lightning ADSCloud Bursting with A10 Lightning ADS
Cloud Bursting with A10 Lightning ADSAkshay Mathur
 
20160602105914 peraturan menteri_ke
20160602105914 peraturan menteri_ke20160602105914 peraturan menteri_ke
20160602105914 peraturan menteri_keAndi Ditha J
 
Permenkes no-31-thn-2016 tentang registrasi, ijin praktek, ijin kerja tenaga ...
Permenkes no-31-thn-2016 tentang registrasi, ijin praktek, ijin kerja tenaga ...Permenkes no-31-thn-2016 tentang registrasi, ijin praktek, ijin kerja tenaga ...
Permenkes no-31-thn-2016 tentang registrasi, ijin praktek, ijin kerja tenaga ...Ulfah Hanum
 
SEO: Same as it Ever Was
SEO: Same as it Ever WasSEO: Same as it Ever Was
SEO: Same as it Ever WasMichael King
 
Jaime P.
Jaime P.Jaime P.
Jaime P.isarevi
 
St Valentine Poetry
St Valentine PoetrySt Valentine Poetry
St Valentine Poetryisarevi
 
Macbeth
Macbeth Macbeth
Macbeth isarevi
 

Viewers also liked (16)

La quebrada-del-diablo
La quebrada-del-diabloLa quebrada-del-diablo
La quebrada-del-diablo
 
Декларация Павла Назаренко за 2015 год
Декларация Павла Назаренко за 2015 годДекларация Павла Назаренко за 2015 год
Декларация Павла Назаренко за 2015 год
 
Tethering Users to your App- The Guidelines
Tethering Users to your App- The GuidelinesTethering Users to your App- The Guidelines
Tethering Users to your App- The Guidelines
 
International business
International businessInternational business
International business
 
Filosofia
FilosofiaFilosofia
Filosofia
 
Cen 03-2012-notification
Cen 03-2012-notificationCen 03-2012-notification
Cen 03-2012-notification
 
Cen 02-2015-notification
Cen 02-2015-notificationCen 02-2015-notification
Cen 02-2015-notification
 
Pelerinaj Muntele Athos
Pelerinaj Muntele AthosPelerinaj Muntele Athos
Pelerinaj Muntele Athos
 
Cloud Bursting with A10 Lightning ADS
Cloud Bursting with A10 Lightning ADSCloud Bursting with A10 Lightning ADS
Cloud Bursting with A10 Lightning ADS
 
20160602105914 peraturan menteri_ke
20160602105914 peraturan menteri_ke20160602105914 peraturan menteri_ke
20160602105914 peraturan menteri_ke
 
Permenkes no-31-thn-2016 tentang registrasi, ijin praktek, ijin kerja tenaga ...
Permenkes no-31-thn-2016 tentang registrasi, ijin praktek, ijin kerja tenaga ...Permenkes no-31-thn-2016 tentang registrasi, ijin praktek, ijin kerja tenaga ...
Permenkes no-31-thn-2016 tentang registrasi, ijin praktek, ijin kerja tenaga ...
 
SEO: Same as it Ever Was
SEO: Same as it Ever WasSEO: Same as it Ever Was
SEO: Same as it Ever Was
 
Jaime P.
Jaime P.Jaime P.
Jaime P.
 
St Valentine Poetry
St Valentine PoetrySt Valentine Poetry
St Valentine Poetry
 
Macbeth
Macbeth Macbeth
Macbeth
 
Entrega de tareas en moodle
Entrega de tareas en moodleEntrega de tareas en moodle
Entrega de tareas en moodle
 

Similar to Efficient Filtering Algorithms for Location- Aware Publish/subscribe

Efficient filtering algorithms for location aware publish subscribe
Efficient filtering algorithms for location aware publish subscribeEfficient filtering algorithms for location aware publish subscribe
Efficient filtering algorithms for location aware publish subscribeieeepondy
 
2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )
2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )
2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )SBGC
 
Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...
Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...
Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...IRJET Journal
 
IDENTIFICATION AND INVESTIGATION OF THE USER SESSION FOR LAN CONNECTIVITY VIA...
IDENTIFICATION AND INVESTIGATION OF THE USER SESSION FOR LAN CONNECTIVITY VIA...IDENTIFICATION AND INVESTIGATION OF THE USER SESSION FOR LAN CONNECTIVITY VIA...
IDENTIFICATION AND INVESTIGATION OF THE USER SESSION FOR LAN CONNECTIVITY VIA...ijcseit
 
Network Flow Pattern Extraction by Clustering Eugine Kang
Network Flow Pattern Extraction by Clustering Eugine KangNetwork Flow Pattern Extraction by Clustering Eugine Kang
Network Flow Pattern Extraction by Clustering Eugine KangEugine Kang
 
IRJET- Cluster Analysis for Effective Information Retrieval through Cohesive ...
IRJET- Cluster Analysis for Effective Information Retrieval through Cohesive ...IRJET- Cluster Analysis for Effective Information Retrieval through Cohesive ...
IRJET- Cluster Analysis for Effective Information Retrieval through Cohesive ...IRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
IRJET- Diverse Approaches for Document Clustering in Product Development Anal...
IRJET- Diverse Approaches for Document Clustering in Product Development Anal...IRJET- Diverse Approaches for Document Clustering in Product Development Anal...
IRJET- Diverse Approaches for Document Clustering in Product Development Anal...IRJET Journal
 
A Review on Resource Discovery Strategies in Grid Computing
A Review on Resource Discovery Strategies in Grid ComputingA Review on Resource Discovery Strategies in Grid Computing
A Review on Resource Discovery Strategies in Grid Computingiosrjce
 
Authenticating Location Based Skyline Queries in Mobile Environment
Authenticating Location Based Skyline Queries in Mobile EnvironmentAuthenticating Location Based Skyline Queries in Mobile Environment
Authenticating Location Based Skyline Queries in Mobile EnvironmentEditor IJCATR
 
IRJET- A Parameter Based Web Service Discovery with Underlying Semantics Profile
IRJET- A Parameter Based Web Service Discovery with Underlying Semantics ProfileIRJET- A Parameter Based Web Service Discovery with Underlying Semantics Profile
IRJET- A Parameter Based Web Service Discovery with Underlying Semantics ProfileIRJET Journal
 
Data mining projects topics for java and dot net
Data mining projects topics for java and dot netData mining projects topics for java and dot net
Data mining projects topics for java and dot netredpel dot com
 
Reactive Stream Processing for Data-centric Publish/Subscribe
Reactive Stream Processing for Data-centric Publish/SubscribeReactive Stream Processing for Data-centric Publish/Subscribe
Reactive Stream Processing for Data-centric Publish/SubscribeSumant Tambe
 
IRJET- Secure Data Access on Distributed Database using Skyline Queries
IRJET- Secure Data Access on Distributed Database using Skyline QueriesIRJET- Secure Data Access on Distributed Database using Skyline Queries
IRJET- Secure Data Access on Distributed Database using Skyline QueriesIRJET Journal
 
Web Service Discovery Mechanisms Based on IR Models
Web Service Discovery Mechanisms Based on IR ModelsWeb Service Discovery Mechanisms Based on IR Models
Web Service Discovery Mechanisms Based on IR ModelsIRJET Journal
 
IRJET- Foster Hashtag from Image and Text
IRJET-  	  Foster Hashtag from Image and TextIRJET-  	  Foster Hashtag from Image and Text
IRJET- Foster Hashtag from Image and TextIRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

Similar to Efficient Filtering Algorithms for Location- Aware Publish/subscribe (20)

Efficient filtering algorithms for location aware publish subscribe
Efficient filtering algorithms for location aware publish subscribeEfficient filtering algorithms for location aware publish subscribe
Efficient filtering algorithms for location aware publish subscribe
 
2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )
2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )
2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )
 
Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...
Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...
Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...
 
Ax34298305
Ax34298305Ax34298305
Ax34298305
 
IDENTIFICATION AND INVESTIGATION OF THE USER SESSION FOR LAN CONNECTIVITY VIA...
IDENTIFICATION AND INVESTIGATION OF THE USER SESSION FOR LAN CONNECTIVITY VIA...IDENTIFICATION AND INVESTIGATION OF THE USER SESSION FOR LAN CONNECTIVITY VIA...
IDENTIFICATION AND INVESTIGATION OF THE USER SESSION FOR LAN CONNECTIVITY VIA...
 
Network Flow Pattern Extraction by Clustering Eugine Kang
Network Flow Pattern Extraction by Clustering Eugine KangNetwork Flow Pattern Extraction by Clustering Eugine Kang
Network Flow Pattern Extraction by Clustering Eugine Kang
 
IRJET- Cluster Analysis for Effective Information Retrieval through Cohesive ...
IRJET- Cluster Analysis for Effective Information Retrieval through Cohesive ...IRJET- Cluster Analysis for Effective Information Retrieval through Cohesive ...
IRJET- Cluster Analysis for Effective Information Retrieval through Cohesive ...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
IRJET- Diverse Approaches for Document Clustering in Product Development Anal...
IRJET- Diverse Approaches for Document Clustering in Product Development Anal...IRJET- Diverse Approaches for Document Clustering in Product Development Anal...
IRJET- Diverse Approaches for Document Clustering in Product Development Anal...
 
A Review on Resource Discovery Strategies in Grid Computing
A Review on Resource Discovery Strategies in Grid ComputingA Review on Resource Discovery Strategies in Grid Computing
A Review on Resource Discovery Strategies in Grid Computing
 
B017240812
B017240812B017240812
B017240812
 
Authenticating Location Based Skyline Queries in Mobile Environment
Authenticating Location Based Skyline Queries in Mobile EnvironmentAuthenticating Location Based Skyline Queries in Mobile Environment
Authenticating Location Based Skyline Queries in Mobile Environment
 
IRJET- A Parameter Based Web Service Discovery with Underlying Semantics Profile
IRJET- A Parameter Based Web Service Discovery with Underlying Semantics ProfileIRJET- A Parameter Based Web Service Discovery with Underlying Semantics Profile
IRJET- A Parameter Based Web Service Discovery with Underlying Semantics Profile
 
Data mining projects topics for java and dot net
Data mining projects topics for java and dot netData mining projects topics for java and dot net
Data mining projects topics for java and dot net
 
Reactive Stream Processing for Data-centric Publish/Subscribe
Reactive Stream Processing for Data-centric Publish/SubscribeReactive Stream Processing for Data-centric Publish/Subscribe
Reactive Stream Processing for Data-centric Publish/Subscribe
 
IRJET- Secure Data Access on Distributed Database using Skyline Queries
IRJET- Secure Data Access on Distributed Database using Skyline QueriesIRJET- Secure Data Access on Distributed Database using Skyline Queries
IRJET- Secure Data Access on Distributed Database using Skyline Queries
 
Group Finder
Group FinderGroup Finder
Group Finder
 
Web Service Discovery Mechanisms Based on IR Models
Web Service Discovery Mechanisms Based on IR ModelsWeb Service Discovery Mechanisms Based on IR Models
Web Service Discovery Mechanisms Based on IR Models
 
IRJET- Foster Hashtag from Image and Text
IRJET-  	  Foster Hashtag from Image and TextIRJET-  	  Foster Hashtag from Image and Text
IRJET- Foster Hashtag from Image and Text
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 

More from IJSRD

#IJSRD #Research Paper Publication
#IJSRD #Research Paper Publication#IJSRD #Research Paper Publication
#IJSRD #Research Paper PublicationIJSRD
 
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...IJSRD
 
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...IJSRD
 
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEWPreclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEWIJSRD
 
Prevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolPrevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolIJSRD
 
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...IJSRD
 
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild SteelEvaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild SteelIJSRD
 
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnIJSRD
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemIJSRD
 
Diagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural NetworksDiagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural NetworksIJSRD
 
A Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion MiningA Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion MiningIJSRD
 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISIJSRD
 
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...IJSRD
 
Product Quality Analysis based on online Reviews
Product Quality Analysis based on online ReviewsProduct Quality Analysis based on online Reviews
Product Quality Analysis based on online ReviewsIJSRD
 
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy NumbersSolving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy NumbersIJSRD
 
Study of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data MiningStudy of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data MiningIJSRD
 
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...IJSRD
 
Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...IJSRD
 
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a RotavatorReview Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a RotavatorIJSRD
 
A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionIJSRD
 

More from IJSRD (20)

#IJSRD #Research Paper Publication
#IJSRD #Research Paper Publication#IJSRD #Research Paper Publication
#IJSRD #Research Paper Publication
 
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
 
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
 
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEWPreclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
 
Prevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolPrevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV Protocol
 
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
 
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild SteelEvaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
 
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osn
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
 
Diagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural NetworksDiagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural Networks
 
A Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion MiningA Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion Mining
 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFIS
 
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
 
Product Quality Analysis based on online Reviews
Product Quality Analysis based on online ReviewsProduct Quality Analysis based on online Reviews
Product Quality Analysis based on online Reviews
 
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy NumbersSolving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
 
Study of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data MiningStudy of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data Mining
 
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
 
Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...
 
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a RotavatorReview Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
 
A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots Prediction
 

Recently uploaded

MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 

Recently uploaded (20)

MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 

Efficient Filtering Algorithms for Location- Aware Publish/subscribe

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 3, Issue 10, 2015 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 137 Efficient Filtering Algorithms for Location- Aware Publish/Subscribe Dnyanda Pandharinath Bhosale1 Pallavi Bharat Dongare2 Pooja Prashant Vinchu3 Anjali Sanjivanrao More4 1,2,3,4 Department of Computer Engineering 1,2,3,4 SBPCOE Indapur Abstract— Location-based services have been mostly used in many systems. preceding systems uses a pull model or user-initiated model, where a user arrival a query to a server which gives response with location-aware answers. To offer outcomes to users with fast responses, a push model or server-initiated model is flattering an important computing model in the next-generation location-based services. In the push model, subscribers arrive spatio-textual subscriptions to fastening their curiosities, and publishers send spatio- textual messages. It is used for a high-performance location- aware publish/subscribe system to send publishers‟ messages to valid subscribers. In this paper, we find the exploration happenstances that start in manipulative a location-aware publish/subscribe system. We recommend an R-tree based index by merging textual descriptions into R- tree nodes. We design efficient filtering algorithms and effective pruning techniques to accomplish high performance. This method can support likewise conjunctive queries and ranking queries. Key words: LBS, Spatial-Context, MBR Filter, Token Filter, Ranking Query, R t-Tree I. INTRODUCTION Location based services have involved important with more curiosity from correspondingly industrial and academic groups. Many LBS services such as Foursquare and Google Maps have been broadly recognized because they can convey users with location-aware actions. The preceding LBS systems use a pull model or user-initiated model, where a user arrive a query to a server which answers with location aware outcome. For example, if a mobile user wants to pursuit writer with their city, then they have a query “writer name” to an LBS system, which proceeds outcome based on user‟s location and keywords II. LITERATURE SURVEY In the base paper the author presents infected fruit part detection using k-means clustering segmentation technique [1]. K-means is used to decide the natural grouping of pixels presents in the ima Reference entitled “Matching events in a content-based subscription system”, included How to professionally match high volumes of events conflicting to large numbers of subscriptions is a key issue for large-scale content-based publish/subscribe systems. In this paper we extant an efficient and applied matching algorithm that uses multi-dimensional indexing mechanism for rise a speed up constraints query and exploits the covering relations between constraints to minimize the excessive matching. Experiments show that our algorithm is considerably more efficient and scalable than other common used matching algorithms. [1] Reference entitled “Efficient filtering of XML documents for selective dissemination of information”, included Information Propagation applications are acquisition improving popularity due to dramatic improvements in communications bandwidth and ubiquity. The sheer volume of data available necessary to the use of selective nearly to propagation in order to discount emphasis users with redundant information. The preceding mechanisms for selective propagation typically rely on simple keyword matching or "bag of words" information ahead techniques. The advent of XML as a standard for information transformation and the development of query languages for XML data enables the development of more advanced filtering mechanisms that take building information into account. We have developed several index organizations and search algorithms for performing efficient filtering of XML documents for large-scale information dissemination systems. In this paper we describe these techniques and examine their performance across a range of document, workload, and scale scenarios[2] Reference entitled “Models and issues in data stream systems” included In this overview paper we inspire the need for and research issues get up from a new model of data processing. In this model, data does not take the form of tenacious relations, but rather arrives in multiple, continuous, rapid, time-varying data streams. In addition to revising preceding work related to data stream systems and current projects in the area, the paper explores topics in stream query languages, new requirements and encounters in query processing, and algorithmic issues.[3] Reference entitled “Retrieving top-k prestige based relevant spatial web objects”, include The location-aware keyword query gives ranked objects that are near a query location and that have textual explanations that match query keywords. This query presents intrinsic in many types of mobile and old-style web services and applications, e.g., Yellow Pages and Maps services. Preceding work think about the potential outcomes of such a query as being sovereign when ranking them. However, a related outcome object with nearby objects that are also related to the query is likely to be desirable over a related object without relevant nearby objects. The paper proposes the concept of prestige-based relevance to fastening both the textual relevance of an object to a query and the effects of adjacent objects. Based on this, a new type of query, the Location- aware top-k Prestige-based Text retrieval (LkPT) query, is proposed that retrieves the top-k spatial web objects ranked according to both prestige-based relevance and location nearness. We propose two algorithms that compute LkPT queries.[4] III. PROPOSED SYSTEM To address the encounters, a token-based R-tree index organized an idea by in escalating each R-tree node with a collection of tokens selected from subscriptions. Using the Rt -tree, a filter-and-verification framework is organized for able to sending a message. To decrease the number of tokens connected with Rt -tree nodes, select some high-
  • 2. Efficient Filtering Algorithms for Location- Aware Publish/Subscribe (IJSRD/Vol. 3/Issue 10/2015/029) All rights reserved by www.ijsrd.com 138 quality illustrative tokens from subscriptions and associate them with Rt -tree nodes. IV. RT -TREE ALGORITHM Rt - Tree Indexing Input: S, A subscription set, message m Output: R, Outcomes of m Step 1: Publisher publishes message m Step 2: Build Rt - tree index by collecting all message m from „n‟ publishers {p1, p2,…pn } Step 3: Initialize a HashMap M Step 4: return Rt -tree++ Rt - Tree Pruning Input: r, An Rt -tree node, „m‟ a message, „R‟ outcome of m, HashMap M Output: R, Outcomes of m Step 1: Visit flag = false; Step 2: for each entry n in node r do Step 3: Check location of node and filter message in location R Step 4: Check curiosity of node and filter message of curiosity m Step 5: prune outcome R and m Step 6: Outcome of Rt -tree prune to node. V. LOCATION DETAILS We consider location specific approach for publish/subscribe system. The region is considered to be rectangle, which we specify a numeric value for example 0- 100 meant for one location and 100-200 meant for other location. Given a set of subscriptions S and a message m, a location-aware publish/ subscribe system delivers m to si Є S if si. R∩m. R≠f and si:T⊆ m:T. A. R-TREE Indexing: As the standard R-tree has no textual pruning power, a token-based R-tree, called Rt -tree, by mounting tokens of subscriptions into R-tree nodes. Rt -tree is a balanced search tree. Each leaf node contains between b and B data entries, where each entry is a subscription. Each internal node is between b and B node entries. Each entry is a triple h Child, MBR, TokenSeti, where Child is a pointer to its child node, MBR is the minimum bounding rectangle of all admissions within this child, and TokenSet is a set of tokens selected from subscriptions. The outputs for subscriber are processing using Rt - tree indexing and then filtered for further output processing. B. MBR Filter: Least bound rectangle filter for checks the location of the subscriber. This model filters the outcomes Rt -tree index by examination the users location and publisher location. The location based outcome set conveys more location specific outcome, which does not consider the subscriber curiosities. These outcomes are used for further processing to get subscriber outcome. C. Token Filter: It is used to checks for the textual constraint. Subscriber‟s curiosity is considered for token filter. This model filters the outcomes Rt -tree index by checking the users location and publisher location. The location based outcome set carry more curiosity specific outcome, which does not consider the location of subscriber. These outcomes are used for additional processing to get subscriber‟s location based outcome. D. Outcome Push To Subscriber: In the push model, subscribers enter spatio-textual subscriptions to fastening their curiosities, and publishers send spatio-textual messages. The outcomes from the upstairs two methods, MBR filter and token filter, spatio- textual outcomes are filtered and send to subscriber. The server impetuses the outcome to subscriber instead of responding every time when subscriber queries. VI. ADVANTAGES Advantages of our proposed system are as follows, 1) It Reduces index sizes and also improves the performance. 2) This method can support both conjunctive queries and ranking queries. 3) Efficient filtering algorithms are used. 4) Effective pruning technique is used to improve the performance. 5) It supports dynamic updates efficiently. VII. APPLICATION There are many applications using location-aware LBS services: 1) First is Groupon, in which users arrive their troubled nearby locations and keywords. For every Group on message, the system provider delivers the message to the users who may be integrally curiosity in the message by notify the spatial nearness and textual applicability between subscriptions and the message. 2) Second is location-aware AdSense, which escalation the old-style AdSense to support location-aware LBS services. The advertisers arrive their location-based commercials in the system. The system forces applicable advertisements to mobile clients depends up on their locations and contents which they want to find 3) Third is tweet delivery. Accept response of their goods at a specific location from Twitter, market analysts arrive their curiosities. For every tweet, the system forces the tweet to valid analysts whose spatio-textual subscriptions match the tweet. VIII. SYSTEM ARCHITECTURE Fig. 1: System Architecture
  • 3. Efficient Filtering Algorithms for Location- Aware Publish/Subscribe (IJSRD/Vol. 3/Issue 10/2015/029) All rights reserved by www.ijsrd.com 139 IX. CONCLUSION The location-aware publish/subscribe problem is studied. An effective index structure algorithm is proposed Rt -tree by integrating textual description into R-tree nodes. A filter- and-verification framework is proposed and devised efficient filtering algorithms. Reducing the number of tokens in each node is proposed, which not only reduces index sizes but improves performance. An efficient algorithm to directly find answers without the verification step is defined. ACKNOWLEDGE We are thankful to our principal Dr. P. D. Nemade, project guide and HOD of computer department prof. More A.S., and project coordinator prof. Gavali A. B., for their guidance and support in the successful completion of this study. We are also thankful to all our friends for their positive support REFERENCES [1] M. K. Aguilera, R. E. Strom, D. C. Sturman, M. Astley, and T. D. Chandra, “Matching events in a content-based subscription system,” in Proc. 18th Annu. ACM Symp. Principles Distrib. Comput., 1999, pp. 53–61. [2] M. Altinel and M. J. Franklin, “Efficient filtering of XML documents for selective dissemination of information,” in Proc. 26th Int. Conf. Very Large Data Bases, 2000, pp. 53–64. [3] B. Babcock, S. Babu, M. Datar, R. Motwani, and J. Widom, “Models and issues in data stream systems,” in Proc. 21st ACM SIGMOD-SIGACT-SIGART Symp. Principles Database Syst., 2002, pp. 1–16. [4] X. Cao, G. Cong, and C. S. Jensen, “Retrieving top-k prestige based relevant spatial web objects,” Proc. VLDB Endowment, vol. 3, no. 1, pp. 373–384, 2010. [5] X. Cao, G. Cong, C. S. Jensen, and B. C. Ooi, “Collective spatial keyword querying,” in Proc. ACM SIGMOD Int. Conf. Manage. Data, 2011, pp. 373–384. [6] X. Chen, Y. Chen, and F. Rao, “An efficient spatial publish/ subscribe system for intelligent location-based services,” in Proc. 2nd Int. Workshop Distrib. Event- Based Syst., 2003, pp. 1–6. [7] Y.-Y. Chen, T. Suel, and A. Markowetz, “Efficient query processing in geographic web search engines,” in Proc. ACM SIGMOD Int. Conf. Manage. Data, 2006, pp. 277–288. [8] G. Cong, C. S. Jensen, and D. Wu, “Efficient retrieval of the top-k most relevant spatial web objects,” Proc. VLDB, vol. 2, no. 1, pp. 337–348, 2009 [9] P. Costa and G. P. Picco, “Semi-probabilistic content- based publish-subscribe,” in Proc. 25th IEEE Int. Conf. Distrib. Comput. Syst., 2005, pp. 575–585. [10]G. Cugola and J. E. M. de Cote, “On introducing location awareness in publish-subscribe middleware,” in Proc. IEEE Int. Conf. Distrib. Compute. Syst. Workshops, 2005, pp. 377–382.