SlideShare a Scribd company logo
1 of 8
Download to read offline
Effective Method for searching substrings in large Databases
By using Query based approach
J.RamNaresh Yadav
M.Tech 2nd
year, Dept. of CSE, ASCET, Gudur, India
Email: ramnaresh167@gmail.com
Abstract – This paper mainly deal with the direct
substring search in long string and a query point in
the string for searching large database. Traditional
approaches only focuses on effective search using
approximation string search but they don’t
consider the point that how to find exact substring
query for searching in large database. We address
this problem in this paper and we develop an
effective algorithm for query – answering. First,
we develop an algorithm to answer a smallest
substring queries in O(n) time using suffix tree
index. Second we also compute unique substring
in every position of a given string. Once the
smallest unique substrings are pre-computed,
smallest unique substring queries can be answered
online in constant time.
Index terms- substring queries, Query-Answering,
suffix tree.
I. INTRODUCTION
You are searching the Complete Works of
William Shakespeare using query term “king”.
The term “king” occurs 1, 546 times in 1, 392
speeches within 40 works, even without counting
those related words like “king’s” and “kings”.
Using modern information retrieval techniques,
such as an inverted index, one can find all
occurrence positions of a query word easily. How
can a search engine, however, present an
informative list of the search results? Showing all
occurrence positions. On the one hand, if the
length is short, some snippets may be identical and
thus those occurrences still cannot be
distinguished.
A smarter way is to present for each
occurrence a smallest snippet that contains the
query term and is different from all other snippets
of the query term. The above simple yet effective
application in document search introduces an
interesting novel problem to be tackled in this
paper. Given a (long) string S and a query point q
in S, we want to conduct a smallest unique
substring query that finds a smallest unique
substring containing q.
Shortest unique substring queries have
many potential applications. In addition to the
above document search example, shortest unique
substring queries can be used in bioinformatics.
Moreover, finding shortest unique substrings on
DNA sequences can help polymerase chain
reaction (PCR) primer design in molecule biology.
Also, it can help to identify unique DNA
signatures of closely related species or organisms.
The shortest unique substring of the event under
INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
108
investigation may serve as a concrete working
base of the event context.
Answering shortest unique substring
queries efficiently is far from trivial. A brute-force
(heuristic) search may easily lead to cost in time
quadratic to the length of the string, which is
unacceptable in practice when the string is long
and queries are expected to be answered online.
In this paper, we address the problem of answering
shortest unique substring queries from the
algorithmic point of view and make several
contributions. First, we model shortest unique
substring queries and explore their properties
thoroughly. The properties clearly distinguish
shortest unique substring queries from the existing
related problems, such as computing global
minimal substrings.
Second, we present an algorithm to
answer a shortest unique substring query in O(n)
time using a suffix tree index, which can be
constructed in O(n) time and space, where n is the
length of string S.
Third, we show that, using O(n · h) time
and O(n) space, we can compute a shortest unique
substring for every position in a given string,
where h is variable theoretically in O(n) but on
real data sets often much smaller than n and can be
treated as a constant.
II. SMALLEST UNIQUE SUBSTRING QUERIES
In this section, we formulate the shortest
unique substring queries, and discuss the
properties of several critical concepts.
A. Smallest Unique Substring Queries
Let S be the string of length n. Denoted by
S[i] the value of i-th position of S and S[i,j] =
S[i]….S[j] the substring at position i and ending at
position j. Substring starting at position p. if two
string are identical, denoted by X = Y, and for
every 1 ≤ ≤ | |, [ ] = 	 [ ]. X is called a
substring of Y. we call X a proper substring of Y,
denoted by ⊂ , 	 ⊆ 	 	 ≠ .
Definition 1 (Minimal unique Substring (MUS)):
A substring S[i, j] is unique in S if there doen not
exist another substring S[ ′
, ′
] such that S[i,j] =
S[ ′
, ′
]. S[i,j]is called a minimal unique substring
if S[i, j] is unique and there is not any proper
substring of S[i, j] that is also unique.
Definition 2 (small unique Substring (SUS)) :
Given a string S and a position p in S, substring
S[i, j] is a small unique substring at position p if
S[i,j] is unique and contains p, and there does not
exists another unique substring S[ ′
, ′
] such that
S[ ′
, ′
] is also contains p and ′
− ′
< − .
Definition 3 (Problem definition): Given a String
S and a position p, the small unique substring
query (SUSQ) is to find a SUS at position p. Any
number in SUS (p) is valid answer.
In our algorithm design, we often consider two
types of unique substring that may be candidates
of SUSs. We give the definitions here and will
pursue further discussion later.
Definition 4 Given a string S and a Position p in S,
a substring S[p, j] is called the left-bound SUS
(LSUS) position p, denoted by LSUS(p), if S[p, j]
is unique and no other substring [ , ′
] is also
INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
109
unique for ≤ ′
< . Symmetrically, [ , ] is
called the right-bound SUS (RSUS) for position p,
denoted by RSUS(p), if [ , ] is unique and no
other substring [ ′
, ] is also unique for < ′
≤
.
Moreover, we define the left SUS be the
SUS whose starting point is smallest, denoted by
leftmost-SUS(p).
Figure 1 shows the relationship among
LSUS (p), RSUS(p) and the MUSs contain p.
Figure 2 illustrates the concept of leftmost SUS.
Figure1. The relationship among three cases
Figure2. The leftmost SUS at a position p.
It is easy to see the following property.
Property 1 (LSUS and RSUS): Given a string S, for
every position p in S, LSUS (p) and RSUS(p), if
exist, are respectively. In some cases, LSUSs or
RSUSs may not exist. Moreover, position p in S,
LSUSs or RSUSs may not be SUSs.
III. QUERY ANSWERING USING SUFFIX TREES
In this section, we first review suffix tree
and the construction. Then we discuss how to use
a suffix tree as index to answer smallest unique
substring queries.
A. Suffix Trees and Construction
A suffix tree is data structure that
concisely records all possible suffixes of a given
string allows fast string search operations. A string
S of length n suffixes S[i,n], i=1, …..,n. in the
suffix tree of S, each edge represents a substring S,
and a path from the root to a leaf node represents
exactly on suffix of S.
Ukkonen’s proposed a well known suffix
tree construction method that requires only linear
time and space when the alphabet size of a string
is a constant. Taking S=11011001 as an example,
we briefly show to construct its suffix tree as
shown in Figure 3, using Ukkonen’s algorithm.
Figure3. The suffix tree of S= 11011001
The construction procedure is illustrated in Figure
4.
Figure 4 The construction of suffix tree
S = 11011001.
INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
110
To extend the suffix tree of S[1, i] to S[1,
i+1] we need to extend S[j,i] for 1 ≤ ≤ , S[i+1].
There are three possible cases.
1) [ , ] ends at a leaf node. Then, we pad
[ + 1] to the corresponding leaf edge.
2) [ , ] does not end at a leaf node but followed
by [ + 1]. Then, we split the edge and creat
a new node.
3) [ , ] does not end at a leaf node but followed
[ + 1]. In this case, we do not need to do
anything.
When we expand the tree from j = 1 to j =
I during phase i+1, the occurrences of this three
phases follow some properties. First, after case 2
or case 3 happen, and then case 1 will never
happens. With these properties, once we meet case
3 at step j of phase i, we can immediately finish
the current phase and start the phase i+1 at step j.
To ensure O(n) construction time,
ukkonne’s algorithm uses the suffix links and the
skip/count technique during the tree construction.
A suffix link is a directed path from an internal
node associated with substring S [i, j] to another
internal node associated with substring S[i+1,j],
which allows fast jump to the next extension point
in the tree. The skip/count technique enables us to
add the new character S[i+1] at phase i+1 quickly.
To save more space, instead of storing copies of
substrings, we label edges using start and end
indexes. To end index of a leaf edge is omitted and
denoted by− . Finally, an end symbol $ is padded
at each path as a leaf node. As a result, the space
used for a suffix tree is reduced to O(n).
B. Query Answering Using Suffix Trees
Given a string S, we first build its suffix
tree in O(n) space and O(n) time using Ukkonen’s
algorithm. We further store all leaf node into an
array so that we can access a specific leaf node
Leaf(i), its edge Edge(Leaf(i)) and its associated
string Sedge(Leaf(i)) in constant time.
We can use the suffix tree to get LSUS (p)
in constant time, as shown in Algorithm 1.
Algorithm 1 the LSUS finding algorithm
Input: string S[1, n], a position p, and the suffix
tree T of S
Output: LSUS (p)
1. Find the leaf node of S[p, n] in T;
//The leaf node can be indexed during the
construction of the suffix tree, so the access to the
leaf node costs O(1) time
2. If the label of leaf edge is $ then return null;
3. end if
4. l←the length of the lablel of the leaf edge;
// the padded terminal charater is not counted into
the length of the leaf edge.
5. Return [ , − + 1]
We first target at the corresponding leaf
node, of p in the suffix tree. Backtracking along
the leaf node, we meet an internal node. Base on
the property of the suffix tree, the represented
string from the root to this internal node is a
common prefix of different suffixes.
With LSUS (p), we can now find a SUS(Smallest
Unique Substring) containing position p as shown
in Algorithm 2.
INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
111
Algorithm 2 the baseline SUS finding algorithm
Input: string S, a position p, and the suffix tree
T of S
Output: the leftmost SUS containing position p
1. Find LSUS (p)
2. if ( ) ≠ them
3. 	 [ , ] be ( );
4. else
5. 						 	 [ , ] be [1, ];
6. else if
7. for k← p-1; k>0 and − ≤ − ; ←
− 1 do
8. if LSUS(k) is null then continue;
9. end if
10. 	 [ , ] be the LSUS (k);
11. 	 < then ← p;
12. end if
13. if − ≤ − 1 then = ; = ,
14. end if
15. End for
16. Return S[i,j];
IV. A CONSTANT TIME ONLINE QUERY
ANSWERING ALGORITHM
In this section, we develop a method that
pre-computes the leftmost SUS for every position
using linear space. Then, online query answering
can be conducted in constant time.
A. Ideas
We first observe that a smallest unique
substring must fall into three cases: a MUS, a
LSUS, or a RSUS. This can be achieving by using
various theorems. In this paper, we briefly define
theorem which are useful.
Theorem 1 Given a string S and a position p in S,
if [ , ]is a SUS at portion p but not a MUS, then
either i = p or j = p.
Theorem 2 indicates that, by one scan of S and
obtain LSUS at each position, we can find all
MUSs and LSUSs that are not MUSs. To
determine whether a SUS is a RSUSs we have the
following result.
Theorem 3 Given a string S and a position p, a
substring [ , ] 	 ( ) if and only only if
[ , ] contains only one MUS [ , ]( ≤ ).
B. The Framework
Given a string S, our algorithm first
constructs a suffix tree. This takes (| |) time and
(| |) space. For each position p, algorithm
maintains a currently shortest MUS that contains
position p, denoted by p.cand. It also takes (| |)
space to store of the nMUS obtained at the last
position. Therefore, our algorithm needs only
(| |) space overall.
Algorithm 3 shows the pseudo-code of our
method.
Algorithm 3 the pre-computation algorithm.
Input: string s
Output: a SUS for each position 1 ≤ ≤ | |
1. Build a suffix tree for String S;
2. Initialize . ← for 1 ≤ ≤
	| |;
3. Output LSUS (1), denoted by [1, ] as
the SUS at Position 1;
4. ← 1, ← ;	
// use LSUS (1) to initialize the SUS at position
p-1
5. For p=2 to | | do
INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
112
6. Let [ , ] 	 ( ) obtained from the
suffix tree;
7. Let S[i, j] be the shortest substring among the
following 4 strings: (1) [ , ], (2)
. 	 	 . 	 ≠ , (3)
, 	 < and (4) [ , ]
if ≥ . If there are more than one
sybstring having the smallest length, pick the
left most one. Output [ , ] as a SUS at
position ;
8. suppose . = [ , ] 	 . 	 ≠ ;
9. if . 	 ≠ 	 	 > 	 ℎ
10. call PROPAGATE ( [ , ], + 1
11. end if
12. if ( ) = [ , ] is a MUS and is not
[ , ], and > 	 ℎ 	
call PROPAGTE( [ , ], + 1
13. end if
14. ← , ← ;
15. 	
At the beginning, we initialize p.cand to
null for all positions p. our algorithm scans string
S from the beginning to the end. At position 1,
LSUS (p) is the only SUS containing position 1.
At each position p (p>1), we compute LSUS (p)
using the suffix tree in constant time.
C. MUS Propagation
Although we reverse space to record the
smallest MUS for each position, we do not need to
explicitly store one MUS at each p.cand. Instead,
we only need to store at those positions p where
the smallest MUS may not be obtained by LSUS
(p) and RSUS (p). Algorithm 4 gives the pseudo-
code of the propagation procedure.
Algorithm 4 the Propagation procedure.
1: procedure PROPAGATE(MUS [ , ]), the
position k to propagate
2: 	 < 	 	 > then
3: k is not in the range of [i ,j]
4: return
5: else if . I null then
6: . 	 ← [ , ]; return
7: end if
8: supposed . = ′
, ′
;
9: 	 ′
− ′
> − 1 then . is longer than
[ , ]
10: . 	 ← [ , ]
11: 	 ′
> 	 ℎ [ , ] ends before .
12: call PROPAGATE ( ′
, ′
, + 1);
13: end if
14: else if ′
− ′
< − 	 	 ′
< then
15: . is shorter than [ , ] and ends before
[ , ]
16: call PROPAGATE ( [ , ], ′
+ 1);
17: else 		 [ , ] 	 . 	have	the	same	length
18: if < ′ then
19: . 	 ← [ , ]
20: call PROPAGATE( ′
, ′
, + 1)
21: else > ′
22: call PROPAGATE ( [ , ], ′
+ 1)
23: end if
24: end if
25: return
26: end procedure
INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
113
V. EXPECTED RESULTS
Suppose we want to conduct extensive
experiments on three real data sets and a group of
synthetic data sets to evaluate our methods.
Mainly we consider three real data sets will be
used in our experiments. the first data set is an
introduction of R language, appear of the FAQa on
the R project website (http://www.r-project.org/).
The second real data set is the genome sequence of
Mycoplasma genitalium, the pathogentic bacter-
ium that has one of the smallest genomes known
for any free-living organism. The third data is the
Bible.
For the R-sequence, we chose the
positions where the language name R appeared as
the query index. For a given sequence, we can
compute one SUS at each position. We want to
observe the distribution of the SUS counts over
different SUS lengths on the R-Sequence. In
addition to the original R-sequence itself, we
further generated three mutations with the same
string length using the alphabet set. For the
original R-sequence, most SUSs are of length of 3.
As the length increases, the corresponding counts
decreases.
VI. CONCLUSION
In this paper, we formulated a novel type
of interesting queries- smallest unique substring
queries, which have many applications. We
developed efficient algorithms. Furthermore, our
study leads to new direction on string queries. As
future work, it is interesting to extend and
generalize smallest unique substring queries.
REFERENCES
[1] B. Haubold, N. Pierstorff, F. M¨oller, and T.
Wiehe, “Genome comparison without alignment
using shortest unique substrings,” BMC
Bioinformat- ics, vol. 6, no. 123, May 2005.
[2] P. Weiner, “Linear pattern matching
algorithms,” in Proc. of the 14th Annual
Symposium on Switching and Automata Theory
(swat 1973), 1973, pp. 1–11.
[3] U. Manber and G. Myers, “Suffix arrays: a
new method for on-line string searches,” in
Proceedings of the first annual ACM-SIAM
symposium on Discrete algorithms, 1990, pp.
319–327.
[4] E. Ukkonen, “On-line construction of suffix
trees,” Algorithmica, vol. 14, pp. 249–260, 1995.
[5] M. Farach, “Optimal suffix tree construction
with large alphabets,” in Proc. of the 38th Annual
Symposium on Foundations of Computer Science
(FOCS’97), 1997.
[6] S. J. Puglisi, W. F. Smyth, and A. H. Turpin,
“A taxonomy of suffix array construction
algorithms,” ACM Computer Survey, vol. 39, no.
2, July 2007.
[7] G. Nong, S. Zhang, and W. H. Chan, “Linear
time suffix array construction using d-critical
substrings,” in Proc. 20th Annual
Symp.Combinatorial Pattern Matching, 2009, pp.
54–67.
[8] D. Cusfield, Algorithms on Strings, Trees, and
Sequences: Computer Science and Computational
Biology. Cambridge University Press, 1997.
INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
114
[9] L. Ilie and W. F. Smyth, “Minimum unique
substrings and maximum repeats,” Fundamenta
Informaticae, vol. 110, no. 1-4, pp. 183–195,
2011.
[10] K. Ye, Z. Jia, Y. Wang, P. Flicek, and R.
Apweiler, “Mining unique-m substrings from
genomes,” Journal of Proteomics and
Bioinformatics, vol. 3, no. 3, pp. 99–100, 2010.
AUTHORS
First Author
Second Author
INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
115

More Related Content

What's hot

What's hot (9)

On almost generalized semi continuous
On almost    generalized semi continuousOn almost    generalized semi continuous
On almost generalized semi continuous
 
New algorithm for solving mixed intuitionistic fuzzy assignment problem
New algorithm for solving mixed intuitionistic fuzzy assignment problem New algorithm for solving mixed intuitionistic fuzzy assignment problem
New algorithm for solving mixed intuitionistic fuzzy assignment problem
 
theory of computation lecture 01
theory of computation lecture 01theory of computation lecture 01
theory of computation lecture 01
 
Flat unit 2
Flat unit 2Flat unit 2
Flat unit 2
 
Partial compute function
Partial compute functionPartial compute function
Partial compute function
 
AI Lesson 11
AI Lesson 11AI Lesson 11
AI Lesson 11
 
50120140504018
5012014050401850120140504018
50120140504018
 
Fuzzy hypersoft sets and its weightage operator for decision making
Fuzzy hypersoft sets and its weightage operator for decision makingFuzzy hypersoft sets and its weightage operator for decision making
Fuzzy hypersoft sets and its weightage operator for decision making
 
Nl2422102215
Nl2422102215Nl2422102215
Nl2422102215
 

Viewers also liked

Iaetsd implementation of secure audit process
Iaetsd implementation of secure audit processIaetsd implementation of secure audit process
Iaetsd implementation of secure audit processIaetsd Iaetsd
 
Actividad de la película de lucy
Actividad de la película de lucyActividad de la película de lucy
Actividad de la película de lucy313838
 
Leren als arbeidsvoorwaarde - De grip arbeidsmarktdynamiek en leven lang lere...
Leren als arbeidsvoorwaarde - De grip arbeidsmarktdynamiek en leven lang lere...Leren als arbeidsvoorwaarde - De grip arbeidsmarktdynamiek en leven lang lere...
Leren als arbeidsvoorwaarde - De grip arbeidsmarktdynamiek en leven lang lere...Dialogues House
 
What were in your opinion the three main benefits of London hosting the 2012 ...
What were in your opinion the three main benefits of London hosting the 2012 ...What were in your opinion the three main benefits of London hosting the 2012 ...
What were in your opinion the three main benefits of London hosting the 2012 ...Comune di Venezia
 
Maxus Dijital Dünyaya Bakış Nisan 2013
Maxus Dijital Dünyaya Bakış Nisan 2013Maxus Dijital Dünyaya Bakış Nisan 2013
Maxus Dijital Dünyaya Bakış Nisan 2013Maxus Turkey
 
Iaetsd reducing security risks in virtual networks by
Iaetsd reducing security risks in virtual networks byIaetsd reducing security risks in virtual networks by
Iaetsd reducing security risks in virtual networks byIaetsd Iaetsd
 
Iaetsd real time implementation of railway
Iaetsd real time implementation of railwayIaetsd real time implementation of railway
Iaetsd real time implementation of railwayIaetsd Iaetsd
 
Iaetsd low power pulse triggered flipflop with
Iaetsd low power pulse triggered flipflop withIaetsd low power pulse triggered flipflop with
Iaetsd low power pulse triggered flipflop withIaetsd Iaetsd
 
Iaetsd secure data dissemination based on
Iaetsd secure data dissemination based onIaetsd secure data dissemination based on
Iaetsd secure data dissemination based onIaetsd Iaetsd
 
Iaetsd hierarchical fuzzy rule based classification
Iaetsd hierarchical fuzzy rule based classificationIaetsd hierarchical fuzzy rule based classification
Iaetsd hierarchical fuzzy rule based classificationIaetsd Iaetsd
 
Iaetsd design, engineerning and analysis
Iaetsd design, engineerning and analysisIaetsd design, engineerning and analysis
Iaetsd design, engineerning and analysisIaetsd Iaetsd
 
AACRAO 2015 - 3210 - Latest Developments in SIS
AACRAO 2015 - 3210 - Latest Developments in SISAACRAO 2015 - 3210 - Latest Developments in SIS
AACRAO 2015 - 3210 - Latest Developments in SISMichael Burke
 
Iaetsd literature review on efficient detection and filtering of high
Iaetsd literature review on efficient detection and filtering of highIaetsd literature review on efficient detection and filtering of high
Iaetsd literature review on efficient detection and filtering of highIaetsd Iaetsd
 
Proč UX? Ergonomie pro weby a e-shopy
Proč UX? Ergonomie pro weby a e-shopyProč UX? Ergonomie pro weby a e-shopy
Proč UX? Ergonomie pro weby a e-shopyIvo Kylián
 
Iaetsd literature review on traffic signal control system based on
Iaetsd literature review on traffic signal control system based onIaetsd literature review on traffic signal control system based on
Iaetsd literature review on traffic signal control system based onIaetsd Iaetsd
 

Viewers also liked (20)

Iaetsd implementation of secure audit process
Iaetsd implementation of secure audit processIaetsd implementation of secure audit process
Iaetsd implementation of secure audit process
 
Actividad de la película de lucy
Actividad de la película de lucyActividad de la película de lucy
Actividad de la película de lucy
 
Leren als arbeidsvoorwaarde - De grip arbeidsmarktdynamiek en leven lang lere...
Leren als arbeidsvoorwaarde - De grip arbeidsmarktdynamiek en leven lang lere...Leren als arbeidsvoorwaarde - De grip arbeidsmarktdynamiek en leven lang lere...
Leren als arbeidsvoorwaarde - De grip arbeidsmarktdynamiek en leven lang lere...
 
What were in your opinion the three main benefits of London hosting the 2012 ...
What were in your opinion the three main benefits of London hosting the 2012 ...What were in your opinion the three main benefits of London hosting the 2012 ...
What were in your opinion the three main benefits of London hosting the 2012 ...
 
Medios virtuales de aprendizaje
Medios virtuales de aprendizaje Medios virtuales de aprendizaje
Medios virtuales de aprendizaje
 
Maxus Dijital Dünyaya Bakış Nisan 2013
Maxus Dijital Dünyaya Bakış Nisan 2013Maxus Dijital Dünyaya Bakış Nisan 2013
Maxus Dijital Dünyaya Bakış Nisan 2013
 
Iaetsd reducing security risks in virtual networks by
Iaetsd reducing security risks in virtual networks byIaetsd reducing security risks in virtual networks by
Iaetsd reducing security risks in virtual networks by
 
Iaetsd real time implementation of railway
Iaetsd real time implementation of railwayIaetsd real time implementation of railway
Iaetsd real time implementation of railway
 
adararesume
adararesumeadararesume
adararesume
 
Iaetsd low power pulse triggered flipflop with
Iaetsd low power pulse triggered flipflop withIaetsd low power pulse triggered flipflop with
Iaetsd low power pulse triggered flipflop with
 
Iaetsd secure data dissemination based on
Iaetsd secure data dissemination based onIaetsd secure data dissemination based on
Iaetsd secure data dissemination based on
 
Iaetsd hierarchical fuzzy rule based classification
Iaetsd hierarchical fuzzy rule based classificationIaetsd hierarchical fuzzy rule based classification
Iaetsd hierarchical fuzzy rule based classification
 
Iaetsd design, engineerning and analysis
Iaetsd design, engineerning and analysisIaetsd design, engineerning and analysis
Iaetsd design, engineerning and analysis
 
AACRAO 2015 - 3210 - Latest Developments in SIS
AACRAO 2015 - 3210 - Latest Developments in SISAACRAO 2015 - 3210 - Latest Developments in SIS
AACRAO 2015 - 3210 - Latest Developments in SIS
 
Iaetsd literature review on efficient detection and filtering of high
Iaetsd literature review on efficient detection and filtering of highIaetsd literature review on efficient detection and filtering of high
Iaetsd literature review on efficient detection and filtering of high
 
Proč UX? Ergonomie pro weby a e-shopy
Proč UX? Ergonomie pro weby a e-shopyProč UX? Ergonomie pro weby a e-shopy
Proč UX? Ergonomie pro weby a e-shopy
 
Iaetsd literature review on traffic signal control system based on
Iaetsd literature review on traffic signal control system based onIaetsd literature review on traffic signal control system based on
Iaetsd literature review on traffic signal control system based on
 
Wiki manresa
Wiki   manresaWiki   manresa
Wiki manresa
 
Architecture evaluation
Architecture evaluationArchitecture evaluation
Architecture evaluation
 
2013HZ12018 final-dissertation-presentation
2013HZ12018 final-dissertation-presentation2013HZ12018 final-dissertation-presentation
2013HZ12018 final-dissertation-presentation
 

Similar to Iaetsd effective method for searching substrings in large databases

SPACE-EFFICIENT K-MER ALGORITHM FOR GENERALISED SUFFIX TREE
SPACE-EFFICIENT K-MER ALGORITHM FOR GENERALISED SUFFIX TREESPACE-EFFICIENT K-MER ALGORITHM FOR GENERALISED SUFFIX TREE
SPACE-EFFICIENT K-MER ALGORITHM FOR GENERALISED SUFFIX TREEijitcs
 
A taxonomy of suffix array construction algorithms
A taxonomy of suffix array construction algorithmsA taxonomy of suffix array construction algorithms
A taxonomy of suffix array construction algorithmsunyil96
 
Space Efficient Suffix Array Construction using Induced Sorting LMS Substrings
Space Efficient Suffix Array Construction using Induced Sorting LMS SubstringsSpace Efficient Suffix Array Construction using Induced Sorting LMS Substrings
Space Efficient Suffix Array Construction using Induced Sorting LMS Substringsijistjournal
 
Space Efficient Suffix Array Construction using Induced Sorting LMS Substrings
 Space Efficient Suffix Array Construction using Induced Sorting LMS Substrings  Space Efficient Suffix Array Construction using Induced Sorting LMS Substrings
Space Efficient Suffix Array Construction using Induced Sorting LMS Substrings ijistjournal
 
Data Representation of Strings
Data Representation of StringsData Representation of Strings
Data Representation of StringsProf Ansari
 
32 -longest-common-prefix
32 -longest-common-prefix32 -longest-common-prefix
32 -longest-common-prefixSanjeev Gupta
 
Text classification using Text kernels
Text classification using Text kernelsText classification using Text kernels
Text classification using Text kernelsDev Nath
 
Latent Semantic Indexing For Information Retrieval
Latent Semantic Indexing For Information RetrievalLatent Semantic Indexing For Information Retrieval
Latent Semantic Indexing For Information RetrievalSudarsun Santhiappan
 
Spatial Approximate String Keyword content Query processing
Spatial Approximate String Keyword content Query processingSpatial Approximate String Keyword content Query processing
Spatial Approximate String Keyword content Query processinginventionjournals
 
Suffix Tree and Suffix Array
Suffix Tree and Suffix ArraySuffix Tree and Suffix Array
Suffix Tree and Suffix ArrayHarshit Agarwal
 
Tim Maudlin: New Foundations for Physical Geometry
Tim Maudlin: New Foundations for Physical GeometryTim Maudlin: New Foundations for Physical Geometry
Tim Maudlin: New Foundations for Physical GeometryArun Gupta
 
presentation on important DAG,TRIE,Hashing.pptx
presentation on important DAG,TRIE,Hashing.pptxpresentation on important DAG,TRIE,Hashing.pptx
presentation on important DAG,TRIE,Hashing.pptxjainaaru59
 
My invited talk at the 2018 Annual Meeting of SIAM (Society of Industrial and...
My invited talk at the 2018 Annual Meeting of SIAM (Society of Industrial and...My invited talk at the 2018 Annual Meeting of SIAM (Society of Industrial and...
My invited talk at the 2018 Annual Meeting of SIAM (Society of Industrial and...Anirbit Mukherjee
 
An Optimal Approach For Knowledge Protection In Structured Frequent Patterns
An Optimal Approach For Knowledge Protection In Structured Frequent PatternsAn Optimal Approach For Knowledge Protection In Structured Frequent Patterns
An Optimal Approach For Knowledge Protection In Structured Frequent PatternsWaqas Tariq
 
An Optimal Solution For The Channel-Assignment Problem
An Optimal Solution For The Channel-Assignment ProblemAn Optimal Solution For The Channel-Assignment Problem
An Optimal Solution For The Channel-Assignment ProblemSarah Morrow
 
ECO_TEXT_CLUSTERING
ECO_TEXT_CLUSTERINGECO_TEXT_CLUSTERING
ECO_TEXT_CLUSTERINGGeorge Simov
 

Similar to Iaetsd effective method for searching substrings in large databases (20)

SPACE-EFFICIENT K-MER ALGORITHM FOR GENERALISED SUFFIX TREE
SPACE-EFFICIENT K-MER ALGORITHM FOR GENERALISED SUFFIX TREESPACE-EFFICIENT K-MER ALGORITHM FOR GENERALISED SUFFIX TREE
SPACE-EFFICIENT K-MER ALGORITHM FOR GENERALISED SUFFIX TREE
 
A taxonomy of suffix array construction algorithms
A taxonomy of suffix array construction algorithmsA taxonomy of suffix array construction algorithms
A taxonomy of suffix array construction algorithms
 
Space Efficient Suffix Array Construction using Induced Sorting LMS Substrings
Space Efficient Suffix Array Construction using Induced Sorting LMS SubstringsSpace Efficient Suffix Array Construction using Induced Sorting LMS Substrings
Space Efficient Suffix Array Construction using Induced Sorting LMS Substrings
 
Space Efficient Suffix Array Construction using Induced Sorting LMS Substrings
 Space Efficient Suffix Array Construction using Induced Sorting LMS Substrings  Space Efficient Suffix Array Construction using Induced Sorting LMS Substrings
Space Efficient Suffix Array Construction using Induced Sorting LMS Substrings
 
Data Representation of Strings
Data Representation of StringsData Representation of Strings
Data Representation of Strings
 
32 -longest-common-prefix
32 -longest-common-prefix32 -longest-common-prefix
32 -longest-common-prefix
 
3 Ayhan Esi.pdf
3 Ayhan Esi.pdf3 Ayhan Esi.pdf
3 Ayhan Esi.pdf
 
3 Ayhan Esi.pdf
3 Ayhan Esi.pdf3 Ayhan Esi.pdf
3 Ayhan Esi.pdf
 
A Study on the class of Semirings
A Study on the class of SemiringsA Study on the class of Semirings
A Study on the class of Semirings
 
Lec18
Lec18Lec18
Lec18
 
Text classification using Text kernels
Text classification using Text kernelsText classification using Text kernels
Text classification using Text kernels
 
Latent Semantic Indexing For Information Retrieval
Latent Semantic Indexing For Information RetrievalLatent Semantic Indexing For Information Retrieval
Latent Semantic Indexing For Information Retrieval
 
Spatial Approximate String Keyword content Query processing
Spatial Approximate String Keyword content Query processingSpatial Approximate String Keyword content Query processing
Spatial Approximate String Keyword content Query processing
 
Suffix Tree and Suffix Array
Suffix Tree and Suffix ArraySuffix Tree and Suffix Array
Suffix Tree and Suffix Array
 
Tim Maudlin: New Foundations for Physical Geometry
Tim Maudlin: New Foundations for Physical GeometryTim Maudlin: New Foundations for Physical Geometry
Tim Maudlin: New Foundations for Physical Geometry
 
presentation on important DAG,TRIE,Hashing.pptx
presentation on important DAG,TRIE,Hashing.pptxpresentation on important DAG,TRIE,Hashing.pptx
presentation on important DAG,TRIE,Hashing.pptx
 
My invited talk at the 2018 Annual Meeting of SIAM (Society of Industrial and...
My invited talk at the 2018 Annual Meeting of SIAM (Society of Industrial and...My invited talk at the 2018 Annual Meeting of SIAM (Society of Industrial and...
My invited talk at the 2018 Annual Meeting of SIAM (Society of Industrial and...
 
An Optimal Approach For Knowledge Protection In Structured Frequent Patterns
An Optimal Approach For Knowledge Protection In Structured Frequent PatternsAn Optimal Approach For Knowledge Protection In Structured Frequent Patterns
An Optimal Approach For Knowledge Protection In Structured Frequent Patterns
 
An Optimal Solution For The Channel-Assignment Problem
An Optimal Solution For The Channel-Assignment ProblemAn Optimal Solution For The Channel-Assignment Problem
An Optimal Solution For The Channel-Assignment Problem
 
ECO_TEXT_CLUSTERING
ECO_TEXT_CLUSTERINGECO_TEXT_CLUSTERING
ECO_TEXT_CLUSTERING
 

More from Iaetsd Iaetsd

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissionIaetsd Iaetsd
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdlIaetsd Iaetsd
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmIaetsd Iaetsd
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...Iaetsd Iaetsd
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatIaetsd Iaetsd
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationIaetsd Iaetsd
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSIaetsd Iaetsd
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...Iaetsd Iaetsd
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bikeIaetsd Iaetsd
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technologyIaetsd Iaetsd
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...Iaetsd Iaetsd
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdIaetsd Iaetsd
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid GrowthIaetsd Iaetsd
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT AlgorithmIaetsd Iaetsd
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...Iaetsd Iaetsd
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...Iaetsd Iaetsd
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesIaetsd Iaetsd
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesIaetsd Iaetsd
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolicIaetsd Iaetsd
 

More from Iaetsd Iaetsd (20)

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdl
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarm
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seat
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan application
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bike
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technology
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic bird
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolic
 

Recently uploaded

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
 

Recently uploaded (20)

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
 

Iaetsd effective method for searching substrings in large databases

  • 1. Effective Method for searching substrings in large Databases By using Query based approach J.RamNaresh Yadav M.Tech 2nd year, Dept. of CSE, ASCET, Gudur, India Email: ramnaresh167@gmail.com Abstract – This paper mainly deal with the direct substring search in long string and a query point in the string for searching large database. Traditional approaches only focuses on effective search using approximation string search but they don’t consider the point that how to find exact substring query for searching in large database. We address this problem in this paper and we develop an effective algorithm for query – answering. First, we develop an algorithm to answer a smallest substring queries in O(n) time using suffix tree index. Second we also compute unique substring in every position of a given string. Once the smallest unique substrings are pre-computed, smallest unique substring queries can be answered online in constant time. Index terms- substring queries, Query-Answering, suffix tree. I. INTRODUCTION You are searching the Complete Works of William Shakespeare using query term “king”. The term “king” occurs 1, 546 times in 1, 392 speeches within 40 works, even without counting those related words like “king’s” and “kings”. Using modern information retrieval techniques, such as an inverted index, one can find all occurrence positions of a query word easily. How can a search engine, however, present an informative list of the search results? Showing all occurrence positions. On the one hand, if the length is short, some snippets may be identical and thus those occurrences still cannot be distinguished. A smarter way is to present for each occurrence a smallest snippet that contains the query term and is different from all other snippets of the query term. The above simple yet effective application in document search introduces an interesting novel problem to be tackled in this paper. Given a (long) string S and a query point q in S, we want to conduct a smallest unique substring query that finds a smallest unique substring containing q. Shortest unique substring queries have many potential applications. In addition to the above document search example, shortest unique substring queries can be used in bioinformatics. Moreover, finding shortest unique substrings on DNA sequences can help polymerase chain reaction (PCR) primer design in molecule biology. Also, it can help to identify unique DNA signatures of closely related species or organisms. The shortest unique substring of the event under INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 108
  • 2. investigation may serve as a concrete working base of the event context. Answering shortest unique substring queries efficiently is far from trivial. A brute-force (heuristic) search may easily lead to cost in time quadratic to the length of the string, which is unacceptable in practice when the string is long and queries are expected to be answered online. In this paper, we address the problem of answering shortest unique substring queries from the algorithmic point of view and make several contributions. First, we model shortest unique substring queries and explore their properties thoroughly. The properties clearly distinguish shortest unique substring queries from the existing related problems, such as computing global minimal substrings. Second, we present an algorithm to answer a shortest unique substring query in O(n) time using a suffix tree index, which can be constructed in O(n) time and space, where n is the length of string S. Third, we show that, using O(n · h) time and O(n) space, we can compute a shortest unique substring for every position in a given string, where h is variable theoretically in O(n) but on real data sets often much smaller than n and can be treated as a constant. II. SMALLEST UNIQUE SUBSTRING QUERIES In this section, we formulate the shortest unique substring queries, and discuss the properties of several critical concepts. A. Smallest Unique Substring Queries Let S be the string of length n. Denoted by S[i] the value of i-th position of S and S[i,j] = S[i]….S[j] the substring at position i and ending at position j. Substring starting at position p. if two string are identical, denoted by X = Y, and for every 1 ≤ ≤ | |, [ ] = [ ]. X is called a substring of Y. we call X a proper substring of Y, denoted by ⊂ , ⊆ ≠ . Definition 1 (Minimal unique Substring (MUS)): A substring S[i, j] is unique in S if there doen not exist another substring S[ ′ , ′ ] such that S[i,j] = S[ ′ , ′ ]. S[i,j]is called a minimal unique substring if S[i, j] is unique and there is not any proper substring of S[i, j] that is also unique. Definition 2 (small unique Substring (SUS)) : Given a string S and a position p in S, substring S[i, j] is a small unique substring at position p if S[i,j] is unique and contains p, and there does not exists another unique substring S[ ′ , ′ ] such that S[ ′ , ′ ] is also contains p and ′ − ′ < − . Definition 3 (Problem definition): Given a String S and a position p, the small unique substring query (SUSQ) is to find a SUS at position p. Any number in SUS (p) is valid answer. In our algorithm design, we often consider two types of unique substring that may be candidates of SUSs. We give the definitions here and will pursue further discussion later. Definition 4 Given a string S and a Position p in S, a substring S[p, j] is called the left-bound SUS (LSUS) position p, denoted by LSUS(p), if S[p, j] is unique and no other substring [ , ′ ] is also INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 109
  • 3. unique for ≤ ′ < . Symmetrically, [ , ] is called the right-bound SUS (RSUS) for position p, denoted by RSUS(p), if [ , ] is unique and no other substring [ ′ , ] is also unique for < ′ ≤ . Moreover, we define the left SUS be the SUS whose starting point is smallest, denoted by leftmost-SUS(p). Figure 1 shows the relationship among LSUS (p), RSUS(p) and the MUSs contain p. Figure 2 illustrates the concept of leftmost SUS. Figure1. The relationship among three cases Figure2. The leftmost SUS at a position p. It is easy to see the following property. Property 1 (LSUS and RSUS): Given a string S, for every position p in S, LSUS (p) and RSUS(p), if exist, are respectively. In some cases, LSUSs or RSUSs may not exist. Moreover, position p in S, LSUSs or RSUSs may not be SUSs. III. QUERY ANSWERING USING SUFFIX TREES In this section, we first review suffix tree and the construction. Then we discuss how to use a suffix tree as index to answer smallest unique substring queries. A. Suffix Trees and Construction A suffix tree is data structure that concisely records all possible suffixes of a given string allows fast string search operations. A string S of length n suffixes S[i,n], i=1, …..,n. in the suffix tree of S, each edge represents a substring S, and a path from the root to a leaf node represents exactly on suffix of S. Ukkonen’s proposed a well known suffix tree construction method that requires only linear time and space when the alphabet size of a string is a constant. Taking S=11011001 as an example, we briefly show to construct its suffix tree as shown in Figure 3, using Ukkonen’s algorithm. Figure3. The suffix tree of S= 11011001 The construction procedure is illustrated in Figure 4. Figure 4 The construction of suffix tree S = 11011001. INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 110
  • 4. To extend the suffix tree of S[1, i] to S[1, i+1] we need to extend S[j,i] for 1 ≤ ≤ , S[i+1]. There are three possible cases. 1) [ , ] ends at a leaf node. Then, we pad [ + 1] to the corresponding leaf edge. 2) [ , ] does not end at a leaf node but followed by [ + 1]. Then, we split the edge and creat a new node. 3) [ , ] does not end at a leaf node but followed [ + 1]. In this case, we do not need to do anything. When we expand the tree from j = 1 to j = I during phase i+1, the occurrences of this three phases follow some properties. First, after case 2 or case 3 happen, and then case 1 will never happens. With these properties, once we meet case 3 at step j of phase i, we can immediately finish the current phase and start the phase i+1 at step j. To ensure O(n) construction time, ukkonne’s algorithm uses the suffix links and the skip/count technique during the tree construction. A suffix link is a directed path from an internal node associated with substring S [i, j] to another internal node associated with substring S[i+1,j], which allows fast jump to the next extension point in the tree. The skip/count technique enables us to add the new character S[i+1] at phase i+1 quickly. To save more space, instead of storing copies of substrings, we label edges using start and end indexes. To end index of a leaf edge is omitted and denoted by− . Finally, an end symbol $ is padded at each path as a leaf node. As a result, the space used for a suffix tree is reduced to O(n). B. Query Answering Using Suffix Trees Given a string S, we first build its suffix tree in O(n) space and O(n) time using Ukkonen’s algorithm. We further store all leaf node into an array so that we can access a specific leaf node Leaf(i), its edge Edge(Leaf(i)) and its associated string Sedge(Leaf(i)) in constant time. We can use the suffix tree to get LSUS (p) in constant time, as shown in Algorithm 1. Algorithm 1 the LSUS finding algorithm Input: string S[1, n], a position p, and the suffix tree T of S Output: LSUS (p) 1. Find the leaf node of S[p, n] in T; //The leaf node can be indexed during the construction of the suffix tree, so the access to the leaf node costs O(1) time 2. If the label of leaf edge is $ then return null; 3. end if 4. l←the length of the lablel of the leaf edge; // the padded terminal charater is not counted into the length of the leaf edge. 5. Return [ , − + 1] We first target at the corresponding leaf node, of p in the suffix tree. Backtracking along the leaf node, we meet an internal node. Base on the property of the suffix tree, the represented string from the root to this internal node is a common prefix of different suffixes. With LSUS (p), we can now find a SUS(Smallest Unique Substring) containing position p as shown in Algorithm 2. INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 111
  • 5. Algorithm 2 the baseline SUS finding algorithm Input: string S, a position p, and the suffix tree T of S Output: the leftmost SUS containing position p 1. Find LSUS (p) 2. if ( ) ≠ them 3. [ , ] be ( ); 4. else 5. [ , ] be [1, ]; 6. else if 7. for k← p-1; k>0 and − ≤ − ; ← − 1 do 8. if LSUS(k) is null then continue; 9. end if 10. [ , ] be the LSUS (k); 11. < then ← p; 12. end if 13. if − ≤ − 1 then = ; = , 14. end if 15. End for 16. Return S[i,j]; IV. A CONSTANT TIME ONLINE QUERY ANSWERING ALGORITHM In this section, we develop a method that pre-computes the leftmost SUS for every position using linear space. Then, online query answering can be conducted in constant time. A. Ideas We first observe that a smallest unique substring must fall into three cases: a MUS, a LSUS, or a RSUS. This can be achieving by using various theorems. In this paper, we briefly define theorem which are useful. Theorem 1 Given a string S and a position p in S, if [ , ]is a SUS at portion p but not a MUS, then either i = p or j = p. Theorem 2 indicates that, by one scan of S and obtain LSUS at each position, we can find all MUSs and LSUSs that are not MUSs. To determine whether a SUS is a RSUSs we have the following result. Theorem 3 Given a string S and a position p, a substring [ , ] ( ) if and only only if [ , ] contains only one MUS [ , ]( ≤ ). B. The Framework Given a string S, our algorithm first constructs a suffix tree. This takes (| |) time and (| |) space. For each position p, algorithm maintains a currently shortest MUS that contains position p, denoted by p.cand. It also takes (| |) space to store of the nMUS obtained at the last position. Therefore, our algorithm needs only (| |) space overall. Algorithm 3 shows the pseudo-code of our method. Algorithm 3 the pre-computation algorithm. Input: string s Output: a SUS for each position 1 ≤ ≤ | | 1. Build a suffix tree for String S; 2. Initialize . ← for 1 ≤ ≤ | |; 3. Output LSUS (1), denoted by [1, ] as the SUS at Position 1; 4. ← 1, ← ; // use LSUS (1) to initialize the SUS at position p-1 5. For p=2 to | | do INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 112
  • 6. 6. Let [ , ] ( ) obtained from the suffix tree; 7. Let S[i, j] be the shortest substring among the following 4 strings: (1) [ , ], (2) . . ≠ , (3) , < and (4) [ , ] if ≥ . If there are more than one sybstring having the smallest length, pick the left most one. Output [ , ] as a SUS at position ; 8. suppose . = [ , ] . ≠ ; 9. if . ≠ > ℎ 10. call PROPAGATE ( [ , ], + 1 11. end if 12. if ( ) = [ , ] is a MUS and is not [ , ], and > ℎ call PROPAGTE( [ , ], + 1 13. end if 14. ← , ← ; 15. At the beginning, we initialize p.cand to null for all positions p. our algorithm scans string S from the beginning to the end. At position 1, LSUS (p) is the only SUS containing position 1. At each position p (p>1), we compute LSUS (p) using the suffix tree in constant time. C. MUS Propagation Although we reverse space to record the smallest MUS for each position, we do not need to explicitly store one MUS at each p.cand. Instead, we only need to store at those positions p where the smallest MUS may not be obtained by LSUS (p) and RSUS (p). Algorithm 4 gives the pseudo- code of the propagation procedure. Algorithm 4 the Propagation procedure. 1: procedure PROPAGATE(MUS [ , ]), the position k to propagate 2: < > then 3: k is not in the range of [i ,j] 4: return 5: else if . I null then 6: . ← [ , ]; return 7: end if 8: supposed . = ′ , ′ ; 9: ′ − ′ > − 1 then . is longer than [ , ] 10: . ← [ , ] 11: ′ > ℎ [ , ] ends before . 12: call PROPAGATE ( ′ , ′ , + 1); 13: end if 14: else if ′ − ′ < − ′ < then 15: . is shorter than [ , ] and ends before [ , ] 16: call PROPAGATE ( [ , ], ′ + 1); 17: else [ , ] . have the same length 18: if < ′ then 19: . ← [ , ] 20: call PROPAGATE( ′ , ′ , + 1) 21: else > ′ 22: call PROPAGATE ( [ , ], ′ + 1) 23: end if 24: end if 25: return 26: end procedure INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 113
  • 7. V. EXPECTED RESULTS Suppose we want to conduct extensive experiments on three real data sets and a group of synthetic data sets to evaluate our methods. Mainly we consider three real data sets will be used in our experiments. the first data set is an introduction of R language, appear of the FAQa on the R project website (http://www.r-project.org/). The second real data set is the genome sequence of Mycoplasma genitalium, the pathogentic bacter- ium that has one of the smallest genomes known for any free-living organism. The third data is the Bible. For the R-sequence, we chose the positions where the language name R appeared as the query index. For a given sequence, we can compute one SUS at each position. We want to observe the distribution of the SUS counts over different SUS lengths on the R-Sequence. In addition to the original R-sequence itself, we further generated three mutations with the same string length using the alphabet set. For the original R-sequence, most SUSs are of length of 3. As the length increases, the corresponding counts decreases. VI. CONCLUSION In this paper, we formulated a novel type of interesting queries- smallest unique substring queries, which have many applications. We developed efficient algorithms. Furthermore, our study leads to new direction on string queries. As future work, it is interesting to extend and generalize smallest unique substring queries. REFERENCES [1] B. Haubold, N. Pierstorff, F. M¨oller, and T. Wiehe, “Genome comparison without alignment using shortest unique substrings,” BMC Bioinformat- ics, vol. 6, no. 123, May 2005. [2] P. Weiner, “Linear pattern matching algorithms,” in Proc. of the 14th Annual Symposium on Switching and Automata Theory (swat 1973), 1973, pp. 1–11. [3] U. Manber and G. Myers, “Suffix arrays: a new method for on-line string searches,” in Proceedings of the first annual ACM-SIAM symposium on Discrete algorithms, 1990, pp. 319–327. [4] E. Ukkonen, “On-line construction of suffix trees,” Algorithmica, vol. 14, pp. 249–260, 1995. [5] M. Farach, “Optimal suffix tree construction with large alphabets,” in Proc. of the 38th Annual Symposium on Foundations of Computer Science (FOCS’97), 1997. [6] S. J. Puglisi, W. F. Smyth, and A. H. Turpin, “A taxonomy of suffix array construction algorithms,” ACM Computer Survey, vol. 39, no. 2, July 2007. [7] G. Nong, S. Zhang, and W. H. Chan, “Linear time suffix array construction using d-critical substrings,” in Proc. 20th Annual Symp.Combinatorial Pattern Matching, 2009, pp. 54–67. [8] D. Cusfield, Algorithms on Strings, Trees, and Sequences: Computer Science and Computational Biology. Cambridge University Press, 1997. INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 114
  • 8. [9] L. Ilie and W. F. Smyth, “Minimum unique substrings and maximum repeats,” Fundamenta Informaticae, vol. 110, no. 1-4, pp. 183–195, 2011. [10] K. Ye, Z. Jia, Y. Wang, P. Flicek, and R. Apweiler, “Mining unique-m substrings from genomes,” Journal of Proteomics and Bioinformatics, vol. 3, no. 3, pp. 99–100, 2010. AUTHORS First Author Second Author INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 115