SlideShare a Scribd company logo
1 of 5
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 205
AN INVESTIGATIVE SCHEME FOR KEYWORD SEARCH USING
INVERTED KEY TACTIC
Dnyaneshwar K. Bhujbal 1
, R.V.Pujeri2
, Preeti Sharma3
1
Computer Engineering, SKN Sinhgad Institute Technology & Science, Lonavla, Maharashtra, India
2
Professor & Head, Computer Engineering, SKN Sinhgad Institute Technology & Science, Lonavla, Maharashtra,
India
3
Assistant Professor, Computer Engineering, SKN Sinhgad Institute Technology & Science, Lonavla, Maharashtra,
India
Abstract
Unverified classification of outlines that is data items, observations or feature vectors into groups is called as Clustering. To
retrieve a document from a group of documents according to a set of keywords efficiently, Inverted lists are mostly used instead of
Keyword Search. Keyword Search is one of the most important activities in Information Retrieval System. As study shows in latest
years, Keyword search is widely used by users to access text data. Keyword search is appropriate for document gatherings as well
as for accessing structured or semi-structured data, XML documents relational databases and relational tables which can also be
regarded as sets of documents. This is done by a keyword as query user retrieve documents. To proficiently retrieve documents, a
data structure is used, that maps each word in the dataset, to a list of IDs of documents in which the word appears. The inverted
index for a document collection consists of a set of so-called inverted lists, known as posting lists.
Keywords: Keyword Search, Index Compression, Document Reordering, Rendering
---------------------------------------------------------------------***---------------------------------------------------------------------
1. INTRODUCTION
Keyword Search is basis of Information Retrieval System.
As new information is continuously added, the data size
keeps on increasing and in these cases Keyword search is
helpful for user to access text datasets. This textual data
consists of web pages, XML documents and relational tables
which can also be regarded as sets of documents. But even
Keyword Search leads to a Datasets containing large amount
of textual data. To overcome this problem & to retrieve
data efficiently Inverted Keys are used which is also known
as posting lists.
Inverted Keys are used to assess queries in all practical
search engines. Keys or Indexes have three major benefits
with respect to Compression for performance.
1) Requires less storage space
2) Better use of the available communication Bandwidth.
3) Avoiding a disk access compression [1].
Cluster of Inverted Indexes of a document Datasets is
called as Posting Lists.
Information retrieval system (IRS) are widely developed for
to finding useful information from a large-scale information
datasets in which specialized indexing mechanism is
required for efficient retrieval. Inverted files and signature
files are two indexing tools in which inverted file is more
popular because of better performance [2,3].
The new compression technique, that is, Inverted Index
Compression Using Word-Aligned Binary Codes, provides
compression rates, that are inferior to the best compression
rates that have been previously achieved. But has an
advantage of requiring exceptionally low computational
effort at decoding time [4].
There is huge amount of data stored in different form like
Unstructured, Semi-structured and Structured. An Effective
3-in-1 Keyword Search Method known as EASE for
Unstructured, Structured and Semi-structured Data for
indexing and querying large collections of heterogeneous
data. EASE achieves both high accuracy and high search
efficiency, and outperforms the existing approaches
significantly [5].
The main concept Inverted Index is also used in current web
search engines to perform some tasks efficiently. Good
answers must be provided by engine within a fraction of a
second, while simultaneously serving multiple requests,
which gives interactive applications with respect to latency
demands [6].
The section [II] describing Literature Survey of An
Investigative Scheme for Keyword Search Using Inverted
Key Tactic.
The Section [III] Explaining Propose System & Architecture
of An Investigative Scheme for Keyword Search Using
Inverted Key Tactic.
The Section [IV] gives the Conclusion of An Investigative
Scheme for Keyword Search Using Inverted Key Tactic.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 206
2. LITERATURE SURVEY
The use of clustering has been reported by studies in
Inverted Indexing for keyword search in Information
Retrieval. Basically, The use of classic algorithm for
clustering data is described by most of the research such as
Expectation-Maximization (EM) for unsupervised learning
of Gaussian Mixture Models, K-means, Fuzzy C-means
(FCM), and Self-Organizing Maps (SOM). These
algorithms have well-known properties and are widely used
in practice [9].
The main task is Keyword search through Indexing
technique which is one of the most important activities in
Information Retrieval System. Keyword search is critical for
users to access text datasets, as huge amount of new
information is added over the time. In that textual document
web pages XML documents, and relational tables which can
also be regarded as sets of documents is also includes a
keyword as query user can retrieve documents. To
efficiently retrieve documents, a data structure is used that
maps each word in the dataset to a list of IDs of documents
in which the word appears. The inverted index for a
document collection consists of a set of so-called inverted
lists, known as posting lists.
The Concept described here uses Inverted indexes to
evaluate queries in all practical search engines. Indexes has
three major benefits with respect to Compression for
performance, so,
1) Requires less storage space
2) Better use of the available communication Bandwidth so
that more information can be transferred per second than,
when the data is uncompressed. The total time of
transferring compressed data and subsequently
decompressing is potentially much less than the cost of
transferring uncompressed data for fast decompression
schemes
3) Avoiding a disk access compression which increases the
part of an index required to evaluate a query, is already
cached in memory, Because of the above reasons index
compression can reduce cost in retrieval systems [1].
Information Retrieval System (IRS) are widely developed
for finding useful information from a large-scale
information. So, inverted file compression through
document identifier reassignment has tried. Compression of
inverted lists of document postings that store the position
and frequency of indexed terms. Better implementation and
better choice of integer compression schemes are two
approaches for improving retrieval efficiency [2,3].
New compression technique that is Inverted Index
Compression Using Word-Aligned Binary Codes provides
fast access into the compressed inverted lists, and overall
provides faster query processing than previous techniques
by allowing some inefficiency in the compressed
representation. In support of these claims, This gives
compression results for several large text collections as well
as retrieval throughput results that show the overall benefit
of the new approach compared to previous index coding
mechanisms [4].
Keyword search is not only convenient for document
collections as well as for accessing semi-structured or
structured data, like relational databases and XML
documents Data is present in different formats like
Unstructured, Semi-structured and Structured. An Effective
3-in-1 Keyword Search Method (EASE) for Unstructured,
Structured and Semi-structured Data for indexing and
querying large collections of heterogeneous data, first model
unstructured, structured and semi-structured data as graphs
to achieve high efficiency in processing keyword queries,
and then instead of using traditional inverted indices
summarize the graphs and construct graph indices. For
enhancing search effectiveness propose an extended
inverted index to facilitate keyword-based search, and
present a different ranking mechanism. An extensive
experimental study by real datasets and the output show that
EASE achieves both high accuracy and high search
efficiency, and outperforms the existing approaches
significantly [5].
Inverted Index is also used in current web search engines to
perform some tasks efficiently. The good answers must be
provided by engine within a fraction of a second, while
simultaneously serving multiple requests, which gives
interactive applications w.r.t. latency demands [6].
To reduce the space cost of storing inverted indexes various
compression techniques are used. IDs in inverted lists are
sorted in ascending order, to store the differences between
IDs many existing techniques are used called d-gaps, and
then to encode these d-gaps using shorter binary
representations use various techniques. Because of extra
computational cost during query processing, An
Investigative Scheme for Keyword Search Using Inverted
Key Tactic which is an extension of the traditional inverted
index (denoted by InvIndex), to support keyword search [7].
An Investigative Scheme for Keyword Search Using
Inverted Key Tactic uses no. of Search algorithms for
keyword search. Scan-line algorithm, Improved scan-line
algorithm, Twin-heap algorithm, Probe-Based Algorithm An
Algorithm is given for an Efficient support to basic
operations on interval lists, like union and intersection
without decompression. The performance of An
Investigative Scheme for Keyword Search Using Inverted
Key Tactic is enhanced by document reordering, and two
scalable and effective algorithms based on signature sorting
and greedy heuristic of Traveling Salesman Problem (TSP).
A Heuristic Inverted Index Approach of Keyword Search
reduces the index size as well as improves the search
performance on real datasets [7].
Keyword search is widely used by users to access text data
with many studies in recent years. Keyword search is
convenient for document collections as well as for accessing
semi-structured or structured data, like relational databases
and XML documents [8].
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 207
Most techniques first convert each ID in an inverted list to
the difference between it and the preceding ID, known as d-
gaps, and then encode the list using integer compression
algorithms [3,4,8]. Simple and fast decoding provided by
Variable-Byte Encoding [3].
Other studies have focused on how to improve the
compression ratio of inverted index using document
reordering[6]. The overall compression ratio is improved by
reassigning document IDs so that similar documents are
close to each other, & then there are more small d-gaps in
the converted lists.
Figure.1 shows the index sizes using different compression
techniques. The widely-adopted VBE is used to evaluate the
present technique of converting consecutive IDs to intervals
in An Investigative Scheme for Keyword Search Using
Inverted Key Tactic. Figure 1 compares the original inverted
index (denoted by InvIndex), the inverted index compressed
by VBE (denoted by InvIndex+VBE), the present inverted
index (denoted by Heuristic Inverted Index Approach of
Keyword Search), and the present inverted index
compressed by VBE (denoted by Heuristic Inverted Index
Approach of Keyword Search +VBE) for PubMed datasets.
The results show that the Architecture of an Investigative
Scheme for Keyword Search Using Inverted Key Tactic Fig.
1 Comparison of sizes of indexes using different
compression techniques. Compression is much better than
that of VBE. An Investigative Scheme for Keyword Search
Using Inverted Key Tactic + VBE result has the smallest
index size. [7]
The Figure 1 is given below,
Fig 1 Architecture of An Investigative Scheme for Keyword
Search Using Inverted Key Tactic
In our propose system basically there are three important
steps which are as follows
1) Labelling
2) Twin Heap Selection
3) Document Retrieving
Labelling: In this 1st
step there are three sub parts,
a) Visit to an individual documents
b) Give them label
c) Sort in Ascending order.
Twin Heap Selection: This is the main Algorithm method
used for selection. The steps are as follows
a) Find out the Maximum entity in Lower Heap as well as
Minimum entity in upper heap.
b) After that apply twin heap selection algorithm which
gives smallest d-gap that most similar documents in one
cluster.
c) Set the bound which is a limit.
Document Retrieval: This is last step of An Investigative
Scheme for Keyword Search Using Inverted Key Tactic in
which initially binary search is applied for better
performance. Then again sort in ascending order for lower
bound [7]. After sorting decide limits which will lead to
retrieve documents & it gives Required clustered
Documents.
To reduce the space cost of storing inverted indexes various
compression techniques are used. IDs in inverted lists are
sorted in ascending order. To store the differences between
IDs many existing techniques are used called as d-gaps, and
then to encode these d-gaps using shorter binary
representations using various techniques. Because of extra
computational cost during query processing, An
Investigative Scheme for Keyword Search Using Inverted
Key Tactic which is an extension of the traditional inverted
index denoted by InvIndex is used to support keyword
search [7].
The input document will be in any of the format like text,
word, pdf & so on.
3. MATHEMETICAL MODULE
Document Retrieval
Set D
D0= Get all Interval List
D1=Remove Empty Lists
D2=For Each interval list
D3= Get upper limit
D4= Get Lower Limit
D5=If interval size is greater than 1
D6=Then add in retrieval vector
D7= Return Document retrieval vector
Algorithm: PROBISECT+(R)
Input: R A set of interval lists
Output: G The resulting interval list.
1: Sort R in ascending order of list lengths
2: for all r ϵ R1 do Add CASPROBE(r,R-R1) to G
3: return G
4: procedure CASPROBE(r,R)
Input : r0 A non-empty interval.
R An set of interval lists.
Output : G The resulting interval list.
5: R1* CASPROBE(r0,R1)
6: for all r ϵ R1* do
7: r*  [max(lb(r0),lb(r)),min(ub(r0),ub(r))]
8: if n > 1 then Add CASPROBE(r*,R-R1) to G
9: else Add r* to G
10: return G
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 208
11: end procedure
4. RESULTS
4.1 Data Set
Here, input is Data Set in which no. of files are there. The
input document will be in any of the format like text, word,
pdf & so on. In future work we can extend this with audio
video input. We will any give keyword as an input to search,
then it will search that required keyword in given input
dataset.
4.2 Result Set
An Investigative Scheme for Keyword Search Using
Inverted Key Tactic has an effective index structure and
efficient algorithms to support keyword search, This Fast
scalable methods enhance the search speed of An
Investigative Scheme for Keyword Search Using Inverted
Key Tactic by reordering documents in the datasets. It also
requires smaller storage size than the traditional inverted
index. It has a higher keyword search speed and using
compression techniques, performance can be improved.
This is used in Document Searching, Search Engine, Bio-
Informatics & So on.
5. CONCLUSIONS
By doing the survey on An Investigative Scheme for
Keyword Search Using Inverted Key Tactic it was
determined that clustering on data is not an easy task. There
is huge data to be cluster in this Approach, So, to overcome
this problem, an approach is presented that applies
document clustering methods to An Investigative Scheme
for Keyword Search Using Inverted Key Tactic.
An Investigative Scheme for Keyword Search Using
Inverted Key Tactic has an effective index structure and
efficient algorithms to support keyword search, Fast scalable
methods of An Investigative Scheme for Keyword Search
Using Inverted Key Tactic enhance the search speed by
reordering documents in the datasets. Experiments show that
This Approach of Keyword Search not only requires smaller
storage size than the traditional inverted index, but also has
a higher keyword search speed and using compression
techniques, performance can be improved.
In future work we can extend this project with audio video
input.
ACKNOWLEDGMENTS
I express my sense of gratitude towards my Project guide
PROF.R.V.PUJERI & PROF. PREETI SHARMA, who
has been very concerned and has aided for all the material
essential for the preparation of this paper, he helped me to
explore this vast topic in an organized manner and provided
me with all the ideas on how to work towards a research
oriented venture.
I am also thankful to PROF. SUPRIYA B. SARKAR, P.G
Coordinator for the motivation and Inspiration that triggered
me for the thesis work.
REFERENCES
[1]. I. Witten, A. Mo_at, and T. Bell. „Managing Gigabytes:
Compressing and Indexing Documents and Images.‟
Morgan Kaufmann Publishers, Los Altos, CA 94022, USA,
second edition, 1999.
[2]. S. Ding, J. Attenberg, and T. Suel, “Scalable techniques
for document identifier assignment in inverted indexes” in
Proc. of the 19th International Conference on World Wide
Web, Raleigh, North Carolina, USA, 2010, pp. 311-320
[3]. F. Scholer, H. E. Williams, J. Yiannis, and J. Zobel,
“Compression of inverted indexes for fast query evaluation”
in Proc. of the 25th Annual International ACM SIGIR
Conference on Research and Development in Information
Retrieval, Tammpere, Finland, 2002, pp. 222-229,Georgia,
USA, 2006, pp. 59.
[4]. V. N. Anh and A. Moffat, “Inverted index compression
using word-aligned binary codes, Information Retrieval”,
vol. 8,no. 1, pp. 151-166, 2005.
[5]. G. Li, B. C. Ooi, J. Feng, J.Wang, and L. Zhou, “EASE:
An effective 3-in-1 keyword search method for unstructured,
semi-structured and structured data”, in Proc. of the ACM
SIGMOD International Conference on Management of Data,
Vancouver, BC, Canada, 2008, pp. 903-914.
[6]. S. Ding, J. Attenberg, and T. Suel, “Scalable techniques
for document identifier assignment in inverted indexes” in
Proc. of the 19th International Conference on World Wide
Web, Raleigh, North Carolina, USA, 2010, pp. 311-320
[7]. Hao Wu_, Guoliang Li, and Lizhu Zhou,”Ginix:
Generalized Inverted Index for Keyword Search”, IEEE
transactions on knowledge and data mining vol:8 no:1 year
2013.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 209
[8]. S. Agrawal, S. Chaudhuri, and G. Das, “DBXplorer: A
system for keyword-basedsearch over relational databases”,
in Proc. of the 18th International Conference on Data
Engineering, San Jose, California, USA, 2002, pp. 5-16.
[9]. L. Liu, J. Kang, J. Yu, and Z. Wang, “A comparative
study on unsupervised feature selection methods for text
clustering,” in Proc. IEEE Int. Conf. Natural Language
Processing and Knowledge Engineering, 2005, pp. 597–
601.
[10]. V. Hristidis and Y. Papakonstantinou, DISCOVER:
Keyword search in relational databases, in Proc. of the 28th
International Conference on Very Large Databases, Hong
Kong, China, 2002, pp. 670-681.
[11]. V. Hristidis, L. Gravano, and Y. Papakonstantinou,
Efficient IR-style keyword search over relational databases,
in Proc. of the 29th International Conference on Very large
Databases, Berlin, Germany, 2003, pp. 850-861.
BIOGRAPHIES
Mr.Dnyaneshwar Kisan Bhujbal is
pursuing his Masters of Computer
Engineering in SKN Sinhgad Institute of
Technology & Science, Lonavla,
University of PUNE. He received his
BEng. Info.Tech. degree in 2012 from
Sinhgad Institute of Technology & Science, Narhe, PUNE,
He has published 2 paper in International Conference &
Journal.
Dr. R.V. Pujeri is currently working as a
Professor & Head of Computer
Department at SKN Sinhgad Institute of
Technology & Science Lonavala. He has
total 18 years of Experience. He has
published around more than 20-25 paper
in International Conference & Journals. He has also guided
many number of students of Masters.
Prof. Preeti Shrama is an Asst. Prof. at
SKN Sinhgad Institute of Technology &
Science Lonavala. She received her
Master of Computer Engineering degree
from Sinhgad Institute of Technology
Lonavla, University of PUNE and
BCSEng. Degree from MIT Aurangbad. She has published
around 10 paper in International Conference & Journals

More Related Content

What's hot

Survey on scalable continual top k keyword search in
Survey on scalable continual top k keyword search inSurvey on scalable continual top k keyword search in
Survey on scalable continual top k keyword search ineSAT Publishing House
 
Design of file system architecture with cluster
Design of file system architecture with clusterDesign of file system architecture with cluster
Design of file system architecture with clustereSAT Publishing House
 
Performance Analysis of Hashing Mathods on the Employment of App
Performance Analysis of Hashing Mathods on the Employment of App Performance Analysis of Hashing Mathods on the Employment of App
Performance Analysis of Hashing Mathods on the Employment of App IJECEIAES
 
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...IRJET Journal
 
Enhancing the performance of cluster based text summarization using support v...
Enhancing the performance of cluster based text summarization using support v...Enhancing the performance of cluster based text summarization using support v...
Enhancing the performance of cluster based text summarization using support v...eSAT Journals
 
A CONCEPTUAL METADATA FRAMEWORK FOR SPATIAL DATA WAREHOUSE
A CONCEPTUAL METADATA FRAMEWORK FOR SPATIAL DATA WAREHOUSEA CONCEPTUAL METADATA FRAMEWORK FOR SPATIAL DATA WAREHOUSE
A CONCEPTUAL METADATA FRAMEWORK FOR SPATIAL DATA WAREHOUSEIJDKP
 
Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search        Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search IRJET Journal
 
Ijarcet vol-2-issue-3-881-883
Ijarcet vol-2-issue-3-881-883Ijarcet vol-2-issue-3-881-883
Ijarcet vol-2-issue-3-881-883Editor IJARCET
 
A novel method to search information through multi agent search and retrie
A novel method to search information through multi agent search and retrieA novel method to search information through multi agent search and retrie
A novel method to search information through multi agent search and retrieIAEME Publication
 
Evaluating the efficiency of rule techniques for file classification
Evaluating the efficiency of rule techniques for file classificationEvaluating the efficiency of rule techniques for file classification
Evaluating the efficiency of rule techniques for file classificationeSAT Journals
 
Parametric comparison based on split criterion on classification algorithm
Parametric comparison based on split criterion on classification algorithmParametric comparison based on split criterion on classification algorithm
Parametric comparison based on split criterion on classification algorithmIAEME Publication
 
Evaluating the efficiency of rule techniques for file
Evaluating the efficiency of rule techniques for fileEvaluating the efficiency of rule techniques for file
Evaluating the efficiency of rule techniques for fileeSAT Publishing House
 
New proximity estimate for incremental update of non uniformly distributed cl...
New proximity estimate for incremental update of non uniformly distributed cl...New proximity estimate for incremental update of non uniformly distributed cl...
New proximity estimate for incremental update of non uniformly distributed cl...IJDKP
 
A unified approach for spatial data query
A unified approach for spatial data queryA unified approach for spatial data query
A unified approach for spatial data queryIJDKP
 
SOURCE CODE RETRIEVAL USING SEQUENCE BASED SIMILARITY
SOURCE CODE RETRIEVAL USING SEQUENCE BASED SIMILARITYSOURCE CODE RETRIEVAL USING SEQUENCE BASED SIMILARITY
SOURCE CODE RETRIEVAL USING SEQUENCE BASED SIMILARITYIJDKP
 
Ginix generalized inverted index for keyword search
Ginix generalized inverted index for keyword searchGinix generalized inverted index for keyword search
Ginix generalized inverted index for keyword searchIEEEFINALYEARPROJECTS
 
Data reduction techniques for high dimensional biological data
Data reduction techniques for high dimensional biological dataData reduction techniques for high dimensional biological data
Data reduction techniques for high dimensional biological dataeSAT Journals
 

What's hot (18)

Survey on scalable continual top k keyword search in
Survey on scalable continual top k keyword search inSurvey on scalable continual top k keyword search in
Survey on scalable continual top k keyword search in
 
Design of file system architecture with cluster
Design of file system architecture with clusterDesign of file system architecture with cluster
Design of file system architecture with cluster
 
Performance Analysis of Hashing Mathods on the Employment of App
Performance Analysis of Hashing Mathods on the Employment of App Performance Analysis of Hashing Mathods on the Employment of App
Performance Analysis of Hashing Mathods on the Employment of App
 
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
 
130509
130509130509
130509
 
Enhancing the performance of cluster based text summarization using support v...
Enhancing the performance of cluster based text summarization using support v...Enhancing the performance of cluster based text summarization using support v...
Enhancing the performance of cluster based text summarization using support v...
 
A CONCEPTUAL METADATA FRAMEWORK FOR SPATIAL DATA WAREHOUSE
A CONCEPTUAL METADATA FRAMEWORK FOR SPATIAL DATA WAREHOUSEA CONCEPTUAL METADATA FRAMEWORK FOR SPATIAL DATA WAREHOUSE
A CONCEPTUAL METADATA FRAMEWORK FOR SPATIAL DATA WAREHOUSE
 
Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search        Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search
 
Ijarcet vol-2-issue-3-881-883
Ijarcet vol-2-issue-3-881-883Ijarcet vol-2-issue-3-881-883
Ijarcet vol-2-issue-3-881-883
 
A novel method to search information through multi agent search and retrie
A novel method to search information through multi agent search and retrieA novel method to search information through multi agent search and retrie
A novel method to search information through multi agent search and retrie
 
Evaluating the efficiency of rule techniques for file classification
Evaluating the efficiency of rule techniques for file classificationEvaluating the efficiency of rule techniques for file classification
Evaluating the efficiency of rule techniques for file classification
 
Parametric comparison based on split criterion on classification algorithm
Parametric comparison based on split criterion on classification algorithmParametric comparison based on split criterion on classification algorithm
Parametric comparison based on split criterion on classification algorithm
 
Evaluating the efficiency of rule techniques for file
Evaluating the efficiency of rule techniques for fileEvaluating the efficiency of rule techniques for file
Evaluating the efficiency of rule techniques for file
 
New proximity estimate for incremental update of non uniformly distributed cl...
New proximity estimate for incremental update of non uniformly distributed cl...New proximity estimate for incremental update of non uniformly distributed cl...
New proximity estimate for incremental update of non uniformly distributed cl...
 
A unified approach for spatial data query
A unified approach for spatial data queryA unified approach for spatial data query
A unified approach for spatial data query
 
SOURCE CODE RETRIEVAL USING SEQUENCE BASED SIMILARITY
SOURCE CODE RETRIEVAL USING SEQUENCE BASED SIMILARITYSOURCE CODE RETRIEVAL USING SEQUENCE BASED SIMILARITY
SOURCE CODE RETRIEVAL USING SEQUENCE BASED SIMILARITY
 
Ginix generalized inverted index for keyword search
Ginix generalized inverted index for keyword searchGinix generalized inverted index for keyword search
Ginix generalized inverted index for keyword search
 
Data reduction techniques for high dimensional biological data
Data reduction techniques for high dimensional biological dataData reduction techniques for high dimensional biological data
Data reduction techniques for high dimensional biological data
 

Viewers also liked

Available transfer capability computations in the indian southern e.h.v power...
Available transfer capability computations in the indian southern e.h.v power...Available transfer capability computations in the indian southern e.h.v power...
Available transfer capability computations in the indian southern e.h.v power...eSAT Publishing House
 
Infotain system for automobile based on beaglebone black
Infotain system for automobile based on beaglebone blackInfotain system for automobile based on beaglebone black
Infotain system for automobile based on beaglebone blackeSAT Publishing House
 
Analysis of image steganalysis techniques to defend against statistical attac...
Analysis of image steganalysis techniques to defend against statistical attac...Analysis of image steganalysis techniques to defend against statistical attac...
Analysis of image steganalysis techniques to defend against statistical attac...eSAT Publishing House
 
Performance analysis of active clamped interleaved
Performance analysis of active clamped interleavedPerformance analysis of active clamped interleaved
Performance analysis of active clamped interleavedeSAT Publishing House
 
Route optimization in manets with aco and ga
Route optimization in manets with aco and gaRoute optimization in manets with aco and ga
Route optimization in manets with aco and gaeSAT Publishing House
 
Measurement model of software quality in user’s
Measurement model of software quality in user’sMeasurement model of software quality in user’s
Measurement model of software quality in user’seSAT Publishing House
 
Rate adaptive resource allocation in ofdma using bees algorithm
Rate adaptive resource allocation in ofdma using bees algorithmRate adaptive resource allocation in ofdma using bees algorithm
Rate adaptive resource allocation in ofdma using bees algorithmeSAT Publishing House
 
Handwritten character recognition using method filters
Handwritten character recognition using method filtersHandwritten character recognition using method filters
Handwritten character recognition using method filterseSAT Publishing House
 
Elzaki transform homotopy perturbation method for
Elzaki transform homotopy perturbation method forElzaki transform homotopy perturbation method for
Elzaki transform homotopy perturbation method foreSAT Publishing House
 
Internet enebled data acquisition and device control
Internet enebled data acquisition and device controlInternet enebled data acquisition and device control
Internet enebled data acquisition and device controleSAT Publishing House
 
3 d mrf based video tracking in the compressed domain
3 d mrf based video tracking in the compressed domain3 d mrf based video tracking in the compressed domain
3 d mrf based video tracking in the compressed domaineSAT Publishing House
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokenseSAT Publishing House
 
An enhanced fuzzy rough set based clustering algorithm for categorical data
An enhanced fuzzy rough set based clustering algorithm for categorical dataAn enhanced fuzzy rough set based clustering algorithm for categorical data
An enhanced fuzzy rough set based clustering algorithm for categorical dataeSAT Publishing House
 
Gis in assessing topographical aspects of hilly regions
Gis in assessing topographical aspects of hilly regionsGis in assessing topographical aspects of hilly regions
Gis in assessing topographical aspects of hilly regionseSAT Publishing House
 
A novel approach on a robot for the blind people which can trained and operat...
A novel approach on a robot for the blind people which can trained and operat...A novel approach on a robot for the blind people which can trained and operat...
A novel approach on a robot for the blind people which can trained and operat...eSAT Publishing House
 
Lv side distributed power factor correction system
Lv side distributed power factor correction systemLv side distributed power factor correction system
Lv side distributed power factor correction systemeSAT Publishing House
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Publishing House
 
Wavelet based ecg signal component identification
Wavelet based ecg signal component identificationWavelet based ecg signal component identification
Wavelet based ecg signal component identificationeSAT Publishing House
 
Diabetic maculopathy detection using fundus fluorescein angiogram images a ...
Diabetic maculopathy detection using fundus fluorescein angiogram images   a ...Diabetic maculopathy detection using fundus fluorescein angiogram images   a ...
Diabetic maculopathy detection using fundus fluorescein angiogram images a ...eSAT Publishing House
 
Sensitivity based optimal location of tcsc for improvement of power system se...
Sensitivity based optimal location of tcsc for improvement of power system se...Sensitivity based optimal location of tcsc for improvement of power system se...
Sensitivity based optimal location of tcsc for improvement of power system se...eSAT Publishing House
 

Viewers also liked (20)

Available transfer capability computations in the indian southern e.h.v power...
Available transfer capability computations in the indian southern e.h.v power...Available transfer capability computations in the indian southern e.h.v power...
Available transfer capability computations in the indian southern e.h.v power...
 
Infotain system for automobile based on beaglebone black
Infotain system for automobile based on beaglebone blackInfotain system for automobile based on beaglebone black
Infotain system for automobile based on beaglebone black
 
Analysis of image steganalysis techniques to defend against statistical attac...
Analysis of image steganalysis techniques to defend against statistical attac...Analysis of image steganalysis techniques to defend against statistical attac...
Analysis of image steganalysis techniques to defend against statistical attac...
 
Performance analysis of active clamped interleaved
Performance analysis of active clamped interleavedPerformance analysis of active clamped interleaved
Performance analysis of active clamped interleaved
 
Route optimization in manets with aco and ga
Route optimization in manets with aco and gaRoute optimization in manets with aco and ga
Route optimization in manets with aco and ga
 
Measurement model of software quality in user’s
Measurement model of software quality in user’sMeasurement model of software quality in user’s
Measurement model of software quality in user’s
 
Rate adaptive resource allocation in ofdma using bees algorithm
Rate adaptive resource allocation in ofdma using bees algorithmRate adaptive resource allocation in ofdma using bees algorithm
Rate adaptive resource allocation in ofdma using bees algorithm
 
Handwritten character recognition using method filters
Handwritten character recognition using method filtersHandwritten character recognition using method filters
Handwritten character recognition using method filters
 
Elzaki transform homotopy perturbation method for
Elzaki transform homotopy perturbation method forElzaki transform homotopy perturbation method for
Elzaki transform homotopy perturbation method for
 
Internet enebled data acquisition and device control
Internet enebled data acquisition and device controlInternet enebled data acquisition and device control
Internet enebled data acquisition and device control
 
3 d mrf based video tracking in the compressed domain
3 d mrf based video tracking in the compressed domain3 d mrf based video tracking in the compressed domain
3 d mrf based video tracking in the compressed domain
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokens
 
An enhanced fuzzy rough set based clustering algorithm for categorical data
An enhanced fuzzy rough set based clustering algorithm for categorical dataAn enhanced fuzzy rough set based clustering algorithm for categorical data
An enhanced fuzzy rough set based clustering algorithm for categorical data
 
Gis in assessing topographical aspects of hilly regions
Gis in assessing topographical aspects of hilly regionsGis in assessing topographical aspects of hilly regions
Gis in assessing topographical aspects of hilly regions
 
A novel approach on a robot for the blind people which can trained and operat...
A novel approach on a robot for the blind people which can trained and operat...A novel approach on a robot for the blind people which can trained and operat...
A novel approach on a robot for the blind people which can trained and operat...
 
Lv side distributed power factor correction system
Lv side distributed power factor correction systemLv side distributed power factor correction system
Lv side distributed power factor correction system
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
 
Wavelet based ecg signal component identification
Wavelet based ecg signal component identificationWavelet based ecg signal component identification
Wavelet based ecg signal component identification
 
Diabetic maculopathy detection using fundus fluorescein angiogram images a ...
Diabetic maculopathy detection using fundus fluorescein angiogram images   a ...Diabetic maculopathy detection using fundus fluorescein angiogram images   a ...
Diabetic maculopathy detection using fundus fluorescein angiogram images a ...
 
Sensitivity based optimal location of tcsc for improvement of power system se...
Sensitivity based optimal location of tcsc for improvement of power system se...Sensitivity based optimal location of tcsc for improvement of power system se...
Sensitivity based optimal location of tcsc for improvement of power system se...
 

Similar to An investigative scheme for keyword search using inverted key tactic

A Survey on Automatically Mining Facets for Queries from their Search Results
A Survey on Automatically Mining Facets for Queries from their Search ResultsA Survey on Automatically Mining Facets for Queries from their Search Results
A Survey on Automatically Mining Facets for Queries from their Search ResultsIRJET Journal
 
A Robust Keywords Based Document Retrieval by Utilizing Advanced Encryption S...
A Robust Keywords Based Document Retrieval by Utilizing Advanced Encryption S...A Robust Keywords Based Document Retrieval by Utilizing Advanced Encryption S...
A Robust Keywords Based Document Retrieval by Utilizing Advanced Encryption S...IRJET Journal
 
Comparative analysis of relative and exact search for web information retrieval
Comparative analysis of relative and exact search for web information retrievalComparative analysis of relative and exact search for web information retrieval
Comparative analysis of relative and exact search for web information retrievaleSAT Journals
 
Performance Evaluation of Query Processing Techniques in Information Retrieval
Performance Evaluation of Query Processing Techniques in Information RetrievalPerformance Evaluation of Query Processing Techniques in Information Retrieval
Performance Evaluation of Query Processing Techniques in Information Retrievalidescitation
 
JAVA 2013 IEEE DATAMINING PROJECT Ginix generalized inverted index for keywor...
JAVA 2013 IEEE DATAMINING PROJECT Ginix generalized inverted index for keywor...JAVA 2013 IEEE DATAMINING PROJECT Ginix generalized inverted index for keywor...
JAVA 2013 IEEE DATAMINING PROJECT Ginix generalized inverted index for keywor...IEEEGLOBALSOFTTECHNOLOGIES
 
CANDIDATE SET KEY DOCUMENT RETRIEVAL SYSTEM
CANDIDATE SET KEY DOCUMENT RETRIEVAL SYSTEMCANDIDATE SET KEY DOCUMENT RETRIEVAL SYSTEM
CANDIDATE SET KEY DOCUMENT RETRIEVAL SYSTEMIRJET Journal
 
Adaptive focused crawling strategy for maximising the relevance
Adaptive focused crawling strategy for maximising the relevanceAdaptive focused crawling strategy for maximising the relevance
Adaptive focused crawling strategy for maximising the relevanceeSAT Journals
 
QUERY OPTIMIZATION IN OODBMS: IDENTIFYING SUBQUERY FOR COMPLEX QUERY MANAGEMENT
QUERY OPTIMIZATION IN OODBMS: IDENTIFYING SUBQUERY FOR COMPLEX QUERY MANAGEMENTQUERY OPTIMIZATION IN OODBMS: IDENTIFYING SUBQUERY FOR COMPLEX QUERY MANAGEMENT
QUERY OPTIMIZATION IN OODBMS: IDENTIFYING SUBQUERY FOR COMPLEX QUERY MANAGEMENTcsandit
 
An efficient information retrieval ontology system based indexing for context
An efficient information retrieval ontology system based indexing for contextAn efficient information retrieval ontology system based indexing for context
An efficient information retrieval ontology system based indexing for contexteSAT Journals
 
Classification-based Retrieval Methods to Enhance Information Discovery on th...
Classification-based Retrieval Methods to Enhance Information Discovery on th...Classification-based Retrieval Methods to Enhance Information Discovery on th...
Classification-based Retrieval Methods to Enhance Information Discovery on th...IJMIT JOURNAL
 
Using data mining methods knowledge discovery for text mining
Using data mining methods knowledge discovery for text miningUsing data mining methods knowledge discovery for text mining
Using data mining methods knowledge discovery for text miningeSAT Journals
 
IRJET-Computational model for the processing of documents and support to the ...
IRJET-Computational model for the processing of documents and support to the ...IRJET-Computational model for the processing of documents and support to the ...
IRJET-Computational model for the processing of documents and support to the ...IRJET Journal
 
Query-Based Retrieval of Annotated Document
Query-Based Retrieval of Annotated DocumentQuery-Based Retrieval of Annotated Document
Query-Based Retrieval of Annotated DocumentIRJET Journal
 
Using data mining methods knowledge discovery for text mining
Using data mining methods knowledge discovery for text miningUsing data mining methods knowledge discovery for text mining
Using data mining methods knowledge discovery for text miningeSAT Publishing House
 
Query optimization in oodbms identifying subquery for query management
Query optimization in oodbms identifying subquery for query managementQuery optimization in oodbms identifying subquery for query management
Query optimization in oodbms identifying subquery for query managementijdms
 
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeEnabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeIRJET Journal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) inventionjournals
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 

Similar to An investigative scheme for keyword search using inverted key tactic (20)

A Survey on Automatically Mining Facets for Queries from their Search Results
A Survey on Automatically Mining Facets for Queries from their Search ResultsA Survey on Automatically Mining Facets for Queries from their Search Results
A Survey on Automatically Mining Facets for Queries from their Search Results
 
A Robust Keywords Based Document Retrieval by Utilizing Advanced Encryption S...
A Robust Keywords Based Document Retrieval by Utilizing Advanced Encryption S...A Robust Keywords Based Document Retrieval by Utilizing Advanced Encryption S...
A Robust Keywords Based Document Retrieval by Utilizing Advanced Encryption S...
 
Comparative analysis of relative and exact search for web information retrieval
Comparative analysis of relative and exact search for web information retrievalComparative analysis of relative and exact search for web information retrieval
Comparative analysis of relative and exact search for web information retrieval
 
Performance Evaluation of Query Processing Techniques in Information Retrieval
Performance Evaluation of Query Processing Techniques in Information RetrievalPerformance Evaluation of Query Processing Techniques in Information Retrieval
Performance Evaluation of Query Processing Techniques in Information Retrieval
 
50120140504006
5012014050400650120140504006
50120140504006
 
JAVA 2013 IEEE DATAMINING PROJECT Ginix generalized inverted index for keywor...
JAVA 2013 IEEE DATAMINING PROJECT Ginix generalized inverted index for keywor...JAVA 2013 IEEE DATAMINING PROJECT Ginix generalized inverted index for keywor...
JAVA 2013 IEEE DATAMINING PROJECT Ginix generalized inverted index for keywor...
 
CANDIDATE SET KEY DOCUMENT RETRIEVAL SYSTEM
CANDIDATE SET KEY DOCUMENT RETRIEVAL SYSTEMCANDIDATE SET KEY DOCUMENT RETRIEVAL SYSTEM
CANDIDATE SET KEY DOCUMENT RETRIEVAL SYSTEM
 
Adaptive focused crawling strategy for maximising the relevance
Adaptive focused crawling strategy for maximising the relevanceAdaptive focused crawling strategy for maximising the relevance
Adaptive focused crawling strategy for maximising the relevance
 
QUERY OPTIMIZATION IN OODBMS: IDENTIFYING SUBQUERY FOR COMPLEX QUERY MANAGEMENT
QUERY OPTIMIZATION IN OODBMS: IDENTIFYING SUBQUERY FOR COMPLEX QUERY MANAGEMENTQUERY OPTIMIZATION IN OODBMS: IDENTIFYING SUBQUERY FOR COMPLEX QUERY MANAGEMENT
QUERY OPTIMIZATION IN OODBMS: IDENTIFYING SUBQUERY FOR COMPLEX QUERY MANAGEMENT
 
An efficient information retrieval ontology system based indexing for context
An efficient information retrieval ontology system based indexing for contextAn efficient information retrieval ontology system based indexing for context
An efficient information retrieval ontology system based indexing for context
 
Classification-based Retrieval Methods to Enhance Information Discovery on th...
Classification-based Retrieval Methods to Enhance Information Discovery on th...Classification-based Retrieval Methods to Enhance Information Discovery on th...
Classification-based Retrieval Methods to Enhance Information Discovery on th...
 
Using data mining methods knowledge discovery for text mining
Using data mining methods knowledge discovery for text miningUsing data mining methods knowledge discovery for text mining
Using data mining methods knowledge discovery for text mining
 
IRJET-Computational model for the processing of documents and support to the ...
IRJET-Computational model for the processing of documents and support to the ...IRJET-Computational model for the processing of documents and support to the ...
IRJET-Computational model for the processing of documents and support to the ...
 
Query-Based Retrieval of Annotated Document
Query-Based Retrieval of Annotated DocumentQuery-Based Retrieval of Annotated Document
Query-Based Retrieval of Annotated Document
 
Using data mining methods knowledge discovery for text mining
Using data mining methods knowledge discovery for text miningUsing data mining methods knowledge discovery for text mining
Using data mining methods knowledge discovery for text mining
 
50120140503012
5012014050301250120140503012
50120140503012
 
Query optimization in oodbms identifying subquery for query management
Query optimization in oodbms identifying subquery for query managementQuery optimization in oodbms identifying subquery for query management
Query optimization in oodbms identifying subquery for query management
 
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeEnabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 

Recently uploaded (20)

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 

An investigative scheme for keyword search using inverted key tactic

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 205 AN INVESTIGATIVE SCHEME FOR KEYWORD SEARCH USING INVERTED KEY TACTIC Dnyaneshwar K. Bhujbal 1 , R.V.Pujeri2 , Preeti Sharma3 1 Computer Engineering, SKN Sinhgad Institute Technology & Science, Lonavla, Maharashtra, India 2 Professor & Head, Computer Engineering, SKN Sinhgad Institute Technology & Science, Lonavla, Maharashtra, India 3 Assistant Professor, Computer Engineering, SKN Sinhgad Institute Technology & Science, Lonavla, Maharashtra, India Abstract Unverified classification of outlines that is data items, observations or feature vectors into groups is called as Clustering. To retrieve a document from a group of documents according to a set of keywords efficiently, Inverted lists are mostly used instead of Keyword Search. Keyword Search is one of the most important activities in Information Retrieval System. As study shows in latest years, Keyword search is widely used by users to access text data. Keyword search is appropriate for document gatherings as well as for accessing structured or semi-structured data, XML documents relational databases and relational tables which can also be regarded as sets of documents. This is done by a keyword as query user retrieve documents. To proficiently retrieve documents, a data structure is used, that maps each word in the dataset, to a list of IDs of documents in which the word appears. The inverted index for a document collection consists of a set of so-called inverted lists, known as posting lists. Keywords: Keyword Search, Index Compression, Document Reordering, Rendering ---------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION Keyword Search is basis of Information Retrieval System. As new information is continuously added, the data size keeps on increasing and in these cases Keyword search is helpful for user to access text datasets. This textual data consists of web pages, XML documents and relational tables which can also be regarded as sets of documents. But even Keyword Search leads to a Datasets containing large amount of textual data. To overcome this problem & to retrieve data efficiently Inverted Keys are used which is also known as posting lists. Inverted Keys are used to assess queries in all practical search engines. Keys or Indexes have three major benefits with respect to Compression for performance. 1) Requires less storage space 2) Better use of the available communication Bandwidth. 3) Avoiding a disk access compression [1]. Cluster of Inverted Indexes of a document Datasets is called as Posting Lists. Information retrieval system (IRS) are widely developed for to finding useful information from a large-scale information datasets in which specialized indexing mechanism is required for efficient retrieval. Inverted files and signature files are two indexing tools in which inverted file is more popular because of better performance [2,3]. The new compression technique, that is, Inverted Index Compression Using Word-Aligned Binary Codes, provides compression rates, that are inferior to the best compression rates that have been previously achieved. But has an advantage of requiring exceptionally low computational effort at decoding time [4]. There is huge amount of data stored in different form like Unstructured, Semi-structured and Structured. An Effective 3-in-1 Keyword Search Method known as EASE for Unstructured, Structured and Semi-structured Data for indexing and querying large collections of heterogeneous data. EASE achieves both high accuracy and high search efficiency, and outperforms the existing approaches significantly [5]. The main concept Inverted Index is also used in current web search engines to perform some tasks efficiently. Good answers must be provided by engine within a fraction of a second, while simultaneously serving multiple requests, which gives interactive applications with respect to latency demands [6]. The section [II] describing Literature Survey of An Investigative Scheme for Keyword Search Using Inverted Key Tactic. The Section [III] Explaining Propose System & Architecture of An Investigative Scheme for Keyword Search Using Inverted Key Tactic. The Section [IV] gives the Conclusion of An Investigative Scheme for Keyword Search Using Inverted Key Tactic.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 206 2. LITERATURE SURVEY The use of clustering has been reported by studies in Inverted Indexing for keyword search in Information Retrieval. Basically, The use of classic algorithm for clustering data is described by most of the research such as Expectation-Maximization (EM) for unsupervised learning of Gaussian Mixture Models, K-means, Fuzzy C-means (FCM), and Self-Organizing Maps (SOM). These algorithms have well-known properties and are widely used in practice [9]. The main task is Keyword search through Indexing technique which is one of the most important activities in Information Retrieval System. Keyword search is critical for users to access text datasets, as huge amount of new information is added over the time. In that textual document web pages XML documents, and relational tables which can also be regarded as sets of documents is also includes a keyword as query user can retrieve documents. To efficiently retrieve documents, a data structure is used that maps each word in the dataset to a list of IDs of documents in which the word appears. The inverted index for a document collection consists of a set of so-called inverted lists, known as posting lists. The Concept described here uses Inverted indexes to evaluate queries in all practical search engines. Indexes has three major benefits with respect to Compression for performance, so, 1) Requires less storage space 2) Better use of the available communication Bandwidth so that more information can be transferred per second than, when the data is uncompressed. The total time of transferring compressed data and subsequently decompressing is potentially much less than the cost of transferring uncompressed data for fast decompression schemes 3) Avoiding a disk access compression which increases the part of an index required to evaluate a query, is already cached in memory, Because of the above reasons index compression can reduce cost in retrieval systems [1]. Information Retrieval System (IRS) are widely developed for finding useful information from a large-scale information. So, inverted file compression through document identifier reassignment has tried. Compression of inverted lists of document postings that store the position and frequency of indexed terms. Better implementation and better choice of integer compression schemes are two approaches for improving retrieval efficiency [2,3]. New compression technique that is Inverted Index Compression Using Word-Aligned Binary Codes provides fast access into the compressed inverted lists, and overall provides faster query processing than previous techniques by allowing some inefficiency in the compressed representation. In support of these claims, This gives compression results for several large text collections as well as retrieval throughput results that show the overall benefit of the new approach compared to previous index coding mechanisms [4]. Keyword search is not only convenient for document collections as well as for accessing semi-structured or structured data, like relational databases and XML documents Data is present in different formats like Unstructured, Semi-structured and Structured. An Effective 3-in-1 Keyword Search Method (EASE) for Unstructured, Structured and Semi-structured Data for indexing and querying large collections of heterogeneous data, first model unstructured, structured and semi-structured data as graphs to achieve high efficiency in processing keyword queries, and then instead of using traditional inverted indices summarize the graphs and construct graph indices. For enhancing search effectiveness propose an extended inverted index to facilitate keyword-based search, and present a different ranking mechanism. An extensive experimental study by real datasets and the output show that EASE achieves both high accuracy and high search efficiency, and outperforms the existing approaches significantly [5]. Inverted Index is also used in current web search engines to perform some tasks efficiently. The good answers must be provided by engine within a fraction of a second, while simultaneously serving multiple requests, which gives interactive applications w.r.t. latency demands [6]. To reduce the space cost of storing inverted indexes various compression techniques are used. IDs in inverted lists are sorted in ascending order, to store the differences between IDs many existing techniques are used called d-gaps, and then to encode these d-gaps using shorter binary representations use various techniques. Because of extra computational cost during query processing, An Investigative Scheme for Keyword Search Using Inverted Key Tactic which is an extension of the traditional inverted index (denoted by InvIndex), to support keyword search [7]. An Investigative Scheme for Keyword Search Using Inverted Key Tactic uses no. of Search algorithms for keyword search. Scan-line algorithm, Improved scan-line algorithm, Twin-heap algorithm, Probe-Based Algorithm An Algorithm is given for an Efficient support to basic operations on interval lists, like union and intersection without decompression. The performance of An Investigative Scheme for Keyword Search Using Inverted Key Tactic is enhanced by document reordering, and two scalable and effective algorithms based on signature sorting and greedy heuristic of Traveling Salesman Problem (TSP). A Heuristic Inverted Index Approach of Keyword Search reduces the index size as well as improves the search performance on real datasets [7]. Keyword search is widely used by users to access text data with many studies in recent years. Keyword search is convenient for document collections as well as for accessing semi-structured or structured data, like relational databases and XML documents [8].
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 207 Most techniques first convert each ID in an inverted list to the difference between it and the preceding ID, known as d- gaps, and then encode the list using integer compression algorithms [3,4,8]. Simple and fast decoding provided by Variable-Byte Encoding [3]. Other studies have focused on how to improve the compression ratio of inverted index using document reordering[6]. The overall compression ratio is improved by reassigning document IDs so that similar documents are close to each other, & then there are more small d-gaps in the converted lists. Figure.1 shows the index sizes using different compression techniques. The widely-adopted VBE is used to evaluate the present technique of converting consecutive IDs to intervals in An Investigative Scheme for Keyword Search Using Inverted Key Tactic. Figure 1 compares the original inverted index (denoted by InvIndex), the inverted index compressed by VBE (denoted by InvIndex+VBE), the present inverted index (denoted by Heuristic Inverted Index Approach of Keyword Search), and the present inverted index compressed by VBE (denoted by Heuristic Inverted Index Approach of Keyword Search +VBE) for PubMed datasets. The results show that the Architecture of an Investigative Scheme for Keyword Search Using Inverted Key Tactic Fig. 1 Comparison of sizes of indexes using different compression techniques. Compression is much better than that of VBE. An Investigative Scheme for Keyword Search Using Inverted Key Tactic + VBE result has the smallest index size. [7] The Figure 1 is given below, Fig 1 Architecture of An Investigative Scheme for Keyword Search Using Inverted Key Tactic In our propose system basically there are three important steps which are as follows 1) Labelling 2) Twin Heap Selection 3) Document Retrieving Labelling: In this 1st step there are three sub parts, a) Visit to an individual documents b) Give them label c) Sort in Ascending order. Twin Heap Selection: This is the main Algorithm method used for selection. The steps are as follows a) Find out the Maximum entity in Lower Heap as well as Minimum entity in upper heap. b) After that apply twin heap selection algorithm which gives smallest d-gap that most similar documents in one cluster. c) Set the bound which is a limit. Document Retrieval: This is last step of An Investigative Scheme for Keyword Search Using Inverted Key Tactic in which initially binary search is applied for better performance. Then again sort in ascending order for lower bound [7]. After sorting decide limits which will lead to retrieve documents & it gives Required clustered Documents. To reduce the space cost of storing inverted indexes various compression techniques are used. IDs in inverted lists are sorted in ascending order. To store the differences between IDs many existing techniques are used called as d-gaps, and then to encode these d-gaps using shorter binary representations using various techniques. Because of extra computational cost during query processing, An Investigative Scheme for Keyword Search Using Inverted Key Tactic which is an extension of the traditional inverted index denoted by InvIndex is used to support keyword search [7]. The input document will be in any of the format like text, word, pdf & so on. 3. MATHEMETICAL MODULE Document Retrieval Set D D0= Get all Interval List D1=Remove Empty Lists D2=For Each interval list D3= Get upper limit D4= Get Lower Limit D5=If interval size is greater than 1 D6=Then add in retrieval vector D7= Return Document retrieval vector Algorithm: PROBISECT+(R) Input: R A set of interval lists Output: G The resulting interval list. 1: Sort R in ascending order of list lengths 2: for all r ϵ R1 do Add CASPROBE(r,R-R1) to G 3: return G 4: procedure CASPROBE(r,R) Input : r0 A non-empty interval. R An set of interval lists. Output : G The resulting interval list. 5: R1* CASPROBE(r0,R1) 6: for all r ϵ R1* do 7: r*  [max(lb(r0),lb(r)),min(ub(r0),ub(r))] 8: if n > 1 then Add CASPROBE(r*,R-R1) to G 9: else Add r* to G 10: return G
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 208 11: end procedure 4. RESULTS 4.1 Data Set Here, input is Data Set in which no. of files are there. The input document will be in any of the format like text, word, pdf & so on. In future work we can extend this with audio video input. We will any give keyword as an input to search, then it will search that required keyword in given input dataset. 4.2 Result Set An Investigative Scheme for Keyword Search Using Inverted Key Tactic has an effective index structure and efficient algorithms to support keyword search, This Fast scalable methods enhance the search speed of An Investigative Scheme for Keyword Search Using Inverted Key Tactic by reordering documents in the datasets. It also requires smaller storage size than the traditional inverted index. It has a higher keyword search speed and using compression techniques, performance can be improved. This is used in Document Searching, Search Engine, Bio- Informatics & So on. 5. CONCLUSIONS By doing the survey on An Investigative Scheme for Keyword Search Using Inverted Key Tactic it was determined that clustering on data is not an easy task. There is huge data to be cluster in this Approach, So, to overcome this problem, an approach is presented that applies document clustering methods to An Investigative Scheme for Keyword Search Using Inverted Key Tactic. An Investigative Scheme for Keyword Search Using Inverted Key Tactic has an effective index structure and efficient algorithms to support keyword search, Fast scalable methods of An Investigative Scheme for Keyword Search Using Inverted Key Tactic enhance the search speed by reordering documents in the datasets. Experiments show that This Approach of Keyword Search not only requires smaller storage size than the traditional inverted index, but also has a higher keyword search speed and using compression techniques, performance can be improved. In future work we can extend this project with audio video input. ACKNOWLEDGMENTS I express my sense of gratitude towards my Project guide PROF.R.V.PUJERI & PROF. PREETI SHARMA, who has been very concerned and has aided for all the material essential for the preparation of this paper, he helped me to explore this vast topic in an organized manner and provided me with all the ideas on how to work towards a research oriented venture. I am also thankful to PROF. SUPRIYA B. SARKAR, P.G Coordinator for the motivation and Inspiration that triggered me for the thesis work. REFERENCES [1]. I. Witten, A. Mo_at, and T. Bell. „Managing Gigabytes: Compressing and Indexing Documents and Images.‟ Morgan Kaufmann Publishers, Los Altos, CA 94022, USA, second edition, 1999. [2]. S. Ding, J. Attenberg, and T. Suel, “Scalable techniques for document identifier assignment in inverted indexes” in Proc. of the 19th International Conference on World Wide Web, Raleigh, North Carolina, USA, 2010, pp. 311-320 [3]. F. Scholer, H. E. Williams, J. Yiannis, and J. Zobel, “Compression of inverted indexes for fast query evaluation” in Proc. of the 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Tammpere, Finland, 2002, pp. 222-229,Georgia, USA, 2006, pp. 59. [4]. V. N. Anh and A. Moffat, “Inverted index compression using word-aligned binary codes, Information Retrieval”, vol. 8,no. 1, pp. 151-166, 2005. [5]. G. Li, B. C. Ooi, J. Feng, J.Wang, and L. Zhou, “EASE: An effective 3-in-1 keyword search method for unstructured, semi-structured and structured data”, in Proc. of the ACM SIGMOD International Conference on Management of Data, Vancouver, BC, Canada, 2008, pp. 903-914. [6]. S. Ding, J. Attenberg, and T. Suel, “Scalable techniques for document identifier assignment in inverted indexes” in Proc. of the 19th International Conference on World Wide Web, Raleigh, North Carolina, USA, 2010, pp. 311-320 [7]. Hao Wu_, Guoliang Li, and Lizhu Zhou,”Ginix: Generalized Inverted Index for Keyword Search”, IEEE transactions on knowledge and data mining vol:8 no:1 year 2013.
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 209 [8]. S. Agrawal, S. Chaudhuri, and G. Das, “DBXplorer: A system for keyword-basedsearch over relational databases”, in Proc. of the 18th International Conference on Data Engineering, San Jose, California, USA, 2002, pp. 5-16. [9]. L. Liu, J. Kang, J. Yu, and Z. Wang, “A comparative study on unsupervised feature selection methods for text clustering,” in Proc. IEEE Int. Conf. Natural Language Processing and Knowledge Engineering, 2005, pp. 597– 601. [10]. V. Hristidis and Y. Papakonstantinou, DISCOVER: Keyword search in relational databases, in Proc. of the 28th International Conference on Very Large Databases, Hong Kong, China, 2002, pp. 670-681. [11]. V. Hristidis, L. Gravano, and Y. Papakonstantinou, Efficient IR-style keyword search over relational databases, in Proc. of the 29th International Conference on Very large Databases, Berlin, Germany, 2003, pp. 850-861. BIOGRAPHIES Mr.Dnyaneshwar Kisan Bhujbal is pursuing his Masters of Computer Engineering in SKN Sinhgad Institute of Technology & Science, Lonavla, University of PUNE. He received his BEng. Info.Tech. degree in 2012 from Sinhgad Institute of Technology & Science, Narhe, PUNE, He has published 2 paper in International Conference & Journal. Dr. R.V. Pujeri is currently working as a Professor & Head of Computer Department at SKN Sinhgad Institute of Technology & Science Lonavala. He has total 18 years of Experience. He has published around more than 20-25 paper in International Conference & Journals. He has also guided many number of students of Masters. Prof. Preeti Shrama is an Asst. Prof. at SKN Sinhgad Institute of Technology & Science Lonavala. She received her Master of Computer Engineering degree from Sinhgad Institute of Technology Lonavla, University of PUNE and BCSEng. Degree from MIT Aurangbad. She has published around 10 paper in International Conference & Journals