SlideShare a Scribd company logo
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. V (May – Jun. 2015), PP 07-10
www.iosrjournals.org
DOI: 10.9790/0661-17350710 www.iosrjournals.org 7 | Page
Efficient Refining Of Why-Not Questions on Top-K Queries
P. Haripriya1
, J. Jegan Amarnath2
1
P.G student, Sri Sairam Engineering College, Chennai.
2
Assistant Professor, Sri Sairam Engineering College, Chennai,
Abstract: After decades of effort working on database performance, the quality and the usability of database
systems have received more attention in recent years. In particular, answering the why-not questions after a
search is made has become more important. In this project, the problem of answering why-not questions on top-
k queries and refining the user query is solved. Generally many users love to pose those kinds of queries when
they are making multi-criteria decisions. However, they would also want to know why their expected answers
do not show up in the query results. The different algorithms are developed to answer such why-not questions
efficiently. Top-K dominating questions are those which have more than one or two results. When this case
occurs, the result is ordered according to highest ranking among the records. A search is made and result is
displayed, if the expected tuple does not appear then user raises a why-not query. This query is refined using
algorithm and then the result is calculated. A penalty function is added such that the result can be returned
efficiently and without any fault.
Keyword: why-not questions, Top-K and Dominating queries, penalty.
I. Introduction
Database technology has made great strides in the past decades. Today, we are able to process ever
larger numbers of ever more complex queries on ever more humongous data sets efficiently. Internet search
engines have popularized keyword based search. Users provide keywords to the user interface and a ranked list
of documents is displayed to the user. A why-not question is being posed when a user wants to know why her
expected tuples do not show up in the query result. A certain effort has worked on answering why-not
questions on traditional relational or the SQL queries. But none of those can answer why-not questions on
preference queries like top-k queries yet. Answering the why-not questions gives the purpose of using the data
mining algorithms. The main goal is to find a refined top-k query that include non-empty set of missing objects
and the user’s initial query. A non-empty set includes all the contents and the set is found to be not empty.
When the user provides a query with the count or search for a top-k query then the process analyses and
produces the result without the non-empty set.
For example, a user of DBLife may be surprised to find out that the system believes that a person was
not on the program committee of conference of another. In fact he may have actually been on the program
committee, but this fact does not appear in the extracted data, perhaps due to bugs in extractors, or in accuracies
in sources, or incomplete coverage of sources. Therefore, it is important to help developers debug the system
and to help users understand why they got the result they did. On the other hand, if the result really shouldn’t be
in the result, it is a must to explain to the user why this is the case so that they can gain confidence in the non-
answer. [1][2].Top-k dominating queries, or just dominating queries, is a form of top-k query that users may
pose why-not questions on. While a top-k dominating query frees users from specifying the set of weightings by
ranking the objects based on the number of (other) objects that they could dominate.
Both the why-not and Dominating Top-k queries are explained with two algorithms to provide the
reason for the missing records. The main goals can be explained as the problem formulation, the problem
analysis, and the algorithms of answering why-not questions on top-k queries and dominating queries. Also
given thing is that there are an infinite number of points (weightings) in the weighting space we should put
limited amount of the records into S in order to obtain a good approximation of the answer. Searching for the
particular keyword through traditional information retrieval techniques for enabling keyword search in
document collections use data structures such as inverted lists that efficiently identify documents containing a
query keyword is another method. A straight forward mapping of this idea to databases is a symbol table that
stores information at row level granularity that is we keep the list of rows that contains the keyword. Alternative
symbol table designs are possible where we can leverage the physical design of the database. For example, if a
column has an index then we only need column level granularity. For this purpose we only store the list of
columns for each keyword where they occur.
Efficient Refining Of Why-Not Questions On Top-K Queries
DOI: 10.9790/0661-17350710 www.iosrjournals.org 8 | Page
II. Related Work
The concept of why-not is first discussed in [6]. This work answers a user’s why-not question on
Select-Project-Join(SPJ) queries by telling her which query operator(s) eliminated her desired answers.
After that, this line of work is gradually expanded. In [7] and [8], the missing answers of SPJ [7] and
SPJUA (SPJ + Union + Aggregation) queries are explained by a data-refinement approach, i.e., it tells the user
how the data should be modified if user wants the missing answer back to the result.
Answering why-not for a Top-k query was explained by Zhian He and Eric Lo [1]. An algorithm is
discussed for answering the queries posed by the user on a Top-K query. Also a defined dimensional disk space
has been provided for the records or the tuples on the Top-k rankings and positions. The main goal is about the
basic top-k query where users need to specify the set of weightings and the query where users do not need to
specify the set of weightings because the ranking function ranks an object higher if it can dominate more
objects. The target is focussed mainly to give an explanation to a user who is wondering why her expected
answers are missing in the query result. Since the problems are non-identical, a different explanation models for
top-k queries and top-k dominating queries is given.
Islam, M.S.,Rui Zhou, Chengfei Liu has proposed a method for answering the why-not question on
Reverse Skyline queries. This query recovers all data points whose dynamic skylines contain the query point.
The benefit and the semantics of answering why-not questions in reverse skyline queries are defined. A
technique to modify the why-not point and the query point to include the why-not point in the reverse skyline of
the query point is given. This point can be placed anywhere within a region safely without losing any of
the existing reverse skyline points. Considering the safe region of the query point answering a why-not question
is done. The procedure also efficiently combines both query point and data point modification techniques to
produce meaningful answers.
Vermeulen, Vanderhulst, Luyten, Coninx, Karin started a method of answering the why-not question
through the pervasive crystal. The condition becomes distressed when they are unable to understand and control
a pervasive computing environment. Also the other works have shown that allowing users to pose why and why
not questions about context-aware applications resulted in better understanding and stronger feelings of trust.
Though why-not questions have been used before to aid in debugging and to clarify graphical user interfaces, it
is not clear how they can be integrated into pervasive computing systems. In existing framework with support
for why and why-not question is extended for the search of missing keywords. So a new method called
Pervasive Crystal which is a system for asking and answering why and why-not questions in pervasive
computing environments was derived.
Islam M.S has proposed a related process where a database is efficiently used in this process without
wasting the sample space. There is a growing interest in allowing users to ask questions on received results in
the hope of improving the usability of database systems. Islam M.S. has proposed this approach which aims
at answering the so called why and why-not questions on received results with respect to different query
settings in databases. The goals of this research can be explained as studying the problem of answering the why
and the why-not questions in relative databases, explain the efficient strategies for answering these questions in
terms of different settings and finally developing a framework that can take advantage of the existing data
indexing and query evaluation techniques for the purpose of answering such questions in the databases. The
progressed research work contributes completely towards improving the usability of traditional database
systems. The similarity between the current and the related work is that an algorithm for refining those why-not
questions is given and it is efficient in time. Analyzing and answering a dominating Top-k query is not an easy
task and it is also solved by giving different weightings to the set of the records.
III. Problem And Analysis
A table is called a trusted table if it is assumed to be correct and complete, so we do not have to
consider updates or insertions to it when computing the provenance of non-answers. An attribute is called a
trusted attribute if its values in existing tuples are correct and therefore updates to them can be ignored. But that
new values can appear in trusted attributes when new tuples are inserted. The user must either choose to trust
tables or individual attributes that appear in a database else the corresponding objects. In a database, each object
p with d attribute values can be represented as a point p = |p[1] p[2] ...p[d]| in a d-dimensional data space Rd.
Now we assume that all attribute values are numeric and a smaller value means a better score for simplicity. A
top-k query is composed of a scoring function which gives a result set size r, and a weighting vector w = w [1]
w[2]. The scoring function as any monotonic function is accepted and the weighting space subject to the
constraints w[i] = 1 and 0 ≤ w[i] ≤ 1 is assumed. The query result would then be a set of k objects whose scores
are the smallest.
The penalty function is developed in case of interruption of the process. Nevertheless, the solution
works for all kinds of monotonic penalty functions. A technique to skip many of those progressive top-k
operations so as to improve the algorithm’s efficiency is also presented. A much more aggressive and effective
Efficient Refining Of Why-Not Questions On Top-K Queries
DOI: 10.9790/0661-17350710 www.iosrjournals.org 9 | Page
stopping condition that makes most of those operations stop is also presented. Two techniques together can
significantly reduce the overall running time of the algorithm. Since general QP solver requires the solution
space be convex, first divide Wri into Cnj −1. Each convex coordinate corresponds to a quadratic programming
problem. After solving all these quadratic programming problems, the best wri would be identified. For all
rankings to be considered there are n+1 j=1 Cnj −1 = 2n (n is the number of incomparable objects with m)
quadratic programming problems in the worst case.
An approach for finding out the multiple missing objects is proposed. The main goal is considered
through varying the data size, query dimension, count or the number of missing objects, performance. A
sampling-based algorithm that finds the best approximate answer is proposed. A progressive top-k query q
based on the weighting vector w in the user’s original query q is posed using any progressive top-k query
evaluation algorithm, and stop when m comes forth to the result set with a ranking ro. If m does not appear in
the query result, then report to the user that m does not exist in the database and the process terminates. If m
exists in the database, then randomly sample a list of weighting vectors S = [w1, w2 . . . ws] from the weighting
space.
Fig: 1. Restricted Sample space
IV. Answering Dominating Top-K Query
The basic idea for refining why-not top-k dominating queries is similar to the idea of answering top-k
why-not questions. First in the case where there is only one missing object m execute a top-k dominating query
q_o using a progressive top-k dominating query evaluation algorithm and stop when m comes forth to the result
set with a ranking ro. If m does not appear in the query result, inform the user that m does not exist in the
database and the process terminates. tie at rank k-th, only one of them is returned). Initially, a user poses a top-k
dominating query qo(ko).After she gets the result, she may pose a why-not question on qo with a set of missing
objects M = {m1, . . . , mj}. By using only the query-refinement approach here, we can only modify the value of
k in order to make M appear in the result. That may result in a refined query whose k’s value is increased
significantly if there are some missing objects that are actually dominated by many points. As such, we also use
the data-refinement approach [7], [8] here. That is, we may either adjust the value of k, the values of m1, . . . ,
mj, or both.
Now, formally, the problem is: Given a why-not question {M, qo(ko)}, where M is a non-empty set of
missing objects, qo(ko) is the user’s initial top-k dominating query, the goal is to find a new value k_ and a
value replacement M_ for M, such that all the objects in M_ appear in the result of refined dominating query
q(k) with the smallest penalty based on the weightings.
V. Algorithm
[PHASE-1] The algorithm first executes a progressive top-k dominating query evaluation algorithm to
locate the list of objects, together with their scores, and the list is given as L with rank 1, 2, 3,... until the
missing object m shows up in the result in rank rth. Now denote that operation as (L, ro) =
DOMINATING(UNTIL-SEE- _m). After that, it samples data values _x1, _x2, . . . , _xs from the restricted
sample space Rs and adds them into S.
[PHASE-2] Next, for some data value sample _xi of S, modify m’s values to be xi and then determine
the ranking ri of m after the value modification. Note that the ranking ri basically can be determined by
executing a progressive top-k dominating algorithm once again on the database. The Technique is given as (a)
below to illustrate a much efficient way to determine the ranking ri, without actually invoking the progressive
top-k dominating algorithm. Therefore the technique in why-not top-k processing can be applied here to skip
ranking calculations for some data value samples.
Efficient Refining Of Why-Not Questions On Top-K Queries
DOI: 10.9790/0661-17350710 www.iosrjournals.org 10 | Page
[PHASE-3] After PHASE-2, we should have s + 1 ―refined queries and modified values‖ pairs:
<q>o(ro), m = m,<q>1(r1), m = <x1>, . . . , <q>s+1(rs+1), m = <xs+1>. The pair with the least penalty is
returned to the user as the answer.
Technique —Efficient ranking computation for a sample point
This method describes how to efficiently compute the ranking ri of m if setting m’s value to _xi. First,
we compute the new score of m which is the number of objects dominated by m, when its values equal to
sample _xi. This technique can be easily done by any skyline-related algorithm or by posing a simple range
query on an R-tree. Next update the scores of all objects in L (stored in PHASE-1) as the value of m is changed
to _xi. do not update the scores of objects not in L because they were either dominated by _m or incomparable
with m. So, their scores would not get changed. For the objects in L that do not dominate _m, their scores are
unchanged because if they did not dominate _m before, they also cannot dominate m now (because _m gets a
better value _xi). Only for those objects in L that dominate _m, we check whether every such object dominates
_xi (which is _m’s new value), if yes, its score is unchanged; otherwise its score is reduced by one. With all the
updated scores in place, we can easily determine the new ranking ri of _m. We represent this operation as:
ri = COMPUTE-RANK( _m, _xi).
A case study is done for a NBA database selecting top-k players for center, guard and other positions.
The search is made according to their rankings and the why-not questions posed by the users are answered
respectively based on their weightings. The technique proposed in the algorithm is tested and experimented with
a sample database containing the records. The effectiveness of techniques are also very promising. Without
using any optimization technique, the algorithm requires about 1500 seconds and 400 seconds on uniform
dataset and anti-correlated dataset, respectively. But when optimization techniques are enabled, the algorithm
runs about two orders of magnitude faster — it requires only about 10 seconds and 2 seconds on uniform
dataset and anti-correlated dataset, respectively.
VI. Conclusion
The refining of why-not questions on Top-k queries is studied. There are different techniques for
answering a why-not questions but this algorithm helps users to get a efficient answer to their questions. While
a search is made the why-not query must be refined such that the errors will be avoided at an initial state. The
basic top-k query where users need to specify the set of weightings, and the top-k dominating query where users
do not need to specify the set of weightings because the ranking function ranks an object higher if it can
dominate more objects. The target is to give an explanation to a user who is wondering why her expected
answers are missing in the query result. Since the problems are different, so a different explanation models for
top-k queries and top-k dominating queries is used . For the former, the user gets a refined query with
approximately minimal changes to the k value and their weightings. For the latter, user gets a refined query
with approximately minimal changes to the k value and the missing objects’ data values. In the future work the
case of non-numeric attributes will be studied.
References
[1]. Sanjay Agrawal, Surajit Chaudhuri, Gautam Das, ―DBXplorer: A System for Keyword-Based Search over Relational Databases‖
2010.
[2]. Zhian He, Eric Lo, ―Answering Why-Not Questions on Top-K Queries‖, IEEE transactions on knowledge and data engineering,
vol. 26, no. 6, june 2014.
[3]. Islam , M.S ; Rui Zhou ; Chengfei Liu, ―On answering why-not questions in reverse skyline queries‖, IEEE transactions on Mining
techniques, April 2013.
[4]. Islam, M.S., ―On answering why and why-not questions in Databases‖, Data Engineering Workshop (ICDEW),IEEE international
conference,2013.
[5]. Vermeulen,J; Vanderhulst, G. ; Luyten,K. ; Conix, karin ,― PervasiveCrystal: Asking and Answering Why and Why Not
Questions about Pervasive Computing Applications‖, IEEE Conference publications, 2010.
[6]. Jiajun Gu ; Kitagawa, H. ,― Extending Keyword Search to Metadata on Relational Databases‖ , Information-Explosion and Next
Generation search (IENGS),. 2008.
[7]. Melanie Herschel, MauricioA.Hern´andez, ―Explaining Missing Answers to SPJUA Queries‖, IEEE conference publications, 2008
[8]. E. Tiakas, A. N. Papadopoulos, and Y. Manolopoulos, ―Progressive processing of subspace dominating queries,‖ VLDB J., vol. 20,
no. 6, pp. 921–948, 2011.
[9]. A. Vlachou, C. Doulkeridis, Y. Kotidis, and K. Nørvåg, ―Reverse top-k queries,‖ in Proc. ICDE, Long Beach, CA, USA, 2010, pp.
365–376.
[10]. M. L. Yiu and N. Mamoulis, ―Efficent processing of top-k dominating queries on multi-dimensional data,‖ in Proc. VLDB, Vienna,
Austria, 2007, pp. 541–552.
[11]. S. Borzsonyi,D. Kossmann, and K. Stocker, ―The skyline operator,‖ACM Trans. Database Syst., vol. 25, no. 2, pp. 129–178, 2000.
[12]. A. Motro, ―Query generalization: A method for interpreting null answers,‖ in Proc. Expert Database Workshop, 1984, pp. 597–616.

More Related Content

What's hot

QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS
 QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS
QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS
Nexgen Technology
 
Query Aware Determinization of Uncertain Objects
Query Aware Determinization of Uncertain ObjectsQuery Aware Determinization of Uncertain Objects
Query Aware Determinization of Uncertain Objects
1crore projects
 
Query aware determinization of uncertain
Query aware determinization of uncertainQuery aware determinization of uncertain
Query aware determinization of uncertain
jpstudcorner
 
Query aware determinization of uncertain objects
Query aware determinization of uncertain objectsQuery aware determinization of uncertain objects
Query aware determinization of uncertain objects
CloudTechnologies
 
Query-Based Retrieval of Annotated Document
Query-Based Retrieval of Annotated DocumentQuery-Based Retrieval of Annotated Document
Query-Based Retrieval of Annotated Document
IRJET Journal
 
Data science in_action
Data science in_actionData science in_action
Data science in_action
Ji Li
 
Architecture of an ontology based domain-specific natural language question a...
Architecture of an ontology based domain-specific natural language question a...Architecture of an ontology based domain-specific natural language question a...
Architecture of an ontology based domain-specific natural language question a...
IJwest
 
Advanced Question Paper Generator using Fuzzy Logic
Advanced Question Paper Generator using Fuzzy LogicAdvanced Question Paper Generator using Fuzzy Logic
Advanced Question Paper Generator using Fuzzy Logic
IRJET Journal
 
Feature selection, optimization and clustering strategies of text documents
Feature selection, optimization and clustering strategies of text documentsFeature selection, optimization and clustering strategies of text documents
Feature selection, optimization and clustering strategies of text documents
IJECEIAES
 
Query formulation process
Query formulation processQuery formulation process
Query formulation processmalathimurugan
 
On the benefit of logic-based machine learning to learn pairwise comparisons
On the benefit of logic-based machine learning to learn pairwise comparisonsOn the benefit of logic-based machine learning to learn pairwise comparisons
On the benefit of logic-based machine learning to learn pairwise comparisons
journalBEEI
 
Semantic Based Model for Text Document Clustering with Idioms
Semantic Based Model for Text Document Clustering with IdiomsSemantic Based Model for Text Document Clustering with Idioms
Semantic Based Model for Text Document Clustering with Idioms
Waqas Tariq
 
Question Retrieval in Community Question Answering via NON-Negative Matrix Fa...
Question Retrieval in Community Question Answering via NON-Negative Matrix Fa...Question Retrieval in Community Question Answering via NON-Negative Matrix Fa...
Question Retrieval in Community Question Answering via NON-Negative Matrix Fa...
IRJET Journal
 
Sources of errors in distributed development projects implications for colla...
Sources of errors in distributed development projects implications for colla...Sources of errors in distributed development projects implications for colla...
Sources of errors in distributed development projects implications for colla...
Bhagyashree Deokar
 
professional fuzzy type-ahead rummage around in xml type-ahead search techni...
professional fuzzy type-ahead rummage around in xml  type-ahead search techni...professional fuzzy type-ahead rummage around in xml  type-ahead search techni...
professional fuzzy type-ahead rummage around in xml type-ahead search techni...
Kumar Goud
 
Context Sensitive Search String Composition Algorithm using User Intention to...
Context Sensitive Search String Composition Algorithm using User Intention to...Context Sensitive Search String Composition Algorithm using User Intention to...
Context Sensitive Search String Composition Algorithm using User Intention to...
IJECEIAES
 
2. an efficient approach for web query preprocessing edit sat
2. an efficient approach for web query preprocessing edit sat2. an efficient approach for web query preprocessing edit sat
2. an efficient approach for web query preprocessing edit sat
IAESIJEECS
 
Convolutional recurrent neural network with template based representation for...
Convolutional recurrent neural network with template based representation for...Convolutional recurrent neural network with template based representation for...
Convolutional recurrent neural network with template based representation for...
IJECEIAES
 

What's hot (19)

QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS
 QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS
QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS
 
Sub1579
Sub1579Sub1579
Sub1579
 
Query Aware Determinization of Uncertain Objects
Query Aware Determinization of Uncertain ObjectsQuery Aware Determinization of Uncertain Objects
Query Aware Determinization of Uncertain Objects
 
Query aware determinization of uncertain
Query aware determinization of uncertainQuery aware determinization of uncertain
Query aware determinization of uncertain
 
Query aware determinization of uncertain objects
Query aware determinization of uncertain objectsQuery aware determinization of uncertain objects
Query aware determinization of uncertain objects
 
Query-Based Retrieval of Annotated Document
Query-Based Retrieval of Annotated DocumentQuery-Based Retrieval of Annotated Document
Query-Based Retrieval of Annotated Document
 
Data science in_action
Data science in_actionData science in_action
Data science in_action
 
Architecture of an ontology based domain-specific natural language question a...
Architecture of an ontology based domain-specific natural language question a...Architecture of an ontology based domain-specific natural language question a...
Architecture of an ontology based domain-specific natural language question a...
 
Advanced Question Paper Generator using Fuzzy Logic
Advanced Question Paper Generator using Fuzzy LogicAdvanced Question Paper Generator using Fuzzy Logic
Advanced Question Paper Generator using Fuzzy Logic
 
Feature selection, optimization and clustering strategies of text documents
Feature selection, optimization and clustering strategies of text documentsFeature selection, optimization and clustering strategies of text documents
Feature selection, optimization and clustering strategies of text documents
 
Query formulation process
Query formulation processQuery formulation process
Query formulation process
 
On the benefit of logic-based machine learning to learn pairwise comparisons
On the benefit of logic-based machine learning to learn pairwise comparisonsOn the benefit of logic-based machine learning to learn pairwise comparisons
On the benefit of logic-based machine learning to learn pairwise comparisons
 
Semantic Based Model for Text Document Clustering with Idioms
Semantic Based Model for Text Document Clustering with IdiomsSemantic Based Model for Text Document Clustering with Idioms
Semantic Based Model for Text Document Clustering with Idioms
 
Question Retrieval in Community Question Answering via NON-Negative Matrix Fa...
Question Retrieval in Community Question Answering via NON-Negative Matrix Fa...Question Retrieval in Community Question Answering via NON-Negative Matrix Fa...
Question Retrieval in Community Question Answering via NON-Negative Matrix Fa...
 
Sources of errors in distributed development projects implications for colla...
Sources of errors in distributed development projects implications for colla...Sources of errors in distributed development projects implications for colla...
Sources of errors in distributed development projects implications for colla...
 
professional fuzzy type-ahead rummage around in xml type-ahead search techni...
professional fuzzy type-ahead rummage around in xml  type-ahead search techni...professional fuzzy type-ahead rummage around in xml  type-ahead search techni...
professional fuzzy type-ahead rummage around in xml type-ahead search techni...
 
Context Sensitive Search String Composition Algorithm using User Intention to...
Context Sensitive Search String Composition Algorithm using User Intention to...Context Sensitive Search String Composition Algorithm using User Intention to...
Context Sensitive Search String Composition Algorithm using User Intention to...
 
2. an efficient approach for web query preprocessing edit sat
2. an efficient approach for web query preprocessing edit sat2. an efficient approach for web query preprocessing edit sat
2. an efficient approach for web query preprocessing edit sat
 
Convolutional recurrent neural network with template based representation for...
Convolutional recurrent neural network with template based representation for...Convolutional recurrent neural network with template based representation for...
Convolutional recurrent neural network with template based representation for...
 

Viewers also liked

I1804015458
I1804015458I1804015458
I1804015458
IOSR Journals
 
C017531925
C017531925C017531925
C017531925
IOSR Journals
 
I010415255
I010415255I010415255
I010415255
IOSR Journals
 
I011125160
I011125160I011125160
I011125160
IOSR Journals
 
D1303032730
D1303032730D1303032730
D1303032730
IOSR Journals
 
B0310711
B0310711B0310711
B0310711
IOSR Journals
 
Path-Loss Determination of 91.5 MHZ FM Radio Channel of Ekiti State
Path-Loss Determination of 91.5 MHZ FM Radio Channel of Ekiti StatePath-Loss Determination of 91.5 MHZ FM Radio Channel of Ekiti State
Path-Loss Determination of 91.5 MHZ FM Radio Channel of Ekiti State
IOSR Journals
 
Crack Detection for Various Loading Conditions in Beam Using Hilbert – Huang ...
Crack Detection for Various Loading Conditions in Beam Using Hilbert – Huang ...Crack Detection for Various Loading Conditions in Beam Using Hilbert – Huang ...
Crack Detection for Various Loading Conditions in Beam Using Hilbert – Huang ...
IOSR Journals
 
J010224750
J010224750J010224750
J010224750
IOSR Journals
 
I017654651
I017654651I017654651
I017654651
IOSR Journals
 
E012423034
E012423034E012423034
E012423034
IOSR Journals
 
P01222104109
P01222104109P01222104109
P01222104109
IOSR Journals
 
M010618997
M010618997M010618997
M010618997
IOSR Journals
 
Issues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A ReviewIssues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A Review
IOSR Journals
 
A010330109
A010330109A010330109
A010330109
IOSR Journals
 
F010112934
F010112934F010112934
F010112934
IOSR Journals
 
I017165663
I017165663I017165663
I017165663
IOSR Journals
 
C010231319
C010231319C010231319
C010231319
IOSR Journals
 
B010320815
B010320815B010320815
B010320815
IOSR Journals
 
K017426872
K017426872K017426872
K017426872
IOSR Journals
 

Viewers also liked (20)

I1804015458
I1804015458I1804015458
I1804015458
 
C017531925
C017531925C017531925
C017531925
 
I010415255
I010415255I010415255
I010415255
 
I011125160
I011125160I011125160
I011125160
 
D1303032730
D1303032730D1303032730
D1303032730
 
B0310711
B0310711B0310711
B0310711
 
Path-Loss Determination of 91.5 MHZ FM Radio Channel of Ekiti State
Path-Loss Determination of 91.5 MHZ FM Radio Channel of Ekiti StatePath-Loss Determination of 91.5 MHZ FM Radio Channel of Ekiti State
Path-Loss Determination of 91.5 MHZ FM Radio Channel of Ekiti State
 
Crack Detection for Various Loading Conditions in Beam Using Hilbert – Huang ...
Crack Detection for Various Loading Conditions in Beam Using Hilbert – Huang ...Crack Detection for Various Loading Conditions in Beam Using Hilbert – Huang ...
Crack Detection for Various Loading Conditions in Beam Using Hilbert – Huang ...
 
J010224750
J010224750J010224750
J010224750
 
I017654651
I017654651I017654651
I017654651
 
E012423034
E012423034E012423034
E012423034
 
P01222104109
P01222104109P01222104109
P01222104109
 
M010618997
M010618997M010618997
M010618997
 
Issues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A ReviewIssues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A Review
 
A010330109
A010330109A010330109
A010330109
 
F010112934
F010112934F010112934
F010112934
 
I017165663
I017165663I017165663
I017165663
 
C010231319
C010231319C010231319
C010231319
 
B010320815
B010320815B010320815
B010320815
 
K017426872
K017426872K017426872
K017426872
 

Similar to B017350710

Missing Value Evaluation in SQL Queries: A Survey
Missing Value Evaluation in SQL Queries: A SurveyMissing Value Evaluation in SQL Queries: A Survey
Missing Value Evaluation in SQL Queries: A Survey
IRJET Journal
 
IRJET- Missing Value Evaluation in SQL Queries: A Survey
IRJET- 	  Missing Value Evaluation in SQL Queries: A SurveyIRJET- 	  Missing Value Evaluation in SQL Queries: A Survey
IRJET- Missing Value Evaluation in SQL Queries: A Survey
IRJET Journal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
Open domain question answering system using semantic role labeling
Open domain question answering system using semantic role labelingOpen domain question answering system using semantic role labeling
Open domain question answering system using semantic role labeling
eSAT Publishing House
 
Bsa 411 preview full class
Bsa 411 preview full classBsa 411 preview full class
Bsa 411 preview full class
fasthomeworkhelpdotcome
 
Application of hidden markov model in question answering systems
Application of hidden markov model in question answering systemsApplication of hidden markov model in question answering systems
Application of hidden markov model in question answering systems
ijcsa
 
Pattern based approach for Natural Language Interface to Database
Pattern based approach for Natural Language Interface to DatabasePattern based approach for Natural Language Interface to Database
Pattern based approach for Natural Language Interface to Database
IJERA Editor
 
IRJET- Testing Improvement in Business Intelligence Area
IRJET- Testing Improvement in Business Intelligence AreaIRJET- Testing Improvement in Business Intelligence Area
IRJET- Testing Improvement in Business Intelligence Area
IRJET Journal
 
dynamic query forms for non relational database
dynamic query forms for non relational databasedynamic query forms for non relational database
dynamic query forms for non relational database
INFOGAIN PUBLICATION
 
IRJET- Analysis of Question and Answering Recommendation System
IRJET-  	  Analysis of Question and Answering Recommendation SystemIRJET-  	  Analysis of Question and Answering Recommendation System
IRJET- Analysis of Question and Answering Recommendation System
IRJET Journal
 
Query processing
Query processingQuery processing
Query processing
Dr. C.V. Suresh Babu
 
Mca1040 system analysis and design
Mca1040  system analysis and designMca1040  system analysis and design
Mca1040 system analysis and design
smumbahelp
 
A Review on Novel Scoring System for Identify Accurate Answers for Factoid Qu...
A Review on Novel Scoring System for Identify Accurate Answers for Factoid Qu...A Review on Novel Scoring System for Identify Accurate Answers for Factoid Qu...
A Review on Novel Scoring System for Identify Accurate Answers for Factoid Qu...
International Journal of Science and Research (IJSR)
 
Efficient instant fuzzy search with proximity ranking
Efficient instant fuzzy search with proximity rankingEfficient instant fuzzy search with proximity ranking
Efficient instant fuzzy search with proximity ranking
Shakas Technologies
 
SentimentAnalysisofTwitterProductReviewsDocument.pdf
SentimentAnalysisofTwitterProductReviewsDocument.pdfSentimentAnalysisofTwitterProductReviewsDocument.pdf
SentimentAnalysisofTwitterProductReviewsDocument.pdf
DevinSohi
 
Répondre à la question automatique avec le web
Répondre à la question automatique avec le webRépondre à la question automatique avec le web
Répondre à la question automatique avec le webAhmed Hammami
 
Top 30 Data Analyst Interview Questions.pdf
Top 30 Data Analyst Interview Questions.pdfTop 30 Data Analyst Interview Questions.pdf
Top 30 Data Analyst Interview Questions.pdf
ShaikSikindar1
 
Profile Analysis of Users in Data Analytics Domain
Profile Analysis of   Users in Data Analytics DomainProfile Analysis of   Users in Data Analytics Domain
Profile Analysis of Users in Data Analytics Domain
Drjabez
 
Dq2644974501
Dq2644974501Dq2644974501
Dq2644974501IJMER
 
QUESTION ANSWERING MODULE LEVERAGING HETEROGENEOUS DATASETS
QUESTION ANSWERING MODULE LEVERAGING HETEROGENEOUS DATASETSQUESTION ANSWERING MODULE LEVERAGING HETEROGENEOUS DATASETS
QUESTION ANSWERING MODULE LEVERAGING HETEROGENEOUS DATASETS
ijnlc
 

Similar to B017350710 (20)

Missing Value Evaluation in SQL Queries: A Survey
Missing Value Evaluation in SQL Queries: A SurveyMissing Value Evaluation in SQL Queries: A Survey
Missing Value Evaluation in SQL Queries: A Survey
 
IRJET- Missing Value Evaluation in SQL Queries: A Survey
IRJET- 	  Missing Value Evaluation in SQL Queries: A SurveyIRJET- 	  Missing Value Evaluation in SQL Queries: A Survey
IRJET- Missing Value Evaluation in SQL Queries: A Survey
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Open domain question answering system using semantic role labeling
Open domain question answering system using semantic role labelingOpen domain question answering system using semantic role labeling
Open domain question answering system using semantic role labeling
 
Bsa 411 preview full class
Bsa 411 preview full classBsa 411 preview full class
Bsa 411 preview full class
 
Application of hidden markov model in question answering systems
Application of hidden markov model in question answering systemsApplication of hidden markov model in question answering systems
Application of hidden markov model in question answering systems
 
Pattern based approach for Natural Language Interface to Database
Pattern based approach for Natural Language Interface to DatabasePattern based approach for Natural Language Interface to Database
Pattern based approach for Natural Language Interface to Database
 
IRJET- Testing Improvement in Business Intelligence Area
IRJET- Testing Improvement in Business Intelligence AreaIRJET- Testing Improvement in Business Intelligence Area
IRJET- Testing Improvement in Business Intelligence Area
 
dynamic query forms for non relational database
dynamic query forms for non relational databasedynamic query forms for non relational database
dynamic query forms for non relational database
 
IRJET- Analysis of Question and Answering Recommendation System
IRJET-  	  Analysis of Question and Answering Recommendation SystemIRJET-  	  Analysis of Question and Answering Recommendation System
IRJET- Analysis of Question and Answering Recommendation System
 
Query processing
Query processingQuery processing
Query processing
 
Mca1040 system analysis and design
Mca1040  system analysis and designMca1040  system analysis and design
Mca1040 system analysis and design
 
A Review on Novel Scoring System for Identify Accurate Answers for Factoid Qu...
A Review on Novel Scoring System for Identify Accurate Answers for Factoid Qu...A Review on Novel Scoring System for Identify Accurate Answers for Factoid Qu...
A Review on Novel Scoring System for Identify Accurate Answers for Factoid Qu...
 
Efficient instant fuzzy search with proximity ranking
Efficient instant fuzzy search with proximity rankingEfficient instant fuzzy search with proximity ranking
Efficient instant fuzzy search with proximity ranking
 
SentimentAnalysisofTwitterProductReviewsDocument.pdf
SentimentAnalysisofTwitterProductReviewsDocument.pdfSentimentAnalysisofTwitterProductReviewsDocument.pdf
SentimentAnalysisofTwitterProductReviewsDocument.pdf
 
Répondre à la question automatique avec le web
Répondre à la question automatique avec le webRépondre à la question automatique avec le web
Répondre à la question automatique avec le web
 
Top 30 Data Analyst Interview Questions.pdf
Top 30 Data Analyst Interview Questions.pdfTop 30 Data Analyst Interview Questions.pdf
Top 30 Data Analyst Interview Questions.pdf
 
Profile Analysis of Users in Data Analytics Domain
Profile Analysis of   Users in Data Analytics DomainProfile Analysis of   Users in Data Analytics Domain
Profile Analysis of Users in Data Analytics Domain
 
Dq2644974501
Dq2644974501Dq2644974501
Dq2644974501
 
QUESTION ANSWERING MODULE LEVERAGING HETEROGENEOUS DATASETS
QUESTION ANSWERING MODULE LEVERAGING HETEROGENEOUS DATASETSQUESTION ANSWERING MODULE LEVERAGING HETEROGENEOUS DATASETS
QUESTION ANSWERING MODULE LEVERAGING HETEROGENEOUS DATASETS
 

More from IOSR Journals

A011140104
A011140104A011140104
A011140104
IOSR Journals
 
M0111397100
M0111397100M0111397100
M0111397100
IOSR Journals
 
L011138596
L011138596L011138596
L011138596
IOSR Journals
 
K011138084
K011138084K011138084
K011138084
IOSR Journals
 
J011137479
J011137479J011137479
J011137479
IOSR Journals
 
I011136673
I011136673I011136673
I011136673
IOSR Journals
 
G011134454
G011134454G011134454
G011134454
IOSR Journals
 
H011135565
H011135565H011135565
H011135565
IOSR Journals
 
F011134043
F011134043F011134043
F011134043
IOSR Journals
 
E011133639
E011133639E011133639
E011133639
IOSR Journals
 
D011132635
D011132635D011132635
D011132635
IOSR Journals
 
C011131925
C011131925C011131925
C011131925
IOSR Journals
 
B011130918
B011130918B011130918
B011130918
IOSR Journals
 
A011130108
A011130108A011130108
A011130108
IOSR Journals
 
H011124050
H011124050H011124050
H011124050
IOSR Journals
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
F011123134
F011123134F011123134
F011123134
IOSR Journals
 
E011122530
E011122530E011122530
E011122530
IOSR Journals
 
D011121524
D011121524D011121524
D011121524
IOSR Journals
 
C011121114
C011121114C011121114
C011121114
IOSR Journals
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 
C011121114
C011121114C011121114
C011121114
 

Recently uploaded

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

B017350710

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. V (May – Jun. 2015), PP 07-10 www.iosrjournals.org DOI: 10.9790/0661-17350710 www.iosrjournals.org 7 | Page Efficient Refining Of Why-Not Questions on Top-K Queries P. Haripriya1 , J. Jegan Amarnath2 1 P.G student, Sri Sairam Engineering College, Chennai. 2 Assistant Professor, Sri Sairam Engineering College, Chennai, Abstract: After decades of effort working on database performance, the quality and the usability of database systems have received more attention in recent years. In particular, answering the why-not questions after a search is made has become more important. In this project, the problem of answering why-not questions on top- k queries and refining the user query is solved. Generally many users love to pose those kinds of queries when they are making multi-criteria decisions. However, they would also want to know why their expected answers do not show up in the query results. The different algorithms are developed to answer such why-not questions efficiently. Top-K dominating questions are those which have more than one or two results. When this case occurs, the result is ordered according to highest ranking among the records. A search is made and result is displayed, if the expected tuple does not appear then user raises a why-not query. This query is refined using algorithm and then the result is calculated. A penalty function is added such that the result can be returned efficiently and without any fault. Keyword: why-not questions, Top-K and Dominating queries, penalty. I. Introduction Database technology has made great strides in the past decades. Today, we are able to process ever larger numbers of ever more complex queries on ever more humongous data sets efficiently. Internet search engines have popularized keyword based search. Users provide keywords to the user interface and a ranked list of documents is displayed to the user. A why-not question is being posed when a user wants to know why her expected tuples do not show up in the query result. A certain effort has worked on answering why-not questions on traditional relational or the SQL queries. But none of those can answer why-not questions on preference queries like top-k queries yet. Answering the why-not questions gives the purpose of using the data mining algorithms. The main goal is to find a refined top-k query that include non-empty set of missing objects and the user’s initial query. A non-empty set includes all the contents and the set is found to be not empty. When the user provides a query with the count or search for a top-k query then the process analyses and produces the result without the non-empty set. For example, a user of DBLife may be surprised to find out that the system believes that a person was not on the program committee of conference of another. In fact he may have actually been on the program committee, but this fact does not appear in the extracted data, perhaps due to bugs in extractors, or in accuracies in sources, or incomplete coverage of sources. Therefore, it is important to help developers debug the system and to help users understand why they got the result they did. On the other hand, if the result really shouldn’t be in the result, it is a must to explain to the user why this is the case so that they can gain confidence in the non- answer. [1][2].Top-k dominating queries, or just dominating queries, is a form of top-k query that users may pose why-not questions on. While a top-k dominating query frees users from specifying the set of weightings by ranking the objects based on the number of (other) objects that they could dominate. Both the why-not and Dominating Top-k queries are explained with two algorithms to provide the reason for the missing records. The main goals can be explained as the problem formulation, the problem analysis, and the algorithms of answering why-not questions on top-k queries and dominating queries. Also given thing is that there are an infinite number of points (weightings) in the weighting space we should put limited amount of the records into S in order to obtain a good approximation of the answer. Searching for the particular keyword through traditional information retrieval techniques for enabling keyword search in document collections use data structures such as inverted lists that efficiently identify documents containing a query keyword is another method. A straight forward mapping of this idea to databases is a symbol table that stores information at row level granularity that is we keep the list of rows that contains the keyword. Alternative symbol table designs are possible where we can leverage the physical design of the database. For example, if a column has an index then we only need column level granularity. For this purpose we only store the list of columns for each keyword where they occur.
  • 2. Efficient Refining Of Why-Not Questions On Top-K Queries DOI: 10.9790/0661-17350710 www.iosrjournals.org 8 | Page II. Related Work The concept of why-not is first discussed in [6]. This work answers a user’s why-not question on Select-Project-Join(SPJ) queries by telling her which query operator(s) eliminated her desired answers. After that, this line of work is gradually expanded. In [7] and [8], the missing answers of SPJ [7] and SPJUA (SPJ + Union + Aggregation) queries are explained by a data-refinement approach, i.e., it tells the user how the data should be modified if user wants the missing answer back to the result. Answering why-not for a Top-k query was explained by Zhian He and Eric Lo [1]. An algorithm is discussed for answering the queries posed by the user on a Top-K query. Also a defined dimensional disk space has been provided for the records or the tuples on the Top-k rankings and positions. The main goal is about the basic top-k query where users need to specify the set of weightings and the query where users do not need to specify the set of weightings because the ranking function ranks an object higher if it can dominate more objects. The target is focussed mainly to give an explanation to a user who is wondering why her expected answers are missing in the query result. Since the problems are non-identical, a different explanation models for top-k queries and top-k dominating queries is given. Islam, M.S.,Rui Zhou, Chengfei Liu has proposed a method for answering the why-not question on Reverse Skyline queries. This query recovers all data points whose dynamic skylines contain the query point. The benefit and the semantics of answering why-not questions in reverse skyline queries are defined. A technique to modify the why-not point and the query point to include the why-not point in the reverse skyline of the query point is given. This point can be placed anywhere within a region safely without losing any of the existing reverse skyline points. Considering the safe region of the query point answering a why-not question is done. The procedure also efficiently combines both query point and data point modification techniques to produce meaningful answers. Vermeulen, Vanderhulst, Luyten, Coninx, Karin started a method of answering the why-not question through the pervasive crystal. The condition becomes distressed when they are unable to understand and control a pervasive computing environment. Also the other works have shown that allowing users to pose why and why not questions about context-aware applications resulted in better understanding and stronger feelings of trust. Though why-not questions have been used before to aid in debugging and to clarify graphical user interfaces, it is not clear how they can be integrated into pervasive computing systems. In existing framework with support for why and why-not question is extended for the search of missing keywords. So a new method called Pervasive Crystal which is a system for asking and answering why and why-not questions in pervasive computing environments was derived. Islam M.S has proposed a related process where a database is efficiently used in this process without wasting the sample space. There is a growing interest in allowing users to ask questions on received results in the hope of improving the usability of database systems. Islam M.S. has proposed this approach which aims at answering the so called why and why-not questions on received results with respect to different query settings in databases. The goals of this research can be explained as studying the problem of answering the why and the why-not questions in relative databases, explain the efficient strategies for answering these questions in terms of different settings and finally developing a framework that can take advantage of the existing data indexing and query evaluation techniques for the purpose of answering such questions in the databases. The progressed research work contributes completely towards improving the usability of traditional database systems. The similarity between the current and the related work is that an algorithm for refining those why-not questions is given and it is efficient in time. Analyzing and answering a dominating Top-k query is not an easy task and it is also solved by giving different weightings to the set of the records. III. Problem And Analysis A table is called a trusted table if it is assumed to be correct and complete, so we do not have to consider updates or insertions to it when computing the provenance of non-answers. An attribute is called a trusted attribute if its values in existing tuples are correct and therefore updates to them can be ignored. But that new values can appear in trusted attributes when new tuples are inserted. The user must either choose to trust tables or individual attributes that appear in a database else the corresponding objects. In a database, each object p with d attribute values can be represented as a point p = |p[1] p[2] ...p[d]| in a d-dimensional data space Rd. Now we assume that all attribute values are numeric and a smaller value means a better score for simplicity. A top-k query is composed of a scoring function which gives a result set size r, and a weighting vector w = w [1] w[2]. The scoring function as any monotonic function is accepted and the weighting space subject to the constraints w[i] = 1 and 0 ≤ w[i] ≤ 1 is assumed. The query result would then be a set of k objects whose scores are the smallest. The penalty function is developed in case of interruption of the process. Nevertheless, the solution works for all kinds of monotonic penalty functions. A technique to skip many of those progressive top-k operations so as to improve the algorithm’s efficiency is also presented. A much more aggressive and effective
  • 3. Efficient Refining Of Why-Not Questions On Top-K Queries DOI: 10.9790/0661-17350710 www.iosrjournals.org 9 | Page stopping condition that makes most of those operations stop is also presented. Two techniques together can significantly reduce the overall running time of the algorithm. Since general QP solver requires the solution space be convex, first divide Wri into Cnj −1. Each convex coordinate corresponds to a quadratic programming problem. After solving all these quadratic programming problems, the best wri would be identified. For all rankings to be considered there are n+1 j=1 Cnj −1 = 2n (n is the number of incomparable objects with m) quadratic programming problems in the worst case. An approach for finding out the multiple missing objects is proposed. The main goal is considered through varying the data size, query dimension, count or the number of missing objects, performance. A sampling-based algorithm that finds the best approximate answer is proposed. A progressive top-k query q based on the weighting vector w in the user’s original query q is posed using any progressive top-k query evaluation algorithm, and stop when m comes forth to the result set with a ranking ro. If m does not appear in the query result, then report to the user that m does not exist in the database and the process terminates. If m exists in the database, then randomly sample a list of weighting vectors S = [w1, w2 . . . ws] from the weighting space. Fig: 1. Restricted Sample space IV. Answering Dominating Top-K Query The basic idea for refining why-not top-k dominating queries is similar to the idea of answering top-k why-not questions. First in the case where there is only one missing object m execute a top-k dominating query q_o using a progressive top-k dominating query evaluation algorithm and stop when m comes forth to the result set with a ranking ro. If m does not appear in the query result, inform the user that m does not exist in the database and the process terminates. tie at rank k-th, only one of them is returned). Initially, a user poses a top-k dominating query qo(ko).After she gets the result, she may pose a why-not question on qo with a set of missing objects M = {m1, . . . , mj}. By using only the query-refinement approach here, we can only modify the value of k in order to make M appear in the result. That may result in a refined query whose k’s value is increased significantly if there are some missing objects that are actually dominated by many points. As such, we also use the data-refinement approach [7], [8] here. That is, we may either adjust the value of k, the values of m1, . . . , mj, or both. Now, formally, the problem is: Given a why-not question {M, qo(ko)}, where M is a non-empty set of missing objects, qo(ko) is the user’s initial top-k dominating query, the goal is to find a new value k_ and a value replacement M_ for M, such that all the objects in M_ appear in the result of refined dominating query q(k) with the smallest penalty based on the weightings. V. Algorithm [PHASE-1] The algorithm first executes a progressive top-k dominating query evaluation algorithm to locate the list of objects, together with their scores, and the list is given as L with rank 1, 2, 3,... until the missing object m shows up in the result in rank rth. Now denote that operation as (L, ro) = DOMINATING(UNTIL-SEE- _m). After that, it samples data values _x1, _x2, . . . , _xs from the restricted sample space Rs and adds them into S. [PHASE-2] Next, for some data value sample _xi of S, modify m’s values to be xi and then determine the ranking ri of m after the value modification. Note that the ranking ri basically can be determined by executing a progressive top-k dominating algorithm once again on the database. The Technique is given as (a) below to illustrate a much efficient way to determine the ranking ri, without actually invoking the progressive top-k dominating algorithm. Therefore the technique in why-not top-k processing can be applied here to skip ranking calculations for some data value samples.
  • 4. Efficient Refining Of Why-Not Questions On Top-K Queries DOI: 10.9790/0661-17350710 www.iosrjournals.org 10 | Page [PHASE-3] After PHASE-2, we should have s + 1 ―refined queries and modified values‖ pairs: <q>o(ro), m = m,<q>1(r1), m = <x1>, . . . , <q>s+1(rs+1), m = <xs+1>. The pair with the least penalty is returned to the user as the answer. Technique —Efficient ranking computation for a sample point This method describes how to efficiently compute the ranking ri of m if setting m’s value to _xi. First, we compute the new score of m which is the number of objects dominated by m, when its values equal to sample _xi. This technique can be easily done by any skyline-related algorithm or by posing a simple range query on an R-tree. Next update the scores of all objects in L (stored in PHASE-1) as the value of m is changed to _xi. do not update the scores of objects not in L because they were either dominated by _m or incomparable with m. So, their scores would not get changed. For the objects in L that do not dominate _m, their scores are unchanged because if they did not dominate _m before, they also cannot dominate m now (because _m gets a better value _xi). Only for those objects in L that dominate _m, we check whether every such object dominates _xi (which is _m’s new value), if yes, its score is unchanged; otherwise its score is reduced by one. With all the updated scores in place, we can easily determine the new ranking ri of _m. We represent this operation as: ri = COMPUTE-RANK( _m, _xi). A case study is done for a NBA database selecting top-k players for center, guard and other positions. The search is made according to their rankings and the why-not questions posed by the users are answered respectively based on their weightings. The technique proposed in the algorithm is tested and experimented with a sample database containing the records. The effectiveness of techniques are also very promising. Without using any optimization technique, the algorithm requires about 1500 seconds and 400 seconds on uniform dataset and anti-correlated dataset, respectively. But when optimization techniques are enabled, the algorithm runs about two orders of magnitude faster — it requires only about 10 seconds and 2 seconds on uniform dataset and anti-correlated dataset, respectively. VI. Conclusion The refining of why-not questions on Top-k queries is studied. There are different techniques for answering a why-not questions but this algorithm helps users to get a efficient answer to their questions. While a search is made the why-not query must be refined such that the errors will be avoided at an initial state. The basic top-k query where users need to specify the set of weightings, and the top-k dominating query where users do not need to specify the set of weightings because the ranking function ranks an object higher if it can dominate more objects. The target is to give an explanation to a user who is wondering why her expected answers are missing in the query result. Since the problems are different, so a different explanation models for top-k queries and top-k dominating queries is used . For the former, the user gets a refined query with approximately minimal changes to the k value and their weightings. For the latter, user gets a refined query with approximately minimal changes to the k value and the missing objects’ data values. In the future work the case of non-numeric attributes will be studied. References [1]. Sanjay Agrawal, Surajit Chaudhuri, Gautam Das, ―DBXplorer: A System for Keyword-Based Search over Relational Databases‖ 2010. [2]. Zhian He, Eric Lo, ―Answering Why-Not Questions on Top-K Queries‖, IEEE transactions on knowledge and data engineering, vol. 26, no. 6, june 2014. [3]. Islam , M.S ; Rui Zhou ; Chengfei Liu, ―On answering why-not questions in reverse skyline queries‖, IEEE transactions on Mining techniques, April 2013. [4]. Islam, M.S., ―On answering why and why-not questions in Databases‖, Data Engineering Workshop (ICDEW),IEEE international conference,2013. [5]. Vermeulen,J; Vanderhulst, G. ; Luyten,K. ; Conix, karin ,― PervasiveCrystal: Asking and Answering Why and Why Not Questions about Pervasive Computing Applications‖, IEEE Conference publications, 2010. [6]. Jiajun Gu ; Kitagawa, H. ,― Extending Keyword Search to Metadata on Relational Databases‖ , Information-Explosion and Next Generation search (IENGS),. 2008. [7]. Melanie Herschel, MauricioA.Hern´andez, ―Explaining Missing Answers to SPJUA Queries‖, IEEE conference publications, 2008 [8]. E. Tiakas, A. N. Papadopoulos, and Y. Manolopoulos, ―Progressive processing of subspace dominating queries,‖ VLDB J., vol. 20, no. 6, pp. 921–948, 2011. [9]. A. Vlachou, C. Doulkeridis, Y. Kotidis, and K. Nørvåg, ―Reverse top-k queries,‖ in Proc. ICDE, Long Beach, CA, USA, 2010, pp. 365–376. [10]. M. L. Yiu and N. Mamoulis, ―Efficent processing of top-k dominating queries on multi-dimensional data,‖ in Proc. VLDB, Vienna, Austria, 2007, pp. 541–552. [11]. S. Borzsonyi,D. Kossmann, and K. Stocker, ―The skyline operator,‖ACM Trans. Database Syst., vol. 25, no. 2, pp. 129–178, 2000. [12]. A. Motro, ―Query generalization: A method for interpreting null answers,‖ in Proc. Expert Database Workshop, 1984, pp. 597–616.