Dissertations / Theses on the topic 'Keyword-based search'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 22 dissertations / theses for your research on the topic 'Keyword-based search.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Gopalakrishnan, Vijay. "System support for keyword-based search in structured peer-to-peer systems." College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3892.
Full textThesis research directed by: Computer Science. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Ayvaz, Serkan. "NEAR NEIGHBOR EXPLORATIONS FOR KEYWORD-BASED SEMANTIC SEARCHES USING RDF SUMMARY GRAPH." Kent State University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=kent1447710652.
Full textBonetti, Lorenzo. "Design and implementation of a real-world search engine based on Okapi BM25 and SentenceBERT." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/24774/.
Full textYu, Bei, Ling Liu, Beng Chin Ooi, and Kian Lee Tan. "Keyword Join: Realizing Keyword Search in P2P-based Database Systems." 2004. http://hdl.handle.net/1721.1/7423.
Full textSingapore-MIT Alliance (SMA)
Hina, Manolo Dulva. "Keyword-based approaches to improve internet search." Thesis, 2003. http://spectrum.library.concordia.ca/2023/1/MQ77713.pdf.
Full textWen, Ting-Hui, and 溫玎薈. "Identity-Based Broadcast Encryption Scheme with Keyword Search." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/07603382282619045997.
Full textFang, Chien-Tse, and 方建喆. "Keyword Search on DHT-based Peer-to-Peer Networks." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/76897307036461519101.
Full text國立臺灣大學
資訊管理研究所
92
Abstract Peer-to-peer search is to search for objects on a peer-to-peer network according to application-defined semantics. It is a challenging problem because the advantages of a peer-to-peer network are to be preserved while feasible performance must be achieved. A DHT is a distributed name resolution architecture for a peer-to-peer network of Internet-scale; however, it does not possess search ability. Some work tries to build global inverted indexes on a DHT in order to provide keyword search ability, but these approaches suffer from severe unbalanced load at each node. It is due to the power-law nature of any document set. Semantic routing, in which each node based on locally collected information forwards received queries to only those neighbors that are semantically close to the queries, is another category of solutions to peer-to-peer search problems. These approaches often adopt sophisticated information retrieval algorithms to guide message forwarding on Gnutella-like peer-to-peer networks. Semantic routing is more precise in terms of document retrieval than global inverted indexing, but is inefficient when the network size scales to the Internet size. We propose a keyword search scheme on DHT-based peer-to-peer network in order to scale our solution to the Internet size. Our scheme is to index objects according their associated keyword sets with Bloom filter techniques. Each object is represented as an r-bit filter vector. In the meantime, we build an r-dimensional hypercubic keyword search layer on top of a DHT. Then we place each object on the hypercube according to its filter vector. Our approach is proved to provide the function of a global inverted index but achieves much better load balance than previous work even under the power-law nature of an object set. The hypercubic keyword search layer also implies index closeness in its topology, which improves search performance when only a portion of query-satisfying objects are needed. Each query made can be resolved within logarithmic hop counts, and the cost to resolve a query is linear to the resultant set size of the query.
Hsieh, Fei-Ju, and 謝斐如. "Semantics-based Multi-Keyword Search over Encrypted Cloud Data." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/q58x9g.
Full text國立臺灣科技大學
資訊工程系
105
Cloud storages have gained popularity in the recent years. With the increasing quantity of data outsourced to cloud storages, keyword search over encrypted cloud data with the consideration of privacy preservation has become an important topic. The majority techniques in the literature only provide exact single or multiple keyword search in which the keywords have to exactly match those in a pre-defined dictionary. However, restricting users’keywords within the pre-defined dictionary is impractical for real-world applications. Some existing fuzzy keyword search schemes only focus on dealing with spelling mistakes of keywords. The flexibility of keywords used in the search is not considered. This paper addresses the problem of semantic multi-keyword search over encrypted cloud data. Users can use keywords not just in the pre-defined dictionary of the dataset, but with the flexibility of their own choice. The similarity of the given keywords with the search index of each document is then calculated. An adequate set of documents are selected as the results for the search based on the similarity. In addition, privacy of the search is also considered during the search executed by the third party service provider. Experiments are conducted using a dataset of massive papers in real world. The experimental analyses show that the proposed scheme can perform the semantic multi-keyword search effectively and efficiently.
HUANG, CHUN-HAO, and 黃俊豪. "A Study of Relation based Indexing on XML Keyword Search." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/12336068616624294886.
Full text中原大學
資訊工程研究所
96
XML is becoming the standard for data exchanges and data representation. Keyword search allows a user to easily query and access XML data and thus becomes an important research issue. In this thesis, we used Dewey-base two indices to index XML data. It does not require re-computation of existing labels when an XML document is updated. When returning keyword search results, we use the relationships between nodes ensure the return data is correct and to avoid returning meaningless data. Users can query XML data without having to understand the XML structure. An example system was implemented as an illustration.
Guo, Min-Siang, and 郭民翔. "An Iconic Keyword-based Storybook Search System for Young Children." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/69425568898840747588.
Full text清雲科技大學
資訊管理所
100
According to Nielsen Online research report, children online population grew 18 percent over the past five years. Storybooks have been the main source of children reading. With the advance of digital contents and computer technologies, how young children choose their interest digital storybooks in a digital library or on the Internet is becoming important. However, children often encounter difficulties in finding books with traditional keyword search interfaces due to the immaturity of cognitive development. Therefore, the purpose of this study is to develop an intuitive, iconic keyword search interface with which children compose comprehensible image keywords for their intended storybooks. This study also investigates the usability of the iconic keyword-based storybook search system for young children. The evaluation of the system involved 20 kindergarten and 20 second grade elementary children. The evaluation results showed that kindergarten children composed their search terms mainly based on characters on the book covers in both tasks of finding favorite storybooks and searching specific storybooks. However, the elementary children showing their imagination and observation demonstrated more detailed search terms by including elements of scenes of a book cover in the aforementioned tasks. For the usability aspect, elementary children showed higher rates of task completion and correctness of usability questions.
Wu, Si-Jing, and 吳思靜. "Revocable Attribute-Based Encryption for Multi-Keyword Search in Clouds." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/aw2mz4.
Full text國立中山大學
資訊工程學系研究所
107
With the rapid advancement of cloud computing, users upload their files to the cloud server so that any user can access it remotely. Naturally, the security and privacy concerns take place in such scenario since we store files in a remote server which is not fully trusted. Therefore, assurance of the security and privacy of remote data becomes an important aspects to the researchers. To assure the data safety, the data owner, typically, encrypts the data before outsourcing them to the cloud server. In addition, an encryption mechanism needs to enable the consumers to perform efficient searches of such encrypted data in the cloud storages through keywords. This is commonly known as searchable encryption. There is a lot of attention to design a reliable searchable encryption in recent days, however, most of them are improper due to several limitations, such as the requirement of an on-line fully trusted third party, poor efficiency, high-overhead in user revocation, support of a single keyword search, etc. To mitigate such limitations, an attribute-based encryption scheme with fine-grained multi-keyword search is proposed. The new scheme supports the user revocation. In addition, the length of the ciphertext as well as the secret key do not grow linearly under the influence of the size of attribute set. The performance of the proposed scheme is better as compared to other related schemes. Hence, one can easily adopt the proposed scheme for the real life applications due to its flexibility in terms of its features, security and efficiency.
Weng, Chi-Hung, and 翁企宏. "Improving Efficiency of Keyword-Based Search on Structured Peer-to-Peer Networks." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/71720024853332377031.
Full text長庚大學
資訊管理研究所
95
Peer-to-peer systems are a special type of decentralized systems which don’t need centralized control and class hierarchies. Current peer-to-peer applications have the following characteristics: storage, efficiency, anonymity, searches, credibility and the advantages of the class naming. P2P networks can be divided into two types: structured and unstructured. The structured P2P networks ,using a hash function to map a resource to a node IP address where the resource is to be placed. Besides, rapid routing mechanisms are designed to facilitate resource lookups. However, because structured P2P networks exploit hash functions to share and search resource, the cryptographic characteristics of hash functions render keyword-based searches unfeasible in structured P2P networks. This research aims to provide a novel search mechanism for structured Peer-to-Peer networks to search by keywords and ranges. Our simulation results show the proposed mechanism enables a more efficient keyword-based search in the system which use hash functions share and search resource directly , as well as maintaining a higher level of availability in the mechanism which provide search by ranges.
袁倫斌. "An Efficient and Shareable ID-Based Encryption with Keyword Search in Cloud Storage." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/9ft56v.
Full textLin, Yi-Xue, and 林宜學. "An Efficient XML Keyword Search Indexing Method Based on Modified UCIS-X Index." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/r5ktvp.
Full text國立中興大學
資訊科學與工程學系
103
The UCIS-X (An Updatable Compressing and Indexing Scheme for XML) indexing method uses the Dewey encoding to record the parent-child relationship of nodes in an XML file, and the branch information between XML nodes are encoded in Branch maps. UCIS-X outperforms other XML indexing schemes in terms of index space and query response time. But its performance will be downgraded in case of keyword search in XML file with large contents due to linear list used the content-index. In this thesis, we modified the Content-Index of UCIS-X by designing a hashed content-index using content keywords as hash keys to improve the performance on keyword search. The experimental results show that the proposed method has about 44% performance improvement over UCIS-X on the content-rich benchmark dataset XMark, and it also has about 65.5% performance improvement over UCIS-X on structure-duplicated dataset DBLP.
張家安. "The Design and Implementation of a Peer-toPeer Network Based on Semantic Keyword Search." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/25558358463299468413.
Full text國立交通大學
資訊管理研究所
93
Peer-to-Peer (P2P) network architecture proposes a new technology to exchange information and service between computers without centralized controllers. These resources and service including : files sharing, instant messaging, and distributed computing . Now, P2P file sharing is one of the P2P hottest applications. This paper proposes a P2P network based on semantic keyword search. It is easy to implement semantic keyword search in “Centralized Network Architecture” because we can put the semantic knowledge base on the centralized server ; however, there is no peer always in the system. Therefore, our main concern is to integrate the advantage of “Super Peer Network” and the “Query Expansion”(an information retrieval method in centralized server-to-client architecture) .Our approach can solve the problems mentioned before. According to the simulation, our approach can provide good performance of semantic keyword searching in P2P system and solve KRDB synchronization efficacious.
ZENG, YU-HONG, and 曾郁閎. "A Study on Automatic Chinese Keyword Extraction Based on Search Engines and Internet Encyclopedias." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/75916377647627372221.
Full text國立雲林科技大學
資訊管理系
103
Keywords are a subset of words or phrases from a document those can describe the meaning of the document. The major methods for Chinese keyword extraction are keyword lexicons approaches, statistics approaches, linguistics approaches, etc. Among these methods, keyword lexicons approaches make keyword extraction high precision and high efficient, but building keyword lexicons spends a lot of time and the maintenance of keyword lexicons is manual. This research presents a Chinese keyword extraction system based on CKIP Chinese word segmentation system. This system provides the recombination of words by using part of speech (POS) combination and automatic words combination via search engine (Google Search) and internet encyclopedia (Wikipedia). This system also focuses on building a keyword lexicon that can update its keywords automatically. The system can improve the disadvantages of keyword lexicons approaches. The results of experiments show that using the CKIP Chinese word segmentation system, POS combination and automatic words combination gains higher precision and the number of documents does not affect the performance of the keyword extraction system. Keywords: Keyword Extraction, Keyword Lexicon, Search Engine, Internet Encyclopedia
Chen, Chih-Ho, and 陳麴合. "A Study on Implementation for Search Engine Based on Hyperlink and Keyword Frequency Analysis." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/37625626064092162978.
Full text國立屏東科技大學
資訊管理系
90
In this epoch, the growth of information technology has exploded. How to mine the information of people’s interest in a short time has become an important issue. In general, people need to record addresses of every search engine before they begin information retrieval and adapt to different interfaces that every search engine provides. After getting each retrieve results, people need to filter the information that has filled with high repetition from independent search engines which set keywords or query conditions. This study develops an effective search mechanism to help people to find out the required information. It also aims to implement a Hyperlink and Keyword Frequency Analysis (HKFA) search engine. The HKFA search engine consists of five modules. There are (1)Query Module; (2)Information Retrieval Module─includes Dispatcher Algorithm; (3)Information Extraction Module─includes Feature Extraction Algorithm and Hyperlink Normal Form Algorithm; (4)Information Filtering Module─includes Occurrence Hit Algorithm、Filter Hyperlink Algorithm、Keyword Frequency and Position Algorithm; (5) Information Integration Module. The search engine mechanism designed in this study is to provide high precision and high recall information. Furthermore, this mechanism can not only effectively save people’s time spent on retrieving and filtering information but also reduce user’s information overhead.
Chang, Yu-Hsuan, and 張語軒. "Ciphertext-Policy Attribute-Based Keyword Search with Revocation by Using Linear Secret Sharing Approach." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/8v5t6g.
Full text國立嘉義大學
資訊工程學系研究所
107
Nowadays, cloud security is an important field and one of the topics in it is about secure cloud storage. When users send data to the cloud system, they cannot know the status of stored data and whether someone else can access their files or not. Therefore, the encryption of files stored in the cloud service provider is a very important requirement for data privacy. In this thesis, we apply the appropriate encryption method, attribute-based encryption, for solving the confidentiality problems in the cloud. Attribute-based encryption is based on attributes with highly flexible access control. The owner of the file establishes an attribute access structure to encrypt the file. The user possesses an attribute sets for himself. If user's attribute satisfies the ciphertext access structure, the user has the ability to decrypt. This method is very suitable for cloud storage. The keyword search based on the encrypted file is also an important issue. We integrate the attribute encryption and linear secret sharing scheme (LSSS) to generate an efficient keyword query token. The cloud service provider compares the keywords of the ciphertext and the keywords query token issued by the user without knowing the plaintexts of the file and the corresponding keywords. If the comparison result is valid, the cloud service provider will send the ciphertext to the user for decryption. Although applying LSSS to the attribute-based cryptosystem, the file owner needs to generate a matrix as encryption, it is relatively fast in decryption of the ciphertext. Therefore, the LSSS can be suitable for the cloud service provider as well as the various mobile devices. In the cloud system with attribute-based encryption, revoking attribute is a flexible approach to changing the access permissions. In our system, the re-encryption mechanism can properly be used to achieve the goal.
Chang, Chun-Sheng, and 張俊盛. "The Study of Routing Strategy on Keyword Search in DHT-based Peer-to-Peer Networks." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/81479571322859472009.
Full text國立臺灣海洋大學
資訊工程學系
98
Users can search for the information they need by file name in Peer-to-Peer (P2P) networks. When the information we have is not sufficient to fully describe an object, then it is possible that the object will not be found. Therefore, keyword search, which is a flexible search service, has been developed. It is hashing the object’s keyword set to obtain a key that maps to a unique node in the network. File name search is hashing the object’s name to obtain a key. As a result, keyword search is more convenient and practical than file name search in finding an object. The hypercube structure has been proposed to be used in keyword search. Each object is mapped a vector according to it’s keyword set, and stored in the node corresponding to the vector. Objects with similar keywords are likely to be stored in close nodes, thus provides an efficient search scheme. When a search request simply demands some nodes in response, search message of routing strategy will determine that the message through which node, and hence affect the search efficiency, the amount of messages, and the node load balancing. We propose a random routing strategy based on hypercube structure in keyword search. It’s shown the request can be processed evenly through each node, and objects containing user’s keyword will have equal opportunity to be found.
Rangarajan, Sarathkumar. "QOS-aware Web service discovery, selection, composition and application." Thesis, 2020. https://vuir.vu.edu.au/42153/.
Full textFURUHASHI, Takeshi, Tomohiro YOSHIKAWA, and Makoto SUZUKI. "Support Method for Reference of Documents based on Correspondence Analysis." 2012. http://hdl.handle.net/2237/20857.
Full textGhorashi, Seyed Soroush. "Leyline : a provenance-based desktop search system using graphical sketchpad user interface." Thesis, 2011. http://hdl.handle.net/1957/28032.
Full textGraduation date: 2012