To see the other types of publications on this topic, follow the link: Keyword-based search.

Dissertations / Theses on the topic 'Keyword-based search'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 22 dissertations / theses for your research on the topic 'Keyword-based search.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Gopalakrishnan, Vijay. "System support for keyword-based search in structured peer-to-peer systems." College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3892.

Full text
Abstract:
Thesis (Ph. D.) -- University of Maryland, College Park, 2006.<br>Thesis research directed by: Computer Science. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
2

Ayvaz, Serkan. "NEAR NEIGHBOR EXPLORATIONS FOR KEYWORD-BASED SEMANTIC SEARCHES USING RDF SUMMARY GRAPH." Kent State University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=kent1447710652.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bonetti, Lorenzo. "Design and implementation of a real-world search engine based on Okapi BM25 and SentenceBERT." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/24774/.

Full text
Abstract:
The work conducted in this thesis aims to present an hybrid model for a real­ world application search engine. The project presented was part of an intern­ship work carried out in a start­up which deals with Knowledge Management and Artificial Intelligence. The aim of the internship work was to improve the current search engine system to build a new system for a future web ap­plication use case. An in­-depth study on the limitations of keyword search alone, and on semantic search, revealed the need of a transition from a pure keyword­-based information retrieval system to an hybrid model, maki
APA, Harvard, Vancouver, ISO, and other styles
4

Yu, Bei, Ling Liu, Beng Chin Ooi, and Kian Lee Tan. "Keyword Join: Realizing Keyword Search in P2P-based Database Systems." 2004. http://hdl.handle.net/1721.1/7423.

Full text
Abstract:
In this paper, we present a P2P-based database sharing system that provides information sharing capabilities through keyword-based search techniques. Our system requires neither a global schema nor schema mappings between different databases, and our keyword-based search algorithms are robust in the presence of frequent changes in the content and membership of peers. To facilitate data integration, we introduce keyword join operator to combine partial answers containing different keywords into complete answers. We also present an efficient algorithm that optimize the keyword join operations fo
APA, Harvard, Vancouver, ISO, and other styles
5

Hina, Manolo Dulva. "Keyword-based approaches to improve internet search." Thesis, 2003. http://spectrum.library.concordia.ca/2023/1/MQ77713.pdf.

Full text
Abstract:
Technology keeps on evolving and so must the science of information retrieval. This thesis presents keyword-based approaches to improve information retrieval from the Internet. Focused and unfocused queries to search engines are considered, and means of obtaining relevant documents are presented. For focused queries, techniques are provided to obtain a high precision score from the hit documents; these documents do contain the exact answers to the focused query, which is usually a question. User queries are subjected to ambiguity test to determine if it is ambiguous, and if it is so, provide d
APA, Harvard, Vancouver, ISO, and other styles
6

Wen, Ting-Hui, and 溫玎薈. "Identity-Based Broadcast Encryption Scheme with Keyword Search." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/07603382282619045997.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fang, Chien-Tse, and 方建喆. "Keyword Search on DHT-based Peer-to-Peer Networks." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/76897307036461519101.

Full text
Abstract:
碩士<br>國立臺灣大學<br>資訊管理研究所<br>92<br>Abstract Peer-to-peer search is to search for objects on a peer-to-peer network according to application-defined semantics. It is a challenging problem because the advantages of a peer-to-peer network are to be preserved while feasible performance must be achieved. A DHT is a distributed name resolution architecture for a peer-to-peer network of Internet-scale; however, it does not possess search ability. Some work tries to build global inverted indexes on a DHT in order to provide keyword search ability, but these approaches suffer from severe unbal
APA, Harvard, Vancouver, ISO, and other styles
8

Hsieh, Fei-Ju, and 謝斐如. "Semantics-based Multi-Keyword Search over Encrypted Cloud Data." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/q58x9g.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>資訊工程系<br>105<br>Cloud storages have gained popularity in the recent years. With the increasing quantity of data outsourced to cloud storages, keyword search over encrypted cloud data with the consideration of privacy preservation has become an important topic. The majority techniques in the literature only provide exact single or multiple keyword search in which the keywords have to exactly match those in a pre-defined dictionary. However, restricting users’keywords within the pre-defined dictionary is impractical for real-world applications. Some existing fuzzy keyword searc
APA, Harvard, Vancouver, ISO, and other styles
9

HUANG, CHUN-HAO, and 黃俊豪. "A Study of Relation based Indexing on XML Keyword Search." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/12336068616624294886.

Full text
Abstract:
碩士<br>中原大學<br>資訊工程研究所<br>96<br>XML is becoming the standard for data exchanges and data representation. Keyword search allows a user to easily query and access XML data and thus becomes an important research issue. In this thesis, we used Dewey-base two indices to index XML data. It does not require re-computation of existing labels when an XML document is updated. When returning keyword search results, we use the relationships between nodes ensure the return data is correct and to avoid returning meaningless data. Users can query XML data without having to understand the XML structure.
APA, Harvard, Vancouver, ISO, and other styles
10

Guo, Min-Siang, and 郭民翔. "An Iconic Keyword-based Storybook Search System for Young Children." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/69425568898840747588.

Full text
Abstract:
碩士<br>清雲科技大學<br>資訊管理所<br>100<br>According to Nielsen Online research report, children online population grew 18 percent over the past five years. Storybooks have been the main source of children reading. With the advance of digital contents and computer technologies, how young children choose their interest digital storybooks in a digital library or on the Internet is becoming important. However, children often encounter difficulties in finding books with traditional keyword search interfaces due to the immaturity of cognitive development. Therefore, the purpose of this study is to develop an
APA, Harvard, Vancouver, ISO, and other styles
11

Wu, Si-Jing, and 吳思靜. "Revocable Attribute-Based Encryption for Multi-Keyword Search in Clouds." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/aw2mz4.

Full text
Abstract:
碩士<br>國立中山大學<br>資訊工程學系研究所<br>107<br>With the rapid advancement of cloud computing, users upload their files to the cloud server so that any user can access it remotely. Naturally, the security and privacy concerns take place in such scenario since we store files in a remote server which is not fully trusted. Therefore, assurance of the security and privacy of remote data becomes an important aspects to the researchers. To assure the data safety, the data owner, typically, encrypts the data before outsourcing them to the cloud server. In addition, an encryption mechanism needs to enable the con
APA, Harvard, Vancouver, ISO, and other styles
12

Weng, Chi-Hung, and 翁企宏. "Improving Efficiency of Keyword-Based Search on Structured Peer-to-Peer Networks." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/71720024853332377031.

Full text
Abstract:
碩士<br>長庚大學<br>資訊管理研究所<br>95<br>Peer-to-peer systems are a special type of decentralized systems which don’t need centralized control and class hierarchies. Current peer-to-peer applications have the following characteristics: storage, efficiency, anonymity, searches, credibility and the advantages of the class naming. P2P networks can be divided into two types: structured and unstructured. The structured P2P networks ,using a hash function to map a resource to a node IP address where the resource is to be placed. Besides, rapid routing mechanisms are designed to facilitate resource lookups.
APA, Harvard, Vancouver, ISO, and other styles
13

袁倫斌. "An Efficient and Shareable ID-Based Encryption with Keyword Search in Cloud Storage." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/9ft56v.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Lin, Yi-Xue, and 林宜學. "An Efficient XML Keyword Search Indexing Method Based on Modified UCIS-X Index." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/r5ktvp.

Full text
Abstract:
碩士<br>國立中興大學<br>資訊科學與工程學系<br>103<br>The UCIS-X (An Updatable Compressing and Indexing Scheme for XML) indexing method uses the Dewey encoding to record the parent-child relationship of nodes in an XML file, and the branch information between XML nodes are encoded in Branch maps. UCIS-X outperforms other XML indexing schemes in terms of index space and query response time. But its performance will be downgraded in case of keyword search in XML file with large contents due to linear list used the content-index. In this thesis, we modified the Content-Index of UCIS-X by designing a hashed content
APA, Harvard, Vancouver, ISO, and other styles
15

張家安. "The Design and Implementation of a Peer-toPeer Network Based on Semantic Keyword Search." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/25558358463299468413.

Full text
Abstract:
碩士<br>國立交通大學<br>資訊管理研究所<br>93<br>Peer-to-Peer (P2P) network architecture proposes a new technology to exchange information and service between computers without centralized controllers. These resources and service including : files sharing, instant messaging, and distributed computing . Now, P2P file sharing is one of the P2P hottest applications. This paper proposes a P2P network based on semantic keyword search. It is easy to implement semantic keyword search in “Centralized Network Architecture” because we can put the semantic knowledge base on the centralized server ; however, there is
APA, Harvard, Vancouver, ISO, and other styles
16

ZENG, YU-HONG, and 曾郁閎. "A Study on Automatic Chinese Keyword Extraction Based on Search Engines and Internet Encyclopedias." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/75916377647627372221.

Full text
Abstract:
碩士<br>國立雲林科技大學<br>資訊管理系<br>103<br>Keywords are a subset of words or phrases from a document those can describe the meaning of the document. The major methods for Chinese keyword extraction are keyword lexicons approaches, statistics approaches, linguistics approaches, etc. Among these methods, keyword lexicons approaches make keyword extraction high precision and high efficient, but building keyword lexicons spends a lot of time and the maintenance of keyword lexicons is manual. This research presents a Chinese keyword extraction system based on CKIP Chinese word segmentation system. This syst
APA, Harvard, Vancouver, ISO, and other styles
17

Chen, Chih-Ho, and 陳麴合. "A Study on Implementation for Search Engine Based on Hyperlink and Keyword Frequency Analysis." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/37625626064092162978.

Full text
Abstract:
碩士<br>國立屏東科技大學<br>資訊管理系<br>90<br>In this epoch, the growth of information technology has exploded. How to mine the information of people’s interest in a short time has become an important issue. In general, people need to record addresses of every search engine before they begin information retrieval and adapt to different interfaces that every search engine provides. After getting each retrieve results, people need to filter the information that has filled with high repetition from independent search engines which set keywords or query conditions. This study develops an effective s
APA, Harvard, Vancouver, ISO, and other styles
18

Chang, Yu-Hsuan, and 張語軒. "Ciphertext-Policy Attribute-Based Keyword Search with Revocation by Using Linear Secret Sharing Approach." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/8v5t6g.

Full text
Abstract:
碩士<br>國立嘉義大學<br>資訊工程學系研究所<br>107<br>Nowadays, cloud security is an important field and one of the topics in it is about secure cloud storage. When users send data to the cloud system, they cannot know the status of stored data and whether someone else can access their files or not. Therefore, the encryption of files stored in the cloud service provider is a very important requirement for data privacy. In this thesis, we apply the appropriate encryption method, attribute-based encryption, for solving the confidentiality problems in the cloud. Attribute-based encryption is based on attributes wi
APA, Harvard, Vancouver, ISO, and other styles
19

Chang, Chun-Sheng, and 張俊盛. "The Study of Routing Strategy on Keyword Search in DHT-based Peer-to-Peer Networks." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/81479571322859472009.

Full text
Abstract:
碩士<br>國立臺灣海洋大學<br>資訊工程學系<br>98<br>Users can search for the information they need by file name in Peer-to-Peer (P2P) networks. When the information we have is not sufficient to fully describe an object, then it is possible that the object will not be found. Therefore, keyword search, which is a flexible search service, has been developed. It is hashing the object’s keyword set to obtain a key that maps to a unique node in the network. File name search is hashing the object’s name to obtain a key. As a result, keyword search is more convenient and practical than file name search in finding an ob
APA, Harvard, Vancouver, ISO, and other styles
20

Rangarajan, Sarathkumar. "QOS-aware Web service discovery, selection, composition and application." Thesis, 2020. https://vuir.vu.edu.au/42153/.

Full text
Abstract:
Since the beginning of the 21st century, service-oriented architecture (SOA) has emerged as an advancement of distributed computing. SOA is a framework where software modules are developed using straightforward interfaces, and each module serves a specific array of functions. It delivers enterprise applications individually or integrated into a more significant composite Web services. However, SOA implementation faces several challenges, hindering its broader adaptation. This thesis aims to highlight three significant challenges in the implementation of SOA. The abundance of functionally simi
APA, Harvard, Vancouver, ISO, and other styles
21

FURUHASHI, Takeshi, Tomohiro YOSHIKAWA, and Makoto SUZUKI. "Support Method for Reference of Documents based on Correspondence Analysis." 2012. http://hdl.handle.net/2237/20857.

Full text
Abstract:
2012 Joint 6th International Conference on Soft Computing and Intelligent Systems (SCIS) and 13th International Symposium on Advanced Intelligent Systems (ISIS) (SCIS-ISIS 2012). November 20-24, 2012, Kobe, Japan
APA, Harvard, Vancouver, ISO, and other styles
22

Ghorashi, Seyed Soroush. "Leyline : a provenance-based desktop search system using graphical sketchpad user interface." Thesis, 2011. http://hdl.handle.net/1957/28032.

Full text
Abstract:
While there are powerful keyword search systems that index all kinds of resources including emails and web pages, people have trouble recalling semantic facts such as the name, location, edit dates and keywords that uniquely identifies resources in their personal repositories. Reusing information exasperates this problem. A rarely used approach is to leverage episodic memory of file provenance. Provenance is traditionally defined as "the history of ownership of a valued object". In terms of documents, we consider not only the ownership, but also the operations performed on the document, especi
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!