To see the other types of publications on this topic, follow the link: Keyword-based search.

Journal articles on the topic 'Keyword-based search'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Keyword-based search.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kurhekar, Miss Rachana V., and Prof R. R. Shelke. "Location Based Nearest Keyword Search." International Journal of Trend in Scientific Research and Development Volume-2, Issue-1 (2017): 1617–23. http://dx.doi.org/10.31142/ijtsrd8296.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Seethalakshmi, G., and J. Swathi. "XML based Keyword Search." International Journal of Computer Applications 107, no. 15 (2014): 1–3. http://dx.doi.org/10.5120/18824-0241.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yang Chen, Yang Chen, Yang Liu Yang Chen, Jin Pan Yang Liu, Fei Gao Jin Pan, and Emmanouil Panaousis Fei Gao. "Privacy-Protecting Attribute-Based Conjunctive Keyword Search Scheme in Cloud Storage." 網際網路技術學刊 24, no. 1 (2023): 065–75. http://dx.doi.org/10.53106/160792642023012401007.

Full text
Abstract:
<p>Cloud storage has been deployed in various real-world applications. But how to enable Internet users to search over encrypted data and to enable data owners to perform fine-grained search authorization are of huge challenge. Attribute-based keyword search (ABKS) is a well-studied solution to the challenge, but there are some drawbacks that prevent its practical adoption in cloud storage context. First, the access policy in the index and the attribute set in the trapdoor are both in plaintext, they are likely to reveal the privacy of data owners and users. Second, the current ABKS sche
APA, Harvard, Vancouver, ISO, and other styles
4

J, Ujwala Rekha. "Instant fuzzy search using probabilistic-correlation based ranking." Indian Journal of Science and Technology 13, no. 11 (2020): 1270–75. https://doi.org/10.17485/IJST/v13i11.2020-32.

Full text
Abstract:
Abstract <strong>Background</strong>&nbsp;<strong>:</strong>&nbsp;Instant search recommends completions of the query &lsquo;on the fly&rsquo;, and instantly displays the results with every keystroke. It is desirable that these query results be robust against typographical errors that appear not only in the query but also in the documents. Additionally, instant search requires instant response time and ranking of the results to focus on the most important answers.&nbsp;<strong>Method:</strong>&nbsp;In this study, simple and efficient methods for instant fuzzy single keyword and multi-keyword se
APA, Harvard, Vancouver, ISO, and other styles
5

Hristidis, Vagelis, Heasoo Hwang, and Yannis Papakonstantinou. "Authority-based keyword search in databases." ACM Transactions on Database Systems 33, no. 1 (2008): 1–40. http://dx.doi.org/10.1145/1331904.1331905.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Murali, Pranav. "An Approach to Trie Based Keyword Search for Search Engines." International Journal of Library and Information Services 6, no. 1 (2017): 1–16. http://dx.doi.org/10.4018/ijlis.2017010101.

Full text
Abstract:
Search Engines use indexing techniques to minimize the time taken to find the relevant information to a search query. They maintain a keywords list that may reside either in the memory or in the external storage, like a hard disk. While a pure binary search can be used for this purpose, it suffers from performance issue when keywords are stored in the external storage. Some implementations of search engines use a B-tree and sparse indexes to reduce access time. This paper aims at reducing the keyword access time further. It presents a keyword search technique that utilizes a combination of tri
APA, Harvard, Vancouver, ISO, and other styles
7

Bou, Savong, Toshiyuki Amagasa, and Hiroyuki Kitagawa. "Path-based keyword search over XML streams." International Journal of Web Information Systems 11, no. 3 (2015): 347–69. http://dx.doi.org/10.1108/ijwis-04-2015-0013.

Full text
Abstract:
Purpose – In purpose of this paper is to propose a novel scheme to process XPath-based keyword search over Extensible Markup Language (XML) streams, where one can specify query keywords and XPath-based filtering conditions at the same time. Experimental results prove that our proposed scheme can efficiently and practically process XPath-based keyword search over XML streams. Design/methodology/approach – To allow XPath-based keyword search over XML streams, it was attempted to integrate YFilter (Diao et al., 2003) with CKStream (Hummel et al., 2011). More precisely, the nondeterministic finite
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Yang, Wenmin Li, Fei Gao, Kaitai Liang, Hua Zhang, and Qiaoyan Wen. "Practical Attribute-Based Conjunctive Keyword Search Scheme." Computer Journal 63, no. 8 (2019): 1203–15. http://dx.doi.org/10.1093/comjnl/bxz140.

Full text
Abstract:
Abstract To date cloud computing may provide considerable storage and computational power for cloud-based applications to support cryptographic operations. Due to this benefit, attribute-based keyword search (ABKS) is able to be implemented in cloud context in order to protect the search privacy of data owner/user. ABKS is a cryptographic primitive that can provide secure search services for users but also realize fine-grained access control over data. However, there have been two potential problems that prevent the scalability of ABKS applications. First of all, most of the existing ABKS sche
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Jiguo, Min Wang, Yang Lu, Yichen Zhang, and Huaqun Wang. "ABKS-SKGA: Attribute-based keyword search secure against keyword guessing attack." Computer Standards & Interfaces 74 (February 2021): 103471. http://dx.doi.org/10.1016/j.csi.2020.103471.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

V. Kurhekar, Miss Rachana. "Analysis on Location Based Nearest Keyword Search." International Journal for Research in Applied Science and Engineering Technology V, no. II (2017): 267–70. http://dx.doi.org/10.22214/ijraset.2017.2041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Lou, Ying, Feng Zhong, JinXiang Zhang, and Qian Li. "Semantic keyword search based on information entropy." Journal of Physics: Conference Series 1952, no. 4 (2021): 042080. http://dx.doi.org/10.1088/1742-6596/1952/4/042080.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

He, Qiang, Rui Zhou, Xuyun Zhang, et al. "Keyword Search for Building Service-Based Systems." IEEE Transactions on Software Engineering 43, no. 7 (2017): 658–74. http://dx.doi.org/10.1109/tse.2016.2624293.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Cheng, Huanyu, Ming Zhong, and Jian Wang. "Diversified keyword search based web service composition." Journal of Systems and Software 163 (May 2020): 110540. http://dx.doi.org/10.1016/j.jss.2020.110540.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Gupta, Vaibhav. "Keyword-Based Exploration of Library Resources." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–9. https://doi.org/10.55041/ijsrem40835.

Full text
Abstract:
The project "Keyword-Based Exploration of Library Resources" addresses the challenges associated with accessing and discovering academic resources efficiently. Traditional systems often suffer from limitations such as inadequate multilingual support, poor metadata utilization, and restricted filtering capabilities, which hinder users from locating relevant research materials effectively. This project proposes an innovative solution leveraging Artificial Intelligence (AI) and Natural Language Processing (NLP) techniques to enhance search capabilities and inclusivity. The system incorporates: •
APA, Harvard, Vancouver, ISO, and other styles
15

Zeng, Jia-Hui, Jiu-Ming Huang, and Shu-Qiang Yang. "Top-k Keyword Search Over Graphs Based On Backward Search." ITM Web of Conferences 12 (2017): 01014. http://dx.doi.org/10.1051/itmconf/20171201014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Reshma, V*1 &. Ms. Syamily K. Raju2. "A SURVEY ON EFFICIENT SEARCH SCHEME OVER ENCRYPTED DATA ON MOBILE CLOUD." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Metanoia 19 (April 5, 2019): 63–68. https://doi.org/10.5281/zenodo.2630852.

Full text
Abstract:
Cloud computing is computing based on internet. Cloud storage is a service model in which data is maintained, managed, backed up and it is available to users over a network. Cloud storage is massive storage. The privacy issue is a major problem while storing data in the cloud. While storing data in the cloud it doesn&rsquo;t ensure any security. The encryption of a large volume of data is very difficult. So the data owners have as much as trust in storing data in the cloud. To solve this problem encryption is the accurate method. Encrypt the whole data before uploading the file into the cloud.
APA, Harvard, Vancouver, ISO, and other styles
17

Soroush, A. M. "PUBLIC KEY ENCRYPTION SCHEME BASED ON KEYWORD SEARCH." Open Journal of Physical Science (ISSN: 2734-2123) 4, no. 1 (2023): 34–53. http://dx.doi.org/10.52417/ojps.v4i1.471.

Full text
Abstract:
This study explores the concept of a Public Key Encryption Scheme (PKES) with an emphasis on enabling keyword search functionality. The aim of this research is to develop a cryptographic framework that allows users to securely search over encrypted data without revealing sensitive information. The study investigates various methods and techniques employed in PKES to achieve efficient and privacy-preserving keyword search capabilities. The research highlights the increasing importance of data privacy and the need for secure information retrieval over encrypted data. Traditional encryption metho
APA, Harvard, Vancouver, ISO, and other styles
18

Cui, Yuanbo, Fei Gao, Yijie Shi, Wei Yin, Emmanouil Panaousis, and Kaitai Liang. "An Efficient Attribute-Based Multi-Keyword Search Scheme in Encrypted Keyword Generation." IEEE Access 8 (2020): 99024–36. http://dx.doi.org/10.1109/access.2020.2996940.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Shen, Ming Yan, Xin Li, and Xiang Fu Meng. "Research and Implementation of XML Keyword Search Algorithm Based on Semantic Relatives." Advanced Materials Research 267 (June 2011): 811–15. http://dx.doi.org/10.4028/www.scientific.net/amr.267.811.

Full text
Abstract:
The XML keyword search has been used widely in the application of XML documents. Most of the XML keyword search approaches are based on the LCA (lowest common ancestor) or its variants, which usually leads to the un-ideal recall and precision. This paper presents a novel XML keyword search method which based on semantic relatives. The method fully considers the semantic characteristics of the XML document structure. Based on the stack, the algorithm is also presented to merge the semantic relative nodes containing the keyword as the results of XML keyword search. The results of experiments hav
APA, Harvard, Vancouver, ISO, and other styles
20

Yoon, Hyundo, and Junbeom Hur. "SGX-Based Public Key Encryption with Keyword Search." Journal of Korean Institute of Communications and Information Sciences 46, no. 5 (2021): 777–87. http://dx.doi.org/10.7840/kics.2021.46.5.777.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Zhenfang Li, and Shiqun Tao. "A XML Keyword Search Algorithm Based on MapReduce." International Journal of Digital Content Technology and its Applications 6, no. 17 (2012): 307–16. http://dx.doi.org/10.4156/jdcta.vol6.issue17.33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Preethi, G. B. Sai, P. Radhika Raju, and A. Ananda Rao. "Relevant Keyword Search for Building Service-Based System." International Journal of Computer Sciences and Engineering 6, no. 7 (2018): 109–14. http://dx.doi.org/10.26438/ijcse/v6i7.109114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Yang, Zhen, Hongao Zhang, Haiyang Yu, Zheng Li, Bocheng Zhu, and Richard O. Sinnott. "Attribute-Based Keyword Search over the Encrypted Blockchain." Computer Modeling in Engineering & Sciences 128, no. 1 (2021): 269–82. http://dx.doi.org/10.32604/cmes.2021.015210.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Chen, Zijun, Xin Wang, and Wenyuan Liu. "Reverse keyword-based location search on road networks." GeoInformatica 26, no. 1 (2021): 201–31. http://dx.doi.org/10.1007/s10707-021-00440-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

ZHENG, Hong-hui, and Hong GUO. "XML keyword search algorithm based on efficient LCA." Journal of Computer Applications 30, no. 3 (2010): 825–30. http://dx.doi.org/10.3724/sp.j.1087.2010.00825.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Myint Thein, Myint. "Efficient Schema Based Keyword Search in Relational Databases." International Journal of Computer Science, Engineering and Information Technology 2, no. 6 (2012): 13–32. http://dx.doi.org/10.5121/ijcseit.2012.2602.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Ren, Xunyi, and Shiyang Yan. "Keyword-based Ciphertext Search Algorithm under Cloud Storage." MATEC Web of Conferences 61 (2016): 03002. http://dx.doi.org/10.1051/matecconf/20166103002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Liu, Jia’nan, Junzuo Lai, and Xinyi Huang. "Dual trapdoor identity-based encryption with keyword search." Soft Computing 21, no. 10 (2015): 2599–607. http://dx.doi.org/10.1007/s00500-015-1960-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Nguyen, Hoang-Minh, Hong-Quang Nguyen, Khoi-Nguyen Tran, and Xuan-Vinh Vo. "GeTFIRST: ontology-based keyword search towards semantic disambiguation." International Journal of Web Information Systems 11, no. 4 (2015): 442–67. http://dx.doi.org/10.1108/ijwis-06-2015-0019.

Full text
Abstract:
Purpose – This paper aims to improve the semantic-disambiguation capability of an information-retrieval system by taking advantages of a well-crafted classification tree. The unstructured nature and sheer volume of information accessible over networks have made it drastically difficult for users to seek relevant information. Many information-retrieval methods have been developed to address this problem, and keyword-based approach is amongst the most common approach. Such an approach is often inadequate to cope with the conceptualization associated with user needs and contents. This brings abou
APA, Harvard, Vancouver, ISO, and other styles
30

Yang, Younghyoo. "Semantic-based Keyword Search System over Relational Database." Journal of the Korea Society of Computer and Information 18, no. 12 (2013): 91–101. http://dx.doi.org/10.9708/jksci.2013.18.12.091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Shin, Sangjin, Jihoon Ko, Sungkwang Eom, Minjae Song, Dong-Hoon Shin, and Kyong-Ho Lee. "Keyword-based mobile semantic search using mobile ontology." Journal of Information Science 41, no. 2 (2014): 178–96. http://dx.doi.org/10.1177/0165551514560669.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Shi, Yanfeng, Jiqiang Liu, Zhen Han, Qingji Zheng, Rui Zhang, and Shuo Qiu. "Attribute-Based Proxy Re-Encryption with Keyword Search." PLoS ONE 9, no. 12 (2014): e116325. http://dx.doi.org/10.1371/journal.pone.0116325.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Yan, Zhepeng, Nan Zheng, Zachary G. Ives, Partha Pratim Talukdar, and Cong Yu. "Active learning in keyword search-based data integration." VLDB Journal 24, no. 5 (2015): 611–31. http://dx.doi.org/10.1007/s00778-014-0374-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Yao, Quan Zhu, Bing Tian, and Wang Yun He. "XML Keyword Search Algorithm Based on Level-Traverse Encoding." Applied Mechanics and Materials 263-266 (December 2012): 1553–58. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1553.

Full text
Abstract:
For XML documents, existing keyword retrieval methods encode each node with Dewey encoding, comparing Dewey encodings part by part is necessary in LCA computation. When the depth of XML is large, lots of LCA computations will affect the performance of keyword search. In this paper we propose a novel labeling method called Level-TRaverse (LTR) encoding, combine with the definition of the result set based on Exclusive Lowest Common Ancestor (ELCA),design a query Bottom-Up Level Algorithm(BULA).The experiments demonstrate this method improves the efficiency and the veracity of XML keyword retriev
APA, Harvard, Vancouver, ISO, and other styles
35

Zhang, Yu, Lei You, and Yin Li. "Tree-Based Public Key Encryption with Conjunctive Keyword Search." Security and Communication Networks 2021 (November 5, 2021): 1–16. http://dx.doi.org/10.1155/2021/7034944.

Full text
Abstract:
Searchable public key encryption supporting conjunctive keyword search is an important technique in today’s cloud environment. Nowadays, previous schemes usually take advantage of forward index structure, which leads to a linear search complexity. In order to obtain better search efficiency, in this paper, we utilize a tree index structure instead of forward index to realize such schemes. To achieve the goal, we first give a set of keyword conversion methods that can convert the index and query keywords into a group of vectors and then present a novel algorithm for building index tree based on
APA, Harvard, Vancouver, ISO, and other styles
36

S., Rekha* V. Vinodhini N. Vanitha. "A STUDY ON CLOUD BASED ENCRYPTED DATA USING MULTI-KEYWORD RANKED SEARCH SCHEME." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 12 (2016): 319–23. https://doi.org/10.5281/zenodo.199507.

Full text
Abstract:
Cloud computing is completely internet-based approaches where all data’s and files are shared on a cloud. Data ownership in the cloud with increasing performance and range of offering, more and more enterprises is opting to take their services into the cloud. They are motivated to outsource their complex data management systems from local sites to commercial public cloud for more flexibility and economic savings. To protect the data privacy, cloud providers to build services that protect integrity of systems and the data itself. The perceptive data has to be encrypted before outsourcing for pr
APA, Harvard, Vancouver, ISO, and other styles
37

Ma, Zongmin, Xiaoqing Lin, Li Yan, and Zhen Zhao. "RDF Keyword Search by Query Computation." Journal of Database Management 29, no. 4 (2018): 1–27. http://dx.doi.org/10.4018/jdm.2018100101.

Full text
Abstract:
Keyword searches based on the keywords-to-SPARQL translation is attracting more attention because of a growing number of excellent SPARQL search engines. Current approaches for keyword search based on the keywords-to-SPARQL translation suffer from returning incomplete answers or wrong answers due to a lack of underlying schema information. To overcome these difficulties, in this article, we propose a new keyword search paradigm by translating keyword queries into SPARQL queries for exploring RDF data. An inter-entity relationship summary with complete schema information is distilled from the R
APA, Harvard, Vancouver, ISO, and other styles
38

Prakash, Miss Pawar Pratima. "A Review on Enabling Synonym Based Fined-grained Multi-keyword Search Using Hierarchical Clustering." International journal of Emerging Trends in Science and Technology 03, no. 12 (2016): 4866–70. http://dx.doi.org/10.18535/ijetst/v3i12.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Abishek, Karthik, and V. Adarsh. "User Recommendation System on Text Based Images." User Recommendation System on Text Based Images 8, no. 12 (2024): 5. https://doi.org/10.5281/zenodo.10487350.

Full text
Abstract:
With the growth of social media, online shopping, and e-commerce, images have become an integral part of our daily lives. The keyword search system for text-based images is an important project in today's world because of the vast amount of digital images that are generated and shared every day. However, finding a specific image from this vast collection can be a daunting task, especially when we have to search through thousands or even millions of images. So, Our System will help users to easily fetch the images based on the Keyword Search. A GNN is used for user recommendation. Keywords:- Ke
APA, Harvard, Vancouver, ISO, and other styles
40

Anuratha, K., S. Senthamaraikannan, and R. Rajaguru. "Key-Based Top-K Search in Multidimensional Databases." Asian Journal of Computer Science and Technology 1, no. 1 (2012): 29–36. http://dx.doi.org/10.51983/ajcst-2012.1.1.1676.

Full text
Abstract:
Previous studies on supporting free- form keyword queries over RDBMSs provide users with linked-structures (e.g., a set of joined tuples) that are relevant to a given keyword query. Most of them focus on ranking individual tuples from one table or joins of multiple tables containing a set of keywords. The problem of keyword search in a data cube with text-rich dimension(s) (so-called text cube) is studied. The text cube is built on a multidimensional text database, where each row is associated with some text data (a document) and other structural dimensions (attributes). A cell in the text cub
APA, Harvard, Vancouver, ISO, and other styles
41

V, Naga Bhargavi, and Sashi Rekha K. "Comparative Analysis of Threshold Multi-Keyword Search with Searchable Encryption of Reduced Computation Keyword Search for Cloud-Based Group Data Sharing." ECS Transactions 107, no. 1 (2022): 16901–11. http://dx.doi.org/10.1149/10701.16901ecst.

Full text
Abstract:
To reduce the computation cost of multi-keyword search for cloud-based group data sharing. Materials and methods: Multi-Keyword Advanced Encryption Standard algorithm (MAES) and Searchable Encryption RSA algorithm (SERSA) was iterated 10 times (sample size =20) for calculating the computational cost of multi-keyword search. The Shamir’s Secret key technique used with MAES algorithm helps to reduce the computation cost of multi-keyword search. Results and discussion: MAES appears to have better reduced cost (1.86 sec) compared to SERSA algorithm (2.05 sec). There was a statistical significance
APA, Harvard, Vancouver, ISO, and other styles
42

Dosso, Dennis, and Gianmaria Silvello. "Search Text to Retrieve Graphs: A Scalable RDF Keyword-Based Search System." IEEE Access 8 (2020): 14089–111. http://dx.doi.org/10.1109/access.2020.2966823.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Akheel, Syed Arham. "A Review of Hybrid Search Architectures: Integrating Keyword and Semantic Search to Optimize Query Relevance." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 11 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem15118.

Full text
Abstract:
Abstract—The advent of semantic search alongside the tra- ditional robustness of keyword search systems has established an intriguing dichotomy within the landscape of information retrieval. While keyword-based methods excel in terms of speci- ficity, semantic models offer contextual richness and intent aware- ness. However, each paradigm faces challenges in harnessing the strengths of the other. This paper investigates a hybrid search model that integrates both keyword and semantic search techniques, aiming to optimize relevance, interpretability, and user experience in complex information-se
APA, Harvard, Vancouver, ISO, and other styles
44

Liang, Zhang, Zou Fu-tai, and Ma Fan-yuan. "KRBKSS: a keyword relationship based keyword-set search system for peer-to-peer networks." Journal of Zhejiang University-SCIENCE A 6, no. 6 (2005): 577–82. http://dx.doi.org/10.1631/jzus.2005.a0577.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Rebai, Ilyes, Yassine Ben Ayed, and Walid Mahdi. "Spoken keyword search system using improved ASR engine and novel template-based keyword scoring." Multimedia Tools and Applications 78, no. 2 (2018): 1495–510. http://dx.doi.org/10.1007/s11042-018-6276-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Zhu, Bo Yan, Guang Liu, and Liang Zhu. "Audio Retrieval Based on Chinese Keyword Search in Relational Databases." Advanced Materials Research 756-759 (September 2013): 3236–40. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.3236.

Full text
Abstract:
In this paper, we propose a new method based on Chinese keyword search to select the WAV or MP3 files in audio post-production. First, we listen to each file and label it with Chinese characters, and then classify and store the files in a relational database system. Then, we use the techniques of Chinese keyword search to match query characters and the tuple characters quickly, and to compute similarities between the query and candidate tuples. For the characteristics of Chinese keyword search, we present a ranking strategy and an algorithm to refine the candidate tuples resulting from the fir
APA, Harvard, Vancouver, ISO, and other styles
47

Selvaganesan, S., Su-Cheng Haw, and Lay-Ki Soon. "XDMA: A Dual Indexing and Mutual Summation Based Keyword Search Algorithm for XML Databases." International Journal of Software Engineering and Knowledge Engineering 24, no. 04 (2014): 591–615. http://dx.doi.org/10.1142/s0218194014500223.

Full text
Abstract:
Achieving the effectiveness in relation to the relevance of query result is the most crucial part of XML keyword search. Developing an XML Keyword search approach which addresses the user search intention, keyword ambiguity problems and query/search result grading (ranking) problem is still challenging. In this paper, we propose a novel approach called XDMA for keyword search in XML databases that builds two indices to resolve these problems. Then, a keyword search technique based on two-level matching between two indices is presented. Further, by utilizing the logarithmic and probability func
APA, Harvard, Vancouver, ISO, and other styles
48

K.Rama, Krishna, Sri Harsha Veeranki, Rajkumar Koppuravuri, Mastan Shaik, and Rakshan Kumar Pallepati. "Securing Organization's Data - A Role-Based Authorized Keyword Search Scheme with Efficient Decryption." International Journal for Modern Trends in Science and Technology 11, no. 04 (2025): 120–27. https://doi.org/10.5281/zenodo.15110678.

Full text
Abstract:
For better data availability and accessibility while ensuring data secrecy, organizations often tend to outsource their encrypted data to the cloud storage servers, thus bringing the challenge of keyword search over encrypted data. In this paper, we propose a novel authorized keyword search scheme using Role-Based Encryption (RBE) technique in a cloud environment. The contributions of this paper are multi-fold. First, it presents a keyword search scheme which enables only authorized users, having properly assigned roles, to delegate keyword-based data search capabilities over encrypted data to
APA, Harvard, Vancouver, ISO, and other styles
49

Senthil Kumar, G., T. S. Shiny angel, K. Vijayakumar, Akhilesh Chamoli, Sarang Kejriwal, and N. Snehalatha. "Composite Keyword Based Search Over Data on Remote Information." IOP Conference Series: Materials Science and Engineering 1130, no. 1 (2021): 012071. http://dx.doi.org/10.1088/1757-899x/1130/1/012071.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Abdallah, Hanya M., Ahmed Taha, and Mazen M. Selim. "Cloud-Based Fuzzy Keyword Search Scheme Over Encrypted Documents." International Journal of Sociotechnology and Knowledge Development 13, no. 4 (2021): 82–100. http://dx.doi.org/10.4018/ijskd.2021100106.

Full text
Abstract:
With the rapid growth and adoption of cloud computing, more sensitive information is centralized onto the cloud every day. For protecting this sensitive information, it must be encrypted before being outsourced. Current search schemes allow the user to query encrypted data using keywords, but these schemes do not guarantee the privacy of queries (i.e., when the user hits query more than once with the same keywords, the server can capture information about the data). This paper focuses on the secure storage and retrieval of ciphered data with preserving query privacy. The proposed scheme deploy
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!