A Robust Multi-Keyword Text Content Retrieval by Utilizing Hash Indexing
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2021, Vol 9, Issue 2
Abstract
Digital content on servers increase the storage and fetching issues. So, researcher works in this field to organize content for fast retrieval with data security. This paper has worked on text digital content retrieval available in form of documents, files. User can search a desired file by test query and relevant list of files get appeared. Keywords were fetched from the text content by removing noisy data during pre-processing. Pre-processed keywords are identified by the number known as term ID. As per the term-ID each text content got a Hash Index which was termed as key numbers in document index. Each term or word has its own identification number known as term Id , so privacy of comparing content terms and user query maintain by hash based searching. As document identification done by hash index key, so storage of text content was done in encrypted numbers once document select for reading then decryption of document applied for a particular user. Experiment was done on real and artificial text content dataset files on different topics. It was obtained that proposed model of Hash indexing and tem based retrieval has improved the privacy with relevancy of as per query.
Authors and Affiliations
Mohamed Manzoor Ul Hassan
Evaluation of the Toxicity of Aconitum Heterophyllum
Aconitum heterophyllum, commonly known as aruna, belongs to the Ranunculaceae family and is used in Ayurvedic formulations to treat diarrhoea, liver difficulties, and other ailments. Alkaloids, proteins, carbohydrates, s...
Black Hole Emission and X-Ray Effects
A compact core corona emits power–law continuous X-ray radiation from Supermassive black pre - drilled and bright gravitational perturbations star mass Calibration lags are caused by gentle commute delays involving fluct...
Review on Detecting DDoS Attacks using Map Reduce in Haddop
An assault on a network that overflows it with so many requests that regular traffic is either decelerated or entirely interrupted. Unlike a virus or worm, this can cause severe damage to databases. A Distributed Denial...
Recommendations for the Development and Improvement of Immunoassays for the Detection of Host Antibodies to Biotechnology Goods
The majority of biopharmaceutical treatments generate some amount Allergic reaction to a foodstuff. In some instances, an immune reaction may have had serious consequences. And/or a loss of effectiveness. As a result, do...
Overview of Database Query Auditing Techniques
Government regulations and increased awareness of security issues have increased the auditing requirements of information technology systems. The goal of an auditing system is to determine if security and other policies...