Efficient data structure method for spatial objects retrival Using string
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 12
Abstract
This work deals with the surmised string look for in considerable spatial databases. Specifically, we look at reach inquiries expanded with a string similarity look for predicate in both Euclidean space and street frameworks. We name this question the spatial derived string (SAS) inquiry. In Euclidean space, we propose an estimated course of action, the MHR-tree, which embeds min-wise imprints into an R-tree.
Authors and Affiliations
M Satyanarayana, B. S. N. V Ramana murthy
Dg: Modeling Network Behavior for Static and Dynamic Websites
Internet services and applications have become an inextricable part of daily life, enabling communication and the management of personal information from anywhere. To accommodate this increase in application and data...
Handwritten Character Recognition - A Comprehensive Review
Character recognition comes into picture when various patterns of handwritten or optical characters are to be recognized digitally. Many researchers have proposed different approaches for character recognition in dif...
Improved Algorithm for Prediction of Heart Disease Using Case based Reasoning Technique on Non-Binary Datasets
Frequent itemset mining is a basic problem in data mining and knowledge discovery. The discovered patterns can be used as input for Association and Classification. Association Rules and Classification Rules have been...
Procedure Dynamic Network and Prevent Mobile Typically Extension
Prevent and mobile is taken spread from dynamic networks and mobile networks is used number of times results of mobile users In a mobile network mobile and prevent can use security data lose no. of modifications and...
Enhanced Intrusion Detection System with Mobile Agent
This electronic The widespread proliferation of Internet connections has made current computer networks more vulnerable to intrusions than before. In network intrusions, there may be multiple computing nodes that are...