Efficient Processing of Top-K Preference Queries on Incomplete Information
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 6
Abstract
Incomplete data is general, finding and scrutinizing these kind of data is basic starting late. The top k overwhelming (TKD) queries return k challenges that supersedes most extraordinary number of things in a given dataset. It joins the advantages of skyline and top k queries. This accept a basic part in various decision bolster applications. Incomplete data holds in honest to goodness datasets, in light of contraption dissatisfaction, security protection, data setback. Here, framework finish an efficient examination of TKD queries on incomplete data, which joins the data having missing dimensional value(s). We handle this issue, and present an algorithm for taking note of TKD queries over incomplete data. Our systems use a couple of strategies, for instance, upper bound score pruning, bitmap pruning, and midway score pruning, to ascend the capability of queries. Created test e valuation using both authentic and designed datasets shows the feasibility of the made pruning rules and avows execution of algorithms.
Authors and Affiliations
Mr. Maharudra Banale, Prof. Bhagwan Kurhe
SVM Based Classification of Neurodegenerative Diseases for Salient Brain Patterns
The identification defects in the MRI brain images can save numerous lives. A method to implement the kernel function for feature extraction to identify the neurodegenerative Alzheimer disease in Brain Image is proposed...
Occupational Hazard And Control Measures In Foundry Dust
India has 4,600 foundry units, 80 per cent of them in the SME sector. Annual production is 7.4 million tons, approximately valued at $8 billion. The sector employs 0.5 million people directly and an additional 1.5% of E...
Thresholding Technique for Color Image Segmentation
Image processing is a form of signal processing that manipulates an image by means of a processor. Computer vision is a high level image processing that includes methods for acquiring, processing, analyzing, understandi...
Various Attacks Including JellyFish Attack Along With Security Issues In Manet
The MANET which is termed as Mobile Adhoc network works like a wireless network with unrestricted mobility and without any infrastructure. To design a new security mechanism for MANET various attack variations as well a...
Security Attacks on Network Layer in Wireless Sensor Networks-An Overview
The wireless sensor networks (WSN) are said to be one of the popular networks in using all-inclusive applications These networks are structured in many or more number of sensor nodes. The Deployment of nodes in these ne...