Increasing the Visibility of Search using Genetic Algorithm
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 5
Abstract
Abstract : The vast repository of informational databases i.e. Web is available to the user in the form of textual documents. It’s a challenge to develop an effective information retrieval approach that can ease the user search and increases the visibility of search. Genetic Algorithm based approach has been implemented to increase the visibility of search by expanding the query using Jaccard similarity function as fitness function. The step by step implementation of genetic algorithm for one generation has been explained in the paper and the experiment was repeated for 500 generations to obtain optimum keywords out of which the best suited keyword was considered for expanding the query. The effectiveness of the approach has been experimentally evaluated on manually created training data of retrieved documents for formulated queries using the Google search engine
Authors and Affiliations
Jaswinder Singh , Parvinder Singh , Yogesh Chaba
Comparative Study of PEGASIS Protocols inWireless Sensor Network
Abstract: The area of Wireless Sensor Networks (WSNs) is one of the fast growing and emerging field in the scientific and engineering world. It is an ad-hoc network that consists of small nodes with sensing, computing an...
Privacy-Preserving Data Mining with Random decision tree framework
Data mining is the useful tool to discovering the knowledge from large data. Different methods & algorithms are available in data mining. Classification is most common method used for finding the mine rule from the large...
Analysis and evaluation of probabilistic routing protocol for intermittently connected network
Intermittently connected network often referred to as Delay/Disruption Tolerant Network which is an infrastructure less network suffers from intermittent connection i.e. a connected path from the source to the de...
Enhanced Detection Rate for Network Intrusion Detection System by Using Chaotic Firefly Algorithm
Regarding the security of computer systems, the intrusion detection systems (IDS) are essential components for the detection of attacks at the early stage. Therefore, the main goal of this thesis is to choose the differe...
CEET: A Compressed Encrypted & Embedded Technique for Digital Image Steganography
Abstract: In this information era, digital information sharing and transfer plays a vital role and their use has increased exponentially with the development of technology. Thus providing security of data is a topi...