RELATIVE QUERY RESULTS RANKING FOR ONLINE USERS IN WEB DATABASES
Journal Title: Indian Journal of Computer Science and Engineering - Year 2013, Vol 4, Issue 6
Abstract
To handle with the problem of so many-answers replied from an online Web database in response to a relative query, this paper proposes a unique approach to rank the similar query results. Depending upon the on the database workload, we hypothesize how much the user worries about each and every attribute and assigns a specific weight to it. Then, based on the relationship among of different attribute values, a user satisfaction degree ranking method develops, which ranks all the answer tuples according to their satisfaction degree level for the initial query asked. Then, for the tuples with the same satisfaction degree, each undefined attribute value is assigned with a score according to its “importance” to the user, which is used for differentiating these tuples. Finally, the results of preparatory experiment shows effectiveness of the ranking techniques used for better user satisfaction in web-database systems.
Authors and Affiliations
Pramod Kumar Ghadei , Dr. S. Sridhar
AN ANALYSIS OF THE DESIGN FACTORS AFFECTING THE PERFORMANCE OF CRYPTOSYSTEMS
Communication is the basic process of exchanging information. The effectiveness of computer communication is mainly based on the security aspects. The internet made the communication more flexible and resourceful. Then s...
STANDARD BASED RELIABILITY PREDICTION OF TRAVELING WAVE TUBE IN COMMUNICATION SATELLITE
A Traveling Wave Tube (TWT) is a vital component of satellite communication transponder. Before launch, it is essential to ensure that TWT meets the life of the satellite in the orbit.. Standard based reliability predict...
PROTOTYPE TO DESIGN A LEASED LINE TELEPHONE NETWORK CONNECTING LOCATIONS TO MINIMIZE THE INSTALLATION COST
Network flows have many real-life applications and leased-line installation for telephone network is one of them. In the leased line a major concern is to provide connection of telephone to all the locations. It is requi...
Three Party Authentication Key Distributed Protocols Using Implicit and Explicit Quantum Cryptography
Cryptography is the science of information security. Applications of cryptography include ATM cards, computer passwords, and electronic commerce. The combination of Implicit quantum key distribution protocol (3AQKDP) and...
Performance Study of Live Virtual Machine Migration using KVM Hypervisor
In a cloud computing environment, migrating operating system instances across distinct physical hosts is a useful tool for administrators of data centers and clusters: It allows a clean separation between hardware and so...