To Evaluate The Effectiveness Of The Query Quality Prediction Model Computed Using Sr Algorithm
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 11
Abstract
We analyze the account of hard queries and suggest a novel framework to decide the degree of weakness for a keyword query over a database, manner in mind both the structure and the satisfied of the database and the query results. Researchers have future methods to envisage hard queries over unstructured text documents. We can generally categorize these methods into two groups as preretrieval and post-retrieval methods. There has not been any work on expect or analyzing the hitches of queries over databases. Researchers have future some methods to spot difficult queries over plain text document collections.
Authors and Affiliations
Uma Pullela, B. Narasimha Rao
Overlapping Clusters in Genes – An Overview
While the vast majority of clustering algorithms are partitional, many real world datasets have inherently overlapping clusters. Several approaches to nding overlapping clusters have come from work on analysis of biol...
HFRECCA : A New Sentence Clustering Technique For Text Mining
Clustering is the process of grouping or aggregating of data items. Sentence clustering mainly used in variety of applications such as classify and categorization of documents, automatic summary generation, organizing...
Design of Automatic Automobile using CAN Bus
CAN is a serial bus protocol to connect individual systems and sensors as an alternative to conventional multi-wire looms. It allows automotive components to communicate on a single or dual-wire networked data bus up...
An Energy Balanced Routing Method Based On Adaptive Heed for Wireless Sensor Networks
We present a protocol, HEED (Hybrid Energy-Efficient Distributed clustering), that periodically selects cluster heads according to a hybrid of the node residual energy and a secondary parameter, such as node proximit...
An Effective Approach Of Compressing Encrypted Images
In this paper proposing a novel scheme of scalable coding for encrypted images. In the encryption phase, the original pixel values are masked by a modulo- 256 addition with nonrandom numbers that are derived from a s...