An Algorithm To Compute The SR Score And Parameters To Tune Its Performance
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 11
Abstract
Keyword query interfaces (KQIs) for list have involved much notice in the last decade due to their suppleness and ease of use in searching and discover the data. Because any unit in a data set that enclose the query keywords is a probable answer, keyword queries naturally have many potential answers. KQIs must make out the information needs in the rear keyword queries and rank the answers so that the needed answers come out at the top of the list. It is central for a KQI to make out such queries and inform the user or make use of another techniques like query reformulation or query suggestions. It possibly will also use practice such as query results diversification.
Authors and Affiliations
G. Aruna, V. Ramu
Low Power 10 PAM Transmitter Using Mixed Signal Design Approach
The mixed signal design approach for 10- level pulse amplitude modulation (10-PAM) transmitter which transmit 4-bit per symbol. The frequency is reduced thereby the power dissipation is greatly reduced. The data rate...
Greedy Algorithm for Hub Selection in Interactive Network Applications
Many multiple users interaction in network applications such as teleconferencing, network gaming and online trading are gaining popularity but these applications require that the delay difference in between multiple...
Analysis of the data with multiple features in retail domain
In enterprise data mining applications it is crucial to develop effective techniques for mining rules combining necessary information from multiple relevant business areas,catering for real business settings and deci...
A Critical Study on Semantic Web Systems and Semantic Web Services
The World Wide Web is the greatest repository of information having a decentralized design in which web pages are hosted by numerous computers, where each document can point to other documents, either on the same or...
Enabling Secure File Sharing On Untrusted Servers Using Mona
Identity privacy is one of the most important obstruction for the wide operation of cloud computing. Without the guarantee of identity privacy users may be reluctant to join in cloud computing systems since their rea...