SlideShare a Scribd company logo
Spatial Approximate String Search
ABSTRACT
This work deals with the approximate string search in large spatial databases. Specifically, we
investigate range queries augmented with a string similarity search predicate in both Euclidean
space and road networks. We dub this query the spatial approximate string (SAS) query. In
Euclidean space, we propose an approximate solution, the MHR-tree, which embeds min-wise
signatures into an R-tree. The min-wise signature for an index node u keeps a concise
representation of the union of q-grams from strings under the sub-tree of u. We analyze the
pruning functionality of such signatures based on the set resemblance between
the query string and the q-grams from the sub-trees of index nodes. We also discuss how to
estimate the selectivity of a SAS query in Euclidean space, for which we present a novel
adaptive algorithm to find balanced partitions using both the spatial and string information
stored in the tree. For queries on road networks, we propose a novel exact method, RSASSOL,
which significantly outperforms the baseline algorithm in practice. The RSASSOL combines
the q-gram based inverted lists and the reference nodes based pruning. Extensive experiments
on large real data sets demonstrate the efficiency and effectiveness of our approaches.
Existing System
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
Keyword search over a large amount of data is an important operation in a wide
range of domains. Felipe et al. has recently extended its study to spatial databases, where
keyword search becomes a fundamental building block for an increasing number of real-world
applications, and proposed the IR -Tree.
A main limitation of the IR -Tree is that it only supports exact keyword search.
Problems on existing system:
1. Exact Keyword Require For Searching the Results.
Proposed System
For RSAS queries, the baseline spatial solution is based on the Dijkstra’s algorithm. Given
a query point q, the query range radius r, and a string predicate, we expand from q on the
road network using the Dijkstra algorithm until we reach the points distance r away from q
and verify the string predicate either in a post-processing step or on the intermediate results
of the expansion. We denote this approach as the Dijkstra solution. Its performance degrades
quickly when the query range enlarges and/or the data on the network increases. This
motivates us to find a novel method to avoid the unnecessary road network expansions, by
combining the prunings from both the spatial and the string predicates simultaneously.
We demonstrate the efficiency and effectiveness of our proposed methods for SAS
queries using a comprehensive experimental evaluation. For ESAS queries, our experimental
evaluation covers both synthetic and real data sets of up to 10 millions points and 6
dimensions. For RSAS queries, our evaluation is based on two large, real road network
datasets, that contain up to 175,813 nodes, 179,179 edges, and 2 millions points on the road
network. In both cases, our methods have significantly outperformed the respective baseline
methods.
Advantages:
This is very helpful for Exact Result from Non Exact keywords .
IMPLEMENTATION
Implementation is the stage of the project when the theoretical design is turned out
into a working system. Thus it can be considered to be the most critical stage in achieving a
successful new system and in giving the user, confidence that the new system will work and
be effective.
The implementation stage involves careful planning, investigation of the existing
system and it’s constraints on implementation, designing of methods to achieve changeover
and evaluation of changeover methods.
Main Modules:-
1. User Module:
In this module, Users are having authentication and security to access the detail
which is presented in the ontology system. Before accessing or searching the details user
should have the account in that otherwise they should register first.
.
2. key:
The key of common Index can be made from the Index word given by the Data owner
and File. The secure index and a search scheme to enable fast similarity search in the context of
data. In such a context, it is very critical not to sacrifice the confidentiality of the sensitive data
while providing functionality. We provided a rigorous security definition and proved the
security of the proposed scheme under the provided definition to ensure the confidentiality.
3. Edit Distance Pruning:
Computing edit distance exactly is a costly operation. Sev- eral techniques have been
proposed for identifying candidate strings within a small edit distance from a query string fast.
All of them are based on q-grams and a q-gram
counting argument. For a string s, its q-grams are produced by sliding a window
of length q over the characters of s. To deal with the special case at the beginning and the end of
s, that have fewer than q characters, one may introduce special characters, such as “#” and “$”,
which are not in S. This helps conceptually extend
s by prefixing it with q - 1 occurrences of “#” and suffixing it with q - 1 occurrences of “$”.
Hence, each q-gram for the string s has exactly q characters.
4. Search:
we provide a specific application of the proposed similarity searchable encryption
scheme to clarify its mechanism.Server performs search on the index for each component and
sends back the corresponding encrypted bit vectors it makes by the respective like commend.
Finally, we illustrated the performance of the proposed scheme with empirical analysis on a real
data.
Configuration:-
H/W System Configuration:-
Processor - Pentium –III
Speed - 1.1 Ghz
RAM - 256 MB(min)
Hard Disk - 20 GB
Floppy Drive - 1.44 MB
Key Board - Standard Windows Keyboard
Mouse - Two or Three Button Mouse
Monitor - SVGA
S/W System Configuration:-
 Operating System :Windows95/98/2000/XP
 Application Server : Tomcat5.0/6.X
 Front End : HTML, Java, Jsp
 Scripts : JavaScript.
 Server side Script : Java Server Pages.
 Database : Mysql 5.0
Database Connectivity : JDBC.
Spatial approximate string search
CLOUING
DOMAIN: WIRELESS NETWORK PROJECTS

More Related Content

DOCX
Spatial approximate string search
PDF
Data mining projects topics for java and dot net
PDF
Research Inventy : International Journal of Engineering and Science
PDF
Implementation on Data Security Approach in Dynamic Multi Hop Communication
PDF
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...
DOCX
Cramér–rao lower bounds of rss based localization with anchor position uncert...
PPTX
Scalable Distributed Graph Algorithms on Apache Spark
DOCX
Network Flow Pattern Extraction by Clustering Eugine Kang
Spatial approximate string search
Data mining projects topics for java and dot net
Research Inventy : International Journal of Engineering and Science
Implementation on Data Security Approach in Dynamic Multi Hop Communication
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...
Cramér–rao lower bounds of rss based localization with anchor position uncert...
Scalable Distributed Graph Algorithms on Apache Spark
Network Flow Pattern Extraction by Clustering Eugine Kang

What's hot (15)

PPTX
Tapestry
PDF
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...
PDF
International Journal of Computational Engineering Research(IJCER)
DOCX
network layer.docx
PDF
Performance Comparison of Cluster based and Threshold based Algorithms for De...
PDF
M.E Computer Science Secure Computing Projects
PDF
Optimizing Data Confidentiality using Integrated Multi Query Services
PDF
M phil-computer-science-secure-computing-projects
PDF
M.Phil Computer Science Secure Computing Projects
PDF
An Efficient Algorithm to Calculate The Connectivity of Hyper-Rings Distribut...
PPTX
Improving the search mechanism for unstructured peer to-peer networks using t...
PPTX
It Takes Two to Tango: an Exploration of Domain Pairs for Cross-Domain Collab...
PDF
Intrusion detection in heterogeneous network by multipath routing based toler...
PDF
Intrusion detection in heterogeneous network by multipath routing based toler...
DOCX
2 column paper
Tapestry
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...
International Journal of Computational Engineering Research(IJCER)
network layer.docx
Performance Comparison of Cluster based and Threshold based Algorithms for De...
M.E Computer Science Secure Computing Projects
Optimizing Data Confidentiality using Integrated Multi Query Services
M phil-computer-science-secure-computing-projects
M.Phil Computer Science Secure Computing Projects
An Efficient Algorithm to Calculate The Connectivity of Hyper-Rings Distribut...
Improving the search mechanism for unstructured peer to-peer networks using t...
It Takes Two to Tango: an Exploration of Domain Pairs for Cross-Domain Collab...
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
2 column paper
Ad

Similar to Spatial approximate string search (20)

DOCX
JAVA 2013 IEEE NETWORKSECURITY PROJECT Spatial approximate string search
DOCX
Spatial approximate string search
PDF
Cg4201552556
PDF
Searching in metric spaces
PDF
Enhanced Methodology for supporting approximate string search in Geospatial ...
DOC
IEEE 2014 JAVA DATA MINING PROJECTS Fast nearest neighbor search with keywords
DOC
ast nearest neighbor search with keywords
DOCX
fast nearest neighbor search with keywords
DOC
Fast nearest neighbor search with keywords
DOCX
JPJ1422 Fast Nearest Neighbour Search With Keywords
PDF
Designing of Semantic Nearest Neighbor Search: Survey
PDF
Spatial Approximate String Keyword content Query processing
DOC
Efficient instant fuzzy search with proximity ranking
DOCX
JAVA 2013 IEEE DATAMINING PROJECT Fast nearest neighbor search with keywords
DOCX
Fast nearest neighbor search with keywords
PDF
Efficient processing of continuous spatial-textual queries over geo-textual d...
PPTX
Error Tolerant Record Matching PVERConf_May2011
PDF
Efficiently searching nearest neighbor in documents
DOCX
Query adaptive image search with hash codes
PDF
Efficiently searching nearest neighbor in documents using keywords
JAVA 2013 IEEE NETWORKSECURITY PROJECT Spatial approximate string search
Spatial approximate string search
Cg4201552556
Searching in metric spaces
Enhanced Methodology for supporting approximate string search in Geospatial ...
IEEE 2014 JAVA DATA MINING PROJECTS Fast nearest neighbor search with keywords
ast nearest neighbor search with keywords
fast nearest neighbor search with keywords
Fast nearest neighbor search with keywords
JPJ1422 Fast Nearest Neighbour Search With Keywords
Designing of Semantic Nearest Neighbor Search: Survey
Spatial Approximate String Keyword content Query processing
Efficient instant fuzzy search with proximity ranking
JAVA 2013 IEEE DATAMINING PROJECT Fast nearest neighbor search with keywords
Fast nearest neighbor search with keywords
Efficient processing of continuous spatial-textual queries over geo-textual d...
Error Tolerant Record Matching PVERConf_May2011
Efficiently searching nearest neighbor in documents
Query adaptive image search with hash codes
Efficiently searching nearest neighbor in documents using keywords
Ad

More from IEEEFINALYEARPROJECTS (20)

DOCX
Scalable face image retrieval using attribute enhanced sparse codewords
DOCX
Scalable face image retrieval using attribute enhanced sparse codewords
DOCX
Reversible watermarking based on invariant image classification and dynamic h...
DOCX
Reversible data hiding with optimal value transfer
DOCX
Query adaptive image search with hash codes
DOCX
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
DOCX
Local directional number pattern for face analysis face and expression recogn...
DOCX
An access point based fec mechanism for video transmission over wireless la ns
DOCX
Towards differential query services in cost efficient clouds
DOCX
Spoc a secure and privacy preserving opportunistic computing framework for mo...
DOCX
Secure and efficient data transmission for cluster based wireless sensor netw...
DOCX
Privacy preserving back propagation neural network learning over arbitrarily ...
DOCX
Non cooperative location privacy
DOCX
Harnessing the cloud for securely outsourcing large
DOCX
Geo community-based broadcasting for data dissemination in mobile social netw...
DOCX
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
DOCX
Dynamic resource allocation using virtual machines for cloud computing enviro...
DOCX
A secure protocol for spontaneous wireless ad hoc networks creation
DOCX
Utility privacy tradeoff in databases an information-theoretic approach
DOCX
Two tales of privacy in online social networks
Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewords
Reversible watermarking based on invariant image classification and dynamic h...
Reversible data hiding with optimal value transfer
Query adaptive image search with hash codes
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Local directional number pattern for face analysis face and expression recogn...
An access point based fec mechanism for video transmission over wireless la ns
Towards differential query services in cost efficient clouds
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Secure and efficient data transmission for cluster based wireless sensor netw...
Privacy preserving back propagation neural network learning over arbitrarily ...
Non cooperative location privacy
Harnessing the cloud for securely outsourcing large
Geo community-based broadcasting for data dissemination in mobile social netw...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Dynamic resource allocation using virtual machines for cloud computing enviro...
A secure protocol for spontaneous wireless ad hoc networks creation
Utility privacy tradeoff in databases an information-theoretic approach
Two tales of privacy in online social networks

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Big Data Technologies - Introduction.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Cloud computing and distributed systems.
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Approach and Philosophy of On baking technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Chapter 3 Spatial Domain Image Processing.pdf
Empathic Computing: Creating Shared Understanding
Big Data Technologies - Introduction.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Cloud computing and distributed systems.
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Encapsulation_ Review paper, used for researhc scholars
Approach and Philosophy of On baking technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
sap open course for s4hana steps from ECC to s4
MIND Revenue Release Quarter 2 2025 Press Release
Mobile App Security Testing_ A Comprehensive Guide.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
NewMind AI Weekly Chronicles - August'25 Week I
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
MYSQL Presentation for SQL database connectivity
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy

Spatial approximate string search

  • 1. Spatial Approximate String Search ABSTRACT This work deals with the approximate string search in large spatial databases. Specifically, we investigate range queries augmented with a string similarity search predicate in both Euclidean space and road networks. We dub this query the spatial approximate string (SAS) query. In Euclidean space, we propose an approximate solution, the MHR-tree, which embeds min-wise signatures into an R-tree. The min-wise signature for an index node u keeps a concise representation of the union of q-grams from strings under the sub-tree of u. We analyze the pruning functionality of such signatures based on the set resemblance between the query string and the q-grams from the sub-trees of index nodes. We also discuss how to estimate the selectivity of a SAS query in Euclidean space, for which we present a novel adaptive algorithm to find balanced partitions using both the spatial and string information stored in the tree. For queries on road networks, we propose a novel exact method, RSASSOL, which significantly outperforms the baseline algorithm in practice. The RSASSOL combines the q-gram based inverted lists and the reference nodes based pruning. Extensive experiments on large real data sets demonstrate the efficiency and effectiveness of our approaches. Existing System GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
  • 2. Keyword search over a large amount of data is an important operation in a wide range of domains. Felipe et al. has recently extended its study to spatial databases, where keyword search becomes a fundamental building block for an increasing number of real-world applications, and proposed the IR -Tree. A main limitation of the IR -Tree is that it only supports exact keyword search. Problems on existing system: 1. Exact Keyword Require For Searching the Results. Proposed System For RSAS queries, the baseline spatial solution is based on the Dijkstra’s algorithm. Given a query point q, the query range radius r, and a string predicate, we expand from q on the road network using the Dijkstra algorithm until we reach the points distance r away from q and verify the string predicate either in a post-processing step or on the intermediate results of the expansion. We denote this approach as the Dijkstra solution. Its performance degrades quickly when the query range enlarges and/or the data on the network increases. This motivates us to find a novel method to avoid the unnecessary road network expansions, by combining the prunings from both the spatial and the string predicates simultaneously. We demonstrate the efficiency and effectiveness of our proposed methods for SAS queries using a comprehensive experimental evaluation. For ESAS queries, our experimental evaluation covers both synthetic and real data sets of up to 10 millions points and 6 dimensions. For RSAS queries, our evaluation is based on two large, real road network datasets, that contain up to 175,813 nodes, 179,179 edges, and 2 millions points on the road
  • 3. network. In both cases, our methods have significantly outperformed the respective baseline methods. Advantages: This is very helpful for Exact Result from Non Exact keywords . IMPLEMENTATION Implementation is the stage of the project when the theoretical design is turned out into a working system. Thus it can be considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that the new system will work and be effective. The implementation stage involves careful planning, investigation of the existing system and it’s constraints on implementation, designing of methods to achieve changeover and evaluation of changeover methods. Main Modules:- 1. User Module: In this module, Users are having authentication and security to access the detail which is presented in the ontology system. Before accessing or searching the details user should have the account in that otherwise they should register first. . 2. key: The key of common Index can be made from the Index word given by the Data owner and File. The secure index and a search scheme to enable fast similarity search in the context of
  • 4. data. In such a context, it is very critical not to sacrifice the confidentiality of the sensitive data while providing functionality. We provided a rigorous security definition and proved the security of the proposed scheme under the provided definition to ensure the confidentiality. 3. Edit Distance Pruning: Computing edit distance exactly is a costly operation. Sev- eral techniques have been proposed for identifying candidate strings within a small edit distance from a query string fast. All of them are based on q-grams and a q-gram counting argument. For a string s, its q-grams are produced by sliding a window of length q over the characters of s. To deal with the special case at the beginning and the end of s, that have fewer than q characters, one may introduce special characters, such as “#” and “$”, which are not in S. This helps conceptually extend s by prefixing it with q - 1 occurrences of “#” and suffixing it with q - 1 occurrences of “$”. Hence, each q-gram for the string s has exactly q characters. 4. Search: we provide a specific application of the proposed similarity searchable encryption scheme to clarify its mechanism.Server performs search on the index for each component and sends back the corresponding encrypted bit vectors it makes by the respective like commend. Finally, we illustrated the performance of the proposed scheme with empirical analysis on a real data. Configuration:- H/W System Configuration:- Processor - Pentium –III
  • 5. Speed - 1.1 Ghz RAM - 256 MB(min) Hard Disk - 20 GB Floppy Drive - 1.44 MB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - SVGA S/W System Configuration:-  Operating System :Windows95/98/2000/XP  Application Server : Tomcat5.0/6.X  Front End : HTML, Java, Jsp  Scripts : JavaScript.  Server side Script : Java Server Pages.  Database : Mysql 5.0 Database Connectivity : JDBC.