SlideShare a Scribd company logo
Spatial Approximate String Search
ABSTRACT
This work deals with the approximate string search in large spatial databases. Specifically, we
investigate range queries augmented with a string similarity search predicate in both Euclidean
space and road networks. We dub this query the spatial approximate string (SAS) query. In
Euclidean space, we propose an approximate solution, the MHR-tree, which embeds min-wise
signatures into an R-tree. The min-wise signature for an index node u keeps a concise
representation of the union of q-grams from strings under the sub-tree of u. We analyze the
pruning functionality of such signatures based on the set resemblance between
the query string and the q-grams from the sub-trees of index nodes. We also discuss how to
estimate the selectivity of a SAS query in Euclidean space, for which we present a novel
adaptive algorithm to find balanced partitions using both the spatial and string information
stored in the tree. For queries on road networks, we propose a novel exact method, RSASSOL,
which significantly outperforms the baseline algorithm in practice. The RSASSOL combines
the q-gram based inverted lists and the reference nodes based pruning. Extensive experiments
on large real data sets demonstrate the efficiency and effectiveness of our approaches.
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
Existing System
Keyword search over a large amount of data is an important operation in a wide range of
domains. Felipe et al. has recently extended its study to spatial databases, where keyword search
becomes a fundamental building block for an increasing number of real-world applications, and
proposed the IR -Tree.
A main limitation of the IR -Tree is that it only supports exact keyword search.
Problems on existing system:
1. Exact Keyword Require For Searching the Results.
Proposed System
For RSAS queries, the baseline spatial solution is based on the Dijkstra’s algorithm. Given
a query point q, the query range radius r, and a string predicate, we expand from q on the
road network using the Dijkstra algorithm until we reach the points distance r away from q
and verify the string predicate either in a post-processing step or on the intermediate results
of the expansion. We denote this approach as the Dijkstra solution. Its performance degrades
quickly when the query range enlarges and/or the data on the network increases. This
motivates us to find a novel method to avoid the unnecessary road network expansions, by
combining the prunings from both the spatial and the string predicates simultaneously.
We demonstrate the efficiency and effectiveness of our proposed methods for SAS
queries using a comprehensive experimental evaluation. For ESAS queries, our experimental
evaluation covers both synthetic and real data sets of up to 10 millions points and 6
dimensions. For RSAS queries, our evaluation is based on two large, real road network
datasets, that contain up to 175,813 nodes, 179,179 edges, and 2 millions points on the road
network. In both cases, our methods have significantly outperformed the respective baseline
methods.
Advantages:
This is very helpful for Exact Result from Non Exact keywords .
Main Modules:-
1. User Module:
In this module, Users are having authentication and security to access the detail
which is presented in the ontology system. Before accessing or searching the details user
should have the account in that otherwise they should register first.
.
2. key:
The key of common Index can be made from the Index word given by the Data owner
and File. The secure index and a search scheme to enable fast similarity search in the context of
data. In such a context, it is very critical not to sacrifice the confidentiality of the sensitive data
while providing functionality. We provided a rigorous security definition and proved the
security of the proposed scheme under the provided definition to ensure the confidentiality.
3. Edit Distance Pruning:
Computing edit distance exactly is a costly operation. Sev- eral techniques have been
proposed for identifying candidate strings within a small edit distance from a query string fast.
All of them are based on q-grams and a q-gram
counting argument. For a string s, its q-grams are produced by sliding a window
of length q over the characters of s. To deal with the special case at the beginning and the end of
s, that have fewer than q characters, one may introduce special characters, such as “#” and “$”,
which are not in S. This helps conceptually extend
s by prefixing it with q - 1 occurrences of “#” and suffixing it with q - 1 occurrences of “$”.
Hence, each q-gram for the string s has exactly q characters.
4. Search:
we provide a specific application of the proposed similarity searchable encryption
scheme to clarify its mechanism.Server performs search on the index for each component and
sends back the corresponding encrypted bit vectors it makes by the respective like commend.
Finally, we illustrated the performance of the proposed scheme with empirical analysis on a real
data.
Configuration:-
H/W System Configuration:-
Processor - Pentium –III
Speed - 1.1 Ghz
RAM - 256 MB(min)
Hard Disk - 20 GB
Floppy Drive - 1.44 MB
Key Board - Standard Windows Keyboard
Mouse - Two or Three Button Mouse
Monitor - SVGA
S/W System Configuration:-
 Operating System :Windows95/98/2000/XP
 Application Server : Tomcat5.0/6.X
 Front End : HTML, Java, Jsp
 Scripts : JavaScript.
 Server side Script : Java Server Pages.
 Database : Mysql 5.0
Database Connectivity : JDBC.

More Related Content

DOCX
Spatial approximate string search
DOCX
Spatial approximate string search
PPTX
Scalable Distributed Graph Algorithms on Apache Spark
PDF
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...
PDF
Data mining projects topics for java and dot net
PDF
Research Inventy : International Journal of Engineering and Science
PDF
Analysis of different similarity measures: Simrank
PDF
Optimal scheduling algorithm for throughput maximization in multihop wireless...
Spatial approximate string search
Spatial approximate string search
Scalable Distributed Graph Algorithms on Apache Spark
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...
Data mining projects topics for java and dot net
Research Inventy : International Journal of Engineering and Science
Analysis of different similarity measures: Simrank
Optimal scheduling algorithm for throughput maximization in multihop wireless...

What's hot (18)

PDF
Optimizing Data Confidentiality using Integrated Multi Query Services
PDF
Vchunk join an efficient algorithm for edit similarity joins
PDF
A parallel string matching engine for use in high speed network intrusion det...
DOCX
Network Flow Pattern Extraction by Clustering Eugine Kang
DOCX
Cramér–rao lower bounds of rss based localization with anchor position uncert...
PDF
Using Word Embedding for Automatic Query Expansion
PDF
An Efficient Algorithm to Calculate The Connectivity of Hyper-Rings Distribut...
PDF
Best lookup algorithm for 100+gbps ipv6 packet
PDF
Geometric efficient matching algorithm for firewalls
PDF
Geometric efficient matching algorithm for firewalls
PDF
IEEE Datamining 2016 Title and Abstract
PDF
Survey on scalable continual top k keyword search in relational databases
PDF
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
DOCX
transmission-efficient clustering method for wireless sensor networks using c...
PPTX
NS2 Network Simulation Example Research Assistance
PDF
Java Abs Scalable Wireless Ad Hoc Network Simulation Using
DOCX
network layer.docx
Optimizing Data Confidentiality using Integrated Multi Query Services
Vchunk join an efficient algorithm for edit similarity joins
A parallel string matching engine for use in high speed network intrusion det...
Network Flow Pattern Extraction by Clustering Eugine Kang
Cramér–rao lower bounds of rss based localization with anchor position uncert...
Using Word Embedding for Automatic Query Expansion
An Efficient Algorithm to Calculate The Connectivity of Hyper-Rings Distribut...
Best lookup algorithm for 100+gbps ipv6 packet
Geometric efficient matching algorithm for firewalls
Geometric efficient matching algorithm for firewalls
IEEE Datamining 2016 Title and Abstract
Survey on scalable continual top k keyword search in relational databases
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
transmission-efficient clustering method for wireless sensor networks using c...
NS2 Network Simulation Example Research Assistance
Java Abs Scalable Wireless Ad Hoc Network Simulation Using
network layer.docx
Ad

Similar to Spatial approximate string search (20)

DOCX
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Spatial approximate string search
PDF
Cg4201552556
PDF
Enhanced Methodology for supporting approximate string search in Geospatial ...
PDF
Searching in metric spaces
DOC
IEEE 2014 JAVA DATA MINING PROJECTS Fast nearest neighbor search with keywords
PDF
Spatial Approximate String Keyword content Query processing
DOCX
fast nearest neighbor search with keywords
DOCX
JPJ1422 Fast Nearest Neighbour Search With Keywords
DOC
Fast nearest neighbor search with keywords
DOC
Efficient instant fuzzy search with proximity ranking
PDF
ENHANCING KEYWORD SEARCH OVER RELATIONAL DATABASES USING ONTOLOGIES
PDF
Enhancing keyword search over relational databases using ontologies
PDF
ENHANCING KEYWORD SEARCH OVER RELATIONAL DATABASES USING ONTOLOGIES
DOCX
JAVA 2013 IEEE DATAMINING PROJECT Fast nearest neighbor search with keywords
DOCX
Fast nearest neighbor search with keywords
PPTX
Error Tolerant Record Matching PVERConf_May2011
PDF
ROMAN URDU OPINION MINING SYSTEM (RUOMIS)
PDF
Hybrid geo textual index structure
PDF
Designing of Semantic Nearest Neighbor Search: Survey
DOCX
Fast nearest neighbor search with keywords
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Spatial approximate string search
Cg4201552556
Enhanced Methodology for supporting approximate string search in Geospatial ...
Searching in metric spaces
IEEE 2014 JAVA DATA MINING PROJECTS Fast nearest neighbor search with keywords
Spatial Approximate String Keyword content Query processing
fast nearest neighbor search with keywords
JPJ1422 Fast Nearest Neighbour Search With Keywords
Fast nearest neighbor search with keywords
Efficient instant fuzzy search with proximity ranking
ENHANCING KEYWORD SEARCH OVER RELATIONAL DATABASES USING ONTOLOGIES
Enhancing keyword search over relational databases using ontologies
ENHANCING KEYWORD SEARCH OVER RELATIONAL DATABASES USING ONTOLOGIES
JAVA 2013 IEEE DATAMINING PROJECT Fast nearest neighbor search with keywords
Fast nearest neighbor search with keywords
Error Tolerant Record Matching PVERConf_May2011
ROMAN URDU OPINION MINING SYSTEM (RUOMIS)
Hybrid geo textual index structure
Designing of Semantic Nearest Neighbor Search: Survey
Fast nearest neighbor search with keywords
Ad

More from IEEEFINALYEARPROJECTS (20)

DOCX
Scalable face image retrieval using attribute enhanced sparse codewords
DOCX
Scalable face image retrieval using attribute enhanced sparse codewords
DOCX
Reversible watermarking based on invariant image classification and dynamic h...
DOCX
Reversible data hiding with optimal value transfer
DOCX
Query adaptive image search with hash codes
DOCX
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
DOCX
Local directional number pattern for face analysis face and expression recogn...
DOCX
An access point based fec mechanism for video transmission over wireless la ns
DOCX
Towards differential query services in cost efficient clouds
DOCX
Spoc a secure and privacy preserving opportunistic computing framework for mo...
DOCX
Secure and efficient data transmission for cluster based wireless sensor netw...
DOCX
Privacy preserving back propagation neural network learning over arbitrarily ...
DOCX
Non cooperative location privacy
DOCX
Harnessing the cloud for securely outsourcing large
DOCX
Geo community-based broadcasting for data dissemination in mobile social netw...
DOCX
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
DOCX
Dynamic resource allocation using virtual machines for cloud computing enviro...
DOCX
A secure protocol for spontaneous wireless ad hoc networks creation
DOCX
Utility privacy tradeoff in databases an information-theoretic approach
DOCX
Two tales of privacy in online social networks
Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewords
Reversible watermarking based on invariant image classification and dynamic h...
Reversible data hiding with optimal value transfer
Query adaptive image search with hash codes
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Local directional number pattern for face analysis face and expression recogn...
An access point based fec mechanism for video transmission over wireless la ns
Towards differential query services in cost efficient clouds
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Secure and efficient data transmission for cluster based wireless sensor netw...
Privacy preserving back propagation neural network learning over arbitrarily ...
Non cooperative location privacy
Harnessing the cloud for securely outsourcing large
Geo community-based broadcasting for data dissemination in mobile social netw...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Dynamic resource allocation using virtual machines for cloud computing enviro...
A secure protocol for spontaneous wireless ad hoc networks creation
Utility privacy tradeoff in databases an information-theoretic approach
Two tales of privacy in online social networks

Recently uploaded (20)

PDF
KodekX | Application Modernization Development
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Spectroscopy.pptx food analysis technology
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Empathic Computing: Creating Shared Understanding
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Chapter 3 Spatial Domain Image Processing.pdf
KodekX | Application Modernization Development
sap open course for s4hana steps from ECC to s4
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
20250228 LYD VKU AI Blended-Learning.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Review of recent advances in non-invasive hemoglobin estimation
Spectroscopy.pptx food analysis technology
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Empathic Computing: Creating Shared Understanding
Network Security Unit 5.pdf for BCA BBA.
Understanding_Digital_Forensics_Presentation.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Encapsulation_ Review paper, used for researhc scholars
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
cuic standard and advanced reporting.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
MYSQL Presentation for SQL database connectivity
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Chapter 3 Spatial Domain Image Processing.pdf

Spatial approximate string search

  • 1. Spatial Approximate String Search ABSTRACT This work deals with the approximate string search in large spatial databases. Specifically, we investigate range queries augmented with a string similarity search predicate in both Euclidean space and road networks. We dub this query the spatial approximate string (SAS) query. In Euclidean space, we propose an approximate solution, the MHR-tree, which embeds min-wise signatures into an R-tree. The min-wise signature for an index node u keeps a concise representation of the union of q-grams from strings under the sub-tree of u. We analyze the pruning functionality of such signatures based on the set resemblance between the query string and the q-grams from the sub-trees of index nodes. We also discuss how to estimate the selectivity of a SAS query in Euclidean space, for which we present a novel adaptive algorithm to find balanced partitions using both the spatial and string information stored in the tree. For queries on road networks, we propose a novel exact method, RSASSOL, which significantly outperforms the baseline algorithm in practice. The RSASSOL combines the q-gram based inverted lists and the reference nodes based pruning. Extensive experiments on large real data sets demonstrate the efficiency and effectiveness of our approaches. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
  • 2. Existing System Keyword search over a large amount of data is an important operation in a wide range of domains. Felipe et al. has recently extended its study to spatial databases, where keyword search becomes a fundamental building block for an increasing number of real-world applications, and proposed the IR -Tree. A main limitation of the IR -Tree is that it only supports exact keyword search. Problems on existing system: 1. Exact Keyword Require For Searching the Results. Proposed System For RSAS queries, the baseline spatial solution is based on the Dijkstra’s algorithm. Given a query point q, the query range radius r, and a string predicate, we expand from q on the road network using the Dijkstra algorithm until we reach the points distance r away from q and verify the string predicate either in a post-processing step or on the intermediate results of the expansion. We denote this approach as the Dijkstra solution. Its performance degrades quickly when the query range enlarges and/or the data on the network increases. This motivates us to find a novel method to avoid the unnecessary road network expansions, by combining the prunings from both the spatial and the string predicates simultaneously. We demonstrate the efficiency and effectiveness of our proposed methods for SAS queries using a comprehensive experimental evaluation. For ESAS queries, our experimental evaluation covers both synthetic and real data sets of up to 10 millions points and 6 dimensions. For RSAS queries, our evaluation is based on two large, real road network datasets, that contain up to 175,813 nodes, 179,179 edges, and 2 millions points on the road
  • 3. network. In both cases, our methods have significantly outperformed the respective baseline methods. Advantages: This is very helpful for Exact Result from Non Exact keywords . Main Modules:- 1. User Module: In this module, Users are having authentication and security to access the detail which is presented in the ontology system. Before accessing or searching the details user should have the account in that otherwise they should register first. . 2. key: The key of common Index can be made from the Index word given by the Data owner and File. The secure index and a search scheme to enable fast similarity search in the context of data. In such a context, it is very critical not to sacrifice the confidentiality of the sensitive data while providing functionality. We provided a rigorous security definition and proved the security of the proposed scheme under the provided definition to ensure the confidentiality. 3. Edit Distance Pruning: Computing edit distance exactly is a costly operation. Sev- eral techniques have been proposed for identifying candidate strings within a small edit distance from a query string fast. All of them are based on q-grams and a q-gram counting argument. For a string s, its q-grams are produced by sliding a window
  • 4. of length q over the characters of s. To deal with the special case at the beginning and the end of s, that have fewer than q characters, one may introduce special characters, such as “#” and “$”, which are not in S. This helps conceptually extend s by prefixing it with q - 1 occurrences of “#” and suffixing it with q - 1 occurrences of “$”. Hence, each q-gram for the string s has exactly q characters. 4. Search: we provide a specific application of the proposed similarity searchable encryption scheme to clarify its mechanism.Server performs search on the index for each component and sends back the corresponding encrypted bit vectors it makes by the respective like commend. Finally, we illustrated the performance of the proposed scheme with empirical analysis on a real data. Configuration:- H/W System Configuration:- Processor - Pentium –III Speed - 1.1 Ghz RAM - 256 MB(min) Hard Disk - 20 GB Floppy Drive - 1.44 MB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - SVGA
  • 5. S/W System Configuration:-  Operating System :Windows95/98/2000/XP  Application Server : Tomcat5.0/6.X  Front End : HTML, Java, Jsp  Scripts : JavaScript.  Server side Script : Java Server Pages.  Database : Mysql 5.0 Database Connectivity : JDBC.