SlideShare une entreprise Scribd logo
1  sur  8
A Signature-Based Indexing Method for
Efficient Content-Based Retrieval of Relative
Temporal Patterns

(Synopsis)
Abstract:
Project aims for efficient content based
retrieval process of relative temporal pattern using signature based
indexing method. Rule discovery algorithms in data mining generate a
large number of patterns/rules, sometimes even exceeding the size of
the underlying database, with only a small fraction being of interest to
the user. It is generally understood that interpreting the discovered
patterns/rules to gain insight into the domain is an important phase in
the knowledge discovery process. However, when there are a large
number of generated rules, identifying and analyzing those that are
interesting becomes difficult. We address the problem of efficiently
retrieving subsets of a large collection of previously discovered
temporal patterns. When processing queries on a small database of
temporal patterns, sequential scanning of the patterns followed by
straightforward

computations

of

query

conditions

is

sufficient.

However, as the database grows, this procedure can be too slow, and
indexes should be built to speed up the queries. The problem is to
determine what types of indexes are suitable for improving the speed
of queries involving the content of temporal patterns. We propose a
system with signature-based indexing method to speed up contentbased queries on temporal patterns And It’s used to optimize the
storage and retrieval of a large collection of relative temporal patterns.
The use of signature files improves the performance of temporal
pattern retrieval. This retrieval system is currently being combined
with visualization techniques for monitoring the behavior of a single
pattern or a group of patterns over time.
.
Introduction:
MANY rule discovery algorithms in data mining generate a large
number of patterns/rules, sometimes even exceeding the size of the
underlying database, with only a small fraction being of interest to the
user It is generally understood that interpreting the discovered
patterns/rules to gain insight into the domain is an important phase in
the knowledge discovery process. However, when there are a large
number of generated rules, identifying and analyzing those that are
interesting becomes difficult. For example, providing the user with a
list of association rules ranked by their confidence and support might
not be a good way of organizing the set of rules as this method would
overwhelm the user and not all rules with high confidence and support
are necessarily interesting for a variety of reasons.
Therefore, to be useful, a data mining system must manage
the generated rules by offering flexible tools for rule selection. In the
case of association rule mining, several approaches for the
postprocessing of discovered association rules have been discussed.
One approach is to group “similar” rules which works well for a
moderate number of rules. However, for a larger number of rules it
produces too many clusters. A more flexible approach is to allow the
identification of rules that are of special importance to the user
through templates or data mining queries. This approach can
complement the rule grouping approach and has been used to specify
interesting and uninteresting classes of rules (for both association and
episodic rules).The importance of data mining queries has been
highlighted by the introduction of the inductive database concept,
which allows the user to both query the data and query patterns,
rules, and models extracted from these data.
Existing System
 Mine-Rule DMQL and OLE DB . These languages are
designed to generate the rules from the data rather
than allow queries over the discovered rules.
 Post processing of association rules, an area in which
little research to date has been conducted.

Proposed System:
 Efficiently retrieving subsets of a large collection of
previously discovered temporal patterns.
 Focuses on supporting content-based queries of
temporal patterns, as opposed to point- or range-based
queries.
System Requirements:
Hardware:
PROCESSOR

:

PENTIUM IV 2.6 GHz

RAM

:

512 MB DD RAM

MONITOR

:

15” COLOR

HARD DISK

:

20 GB

FLOPPY DRIVE

:

1.44 MB

CDDRIVE

:

LG 52X

Front End

:

J2EE(JSP)

Back End

:

Software:

Operating System

MS SQL 2000
:

WindowsXP
Data flow diagram

DATA
COLLECTION

CONVERTING
RAW DATA
INTO
SIGNATURE
FILE

QUERY

FILTERING

SIGNATURE FORM

Modules and Description
•

Finding temporal pattern similarity

•

Constructing Signature Files for temporal patterns

•

Answering Content-Based Queries Using the Signature File

Module 1:
In this module we are maintain the temporal pattern which are
variable-length objects that cannot be represented

in a k-dimensional

metric space. Each pattern contains a list of states. Each pattern
contains a set of state relationships.
Module 2:
In this module the (content-based queries), Let D be a temporal
pattern database and q be a query pattern. The four forms of contentbased queries that this research supports include the following:
1. Subpattern queries. Find those patterns in D that contain q.
2. Superpattern queries. Find those patterns in D that are a subpattern
of q.
3. Equality queries. Find those patterns in D equal to q.
4. K-nearest subpattern queries. Find the k most similar patterns in D
to q.
Superpattern queries are useful when searching for the characteristic
parts of a large pattern, while k-nearest subpattern queries limit the
number of patterns generated by subpattern or superpattern queries.
The temporal pattern is converted into equivalent sets.
Module 3:
In this module the signature file is bit representation of query, i.e.
equivalent set is converted into hash function.

Module 3:
In this module the query is converted into equivalent sets and that
set is converted into bit form that is searched in signature files using
BSSF.
A signature based indexing method for efficient content-based retrieval of relative temporal patt(synopsis)

Contenu connexe

Tendances

Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted DataPrivacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted DataCloudTechnologies
 
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
 A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD... A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...Nexgen Technology
 
Context Based Web Indexing For Semantic Web
Context Based Web Indexing For Semantic WebContext Based Web Indexing For Semantic Web
Context Based Web Indexing For Semantic WebIOSR Journals
 
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic SchemeIRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic SchemeIRJET Journal
 
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDSECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDNexgen Technology
 
A secure and dynamic multi keyword ranked
A secure and dynamic multi keyword rankedA secure and dynamic multi keyword ranked
A secure and dynamic multi keyword rankedjpstudcorner
 
Pdd crawler a focused web
Pdd crawler  a focused webPdd crawler  a focused web
Pdd crawler a focused webcsandit
 
Effective Feature Selection for Mining Text Data with Side-Information
Effective Feature Selection for Mining Text Data with Side-InformationEffective Feature Selection for Mining Text Data with Side-Information
Effective Feature Selection for Mining Text Data with Side-InformationIJTET Journal
 
Ginix generalized inverted index for keyword search
Ginix generalized inverted index for keyword searchGinix generalized inverted index for keyword search
Ginix generalized inverted index for keyword searchIEEEFINALYEARPROJECTS
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPapitha Velumani
 
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...sharathdj
 
privacy preserving multi keyword ranked search over encrypted cloud data
privacy preserving multi keyword ranked search over encrypted cloud dataprivacy preserving multi keyword ranked search over encrypted cloud data
privacy preserving multi keyword ranked search over encrypted cloud dataswathi78
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataIGEEKS TECHNOLOGIES
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataIGEEKS TECHNOLOGIES
 
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...CloudTechnologies
 
A survey on Design and Implementation of Clever Crawler Based On DUST Removal
A survey on Design and Implementation of Clever Crawler Based On DUST RemovalA survey on Design and Implementation of Clever Crawler Based On DUST Removal
A survey on Design and Implementation of Clever Crawler Based On DUST RemovalIJSRD
 

Tendances (18)

Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted DataPrivacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
 
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
 A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD... A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
 
Context Based Web Indexing For Semantic Web
Context Based Web Indexing For Semantic WebContext Based Web Indexing For Semantic Web
Context Based Web Indexing For Semantic Web
 
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic SchemeIRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
 
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDSECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
 
A secure and dynamic multi keyword ranked
A secure and dynamic multi keyword rankedA secure and dynamic multi keyword ranked
A secure and dynamic multi keyword ranked
 
Pdd crawler a focused web
Pdd crawler  a focused webPdd crawler  a focused web
Pdd crawler a focused web
 
Effective Feature Selection for Mining Text Data with Side-Information
Effective Feature Selection for Mining Text Data with Side-InformationEffective Feature Selection for Mining Text Data with Side-Information
Effective Feature Selection for Mining Text Data with Side-Information
 
Ginix generalized inverted index for keyword search
Ginix generalized inverted index for keyword searchGinix generalized inverted index for keyword search
Ginix generalized inverted index for keyword search
 
.Net ieee 2017 2018, Java IEEE Projects
.Net ieee 2017 2018, Java IEEE Projects.Net ieee 2017 2018, Java IEEE Projects
.Net ieee 2017 2018, Java IEEE Projects
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
 
privacy preserving multi keyword ranked search over encrypted cloud data
privacy preserving multi keyword ranked search over encrypted cloud dataprivacy preserving multi keyword ranked search over encrypted cloud data
privacy preserving multi keyword ranked search over encrypted cloud data
 
A Comparison between Flooding and Bloom Filter Based Multikeyword Search in P...
A Comparison between Flooding and Bloom Filter Based Multikeyword Search in P...A Comparison between Flooding and Bloom Filter Based Multikeyword Search in P...
A Comparison between Flooding and Bloom Filter Based Multikeyword Search in P...
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
 
A survey on Design and Implementation of Clever Crawler Based On DUST Removal
A survey on Design and Implementation of Clever Crawler Based On DUST RemovalA survey on Design and Implementation of Clever Crawler Based On DUST Removal
A survey on Design and Implementation of Clever Crawler Based On DUST Removal
 

En vedette

Java J2EE project titles, .NET project titles with abstract,Java J2EE projec...
 Java J2EE project titles, .NET project titles with abstract,Java J2EE projec... Java J2EE project titles, .NET project titles with abstract,Java J2EE projec...
Java J2EE project titles, .NET project titles with abstract,Java J2EE projec...Suresh Radhakrishnan
 
Une approche d’indexation et de recherche d’images pulmonaires TDM par le con...
Une approche d’indexation et de recherche d’images pulmonaires TDMpar le con...Une approche d’indexation et de recherche d’images pulmonaires TDMpar le con...
Une approche d’indexation et de recherche d’images pulmonaires TDM par le con...guest0bcdde
 
App indexing at #SMXParis 2015
App indexing at #SMXParis 2015App indexing at #SMXParis 2015
App indexing at #SMXParis 2015Alexandre Jubien
 
Introduction to indexing
Introduction to indexingIntroduction to indexing
Introduction to indexingDaryl Superio
 
5013 Indexing Presentation
5013 Indexing Presentation5013 Indexing Presentation
5013 Indexing Presentationlmartin8
 

En vedette (10)

Java J2EE project titles, .NET project titles with abstract,Java J2EE projec...
 Java J2EE project titles, .NET project titles with abstract,Java J2EE projec... Java J2EE project titles, .NET project titles with abstract,Java J2EE projec...
Java J2EE project titles, .NET project titles with abstract,Java J2EE projec...
 
Signature files
Signature filesSignature files
Signature files
 
Une approche d’indexation et de recherche d’images pulmonaires TDM par le con...
Une approche d’indexation et de recherche d’images pulmonaires TDMpar le con...Une approche d’indexation et de recherche d’images pulmonaires TDMpar le con...
Une approche d’indexation et de recherche d’images pulmonaires TDM par le con...
 
App indexing at #SMXParis 2015
App indexing at #SMXParis 2015App indexing at #SMXParis 2015
App indexing at #SMXParis 2015
 
Ajs 4 a
Ajs 4 aAjs 4 a
Ajs 4 a
 
Introduction to indexing
Introduction to indexingIntroduction to indexing
Introduction to indexing
 
Indexing
IndexingIndexing
Indexing
 
5013 Indexing Presentation
5013 Indexing Presentation5013 Indexing Presentation
5013 Indexing Presentation
 
What is Document Indexing? A tutorial for intelligent data capture.
What is Document Indexing? A tutorial for intelligent data capture.What is Document Indexing? A tutorial for intelligent data capture.
What is Document Indexing? A tutorial for intelligent data capture.
 
Types of indexes
Types of indexesTypes of indexes
Types of indexes
 

Similaire à A signature based indexing method for efficient content-based retrieval of relative temporal patt(synopsis)

A Quantified Approach for large Dataset Compression in Association Mining
A Quantified Approach for large Dataset Compression in Association MiningA Quantified Approach for large Dataset Compression in Association Mining
A Quantified Approach for large Dataset Compression in Association MiningIOSR Journals
 
A Framework for Automated Association Mining Over Multiple Databases
A Framework for Automated Association Mining Over Multiple DatabasesA Framework for Automated Association Mining Over Multiple Databases
A Framework for Automated Association Mining Over Multiple DatabasesGurdal Ertek
 
Hardware enhanced association rule mining
Hardware enhanced association rule miningHardware enhanced association rule mining
Hardware enhanced association rule miningStudsPlanet.com
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) inventionjournals
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Efficient instant fuzzy search with proximity ranking
Efficient instant fuzzy search with proximity rankingEfficient instant fuzzy search with proximity ranking
Efficient instant fuzzy search with proximity rankingShakas Technologies
 
Scalable and adaptive data replica placement for geo distributed cloud storages
Scalable and adaptive data replica placement for geo distributed cloud storagesScalable and adaptive data replica placement for geo distributed cloud storages
Scalable and adaptive data replica placement for geo distributed cloud storagesVenkat Projects
 
A New Data Stream Mining Algorithm for Interestingness-rich Association Rules
A New Data Stream Mining Algorithm for Interestingness-rich Association RulesA New Data Stream Mining Algorithm for Interestingness-rich Association Rules
A New Data Stream Mining Algorithm for Interestingness-rich Association RulesVenu Madhav
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Implementing sorting in database systems
Implementing sorting in database systemsImplementing sorting in database systems
Implementing sorting in database systemsunyil96
 
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...acijjournal
 
Study on potential capabilities of a nodb system
Study on potential capabilities of a nodb systemStudy on potential capabilities of a nodb system
Study on potential capabilities of a nodb systemijitjournal
 
INTELLIGENT INFORMATION RETRIEVAL WITHIN DIGITAL LIBRARY USING DOMAIN ONTOLOGY
INTELLIGENT INFORMATION RETRIEVAL WITHIN DIGITAL LIBRARY USING DOMAIN ONTOLOGYINTELLIGENT INFORMATION RETRIEVAL WITHIN DIGITAL LIBRARY USING DOMAIN ONTOLOGY
INTELLIGENT INFORMATION RETRIEVAL WITHIN DIGITAL LIBRARY USING DOMAIN ONTOLOGYcscpconf
 
A cyber physical stream algorithm for intelligent software defined storage
A cyber physical stream algorithm for intelligent software defined storageA cyber physical stream algorithm for intelligent software defined storage
A cyber physical stream algorithm for intelligent software defined storageMade Artha
 
2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )
2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )
2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )SBGC
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Efficient Parallel Pruning of Associative Rules with Optimized Search
Efficient Parallel Pruning of Associative Rules with Optimized  SearchEfficient Parallel Pruning of Associative Rules with Optimized  Search
Efficient Parallel Pruning of Associative Rules with Optimized SearchIOSR Journals
 

Similaire à A signature based indexing method for efficient content-based retrieval of relative temporal patt(synopsis) (20)

A Quantified Approach for large Dataset Compression in Association Mining
A Quantified Approach for large Dataset Compression in Association MiningA Quantified Approach for large Dataset Compression in Association Mining
A Quantified Approach for large Dataset Compression in Association Mining
 
A Framework for Automated Association Mining Over Multiple Databases
A Framework for Automated Association Mining Over Multiple DatabasesA Framework for Automated Association Mining Over Multiple Databases
A Framework for Automated Association Mining Over Multiple Databases
 
Hardware enhanced association rule mining
Hardware enhanced association rule miningHardware enhanced association rule mining
Hardware enhanced association rule mining
 
P2P Cache Resolution System for MANET
P2P Cache Resolution System for MANETP2P Cache Resolution System for MANET
P2P Cache Resolution System for MANET
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Efficient instant fuzzy search with proximity ranking
Efficient instant fuzzy search with proximity rankingEfficient instant fuzzy search with proximity ranking
Efficient instant fuzzy search with proximity ranking
 
Scalable and adaptive data replica placement for geo distributed cloud storages
Scalable and adaptive data replica placement for geo distributed cloud storagesScalable and adaptive data replica placement for geo distributed cloud storages
Scalable and adaptive data replica placement for geo distributed cloud storages
 
Final proj 2 (1)
Final proj 2 (1)Final proj 2 (1)
Final proj 2 (1)
 
A New Data Stream Mining Algorithm for Interestingness-rich Association Rules
A New Data Stream Mining Algorithm for Interestingness-rich Association RulesA New Data Stream Mining Algorithm for Interestingness-rich Association Rules
A New Data Stream Mining Algorithm for Interestingness-rich Association Rules
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Implementing sorting in database systems
Implementing sorting in database systemsImplementing sorting in database systems
Implementing sorting in database systems
 
D0352630
D0352630D0352630
D0352630
 
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
 
Study on potential capabilities of a nodb system
Study on potential capabilities of a nodb systemStudy on potential capabilities of a nodb system
Study on potential capabilities of a nodb system
 
INTELLIGENT INFORMATION RETRIEVAL WITHIN DIGITAL LIBRARY USING DOMAIN ONTOLOGY
INTELLIGENT INFORMATION RETRIEVAL WITHIN DIGITAL LIBRARY USING DOMAIN ONTOLOGYINTELLIGENT INFORMATION RETRIEVAL WITHIN DIGITAL LIBRARY USING DOMAIN ONTOLOGY
INTELLIGENT INFORMATION RETRIEVAL WITHIN DIGITAL LIBRARY USING DOMAIN ONTOLOGY
 
A cyber physical stream algorithm for intelligent software defined storage
A cyber physical stream algorithm for intelligent software defined storageA cyber physical stream algorithm for intelligent software defined storage
A cyber physical stream algorithm for intelligent software defined storage
 
2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )
2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )
2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Efficient Parallel Pruning of Associative Rules with Optimized Search
Efficient Parallel Pruning of Associative Rules with Optimized  SearchEfficient Parallel Pruning of Associative Rules with Optimized  Search
Efficient Parallel Pruning of Associative Rules with Optimized Search
 

Plus de Mumbai Academisc

Plus de Mumbai Academisc (20)

Non ieee java projects list
Non  ieee java projects list Non  ieee java projects list
Non ieee java projects list
 
Non ieee dot net projects list
Non  ieee dot net projects list Non  ieee dot net projects list
Non ieee dot net projects list
 
Ieee java projects list
Ieee java projects list Ieee java projects list
Ieee java projects list
 
Ieee 2014 java projects list
Ieee 2014 java projects list Ieee 2014 java projects list
Ieee 2014 java projects list
 
Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Ieee 2014 dot net projects list
Ieee 2014 dot net projects list
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list
 
Ieee 2013 dot net projects list
Ieee 2013 dot net projects listIeee 2013 dot net projects list
Ieee 2013 dot net projects list
 
Ieee 2012 dot net projects list
Ieee 2012 dot net projects listIeee 2012 dot net projects list
Ieee 2012 dot net projects list
 
Spring ppt
Spring pptSpring ppt
Spring ppt
 
Ejb notes
Ejb notesEjb notes
Ejb notes
 
Java web programming
Java web programmingJava web programming
Java web programming
 
Java programming-examples
Java programming-examplesJava programming-examples
Java programming-examples
 
Hibernate tutorial
Hibernate tutorialHibernate tutorial
Hibernate tutorial
 
J2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai AcademicsJ2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai Academics
 
Web based development
Web based developmentWeb based development
Web based development
 
Jdbc
JdbcJdbc
Jdbc
 
Java tutorial part 4
Java tutorial part 4Java tutorial part 4
Java tutorial part 4
 
Java tutorial part 3
Java tutorial part 3Java tutorial part 3
Java tutorial part 3
 
Java tutorial part 2
Java tutorial part 2Java tutorial part 2
Java tutorial part 2
 
Engineering
EngineeringEngineering
Engineering
 

Dernier

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 

Dernier (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 

A signature based indexing method for efficient content-based retrieval of relative temporal patt(synopsis)

  • 1. A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative Temporal Patterns (Synopsis)
  • 2. Abstract: Project aims for efficient content based retrieval process of relative temporal pattern using signature based indexing method. Rule discovery algorithms in data mining generate a large number of patterns/rules, sometimes even exceeding the size of the underlying database, with only a small fraction being of interest to the user. It is generally understood that interpreting the discovered patterns/rules to gain insight into the domain is an important phase in the knowledge discovery process. However, when there are a large number of generated rules, identifying and analyzing those that are interesting becomes difficult. We address the problem of efficiently retrieving subsets of a large collection of previously discovered temporal patterns. When processing queries on a small database of temporal patterns, sequential scanning of the patterns followed by straightforward computations of query conditions is sufficient. However, as the database grows, this procedure can be too slow, and indexes should be built to speed up the queries. The problem is to determine what types of indexes are suitable for improving the speed of queries involving the content of temporal patterns. We propose a system with signature-based indexing method to speed up contentbased queries on temporal patterns And It’s used to optimize the storage and retrieval of a large collection of relative temporal patterns. The use of signature files improves the performance of temporal pattern retrieval. This retrieval system is currently being combined with visualization techniques for monitoring the behavior of a single pattern or a group of patterns over time. .
  • 3. Introduction: MANY rule discovery algorithms in data mining generate a large number of patterns/rules, sometimes even exceeding the size of the underlying database, with only a small fraction being of interest to the user It is generally understood that interpreting the discovered patterns/rules to gain insight into the domain is an important phase in the knowledge discovery process. However, when there are a large number of generated rules, identifying and analyzing those that are interesting becomes difficult. For example, providing the user with a list of association rules ranked by their confidence and support might not be a good way of organizing the set of rules as this method would overwhelm the user and not all rules with high confidence and support are necessarily interesting for a variety of reasons. Therefore, to be useful, a data mining system must manage the generated rules by offering flexible tools for rule selection. In the case of association rule mining, several approaches for the postprocessing of discovered association rules have been discussed. One approach is to group “similar” rules which works well for a moderate number of rules. However, for a larger number of rules it produces too many clusters. A more flexible approach is to allow the identification of rules that are of special importance to the user through templates or data mining queries. This approach can complement the rule grouping approach and has been used to specify interesting and uninteresting classes of rules (for both association and episodic rules).The importance of data mining queries has been highlighted by the introduction of the inductive database concept, which allows the user to both query the data and query patterns, rules, and models extracted from these data.
  • 4. Existing System  Mine-Rule DMQL and OLE DB . These languages are designed to generate the rules from the data rather than allow queries over the discovered rules.  Post processing of association rules, an area in which little research to date has been conducted. Proposed System:  Efficiently retrieving subsets of a large collection of previously discovered temporal patterns.  Focuses on supporting content-based queries of temporal patterns, as opposed to point- or range-based queries.
  • 5. System Requirements: Hardware: PROCESSOR : PENTIUM IV 2.6 GHz RAM : 512 MB DD RAM MONITOR : 15” COLOR HARD DISK : 20 GB FLOPPY DRIVE : 1.44 MB CDDRIVE : LG 52X Front End : J2EE(JSP) Back End : Software: Operating System MS SQL 2000 : WindowsXP
  • 6. Data flow diagram DATA COLLECTION CONVERTING RAW DATA INTO SIGNATURE FILE QUERY FILTERING SIGNATURE FORM Modules and Description • Finding temporal pattern similarity • Constructing Signature Files for temporal patterns • Answering Content-Based Queries Using the Signature File Module 1: In this module we are maintain the temporal pattern which are variable-length objects that cannot be represented in a k-dimensional metric space. Each pattern contains a list of states. Each pattern contains a set of state relationships. Module 2: In this module the (content-based queries), Let D be a temporal pattern database and q be a query pattern. The four forms of contentbased queries that this research supports include the following: 1. Subpattern queries. Find those patterns in D that contain q.
  • 7. 2. Superpattern queries. Find those patterns in D that are a subpattern of q. 3. Equality queries. Find those patterns in D equal to q. 4. K-nearest subpattern queries. Find the k most similar patterns in D to q. Superpattern queries are useful when searching for the characteristic parts of a large pattern, while k-nearest subpattern queries limit the number of patterns generated by subpattern or superpattern queries. The temporal pattern is converted into equivalent sets. Module 3: In this module the signature file is bit representation of query, i.e. equivalent set is converted into hash function. Module 3: In this module the query is converted into equivalent sets and that set is converted into bit form that is searched in signature files using BSSF.