• Title/Summary/Keyword: attribute-based search

Search Result 68, Processing Time 0.022 seconds

Efficient Similarity Search in Multi-attribute Time Series Databases (다중속성 시계열 데이타베이스의 효율적인 유사 검색)

  • Lee, Sang-Jun
    • The KIPS Transactions:PartD
    • /
    • v.14D no.7
    • /
    • pp.727-732
    • /
    • 2007
  • Most of previous work on indexing and searching time series focused on the similarity matching and retrieval of one-attribute time series. However, multimedia databases such as music, video need to handle the similarity search in multi-attribute time series. The limitation of the current similarity models for multi-attribute sequences is that there is no consideration for attributes' sequences. The multi-attribute sequences are composed of several attributes' sequences. Since the users may want to find the similar patterns considering attributes's sequences, it is more appropriate to consider the similarity between two multi-attribute sequences in the viewpoint of attributes' sequences. In this paper, we propose the similarity search method based on attributes's sequences in multi-attribute time series databases. The proposed method can efficiently reduce the search space and guarantees no false dismissals. In addition, we give preliminary experimental results to show the effectiveness of the proposed method.

A Study on Increasing the Efficiency of Image Search Using Image Attribute in the area of content-Based Image Retrieval (내용기반 이미지 검색에 있어 이미지 속성정보를 활용한 검색 효율성 향상)

  • Mo, Yeong-Il;Lee, Cheol-Gyu
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.2
    • /
    • pp.39-48
    • /
    • 2009
  • This study reviews the limit of image search by considering on the image search methods related to content-based image retrieval and suggests a user interface for more efficient content-based image retrieval and the ways to utilize image properties. For now, most studies on image search are being performed focusing on content-based image retrieval; they try to search based on the image's colors, texture, shapes, and the overall form of the image. However, the results are not satisfactory because there are various technological limits. Accordingly, this study suggests a new retrieval system which adapts content-based image retrieval and the conventional keyword search method. This is about a way to attribute properties to images using texts and a fast way to search images by expressing the attribute of images as keywords and utilizing them to search images. Also, the study focuses on a simulation for a user interface to make query language on the Internet and a search for clothes in an online shopping mall as an application of the retrieval system based on image attribute. This study will contribute to adding a new purchase pattern in online shopping malls and to the development of the area of similar image search.

Secure and Efficient Conjunctive Keyword Search Scheme without Secure Channel

  • Wang, Jianhua;Zhao, Zhiyuan;Sun, Lei;Zhu, Zhiqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2718-2731
    • /
    • 2019
  • Conjunctive keyword search encryption is an important technique for protecting sensitive data that is outsourced to cloud servers. However, the process of searching outsourced data may facilitate the leakage of sensitive data. Thus, an efficient data search approach with high security is critical. To solve this problem, an efficient conjunctive keyword search scheme based on ciphertext-policy attribute-based encryption is proposed for cloud storage environment. This paper proposes an efficient mechanism for removing the secure channel and resisting off-line keyword-guessing attacks. The storage overhead and the computational complexity are regardless of the number of keywords. This scheme is proved adaptively secure based on the decisional bilinear Diffie-Hellman assumption in the standard model. Finally, the results of theoretical analysis and experimental simulation show that the proposed scheme has advantages in security, storage overhead and efficiency, and it is more suitable for practical applications.

KUGI: A Database and Search System for Korean Unigene and Pathway Information

  • Yang, Jin-Ok;Hahn, Yoon-Soo;Kim, Nam-Soon;Yu, Ung-Sik;Woo, Hyun-Goo;Chu, In-Sun;Kim, Yong-Sung;Yoo, Hyang-Sook;Kim, Sang-Soo
    • Proceedings of the Korean Society for Bioinformatics Conference
    • /
    • 2005.09a
    • /
    • pp.407-411
    • /
    • 2005
  • KUGI (Korean UniGene Information) database contains the annotation information of the cDNA sequences obtained from the disease samples prevalent in Korean. A total of about 157,000 5'-EST high throughput sequences collected from cDNA libraries of stomach, liver, and some cancer tissues or established cell lines from Korean patients were clustered to about 35,000 contigs. From each cluster a representative clone having the longest high quality sequence or the start codon was selected. We stored the sequences of the representative clones and the clustered contigs in the KUGI database together with their information analyzed by running Blast against RefSeq, human mRNA, and UniGene databases from NCBI. We provide a web-based search engine fur the KUGI database using two types of user interfaces: attribute-based search and similarity search of the sequences. For attribute-based search, we use DBMS technology while we use BLAST that supports various similarity search options. The search system allows not only multiple queries, but also various query types. The results are as follows: 1) information of clones and libraries, 2) accession keys, location on genome, gene ontology, and pathways to public databases, 3) links to external programs, and 4) sequence information of contig and 5'-end of clones. We believe that the KUGI database and search system may provide very useful information that can be used in the study for elucidating the causes of the disease that are prevalent in Korean.

  • PDF

A Study on the Preference Analysis of Stmartphone's Functional Attribute (스마트폰의 기능적 속성의 선호도 분석에 관한 연구)

  • Jeong, Sun-Seok
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2011.11a
    • /
    • pp.695-716
    • /
    • 2011
  • In the future, smartphone convergences are not only based on the on/offline integration, but also with the integration between mobile communications and broadcasts. Therefore, there is a need to search for new direction of mobile device that enables variety user applications that are different from the existing size and application issue. The aim of this reserch is to improve user interface of smartphone's functional attribute. The survey results in this paper showed that the most preferable attribute of smartphone among the 8 was the wireless internet 25.3%, followed by messaging 20% and application 19.8%, which totaled to 62.5%. But the samples used were mostly limited to those aged 20 through 30. So the results are not considered as a representative preference of all smartphone users, and should be considered otherwise before materializing them to a product. Therefore, for the more liable results the further research should be conducted to gather data from a variety of users of all ages, and the functional attribute should be analysed through QFD.

  • PDF

An Attribute Replicating Vertical File Partition Method by Genetic Algorithm (유전알고리듬을 이용한 속성의 중복 허용 파일 수직분할 방법)

  • 김재련;유종찬
    • The Journal of Information Technology and Database
    • /
    • v.6 no.2
    • /
    • pp.71-86
    • /
    • 1999
  • The performance of relational database is measured by the number of disk accesses necessary to transfer data from disk to main memory. The paper proposes to vertically partition relations into fragments and to allow attribute replication to reduce the number of disk accesses. To reduce the computational time, heuristic search method using genetic algorithm is used. Genetic algorithm used employs a rank-based-sharing fitness function and elitism. Desirable parameters of genetic algorithm are obtained through experiments and used to find the solutions. Solutions of attribute replication and attribute non-replication problems are compared. Optimal solutions obtained by branch and bound method and by heuristic solutions(genetic algorithm) are also discussed. The solution method proposed is able to solve large-sized problems within acceptable time limit and shows solutions near the optimal value.

  • PDF

Design and Implementation of a XML Document Retrieval System Using the BRS/Search System (BRS/Search 시스템을 이용한 XML 문서 검색시스템 설계 및 구현)

  • 손충범;이병엽;유재수
    • Journal of Internet Computing and Services
    • /
    • v.2 no.2
    • /
    • pp.51-63
    • /
    • 2001
  • In this paper, we design and implement a XML document retrieval system to support structure-based retrieval using the BRS/Search system that is a commercial search engine, The implemented system in this paper represents the logical structure of XML documents as the directory structure of the Unix file system. In addition, we define the database schema of BRS/Search system to store documents, We also implement a ETID extractor, a structure information extractor, a storage manager and a query processor additionally to support content retrieval, structure retrieval, mixed retrieval and attribute retrieval in the BRS/Search system.

  • PDF

A Study on the Analysis of Stmartphone's Functional Attribute (스마트폰의 기능적 속성의 분석에 관한 연구)

  • Chung, Soon-Suk;Kim, Kwang-Soo
    • Journal of the Korea Safety Management & Science
    • /
    • v.14 no.3
    • /
    • pp.283-289
    • /
    • 2012
  • In the future, smartphone convergences are not only based on the on/offline integration, but also with the integration between mobile communications and broadcasts. Therefore, there is a need to search for new direction of mobile device that enables variety user applications that are different from the existing size and application issue. The aim of this research is to improve user interface of smartphone's functional attribute. We study on the analysis of smartphone's functional attribute by AHP. The survey results in this paper showed that the most preferable attribute of smartphone among the 8 was the wireless internet 25.3%, followed by messaging 20% and application 19.8%, which totaled to 62.5%. But the samples used were mostly limited to those aged 20 through 30. So the results are not considered as a representative preference of all smartphone users, and should be considered otherwise before materializing them to a product. Therefore, for the more liable results the further research should be conducted to gather data from a variety of users of all ages, and the functional attribute should be analysed through QFD.

Design of a Real Estate Knowledge Information System Based on Semantic Search (시맨틱 검색 기반의 부동산 지식 정보시스템 설계)

  • Cho, Jae-Hyung;Kang, Moo-Hong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.2
    • /
    • pp.111-124
    • /
    • 2011
  • The apartment' share of the housing has steadily increased and property assets have been valued in importance as the one of asset value. Information retrieval system using internet is particularly active in the real estate market. However, user satisfaction on real estate information system is not very high, and there is a lack of research on real estate retrieval to increasing efficiency until now. This study presents a new knowledge information system developed to consider region-related factor and individual-related factor in the real estate market. In addition it enables a real estate knowledge system to search various preferential requirements for buyers such as school district, living convenience, easy maintenance as well as price. We made a survey of the search condition preference of experts on 30 real estate agents and then analyzed the result using AHP methodology. Furthermore, this research is to build apartment ontology using semantic web technologies to standardize various terminologies of apartment information and to show how it can be used to help buyers find apartments of the interest. After designing architecture of a real estate knowledge information system, this system is applied to the Busan real estate market to estimate the solutions of retrieval through Multi-Attribute Decision Making(MADM). Based on the results of the analysis, we endowed the buyer and expert's selected factors with weights in the system. Evaluation results indicate that this new system is to raise not only the value satisfaction of user, but also make it possible to effectively search and analyze the real estate through entropy analysis of MADM. This new system is to raise not only the value satisfaction of buyer's real estate, but also make it possible to effectively search and analyze the related real estate, consequently saving the searching cost of the buyers.

Fuzzy Keyword Search Method over Ciphertexts supporting Access Control

  • Mei, Zhuolin;Wu, Bin;Tian, Shengli;Ruan, Yonghui;Cui, Zongmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5671-5693
    • /
    • 2017
  • With the rapid development of cloud computing, more and more data owners are motivated to outsource their data to cloud for various benefits. Due to serious privacy concerns, sensitive data should be encrypted before being outsourced to the cloud. However, this results that effective data utilization becomes a very challenging task, such as keyword search over ciphertexts. Although many searchable encryption methods have been proposed, they only support exact keyword search. Thus, misspelled keywords in the query will result in wrong or no matching. Very recently, a few methods extends the search capability to fuzzy keyword search. Some of them may result in inaccurate search results. The other methods need very large indexes which inevitably lead to low search efficiency. Additionally, the above fuzzy keyword search methods do not support access control. In our paper, we propose a searchable encryption method which achieves fuzzy search and access control through algorithm design and Ciphertext-Policy Attribute-based Encryption (CP-ABE). In our method, the index is small and the search results are accurate. We present word pattern which can be used to balance the search efficiency and privacy. Finally, we conduct extensive experiments and analyze the security of the proposed method.