Detection of Heterogeneities in a Multiple Text Database Environment
نویسندگان
چکیده
As the number of text retrieval systems (search engines) grows rapidly on the World Wide Web, there is an increasing need to build search brokers (metasearch engines) on top of them. Often, the task of building an eeective and eecient metasearch engine is hindered by the heterogeneities among the underlying local search engines. In this paper, we rst analyze the impact of various heterogeneities on building a metasearch engine. We then present some techniques that can be used to detect the most prominent hetero-geneities among multiple search engines. Applications of utilizing the detected heterogeneities in building better metasearch engines will be provided.
منابع مشابه
A Unified Framework for Delineation of Ambulatory Holter ECG Events via Analysis of a Multiple-Order Derivative Wavelet-Based Measure
In this study, a new long-duration holter electrocardiogram (ECG) major events detection-delineation algorithm is described which operates based on the false-alarm error bounded segmentation of a decision statistic with simple mathematical origin. To meet this end, first three-lead holter data is pre-processed by implementation of an appropriate bandpass finite-duration impulse response (FIR) f...
متن کاملFace Detection at the Low Light Environments
Today, with the advancement of technology, the use of tools for extracting information from video are much wider in terms of both visual power and the processing power. High-speed car, perfect detection accuracy, business diversity in the fields of medical, home appliances, smart cars, humanoid robots, military systems and the commercialization makes these systems cost effective. Among the most...
متن کاملOverview of Intrusion Detection Techniques in Database
Data is one of the most valuable assets in today's world and is used in the everyday life of every person and organization. This data stores in a database in order to restore and maintain its efficiently. Since there is a database that can be exploited by SQL injection attacks, internal threats, and unknown threats, there are always concerns about the loss or alteration of data by unauthorized ...
متن کاملA hybrid approach for database intrusion detection at transaction and inter-transaction levels
Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. Therefore, the existence of Intrusion Detection Systems in databases is necessary. In this paper, we propose an intrusion detection system for detecting attacks...
متن کاملSyntactic Complexity of Russian Unified State Exam Texts in English: A Study on Reliability and Validity
In this study we analyze texts used in Russian Unified State Exam on English language. Texts that formed small research corpora were retrieved from 2 resources: official USE database as a reference point, and popular website used by pupils for USE training “Neznaika” (https://neznaika.pro/). The size of two corpora is balanced: USE has 11934 tokens and “Neznaika” - 11918 tokens. We share Biber’...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999