SlideShare a Scribd company logo
Short Paper
                                                             ACEEE Int. J. on Information Technology, Vol. 3, No. 1, March 2013



An Efficient Search Engine for Searching Desired File
                   Umesh Chandra Jaiswal1, Rohit Kamal Saxena2, and Kamlendra Pratap Singh3
                               1
                               Madan Mohan Malaviya Engineering College, Gorakhpur, India
                                             2
                                               Cisco Systems, Bangalore, India
                                        3
                                          Bharat Electronics Limited, Gaziabad, India
                 Email:1 ucj_jaiswal@yahoo.com, 2 rohit_kamal2003@yahoo.com,3 22kamlendra@gmail.com


Abstract—With ever increasing data in form of e-files, there                      TABLE I. COMPARATIVE ASYMPTOTICTIME ANALYSIS
always has been a need of a good application to search for
information in those files efficiently. This paper extends the
implementation of our previous algorithm in the form of a
windows application. The algorithm has the search time-
complexity of Θ(n) with no pre-processing time and thus is
very efficient in searching sentences in a pool of files.

Index Terms—Text search, sentence searching, searching in
files application

                       I. INTRODUCTION
    In this 21st century, everything is getting documented
day by day. We are piling up lots and lots of files that give
rise to a need of good text searching applications. We have
very few efficient applications that can search within files.
The description of the application presented uses ‘A Fast                                      III. ALGORITHM
Sentence Searching Algorithm’ for searching text/sentences                  The algorithm used in the application for searching some
in the files [8]. The main focus of the application is to search       sentence/search:
any sentence in the given pool of files in various folders or          1. While(!EndOfFile)
drives so that desired file can be searched on the basis of            2. Do read a single character from file, x
given information in the form of a sentence or a small                 3. pos       pos+1
paragraph. There exists various text searching algorithms like         4. If sentence[i]=x then
KMP, Boyre-Moore which can be efficient in case of patterns            5. i     i+1
but while searching for sentences the performance of our               6. Else
algorithm is better than the rest of the algorithms, so it has         7. i      0
been chosen for the application [1], [2], [3] and [4].                 8. If sentence[i]=x then
                                                                       9. i     i+1
                      II. RELATED WORK                                 10. If i = LengthOfSentence then
     Amongst the several text-searching algorithms designed            11. c      c+1
until now, the simplest one is the Naive or Brute-Force                12. i       0
Algorithm. Rabin-Karp is another searching technique that              13. Return c
makes use of elementary number-theoretic notations such as                  The above algorithm returns ‘c’, i.e. the number of times
equivalence of two numbers modulo a third number. Other                the sentence to be searched occurs in a single file. It can
algorithm is the Knuth-Morris—Pratt algorithm that is a linear         scan more than one file; one by one and thus help in
time string-matching algorithm [5]. This algorithm uses a prefix       distinguishing between the set of files that contain a sentence
function π that encapsulates knowledge about how the pattern           or paragraph and the ones that do not contain it.
matches against shifts or itself. Now the most commonly                     The above algorithm works by scanning the file character
used text-searching algorithm is the Boyre-Moore Algorithm             by character and comparing each character of the file with
that takes a sub-linear searching time [6]. It uses two functions      the ones in the sentence to we wish to search. We may see
i.e. a bad character and a good prefix functions require certain       the algorithm in two phases as described in the following
preprocessing. Let m be the length of the sentence and let n           lines.
be the length of the search space (file). The Table-I gives the             (a) Initially, we compare the first character of the file is
comparison of the asymptotic time analysis of various text             with the first character of the sentence to be searched. If
searching algorithms. A very little work has been performed            there is a match, we increment i else we set the pointer again
in this area. There is no general purpose system available till        to 0 and check for the first character of the sentence.
today that provides the facility of searching desired file on               (b) We now check the value of ‘i’ if it is equal to length of
the basis of information available [7], and [8].                       the sentence or not. Value of ‘i’ will be equal to the length of
© 2013 ACEEE                                                      58
DOI: 01.IJIT.3.1.1028
Short Paper
                                                                ACEEE Int. J. on Information Technology, Vol. 3, No. 1, March 2013


sentence only in a condition if the sentence is found thus we
increment the value of ‘c’.

                   IV. THEORETICAL ANALYSIS
     Considering the illustrated algorithm, we can see that the
complete complexity of searching a sentence in a file is equal
to Θ(n) without having any pre-processing time where n is
the number of characters in the file.
     Lines 1-12 show that this particular loop continues until
the end of file i.e. iterates ‘n’ (no. of characters in file) times.
Line 2 reads a single character at a time thus having O(1)
complexity. Similarly, line 3 also executes once in a loop. Lines
4-9 check whether the character read from file is present in
the sentence or not and accordingly, the respective lines
execute. In case we find a mismatch, we check it for the first
character of the sentence we are searching. Lines 10-12 check
if the sentence is found in the file and accordingly increment
the counter of the number of sentences by 1. Finally, line 13
returns the number of times the sentence is present in the
file. This clearly shows that there is a single loop iterating ‘n’
times. Thus, the complexity of the algorithm is Θ(n), under all
circumstances as the loop continues till the last character of
the file whether or not the sentence is present in the file [5],
[6], [7], and [8].

                         V. IMPLEMENTATION
     The algorithm has been implemented in C#.NET using
Visual Studio as IDE. There is an option of a single file or a
complete folder that allows you to quickly search inside the
files on the drive or network. It can easily retrieve the
documents that contain the multiple sentences and phrases
that one is interested in. Figure 1 shows the snapshot of the
application’s working. The list of files containing the sentence                             Fig. 1. Application Screenshot
will be displayed that can redirect to the file on clicking it.
The search can be performed on PDF, DOC, TXT, HTML and
                                                                                          CONCLUSION AND FUTURE SCOPE
PPT files. Some of the extra features that have been included
in our application are                                                          With increased use of computer for documenting almost
      Normal Searching:                                                     everything, we need such applications that can help searching
     Normal Searching allows the use of the question mark (?)               in those documents. This application can be very useful as
and asterisk (*) to match one and one or more characters                    there are very few applications that solve this purpose.
respectively. All white space is treated the same and multiple              Secondly, since it uses efficient algorithm for searching, the
white space characters are treated as one.                                  results are computed at a very faster rate and thus saving a
     Search a drive, path or multiple drives and paths:                     lot of useful time.
     Such as C: | Corp-backupCAccounting                                    There will be a revolutionary change in the working of
     Exclude specific folders or paths:                                     various offices of different organization. This will provide a
     C: | -Windows | -Program Files                                        user friendly way to search desired file or files on little
     This option would exclude the folders Windows and                      information available from various media. Sometimes people
Program Files and all their subfolders                                      are not able to find the desired files as the number of files
     Restrict to specific file types and patterns:                          becomes very large and spread in various folders. A natural
     *.doc | *.rtf                                                          language interface to the system may be developed so that it
     This would check only files with names ending in doc or                will be more users friendly in the offices of various
rtf.                                                                        organizations. We have a plan to integrate the developed
     Exclude specific extensions:                                           search engine with English language. Later on this search
     -*.bak | -*.tmp | -~*                                                  engine may be extended for Hindi language files along with
This option would search for all files except those that have               Hindi language interface.
the extension bak,tmp or that start with the tilde character.
© 2013 ACEEE                                                           59
DOI: 01.IJIT.3.1. 1028
Short Paper
                                                            ACEEE Int. J. on Information Technology, Vol. 3, No. 1, March 2013


                         REFERENCES                                         11, 2011 in Bangalore,India
                                                                        [4] Karp, Richard M.; Rabin, Michael O. (March 1987). Efficient
[1] Cormen, T.H., Leiserson, C.E., Rivest, R. L., Stein, C. In:             randomized pattern-matching algorithms.
    Introduction to Algorithms, Second Edition. MIT Press and           [5] Knuth, D.E., Morris, J.H., Pratt, V.R.: Fast pattern matching
    McGraw-Hill, 2001. ISBN 0-262-03293-7. Chapter 32: String               strings. TR CS-74-440, Stanford University, Stanford
    Matching, pp.906–932.                                                   California (1974).
[2] Cole. R. “Tight Bounds on the complexity of the Boyer-Moore         [6] Boyer, R. S., Moore J. S.: A Fast String Searching Algorithm.
    Algorithm”. In: Proceedings of the 2nd Annual ACM-SIAM                  In: Carom. ACM 20, (10), 262–272(1977)
    Symposium on Discrete Algorithms.                                   [7] Daniel M. Sunday. 1990. A very fast substring search algorithm.
[3] Rohit Kamal Saxena, U C Jaiswal, and Kamlendra PratapSingh,             Commun. ACM 33, 8 (August 1990), 132-142. DOI=10.1145/
    “A Fast sentence Searching Algorithm”. In proceedings of the            79173.79184
    CNC-2011 ( Second international Conference on Advances in           [8] Algorithms by Robert Sedgewick Addison-Wesley Publication
    Communication, Network, and Computing. The proceeding                   Company. ISBN O-201 -06672-6. Chapter 19: String
    is on digital media. The conference is held during March 10-            Searching, pp 241-256.




© 2013 ACEEE                                                       60
DOI: 01.IJIT.3.1.1028

More Related Content

What's hot (20)

Ir 09
Ir   09Ir   09
Ir 09
Mohammed Romi
 
Ir 08
Ir   08Ir   08
Ir 08
Mohammed Romi
 
Finding Similar Files in Large Document Repositories
Finding Similar Files in Large Document RepositoriesFinding Similar Files in Large Document Repositories
Finding Similar Files in Large Document Repositories
feiwin
 
A Comparative Result Analysis of Text Based Steganographic Approaches
A Comparative Result Analysis of Text Based Steganographic Approaches A Comparative Result Analysis of Text Based Steganographic Approaches
A Comparative Result Analysis of Text Based Steganographic Approaches
iosrjce
 
Msr2012 chen
Msr2012 chenMsr2012 chen
Msr2012 chen
SAIL_QU
 
Scalable Discovery Of Hidden Emails From Large Folders
Scalable Discovery Of Hidden Emails From Large FoldersScalable Discovery Of Hidden Emails From Large Folders
Scalable Discovery Of Hidden Emails From Large Folders
feiwin
 
[IJET V2I3P7] Authors: Muthe Sandhya, Shitole Sarika, Sinha Anukriti, Aghav S...
[IJET V2I3P7] Authors: Muthe Sandhya, Shitole Sarika, Sinha Anukriti, Aghav S...[IJET V2I3P7] Authors: Muthe Sandhya, Shitole Sarika, Sinha Anukriti, Aghav S...
[IJET V2I3P7] Authors: Muthe Sandhya, Shitole Sarika, Sinha Anukriti, Aghav S...
IJET - International Journal of Engineering and Techniques
 
Genomic repeats detection using Boyer-Moore algorithm on Apache Spark Streaming
Genomic repeats detection using Boyer-Moore algorithm on Apache Spark Streaming Genomic repeats detection using Boyer-Moore algorithm on Apache Spark Streaming
Genomic repeats detection using Boyer-Moore algorithm on Apache Spark Streaming
TELKOMNIKA JOURNAL
 
Topic Extraction on Domain Ontology
Topic Extraction on Domain OntologyTopic Extraction on Domain Ontology
Topic Extraction on Domain Ontology
Keerti Bhogaraju
 
D017422528
D017422528D017422528
D017422528
IOSR Journals
 
Conceptual foundations of text mining and preprocessing steps nfaoui el_habib
Conceptual foundations of text mining and preprocessing steps nfaoui el_habibConceptual foundations of text mining and preprocessing steps nfaoui el_habib
Conceptual foundations of text mining and preprocessing steps nfaoui el_habib
El Habib NFAOUI
 
A Document Exploring System on LDA Topic Model for Wikipedia Articles
A Document Exploring System on LDA Topic Model for Wikipedia ArticlesA Document Exploring System on LDA Topic Model for Wikipedia Articles
A Document Exploring System on LDA Topic Model for Wikipedia Articles
ijma
 
Bnt403 web technologies
Bnt403   web technologiesBnt403   web technologies
Bnt403 web technologies
smumbahelp
 
USING TF-ISF WITH LOCAL CONTEXT TO GENERATE AN OWL DOCUMENT REPRESENTATION FO...
USING TF-ISF WITH LOCAL CONTEXT TO GENERATE AN OWL DOCUMENT REPRESENTATION FO...USING TF-ISF WITH LOCAL CONTEXT TO GENERATE AN OWL DOCUMENT REPRESENTATION FO...
USING TF-ISF WITH LOCAL CONTEXT TO GENERATE AN OWL DOCUMENT REPRESENTATION FO...
cseij
 
Implementation of Urdu Probabilistic Parser
Implementation of Urdu Probabilistic ParserImplementation of Urdu Probabilistic Parser
Implementation of Urdu Probabilistic Parser
Waqas Tariq
 
Text categorization
Text categorizationText categorization
Text categorization
Shubham Pahune
 
Answer extraction and passage retrieval for
Answer extraction and passage retrieval forAnswer extraction and passage retrieval for
Answer extraction and passage retrieval for
Waheeb Ahmed
 
ANALYZING ARCHITECTURES FOR NEURAL MACHINE TRANSLATION USING LOW COMPUTATIONA...
ANALYZING ARCHITECTURES FOR NEURAL MACHINE TRANSLATION USING LOW COMPUTATIONA...ANALYZING ARCHITECTURES FOR NEURAL MACHINE TRANSLATION USING LOW COMPUTATIONA...
ANALYZING ARCHITECTURES FOR NEURAL MACHINE TRANSLATION USING LOW COMPUTATIONA...
ijnlc
 
Inverted files for text search engines
Inverted files for text search enginesInverted files for text search engines
Inverted files for text search engines
unyil96
 
A PERMISSION BASED TREE-STRUCTURED APPROACH FOR REPLICATED DATABASES
A PERMISSION BASED TREE-STRUCTURED APPROACH FOR REPLICATED DATABASESA PERMISSION BASED TREE-STRUCTURED APPROACH FOR REPLICATED DATABASES
A PERMISSION BASED TREE-STRUCTURED APPROACH FOR REPLICATED DATABASES
ijp2p
 
Finding Similar Files in Large Document Repositories
Finding Similar Files in Large Document RepositoriesFinding Similar Files in Large Document Repositories
Finding Similar Files in Large Document Repositories
feiwin
 
A Comparative Result Analysis of Text Based Steganographic Approaches
A Comparative Result Analysis of Text Based Steganographic Approaches A Comparative Result Analysis of Text Based Steganographic Approaches
A Comparative Result Analysis of Text Based Steganographic Approaches
iosrjce
 
Msr2012 chen
Msr2012 chenMsr2012 chen
Msr2012 chen
SAIL_QU
 
Scalable Discovery Of Hidden Emails From Large Folders
Scalable Discovery Of Hidden Emails From Large FoldersScalable Discovery Of Hidden Emails From Large Folders
Scalable Discovery Of Hidden Emails From Large Folders
feiwin
 
Genomic repeats detection using Boyer-Moore algorithm on Apache Spark Streaming
Genomic repeats detection using Boyer-Moore algorithm on Apache Spark Streaming Genomic repeats detection using Boyer-Moore algorithm on Apache Spark Streaming
Genomic repeats detection using Boyer-Moore algorithm on Apache Spark Streaming
TELKOMNIKA JOURNAL
 
Topic Extraction on Domain Ontology
Topic Extraction on Domain OntologyTopic Extraction on Domain Ontology
Topic Extraction on Domain Ontology
Keerti Bhogaraju
 
Conceptual foundations of text mining and preprocessing steps nfaoui el_habib
Conceptual foundations of text mining and preprocessing steps nfaoui el_habibConceptual foundations of text mining and preprocessing steps nfaoui el_habib
Conceptual foundations of text mining and preprocessing steps nfaoui el_habib
El Habib NFAOUI
 
A Document Exploring System on LDA Topic Model for Wikipedia Articles
A Document Exploring System on LDA Topic Model for Wikipedia ArticlesA Document Exploring System on LDA Topic Model for Wikipedia Articles
A Document Exploring System on LDA Topic Model for Wikipedia Articles
ijma
 
Bnt403 web technologies
Bnt403   web technologiesBnt403   web technologies
Bnt403 web technologies
smumbahelp
 
USING TF-ISF WITH LOCAL CONTEXT TO GENERATE AN OWL DOCUMENT REPRESENTATION FO...
USING TF-ISF WITH LOCAL CONTEXT TO GENERATE AN OWL DOCUMENT REPRESENTATION FO...USING TF-ISF WITH LOCAL CONTEXT TO GENERATE AN OWL DOCUMENT REPRESENTATION FO...
USING TF-ISF WITH LOCAL CONTEXT TO GENERATE AN OWL DOCUMENT REPRESENTATION FO...
cseij
 
Implementation of Urdu Probabilistic Parser
Implementation of Urdu Probabilistic ParserImplementation of Urdu Probabilistic Parser
Implementation of Urdu Probabilistic Parser
Waqas Tariq
 
Answer extraction and passage retrieval for
Answer extraction and passage retrieval forAnswer extraction and passage retrieval for
Answer extraction and passage retrieval for
Waheeb Ahmed
 
ANALYZING ARCHITECTURES FOR NEURAL MACHINE TRANSLATION USING LOW COMPUTATIONA...
ANALYZING ARCHITECTURES FOR NEURAL MACHINE TRANSLATION USING LOW COMPUTATIONA...ANALYZING ARCHITECTURES FOR NEURAL MACHINE TRANSLATION USING LOW COMPUTATIONA...
ANALYZING ARCHITECTURES FOR NEURAL MACHINE TRANSLATION USING LOW COMPUTATIONA...
ijnlc
 
Inverted files for text search engines
Inverted files for text search enginesInverted files for text search engines
Inverted files for text search engines
unyil96
 
A PERMISSION BASED TREE-STRUCTURED APPROACH FOR REPLICATED DATABASES
A PERMISSION BASED TREE-STRUCTURED APPROACH FOR REPLICATED DATABASESA PERMISSION BASED TREE-STRUCTURED APPROACH FOR REPLICATED DATABASES
A PERMISSION BASED TREE-STRUCTURED APPROACH FOR REPLICATED DATABASES
ijp2p
 

Viewers also liked (9)

Research Poster
Research PosterResearch Poster
Research Poster
Nick McDonold
 
A State-based Model for Runtime Resource Reservation for Component-based Appl...
A State-based Model for Runtime Resource Reservation for Component-based Appl...A State-based Model for Runtime Resource Reservation for Component-based Appl...
A State-based Model for Runtime Resource Reservation for Component-based Appl...
IDES Editor
 
Estimation of IRI from PCI in Construction Work Zones
Estimation of IRI from PCI in Construction Work ZonesEstimation of IRI from PCI in Construction Work Zones
Estimation of IRI from PCI in Construction Work Zones
IDES Editor
 
Efficient Representation of Smart Environments using a Parallelized Approach
Efficient Representation of Smart Environments using a Parallelized ApproachEfficient Representation of Smart Environments using a Parallelized Approach
Efficient Representation of Smart Environments using a Parallelized Approach
IDES Editor
 
Multi Similarity Measure based Result Merging Strategies in Meta Search Engine
Multi Similarity Measure based Result Merging Strategies in Meta Search EngineMulti Similarity Measure based Result Merging Strategies in Meta Search Engine
Multi Similarity Measure based Result Merging Strategies in Meta Search Engine
IDES Editor
 
Asphalt Conference Presentation Mar 2012
Asphalt Conference Presentation Mar 2012Asphalt Conference Presentation Mar 2012
Asphalt Conference Presentation Mar 2012
Utah Department of Transportation
 
Participatory Project
Participatory ProjectParticipatory Project
Participatory Project
#Xiao Zhe#
 
Roadex Iv Presentation Final Sem Inverness 2012 05 22 Vectura On Ride Vibrati...
Roadex Iv Presentation Final Sem Inverness 2012 05 22 Vectura On Ride Vibrati...Roadex Iv Presentation Final Sem Inverness 2012 05 22 Vectura On Ride Vibrati...
Roadex Iv Presentation Final Sem Inverness 2012 05 22 Vectura On Ride Vibrati...
Johan Granlund
 
International Roughness Index, IRI, and ISO 2631 Vibration Evaluation
International Roughness Index, IRI, and ISO 2631 Vibration EvaluationInternational Roughness Index, IRI, and ISO 2631 Vibration Evaluation
International Roughness Index, IRI, and ISO 2631 Vibration Evaluation
Johan Granlund
 
A State-based Model for Runtime Resource Reservation for Component-based Appl...
A State-based Model for Runtime Resource Reservation for Component-based Appl...A State-based Model for Runtime Resource Reservation for Component-based Appl...
A State-based Model for Runtime Resource Reservation for Component-based Appl...
IDES Editor
 
Estimation of IRI from PCI in Construction Work Zones
Estimation of IRI from PCI in Construction Work ZonesEstimation of IRI from PCI in Construction Work Zones
Estimation of IRI from PCI in Construction Work Zones
IDES Editor
 
Efficient Representation of Smart Environments using a Parallelized Approach
Efficient Representation of Smart Environments using a Parallelized ApproachEfficient Representation of Smart Environments using a Parallelized Approach
Efficient Representation of Smart Environments using a Parallelized Approach
IDES Editor
 
Multi Similarity Measure based Result Merging Strategies in Meta Search Engine
Multi Similarity Measure based Result Merging Strategies in Meta Search EngineMulti Similarity Measure based Result Merging Strategies in Meta Search Engine
Multi Similarity Measure based Result Merging Strategies in Meta Search Engine
IDES Editor
 
Participatory Project
Participatory ProjectParticipatory Project
Participatory Project
#Xiao Zhe#
 
Roadex Iv Presentation Final Sem Inverness 2012 05 22 Vectura On Ride Vibrati...
Roadex Iv Presentation Final Sem Inverness 2012 05 22 Vectura On Ride Vibrati...Roadex Iv Presentation Final Sem Inverness 2012 05 22 Vectura On Ride Vibrati...
Roadex Iv Presentation Final Sem Inverness 2012 05 22 Vectura On Ride Vibrati...
Johan Granlund
 
International Roughness Index, IRI, and ISO 2631 Vibration Evaluation
International Roughness Index, IRI, and ISO 2631 Vibration EvaluationInternational Roughness Index, IRI, and ISO 2631 Vibration Evaluation
International Roughness Index, IRI, and ISO 2631 Vibration Evaluation
Johan Granlund
 

Similar to An Efficient Search Engine for Searching Desired File (20)

searching
searchingsearching
searching
Rajendran
 
4888009.pptnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
4888009.pptnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn4888009.pptnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
4888009.pptnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
RAtna29
 
Data Structures Algorithms - Week 3c - Basic Searching Algorithms.pptx
Data Structures  Algorithms - Week 3c - Basic Searching Algorithms.pptxData Structures  Algorithms - Week 3c - Basic Searching Algorithms.pptx
Data Structures Algorithms - Week 3c - Basic Searching Algorithms.pptx
ramosadios
 
Algorithms
Algorithms Algorithms
Algorithms
Mohamed Essam
 
Sortsearch
SortsearchSortsearch
Sortsearch
Krishna Chaytaniah
 
Pattern matching programs
Pattern matching programsPattern matching programs
Pattern matching programs
akruthi k
 
Pattern Finding.pdf
Pattern Finding.pdfPattern Finding.pdf
Pattern Finding.pdf
VijetaKumari16
 
Sortsearch
SortsearchSortsearch
Sortsearch
maverick2203
 
AI Lesson 04
AI Lesson 04AI Lesson 04
AI Lesson 04
Assistant Professor
 
Sorting searching
Sorting searchingSorting searching
Sorting searching
ForwardBlog Enewzletter
 
famous placement papers
famous placement papersfamous placement papers
famous placement papers
Ramanujam Ramu
 
Data Structure & Algorithms - Operations
Data Structure & Algorithms - OperationsData Structure & Algorithms - Operations
Data Structure & Algorithms - Operations
babuk110
 
Algorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern AlgorithmsAlgorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern Algorithms
Mohamed Loey
 
Designing A Syntax Based Retrieval System03
Designing A Syntax Based Retrieval System03Designing A Syntax Based Retrieval System03
Designing A Syntax Based Retrieval System03
Avelin Huo
 
Lecture 1- Design Analysis Of ALgorithms
Lecture 1- Design Analysis Of ALgorithmsLecture 1- Design Analysis Of ALgorithms
Lecture 1- Design Analysis Of ALgorithms
mtahanasir65
 
Sienna 2 analysis
Sienna 2 analysisSienna 2 analysis
Sienna 2 analysis
chidabdu
 
Ads applications of ads
Ads  applications of adsAds  applications of ads
Ads applications of ads
Tech_MX
 
L1803016468
L1803016468L1803016468
L1803016468
IOSR Journals
 
Basics in algorithms and data structure
Basics in algorithms and data structure Basics in algorithms and data structure
Basics in algorithms and data structure
Eman magdy
 
Discrete structure ch 3 short question's
Discrete structure ch 3 short question'sDiscrete structure ch 3 short question's
Discrete structure ch 3 short question's
hammad463061
 
4888009.pptnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
4888009.pptnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn4888009.pptnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
4888009.pptnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
RAtna29
 
Data Structures Algorithms - Week 3c - Basic Searching Algorithms.pptx
Data Structures  Algorithms - Week 3c - Basic Searching Algorithms.pptxData Structures  Algorithms - Week 3c - Basic Searching Algorithms.pptx
Data Structures Algorithms - Week 3c - Basic Searching Algorithms.pptx
ramosadios
 
Pattern matching programs
Pattern matching programsPattern matching programs
Pattern matching programs
akruthi k
 
famous placement papers
famous placement papersfamous placement papers
famous placement papers
Ramanujam Ramu
 
Data Structure & Algorithms - Operations
Data Structure & Algorithms - OperationsData Structure & Algorithms - Operations
Data Structure & Algorithms - Operations
babuk110
 
Algorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern AlgorithmsAlgorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern Algorithms
Mohamed Loey
 
Designing A Syntax Based Retrieval System03
Designing A Syntax Based Retrieval System03Designing A Syntax Based Retrieval System03
Designing A Syntax Based Retrieval System03
Avelin Huo
 
Lecture 1- Design Analysis Of ALgorithms
Lecture 1- Design Analysis Of ALgorithmsLecture 1- Design Analysis Of ALgorithms
Lecture 1- Design Analysis Of ALgorithms
mtahanasir65
 
Sienna 2 analysis
Sienna 2 analysisSienna 2 analysis
Sienna 2 analysis
chidabdu
 
Ads applications of ads
Ads  applications of adsAds  applications of ads
Ads applications of ads
Tech_MX
 
Basics in algorithms and data structure
Basics in algorithms and data structure Basics in algorithms and data structure
Basics in algorithms and data structure
Eman magdy
 
Discrete structure ch 3 short question's
Discrete structure ch 3 short question'sDiscrete structure ch 3 short question's
Discrete structure ch 3 short question's
hammad463061
 

More from IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
IDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
IDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
IDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
IDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
IDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
IDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
IDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
IDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
IDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
IDES Editor
 
Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
IDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
IDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
IDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
IDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
IDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
IDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
IDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
IDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
IDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
IDES Editor
 

Recently uploaded (20)

NVIDIA’s Enterprise AI Factory and Blueprints_ Paving the Way for Smart, Scal...
NVIDIA’s Enterprise AI Factory and Blueprints_ Paving the Way for Smart, Scal...NVIDIA’s Enterprise AI Factory and Blueprints_ Paving the Way for Smart, Scal...
NVIDIA’s Enterprise AI Factory and Blueprints_ Paving the Way for Smart, Scal...
derrickjswork
 
I’d like to resell your CloudStack services, but...
I’d like to resell your CloudStack services, but...I’d like to resell your CloudStack services, but...
I’d like to resell your CloudStack services, but...
ShapeBlue
 
Dr Schwarzkopf presentation on STKI Summit A
Dr Schwarzkopf presentation on STKI Summit ADr Schwarzkopf presentation on STKI Summit A
Dr Schwarzkopf presentation on STKI Summit A
Dr. Jimmy Schwarzkopf
 
Interactive SQL: SQL, Features of SQL, DDL & DML
Interactive SQL: SQL, Features of SQL,  DDL & DMLInteractive SQL: SQL, Features of SQL,  DDL & DML
Interactive SQL: SQL, Features of SQL, DDL & DML
IsakkiDeviP
 
Partner Tableau Next Product First Call Deck.pdf
Partner Tableau Next Product First Call Deck.pdfPartner Tableau Next Product First Call Deck.pdf
Partner Tableau Next Product First Call Deck.pdf
ssuser3d62c6
 
MCP Dev Summit - Pragmatic Scaling of Enterprise GenAI with MCP
MCP Dev Summit - Pragmatic Scaling of Enterprise GenAI with MCPMCP Dev Summit - Pragmatic Scaling of Enterprise GenAI with MCP
MCP Dev Summit - Pragmatic Scaling of Enterprise GenAI with MCP
Sambhav Kothari
 
TrustArc Webinar: Cross-Border Data Transfers in 2025
TrustArc Webinar: Cross-Border Data Transfers in 2025TrustArc Webinar: Cross-Border Data Transfers in 2025
TrustArc Webinar: Cross-Border Data Transfers in 2025
TrustArc
 
Planetek Italia Corporate Profile Brochure
Planetek Italia Corporate Profile BrochurePlanetek Italia Corporate Profile Brochure
Planetek Italia Corporate Profile Brochure
Planetek Italia Srl
 
Breaking it Down: Microservices Architecture for PHP Developers
Breaking it Down: Microservices Architecture for PHP DevelopersBreaking it Down: Microservices Architecture for PHP Developers
Breaking it Down: Microservices Architecture for PHP Developers
pmeth1
 
Agentic AI, A Business Overview - May 2025
Agentic AI, A Business Overview - May 2025Agentic AI, A Business Overview - May 2025
Agentic AI, A Business Overview - May 2025
Peter Morgan
 
The fundamental misunderstanding in Team Topologies
The fundamental misunderstanding in Team TopologiesThe fundamental misunderstanding in Team Topologies
The fundamental misunderstanding in Team Topologies
Patricia Aas
 
Managing Geospatial Open Data Serverlessly [AWS Community Day CH 2025]
Managing Geospatial Open Data Serverlessly [AWS Community Day CH 2025]Managing Geospatial Open Data Serverlessly [AWS Community Day CH 2025]
Managing Geospatial Open Data Serverlessly [AWS Community Day CH 2025]
Chris Bingham
 
Storage Setup for LINSTOR/DRBD/CloudStack
Storage Setup for LINSTOR/DRBD/CloudStackStorage Setup for LINSTOR/DRBD/CloudStack
Storage Setup for LINSTOR/DRBD/CloudStack
ShapeBlue
 
Artificial Intelligence (Kecerdasan Buatan).pdf
Artificial Intelligence (Kecerdasan Buatan).pdfArtificial Intelligence (Kecerdasan Buatan).pdf
Artificial Intelligence (Kecerdasan Buatan).pdf
NufiEriKusumawati
 
AI and Gender: Decoding the Sociological Impact
AI and Gender: Decoding the Sociological ImpactAI and Gender: Decoding the Sociological Impact
AI and Gender: Decoding the Sociological Impact
SaikatBasu37
 
STKI Annual Israel IT Market Study 2025 .
STKI Annual Israel IT Market Study 2025 .STKI Annual Israel IT Market Study 2025 .
STKI Annual Israel IT Market Study 2025 .
Dr. Jimmy Schwarzkopf
 
PSEP - Salesforce Power of the Platform.pdf
PSEP - Salesforce Power of the Platform.pdfPSEP - Salesforce Power of the Platform.pdf
PSEP - Salesforce Power of the Platform.pdf
ssuser3d62c6
 
RDM Training: Publish research data with the Research Data Repository
RDM Training: Publish research data with the Research Data RepositoryRDM Training: Publish research data with the Research Data Repository
RDM Training: Publish research data with the Research Data Repository
CSUC - Consorci de Serveis Universitaris de Catalunya
 
Optimize IBM i with Consulting Services Help
Optimize IBM i with Consulting Services HelpOptimize IBM i with Consulting Services Help
Optimize IBM i with Consulting Services Help
Alice Gray
 
Fully Open-Source Private Clouds: Freedom, Security, and Control
Fully Open-Source Private Clouds: Freedom, Security, and ControlFully Open-Source Private Clouds: Freedom, Security, and Control
Fully Open-Source Private Clouds: Freedom, Security, and Control
ShapeBlue
 
NVIDIA’s Enterprise AI Factory and Blueprints_ Paving the Way for Smart, Scal...
NVIDIA’s Enterprise AI Factory and Blueprints_ Paving the Way for Smart, Scal...NVIDIA’s Enterprise AI Factory and Blueprints_ Paving the Way for Smart, Scal...
NVIDIA’s Enterprise AI Factory and Blueprints_ Paving the Way for Smart, Scal...
derrickjswork
 
I’d like to resell your CloudStack services, but...
I’d like to resell your CloudStack services, but...I’d like to resell your CloudStack services, but...
I’d like to resell your CloudStack services, but...
ShapeBlue
 
Dr Schwarzkopf presentation on STKI Summit A
Dr Schwarzkopf presentation on STKI Summit ADr Schwarzkopf presentation on STKI Summit A
Dr Schwarzkopf presentation on STKI Summit A
Dr. Jimmy Schwarzkopf
 
Interactive SQL: SQL, Features of SQL, DDL & DML
Interactive SQL: SQL, Features of SQL,  DDL & DMLInteractive SQL: SQL, Features of SQL,  DDL & DML
Interactive SQL: SQL, Features of SQL, DDL & DML
IsakkiDeviP
 
Partner Tableau Next Product First Call Deck.pdf
Partner Tableau Next Product First Call Deck.pdfPartner Tableau Next Product First Call Deck.pdf
Partner Tableau Next Product First Call Deck.pdf
ssuser3d62c6
 
MCP Dev Summit - Pragmatic Scaling of Enterprise GenAI with MCP
MCP Dev Summit - Pragmatic Scaling of Enterprise GenAI with MCPMCP Dev Summit - Pragmatic Scaling of Enterprise GenAI with MCP
MCP Dev Summit - Pragmatic Scaling of Enterprise GenAI with MCP
Sambhav Kothari
 
TrustArc Webinar: Cross-Border Data Transfers in 2025
TrustArc Webinar: Cross-Border Data Transfers in 2025TrustArc Webinar: Cross-Border Data Transfers in 2025
TrustArc Webinar: Cross-Border Data Transfers in 2025
TrustArc
 
Planetek Italia Corporate Profile Brochure
Planetek Italia Corporate Profile BrochurePlanetek Italia Corporate Profile Brochure
Planetek Italia Corporate Profile Brochure
Planetek Italia Srl
 
Breaking it Down: Microservices Architecture for PHP Developers
Breaking it Down: Microservices Architecture for PHP DevelopersBreaking it Down: Microservices Architecture for PHP Developers
Breaking it Down: Microservices Architecture for PHP Developers
pmeth1
 
Agentic AI, A Business Overview - May 2025
Agentic AI, A Business Overview - May 2025Agentic AI, A Business Overview - May 2025
Agentic AI, A Business Overview - May 2025
Peter Morgan
 
The fundamental misunderstanding in Team Topologies
The fundamental misunderstanding in Team TopologiesThe fundamental misunderstanding in Team Topologies
The fundamental misunderstanding in Team Topologies
Patricia Aas
 
Managing Geospatial Open Data Serverlessly [AWS Community Day CH 2025]
Managing Geospatial Open Data Serverlessly [AWS Community Day CH 2025]Managing Geospatial Open Data Serverlessly [AWS Community Day CH 2025]
Managing Geospatial Open Data Serverlessly [AWS Community Day CH 2025]
Chris Bingham
 
Storage Setup for LINSTOR/DRBD/CloudStack
Storage Setup for LINSTOR/DRBD/CloudStackStorage Setup for LINSTOR/DRBD/CloudStack
Storage Setup for LINSTOR/DRBD/CloudStack
ShapeBlue
 
Artificial Intelligence (Kecerdasan Buatan).pdf
Artificial Intelligence (Kecerdasan Buatan).pdfArtificial Intelligence (Kecerdasan Buatan).pdf
Artificial Intelligence (Kecerdasan Buatan).pdf
NufiEriKusumawati
 
AI and Gender: Decoding the Sociological Impact
AI and Gender: Decoding the Sociological ImpactAI and Gender: Decoding the Sociological Impact
AI and Gender: Decoding the Sociological Impact
SaikatBasu37
 
STKI Annual Israel IT Market Study 2025 .
STKI Annual Israel IT Market Study 2025 .STKI Annual Israel IT Market Study 2025 .
STKI Annual Israel IT Market Study 2025 .
Dr. Jimmy Schwarzkopf
 
PSEP - Salesforce Power of the Platform.pdf
PSEP - Salesforce Power of the Platform.pdfPSEP - Salesforce Power of the Platform.pdf
PSEP - Salesforce Power of the Platform.pdf
ssuser3d62c6
 
Optimize IBM i with Consulting Services Help
Optimize IBM i with Consulting Services HelpOptimize IBM i with Consulting Services Help
Optimize IBM i with Consulting Services Help
Alice Gray
 
Fully Open-Source Private Clouds: Freedom, Security, and Control
Fully Open-Source Private Clouds: Freedom, Security, and ControlFully Open-Source Private Clouds: Freedom, Security, and Control
Fully Open-Source Private Clouds: Freedom, Security, and Control
ShapeBlue
 

An Efficient Search Engine for Searching Desired File

  • 1. Short Paper ACEEE Int. J. on Information Technology, Vol. 3, No. 1, March 2013 An Efficient Search Engine for Searching Desired File Umesh Chandra Jaiswal1, Rohit Kamal Saxena2, and Kamlendra Pratap Singh3 1 Madan Mohan Malaviya Engineering College, Gorakhpur, India 2 Cisco Systems, Bangalore, India 3 Bharat Electronics Limited, Gaziabad, India Email:1 ucj_jaiswal@yahoo.com, 2 rohit_kamal2003@yahoo.com,3 22kamlendra@gmail.com Abstract—With ever increasing data in form of e-files, there TABLE I. COMPARATIVE ASYMPTOTICTIME ANALYSIS always has been a need of a good application to search for information in those files efficiently. This paper extends the implementation of our previous algorithm in the form of a windows application. The algorithm has the search time- complexity of Θ(n) with no pre-processing time and thus is very efficient in searching sentences in a pool of files. Index Terms—Text search, sentence searching, searching in files application I. INTRODUCTION In this 21st century, everything is getting documented day by day. We are piling up lots and lots of files that give rise to a need of good text searching applications. We have very few efficient applications that can search within files. The description of the application presented uses ‘A Fast III. ALGORITHM Sentence Searching Algorithm’ for searching text/sentences The algorithm used in the application for searching some in the files [8]. The main focus of the application is to search sentence/search: any sentence in the given pool of files in various folders or 1. While(!EndOfFile) drives so that desired file can be searched on the basis of 2. Do read a single character from file, x given information in the form of a sentence or a small 3. pos pos+1 paragraph. There exists various text searching algorithms like 4. If sentence[i]=x then KMP, Boyre-Moore which can be efficient in case of patterns 5. i i+1 but while searching for sentences the performance of our 6. Else algorithm is better than the rest of the algorithms, so it has 7. i 0 been chosen for the application [1], [2], [3] and [4]. 8. If sentence[i]=x then 9. i i+1 II. RELATED WORK 10. If i = LengthOfSentence then Amongst the several text-searching algorithms designed 11. c c+1 until now, the simplest one is the Naive or Brute-Force 12. i 0 Algorithm. Rabin-Karp is another searching technique that 13. Return c makes use of elementary number-theoretic notations such as The above algorithm returns ‘c’, i.e. the number of times equivalence of two numbers modulo a third number. Other the sentence to be searched occurs in a single file. It can algorithm is the Knuth-Morris—Pratt algorithm that is a linear scan more than one file; one by one and thus help in time string-matching algorithm [5]. This algorithm uses a prefix distinguishing between the set of files that contain a sentence function π that encapsulates knowledge about how the pattern or paragraph and the ones that do not contain it. matches against shifts or itself. Now the most commonly The above algorithm works by scanning the file character used text-searching algorithm is the Boyre-Moore Algorithm by character and comparing each character of the file with that takes a sub-linear searching time [6]. It uses two functions the ones in the sentence to we wish to search. We may see i.e. a bad character and a good prefix functions require certain the algorithm in two phases as described in the following preprocessing. Let m be the length of the sentence and let n lines. be the length of the search space (file). The Table-I gives the (a) Initially, we compare the first character of the file is comparison of the asymptotic time analysis of various text with the first character of the sentence to be searched. If searching algorithms. A very little work has been performed there is a match, we increment i else we set the pointer again in this area. There is no general purpose system available till to 0 and check for the first character of the sentence. today that provides the facility of searching desired file on (b) We now check the value of ‘i’ if it is equal to length of the basis of information available [7], and [8]. the sentence or not. Value of ‘i’ will be equal to the length of © 2013 ACEEE 58 DOI: 01.IJIT.3.1.1028
  • 2. Short Paper ACEEE Int. J. on Information Technology, Vol. 3, No. 1, March 2013 sentence only in a condition if the sentence is found thus we increment the value of ‘c’. IV. THEORETICAL ANALYSIS Considering the illustrated algorithm, we can see that the complete complexity of searching a sentence in a file is equal to Θ(n) without having any pre-processing time where n is the number of characters in the file. Lines 1-12 show that this particular loop continues until the end of file i.e. iterates ‘n’ (no. of characters in file) times. Line 2 reads a single character at a time thus having O(1) complexity. Similarly, line 3 also executes once in a loop. Lines 4-9 check whether the character read from file is present in the sentence or not and accordingly, the respective lines execute. In case we find a mismatch, we check it for the first character of the sentence we are searching. Lines 10-12 check if the sentence is found in the file and accordingly increment the counter of the number of sentences by 1. Finally, line 13 returns the number of times the sentence is present in the file. This clearly shows that there is a single loop iterating ‘n’ times. Thus, the complexity of the algorithm is Θ(n), under all circumstances as the loop continues till the last character of the file whether or not the sentence is present in the file [5], [6], [7], and [8]. V. IMPLEMENTATION The algorithm has been implemented in C#.NET using Visual Studio as IDE. There is an option of a single file or a complete folder that allows you to quickly search inside the files on the drive or network. It can easily retrieve the documents that contain the multiple sentences and phrases that one is interested in. Figure 1 shows the snapshot of the application’s working. The list of files containing the sentence Fig. 1. Application Screenshot will be displayed that can redirect to the file on clicking it. The search can be performed on PDF, DOC, TXT, HTML and CONCLUSION AND FUTURE SCOPE PPT files. Some of the extra features that have been included in our application are With increased use of computer for documenting almost Normal Searching: everything, we need such applications that can help searching Normal Searching allows the use of the question mark (?) in those documents. This application can be very useful as and asterisk (*) to match one and one or more characters there are very few applications that solve this purpose. respectively. All white space is treated the same and multiple Secondly, since it uses efficient algorithm for searching, the white space characters are treated as one. results are computed at a very faster rate and thus saving a Search a drive, path or multiple drives and paths: lot of useful time. Such as C: | Corp-backupCAccounting There will be a revolutionary change in the working of Exclude specific folders or paths: various offices of different organization. This will provide a C: | -Windows | -Program Files user friendly way to search desired file or files on little This option would exclude the folders Windows and information available from various media. Sometimes people Program Files and all their subfolders are not able to find the desired files as the number of files Restrict to specific file types and patterns: becomes very large and spread in various folders. A natural *.doc | *.rtf language interface to the system may be developed so that it This would check only files with names ending in doc or will be more users friendly in the offices of various rtf. organizations. We have a plan to integrate the developed Exclude specific extensions: search engine with English language. Later on this search -*.bak | -*.tmp | -~* engine may be extended for Hindi language files along with This option would search for all files except those that have Hindi language interface. the extension bak,tmp or that start with the tilde character. © 2013 ACEEE 59 DOI: 01.IJIT.3.1. 1028
  • 3. Short Paper ACEEE Int. J. on Information Technology, Vol. 3, No. 1, March 2013 REFERENCES 11, 2011 in Bangalore,India [4] Karp, Richard M.; Rabin, Michael O. (March 1987). Efficient [1] Cormen, T.H., Leiserson, C.E., Rivest, R. L., Stein, C. In: randomized pattern-matching algorithms. Introduction to Algorithms, Second Edition. MIT Press and [5] Knuth, D.E., Morris, J.H., Pratt, V.R.: Fast pattern matching McGraw-Hill, 2001. ISBN 0-262-03293-7. Chapter 32: String strings. TR CS-74-440, Stanford University, Stanford Matching, pp.906–932. California (1974). [2] Cole. R. “Tight Bounds on the complexity of the Boyer-Moore [6] Boyer, R. S., Moore J. S.: A Fast String Searching Algorithm. Algorithm”. In: Proceedings of the 2nd Annual ACM-SIAM In: Carom. ACM 20, (10), 262–272(1977) Symposium on Discrete Algorithms. [7] Daniel M. Sunday. 1990. A very fast substring search algorithm. [3] Rohit Kamal Saxena, U C Jaiswal, and Kamlendra PratapSingh, Commun. ACM 33, 8 (August 1990), 132-142. DOI=10.1145/ “A Fast sentence Searching Algorithm”. In proceedings of the 79173.79184 CNC-2011 ( Second international Conference on Advances in [8] Algorithms by Robert Sedgewick Addison-Wesley Publication Communication, Network, and Computing. The proceeding Company. ISBN O-201 -06672-6. Chapter 19: String is on digital media. The conference is held during March 10- Searching, pp 241-256. © 2013 ACEEE 60 DOI: 01.IJIT.3.1.1028
  翻译: