2012 12th International Conference on Computational Science and Its Applications 2012
DOI: 10.1109/iccsa.2012.15
|View full text |Cite
|
Sign up to set email alerts
|

A Survey: Soft Computing in Intelligent Information Retrieval Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 19 publications
0
5
0
Order By: Relevance
“…Traditional search engines collect metadata from every web document, and store the metadata into an inverted index, this kind of engines mostly support static keyword searches to find such documents (Pokorný, 2004). Information retrieval algorithms (Ahmad and Ansari, 2012) are then used to determine the best answer to user queries. These search engines are not capable of discovering dynamic IoT devices and services as search objects in both types of search engines are very different from each other (Guinard et al, 2010).…”
Section: Massive Scalingmentioning
confidence: 99%
“…Traditional search engines collect metadata from every web document, and store the metadata into an inverted index, this kind of engines mostly support static keyword searches to find such documents (Pokorný, 2004). Information retrieval algorithms (Ahmad and Ansari, 2012) are then used to determine the best answer to user queries. These search engines are not capable of discovering dynamic IoT devices and services as search objects in both types of search engines are very different from each other (Guinard et al, 2010).…”
Section: Massive Scalingmentioning
confidence: 99%
“…It is well known that the more precise a solution is, the more computation and communication cost the solution needs. Unlike conventional computing, soft computing is tolerant of imprecision, uncertainty, partial truth and approximation to achieve tractability, robustness, and low solution cost (Ahmad and Ansari 2012;Metre et al 2012;Wahab et al 2009;Yu and Kaynak 2009). Therefore, based on soft computing techniques (Kim and Bien 2008;Mitra et al 2002;Murakami and Honda 2008;Yager et al 2014), we develop our dummy generation algorithms to provide preferred location privacy protection ability for mobile cloud user in the long-term level with a low cost.…”
Section: Introductionmentioning
confidence: 97%
“…Extracting knowledge from big databases and document databases has long been a challenge because of the large number of documents that make it hard to select the most relevant data. For that reason, a lot of retrieval algorithms have been developed (Ahmad and Ansari 2012;Boden et al 2012;Karol and Mangat 2013;Koval and Návrat 2012;Wang et al 2013) applying distinct sophisticated techniques: fuzzy, artificial neural network (ANN), clustering, machine learning, and hybrids.…”
Section: Introductionmentioning
confidence: 99%