Signature Based

نویسندگان

  • Michael Lawrence Davis
  • Michael L. Davis
  • Dushan Z. Badal
  • Marijke F. Augusteijn
  • Joel C. Lee
چکیده

Thesis Statement This thesis introduces a new full-text document retrieval model based on the use of document signature access structures combined with ranked retrieval methods. Specifically, it investigates the use of term co-occurence as a measure of similarity between the source document signatures and the signatures of the query terms. The co-occurence of terms is shown to be an attribute characteristic of the signatures which is suitable for ranking documents according to their relevance. Ranking of the documents using term co-occurence in and among the signatures improves the relevance of the retrieval while reducing the size of the index substantially versus inverted file, ranked retrieval methods. This method is based upon the concept that document signatures are contextual windows of meaning. These windows contain passages formed from terms associations which embody the semantics of the underlying text. The comparison of terms co-occurring within and among these windows will be used to rank order the documents decreasingly by relevance. This will produce an indexing method suitable for use on massive document collections. Though document signatures were proven efficient in support of conjunctive queries in Boolean retrieval systems, they are not efficient for the processing of disjunctive queries. Also, Boolean retrieval systems are too complex for effective use by less experienced users. This led to the preeminence of ranked retrieval, which allows the presentation of natural language queries. Ranked retrieval is an enhancement to simple, term based retrieval which only finds documents using terms matching or synonymous with the terms in the query. In the term based retrieval there is no assurance that the most relevant documents are at the top of the 2 list. Ranked retrieval takes the results of the term based retrieval, scores the documents by likely relevance and reorders the documents from most likely relevance to least. Although there are a variety of approaches to performing ranked retrieval, the most widely used method is the context vector representation and the vector space model for comparison scoring. The context vector was introduced by [Gallant91] to manually score document semantics by vectors consisting of an element for each possible term occurrence in the document. The value of the elements in the vector are the weighting factor. Typically the weighting factor used is the frequency of occurrence of the term within the document. A document and a query are compared by comparing their vectors. The most common method for this comparison …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

The new protocol blind digital signature based on the discrete logarithm problem on elliptic curve

In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind  digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...

متن کامل

A Novel Patch-Based Digital Signature

In this paper a new patch-based digital signature (DS) is proposed. The proposed approach similar to steganography methods hides the secure message in a host image. However, it uses a patch-based key to encode/decode the data like cryptography approaches. Both the host image and key patches are randomly initialized. The proposed approach consists of encoding and decoding algorithms. The encodin...

متن کامل

An efficient blind signature scheme based on the elliptic curve discrete logarithm problem

Elliptic Curve Cryptosystems (ECC) have recently received significant attention by researchers due to their high performance such as low computational cost and small key size. In this paper a novel untraceable blind signature scheme is presented. Since the security of proposed method is based on difficulty of solving discrete logarithm over an elliptic curve, performance of the proposed scheme ...

متن کامل

Use of the Shearlet Transform and Transfer Learning in Offline Handwritten Signature Verification and Recognition

Despite the growing growth of technology, handwritten signature has been selected as the first option between biometrics by users. In this paper, a new methodology for offline handwritten signature verification and recognition based on the Shearlet transform and transfer learning is proposed. Since, a large percentage of handwritten signatures are composed of curves and the performance of a sig...

متن کامل

Convertible limited (multi-) verifier signature: new constructions and applications

A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we first present a generic construction of convertible limited verifier signature (CLVS) into which...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1995