Professional Documents
Culture Documents
15.string Similarity Search A Hash-Based Approach
15.string Similarity Search A Hash-Based Approach
String similarity search is a fundamental query that has been widely used for
DNA sequencing, error-tolerant query auto-completion, and data cleaning needed in
database, data warehouse and data mining. In this paper, we study string similarity
search based on edit distance that is supported by many database management
systems such as Oracle and PostgreSQL. Given the edit distance, ed(s, t), between
two strings, s and t, the string similarity search is to find every string t in a string
database D which is similar to a query string s such that ed(s, t) for a given
threshold. In the literature, most existing work take a filter-and-verify approach,
where the filter step is introduced to reduce the high verification cost of two strings by
utilizing an index built offline for D. The two up-to-date approaches are prefix
filtering and local filtering. In this paper, we study string similarity search where
strings can be either short or long. Our approach can support long strings, which are
not well supported by the existing approaches due to the size of the index built and the
time to build such index. We propose two new hash-based labeling techniques, named
OX label and XX label, for string similarity search. We assign a hash-label, Hs, to a
string s, and prune the dissimilar strings by comparing two hash-labels, Hs and Ht, for
two strings s and t in the filter step. The key idea behind is to take the dissimilar bit-
patterns between two hash-labels. We discuss our hash-based approaches, address
their pruning power, and give the algorithms. Our hash-based approaches achieve
high efficiency, and keep its index size and index construction time one order of
magnitude smaller than the existing approaches in our experiment at the same time.
CHAPTER 2
LITERATURE SURVEY
STRING SIMILARITY SEARCH: A HASH-BASED APPROACH
3
2.LITERATURE SURVEY
1. The next generation for the forensic extraction of electronic evidence from
mobile telephones
Electronic evidence extracted from a mobile telephone provide a wealth of
information about the user. Before a court allows the trier of fact to consider
the electronic evidence, the court must ensure that the subject matter,
testimony of which is to be given, is scientific. Therefore, regard must, at the
investigation stage, be given to fulfill the requirements of science and law,
including international standards. Such compliance also moves the extraction
of electronic evidence from mobile telephones into the next generation, a more
rigorous position as a forensic science, by being able to give in court well-
reasoned and concrete claims about the accuracy and validity of conclusions.
2. A critical review of 7 years of Mobile Device Forensics
Mobile Device Forensics (MF) is an interdisciplinary field consisting of
techniques applied to a wide range of computing devices, including
smartphones and satellite navigation systems. Over the last few years, a
significant amount of research has been conducted, concerning various mobile
device platforms, data acquisition schemes, and information extraction
methods. This work provides a comprehensive overview of the field, by
presenting a detailed assessment of the actions and methodologies taken
throughout the last seven years. A multilevel chronological categorization of
the most significant studies is given in order to provide a quick but complete
way of observing the trends within the field. This categorization chart also
serves as an analytic progress report, with regards to the evolution of MF.
Moreover, since standardization efforts in this area are still in their infancy,
this synopsis of research helps set the foundations for a common framework
proposal. Furthermore, because technology related to mobile devices is
evolving rapidly, disciplines in the MF ecosystem experience frequent
changes. The rigorous and critical review of the state-of-the-art in this paper
will serve as a resource to support efficient and effective reference and
adaptation.
CHAPTER 3
SYSTEM ANALYSIS
3. SYSTEM STUDY
Operational Feasibility
Economic Feasibility
Technical Feasibility
Operational Feasibility
CHAPTER 4
SYSTEM DESIGN
4.1 ARCHITECTURE
The application starts running when it is executed for the first time. The server
has to be started and then the internet explorer in used as the browser. The
project will run on the local area network so the server machine will serve as
the administrator while the other connected systems can act as the clients. The
developed system is highly user friendly and can be easily understood by
anyone using it even for the first time.
4.3 UML DIAGRAMS
UML stands for Unified Modeling Language. UML is a standardized general-
purpose modeling language in the field of object-oriented software engineering. The
standard is managed, and was created by, the Object Management Group.
The goal is for UML to become a common language for creating models of
object oriented computer software. In its current form UML is comprised of two
major components: a Meta-model and a notation. In the future, some form of method
or process may also be added to; or associated with, UML.
The Unified Modeling Language is a standard language for specifying,
Visualization, Constructing and documenting the artifacts of software system, as well
as for business modeling and other non-software systems.
The UML represents a collection of best engineering practices that have
proven successful in the modeling of large and complex systems.
The UML is a very important part of developing objects oriented software
and the software development process. The UML uses mostly graphical notations to
express the design of software projects.
GOALS:
The Primary goals in the design of the UML are as follows:
a. User
7. SEQUENCE DIAGRAM
a. User
Advantages of Python :-
Let’s see how Python dominates over other languages.
1. Extensive Libraries
Python downloads with an extensive library and it contain code for various
purposes like regular expressions, documentation-generation, unit-testing, web
There have been several updates in the Python version over the years. The question
is how to install Python? It might be confusing for the beginner who is willing to
start learning Python but this tutorial will solve your query. The latest or the newest
version of Python is version 3.7.4 or in other words, it is Python 3.
Note: The python version 3.7.4 cannot be used on Windows XP or earlier devices.
Step 1: Go to the official site to download and install python using Google Chrome
or any other web browser. OR Click on the following link: https://www.python.org
Now, check for the latest and the correct version for your operating system.
Step 2: Click on the Download Tab.
Step 4: Scroll down the page until you find the Files option.
Step 5: Here you see a different version of python along with the operating system.
Step 3: Click on Install NOW After the installation is successful. Click on Close.
Step 5: Name the file and save as type should be Python files. Click on SAVE. Here
I have named the files as Hey World.
Step 6: Now for e.g. enter print
ALGORITHM
String Similarity Search: Given a string dataset D of n strings, aquery string s and an
edit distance threshold _, the string similarity search problem is to find all strings t ∈D
such that ed(s, t) ≤ _. A well-known algorithm to compute the edit distance between
two strings s and t is to fill an edit distance matrix of size (|s| + 1) × (|t| + 1) using
The purpose of testing i6s to discove.r errors. Testing is the process of trying to
discover every conceivable fault or weakness in a work product. It provides a way to
check the functionality of components, sub assemblies, assemblies and/or a finished
product It is the process of exercising software with the intent of ensuring that the
Software system meets its requirements and user expectations and does not fail in an
unacceptable manner. There are various types of test. Each test type addresses a
specific testing requirement.
Integration testing
Integration tests are designed to test integrated software
components to determine if they actually run as one program. Testing is event driven
and is more concerned with the basic outcome of screens or fields. Integration tests
demonstrate that although the components were individually satisfaction, as shown by
successfully unit testing, the combination of components is correct and consistent.
Functional test
System Test
System testing ensures that the entire integrated software system meets
requirements. It tests a configuration to ensure known and predictable results. An
example of system testing is the configuration oriented system integration test.
System testing is based on process descriptions and flows, emphasizing pre-driven
process links and integration points.
Unit Testing
Features to be tested
Verify that the entries are of the correct format
No duplicate entries should be allowed
The task of the integration test is to check that components or software applications,
e.g. components in a software system or – one step up – software applications at the
company level – interact without error.
Test Results: All the test cases mentioned above passed successfully. No defects
encountered.
Acceptance Testing
User Acceptance Testing is a critical phase of any project and requires significant
participation by the end user. It also ensures that the system meets the functional
requirements.
Test Results: All the test cases mentioned above passed successfully. No defects
encountered.
In above screen click on ‘Upload Mobile Data’ button to upload chat log file
In above screen chat log file is uploaded and now click on ‘Extract Data’ button to
extract content from file
In above screen in first line we can see file contains total 113 lines and we can see file
created and modified date and file size is 39.272 KB
CHAPTER 9
9.REFERENCES
1. I.S. Jeong et al. An efficient similarity search based on indexing in large DNA
databases Comput. Biol. Chem. (2010)
2. T. Lecroq Fast exact string matching algorithms Inf. Process. Lett. (2007)
3. H. Hyyrö et al. On exact string matching of unique oligonucleotides Comput.
Biol. Med. (2005)
4. J.F. Wang et al. Assessment of approximate string matching in a biomedical 5.
5. K. Xu et al. Document-level attention-based BiLSTM-CRF incorporating
disease dictionary for disease named entity recognition Comput. Biol. Med.
(2019)
6. M. Naghibzadeh et al. Developing an ultra-efficient microsatellite discoverer to
find structural differences between SARS-CoV-1 and Covid-19 Informatics in
7. Wandelt et al. Trends in genome compression, Current Bioinformatics, vol 9, no
(2014)
8. S. Deorowicz et al. Data compression for sequencing data
Algorithm Mol. Biol. (2013)
9. N.S. Bakr et al.DNA lossless compression algorithms, American Journal of
Bioinformatics Research, vol 3, no (2013)
10.N. Khitmoh et al. Stretch Profile: a pruning technique to accelerate DNA
sequence search Informatics in Medicine Unlocked (2020)
11.L. Chen et al. Compressed pattern matching in dna sequences
12.M. Najam et a .Pattern matching for dna sequencing data using multiple bloom
filters BioMed Res. Int. (2019)