Join query enhancement processing (jqpro) with big rdf data on a distributed system using hashing-merge join technique
Semantic web technologies have emerged in the last few years across different fields of study and their data are still growing rapidly. Specifically, the increased data storage and publishing capabilities in standard open web formats have made the technology much more successful. So, the data have b...
| Main Author: | Nahla Mohammedelzein, Elawad Babiker |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2021
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/38471/ http://umpir.ump.edu.my/id/eprint/38471/1/Join%20query%20enhancement%20processing%20%28jqpro%29%20with%20big%20rdf%20data%20on%20a%20distributed%20system%20using%20hashing-merge%20join%20technique.ir.pdf |
Similar Items
JQPro : Join query processing in a distributed system for big RDF data using the hash-merge join technique
by: Elzein, Nahla Mohammed, et al.
Published: (2023)
by: Elzein, Nahla Mohammed, et al.
Published: (2023)
Distributed Join Query Processing for Big RDF Data
by: Elzein, Nahla Mohammed, et al.
Published: (2018)
by: Elzein, Nahla Mohammed, et al.
Published: (2018)
Managing big RDF data in clouds: challenges, opportunities, and solutions
by: Nahla, Mohammed Elzein, et al.
Published: (2018)
by: Nahla, Mohammed Elzein, et al.
Published: (2018)
Equi-join table optimization technique for temporal data
by: Mohd Rahim, Mohd Shafry, et al.
Published: (2007)
by: Mohd Rahim, Mohd Shafry, et al.
Published: (2007)
Implementation of Parallel Collection Equi-Join Using MPI
by: Lee, Nung Kion, et al.
Published: (2002)
by: Lee, Nung Kion, et al.
Published: (2002)
An efficient multi join query optimization for relational database management system using swarm intelligence approaches
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
Improved fuzzy hashing technique for biometric template protection
by: Ong, T. S., et al.
Published: (2014)
by: Ong, T. S., et al.
Published: (2014)
Broad view of cryptographic hash functions
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
A Survey of Query Expansion, Query Suggestion and Query Refinement Techniques
by: Ooi, Jessie, et al.
Published: (2015)
by: Ooi, Jessie, et al.
Published: (2015)
Image Steganography Using Hash Function And Compression
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
Design and analysis of a new hash function gear
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Cryptographic hash function: a high level view
by: Taha, Imad, et al.
Published: (2015)
by: Taha, Imad, et al.
Published: (2015)
A new design of cryptographic hash function: gear
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
A new design of cryptographic hash function: gear
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
MOIM: a novel design of cryptographic hash function
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Hash function of finalist SHA-3: analysis study
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
Cryptographic hash function: A high level view
by: Alkandari, Abdulaziz Ali, et al.
Published: (2013)
by: Alkandari, Abdulaziz Ali, et al.
Published: (2013)
The study of joining strength based on differential joining technique
by: Mohd Nadzrizal, Mohamad Ghaazali
Published: (2013)
by: Mohd Nadzrizal, Mohamad Ghaazali
Published: (2013)
Query routing using query feedback and similarity in unstructured peer to peer networks
by: Ishak, Iskandar, et al.
Published: (2008)
by: Ishak, Iskandar, et al.
Published: (2008)
Eigenspace-based face hashing
by: Ngo, , DCL, et al.
Published: (2004)
by: Ngo, , DCL, et al.
Published: (2004)
Protection of the digital holy Quran using SAB hash function
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
SSM: Secure-Split-Merge data distribution in cloud infrastructure
by: Khan, Burhan ul Islam, et al.
Published: (2015)
by: Khan, Burhan ul Islam, et al.
Published: (2015)
An Improved of Channel Allocation for WLAN Using Vertex Merge Algorithm
by: Mr, Handrizal, et al.
Published: (2012)
by: Mr, Handrizal, et al.
Published: (2012)
An efficient virtual tour : a merging of path planning and optimization
by: Abd Latiff, Muhammad Shafie, et al.
Published: (2004)
by: Abd Latiff, Muhammad Shafie, et al.
Published: (2004)
Protection of the digital Holy Quran hash digest by using cryptography algorithms
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Enhancement Of Join Point Designation Diagrams (Jpdds) With Procedural Logic And Timing Constraint For Aspect-Oriented Modeling
by: Zarrin, Bahram
Published: (2010)
by: Zarrin, Bahram
Published: (2010)
A literature review on collaborative caching techniques in MANETs: issues and methods used in serving queries
by: Elfaki, Mohamed, et al.
Published: (2019)
by: Elfaki, Mohamed, et al.
Published: (2019)
Modeling and querying alternative paths in Kuantan
by: Mohamad Salleh, Mazlina
Published: (2007)
by: Mohamad Salleh, Mazlina
Published: (2007)
Hybrid Region Merging For Image Segmentation Using Optimal Global Feature With Global Merging Criterion Approach
by: Vadiveloo, Mogana
Published: (2020)
by: Vadiveloo, Mogana
Published: (2020)
SCSA: Evaluating skyline queries in incomplete data
by: Gulzar, Yonis, et al.
Published: (2019)
by: Gulzar, Yonis, et al.
Published: (2019)
Reporting skyline on uncertain dimension with query interval
by: Mohd Saad, Nurul Husna, et al.
Published: (2016)
by: Mohd Saad, Nurul Husna, et al.
Published: (2016)
Optimizing skyline query processing in incomplete data
by: Gulzar, Yonis, et al.
Published: (2019)
by: Gulzar, Yonis, et al.
Published: (2019)
Recovery And Tamper Localization For Reversible Iris Image Watermarking Scheme Using Hash Function
by: Muhammad Alif Aiman, Abd Samad
Published: (2023)
by: Muhammad Alif Aiman, Abd Samad
Published: (2023)
Omega network hash construction
by: Chuah, Chai Wen
Published: (2009)
by: Chuah, Chai Wen
Published: (2009)
Sensual Semantic Analysis for Effective Query Expansion
by: Raza, Muhammad Ahsan, et al.
Published: (2018)
by: Raza, Muhammad Ahsan, et al.
Published: (2018)
A survey of statistical approaches for query expansion
by: Raza, Muhammad Ahsan, et al.
Published: (2018)
by: Raza, Muhammad Ahsan, et al.
Published: (2018)
A skyline query processing approach over interval uncertain data stream with K-means clustering technique
by: Dzolkhifli, Zarina, et al.
Published: (2019)
by: Dzolkhifli, Zarina, et al.
Published: (2019)
Skyline query processing for incomplete data in cloud environment
by: Gulzar, Yonis, et al.
Published: (2017)
by: Gulzar, Yonis, et al.
Published: (2017)
Skyline queries computation on crowdsourced-
enabled incomplete database
by: Swidan, Marwa, et al.
Published: (2020)
by: Swidan, Marwa, et al.
Published: (2020)
PalmHashing: a novel approach for cancelable biometrics
by: Tee, Connie, et al.
Published: (2005)
by: Tee, Connie, et al.
Published: (2005)
Similar Items
-
JQPro : Join query processing in a distributed system for big RDF data using the hash-merge join technique
by: Elzein, Nahla Mohammed, et al.
Published: (2023) -
Distributed Join Query Processing for Big RDF Data
by: Elzein, Nahla Mohammed, et al.
Published: (2018) -
Managing big RDF data in clouds: challenges, opportunities, and solutions
by: Nahla, Mohammed Elzein, et al.
Published: (2018) -
Equi-join table optimization technique for temporal data
by: Mohd Rahim, Mohd Shafry, et al.
Published: (2007) -
Implementation of Parallel Collection Equi-Join Using MPI
by: Lee, Nung Kion, et al.
Published: (2002)