4.5 Article

A survey of statistical approaches for query expansion

Journal

KNOWLEDGE AND INFORMATION SYSTEMS
Volume 61, Issue 1, Pages 1-25

Publisher

SPRINGER LONDON LTD
DOI: 10.1007/s10115-018-1269-8

Keywords

Information retrieval; Statistical approaches; Query expansion; Document analysis; Query log analysis

Ask authors/readers for more resources

A major issue in effective information retrieval is the problem of vocabulary mismatches. The method called query expansion addresses this issue by reformulating each search query with additional terms that better define the information needs of the user. Many researchers have contributed to improving the accuracy of information retrieval systems, through different approaches to query expansion. In this article, we primarily discuss statistical query expansion approaches that include document analysis, search and browse log analyses, and web knowledge analyses. In addition to proposing a comprehensive classification for these approaches, we also briefly analyse the pros and cons of each technique. Finally, we evaluate these techniques using five functional features and experimental settings such as TREC collection and results of performance metrics. An in-depth survey of different statistical query expansion approaches suggests that the selection of the best approach depends on the type of search query, the nature and availability of data resources, and performance efficiency requirements.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Engineering, Civil

Architecture for Resource Allocation in the Internet of Vehicles for Cooperating Driving System

Nafeesa Kalsoom, Iftikhar Ahmad, Roobaea Alroobaea, Muhammad Ahsan Raza, Samina Khalid, Zaheed Ahmed, Ihsan Ali

Summary: Internet of Vehicles (IoV) is a complex system consisting of vehicles, humans, and sensors, which improves communication among vehicles on the roads. Quality of service (QoS) enabled by the cooperative driving system (CDS) based on 5G technology enhances road traffic efficiency. To improve QoS for CDS, a 5G network-based architecture and D2D technology-based resource allocation scheme were proposed, along with a density-based scattered clustering algorithm for vehicular clustering. The proposed scheme shows significant improvement in throughput compared to existing D2D approaches.

JOURNAL OF ADVANCED TRANSPORTATION (2021)

Article Computer Science, Information Systems

Lightweight Statistical Approach towards TCP SYN Flood DDoS Attack Detection and Mitigation in SDN Environment

Sehrish Batool, Farrukh Zeeshan Khan, Syed Qaiser Ali Shah, Muneer Ahmed, Roobaea Alroobaea, Abdullah M. Baqasah, Ihsan Ali, Muhammad Ahsan Raza

Summary: Distributed Denial of Service (DDoS) attack is a lethal attack in traditional network architecture where the attacker overwhelms network resources using botnets. Software-defined networking (SDN) is suggested as a solution to fight DDoS attacks, and an entropy-based statistical approach is proposed to detect and mitigate these attacks.

SECURITY AND COMMUNICATION NETWORKS (2022)

Article Computer Science, Information Systems

IoT Devices, User Authentication, and Data Management in a Secure, Validated Manner through the Blockchain System

Talha Ahsan, Farrukh Zeeshan Khan, Zeshan Iqbal, Muneer Ahmed, Roobaea Alroobaea, Abdullah M. Baqasah, Ihsan Ali, Muhammad Ahsan Raza

Summary: Advancement in technology has led to an increasing number of IoT devices, but security remains a challenge. This paper proposes using blockchain-embedded algorithms for authentication and access control of IoT devices, providing a decentralized and secure solution.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2022)

Review Multidisciplinary Sciences

Assessing the impact of socio-technical congruence in software development: a systematic literature review

Binish Raza, Rodina Ahmad, Mohd H. N. M. Nasir, Shukor S. M. Fauzi, Muhammad A. Raza

Summary: Software development relies on team coordination, with social-technical congruence (STC) being a key technique to measure alignment. A systematic literature review (SLR) identified the need for further research on STC, including risk issues, measurement techniques, and development factors.

KUWAIT JOURNAL OF SCIENCE (2022)

Article Computer Science, Information Systems

A new fitness function for tuning parameters of Peripheral Integral Derivative Controllers

Julius Beneoluchi Odili, A. Noraziah, Asegunloluwa Eunice Babalola

Summary: In recent years, control system engineering has become increasingly important in industrial processes. This paper critically examines the fitness functions used for metaheuristic tuning of PID controllers and introduces a new fitness function with experimental evidence of its effectiveness. The paper suggests further research on the application of this fitness function due to its simplicity and ease of use.

ICT EXPRESS (2022)

Correction Engineering, Electrical & Electronic

Structural, dielectric, and magnetic properties of CaBaCo2-xZnxNdyFe12-yO22 Y-type hexaferrites (vol 33, pg 6294, 2022)

Muhammad Nadeem, Hasan M. Khan, Saeed Ahmad Buzdar, Javed Ahmed, Mohammed A. Assiri, Muhammad Imran, Mohammad Ehsan Mazhar, Mehrun Nisa, Muhammad Ahsan Raza, Binish Raza, Mohammad Jamshed

JOURNAL OF MATERIALS SCIENCE-MATERIALS IN ELECTRONICS (2022)

Article Chemistry, Multidisciplinary

Image Watermarking Scheme Using LSB and Image Gradient

Zaid Bin Faheem, Mubashir Ali, Muhammad Ahsan Raza, Farrukh Arslan, Jehad Ali, Mehedi Masud, Mohammad Shorfuzzaman

Summary: This paper proposes a digital watermarking technique based on the least significant bit, image gradient, and chaotic map. The watermark signal is embedded in the image by modifying the least significant bits according to the image gradient, and it exhibits high robustness against various attacks while maintaining imperceptibility.

APPLIED SCIENCES-BASEL (2022)

Review Computer Science, Information Systems

A Survey on MAC-Based Physical Layer Security over Wireless Sensor Network

Attique Ur Rehman, Muhammad Sajid Mahmood, Muhammad Ahsan Raza, Fahad Qaswar, Sumayh S. Aljameel, Irfan Ullah Khan, Nida Aslam

Summary: Physical layer security for wireless sensor networks is a critical issue. Challenges include data security in wireless transmission and threats to the physical security of networks. The paper surveys parameters of a security design model and discusses attacks and mitigation techniques at different layers. Additionally, it introduces applications of WSNs in various fields and proposes a solution to enhance WSN security.

ELECTRONICS (2022)

Article Multidisciplinary Sciences

Stochastic process and tutorial of the African buffalo optimization

Julius Beneoluchi Odili, A. Noraziah, Basem Alkazemi, M. Zarina

Summary: This paper presents the data description of the African buffalo optimization algorithm (ABO). The algorithm is inspired by the migrant behaviour of African buffalos and aims to provide a user-friendly and reproducible optimization algorithm. The paper describes the manual workings of the algorithm and verifies its effectiveness through practical implementation. This contribution is of significant importance to the research community.

SCIENTIFIC REPORTS (2022)

Article Medicine, General & Internal

An Efficient Deep Learning-Based Skin Cancer Classifier for an Imbalanced Dataset

Talha Mahboob Alam, Kamran Shaukat, Waseem Ahmad Khan, Ibrahim A. Hameed, Latifah Abd Almuqren, Muhammad Ahsan Raza, Memoona Aslam, Suhuai Luo

Summary: This study proposes a deep learning-based skin cancer detection method using data augmentation to address the issue of data imbalance. Experimental results using the Skin Cancer MNIST: HAM10000 dataset show that the proposed method outperforms conventional methods in terms of accuracy, F1-score, and ROC curve.

DIAGNOSTICS (2022)

Article Chemistry, Multidisciplinary

Ecological and Confined Domain Ontology Construction Scheme Using Concept Clustering for Knowledge Management

Khalid Mahmood, Rahmah Mokhtar, Muhammad Ahsan Raza, A. Noraziah, Basem Alkazemi

Summary: Knowledge management in a structured system is a complex task that requires common, standardized methods. This research proposes an enhanced ecological and confined domain ontology construction (EC-DOC) scheme, which includes five important phases such as conceptualization and clustering. The EC-DOC scheme can provide accurate domain concepts and make them available in a preferred local language.

APPLIED SCIENCES-BASEL (2023)

Review Computer Science, Information Systems

Applications of Ontology in the Internet of Things: A Systematic Analysis

Fahad Qaswar, M. Rahmah, Muhammad Ahsan Raza, A. Noraziah, Basem Alkazemi, Z. Fauziah, Mohd. Khairul Azmi Hassan, Ahmed Sharaf

Summary: This research conducted a systematic literature review to analyze the use of ontology in the Internet of Things (IoT). The findings show that ontologies are needed in the IoT field to minimize interoperability and integration issues, and there are existing ontologies that can be used for this purpose. Therefore, ontology is beneficial for achieving interoperability, integration, and privacy in the IoT.

ELECTRONICS (2023)

Article Computer Science, Information Systems

Optimal Deep Reinforcement Learning for Intrusion Detection in UAVs

V. Praveena, A. Vijayaraj, P. Chinnasamy, Ihsan Ali, Roobaea Alroobaea, Saleh Yahya Alyahyan, Muhammad Ahsan Raza

Summary: Recently, the use of intelligent UAV networks in the Internet of Things technology has received a lot of attention, but network security remains a significant challenge. Traditional intrusion detection systems are not suitable for modern networks with high bandwidth and data traffic. Researchers have tried to improve intrusion detection performance by employing machine learning and deep learning algorithms. This research proposes a deep reinforcement learning technique optimized by the Black Widow Optimization algorithm to enhance intrusion detection in UAV networks, and extensive experimental analysis demonstrates its superiority.

CMC-COMPUTERS MATERIALS & CONTINUA (2022)

No Data Available