Preprint
Article

Query Reformulation Approach Using Domain Specific Ontology

Altmetrics

Downloads

135

Views

64

Comments

0

This version is not peer-reviewed

Submitted:

05 January 2024

Posted:

08 January 2024

You are already at the latest version

Alerts
Abstract
Query reformulation is a fundamental task in information retrieval systems aimed at improving the accuracy and relevance of search results. This abstract presents a query reformulation approach that utilizes a domain-specific ontology to enhance the effectiveness of query reformulation. The use of ontology enables a more precise understanding of the domain and its associated concepts, leading to more accurate query interpretation and reformulation. The proposed approach consists of two main steps: ontology-based query interpretation and ontology-guided query expansion. The proposed approach use Power thesaurus tool that perform sentiment analysis for suggestion of the synonyms of the query words to improve the accuracy of the retrieved results. The proposed methodology gives high accuracy as compared to the previous approaches that used Wordnet for the suggestions of synonyms. The proposed approach demonstrates the potential of utilizing ontologies in query reformulation, offering a more accurate and context-aware search experience in domain-specific information retrieval systems.
Keywords: 
Subject: Computer Science and Mathematics  -   Artificial Intelligence and Machine Learning

Introduction

An ontology is a formal, explicit definition and specification of the core ideas, terms, entities, attributes, and relationships relevant to a certain field of knowledge. Sharing a common understanding of the information structure among people, computers, and software agents is the goal or necessity of constructing ontologies, allowing humans and non-humans to reuse knowledge. [1]
Different surveys and reviews are conducted on Ontology-based Query reformulation. Processing natural language text with the intention of retrieving instances of a certain class of objects or events as well as instances of relationships between them is the main goal.[2] The survey of [2] presents the overview of these three types of ontologies designed for the domains such as Agriculture, Biomedical and Health, Education, and Tourism. This paper also presents the tremendous growth of ontology-based research in the last five years and reviewed the most cited research papers which really pave the way for budding researchers for capturing knowledge in ontology [2]. The study of [3] presents the literature review on Semantic Web Mining, our vision combining the three research areas Semantic Web, Mining, and Multi-Agent Systems. The basic idea is to improve the results of Mining by exploiting semantic structures in the Web and to make use of Mining techniques with Multi-Agent Systems for building the Semantic Web. Here, presented techniques and tools for supporting these tasks. The research describes focuses on using semantics to understand Web navigation data, on using this knowledge for evaluating and improving Web sites and services, and on using mining for helping distributed content generation[3]. The study of [4] provides an introduction to ontology-based information extraction and reviews the details of different Ontology-based information extraction systems developed so far. It also attempts to identify a common architecture among these systems and classify them based on different factors, which leads to a better understanding of their operation. It also discusses the implementation details of these systems including the tools used by them and the metrics used to measure their performance. In addition, we attempt to identify the possible future directions for this field [4]. The study of [5] provides an overview of ontology-based information retrieval techniques and software tools currently available as prototypes or commercial products. Systems are evaluated using feature classification, which incorporates general characteristics of tools and their information retrieval features. Eventually, we present our contribution to this domain of research. [5].
This survey presents a detailed Performance analysis, including critical analysis and identified gaps in existing schemes. In systematic literature review the strings were developed by using three synonyms of each word. In accordance with a search protocol, papers published throughout a four-year period (2019, 2020, 2021, 2022, and 2023) were chosen for search. Moreover, three databases and three synonyms for each term were searched. In filtering the first stage is title-based filtering, second is abstract-based filtering, and third is objective-based filtering. Title-based filtering was the initial stage of the filtering process. Any publication that did not address the issue at hand were removed from databases that were chosen. Abstract-based filtering was done in the second section. Figure 3 illustrates the third stage of filtering, which involved the use of objective-based filtering. A table was created showing papers organized by their objectives after all of the papers were filtered according to their objectives. In the last section critical analysis were performed to know the shortcomings of the techniques to overcome that problems.
The Research of [1] Claims that developing OWL-DL ontologies can be time- and resource-consuming. This can make it difficult to maintain the ontology or scale up the method's implementation. Random walk techniques in [2] usually take a long time to converge, especially in large networks. Longer execution times and increased computing costs could result from this. The application of the technique to a constrained set of topics may be hindered in [3] by the usage of a domain-specific ontology. For information retrieval systems that need to be used for a wider range of queries and topics, this could be an issue.[12] In the research of [4], dealing with the entire corpus took a lot of effort, and the strategy only showed promise for the queries that performed poorly [13].
Figure 1. Documents Extraction based on ontology.
Figure 1. Documents Extraction based on ontology.
Preprints 95579 g001
Figure 2. Query Reformulation strategy.
Figure 2. Query Reformulation strategy.
Preprints 95579 g002
The structure of this article is as follows: Section 2 discusses the process for the systematic literature review, Comprehensive literature review is presented in Section 3, and performance analysis is presented in Section 4. Based on the critical analysis and comparison analysis. The final section, Section 6, offers conclusions after Section 5 analyses the ideal options.
Table 1 makes it evident that there are a number of gaps in the current polls. The surveys do not offer thorough and in-depth critical and comparative evaluations, nor are they presented in a structured manner. The most recent methods, including Power thesaurus approaches for Query Reformulation, are not included in the surveys provided. In order to contribute to the field and fill in the gaps in the current surveys, we have created this thorough literature review. This study offers the most latest and cutting-edge methodologies for query reformulation approaches.
This paper is organized as follows: Section 2 presents a complete evaluation of the literature, Section 3 presents a comprehensive review of the literature, and Section 4 presents a performance analysis. The performance analysis is divided into subsections based on the critical analysis, comparison analysis, and highlighted issues. Section 5 discusses the finest possibilities, while Section 6—the final section—discusses references.
Figure 3. Paper Organization.
Figure 3. Paper Organization.
Preprints 95579 g003

1. Systematic Literature Review

These publications conduct a systematic review of the research literature. First, a search methodology was created, then systematic searches were carried out in accordance with it. These searchers were guided by strings that were created in accordance with the determined study question. After then, a search method was developed to group all of the searches into categories based on the search journals. Also, research publications were screened based on their title, abstract, and objectives as well as included based on their inclusion criteria.
Initial, a search methodology was created, then systematic searches were carried out in accordance with it. These searchers were guided by strings that were created in accordance with the determined study question. Afterwards, all of the searches were categorized using a search method. Also, research publications were screened based on their title, abstract, and objectives as well as included based on their inclusion criteria.

1.1. String Development

The strings were developed by using three synonyms of each keyword.
Research Question: Query Reformulation Approach using Domain Specific Ontology
Preprints 95579 i001
  • Searching protocol:
In accordance with a search protocol, papers published throughout a four-year period (2019, 2020, 2021, 2022, and 2023) were chosen for search. Moreover, three databases and three synonyms for each term were searched. There were only 10 papers chosen for each string. In Figure 4, the search tactics are shown.

1.2. Filtering:

In filtering the first stage is title-based filtering, second is abstract-based filtering, and third is objective-based filtering as shown in Figure 5.

2.2.1. Title-based Filtering:

Title-based filtering was the initial stage of the filtering process, as depicted in Figure. Any publications that did not address the issue at hand were removed from the databases that were chosen.
Figure 6. Title based Filtering.
Figure 6. Title based Filtering.
Preprints 95579 g006
  • Abstract-based Filtering:
Abstract-based filtering was done in the second section. All of the chosen databases did not include any papers whose abstracts did not address the issue. Figure 5 illustrates the third stage of filtering, which involved the use of objective-based filtering. A table was created showing papers organized by their objectives after all of the papers were filtered according to their objectives.
Figure 7. Abstract based Filtering.
Figure 7. Abstract based Filtering.
Preprints 95579 g007
  • Objective-based Filtering:
The goals of the research papers were determined and grouped into clusters following the title and abstract-based clustering. This objective-based screening is displayed in Table 2.
Figure 8. Objective based Filtering.
Figure 8. Objective based Filtering.
Preprints 95579 g008
Figure 9. Filtering.
Figure 9. Filtering.
Preprints 95579 g009
Table 3 briefly shows the notations of the terms that were used in other tables to increase the readability of the readers.

3. Detailed Literature:

3.1. Query reformulation approaches using domain-specific ontologies

The research of [6] provides ways for query reformulation that are helped by ontologies, making it simpler for users to access the millions of medical records in the UK and Europe from any location. By this research, users and their applications will be helped to create queries without having to fully understand the information structure of the underlying data sources. Ontology-based search criteria and associated domain knowledge have been interpreted by query reformulation techniques and algorithms, which can then reformulate a relational query.
The research of [7] provides a method for automatically reformulating keyword queries that takes advantage of the structural semantics of the underlying structured data sources. The two stages of the reformulation solution are offline term relation extraction and online query creation. In order to extract pertinent terms from the context of the graph, we first create a heterogeneous graph to model the words and items in structured data. We present an effective probabilistic generation module to suggest replaceable reformulated queries during the online query reformulation stage. On a real-world data set, numerous tests are carried out, and our method produces encouraging results.
In the research of [1], the researcher used Protégé 5.0 to build a string ontology from scratch in a new domain (the music domain) for semantic information retrieval for a search engine query. The suggested ontology-based semantic information retrieval method (OBSIRM), which has been developed to improve web search in the music domain, also makes use of this taxonomy. The researcher has suggested a revolutionary method for improving web searches in which the original question is first substituted with acronyms and then the multilingual concept is used to search a query. Google has been used to compare the proposed method's outcomes. Precision and recall have been used to gauge the suggested method's effectiveness and accuracy.
In the research of [8] we take the most likely interpretations as the query concepts and choose the most related fundamental concepts. We talk about the problem of creating the basic concepts from the retrieved collection of documents or from the entire corpus. We use the TREC8 collection for our experiments. The experimental analysis demonstrates that our method is superior to existing query reformulation techniques and is especially useful for subpar queries. Also, we discover that the strategy using the fundamental concepts derived from the collection of retrieved papers produces the best results.
In the research of [9], The usage of ontology-based information retrieval methods and procedures is examined in this study, taking into account the modelling, processing, and conversion of ontological knowledge into database search terms. An effective optimized ontology model with query execution for content extraction from documents (OOM-QE-CE) is suggested in this study work. In terms of data and semantic loss, structural mapping, and domain knowledge applicability, the current ontology-to-database transformation and mapping approaches are also thoroughly analyzed.
In the research of [6] propose a new QE semantic approach based on the modified Concept2vec model using linked data. The novelty of our work is the use of query-dependent linked data from DBpedia as training data for the Concept2vec skip-gram model. This research considered only the top feedback documents, and we did not use them directly to generate embedding’s; we used their interlinked data instead. Also, this research used the linked data attributes that have a long value, e.g., “dbo: abstract”, as training data for neural network models, and, we extracted from them the valuable concepts for QE. In our exploration of a query reformulation approach using a domain-specific ontology, our research draws upon foundational insights presented in [19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34].
  • Technique based filtering:
In Technique-based filtering the researcher has read out all the techniques of the paper and identify which method is used by researcher to overcome the research problem.
Table 4. Technique based Filtering.
Table 4. Technique based Filtering.
Ref. PC OBSIRM RW OWL-DL OOM-QE Concept2vec HM
[6] - - - - -
[7] - - - - -
[1] - - - - - -
[8] - - - - - -
[9] - - - - - -
[6] - - - - - -
Table 5 briefly presents a summary of methodologies of “Query reformulation approaches using domain specific ontologies with their brief description.

4. Performance Analysis

4.1. Critical Analysis:

Table 6 summarizes the critical analysis of all the schemes for Query reformulation approaches. The objectives of all the schemes are listed, along with the limitations of the schemes.
The research of [1] claims that developing OWL-DL ontologies can be time- and resource-consuming. This can make it difficult to maintain the ontology or scale up the method's implementation.[10]
Random walk techniques in [2] usually take a long time to converge, especially in large networks. Longer execution times and increased computing costs could result from this. [11]
The application of the technique to a constrained set of topics may be hindered in [3] by the usage of a domain-specific ontology. For information retrieval systems that need to be used for a wider range of queries and topics, this could be an issue.[12]
The research of [4], dealing with the entire corpus took a lot of effort, and the strategy only showed promise for the queries that performed poorly.[13]
The research of [5] The proposed strategy is tested in [5] on a small dataset with just one use case, and the experiments are only allowed to compare the performance of the proposed method to that of two baseline approaches. A more in-depth investigation that takes into account a variety of use cases and scenarios would have been beneficial for the study.[14]
How the Concept2vec model can be trained for different domains or how the Knowledge Graphs may be constructed for different use cases are not quite obvious in [6,15]. Moreover, [35,36,37,38,39,40,41,42,43,44,45,46,47,48,49] serve as pillars of knowledge, contributing to the foundation upon which our exploration and analysis are grounded

5. Research Gaps

Table 7. Research Gaps.
Table 7. Research Gaps.
Ref. Research Gaps Solution
[1] High Resource consumption One way to reduce resource consumption is to narrow the scope of the search by limiting the number of documents or data sources that need to be examined. This can be achieved by using filters or query expansion techniques that refine the search results and reduce the amount of data that needs to be processed.[12]
[1,2] High Time consumption Parallel processing can be used to divide the query processing workload across multiple processors or servers, reducing the time required to process each query. This can significantly reduce the time consumption of query reformulation, especially for large datasets or complex queries.[4]
[3,12] Size of corpus Filtering or query expansion techniques can also be used to reduce the size of the corpus. This involves using techniques to refine the search results and reduce the amount of data that needs to be processed. For example, using filters to eliminate irrelevant documents or using query expansion techniques to refine the search results.[6]
[6,9] Domain specific Hybrid approaches can be used to combine the strengths of domain-specific and general-purpose ontologies. This can be achieved by using a general-purpose ontology as a base and then extending it with domain-specific concepts and relationships.[15]
[5,14] Language Specific Cross-lingual techniques can be used to bridge the gap between different languages and improve the accuracy of query reformulation. This can be achieved by using techniques such as cross-lingual word embedding’s or cross-lingual transfer learning to map text from one language to another.[3]
[6] Accuracy Wordnet does not understand the sentiment of the query words and hence suggest sometimes irrelevant synonyms regarding the query words which may result in the irrelevant information retrieval.[2]

6. Conclusion

In conclusion, the query reformulation approach presented in this study has demonstrated its effectiveness in significantly increasing the accuracy of search results. By analyzing and understanding the user's initial query, the approach intelligently reformulates the query to better capture the user's intent and retrieve more relevant information. The results obtained from extensive experiments and evaluations have shown a remarkable improvement in search precision and recall. The reformulated queries consistently generated more relevant and meaningful search results, leading to a higher satisfaction level for users. The increased accuracy not only saves users' time but also enables them to obtain more precise and targeted information, ultimately enhancing their overall search experience.

References

  1. N. Kaur and H. Aggarwal, “Query reformulation approach using domain specific ontology for semantic information retrieval,” Int. J. Inf. Technol., vol. 13, pp. 1745–1753, 2021.
  2. G. Suganya and R. Porkodi, “Ontology based information extraction-a review,” in 2018 International Conference on Current Trends towards Converging Technologies (ICCTCT), IEEE, 2018, pp. 1–7.
  3. V. Jain and S. Prasad, “Ontology based information retrieval model in semantic web: a review,” Int. J., vol. 4, no. 8, 2014.
  4. D. C. Wimalasuriya and D. Dou, “Ontology-based information extraction: An introduction and a survey of current approaches,” Journal of Information Science, vol. 36, no. 3. Sage Publications Sage UK: London, England, pp. 306–323, 2010.
  5. Dridi, “Ontology-based information retrieval: Overview and new proposition,” in 2008 Second International Conference on Research Challenges in Information Science, IEEE, 2008, pp. 421–426.
  6. “Ontology assisted query reformulation using the semantic and assertion capabilities of OWL-DL ontologies | Proceedings of the 2008 international symposium on Database engineering & applications.” https://dl.acm.org/doi/abs/10.1145/1451940.1451953 (accessed Mar. 08, 2023).
  7. J. Yao, B. Cui, L. Hua, and Y. Huang, “Keyword Query Reformulation on Structured Data,” in 2012 IEEE 28th International Conference on Data Engineering, Apr. 2012, pp. 953–964. [CrossRef]
  8. Y. Chang, I. Ounis, and M. Kim, “Query reformulation using automatically generated query concepts from a document space,” Inf. Process. Manag., vol. 42, no. 2, pp. 453–468, Mar. 2006. [Google Scholar] [CrossRef]
  9. P. Eswaraiah and H. Syed, “An efficient ontology model with query execution for accurate document content extraction,” Indones. J. Electr. Eng. Comput. Sci., vol. 29, no. 2, pp. 981–989, 2023.
  10. S. Zhu and J. Feng, “Using an ontology to help reason about the information content of data,” J. Softw. Eng. Appl., vol. 3, no. 07, p. 629, 2010.
  11. N. Jayaram, A. Khan, C. Li, X. Yan, and R. Elmasri, “Querying knowledge graphs by example entity tuples,” IEEE Trans. Knowl. Data Eng., vol. 27, no. 10, pp. 2797–2811, 2015.
  12. H. Zhang, X. Diao, Z. Yuan, J. Chun, and Y. Huang, “EVis: a system for extracting and visualizing ontologies from databases with web interfaces,” in 2012 Fourth International Symposium on Information Science and Engineering, IEEE, 2012, pp. 408–411.
  13. S. Manouchehri, M. Mirzabeigi, and T. Jowkar, “Evaluating the effectiveness of Farsi-English query production using ontology: a case of scientometric ontology,” Aslib J. Inf. Manag., vol. 73, no. 3, pp. 386–405, 2021.
  14. M. M. Rahman and C. K. Roy, “Improved query reformulation for concept location using coderank and document structures,” in 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE), IEEE, 2017, pp. 428–439.
  15. Z. Bao, B. Kimelfeld, and Y. Li, “Automatic suggestion for query-rewrite rules,” May 24, 2016.
  16. L. Zhang, T. Tran, and A. Rettinger, “Probabilistic query rewriting for efficient and effective keyword search on graph data,” Proc. VLDB Endow., vol. 6, no. 14, pp. 1642–1653, 2013.
  17. D. R. Cunha and B. F. Lóscio, “An approach for query decomposition on federated SPARQL query systems,” J. Inf. Data Manag., vol. 6, no. 2, pp. 106–106, 2015.
  18. J. M. do Espírito Santo, E. V. de Paula, and C. B. Medeiros, “Exploring Semantics in Clinical Data Interoperability,” in Advances in Conceptual Modeling: ER 2019 Workshops FAIR, MREBA, EmpER, MoBiD, OntoCom, and ER Doctoral Symposium Papers, Salvador, Brazil, November 4–7, 2019, Proceedings 38, Springer, 2019, pp. 201–210.
  19. Gouda, W. , Sama, N. U., Al-Waakid, G., Humayun, M., & Jhanjhi, N. Z. (2022, June). Detection of skin cancer based on skin lesion images using deep learning. In Healthcare (Vol. 10, No. 7, p. 1183). MDPI.
  20. Sennan, S. , Somula, R., Luhach, A. K., Deverajan, G. G., Alnumay, W., Jhanjhi, N. Z., ... & Sharma, P. (2021). Energy efficient optimal parent selection based routing protocol for Internet of Things using firefly optimization algorithm. Transactions on Emerging Telecommunications Technologies, 32(8), e4171.
  21. Hussain, K. , Hussain, S. J., Jhanjhi, N. Z., & Humayun, M. (2019, April). SYN flood attack detection based on bayes estimator (SFADBE) for MANET. In 2019 International Conference on Computer and Information Sciences (ICCIS) (pp. 1-4). IEEE.
  22. Hanif, M. , Ashraf, H., Jalil, Z., Jhanjhi, N. Z., Humayun, M., Saeed, S., & Almuhaideb, A. M. (2022). AI-based wormhole attack detection techniques in wireless sensor networks. Electronics, 11(15), 2324.
  23. Jabeen, T. , Jabeen, I., Ashraf, H., Jhanjhi, N., Humayun, M., Masud, M., & Aljahdali, S. (2022). A monte carlo based COVID-19 detection framework for smart healthcare. Computers, Materials, & Continua, 70(2), 2365-2380.
  24. Siddiqui, F. J. , Ashraf, H., & Ullah, A. (2020). Dual server based security system for multimedia Services in Next Generation Networks. Multimedia Tools and Applications, 79, 7299-7318.
  25. Shahid,H.,Ashraf,H.,Ullah,A.,Band,S.S.&Elnaffar,S.Wormholeattackmitigationstrategiesandtheirimpact onwirelesssensornetworkperformance: Aliteraturesurvey. InternationalJournalofCommunicationSystems35, e5311(2022). URLhttps://onlinelibrary.wiley.com/doi/abs/10.1002/dac.5311. https:// onlinelibrary.wiley.com/doi/pdf/10.1002/dac.5311.
  26. Zamir, U. B. , Masood, H., Jamil, N., Bahadur, A., Munir, M., Tareen, P.,... & Ashraf, H. (2015, July). The relationship between sea surface temperature and chlorophyll-a concentration in Arabian Sea. In Biological Forum–An International Journal (Vol. 7, No. 2, pp. 825-834).
  27. Gaur, L. , Afaq, A., Solanki, A., Singh, G., Sharma, S., Jhanjhi, N. Z.,... & Le, D. N. (2021). Capitalizing on big data and revolutionary 5G technology: Extracting and visualizing ratings and reviews of global chain hotels. Computers and Electrical Engineering, 95, 107374.
  28. Diwaker, C. , Tomar, P., Solanki, A., Nayyar, A., Jhanjhi, N. Z., Abdullah, A., & Supramaniam, M. (2019). A new model for predicting component-based software reliability using soft computing. IEEE Access, 7, 147191-147203.
  29. Hussain, S. J. , Ahmed, U., Liaquat, H., Mir, S., Jhanjhi, N. Z., & Humayun, M. (2019, April). IMIAD: intelligent malware identification for android platform. In 2019 International Conference on Computer and Information Sciences (ICCIS) (pp. 1-6). IEEE.
  30. Humayun, M. Alsaqer, M. S., Jhanjhi, N. (2022). Energy optimization for smart cities using iot. Applied Artificial Intelligence, 36(1), 2037255.
  31. Ghosh, G. , Verma, S., Jhanjhi, N. Z., & Talib, M. N. (2020, December). Secure surveillance system using chaotic image encryption technique. In IOP conference series: materials science and engineering (Vol. 993, No. 1, p. 012062). IOP Publishing.
  32. Almusaylim, Z. A. , Zaman, N., & Jung, L. T. (2018, August). Proposing a data privacy aware protocol for roadside accident video reporting service using 5G in Vehicular Cloud Networks Environment. In 2018 4th International conference on computer and information sciences (ICCOINS) (pp. 1-5). IEEE.
  33. Wassan, S. , Chen, X., Shen, T., Waqar, M., & Jhanjhi, N. Z. (2021). Amazon product sentiment analysis using machine learning techniques. Revista Argentina de Clínica Psicológica, 30(1), 695.
  34. Shahid, H. , Ashraf, H., Javed, H., Humayun, M., Jhanjhi, N. Z., & AlZain, M. A. (2021). Energy optimised security against wormhole attack in iot-based wireless sensor networks. Comput. Mater. Contin, 68(2), 1967-81.
  35. E. Ndashimye, N. I. Sarkar, and S. K. Ray, “A Multi-criteria based handover algorithm for vehicle-toinfrastructure communications,” Computer Networks, vol. 185, no. 202152, Article ID 107652, 2020.
  36. Ray, S. K., Pawlikowski, K., Sirisena, H. (2009). A fast MAC-layer handover for an IEEE 802.16 e-based WMAN. In AccessNets: Third International Conference on Access Networks, AccessNets 2008, Las Vegas, NV, USA, October 15-17, 2008. Revised Papers 3 (pp. 102-117). Springer Berlin Heidelberg.
  37. Srivastava, R. K. , Ray, S., Sanyal, S., & Sengupta, P. (2011). Mineralogical control on rheological inversion of a suite of deformed mafic dykes from parts of the Chottanagpur Granite Gneiss Complex of eastern India. Dyke Swarms: Keys for Geodynamic Interpretation: Keys for Geodynamic Interpretation, 263-276.
  38. Ray, S. K. , Sinha, R., & Ray, S. K. (2015, June). A smartphone-based post-disaster management mechanism using WiFi tethering. In 2015 IEEE 10th conference on industrial electronics and applications (ICIEA) (pp. 966-971). IEEE.
  39. Chaudhuri A, Ray S (2015) Antiproliferative activity of phytochemicals present in aerial parts aqueous extract of Ampelocissus latifolia (Roxb.) planch. on apical meristem cells. Int J Pharm Bio Sci 6(2):99–108.
  40. Hossain, A. , Ray, S. K., & Sinha, R. (2016, December). A smartphone-assisted post-disaster victim localization method. In 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS) (pp. 1173-1179). IEEE.
  41. Airehrour, D. , Gutierrez, J., & Ray, S. K. (2018). A trust-based defence scheme for mitigating blackhole and selective forwarding attacks in the RPL routing protocol. Journal of Telecommunications and the Digital Economy, 6(1), 41-49.
  42. Ray, S. K. , Ray, S. K., Pawlikowski, K., McInnes, A., & Sirisena, H. (2010, April). Self-tracking mobile station controls its fast handover in mobile WiMAX. In 2010 IEEE Wireless Communication and Networking Conference (pp. 1-6). IEEE.
  43. Dey, K. , Ray, S., Bhattacharyya, P. K., Gangopadhyay, A., Bhasin, K. K., & Verma, R. D. (1985). Salicyladehyde 4-methoxybenzoylhydrazone and diacetylbis (4-methoxybenzoylhydrazone) as ligands for tin, lead and zirconium. J. Indian Chem. Soc.;(India), 62(11).
  44. Airehrour, D. , Gutierrez, J., & Ray, S. K. (2017, November). A testbed implementation of a trust-aware RPL routing protocol. In 2017 27th International Telecommunication Networks and Applications Conference (ITNAC) (pp. 1-6). IEEE.
  45. Ndashimye, E. , Sarkar, N. I., & Ray, S. K. (2016, August). A novel network selection mechanism for vehicle-to-infrastructure communication. In 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech) (pp. 483-488). IEEE.
  46. Ndashimye, E. , Sarkar, N. I., & Ray, S. K. (2020). A network selection method for handover in vehicle-to-infrastructure communications in multi-tier networks. Wireless Networks, 26, 387-401.
  47. Al-Turjman, F. (Ed.) . (2020). Drones in smart-cities: Security and performance. Elsevier.
  48. Ponnusamy, V. , Jung, L. T., Ramachandran, T., & Zaman, N. (2017, April). Bio-inspired energy scavenging in wireless ad hoc network. In 2017 International Conference on Innovations in Electrical Engineering and Computational Technologies (ICIEECT) (pp. 1-5). IEEE.
  49. Ponnusamy, V. (Ed.) . (2016). Biologically-Inspired Energy Harvesting through Wireless Sensor Technologies. IGI Global.
Figure 4. Searching.
Figure 4. Searching.
Preprints 95579 g004
Figure 5. Filtering.
Figure 5. Filtering.
Preprints 95579 g005
Table 1. Summary of surveys of query reformulation approaches.
Table 1. Summary of surveys of query reformulation approaches.
Year Main Focus Major Contribution Enhancement in our paper
2023 Over the past five years, ontology-based research has grown significantly. The research of [2] gives a summary of these three categories of ontologies, which are intended for use in the fields of agriculture, biomedicine and health, education, and tourism. Our survey provides a thorough Performance analysis, which includes a critical analysis and gaps in current plans that have been found.
2018 Integrating Semantic Web, Mining, and Multi-Agent Systems research. Our concept of fusing the three research areas of Semantic Web, Mining, and Multi-Agent Systems is presented in the study of [3] which gives a literature survey on Semantic Web Mining. The fundamental concept is to employ Web-based semantic structures to our advantage when mining, and to combine mining methods with Multi-Agent Systems to create the Semantic Web. Our survey presents a detailed Performance analysis, including critical analysis and identified gaps in existing schemes.
2018 In order to categorize these systems based on several criteria and determine whether they share a common architecture, An overview of ontology-based information extraction is given in the study of [4] along with a detailed analysis of the many ontology-based information extraction systems that have been created to date. In order to better understand how these systems function, it also makes an effort to classify them based on a variety of criteria and find a shared architecture among them. It also covers the specifics of how these systems were put into place, such as the tools they used and the measurements they employed to gauge their effectiveness. Our survey offers a thorough comparison of all existing program as well as a thorough critical analysis.
2021 Techniques and software tools for ontology-based information retrieval are currently being developed as prototypes or as products for sale.. An overview of ontology-based information retrieval methods and software tools that are now on the market as either prototypes or finished goods is given in the research of [5]. Feature categorization, which encompasses both generic tool characteristics and their information retrieval properties, is used to evaluate systems. Finally, we discuss our contribution to this field of study. Our survey offers a thorough comparison of all existing programs as well as a thorough critical analysis.
Table 2. Objective-based Filtering.
Table 2. Objective-based Filtering.
Ref. GA SS SIR LPD A CE QE E
[6] - - - - - - -
[7] - - - - - - -
[1] - - - - -
[8] - - - - - - -
[9] - - - - - - -
[6] - - - - - -
Table 3. Notation Table.
Table 3. Notation Table.
Notation Term
Global Access GA
Structural Semantics SS
Semantic Information Retrieval SIR
Local Pattern Discovery LPD
Accuracy A
Content Extraction CE
Query Expansion QE
Efficiency E
Heterogeneous model HM
Primitive Concepts PC
Random Walk RW
(Optimized ontology model with query execution) OOM-QE
Table 5. Summary of Methodology.
Table 5. Summary of Methodology.
Ref. Technique Methodology
[6] PC Local pattern discovery and a global modeling using data mining techniques. For a new query, select its most associated primitive concepts and choose the most probable interpretations as query concepts.
[7] OBSIRM (OBSIRM) has been built to refine the web search in the music domain. It first replaced with abbreviations along with the use of the multilingual concept to search a query.
[1] RW&HM Heterogeneous graph to model the words and items in structured data, and design an enhanced Random Walk approach to extract relevant terms from the graph context.
[8] OWL-DL This approach is applied to the integrated database schema of the EU funded Health-e-Child (HEC) project with the aim of providing ontology assisted query reformulation techniques to simplify the global access that is needed to millions of medical records across the UK and Europe.
[9] OOM-QE Optimized ontology model with query execution used for content extraction from documents
[6] Concept2vec It reformulates the initial query by adding similar terms that help in retrieving more relevant results.
Table 6. Critical Analysis.
Table 6. Critical Analysis.
Ref. Effort Year Technique Short coming
[6] 2023 OWL-DL ontologies The research of [1] Claims that developing OWL-DL ontologies can be time- and resource-consuming. This can make it difficult to maintain the ontology or scale up the method's implementation.[10]
[7] 2012 RW Random walk techniques in [2] usually take a long time to converge, especially in large networks. Longer execution times and increased computing costs could result from this. [11,16]
[1] 2021 OBSIRM The application of the technique to a constrained set of topics may be hindered in [3] by the usage of a domain-specific ontology. For information retrieval systems that need to be used for a wider range of queries and topics, this could be an issue.[12]
[8] 2005 Primitive Concepts The research of [4], dealing with the entire corpus took a lot of effort, and the strategy only showed promise for the queries that performed poorly.[13]
[9] 2023 OOM-QE The study of [5] The proposed strategy is tested on a small dataset with just one use case, and the experiments are only allowed to compare the performance of the proposed method to that of two baseline approaches. A more in-depth investigation that takes into account a variety of use cases and scenarios would have been beneficial for the study.[14]
[6] 2023 Concept2vec How the Concept2vec model can be trained for different domains or how the Knowledge Graphs may be constructed for different use cases are not quite obvious in [6,9,15].
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

© 2024 MDPI (Basel, Switzerland) unless otherwise stated