Please wait a minute...
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering)  2007, Vol. 8 Issue (6): 857-863    DOI: 10.1631/jzus.2007.A0857
Information Science & Engineering     
Indexing the bit-code and distance for fast KNN search in high-dimensional spaces
LIANG Jun-jie, FENG Yu-cai
College of Computer Science & Technology, Huazhong University of Science and Technology, Wuhan 430074, China; Faculty of Mathematics & Computer Science, Hubei University, Wuhan 430062, China
Download:     PDF (0 KB)     
Export: BibTeX | EndNote (RIS)      

Abstract  Various index structures have recently been proposed to facilitate high-dimensional KNN queries, among which the techniques of approximate vector presentation and one-dimensional (1D) transformation can break the curse of dimensionality. Based on the two techniques above, a novel high-dimensional index is proposed, called Bit-code and Distance based index (BD). BD is based on a special partitioning strategy which is optimized for high-dimensional data. By the definitions of bit code and transformation function, a high-dimensional vector can be first approximately represented and then transformed into a 1D vector, the key managed by a B+-tree. A new KNN search algorithm is also proposed that exploits the bit code and distance to prune the search space more effectively. Results of extensive experiments using both synthetic and real data demonstrated that BD outperforms the existing index structures for KNN search in high-dimensional spaces.

Key wordsHigh-dimensional spaces      KNN search      Bit-code and distance based index (BD)      Approximate vector     
Received: 22 August 2006     
CLC:  TP311  
Cite this article:

LIANG Jun-jie, FENG Yu-cai. Indexing the bit-code and distance for fast KNN search in high-dimensional spaces. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2007, 8(6): 857-863.

URL:

http://www.zjujournals.com/xueshu/zjus-a/10.1631/jzus.2007.A0857     OR     http://www.zjujournals.com/xueshu/zjus-a/Y2007/V8/I6/857

[1] Zhong-mei WAN, Xue-jia LAI, Jian WENG, Sheng-li LIU, Yu LONG, Xuan HONG. Certificateless key-insulated signature without random oracles[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2009, 10(12): 1790-1800.
[2] Jin-hua JIANG, Ke CHEN, Xiao-yan LI, Gang CHEN, Li-dan SHOU. Efficient processing of ordered XML twig pattern matching based on extended Dewey[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2009, 10(12): 1769-1783.
[3] Ying XU, Chang-fu ZONG, Hsiao-hsiang NA, Lei LIU. Investigations on control algorithm of steady-state cornering and control strategy for dynamical correction in a steer-by-wire system[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2009, 10(6): 900-908.
[4] Peng HUANG, Jie ZHU. Predicting the fault-proneness of class hierarchy in object-oriented software using a layered kernel[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(10): 1390-1397.
[5] Qiong WEI, Yan-sheng LU, Lei ZOU. ε-inclusion: privacy preserving re-publication of dynamic datasets[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(8): 1124-1133.
[6] Jian HE, Hui LI, Yong ZHANG, Zhang-qin HUANG. Bluetooth-based authentication system for ambient intelligence[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(6): 770-775.
[7] Xun SUN, Jian-hua LI, Shu-tang YANG, Gong-liang CHEN. Non-interactive identity-based threshold signature scheme without random oracles[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(6): 727-736.
[8] Yi-jun BEI, Gang CHEN, Jin-xiang DONG, Ke CHEN. Bottom-up mining of XML query patterns to improve XML querying[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(6): 744-757.
[9] FAROOQ M., WANG Dao-bo. Implementation of a new PC based controller for a PUMA robot[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2007, 8(12): 1962-1970.
[10] HUANG Chuan-dong, JIANG Fan. Timing issues in distributed testing[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2007, 8(4): 522-528.
[11] PAN Peng, LU Yan-sheng. Monitoring nearest neighbor queries with cache strategies[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2007, 8(4): 529-537.
[12] HU Tian-lei, CHEN Gang, LI Xiao-yan, DONG Jin-xiang. Automatic relational database compression scheme design based on swarm evolution[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(10): 4-.
[13] LIANG Hai-hua, ZHU Miao-liang. Applying the model driven generative domain engineering method to develop self-organizing architectural solutions for mobile robot[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(10): 5-.
[14] HU Hua, ZHANG Yang. A framework for Internet service evolution based on active object[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(10): 6-.
[15] WANG Mei-yuan, LU Yao-bin, ZHANG Jin-long. Software outsourcing risk management: establishing outsourcee evaluation item systems[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(6): 1092-1098.