After indexing, a full-text search is performed using the two functions Match() and Against(), where Match() specifies the column to be searched and Against() specifies the search expression to use.
Here is an example:
Input:
select note_text from productnotes where match(note_text) against('rabbit');
Output:
Analysis: This SELECT statement retrieves a single column note_text. Due to the WHERE clause, a full text search is performed. Match(note_text) instructs MySQL to search against the specified column, and Against('rabbit') specifies the word rabbit as the search text. Since two rows contain the word rabbit , these two rows are returned.
Use full Match() Description The value passed to Match() must be the same as in the FULLTEXT() definition. If you specify multiple columns, they must be listed (and in the correct order).
Search is not case-sensitive Unless BINARY mode is used, full-text search is not case-sensitive.
The fact is that the search just now can be completed simply with the LIKE clause, as follows:
Input:
select note_text from productnotes where note_text like '%rabbit';
Output:
Analysis: This SELECT statement also retrieves two rows, but in a different order (although this does not always happen).
Neither of the above two SELECT statements contains an ORDER BY clause. The latter (using LIKE ) returns data in an order that is not particularly useful. The former (using full-text search) returns data sorted by how well the text matches. Both lines contain the word rabbit , but the line containing the word rabbit as the 3rd word has a higher rank than the line that contains the 20th word. This is important. An important part of full-text search is sorting the results. Rows with higher ranks are returned first (since these are likely to be the rows you actually want).
To demonstrate how sorting works, look at the following example:
Input:
select note_text match(note_text) against('rabbit') as rank from productnotes;
Output:
Analysis: Here, Match() and Against() are used in the SELECT instead of the WHERE clause. This causes all rows to be returned (since there is no WHERE clause). Match() and Against() are used to create a calculated column (aliased rank ) that contains the rank value calculated by the full-text search. The rank is calculated by MySQL based on the number of words in the row, the number of unique words, the total number of words in the entire index, and the number of rows that contain the word. As you can see, rows that do not contain the word rabbit have rank 0 (and therefore are not selected by the WHERE clause in the previous example). The two lines that do contain the word rabbit each have a rank value, with the line before the word in the text having a higher rank value than the line after the word.
This example helps illustrate how a full-text search excludes rows (excludes those with a rank of 0) and sorts the results (sorting by rank in descending order).
Sort Multiple Search Terms If you specify multiple search terms, those rows that contain most of the matching words will have a higher rank value than those that contain fewer words (or only one match).
As you can see, full text search provides functionality that a simple LIKE search cannot. Also, since the data is indexed, full-text searches are quite fast.
The above is the detailed content of Mysql full text search tutorial. For more information, please follow other related articles on the PHP Chinese website!

TograntpermissionstonewMySQLusers,followthesesteps:1)AccessMySQLasauserwithsufficientprivileges,2)CreateanewuserwiththeCREATEUSERcommand,3)UsetheGRANTcommandtospecifypermissionslikeSELECT,INSERT,UPDATE,orALLPRIVILEGESonspecificdatabasesortables,and4)

ToaddusersinMySQLeffectivelyandsecurely,followthesesteps:1)UsetheCREATEUSERstatementtoaddanewuser,specifyingthehostandastrongpassword.2)GrantnecessaryprivilegesusingtheGRANTstatement,adheringtotheprincipleofleastprivilege.3)Implementsecuritymeasuresl

ToaddanewuserwithcomplexpermissionsinMySQL,followthesesteps:1)CreatetheuserwithCREATEUSER'newuser'@'localhost'IDENTIFIEDBY'password';.2)Grantreadaccesstoalltablesin'mydatabase'withGRANTSELECTONmydatabase.TO'newuser'@'localhost';.3)Grantwriteaccessto'

The string data types in MySQL include CHAR, VARCHAR, BINARY, VARBINARY, BLOB, and TEXT. The collations determine the comparison and sorting of strings. 1.CHAR is suitable for fixed-length strings, VARCHAR is suitable for variable-length strings. 2.BINARY and VARBINARY are used for binary data, and BLOB and TEXT are used for large object data. 3. Sorting rules such as utf8mb4_unicode_ci ignores upper and lower case and is suitable for user names; utf8mb4_bin is case sensitive and is suitable for fields that require precise comparison.

The best MySQLVARCHAR column length selection should be based on data analysis, consider future growth, evaluate performance impacts, and character set requirements. 1) Analyze the data to determine typical lengths; 2) Reserve future expansion space; 3) Pay attention to the impact of large lengths on performance; 4) Consider the impact of character sets on storage. Through these steps, the efficiency and scalability of the database can be optimized.

MySQLBLOBshavelimits:TINYBLOB(255bytes),BLOB(65,535bytes),MEDIUMBLOB(16,777,215bytes),andLONGBLOB(4,294,967,295bytes).TouseBLOBseffectively:1)ConsiderperformanceimpactsandstorelargeBLOBsexternally;2)Managebackupsandreplicationcarefully;3)Usepathsinst

The best tools and technologies for automating the creation of users in MySQL include: 1. MySQLWorkbench, suitable for small to medium-sized environments, easy to use but high resource consumption; 2. Ansible, suitable for multi-server environments, simple but steep learning curve; 3. Custom Python scripts, flexible but need to ensure script security; 4. Puppet and Chef, suitable for large-scale environments, complex but scalable. Scale, learning curve and integration needs should be considered when choosing.

Yes,youcansearchinsideaBLOBinMySQLusingspecifictechniques.1)ConverttheBLOBtoaUTF-8stringwithCONVERTfunctionandsearchusingLIKE.2)ForcompressedBLOBs,useUNCOMPRESSbeforeconversion.3)Considerperformanceimpactsanddataencoding.4)Forcomplexdata,externalproc


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Safe Exam Browser
Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.

Dreamweaver Mac version
Visual web development tools

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment

SublimeText3 Mac version
God-level code editing software (SublimeText3)
