LDA Based Security in Personalized Web Search
|
|
- Frederick Sutton
- 8 years ago
- Views:
Transcription
1 LDA Based Security in Personalized Web Search R. Dhivya 1 / PG Scholar, B. Vinodhini 2 /Assistant Professor, S. Karthik 3 /Prof & Dean Department of Computer Science & Engineering SNS College of Technology Coimbatore, India Abstract- An individual person searching through the web according to their interest is known as personalized web search. Many users accessing the web but the web results shows similar results to everyone for example a fruit seller and programmer may use the same word Apple to search for their individual needs. In this paper, it mainly describe about the different personalized web search methods such as client side web search and others which is used to protect the personal information of users. Keywords: Data mining, privacy preserving, personalized web search, client side web search. I.INTRODUCTION DATA, INFORMATION, AND KNOWLEDGE DATA Data are any facts, numbers, or text that can be processed by a computer. Today, organizations are accumulating vast and growing amounts of data in different formats and different databases. This includes: operational or transactional data such as, sales, cost, inventory, payroll, and accounting nonoperational data, such as industry sales, forecast data, and macro economic data meta data - data about the data itself, such as logical database design or data dictionary definitions Data mining refers to extracting data from large amount of data. It is also known as knowledge discovery from data. It is used to convert raw data into useful information. Since most of the persons around world depends on the web for searching the information, retrieving relevant information or improving their results. Personalized web search refers to search of information based on the user s individual interest beyond the query provided by the users. Privacy is a term which does not provide an access of information to the unauthorized person. To secure those private information or data various methods such as client side web search, re-ranking, personalizing profiles, adaptive search results in personalized web search have been proposed. INFORMATION The patterns, associations, or relationships among all this data can provide information. For example, analysis of retail point of sale transaction data can yield information on which products are selling and when. KNOWLEDGE Information can be converted into knowledge about historical patterns and future trends. For example, summary information on retail supermarket sales can be analyzed in light of promotional efforts to provide knowledge of consumer buying behavior. Thus, a 525
2 manufacturer or retailer could determine which items are most susceptible to promotional efforts. KNOWLEDE DISCOVERY DATABASES PROCESS The Knowledge Discovery in Databases process comprises of a few steps leading from raw data collections to some form of new knowledge. The Figure 1.1 represents the iterative process consists of KDD: Figure 1.1: Knowledge Discovery Databases II.RELATED TOPICS CLIENT SIDE WEB SEARCH AGENT Information retrieval systems (e.g., web search engines) are critical for overcoming information overload. A major deficiency of previous retrieval systems that they are generally lack of user modeling and are not reconciling to individual users, resulting in inherently and not providing the best retrieval performance [1].In Personalized web search a web does not know about the user and it provides the information based on the user queries if the same queries were submitted by the number of user it gives the irrelevant results. To avoid that a search engines should know about the user interest from the user search details. An implicit user model is implemented for extending the current query of the user. While retrieving the data or information from the web, there might be loss of some information to overcome this client side web search and the decision theoretic framework and it can improve the search accuracy. The use of immediate search context and implicit feedback information as eager updating of search results to maximally benefit to user [1]. LINK AND CONTENT PERSONALIZATION Hyperlink-based personalized search systems have a problem in that they do not clarify whether their search results actually satisfy each user s information need. This is because personalization based on a user s context, i.e., browsing patterns, bookmarks, and so on is not performed. The personalized Web sites described have the following shortcomings: (1) users have to rate items or adjust sliders to obtain relevant information in Link Personalization and (2) in Content Personalization [6] described the load on users becomes high because they have to answer questionnaires in advance to register their personal preferences or demographic information, and they have to change their registered information by themselves if their interests change. In addition, the recommender systems have the potential to provide serendipitous recommendations if users are only willing to rate items. However, in actuality, most users are unwilling to rate items even though user s ratings for items are key factors to achieving better recommendations. As a result, the accuracy of recommendations may be poor. Not necessary to believe that approaches based on user ratings provide users with more relevant information that satisfies each user s information need. Therefore, search system should directly and exactly capture the changes in each user s preferences without any user effort in order to provide more relevant information for each user. In order to construct such a system, several approaches have been proposed to adapting search results according to each user s information need. A given approach is novel because it allows each user to perform a fine-grained search by capturing the 526
3 changes in each user s preferences without any user effort [6]. When a user submits a query to a search engine through a Web browser, the search engine returns search results corresponding to the query. Based on the search results, the user may select a Web page in an attempt to satisfy his/her information need. In addition, the user may access more Web pages by following the hyperlinks on his/her selected Web page and continue to browse. System monitors the user s browsing history and updates his/her profile whenever his/her browsing page changes. When the user submits a query the next time, the search results adapt based on his/her user profile. Fig Preprocessing RERANKING User can get more information in the web search and those searches can be listed and ranked according to their user search preferences for personalization. The information is used to re-rank web search results within a relevance feedback framework [2]. Most of the personalized search were based on the explicit relevance feedback to get the better performance an implicit relevance feedback were used and this contains a collection of information for detailed web search which includes that detail information and cooperation s of client, user browsing history and previous searched web pages. In this paper, improving the search experiences of users, by collecting the search related information, previously issued queries and previously visited web pages [2]. Client side algorithms are developed for the personalized web search. All profile storage and processing is done on the client side which has a best user profile and quantity representation is efficient. A single parameter does not improve the search results but some of the parameters are improved and this is only applicable for small extensions. PERSONALIZING PROFILES In several approaches to creating the user profile for capture user information through the searching histories and collecting the activities of user which needs to install server. User profiles are built based on their activity at the search site itself and the use of these profiles to provide the improved personalized search results [3]. Google wrapper has been used to build the profiles based on queries and snippets for examining search results. A Method ontology s and semantic concepts were included to find the unambiguity of words and extension of current web is an semantic web, in this an automatic techniques are implemented. Using this queries and snippets a ranking is improved in search results but it can harm few queries. Dynamically these algorithms are not adaptive for merging and splitting concepts. 527
4 Fig Personalized score frame ADAPTIVE SEARCH RESULTS Searching through the web search information adapted to users with various information needs this paper proposed that adapting search results according to each user s need for relevant information without any user effort and verifying the effectiveness [4]. A modified collaborative filtering is used to collect the previous browsing details of user for 24 hrs, user preferences can be achieved by built the user profile. In web hyperlinks structures are playing a important role for providing an Pagerank and this helps to provide better search results. Two types of personalization are available which are namely Link Personalization and Content Personalization. Link Personalization which involves selecting the links that are more relevant to the user and changing the original navigation space by reducing or improving the relationships between web pages [4] and Content Personalization is used to provide the variety of information to different users. To improve the performance and effectiveness of search engine collecting the feedback from users, analyzing the previous browsing details.the drawback of this information could not send through the movies, music and long term of user s browsing details are not possible. USER CUSTOMIZABLE PRIVACY PRESERVING SEARCH Personalized web search has plays an important role in improving the performance of a variety of search engines in the internet. While searching through the web, users are unwilling to disclose their individual and personal information during their search it becomes major obstacle for the performance of the web search. The solution to this problem user information has to be collected and analyzed to figure out the user intention behind the issued query [5]. Two methods are used click log based and profile based method were click log based method is as stable and the profile based method is an unstable process and the profile based method improves the performance of web search experiences. Using this UPS (User customizable privacy preserving search) can adapt the each individual user profiles and it reducing the information loss in retrieving the data from the search engines. It can perform online generalization [5] and reveals that UPS could achieve the quality search results also user information can be protected. Drawback in this paper is to find the richer relationship among the topics and an advanced method to building the user profile also improving the performance. PRESERVING USER PRIVACY Web search engines (e.g. Google, Yahoo, Microsoft Live Search, etc.) are widely used to find certain data among a huge amount of information in a minimal amount of time. However, these useful tools also pose a privacy threat to the users: web search engines profile their users by storing and analyzing past searches submitted by them. To address this privacy threat, current solutions propose new mechanisms that introduce a high cost in terms of computation and communication. A novel protocol is used specially designed to protect the users privacy in front of web search profiling. System provides a distorted user profile to the web search engine. The implementation details and computational and communication results that show that the proposed protocol improves the existing solutions in terms of query delay [7]. This scheme provides an affordable overhead while offering privacy benefits to the users. UTILITY SHARING OF PERSONAL DATA The potential value of harnessing data about people to enhance online services coupled with the growing ubiquity of online services raises reasonable concerns about privacy. Both users and the hosts of online applications may benefit from the custom-tailoring of services. However, both may be uncomfortable with the access and use of personal information. There has been increasing discussion about incursions into the 528
5 privacy of users implied by the general logging and storing of online data[4]. Beyond general anxieties with sharing personal information, people may more specifically have concerns about becoming increasingly identifiable; as increasing amounts of personal data are acquired, users become members of increasingly smaller groups of people associated with the same attributes. Most work to date on personalizing online services has either ignored the challenges of privacy and focused efforts solely on maximizing utility or has completely bypassed the use of personal data. One vein of research has explored the feasibility of personalizing services with methods that restrict the collection and analysis of personal data to users own computing devices (Horvitz, 2006). Research in this realm includes efforts to personalize web search by making use of the content stored on local machines, as captured within the index of a desktop search service. Rather than cut off opportunities to make personal data available for enhancing online services or limit personalization to client-side analyses, we introduce and study utility-theoretic methods that balance the costs of sharing of personal data with online services in return for the benefits of personalization. Such a decision-theoretic perspective on privacy can allow systems to weigh the benefits of enhancements that come with adaptation with the costs of sensing and storage according to users preferences. User can explicitly quantify preferences about utility and privacy and then solve an optimization problem to find the best trade. An approach is based on two fundamental observations. The first is that, for practical applications, the utility gained with sharing of personal data may often have a diminishing returns property; acquiring more information about a user adds decreasing amounts to the utility of personalization given what is already known about the user s needs or intentions. On the contrary, the more information that is acquired about a user, the more concerning the breach of privacy becomes. For example, a set of individually non-identifying pieces of information may, when combined, hone down the user to membership in a small group, or even identify an individual. We map the properties of diminishing returns on utility and the concomitant accelerating costs of revelation to the combinatorial concepts of submodularity and supermodularity, respectively LATENT DIRCHLET ALLOCATION Web users usage are increased day by day according to that new features are needed and common web search engines are providing multi irrelevant answers for the particular(individual) search due to these unnecessary problems users losing their duration in hours and it makes inconvenient to the users. To reduce these problems LDA(Latent Dirchlet Allocation) is used. LDA is a Simpler Technique and these are used for matching the relevant text and finding the relationship between each keyword. Relation between each and every keyword are most useful for finding the better search results and it can improve the search experience user more when compared to other. III. CONCLUSION This paper presents a Various techniques used for individual web search. Personalized web search is used to improve the quality of various search services on the internet. To protect the personal privacy of the user and it should not compromise the search quality. A methods and algorithms used in this are to improve the search quality and protect the privacy of the user. An future work is to finding the richer relationship between keywords and to protect the privacy of the users in Personalized web search. IV. REFERENCES [1] X. Shen, B. Tan, and C. Zhai, Implicit User Modeling for Personalized Search, Proc. 14th ACM Int l Conf. Information and Knowledge Management (CIKM), 2005 [2] J. Teevan, S.T. Dumais, and E. Horvitz, Personalizing Search via Automated Analysis of Interests and Activities, Proc. 28th Ann. Int l ACM SIGIR Conf. Research and Development in Information Retrieval (SIGIR), pp ,
6 [3] M. Spertta and S. Gach, Personalizing Search Based on User Search Histories, Proc. IEEE/WIC/ACM Int l Conf. Web Intelligence (WI), [4] K. Sugiyama, K. Hatano, and M. Yoshikawa, Adaptive Web Search Based on User Profile Constructed without any Effort from Users, Proc. 13th Int l Conf. World Wide Web (WWW),2004. [5] Lidan shou, He Bai, Ke Chen,Gang Chen, Supporting Privacy Protection in Personalized Web Search, IEEE vol.26,2014. [6]Tan.B, Shen.X, and Zhai.C, 2006 Mining Long-Term Search History to Improve Search Accuracy, Proc. ACM SIGKDD Int l Conf. Knowledge Discovery and Data Mining (KDD) [7]Castellı -Roca.J, Viejo.A, and Herrera-Joancomartı.J, 2009 Preserving User s Privacy in Web Search Engines, Computer Comm., vol. 32, no. 13/14, pp ,. [8]Krause.A and Horvitz.E, 2010 A Utility-Theoretic Approach to Privacy in Online Services, J. Artificial Intelligence Research, vol. 39, pp ,. [7]Castellı -Roca.J, Viejo.A, and Herrera-Joancomartı.J, 2009 Preserving User s Privacy in Web Search Engines, Computer Comm., vol. 32, no. 13/14, pp ,. [8]Krause.A and Horvitz.E, 2010 A Utility-Theoretic Approach to Privacy in Online Services, J. Artificial Intelligence Research, vol. 39, pp ,.. 530
A UPS Framework for Providing Privacy Protection in Personalized Web Search
A UPS Framework for Providing Privacy Protection in Personalized Web Search V. Sai kumar 1, P.N.V.S. Pavan Kumar 2 PG Scholar, Dept. of CSE, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh,
More informationInternational Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.
REVIEW ARTICLE ISSN: 2321-7758 UPS EFFICIENT SEARCH ENGINE BASED ON WEB-SNIPPET HIERARCHICAL CLUSTERING MS.MANISHA DESHMUKH, PROF. UMESH KULKARNI Department of Computer Engineering, ARMIET, Department
More informationSustaining Privacy Protection in Personalized Web Search with Temporal Behavior
Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior N.Jagatheshwaran 1 R.Menaka 2 1 Final B.Tech (IT), jagatheshwaran.n@gmail.com, Velalar College of Engineering and Technology,
More informationSupporting Privacy Protection in Personalized Web Search
Supporting Privacy Protection in Personalized Web Search Kamatam Amala P.G. Scholar (M. Tech), Department of CSE, Srinivasa Institute of Technology & Sciences, Ukkayapalli, Kadapa, Andhra Pradesh. ABSTRACT:
More informationPersonalization of Web Search With Protected Privacy
Personalization of Web Search With Protected Privacy S.S DIVYA, R.RUBINI,P.EZHIL Final year, Information Technology,KarpagaVinayaga College Engineering and Technology, Kanchipuram [D.t] Final year, Information
More informationProfile Based Personalized Web Search and Download Blocker
Profile Based Personalized Web Search and Download Blocker 1 K.Sheeba, 2 G.Kalaiarasi Dhanalakshmi Srinivasan College of Engineering and Technology, Mamallapuram, Chennai, Tamil nadu, India Email: 1 sheebaoec@gmail.com,
More informationPrivacy Protection in Personalized Web Search- A Survey
Privacy Protection in Personalized Web Search- A Survey Greeshma A S. * Lekshmy P. L. M.Tech Student Assistant Professor Dept. of CSE & Kerala University Dept. of CSE & Kerala University Thiruvananthapuram
More informationA PREDICTIVE MODEL FOR QUERY OPTIMIZATION TECHNIQUES IN PERSONALIZED WEB SEARCH
International Journal of Computer Science and System Analysis Vol. 5, No. 1, January-June 2011, pp. 37-43 Serials Publications ISSN 0973-7448 A PREDICTIVE MODEL FOR QUERY OPTIMIZATION TECHNIQUES IN PERSONALIZED
More informationAdvances in Natural and Applied Sciences
AENSI Journals Advances in Natural and Applied Sciences ISSN:1995-0772 EISSN: 1998-1090 Journal home page: www.aensiweb.com/anas Privacy Protection in Personalized Web Search 1 M. Abinaya and 2 D. Vijay
More informationCustomer Analysis - Customer analysis is done by analyzing the customer's buying preferences, buying time, budget cycles, etc.
Data Warehouses Data warehousing is the process of constructing and using a data warehouse. A data warehouse is constructed by integrating data from multiple heterogeneous sources that support analytical
More informationHow To Cluster On A Search Engine
Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: A REVIEW ON QUERY CLUSTERING
More informationResearch and Development of Data Preprocessing in Web Usage Mining
Research and Development of Data Preprocessing in Web Usage Mining Li Chaofeng School of Management, South-Central University for Nationalities,Wuhan 430074, P.R. China Abstract Web Usage Mining is the
More informationSECURED AN IMPLEMENTATION OF PERSONALIZED WEB SEARCH
SECURED AN IMPLEMENTATION OF PERSONALIZED WEB SEARCH 1 Mr. A. MANIKANDAN, 2 Dr. A.VIJAYA KATHIRAVAN 1 Research Scholar, 2 Assistant Professor in Computer Science, 1 Dept of Computer Science, 2 Dept of
More informationISSN: 2321-7782 (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com
More informationMALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph
MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of
More informationEfficient Query Optimizing System for Searching Using Data Mining Technique
Vol.1, Issue.2, pp-347-351 ISSN: 2249-6645 Efficient Query Optimizing System for Searching Using Data Mining Technique Velmurugan.N Vijayaraj.A Assistant Professor, Department of MCA, Associate Professor,
More informationEfficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage
Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage Priyanga.R 1, Maheswari.B 2, Karthik.S 3 PG Scholar, Department of CSE, SNS College of technology, Coimbatore-35,
More informationDynamical Clustering of Personalized Web Search Results
Dynamical Clustering of Personalized Web Search Results Xuehua Shen CS Dept, UIUC xshen@cs.uiuc.edu Hong Cheng CS Dept, UIUC hcheng3@uiuc.edu Abstract Most current search engines present the user a ranked
More informationSUSTAINING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH WITH TEMPORAL BEHAVIOR
International Journal of Latest Research in Science and Technology Volume 4, Issue 5: Page No.73-77, September-October 2015 http://www.mnkjournals.com/ijlrst.htm ISSN (Online):2278-5299 SUSTAINING PRIVACY
More informationOptimization of Search Results with Duplicate Page Elimination using Usage Data A. K. Sharma 1, Neelam Duhan 2 1, 2
Optimization of Search Results with Duplicate Page Elimination using Usage Data A. K. Sharma 1, Neelam Duhan 2 1, 2 Department of Computer Engineering, YMCA University of Science & Technology, Faridabad,
More informationMining Signatures in Healthcare Data Based on Event Sequences and its Applications
Mining Signatures in Healthcare Data Based on Event Sequences and its Applications Siddhanth Gokarapu 1, J. Laxmi Narayana 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India 1
More informationSo today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we
More informationA Survey on Preprocessing of Web Log File in Web Usage Mining to Improve the Quality of Data
A Survey on Preprocessing of Web Log File in Web Usage Mining to Improve the Quality of Data R. Lokeshkumar 1, R. Sindhuja 2, Dr. P. Sengottuvelan 3 1 Assistant Professor - (Sr.G), 2 PG Scholar, 3Associate
More informationSharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India
More informationAmerican Journal of Engineering Research (AJER) 2013 American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-2, Issue-4, pp-39-43 www.ajer.us Research Paper Open Access
More informationData Mining in Web Search Engine Optimization and User Assisted Rank Results
Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management
More informationWeb Personalization based on Usage Mining
Web Personalization based on Usage Mining Sharhida Zawani Saad School of Computer Science and Electronic Engineering, University of Essex, Wivenhoe Park, Colchester, Essex, CO4 3SQ, UK szsaad@essex.ac.uk
More informationWeb Log Based Analysis of User s Browsing Behavior
Web Log Based Analysis of User s Browsing Behavior Ashwini Ladekar 1, Dhanashree Raikar 2,Pooja Pawar 3 B.E Student, Department of Computer, JSPM s BSIOTR, Wagholi,Pune, India 1 B.E Student, Department
More informationPersonalized Image Search for Photo Sharing Website
Personalized Image Search for Photo Sharing Website Asst. Professor Rajni Pamnani rajaniaswani@somaiya.edu Manan Desai manan.desai@somaiya.edu Varshish Bhanushali varshish.b@somaiya.edu Ashish Charla ashish.charla@somaiya.edu
More informationBisecting K-Means for Clustering Web Log data
Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining
More informationAutomatic Annotation Wrapper Generation and Mining Web Database Search Result
Automatic Annotation Wrapper Generation and Mining Web Database Search Result V.Yogam 1, K.Umamaheswari 2 1 PG student, ME Software Engineering, Anna University (BIT campus), Trichy, Tamil nadu, India
More informationHow To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System
REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India
More informationAN EFFICIENT APPROACH TO PERFORM PRE-PROCESSING
AN EFFIIENT APPROAH TO PERFORM PRE-PROESSING S. Prince Mary Research Scholar, Sathyabama University, hennai- 119 princemary26@gmail.com E. Baburaj Department of omputer Science & Engineering, Sun Engineering
More informationOLAP Online Privacy Control
OLAP Online Privacy Control M. Ragul Vignesh and C. Senthil Kumar Abstract--- The major issue related to the protection of private information in online analytical processing system (OLAP), is the privacy
More informationImproving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
More informationExtending a Web Browser with Client-Side Mining
Extending a Web Browser with Client-Side Mining Hongjun Lu, Qiong Luo, Yeuk Kiu Shun Hong Kong University of Science and Technology Department of Computer Science Clear Water Bay, Kowloon Hong Kong, China
More informationWeb Usage mining framework for Data Cleaning and IP address Identification
Web Usage mining framework for Data Cleaning and IP address Identification Priyanka Verma The IIS University, Jaipur Dr. Nishtha Kesswani Central University of Rajasthan, Bandra Sindri, Kishangarh Abstract
More informationEffective User Navigation in Dynamic Website
Effective User Navigation in Dynamic Website Ms.S.Nithya Assistant Professor, Department of Information Technology Christ College of Engineering and Technology Puducherry, India Ms.K.Durga,Ms.A.Preeti,Ms.V.Saranya
More informationAutomatic Timeline Construction For Computer Forensics Purposes
Automatic Timeline Construction For Computer Forensics Purposes Yoan Chabot, Aurélie Bertaux, Christophe Nicolle and Tahar Kechadi CheckSem Team, Laboratoire Le2i, UMR CNRS 6306 Faculté des sciences Mirande,
More informationWeb Mining Functions in an Academic Search Application
132 Informatica Economică vol. 13, no. 3/2009 Web Mining Functions in an Academic Search Application Jeyalatha SIVARAMAKRISHNAN, Vijayakumar BALAKRISHNAN Faculty of Computer Science and Engineering, BITS
More informationClustering Technique in Data Mining for Text Documents
Clustering Technique in Data Mining for Text Documents Ms.J.Sathya Priya Assistant Professor Dept Of Information Technology. Velammal Engineering College. Chennai. Ms.S.Priyadharshini Assistant Professor
More informationOptimized Mobile Search Engine
Optimized Mobile Search Engine E.Chaitanya 1, Dr.Sai Satyanarayana Reddy 2, O.Srinivasa Reddy 3 1 M.Tech, CSE, LBRCE, Mylavaram, 2 Professor, CSE, LBRCE, Mylavaram, India, 3 Asst.professor,CSE,LBRCE,Mylavaram,India.
More informationAchieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services
Achieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services Ms. M. Subha #1, Mr. K. Saravanan *2 # Student, * Assistant Professor Department of Computer Science and Engineering Regional
More informationComparing Tag Clouds, Term Histograms, and Term Lists for Enhancing Personalized Web Search
Comparing Tag Clouds, Term Histograms, and Term Lists for Enhancing Personalized Web Search Orland Hoeber and Hanze Liu Department of Computer Science, Memorial University St. John s, NL, Canada A1B 3X5
More informationImplementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains P.Satheesh Associate professor Dept of Computer Science and Engineering MVGR college of
More informationWeb Mining. Margherita Berardi LACAM. Dipartimento di Informatica Università degli Studi di Bari berardi@di.uniba.it
Web Mining Margherita Berardi LACAM Dipartimento di Informatica Università degli Studi di Bari berardi@di.uniba.it Bari, 24 Aprile 2003 Overview Introduction Knowledge discovery from text (Web Content
More informationA Survey on a Personalized Mobile Search Engine
A Survey on a Personalized Mobile Search Engine Tushar Mohod 1, Prof. S. N. Gujar 2 Smt. Kashibai Navale College of Engineering, Pune, India Department of Computer Engineering, Savitribai Phule Pune University,
More informationProviding Data Protection as a Service in Cloud Computing
International Journal of Scientific and Research Publications, Volume 3, Issue 6, June 2013 1 Providing Data Protection as a Service in Cloud Computing Sunumol Cherian *, Kavitha Murukezhan ** * Department
More informationIdentifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data
Identifying the Number of to improve Website Usability from Educational Institution Web Log Data Arvind K. Sharma Dept. of CSE Jaipur National University, Jaipur, Rajasthan,India P.C. Gupta Dept. of CSI
More informationWeb Advertising Personalization using Web Content Mining and Web Usage Mining Combination
8 Web Advertising Personalization using Web Content Mining and Web Usage Mining Combination Ketul B. Patel 1, Dr. A.R. Patel 2, Natvar S. Patel 3 1 Research Scholar, Hemchandracharya North Gujarat University,
More informationWeb usage mining: Review on preprocessing of web log file
Web usage mining: Review on preprocessing of web log file Sunita sharma Ashu bansal M.Tech., CSE Deptt. A.P., CSE Deptt. Hindu College of Engg. Hindu College of Engg. Sonepat, Haryana Sonepat, Haryana
More informationVolume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com ISSN: 2321-7782
More informationEnterprise Resource Planning Analysis of Business Intelligence & Emergence of Mining Objects
Enterprise Resource Planning Analysis of Business Intelligence & Emergence of Mining Objects Abstract: Build a model to investigate system and discovering relations that connect variables in a database
More informationAn Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
More informationAdvanced Preprocessing using Distinct User Identification in web log usage data
Advanced Preprocessing using Distinct User Identification in web log usage data Sheetal A. Raiyani 1, Shailendra Jain 2, Ashwin G. Raiyani 3 Department of CSE (Software System), Technocrats Institute of
More informationA NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,
More informationPSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software
More informationA QoS-Aware Web Service Selection Based on Clustering
International Journal of Scientific and Research Publications, Volume 4, Issue 2, February 2014 1 A QoS-Aware Web Service Selection Based on Clustering R.Karthiban PG scholar, Computer Science and Engineering,
More informationEnhance Preprocessing Technique Distinct User Identification using Web Log Usage data
Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data Sheetal A. Raiyani 1, Shailendra Jain 2 Dept. of CSE(SS),TIT,Bhopal 1, Dept. of CSE,TIT,Bhopal 2 sheetal.raiyani@gmail.com
More informationRANKING WEB PAGES RELEVANT TO SEARCH KEYWORDS
ISBN: 978-972-8924-93-5 2009 IADIS RANKING WEB PAGES RELEVANT TO SEARCH KEYWORDS Ben Choi & Sumit Tyagi Computer Science, Louisiana Tech University, USA ABSTRACT In this paper we propose new methods for
More informationA COMPREHENSIVE REVIEW ON SEARCH ENGINE OPTIMIZATION
Volume 4, No. 1, January 2013 Journal of Global Research in Computer Science REVIEW ARTICLE Available Online at www.jgrcs.info A COMPREHENSIVE REVIEW ON SEARCH ENGINE OPTIMIZATION 1 Er.Tanveer Singh, 2
More information131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
More informationAccessing Private Network via Firewall Based On Preset Threshold Value
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. V (May-Jun. 2014), PP 55-60 Accessing Private Network via Firewall Based On Preset Threshold
More informationRanked Keyword Search Using RSE over Outsourced Cloud Data
Ranked Keyword Search Using RSE over Outsourced Cloud Data Payal Akriti 1, Ms. Preetha Mary Ann 2, D.Sarvanan 3 1 Final Year MCA, Sathyabama University, Tamilnadu, India 2&3 Assistant Professor, Sathyabama
More informationOptimization of Image Search from Photo Sharing Websites Using Personal Data
Optimization of Image Search from Photo Sharing Websites Using Personal Data Mr. Naeem Naik Walchand Institute of Technology, Solapur, India Abstract The present research aims at optimizing the image search
More informationAN APPROACH TO ANTICIPATE MISSING ITEMS IN SHOPPING CARTS
AN APPROACH TO ANTICIPATE MISSING ITEMS IN SHOPPING CARTS Maddela Pradeep 1, V. Nagi Reddy 2 1 M.Tech Scholar(CSE), 2 Assistant Professor, Nalanda Institute Of Technology(NIT), Siddharth Nagar, Guntur,
More informationA Survey on Web Mining From Web Server Log
A Survey on Web Mining From Web Server Log Ripal Patel 1, Mr. Krunal Panchal 2, Mr. Dushyantsinh Rathod 3 1 M.E., 2,3 Assistant Professor, 1,2,3 computer Engineering Department, 1,2 L J Institute of Engineering
More informationFinancial Trading System using Combination of Textual and Numerical Data
Financial Trading System using Combination of Textual and Numerical Data Shital N. Dange Computer Science Department, Walchand Institute of Rajesh V. Argiddi Assistant Prof. Computer Science Department,
More informationSecurity challenges for internet technologies on mobile devices
Security challenges for internet technologies on mobile devices - Geir Olsen [geiro@microsoft.com], Senior Program Manager for Security Windows Mobile, Microsoft Corp. - Anil Dhawan [anild@microsoft.com],
More informationUnderstanding Web personalization with Web Usage Mining and its Application: Recommender System
Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,
More informationAN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationEnhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud
OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Volume 1, Number 2, November 2014 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Enhanced Algorithm for Efficient Retrieval of Data from a Secure
More informationA Survey of Customer Relationship Management
A Survey of Customer Relationship Management RumaPanda 1, Dr. A. N. Nandakumar 2 1 Assistant Professor, Dept. of C.S.E. Vemana I T, VTU,Bangalore, Karnataka, India 2 Professor & Principal, R. L. Jalappa
More informationA FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS
A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS Abstract T.VENGATTARAMAN * Department of Computer Science, Pondicherry University, Puducherry, India. A.RAMALINGAM Department of MCA, Sri
More informationAn Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining
An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining 1 B.Sahaya Emelda and 2 Mrs. P. Maria Jesi M.E.,Ph.D., 1 PG Student and 2 Associate Professor, Department of Computer
More informationInternational Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,
More informationANALYSIS OF WEBSITE USAGE WITH USER DETAILS USING DATA MINING PATTERN RECOGNITION
ANALYSIS OF WEBSITE USAGE WITH USER DETAILS USING DATA MINING PATTERN RECOGNITION K.Vinodkumar 1, Kathiresan.V 2, Divya.K 3 1 MPhil scholar, RVS College of Arts and Science, Coimbatore, India. 2 HOD, Dr.SNS
More informationA Survey on Data Warehouse Architecture
A Survey on Data Warehouse Architecture Rajiv Senapati 1, D.Anil Kumar 2 1 Assistant Professor, Department of IT, G.I.E.T, Gunupur, India 2 Associate Professor, Department of CSE, G.I.E.T, Gunupur, India
More informationAN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
More informationSelective dependable storage services for providing security in cloud computing
Selective dependable storage services for providing security in cloud computing Gade Lakshmi Thirupatamma*1, M.Jayaram*2, R.Pitchaiah*3 M.Tech Scholar, Dept of CSE, UCET, Medikondur, Dist: Guntur, AP,
More informationSecure Semantic Web Service Using SAML
Secure Semantic Web Service Using SAML JOO-YOUNG LEE and KI-YOUNG MOON Information Security Department Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA
More informationASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL
International Journal Of Advanced Technology In Engineering And Science Www.Ijates.Com Volume No 03, Special Issue No. 01, February 2015 ISSN (Online): 2348 7550 ASSOCIATION RULE MINING ON WEB LOGS FOR
More informationIntinno: A Web Integrated Digital Library and Learning Content Management System
Intinno: A Web Integrated Digital Library and Learning Content Management System Synopsis of the Thesis to be submitted in Partial Fulfillment of the Requirements for the Award of the Degree of Master
More informationSystem Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks
System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks OnurSoft Onur Tolga Şehitoğlu November 10, 2012 v1.0 Contents 1 Introduction 3 1.1 Purpose..............................
More informationSPATIAL DATA CLASSIFICATION AND DATA MINING
, pp.-40-44. Available online at http://www. bioinfo. in/contents. php?id=42 SPATIAL DATA CLASSIFICATION AND DATA MINING RATHI J.B. * AND PATIL A.D. Department of Computer Science & Engineering, Jawaharlal
More informationA STUDY OF DATA MINING ACTIVITIES FOR MARKET RESEARCH
205 A STUDY OF DATA MINING ACTIVITIES FOR MARKET RESEARCH ABSTRACT MR. HEMANT KUMAR*; DR. SARMISTHA SARMA** *Assistant Professor, Department of Information Technology (IT), Institute of Innovation in Technology
More informationA SECURE FRAMEWORK FOR PROTECTING IN PERSONALIZED WEB SEARCH Mrs. M.Sowjanya 1, Dr. P. Harini 2
A SECURE FRAMEWORK FOR PROTECTING IN PERSONALIZED WEB SEARCH Mrs. M.Sowjanya 1, Dr. P. Harini 2 1 II M.Tech. - II Sem., Dept. of CSE, St. Ann s College of Engineering. & Technology. Chirala, Andhra Pradesh
More informationAWERProcedia Information Technology & Computer Science
AWERProcedia Information Technology & Computer Science Vol 03 (2013) 1157-1162 3 rd World Conference on Information Technology (WCIT-2012) Webification of Software Development: General Outline and the
More informationHealthcare Measurement Analysis Using Data mining Techniques
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 03 Issue 07 July, 2014 Page No. 7058-7064 Healthcare Measurement Analysis Using Data mining Techniques 1 Dr.A.Shaik
More informationBusiness Intelligence and Decision Support Systems
Chapter 12 Business Intelligence and Decision Support Systems Information Technology For Management 7 th Edition Turban & Volonino Based on lecture slides by L. Beaubien, Providence College John Wiley
More informationPage 1 Basic Computer Skills Series: The Internet and the World Wide Web GOALS
GOALS Understand the differences between the Internet and the World Wide Web Use a web browser to find and open websites Navigate using links, the back button, and the forward button Use bookmarks and
More informationInternational Journal of Engineering Research ISSN: 2348-4039 & Management Technology November-2015 Volume 2, Issue-6
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology Email: editor@ijermt.org November-2015 Volume 2, Issue-6 www.ijermt.org Modeling Big Data Characteristics for Discovering
More informationHow To Write A Summary Of A Review
PRODUCT REVIEW RANKING SUMMARIZATION N.P.Vadivukkarasi, Research Scholar, Department of Computer Science, Kongu Arts and Science College, Erode. Dr. B. Jayanthi M.C.A., M.Phil., Ph.D., Associate Professor,
More informationHow To Use Data Mining For Knowledge Management In Technology Enhanced Learning
Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29, 2007 115 Data Mining for Knowledge Management in Technology Enhanced Learning
More informationQDquaderni. UP-DRES User Profiling for a Dynamic REcommendation System E. Messina, D. Toscani, F. Archetti. university of milano bicocca
A01 084/01 university of milano bicocca QDquaderni department of informatics, systems and communication UP-DRES User Profiling for a Dynamic REcommendation System E. Messina, D. Toscani, F. Archetti research
More informationEmail Spam Detection Using Customized SimHash Function
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 8, December 2014, PP 35-40 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Email
More informationExtend Table Lens for High-Dimensional Data Visualization and Classification Mining
Extend Table Lens for High-Dimensional Data Visualization and Classification Mining CPSC 533c, Information Visualization Course Project, Term 2 2003 Fengdong Du fdu@cs.ubc.ca University of British Columbia
More informationAbstract. 2.1 Web log file data
Use Of Web Log File For Web Usage Mining Savita Devidas Patil Assistant Professor Department of Computer Engineering SSVPS s B.S.Deore College of Engineering Dhule, INDIA Abstract Many web page designers
More informationTo Enhance The Security In Data Mining Using Integration Of Cryptograhic And Data Mining Algorithms
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 06 (June. 2014), V2 PP 34-38 www.iosrjen.org To Enhance The Security In Data Mining Using Integration Of Cryptograhic
More informationNatural Language to Relational Query by Using Parsing Compiler
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
More information