COMMUNITY DISCOVERY: COMPARITIVE SURVEY BETWEEN PAGE RANK, HITS, SALSA AND HEIGEN
Journal Title: Elysium Journal of Engineering Research and Management - Year 2015, Vol 2, Issue 3
Abstract
his paper presents the comparative study of ranking algorithm such as PageRank, HITS, SALSA and Heigen. These algorithms share a common factor that is it finds the principal eigen vector. We experimented the first three algorithms and compared with the Heigen algorithm used to analyze the billion scale graph. We presented brief review showing the working process, advantages and disadvantages of each algorithm.
Authors and Affiliations
Saranya Balaguru Miss, Rachel Nallathamby Mr, Rene Robin C. R.
ANALYSIS OF BLOOD VESSEL CLASSIFICATION ALGORITHM ON RETINAL IMAGE USING C++
The proposed work is an automated system for the detection of Glaucoma which is done by using the algorithms CDR and ISNT ratio of a retinal fundus image. In general for the Glaucoma patient the s...
DETECTION AND PREVENTION OF MALICIOUS FEEDBACK RATING IN WEB SERVICE RECOMMENDATION SYSTEMS
To facilitate a recommendation to users for selecting an appropriate or reputed web service from mass of services by avoiding dishonest recommendation. To prevent, avoid and de...
AN EFFICIENT INFORMATION RETRIEVAL (EIR) ALGORITHM FOR PRIVACY PRESERVATION IN WEB SEARCH
Internet is occupied largely by the web search engines, to find and access a data. They pose a serious risk of privacy breach over the users. Thus, personalized search engines become the need for facing the privacy chall...
MULTI DESIGN PICTURE ANALYSIS VIA HUGE-STRUCTURE DESIGN INTERACTION CONSUMED ACTIVITY STUDY
Multi-label image classification problems have been solved by the supervised machine learning techniques with incredible profit. In spite of, un-equivalent mechanisms and their performances strongly...
BASED ON GREEN COMPUTING WORLD, THE HYBRID MALWARE DETECT MEMORY MAPPER IN KERNEL CENTRIC VIRTUAL MACHINE
Kernel malwares can provide user level-malware characteristics with additional probabilities of hiding their malicious activities by altering the legitimate kernel behavior of an operating system. Many researc...