Quantify the intersection of behavior in the work environment
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 8
Abstract
—This is the study of intersection of behaviour to analyze the behaviour of users in the social networking environment. We have so many opportunities and challenges to analyze the behaviour on a large scale. A social-dimension-based approach has been shown effective in addressing the heterogeneity of connections presented in social media. Day by day the clicks are increasing in a particular network. To know the interest and requirement of users we propose an edge-centric clustering scheme to extract sparse social dimensions. Even though there are thousands and lacks of users involved in the social network, the proposed approach can efficiently analyze the even behaviour of the users. This helps to improve the odd areas as well as even areas where the people stick on to their desires.
Authors and Affiliations
K. Hareesh Kumar, , D. Uma Devi,
Design and VLSI Implementation of DIP Based Rod Quality Inspection
The inspection of product quality in majority of cases is based on human factor because of complexities of problems of inspection and quality and demands for the changeability during decision about the quality of product...
Implementation and optimisation of FPGA based network security system using VHDL
The combination of traditional microprocessors and Field Programmable Gate Array(FPGAs) is developing as a future platform for intensive computational computing, combining thebest aspects of traditional microprocesso...
Perspective Study on Resource Information Aggregation in Computational Grid
Grid Computing is a mechanism of distributed computing to coordinate and share the networked resources, data domains, storage devices and processing power across geographically distributed locations. In the compu...
Traffic Estimation in Mobile Ad Hoc Network Using Probe Packets
This paper presents a new method for estimating of traffic in mobile ad hoc by using probe packets. Probing based approaches involves sending test transactions over the network to monitor the path and performance o...
SECURE DATA DELIVERY USING GEOGRAPHIC MULTICAST ROUTING
In MANET group communication is an important characteristic which can be implemented through Multicasting. MANET has a dynamic topology through which the mobile nodes keep changing their location and thus it doesn’t have...