Quantify the intersection of behavior in the work environment
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 8
Abstract
—This is the study of intersection of behaviour to analyze the behaviour of users in the social networking environment. We have so many opportunities and challenges to analyze the behaviour on a large scale. A social-dimension-based approach has been shown effective in addressing the heterogeneity of connections presented in social media. Day by day the clicks are increasing in a particular network. To know the interest and requirement of users we propose an edge-centric clustering scheme to extract sparse social dimensions. Even though there are thousands and lacks of users involved in the social network, the proposed approach can efficiently analyze the even behaviour of the users. This helps to improve the odd areas as well as even areas where the people stick on to their desires.
Authors and Affiliations
K. Hareesh Kumar, , D. Uma Devi,
End to End Delay Improvement Using Multipath Routing in MANET
Congestion and the loss of energy is the most common problem in the Ad hoc network. A considerable amount of energy is consumed in wireless interfaces. On the other hand the actual available bandwidth varies due to...
Wavelet Based Classification of Multispectral Satellite Image Using Fuzzy Incorporated Hierarchical Clustering With SVM Classifier
Multispectral satellite images are more efficient and a suitable method of obtaining information about land, because it can captures an image at specific frequency across the spectrum. This spectral image can allow...
Accurate Spam Mail Detection using Bayesian Algorithm
— With the increasing popularity of a E-mail users, E-mail spam problem growing proportionally. Spam filtering with near duplicate matching scheme is widely discussed in recent years. It is based on a known spam...
A cryptosystem based on Vigenère cipher with varying key
Privacy is one of the key issues information Security addresses. Through encryption one can prevent a third party from understanding raw data during signal transmission. The encryption methods for enhancing the sec...
Grid Density Based Clustering Algorithm
Clustering is the one of the most important task of the data mining. Clustering is the unsupervised method to find the relations between points of dataset into several groups. It can be done by using various types...