USER INTEREST FOR PERSONALISED SEARCH BASED ON AUTOMATIC IDENTIFICATION
Journal Title: Elysium Journal of Engineering Research and Management - Year 2015, Vol 2, Issue 4
Abstract
The quality of several search services on the Internet is enhanced by the personalized web search (PWS). Due to the user’s unwillingness to reveal their individual information, while search has become a major obstruction for the broad use of PWS. As per the user preferences, the privacy protection in PWS applications that model acts as hierarchical user profiles. In this paper, a PWS framework named UPS that can derive the profiles by inquiries during with regard to user specified privacy requirements. A striking balance between two predictive metrics that estimate the privacy risk of obstructive the generalized profile and the function of personalization is aimed by our runtime generalization. It is generalized by two greedy algorithms; there are Greedy DP and Greedy IL. Hence, to decide the personalizing a query is beneficial, which is given by an online prediction mechanism. The effectiveness of our framework is demonstrated by comprehensive experiments.
Authors and Affiliations
Jeyanthi S. , Priya B.
PREDICTION IN DATA MINING COMPARATIVE STUDY OF HEART DISEASE
Data mining is the process of finding useful and relevant information from the databases. There are several types of data mining techniques are available. Association Rule, Classification, Neur...
FiDoop: Parallel Mining of Frequent Item sets Using MapReduce
Due to the exponential increase of real-time data monitoring systems, the extraction of frequent item (Frequent item set mining) set from large uncertain database is the challenging task. The existing parallel mining alg...
COMPARATIVE STUDY ON RESOURCE ALLOCATION METHODS IN CLOUD COMPUTING
Cloud Computing is a contribution-based service where you can procure networked storage space and computer resource. Resource allocation is the process of assigning and managing assets in a manner that su...
A NOVEL VISUAL CRYPTOGRAPHY APPROACH FOR MEDICAL IMAGE TRANSACTIONS USING VIDEO STEGANOGRAPHY
Visual Cryptography is very essential to transfer important secret information like medical images, military secrets, bank account details and other secret information in a secure manner. This pap...
Monitoring Aggression In Adolescents: Chandra Namaskara As A Panacea
Aggression in adolescence is a key point of focus for psychologists, educationists, parents, and teachers. On the other hand, interdisciplinary researches with special reference to yoga and psychology are growing rapidly...