SlideShare a Scribd company logo
1 of 11
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1181
EaZSearch
Aayesha Mullani1, Deepali Patil2, Ishrat Tamboli3, Aishwarya Chougule4, Kiran Gavade5 ,
R. V. Chavan6
1-5 Student, Department of Computer Sci. & Engg., DYPET, Maharashtra, India
6Lecturer , Department of Computer Sci. & Engg., DYPET , Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
ABSTRACT - EaZSearch has useful for its effectiveness in increasing the quality of search on the Internet
Service. However, in general history show that users’ reluctance to disclose their secrete data at the time of search
has become a major problem. In EaZSearch application model where hierarchical user profiles are used. We develop
one framework called UPSearch that can create profiles by queries while respecting user specified requirements. We
presented two greedy algorithms, DP_Algo and IL_Algo. We also provide an prediction technique for deciding
whether personalizing a query is beneficial. The results also proves that IL_Algo significantly outperforms Dp_Algo in
terms of efficiency.
Key Words: Privacy protection, EaZSearch , utility, risk, Web search, User profile, information.
1. INTRODUCTION
When amount of information on the internet increases rapidly, it creates many new challenges or problems for Web
search. When the same query is fired by different users, a general search engine gives the same out, without knowing of
who submitted the query. This output may not be suitable for users with different required information needs.
The web search engine has long become the most important door for searching information on the web. However, users
might got failure when search engines return unexpected results that do not meet their real requirement. Such unexpected
results are due to the excessive variety of users’ contexts and backgrounds, as well as the ambiguity of texts. EaZSearch is a
general category of web search techniques aiming at providing better search results, which are tailored for user needs. As
the expense, user information has to be collected and analyzed to find out the user intention behind the entered query.
2. EXISTING SYSTEM
Now days to protect user privacy in profile-based search is becoming very difficult, the researchers are considering two
effects during the search process. First, they try to improve the search quality with the personalization utility of the user
profile. And secondly, they have to hide the private contents present in the user profile to consider the privacy risk. The
problems with the existing systems are explained in the following observations:
2.1. The present profile-based search engines do not support runtime profiling. A user profile is typically made
available for only once offline, and used to personalize all queries from a same user without any judgments. This strategy
certainly has drawbacks which give rise to variety of queries. The only solution to these problem is online decision on:
a. do we have to personalize the query (by considering the profile) and
b. what to considering in the user profile at runtime.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1182
2.2. The existing search engines do not consider the customization of privacy requirements.
Because of which some of the personal data of user is to be overprotected while others are insufficiently protected. For
example if any user wants to perform an query for personal use will not have any privacy regarding it, and that all will be
insufficiently protected which may lead to users privacy risk.
2.3. Many existing search engines techniques require repeated user interactions when user wants to creating
personalized search.
Many of the searches require multiple user interactions. This will take too much risk of privacy, but also demand
processing time for profiling.
3. LITERATURE SURVEY
Privacy –Enhanced Web Personalization: [3]
Author – Rupali Keshavrao Aher, Akshay Rajdhar Adik
For users web personalization is used to improve search quality by customizing search results, based on the personal data
of user provided to the search engine. Thus, there is balance between the search quality and privacy protection. Two
greedy algorithms, namely Greedy discriminating power (GreedyDP) and Greedy Information Loss algorithm (GreedyIL),
are used for runtime generalization. GreedyIL algorithm achieves high efficiency than the GreedyDP algorithm.
Supporting Privacy Protection in Personalized Web Search: [1]
Author – Lidan Shou, He Bai, Ke Chen, and Gang Chen
Personalized web search (PWS) has demonstrated its effectiveness in improving the quality of various search services on
the Internet. However, evidences show that user’s reluctance to disclose their private information during search has
become a major barrier for the wide proliferation of PWS. We study privacy protection in PWS applications that model
user preferences as hierarchical user profiles. We propose a PWS framework called UPS that can adaptively generalize
profiles by queries while respecting user specified privacy requirements. Our runtime generalization aims at striking a
balance between two predictive metrics that evaluate the utility of personalization and the privacy risk of exposing the
generalized profile.
Enhance Search In Web Search Engine Using Greedy Algorithm: [2]
Author – V. Ramya, S. Gowthami
UPS stands for User customizable Privacy-preserving Search framework. The framework assumes that the queries do not
contain any sensitive information, and aims at protecting the privacy in individual user profiles while retaining their
usefulness for PWS. UPS consists of a non-trusty search engine server and a number of clients. Each client (user) accessing
the search service trusts no one but himself/ herself. The key component for privacy protection is an online profiler
implemented as a search proxy running on the client machine itself. The proxy maintains both the complete user profile, in
a hierarchy of nodes with semantics, and the user-specified (customized) privacy requirements represented as a set of
sensitive-nodes.
Automatic Identification of User Interest For Personalized Search: [5]
Author – FengQiu, Junghoo Cho
The key idea behind Page Rank is that, multiple web pages are available on web but user wants only some pages then user
always prefers famous or well-known pages. In this paper two techniques are used. Various formulas are provided in to
calculate Page Rank.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1183
1. Simple Page Rank:
However, in real life, a user does not follow links all the time in web browsing; she sometimes types URL’s directly and
visits a new page. The computed Page Rank values are used by search engines during query processing, such that the
pages with high Page Rank values are generally placed at the top of search results.
2. Topic-Sensitive Page Rank:
The Topic-Sensitive Page Rank scheme (TSPR) proposed is an interesting extension of Page Rank that can potentially
provide different rankings for different queries, while essentially retaining the efficiency advantage of the standard Page
Rank.
4. PROPOSED SYSTEM
In the proposed system the users have the facility to create their own profile by considering their profession. These will
help user easily to find out any query related to any data which will be generated by taking the users profile into
consideration. The user will be getting their own personalizes EaZSearh.
These will also help to reduce the repeated work and repeated interaction of user with search engines as explained in
existing system.
Admin Login:
This module provides the admin with login facility with their login id and password, in that admin can maintain the
profiles with the consideration of user interest or maintain the data according to that profile and that data will be provide
to the user with respect to profile defined by user and also Admin can be able to view the user information with their
defined profile
User Registration:
This module provides registrations facility to user. The user must register to the website by entering their personal
information and after successful registration, user personal account will be created so that user can able to login to their
personal account with the own user id and password, in that user should select the profile which maintained by admin on
which it wants data and also user can able to update that define profile
User customizable Privacy-preserving Search (UPS):
In this module when the user enters query based on profiles which should be defined in their personal account and the
system will provide the all required information maintained by admin based on that user entered query.
User Log Collection:
Here admin will store logs which are maintained by ranking the websites that are more visited by users. Here if any other
user enters the same query which is referred by previous user then by user customizable search user will get all required
data with data which mostly preferred by other user.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1184
4.1 Block Diagram
Figure 1-: Block Diagram
The block diagram describes overall structure of the system. It includes three users’ of system namely admin, registered
user and new user. The First user is the admin of system which administrate the overall performance of the system during
administrating the performance of the system admin has given authorities for performing the tasks like viewing the user
profile, uploading data, store any changes related to user data as well.
The another user of system is the new user which will register to the system for performing further tasks such as searching
any query or defining own profile etc. The new user is became registered user after performing registration which we can
call it as third user of the system. Now registered user can perform same tasks as UPS search and can also update the profile
and all changes are stored in database.
4.2 System Architecture
The below diagram shows the system component of the system which includes the client side and server side. There are
components like the user of the system, profile, privacy factor and the multiple generalized profiles as G* of user have been
created on the basis of user profile.
The user of the system is performing UPS search after registration, login and creating the profile based on his/her own
requirement.
The user of system first enter the query then the query is submitted to database and then admin of the system will fetches
the appropriate result by referring the user generalized profile as G* which was created at the time of registration and the
result will given to user in the form of list of page link.
The user of system then go through the list and by referring the page link it will obtain the appropriate result which he/she
will expect. The user can refer multiple page links at time and definitely the system generates the appropriate result.
If in any case the result will not stored within the system then admin of the system can perform the Google Search and
collect the appropriate results from the Google and store in the database. Then it will be given to the user of the system.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1185
Figure 2: System Architecture
5. ALGORITHMS
5.1 IL_Algo ( ∂,k,€) [4]
Input:Peak profile G0 ; Query k; threshold value €
Output: Generlized profile G* satiesfying €-Risk
let D be the IL-priority queue of node-leaf decision;
i be the iteration varible,intilized to 0;
if DP (k,R)<α then
Obtain the peak profile G0 from online 0;
Insert {e,IL(e)} into D for all e € T∂(q);
While risk (k,Gi)> € do
Pop a noed leaf opration on e from D;
Set n ← part (e,Gi);
Process node-leaf Gi → Gi+1;
if t has no siblings then
insert <n,IL(n)> to D;
else if n has siblings then
merge n into shadow_siblings;
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1186
if No opration on t’s siblings in D then
insert <e,IL(e)> to D;
else
update the IL-values for all opration on
n’s sibling in D;
update i ←i+1;
return Gi as G*;
return root (D) as G*;
5.2 DP_Algo [4]
Step 1: Defined an operator → called node leaf
Where →= indicates the removal of a leaf topic, t
from a profile.
Step 2: Mathematical Equation
G(i) → G(i+1)………………….G=Seed Profile
which denotes, to obtain leaf t from profile G(i) to G(i+1).
Step 3 : G* can be generated with a finite length transitive closure of prune leaf.
Step 4: It works in bottom up manner initial point G(0)
(i=0,1,…n).
GreedyDP chooses leaf topic
tεT
Gi(q).………………………t=Leaf Profile
q=node
maintains Best Profile (Gi+1) which has highest discriminating power to satisfy (δ) risk constraint.
Note: Iterative process terminates when the profile is generated to a root topic.
Step 5: Best Profile
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1187
G*=Final result of algorithm.
6. SET THEORY
Let S represent our proposed system
S={I, O, Su, Fa,Ø }
Where,
I = Input, O = Output, Fa= Failure, Su = Success
I is Input I = {U,Q,P}
Where,
U = User information, Q = Query, P = Updated Profile
O is Output O = { Ur , Vr}
Where,
Ur = UPS search result , Vr = Visited link result
Su is Success Su = SR
Where,
SR = Successful result Received
Fa is Failure Fa= RF
Where,
RF = Result not found
Actual inputs of the System :-
I is Input I = {U,Q,P}
Where ,
U = User information
Input :- Filled information
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1188
Output :- Registration will be done
Success :- Successed to filled correct information
Failure :- Fails to fill correct information
Q = Query
Input :- Typed Query
Output :- Query matched
Success :- Successfully match query result
Failure :- Query result not matched
P = Updated Profile
Input :- Created user profil
Output :- Found Profile updated
Success :- Successful updated profile
Failure :- Profile unable to update due to filled up invalid information
Actual outputs of the System
O is Output O = {Ur , Vr}
Where ,
Ur = UPS search result
Input :- Typed Query
Output :- Query matched and result found
Success :- Successful found result
Failure :- Fails to found result
Vr =Mostly Visited links Result
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1189
Input :- Ranking process
Output :- Mostly ranked links list
Success :- Successfully found ranked links list
Failure :- Fails to found ranked links list
Ø is constraints of system Ø = {PM , PE}
Where ,
PM= Possibility of query will not match with stored database
PE = Possibility of user will not enter appropriate query according to their profile
6.1 Mathematical model using “Deterministic Finite Automata”
Figure 3: Deterministic Finite Automata (DFA)
Where ,
RS = Registration
LN = Login
US = UPS search
DB = Database
LO = Logout
Deterministic finite state automata
A deterministic finite automata M is a 5-tuple, (Q, ∂, Ʃ, q0, F) consisting of following fields :-
A finite set of states (Q) ={ S , A , B , C , D}
A finite set of input symbols called the alphabet (Ʃ)={ a, b, c, d , e }
A transition function (∂ : Q × Ʃ Q ) ={S, LN , US , DB , LO}
A start state (q0 € Q) = S
A set of accept states (f c Q) = D
Where ,
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1190
RS- Registration, LN- Login, US- UPS search,
DB- Database, LO- Logout St (A,B,C), Alp- alphabets.
Derivation() is defined by below transition table.
7. Multiplexer Logic
Figure 4: Multiplexer Logic
Where ,
S1 ,S2, S3 = select lines
D = data lines
Here Input I=(S1 ,S2 S3)
Where ,
S1 = Registration
S2 =Login
S3 = UPS search
Here O= Output
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1191
7. CONCLUSION
At client side privacy is maintained by preventing the users private account. Any EaZSearch can create user profile in
hierarchical tree view. EaZSearch allows user to specify the privacy requirement of client and thus the personal data of
user profile is kept private without compromising the quality of search query. EaZSearch implements two algorithms
DP_Algo and IL_Algo.
REFERENCES
[1]LidanShou, He Bai, Ke Chen, and Gang Chen,“Supporting Privacy Protection in Personalized Web Search”, IEEE
Transactions On Knowledge And Data Engineering Vol:26 No: 2 Year 2014.
[2]RupaliKeshavraoAher, AkshayRajdharAdik,“Privacy Enhanced Web Personalization”, IEEE Transactions On Knowledge
And Data Engineering Vol:50 No: 5 Year 2015.
[3]V.Ramya,S.Gowthami,“Enhance Search In Web Search Engine U sing Greedy Algorithm”, IEEE Transactions On Knowledge
And Data Engineering Vol:89 No: 3 Year 2014.
[4] Based on a handout by Tim Roughgarden, Alexa Sharp, and Tom Wexler, “Guide to Greedy Algorithms”.
[5] FengQiu, Junghoo Cho, “Automatic Identification of User InterestFor Personalized Search”, IEEE Transactions On
Knowledge And Data Engineering Vol:98 No: 4 Year.

More Related Content

What's hot

IRJET- Android Application for WIFI based Library Book Locator
IRJET-  	  Android Application for WIFI based Library Book LocatorIRJET-  	  Android Application for WIFI based Library Book Locator
IRJET- Android Application for WIFI based Library Book LocatorIRJET Journal
 
Ignou MCA mini project report
Ignou MCA mini project reportIgnou MCA mini project report
Ignou MCA mini project reportHitesh Jangid
 
IRJET- Intelligent Globetrotting Information System using Association Rule Mi...
IRJET- Intelligent Globetrotting Information System using Association Rule Mi...IRJET- Intelligent Globetrotting Information System using Association Rule Mi...
IRJET- Intelligent Globetrotting Information System using Association Rule Mi...IRJET Journal
 
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET -  	  Chrome Extension for Detecting Phishing WebsitesIRJET -  	  Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing WebsitesIRJET Journal
 
Prediction Techniques in Internet of Things (IoT) Environment: A Comparative ...
Prediction Techniques in Internet of Things (IoT) Environment: A Comparative ...Prediction Techniques in Internet of Things (IoT) Environment: A Comparative ...
Prediction Techniques in Internet of Things (IoT) Environment: A Comparative ...rahulmonikasharma
 
Attendance Management System
Attendance Management SystemAttendance Management System
Attendance Management SystemArhind Gautam
 
Design of an online expert system for career guidance
Design of an online expert system for career guidanceDesign of an online expert system for career guidance
Design of an online expert system for career guidanceeSAT Publishing House
 
IRJET- Sentimental Prediction of Users Perspective through Live Streaming : T...
IRJET- Sentimental Prediction of Users Perspective through Live Streaming : T...IRJET- Sentimental Prediction of Users Perspective through Live Streaming : T...
IRJET- Sentimental Prediction of Users Perspective through Live Streaming : T...IRJET Journal
 
Placement management system
Placement management systemPlacement management system
Placement management systemSurya Teja
 
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008Journal For Research
 
IRJET- Intelligence Extraction using Machine Learning Technics
IRJET- Intelligence Extraction using Machine Learning TechnicsIRJET- Intelligence Extraction using Machine Learning Technics
IRJET- Intelligence Extraction using Machine Learning TechnicsIRJET Journal
 
IRJET - Android based Application – Missing Person
IRJET -  	  Android based Application – Missing PersonIRJET -  	  Android based Application – Missing Person
IRJET - Android based Application – Missing PersonIRJET Journal
 

What's hot (16)

AUTHENTICATED MEDICAL DOCUMENTS RELEASING WITH PRIVACY PROTECTION AND RELEAS...
AUTHENTICATED MEDICAL DOCUMENTS RELEASING  WITH PRIVACY PROTECTION AND RELEAS...AUTHENTICATED MEDICAL DOCUMENTS RELEASING  WITH PRIVACY PROTECTION AND RELEAS...
AUTHENTICATED MEDICAL DOCUMENTS RELEASING WITH PRIVACY PROTECTION AND RELEAS...
 
Ijcet 06 10_004
Ijcet 06 10_004Ijcet 06 10_004
Ijcet 06 10_004
 
IRJET- Android Application for WIFI based Library Book Locator
IRJET-  	  Android Application for WIFI based Library Book LocatorIRJET-  	  Android Application for WIFI based Library Book Locator
IRJET- Android Application for WIFI based Library Book Locator
 
Ignou MCA mini project report
Ignou MCA mini project reportIgnou MCA mini project report
Ignou MCA mini project report
 
IRJET- Intelligent Globetrotting Information System using Association Rule Mi...
IRJET- Intelligent Globetrotting Information System using Association Rule Mi...IRJET- Intelligent Globetrotting Information System using Association Rule Mi...
IRJET- Intelligent Globetrotting Information System using Association Rule Mi...
 
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET -  	  Chrome Extension for Detecting Phishing WebsitesIRJET -  	  Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing Websites
 
Prediction Techniques in Internet of Things (IoT) Environment: A Comparative ...
Prediction Techniques in Internet of Things (IoT) Environment: A Comparative ...Prediction Techniques in Internet of Things (IoT) Environment: A Comparative ...
Prediction Techniques in Internet of Things (IoT) Environment: A Comparative ...
 
Attendance Management System
Attendance Management SystemAttendance Management System
Attendance Management System
 
ONLINE BUS PASS GERANERATION AND RENEWAL SYSTEM USING MOBILE APPLICATION
ONLINE BUS PASS GERANERATION AND RENEWAL SYSTEM USING MOBILE APPLICATIONONLINE BUS PASS GERANERATION AND RENEWAL SYSTEM USING MOBILE APPLICATION
ONLINE BUS PASS GERANERATION AND RENEWAL SYSTEM USING MOBILE APPLICATION
 
Design of an online expert system for career guidance
Design of an online expert system for career guidanceDesign of an online expert system for career guidance
Design of an online expert system for career guidance
 
IRJET- Sentimental Prediction of Users Perspective through Live Streaming : T...
IRJET- Sentimental Prediction of Users Perspective through Live Streaming : T...IRJET- Sentimental Prediction of Users Perspective through Live Streaming : T...
IRJET- Sentimental Prediction of Users Perspective through Live Streaming : T...
 
Placement management system
Placement management systemPlacement management system
Placement management system
 
NUDGE - A DAY PLANNER ANDROID APPLICATION USING ARTIFICIAL INTELLIGENCE
NUDGE - A DAY PLANNER ANDROID APPLICATION USING ARTIFICIAL INTELLIGENCENUDGE - A DAY PLANNER ANDROID APPLICATION USING ARTIFICIAL INTELLIGENCE
NUDGE - A DAY PLANNER ANDROID APPLICATION USING ARTIFICIAL INTELLIGENCE
 
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
 
IRJET- Intelligence Extraction using Machine Learning Technics
IRJET- Intelligence Extraction using Machine Learning TechnicsIRJET- Intelligence Extraction using Machine Learning Technics
IRJET- Intelligence Extraction using Machine Learning Technics
 
IRJET - Android based Application – Missing Person
IRJET -  	  Android based Application – Missing PersonIRJET -  	  Android based Application – Missing Person
IRJET - Android based Application – Missing Person
 

Similar to EaZSearch

IRJET- A Novel Technique for Inferring User Search using Feedback Sessions
IRJET- A Novel Technique for Inferring User Search using Feedback SessionsIRJET- A Novel Technique for Inferring User Search using Feedback Sessions
IRJET- A Novel Technique for Inferring User Search using Feedback SessionsIRJET Journal
 
Detection of Behavior using Machine Learning
Detection of Behavior using Machine LearningDetection of Behavior using Machine Learning
Detection of Behavior using Machine LearningIRJET Journal
 
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...IRJET Journal
 
IRJET- Text-based Domain and Image Categorization of Google Search Engine usi...
IRJET- Text-based Domain and Image Categorization of Google Search Engine usi...IRJET- Text-based Domain and Image Categorization of Google Search Engine usi...
IRJET- Text-based Domain and Image Categorization of Google Search Engine usi...IRJET Journal
 
10 personalized-web-search-techniques
10 personalized-web-search-techniques10 personalized-web-search-techniques
10 personalized-web-search-techniquesdipanjalishipne
 
Smart Feedback Analysis System
Smart Feedback Analysis SystemSmart Feedback Analysis System
Smart Feedback Analysis SystemIRJET Journal
 
An Effective Job Recruitment System Using Content-based Filtering
An Effective Job Recruitment System Using Content-based FilteringAn Effective Job Recruitment System Using Content-based Filtering
An Effective Job Recruitment System Using Content-based FilteringIRJET Journal
 
IRJET-A Survey on Web Personalization of Web Usage Mining
IRJET-A Survey on Web Personalization of Web Usage MiningIRJET-A Survey on Web Personalization of Web Usage Mining
IRJET-A Survey on Web Personalization of Web Usage MiningIRJET Journal
 
Projection Multi Scale Hashing Keyword Search in Multidimensional Datasets
Projection Multi Scale Hashing Keyword Search in Multidimensional DatasetsProjection Multi Scale Hashing Keyword Search in Multidimensional Datasets
Projection Multi Scale Hashing Keyword Search in Multidimensional DatasetsIRJET Journal
 
IRJET- Scalable Content Aware Collaborative Filtering for Location Recommenda...
IRJET- Scalable Content Aware Collaborative Filtering for Location Recommenda...IRJET- Scalable Content Aware Collaborative Filtering for Location Recommenda...
IRJET- Scalable Content Aware Collaborative Filtering for Location Recommenda...IRJET Journal
 
Time-Ordered Collaborative Filtering for News Recommendation
Time-Ordered Collaborative Filtering for News RecommendationTime-Ordered Collaborative Filtering for News Recommendation
Time-Ordered Collaborative Filtering for News RecommendationIRJET Journal
 
A New Algorithm for Inferring User Search Goals with Feedback Sessions
A New Algorithm for Inferring User Search Goals with Feedback SessionsA New Algorithm for Inferring User Search Goals with Feedback Sessions
A New Algorithm for Inferring User Search Goals with Feedback SessionsIJERA Editor
 
Tourist Destination Recommendation System using Cosine Similarity
Tourist Destination Recommendation System using Cosine SimilarityTourist Destination Recommendation System using Cosine Similarity
Tourist Destination Recommendation System using Cosine SimilarityIRJET Journal
 
User search goal inference and feedback session using fast generalized – fuzz...
User search goal inference and feedback session using fast generalized – fuzz...User search goal inference and feedback session using fast generalized – fuzz...
User search goal inference and feedback session using fast generalized – fuzz...eSAT Publishing House
 
IRJET- V.A.N.I. (Voice Automated Notes and Information)
IRJET- V.A.N.I. (Voice Automated Notes and Information)IRJET- V.A.N.I. (Voice Automated Notes and Information)
IRJET- V.A.N.I. (Voice Automated Notes and Information)IRJET Journal
 
Personalized web search using browsing history and domain knowledge
Personalized web search using browsing history and domain knowledgePersonalized web search using browsing history and domain knowledge
Personalized web search using browsing history and domain knowledgeRishikesh Pathak
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 

Similar to EaZSearch (20)

IRJET- A Novel Technique for Inferring User Search using Feedback Sessions
IRJET- A Novel Technique for Inferring User Search using Feedback SessionsIRJET- A Novel Technique for Inferring User Search using Feedback Sessions
IRJET- A Novel Technique for Inferring User Search using Feedback Sessions
 
Detection of Behavior using Machine Learning
Detection of Behavior using Machine LearningDetection of Behavior using Machine Learning
Detection of Behavior using Machine Learning
 
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
 
50120140506005 2
50120140506005 250120140506005 2
50120140506005 2
 
IRJET- Text-based Domain and Image Categorization of Google Search Engine usi...
IRJET- Text-based Domain and Image Categorization of Google Search Engine usi...IRJET- Text-based Domain and Image Categorization of Google Search Engine usi...
IRJET- Text-based Domain and Image Categorization of Google Search Engine usi...
 
10 personalized-web-search-techniques
10 personalized-web-search-techniques10 personalized-web-search-techniques
10 personalized-web-search-techniques
 
Smart Feedback Analysis System
Smart Feedback Analysis SystemSmart Feedback Analysis System
Smart Feedback Analysis System
 
An Effective Job Recruitment System Using Content-based Filtering
An Effective Job Recruitment System Using Content-based FilteringAn Effective Job Recruitment System Using Content-based Filtering
An Effective Job Recruitment System Using Content-based Filtering
 
IRJET-A Survey on Web Personalization of Web Usage Mining
IRJET-A Survey on Web Personalization of Web Usage MiningIRJET-A Survey on Web Personalization of Web Usage Mining
IRJET-A Survey on Web Personalization of Web Usage Mining
 
Projection Multi Scale Hashing Keyword Search in Multidimensional Datasets
Projection Multi Scale Hashing Keyword Search in Multidimensional DatasetsProjection Multi Scale Hashing Keyword Search in Multidimensional Datasets
Projection Multi Scale Hashing Keyword Search in Multidimensional Datasets
 
IRJET- Scalable Content Aware Collaborative Filtering for Location Recommenda...
IRJET- Scalable Content Aware Collaborative Filtering for Location Recommenda...IRJET- Scalable Content Aware Collaborative Filtering for Location Recommenda...
IRJET- Scalable Content Aware Collaborative Filtering for Location Recommenda...
 
Time-Ordered Collaborative Filtering for News Recommendation
Time-Ordered Collaborative Filtering for News RecommendationTime-Ordered Collaborative Filtering for News Recommendation
Time-Ordered Collaborative Filtering for News Recommendation
 
50120140502013
5012014050201350120140502013
50120140502013
 
50120140502013
5012014050201350120140502013
50120140502013
 
A New Algorithm for Inferring User Search Goals with Feedback Sessions
A New Algorithm for Inferring User Search Goals with Feedback SessionsA New Algorithm for Inferring User Search Goals with Feedback Sessions
A New Algorithm for Inferring User Search Goals with Feedback Sessions
 
Tourist Destination Recommendation System using Cosine Similarity
Tourist Destination Recommendation System using Cosine SimilarityTourist Destination Recommendation System using Cosine Similarity
Tourist Destination Recommendation System using Cosine Similarity
 
User search goal inference and feedback session using fast generalized – fuzz...
User search goal inference and feedback session using fast generalized – fuzz...User search goal inference and feedback session using fast generalized – fuzz...
User search goal inference and feedback session using fast generalized – fuzz...
 
IRJET- V.A.N.I. (Voice Automated Notes and Information)
IRJET- V.A.N.I. (Voice Automated Notes and Information)IRJET- V.A.N.I. (Voice Automated Notes and Information)
IRJET- V.A.N.I. (Voice Automated Notes and Information)
 
Personalized web search using browsing history and domain knowledge
Personalized web search using browsing history and domain knowledgePersonalized web search using browsing history and domain knowledge
Personalized web search using browsing history and domain knowledge
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 

Recently uploaded (20)

Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 

EaZSearch

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1181 EaZSearch Aayesha Mullani1, Deepali Patil2, Ishrat Tamboli3, Aishwarya Chougule4, Kiran Gavade5 , R. V. Chavan6 1-5 Student, Department of Computer Sci. & Engg., DYPET, Maharashtra, India 6Lecturer , Department of Computer Sci. & Engg., DYPET , Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- ABSTRACT - EaZSearch has useful for its effectiveness in increasing the quality of search on the Internet Service. However, in general history show that users’ reluctance to disclose their secrete data at the time of search has become a major problem. In EaZSearch application model where hierarchical user profiles are used. We develop one framework called UPSearch that can create profiles by queries while respecting user specified requirements. We presented two greedy algorithms, DP_Algo and IL_Algo. We also provide an prediction technique for deciding whether personalizing a query is beneficial. The results also proves that IL_Algo significantly outperforms Dp_Algo in terms of efficiency. Key Words: Privacy protection, EaZSearch , utility, risk, Web search, User profile, information. 1. INTRODUCTION When amount of information on the internet increases rapidly, it creates many new challenges or problems for Web search. When the same query is fired by different users, a general search engine gives the same out, without knowing of who submitted the query. This output may not be suitable for users with different required information needs. The web search engine has long become the most important door for searching information on the web. However, users might got failure when search engines return unexpected results that do not meet their real requirement. Such unexpected results are due to the excessive variety of users’ contexts and backgrounds, as well as the ambiguity of texts. EaZSearch is a general category of web search techniques aiming at providing better search results, which are tailored for user needs. As the expense, user information has to be collected and analyzed to find out the user intention behind the entered query. 2. EXISTING SYSTEM Now days to protect user privacy in profile-based search is becoming very difficult, the researchers are considering two effects during the search process. First, they try to improve the search quality with the personalization utility of the user profile. And secondly, they have to hide the private contents present in the user profile to consider the privacy risk. The problems with the existing systems are explained in the following observations: 2.1. The present profile-based search engines do not support runtime profiling. A user profile is typically made available for only once offline, and used to personalize all queries from a same user without any judgments. This strategy certainly has drawbacks which give rise to variety of queries. The only solution to these problem is online decision on: a. do we have to personalize the query (by considering the profile) and b. what to considering in the user profile at runtime.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1182 2.2. The existing search engines do not consider the customization of privacy requirements. Because of which some of the personal data of user is to be overprotected while others are insufficiently protected. For example if any user wants to perform an query for personal use will not have any privacy regarding it, and that all will be insufficiently protected which may lead to users privacy risk. 2.3. Many existing search engines techniques require repeated user interactions when user wants to creating personalized search. Many of the searches require multiple user interactions. This will take too much risk of privacy, but also demand processing time for profiling. 3. LITERATURE SURVEY Privacy –Enhanced Web Personalization: [3] Author – Rupali Keshavrao Aher, Akshay Rajdhar Adik For users web personalization is used to improve search quality by customizing search results, based on the personal data of user provided to the search engine. Thus, there is balance between the search quality and privacy protection. Two greedy algorithms, namely Greedy discriminating power (GreedyDP) and Greedy Information Loss algorithm (GreedyIL), are used for runtime generalization. GreedyIL algorithm achieves high efficiency than the GreedyDP algorithm. Supporting Privacy Protection in Personalized Web Search: [1] Author – Lidan Shou, He Bai, Ke Chen, and Gang Chen Personalized web search (PWS) has demonstrated its effectiveness in improving the quality of various search services on the Internet. However, evidences show that user’s reluctance to disclose their private information during search has become a major barrier for the wide proliferation of PWS. We study privacy protection in PWS applications that model user preferences as hierarchical user profiles. We propose a PWS framework called UPS that can adaptively generalize profiles by queries while respecting user specified privacy requirements. Our runtime generalization aims at striking a balance between two predictive metrics that evaluate the utility of personalization and the privacy risk of exposing the generalized profile. Enhance Search In Web Search Engine Using Greedy Algorithm: [2] Author – V. Ramya, S. Gowthami UPS stands for User customizable Privacy-preserving Search framework. The framework assumes that the queries do not contain any sensitive information, and aims at protecting the privacy in individual user profiles while retaining their usefulness for PWS. UPS consists of a non-trusty search engine server and a number of clients. Each client (user) accessing the search service trusts no one but himself/ herself. The key component for privacy protection is an online profiler implemented as a search proxy running on the client machine itself. The proxy maintains both the complete user profile, in a hierarchy of nodes with semantics, and the user-specified (customized) privacy requirements represented as a set of sensitive-nodes. Automatic Identification of User Interest For Personalized Search: [5] Author – FengQiu, Junghoo Cho The key idea behind Page Rank is that, multiple web pages are available on web but user wants only some pages then user always prefers famous or well-known pages. In this paper two techniques are used. Various formulas are provided in to calculate Page Rank.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1183 1. Simple Page Rank: However, in real life, a user does not follow links all the time in web browsing; she sometimes types URL’s directly and visits a new page. The computed Page Rank values are used by search engines during query processing, such that the pages with high Page Rank values are generally placed at the top of search results. 2. Topic-Sensitive Page Rank: The Topic-Sensitive Page Rank scheme (TSPR) proposed is an interesting extension of Page Rank that can potentially provide different rankings for different queries, while essentially retaining the efficiency advantage of the standard Page Rank. 4. PROPOSED SYSTEM In the proposed system the users have the facility to create their own profile by considering their profession. These will help user easily to find out any query related to any data which will be generated by taking the users profile into consideration. The user will be getting their own personalizes EaZSearh. These will also help to reduce the repeated work and repeated interaction of user with search engines as explained in existing system. Admin Login: This module provides the admin with login facility with their login id and password, in that admin can maintain the profiles with the consideration of user interest or maintain the data according to that profile and that data will be provide to the user with respect to profile defined by user and also Admin can be able to view the user information with their defined profile User Registration: This module provides registrations facility to user. The user must register to the website by entering their personal information and after successful registration, user personal account will be created so that user can able to login to their personal account with the own user id and password, in that user should select the profile which maintained by admin on which it wants data and also user can able to update that define profile User customizable Privacy-preserving Search (UPS): In this module when the user enters query based on profiles which should be defined in their personal account and the system will provide the all required information maintained by admin based on that user entered query. User Log Collection: Here admin will store logs which are maintained by ranking the websites that are more visited by users. Here if any other user enters the same query which is referred by previous user then by user customizable search user will get all required data with data which mostly preferred by other user.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1184 4.1 Block Diagram Figure 1-: Block Diagram The block diagram describes overall structure of the system. It includes three users’ of system namely admin, registered user and new user. The First user is the admin of system which administrate the overall performance of the system during administrating the performance of the system admin has given authorities for performing the tasks like viewing the user profile, uploading data, store any changes related to user data as well. The another user of system is the new user which will register to the system for performing further tasks such as searching any query or defining own profile etc. The new user is became registered user after performing registration which we can call it as third user of the system. Now registered user can perform same tasks as UPS search and can also update the profile and all changes are stored in database. 4.2 System Architecture The below diagram shows the system component of the system which includes the client side and server side. There are components like the user of the system, profile, privacy factor and the multiple generalized profiles as G* of user have been created on the basis of user profile. The user of the system is performing UPS search after registration, login and creating the profile based on his/her own requirement. The user of system first enter the query then the query is submitted to database and then admin of the system will fetches the appropriate result by referring the user generalized profile as G* which was created at the time of registration and the result will given to user in the form of list of page link. The user of system then go through the list and by referring the page link it will obtain the appropriate result which he/she will expect. The user can refer multiple page links at time and definitely the system generates the appropriate result. If in any case the result will not stored within the system then admin of the system can perform the Google Search and collect the appropriate results from the Google and store in the database. Then it will be given to the user of the system.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1185 Figure 2: System Architecture 5. ALGORITHMS 5.1 IL_Algo ( ∂,k,€) [4] Input:Peak profile G0 ; Query k; threshold value € Output: Generlized profile G* satiesfying €-Risk let D be the IL-priority queue of node-leaf decision; i be the iteration varible,intilized to 0; if DP (k,R)<α then Obtain the peak profile G0 from online 0; Insert {e,IL(e)} into D for all e € T∂(q); While risk (k,Gi)> € do Pop a noed leaf opration on e from D; Set n ← part (e,Gi); Process node-leaf Gi → Gi+1; if t has no siblings then insert <n,IL(n)> to D; else if n has siblings then merge n into shadow_siblings;
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1186 if No opration on t’s siblings in D then insert <e,IL(e)> to D; else update the IL-values for all opration on n’s sibling in D; update i ←i+1; return Gi as G*; return root (D) as G*; 5.2 DP_Algo [4] Step 1: Defined an operator → called node leaf Where →= indicates the removal of a leaf topic, t from a profile. Step 2: Mathematical Equation G(i) → G(i+1)………………….G=Seed Profile which denotes, to obtain leaf t from profile G(i) to G(i+1). Step 3 : G* can be generated with a finite length transitive closure of prune leaf. Step 4: It works in bottom up manner initial point G(0) (i=0,1,…n). GreedyDP chooses leaf topic tεT Gi(q).………………………t=Leaf Profile q=node maintains Best Profile (Gi+1) which has highest discriminating power to satisfy (δ) risk constraint. Note: Iterative process terminates when the profile is generated to a root topic. Step 5: Best Profile
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1187 G*=Final result of algorithm. 6. SET THEORY Let S represent our proposed system S={I, O, Su, Fa,Ø } Where, I = Input, O = Output, Fa= Failure, Su = Success I is Input I = {U,Q,P} Where, U = User information, Q = Query, P = Updated Profile O is Output O = { Ur , Vr} Where, Ur = UPS search result , Vr = Visited link result Su is Success Su = SR Where, SR = Successful result Received Fa is Failure Fa= RF Where, RF = Result not found Actual inputs of the System :- I is Input I = {U,Q,P} Where , U = User information Input :- Filled information
  • 8. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1188 Output :- Registration will be done Success :- Successed to filled correct information Failure :- Fails to fill correct information Q = Query Input :- Typed Query Output :- Query matched Success :- Successfully match query result Failure :- Query result not matched P = Updated Profile Input :- Created user profil Output :- Found Profile updated Success :- Successful updated profile Failure :- Profile unable to update due to filled up invalid information Actual outputs of the System O is Output O = {Ur , Vr} Where , Ur = UPS search result Input :- Typed Query Output :- Query matched and result found Success :- Successful found result Failure :- Fails to found result Vr =Mostly Visited links Result
  • 9. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1189 Input :- Ranking process Output :- Mostly ranked links list Success :- Successfully found ranked links list Failure :- Fails to found ranked links list Ø is constraints of system Ø = {PM , PE} Where , PM= Possibility of query will not match with stored database PE = Possibility of user will not enter appropriate query according to their profile 6.1 Mathematical model using “Deterministic Finite Automata” Figure 3: Deterministic Finite Automata (DFA) Where , RS = Registration LN = Login US = UPS search DB = Database LO = Logout Deterministic finite state automata A deterministic finite automata M is a 5-tuple, (Q, ∂, Ʃ, q0, F) consisting of following fields :- A finite set of states (Q) ={ S , A , B , C , D} A finite set of input symbols called the alphabet (Ʃ)={ a, b, c, d , e } A transition function (∂ : Q × Ʃ Q ) ={S, LN , US , DB , LO} A start state (q0 € Q) = S A set of accept states (f c Q) = D Where ,
  • 10. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1190 RS- Registration, LN- Login, US- UPS search, DB- Database, LO- Logout St (A,B,C), Alp- alphabets. Derivation() is defined by below transition table. 7. Multiplexer Logic Figure 4: Multiplexer Logic Where , S1 ,S2, S3 = select lines D = data lines Here Input I=(S1 ,S2 S3) Where , S1 = Registration S2 =Login S3 = UPS search Here O= Output
  • 11. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1191 7. CONCLUSION At client side privacy is maintained by preventing the users private account. Any EaZSearch can create user profile in hierarchical tree view. EaZSearch allows user to specify the privacy requirement of client and thus the personal data of user profile is kept private without compromising the quality of search query. EaZSearch implements two algorithms DP_Algo and IL_Algo. REFERENCES [1]LidanShou, He Bai, Ke Chen, and Gang Chen,“Supporting Privacy Protection in Personalized Web Search”, IEEE Transactions On Knowledge And Data Engineering Vol:26 No: 2 Year 2014. [2]RupaliKeshavraoAher, AkshayRajdharAdik,“Privacy Enhanced Web Personalization”, IEEE Transactions On Knowledge And Data Engineering Vol:50 No: 5 Year 2015. [3]V.Ramya,S.Gowthami,“Enhance Search In Web Search Engine U sing Greedy Algorithm”, IEEE Transactions On Knowledge And Data Engineering Vol:89 No: 3 Year 2014. [4] Based on a handout by Tim Roughgarden, Alexa Sharp, and Tom Wexler, “Guide to Greedy Algorithms”. [5] FengQiu, Junghoo Cho, “Automatic Identification of User InterestFor Personalized Search”, IEEE Transactions On Knowledge And Data Engineering Vol:98 No: 4 Year.