The size of the Internet enlarging as per to grow the users of search providers continually demand search
results that are accurate to their wishes. Personalized Search is one of the options available to users in
order to sculpt search results based on their personal data returned to them provided to the search
provider. This brings up fears of privacy issues however, as users are typically anxious to revealing
personal info to an often faceless service provider along the Internet. This work proposes to administer
with the privacy issues surrounding personalized search and discusses ways that privacy can be improved
so that users can get easier with the dismissal of their personal information in order to obtain more precise
search results.
VIDEO OBJECTS DESCRIPTION IN HINDI TEXT LANGUAGE ijmpict
Video activity recognition has grown to be a dynamic location of analysis in latest years. A widespread
information-driven approach is denoted in this paper that produces descriptions of video content into
textual content description inside the Hindi language. This method combines the final results of modern
item with "real-international" records to pick the in all subject-verb-object triplet for depicting a video. The
usage of this triplet desire technique, a video is tagged via the trainer, mainly, Subject, Verb, and object
(SVO) and then this data is mined to improve the result of checking out video clarification by using pastime
as well as item identity. Contrasting preceding approaches, this method can annotate arbitrary videos
deprived of wanting the large series and annotation of a similar schooling video corpus. The proposed
work affords initial and primary text description within the Hindi language that is producing easy words
and sentence formation. But the fundamental challenging attempt on this work is to extract grammatically
accurate and expressive text records in Hindi textual content regarding video content.
A Novel Frame Work System Used In Mobile with Cloud Based Environmentpaperpublications3
Abstract: Recent era efforts have been taken in the field of social based Question and Answer (Q&A) which is used to search the answers for the non – factorial questions. But traditional search engines like Google, Bing is used to answer only for the factorial questions where we can get direct answer from the data base servers. The web search engine for the (Q&A) system does not dependent on the broadcasting methods and centralized server for identifying friends on the social network. The problem is recovered by using mobile Q&A system in that mobile nodes are help full for accessing internet because these techniques are used to generate low node overload, higher server bandwidth cost and highest cost of mobile internet access. Lately technical experts proposed a new method called Distributed Social – Based Mobile Q&A system (SOS) which makes very faster and quicker responses to the asker. SOS enables the mobile user’s to forward the question in the decentralized manner in order get effective, capable, and potential answers from the users. SOS is the light weighted knowledge engineering technique which is used find correct person who ready and willing to answer questions hence this type of search are used reduce searching time and computational cost of the mobile nodes. In this paper we proposed a new method called mobile Q&A system in the cloud based environment through which the data has been as been transmitted form cloud server to the centralized server at any time.
MODIFIED PAGE RANK ALGORITHM TO SOLVE AMBIGUITY OF POLYSEMOUS WORDSIJCI JOURNAL
Ambiguity in natural language has an effect on Information Retrieval (IR) system in general and web
search system in particular. Word sense ambiguity is the reason behind the poor performance of IR system.
If the ambiguous words are correctly disambiguated then IR performance can increase. WSD is defined as
the task of identifying the sense of word in textual context. Word Sense Disambiguation (WSD) is the
central problem of language processing. WSD improves the IR in many ways. Current IR system do not use
explicit WSD and rely on user typing enough content in the query to only retrieve documents relevant to the
intended senses. This paper proposes an algorithm for efficient retrieval of information on the Web
according to user’s need. Results are more accurate and they are according to user’s preference.
VIDEO OBJECTS DESCRIPTION IN HINDI TEXT LANGUAGE ijmpict
Video activity recognition has grown to be a dynamic location of analysis in latest years. A widespread
information-driven approach is denoted in this paper that produces descriptions of video content into
textual content description inside the Hindi language. This method combines the final results of modern
item with "real-international" records to pick the in all subject-verb-object triplet for depicting a video. The
usage of this triplet desire technique, a video is tagged via the trainer, mainly, Subject, Verb, and object
(SVO) and then this data is mined to improve the result of checking out video clarification by using pastime
as well as item identity. Contrasting preceding approaches, this method can annotate arbitrary videos
deprived of wanting the large series and annotation of a similar schooling video corpus. The proposed
work affords initial and primary text description within the Hindi language that is producing easy words
and sentence formation. But the fundamental challenging attempt on this work is to extract grammatically
accurate and expressive text records in Hindi textual content regarding video content.
A Novel Frame Work System Used In Mobile with Cloud Based Environmentpaperpublications3
Abstract: Recent era efforts have been taken in the field of social based Question and Answer (Q&A) which is used to search the answers for the non – factorial questions. But traditional search engines like Google, Bing is used to answer only for the factorial questions where we can get direct answer from the data base servers. The web search engine for the (Q&A) system does not dependent on the broadcasting methods and centralized server for identifying friends on the social network. The problem is recovered by using mobile Q&A system in that mobile nodes are help full for accessing internet because these techniques are used to generate low node overload, higher server bandwidth cost and highest cost of mobile internet access. Lately technical experts proposed a new method called Distributed Social – Based Mobile Q&A system (SOS) which makes very faster and quicker responses to the asker. SOS enables the mobile user’s to forward the question in the decentralized manner in order get effective, capable, and potential answers from the users. SOS is the light weighted knowledge engineering technique which is used find correct person who ready and willing to answer questions hence this type of search are used reduce searching time and computational cost of the mobile nodes. In this paper we proposed a new method called mobile Q&A system in the cloud based environment through which the data has been as been transmitted form cloud server to the centralized server at any time.
MODIFIED PAGE RANK ALGORITHM TO SOLVE AMBIGUITY OF POLYSEMOUS WORDSIJCI JOURNAL
Ambiguity in natural language has an effect on Information Retrieval (IR) system in general and web
search system in particular. Word sense ambiguity is the reason behind the poor performance of IR system.
If the ambiguous words are correctly disambiguated then IR performance can increase. WSD is defined as
the task of identifying the sense of word in textual context. Word Sense Disambiguation (WSD) is the
central problem of language processing. WSD improves the IR in many ways. Current IR system do not use
explicit WSD and rely on user typing enough content in the query to only retrieve documents relevant to the
intended senses. This paper proposes an algorithm for efficient retrieval of information on the Web
according to user’s need. Results are more accurate and they are according to user’s preference.
NLP-based personal learning assistant for school education IJECEIAES
Computer-based knowledge and computation systems are becoming major sources of leverage for multiple industry segments. Hence, educational systems and learning processes across the world are on the cusp of a major digital transformation. This paper seeks to explore the concept of an artificial intelligence and natural language processing (NLP) based intelligent tutoring system (ITS) in the context of computer education in primary and secondary schools. One of the components of an ITS is a learning assistant, which can enable students to seek assistance as and when they need, wherever they are. As part of this research, a pilot prototype chatbot was developed, to serve as a learning assistant for the subject Scratch (Scratch is a graphical utility used to teach school children the concepts of programming). By the use of an open source natural language understanding (NLU) or NLP library, and a slackbased UI, student queries were input to the chatbot, to get the sought explanation as the answer. Through a two-stage testing process, the chatbot’s NLP extraction and information retrieval performance were evaluated. The testing results showed that the ontology modelling for such a learning assistant was done relatively accurately, and shows its potential to be pursued as a cloud-based solution in future.
Identifying features in opinion mining via intrinsic and extrinsic domain rel...Gajanand Sharma
The existing approaches to opinion feature extraction usually mine patterns from a single review corpus. This presentation gives idea about a novel approach to identify opinion features from online reviews by exploiting the difference in opinion feature statistics across two corpora.
IJRET-V1I1P5 - A User Friendly Mobile Search Engine for fast Accessing the Da...ISAR Publications
Mobile search engine is a meta search engine that imprisonments the user’s favorite in
the form of concepts by mining their click through data. But the search query is limited to small
words unlike those used when interacting with search engines through computers. It has become
popular because of presence of huge number of applications. Smartphone’s carry large amount of
personal information, such as user’s personal details, contacts, messages, emails, credit card
information, etc. User type specific search and finally Ontology based Search. Moreover opinion
mining is conducted to provide feedback and valuable suggestions given by the mobile users. Due
to the different characteristics of the content concepts and location concepts, use different
techniques for their concept extraction and ontology formulation. Moreover the individual users
can use this search engine, which runs on android platform. They can give feedbacks and
suggestions about the search result. Based on the feedback other users can get valuable
information about the services available in their location or nearby location.
Smart detection of offensive words in social media using the soundex algorith...IJECEIAES
Offensive posts in the social media that are inappropriate for a specific age, level of maturity, or impression are quite often destined more to unadult than adult participants. Nowadays, the growth in the number of the masked offensive words in the social media is one of the ethically challenging problems. Thus, there has been growing interest in development of methods that can automatically detect posts with such words. This study aimed at developing a method that can detect the masked offensive words in which partial alteration of the word may trick the conventional monitoring systems when being posted on social media. The proposed method progresses in a series of phases that can be broken down into a pre-processing phase, which includes filtering, tokenization, and stemming; offensive word extraction phase, which relies on using the soundex algorithm and permuterm index; and a post-processing phase that classifies the users’ posts in order to highlight the offensive content. Accordingly, the method detects the masked offensive words in the written text, thus forbidding certain types of offensive words from being published. Results of evaluation of performance of the proposed method indicate a 99% accuracy of detection of offensive words.
An educational bluetooth quizzing application in androidijwmn
Bluetooth is one of the most prevalent technologies available on mobile phones. One of the key questions
how to harness this technology in an educational manner in universities and schools. This paper is about a
Bluetooth quizzing system which will be used to administer quizzes to students of a university. The
Bluetooth quizzing application consists of a server and client mobile Android application. It will utilize a
queuing system to allow many clients to connect simultaneously to the server. When clients connect, they
can register or choose the option to complete a quiz that the lecturer selected. Results are automatically
sent when quiz is done from the client application. Data analysis can then be done to review the progress of
students.
We the humans are surrounded with immense unprecedented wealth of information which are available as documents, database or other resources. The access to this information is difficult as by having the information it is not necessary that it could be searched or extracted by the activity we are using. The search engines available should be also customized to handle such queries, sometime the search engines are also not aware of the information they have within the system. The method known as keyword extraction and clustering is introduced which answers this shortcoming by spontaneously recommending documents that are related to users’ current activities. When the communication takes place the important text can be extracted from the conversation and the words extracted are grouped and then are matched with the parts in the document. This method uses Natural Language Processing for extracting of keywords and making the subgroup that is a meaningful statement from the group, another method used is the Hierarchical Clustering for creating clusters form the keywords, here the similarity of two keywords is measured using the Euclidean distance. This paper reviews the various methods for the system.
Sentiment Analysis In Myanmar Language Using Convolutional Lstm Neural Networkkevig
In recent years, there has been an increasing use of social media among people in Myanmar and writing
review on social media pages about the product, movie, and trip are also popular among people. Moreover,
most of the people are going to find the review pages about the product they want to buy before deciding
whether they should buy it or not. Extracting and receiving useful reviews over interesting products is very
important and time consuming for people. Sentiment analysis is one of the important processes for extracting
useful reviews of the products. In this paper, the Convolutional LSTM neural network architecture is
proposed to analyse the sentiment classification of cosmetic reviews written in Myanmar Language. The
paper also intends to build the cosmetic reviews dataset for deep learning and sentiment lexicon in Myanmar
Language.
Design of optimal search engine using text summarization through artificial i...TELKOMNIKA JOURNAL
Natural language processing is the trending topic in the latest research areas, which allows the developers to create the human-computer interactions to come into existence. The natural language processing is an integration of artificial intelligence, computer science and computer linguistics. The research towards natural Language Processing is focused on creating innovations towards creating the devices or machines which operates basing on the single command of a human. It allows various Bot creations to innovate the instructions from the mobile devices to control the physical devices by allowing the speech-tagging. In our paper, we design a search engine which not only displays the data according to user query but also performs the detailed display of the content or topic user is interested for using the summarization concept. We find the designed search engine is having optimal response time for the user queries by analyzing with number of transactions as inputs. Also, the result findings in the performance analysis show that the text summarization method has been an efficient way for improving the response time in the search engine optimizations.
Psychoanalysis of Online Behavior and Cyber Conduct of Chatters in Chat Rooms...Eswar Publications
With ease of access of internet connectivity and owing to ability of maintaining anonymity, online chatting has become very common. Based on an empirical study comprising of more than 700 chatting sessions spread over a period of 15 months with nearly 2500 online chatters, this paper aims to present a psychological study and analysis of the behavior of chatters in online chatting environments. It has been found that the chatting environments are dominated by male gender and explicit sexual expression is common. The paper also laments
the ability of chatting environments to be exploited as breeding ground for cyber crimes by using ‘social engineering’. On the sidelines, the paper also lists the motivations driving the people to chat as well as the various rewards and drawbacks that chatting poses to the chatter in specific and society in general.
Centenari del naixement d’un dels grans escriptors de la literatura infantil i juvenil del s.XX
Roald Dahl (Llandaff, Cardiff, Gal·les, 13 de setembre de 1916-Oxford, Anglaterra, 23 de novembre de 1990) fou un novel·lista i autor de contes britànic d’ascendència noruega, famós escriptor per a nens i adults.
Creador de personatges memorables, era brillant, imaginatiu, impertinent i divertit, tot un mestre de la narració.
Creador de personatges memorables, era brillant, imaginatiu, impertinent i divertit, tot un mestre de la narració.
Roald Dahl sempre pren partit... pels nens.
Matilda, Les bruixes, El Gran Amic Gegant, Els Culdolla, Charlie i la fàbrica de xocolata, Danny, el campió del món... històries fantàstiques que segueixen vigents i no passen mai de moda.
El seu primer llibre per a nens fou Els Gremlins, que tractava d’unes petites criatures malvades que formaven part del folclore de la RAF, fou publicat el 1943; el llibre havia estat encarregat per Walt Disney per a la pel·lícula Gremlins.
Sabies que...Quan en Roald Dahl era petit, la fàbrica de xocolata Cadbury donava bombons als alumnes de la seva escola perquè els tastessin. Segurament d’aquest fet va néixer la inspiració del fantàstic personatge Willy Wonka.
El 2016 s’ha estrenat un nou logo per als seus llibres. Utilitza els colors de les seves històries, com el lila del Willy Wonka o el verd del Cocodril enorme, i hi apareix un avió (perquè va ser pilot de guerra i li agradava volar) fet amb paper groc, que era el tipus de full que feia servir per escriure i també el seu color preferit.
Novel·lista, escriptor de contes i guionista. Després de gairebé 100 anys del seu naixement els seus contes continuen inspirant els nens i adults de tot el món...
...és per això que li donem les gràcies... Gràcies per fer-nos estimar la bona lectura i també la xocolata. Gràcies per presentar-nos històries plenes de nens i nenes valents i decidits.
Gràcies pel teu bon humor i picardia.
I Felicitats
NLP-based personal learning assistant for school education IJECEIAES
Computer-based knowledge and computation systems are becoming major sources of leverage for multiple industry segments. Hence, educational systems and learning processes across the world are on the cusp of a major digital transformation. This paper seeks to explore the concept of an artificial intelligence and natural language processing (NLP) based intelligent tutoring system (ITS) in the context of computer education in primary and secondary schools. One of the components of an ITS is a learning assistant, which can enable students to seek assistance as and when they need, wherever they are. As part of this research, a pilot prototype chatbot was developed, to serve as a learning assistant for the subject Scratch (Scratch is a graphical utility used to teach school children the concepts of programming). By the use of an open source natural language understanding (NLU) or NLP library, and a slackbased UI, student queries were input to the chatbot, to get the sought explanation as the answer. Through a two-stage testing process, the chatbot’s NLP extraction and information retrieval performance were evaluated. The testing results showed that the ontology modelling for such a learning assistant was done relatively accurately, and shows its potential to be pursued as a cloud-based solution in future.
Identifying features in opinion mining via intrinsic and extrinsic domain rel...Gajanand Sharma
The existing approaches to opinion feature extraction usually mine patterns from a single review corpus. This presentation gives idea about a novel approach to identify opinion features from online reviews by exploiting the difference in opinion feature statistics across two corpora.
IJRET-V1I1P5 - A User Friendly Mobile Search Engine for fast Accessing the Da...ISAR Publications
Mobile search engine is a meta search engine that imprisonments the user’s favorite in
the form of concepts by mining their click through data. But the search query is limited to small
words unlike those used when interacting with search engines through computers. It has become
popular because of presence of huge number of applications. Smartphone’s carry large amount of
personal information, such as user’s personal details, contacts, messages, emails, credit card
information, etc. User type specific search and finally Ontology based Search. Moreover opinion
mining is conducted to provide feedback and valuable suggestions given by the mobile users. Due
to the different characteristics of the content concepts and location concepts, use different
techniques for their concept extraction and ontology formulation. Moreover the individual users
can use this search engine, which runs on android platform. They can give feedbacks and
suggestions about the search result. Based on the feedback other users can get valuable
information about the services available in their location or nearby location.
Smart detection of offensive words in social media using the soundex algorith...IJECEIAES
Offensive posts in the social media that are inappropriate for a specific age, level of maturity, or impression are quite often destined more to unadult than adult participants. Nowadays, the growth in the number of the masked offensive words in the social media is one of the ethically challenging problems. Thus, there has been growing interest in development of methods that can automatically detect posts with such words. This study aimed at developing a method that can detect the masked offensive words in which partial alteration of the word may trick the conventional monitoring systems when being posted on social media. The proposed method progresses in a series of phases that can be broken down into a pre-processing phase, which includes filtering, tokenization, and stemming; offensive word extraction phase, which relies on using the soundex algorithm and permuterm index; and a post-processing phase that classifies the users’ posts in order to highlight the offensive content. Accordingly, the method detects the masked offensive words in the written text, thus forbidding certain types of offensive words from being published. Results of evaluation of performance of the proposed method indicate a 99% accuracy of detection of offensive words.
An educational bluetooth quizzing application in androidijwmn
Bluetooth is one of the most prevalent technologies available on mobile phones. One of the key questions
how to harness this technology in an educational manner in universities and schools. This paper is about a
Bluetooth quizzing system which will be used to administer quizzes to students of a university. The
Bluetooth quizzing application consists of a server and client mobile Android application. It will utilize a
queuing system to allow many clients to connect simultaneously to the server. When clients connect, they
can register or choose the option to complete a quiz that the lecturer selected. Results are automatically
sent when quiz is done from the client application. Data analysis can then be done to review the progress of
students.
We the humans are surrounded with immense unprecedented wealth of information which are available as documents, database or other resources. The access to this information is difficult as by having the information it is not necessary that it could be searched or extracted by the activity we are using. The search engines available should be also customized to handle such queries, sometime the search engines are also not aware of the information they have within the system. The method known as keyword extraction and clustering is introduced which answers this shortcoming by spontaneously recommending documents that are related to users’ current activities. When the communication takes place the important text can be extracted from the conversation and the words extracted are grouped and then are matched with the parts in the document. This method uses Natural Language Processing for extracting of keywords and making the subgroup that is a meaningful statement from the group, another method used is the Hierarchical Clustering for creating clusters form the keywords, here the similarity of two keywords is measured using the Euclidean distance. This paper reviews the various methods for the system.
Sentiment Analysis In Myanmar Language Using Convolutional Lstm Neural Networkkevig
In recent years, there has been an increasing use of social media among people in Myanmar and writing
review on social media pages about the product, movie, and trip are also popular among people. Moreover,
most of the people are going to find the review pages about the product they want to buy before deciding
whether they should buy it or not. Extracting and receiving useful reviews over interesting products is very
important and time consuming for people. Sentiment analysis is one of the important processes for extracting
useful reviews of the products. In this paper, the Convolutional LSTM neural network architecture is
proposed to analyse the sentiment classification of cosmetic reviews written in Myanmar Language. The
paper also intends to build the cosmetic reviews dataset for deep learning and sentiment lexicon in Myanmar
Language.
Design of optimal search engine using text summarization through artificial i...TELKOMNIKA JOURNAL
Natural language processing is the trending topic in the latest research areas, which allows the developers to create the human-computer interactions to come into existence. The natural language processing is an integration of artificial intelligence, computer science and computer linguistics. The research towards natural Language Processing is focused on creating innovations towards creating the devices or machines which operates basing on the single command of a human. It allows various Bot creations to innovate the instructions from the mobile devices to control the physical devices by allowing the speech-tagging. In our paper, we design a search engine which not only displays the data according to user query but also performs the detailed display of the content or topic user is interested for using the summarization concept. We find the designed search engine is having optimal response time for the user queries by analyzing with number of transactions as inputs. Also, the result findings in the performance analysis show that the text summarization method has been an efficient way for improving the response time in the search engine optimizations.
Psychoanalysis of Online Behavior and Cyber Conduct of Chatters in Chat Rooms...Eswar Publications
With ease of access of internet connectivity and owing to ability of maintaining anonymity, online chatting has become very common. Based on an empirical study comprising of more than 700 chatting sessions spread over a period of 15 months with nearly 2500 online chatters, this paper aims to present a psychological study and analysis of the behavior of chatters in online chatting environments. It has been found that the chatting environments are dominated by male gender and explicit sexual expression is common. The paper also laments
the ability of chatting environments to be exploited as breeding ground for cyber crimes by using ‘social engineering’. On the sidelines, the paper also lists the motivations driving the people to chat as well as the various rewards and drawbacks that chatting poses to the chatter in specific and society in general.
Centenari del naixement d’un dels grans escriptors de la literatura infantil i juvenil del s.XX
Roald Dahl (Llandaff, Cardiff, Gal·les, 13 de setembre de 1916-Oxford, Anglaterra, 23 de novembre de 1990) fou un novel·lista i autor de contes britànic d’ascendència noruega, famós escriptor per a nens i adults.
Creador de personatges memorables, era brillant, imaginatiu, impertinent i divertit, tot un mestre de la narració.
Creador de personatges memorables, era brillant, imaginatiu, impertinent i divertit, tot un mestre de la narració.
Roald Dahl sempre pren partit... pels nens.
Matilda, Les bruixes, El Gran Amic Gegant, Els Culdolla, Charlie i la fàbrica de xocolata, Danny, el campió del món... històries fantàstiques que segueixen vigents i no passen mai de moda.
El seu primer llibre per a nens fou Els Gremlins, que tractava d’unes petites criatures malvades que formaven part del folclore de la RAF, fou publicat el 1943; el llibre havia estat encarregat per Walt Disney per a la pel·lícula Gremlins.
Sabies que...Quan en Roald Dahl era petit, la fàbrica de xocolata Cadbury donava bombons als alumnes de la seva escola perquè els tastessin. Segurament d’aquest fet va néixer la inspiració del fantàstic personatge Willy Wonka.
El 2016 s’ha estrenat un nou logo per als seus llibres. Utilitza els colors de les seves històries, com el lila del Willy Wonka o el verd del Cocodril enorme, i hi apareix un avió (perquè va ser pilot de guerra i li agradava volar) fet amb paper groc, que era el tipus de full que feia servir per escriure i també el seu color preferit.
Novel·lista, escriptor de contes i guionista. Després de gairebé 100 anys del seu naixement els seus contes continuen inspirant els nens i adults de tot el món...
...és per això que li donem les gràcies... Gràcies per fer-nos estimar la bona lectura i també la xocolata. Gràcies per presentar-nos històries plenes de nens i nenes valents i decidits.
Gràcies pel teu bon humor i picardia.
I Felicitats
APPLICATION OF RISK DOMINANCE CONCEPT AND BAYESIAN NASH EQUILIBRIUM FOR ANALY...ijgttjournal
Recent threats of hydrogen bomb test from North Korea were unexpected, as the relationship between
South and North Korea was known to be improving. Here, Nash equilibrium and the concept of risk
dominance will be used to describe the general diplomatic strategy between North Korea and South Korea
and to account for North Korea’s constant provocations. Then Bayesian Nash equilibrium will be applied
to suggest policy lines specifically after the current hydrogen bomb test conducted by North Korea. Here,
how rational thinking will lead both Koreas to continue on with the Hard-line measure towards each other
will clearly be shown. At conclusive remarks, other possible diplomatic approaches to the volatile
geopolitical landscape of East Asia will be suggested.
Web search engines help users find useful information on the WWW. However, when the same
query is submitted by different users, typical search engines return the same result regardless of who
submitted the query. Generally, each user has different information needs for his/her query. Therefore,
the search results should be adapted to users with different information needs. So, there is need of
several approaches to adapting search results according to each user’s need for relevant information
without any user effort. Such search systems that adapt to each user’s preferences can be achieved by
constructing user profiles based on modified collaborative filtering with detailed analysis of user’s
browsing history.
There are three possible types of web search system which can provide personalized
information: (1) systems using relevance feedback, (2) systems in which users register their interest, and
(3) systems that recommend information based on user’s history. In first technique, users have to provide
feedback on relevant or irrelevant judgments which is time consuming and the second one needs
registration of users with their static interests which need extra effort from user. So, the third technique
is best in which users don’t have to give explicit rating; relevancy automatically tracked by user
behavior with search results and history of data usage. It doesn’t require registration of interests; it
captures changing interests of user dynamically by itself. The result section shows that user’s browsing
history allows each user to perform more fine-grained search by capturing changes of each user’s
preferences without any user effort. Users need less time to find the relevant snippet in personalized
search results compared to original results
Web search engines help users find useful information on the WWW. However, when the same query is submitted by different users, typical search engines return the same result regardless of who submitted the query. Generally, each user has different information needs for his/her query. Therefore, the search results should be adapted to users with different information needs. So, there is need of
several approaches to adapting search results according to each user’s need for relevant information without any user effort. Such search systems that adapt to each user’s preferences can be achieved by constructing user profiles based on modified collaborative filtering with detailed analysis of user’s browsing history. There are three possible types of web search system which can provide personalized information: (1) systems using relevance feedback, (2) systems in which users register their interest, and (3) systems that recommend information based on user’s history. In first technique, users have to provide feedback on relevant or irrelevant judgments which is time consuming and the second one needs
registration of users with their static interests which need extra effort from user. So, the third technique is best in which users don’t have to give explicit rating; relevancy automatically tracked by user behavior with search results and history of data usage. It doesn’t require registration of interests; it captures changing interests of user dynamically by itself. The result section shows that user’s browsing history allows each user to perform more fine-grained search by capturing changes of each user’s
preferences without any user effort. Users need less time to find the relevant snippet in personalized
search results compared to original results.
IJRET : International Journal of Research in Engineering and TechnologyImprov...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
User search goal inference and feedback session using fast generalized – fuzz...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Classifying web users in a personalised search setup is cumbersome due the very nature of dynamism in
user browsing history. This fluctuating nature of user behaviour and user interest shall be well interpreted
within a fuzzy setting. Prior to analysing user behaviour, nature of user interests has to be collected. This
work proposes a fuzzy based user classification model to suit a personalised web search environment. The
user browsing data is collected using an established customised browser designed to suit personalisation.
The data are fuzzified and fuzzy rules are generated by applying decision trees. Using fuzzy rules, the
search pages are labelled to aid grouping of user search interests. Evaluation of the proposed approach
proves to be better when compared with Bayesian classifier.
A New Algorithm for Inferring User Search Goals with Feedback SessionsIJERA Editor
When different users may have different search goals when they submit it to a search engine. The inference and analysis of user search goals can be very useful in improving search engine relevance and user experience. The Novel approach to infer user search goals by analyzing search engine query logs. Once the User entered the query, the Resultant URLs will be filtered and the Pseudo-Documents are generated. Once the Pseudo documents are generated the Server will apply the Clustering Mechanism to URL’s. So that the URLs are listed as different categories. Feedback sessions are constructed from user click-through logs and can efficiently reflect the information needs of user. Second, we propose a novel approach to generate pseudo documents to better represents the feedback sessions for clustering. Finally we proposed new criterion “Classified Average Precision (CAP)” to evaluate the performance of inferring user search goals. Experimental results are presented using user click-through logs from a commercial search engine to validate the effectiveness of our proposed methods. Third, the distributions of user search goals can also be useful in applications such as re ranking web search results that contain different user search goals.
Call for paper 2012, hard copy of Certificate, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJCER, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, research and review articles, IJCER Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathematics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer review journal, indexed journal, research and review articles, engineering journal, www.ijceronline.com, research journals,
yahoo journals, bing journals, International Journal of Computational Engineering Research, Google journals, hard copy of Certificate,
journal of engineering, online Submission
A recommender system-using novel deep network collaborative filteringIAESIJAI
The recommendation model aims to predict the user’s preferred items among million through analyzing the user-item relations; furthermore, Collaborative Filtering has been utilized as one of the successful recommendation approaches in last few years; however, it has the issue of sparsity. This research work develops a deep network collaborative filtering (DeepNCF), which incorporates graph neural network (GNN), and novel network collaborative filtering (NCF) for performance enhancement. At first user-item dual network is constructed, thereafter-custom weighted dual mode modularity is developed for edge clustering. Furthermore, GNN is utilized for capturing the complex relation between user and item. DeepNCF is evaluated considering the two distinctive. The experimental analysis is carried out on two datasets for Amazon and movielens dataset for recall@20 and recall@50 and the normalized discounted cumulative gain (NDCG) metric is evaluated for Amazon Dataset for NDCG@20 and NDCG@50. The proposed method outperforms the most relevant research and is accurate enough to give personalized recommendations and diversity.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Implementation of Privacy Policy Specification System for User Uploaded Image...rahulmonikasharma
The regular use of social networking websites and application encompasses the collection and retention of personal and very often sensitive information about users. This information needs to remain private and each social network owns a privacy policy that describes in-depth how user’s information is managed and published. As there is increasing use of images for sharing through social sites, maintaining privacy has become a major problem. In light of these incidents, the need of tools to aid users control access to their shared content is necessary. This problem can be proposed by using an Privacy Policy Specification system to help users compose privacy settings for their shared images. Toward addressing this need, we propose Privacy Policy Specification system to help users to specify privacy settings for their images. Privacy Policy Specification System configure a policy for a group and apply appropriate policies (comment, share, expiry, download) on image for sharing in the group.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Recommendation System Using Social Networking ijcseit
With the proliferation of electronic commerce and knowledge economy environment both organizations and
individuals generate and consume a large amount of online information. With the huge availability of
product information on website, many times it becomes difficult for a consumer to locate item he wants to
buy. Recommendation Systems [RS] provide a solution to this. Many websites such as YouTube, e-Bay,
Amazon have come up with their own versions of Recommendation Systems. However Issues like lack of
data, changing data, changing user preferences and unpredictable items are faced by these
recommendation systems. In this paper we propose a model of Recommendation systems in e-commerce
domain which will address issues of cold start problem and change in user preference problem. Our work
proposes a novel recommendation system which incorporates user profile parameters obtained from Social
Networking website. Our proposed model SNetRS is a collaborative filtering based algorithm, which
focuses on user preferences obtained from FaceBook. We have taken domain of books to illustrate our
model.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
USER PROFILE BASED PERSONALIZED WEB SEARCH
1. International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT)
Vol. 7, No. 3, September 2016
DOI : 10.5121/ijmpict.2016.7302 15
USER PROFILE BASED PERSONALIZED WEB
SEARCH
Najneen Tamboli1
and Sathish Kumar Penchala2
1
Department of Computer Engineering, Dr.D.Y.Patil School of Engg and
Technology,Savitribai Phule Pune University, Pune,India
2
Department of Computer Engineering, Dr.D.Y.Patil School of Engg and
Technology,Savitribai Phule Pune University, Pune,India
ABSTRACT
The size of the Internet enlarging as per to grow the users of search providers continually demand search
results that are accurate to their wishes. Personalized Search is one of the options available to users in
order to sculpt search results based on their personal data returned to them provided to the search
provider. This brings up fears of privacy issues however, as users are typically anxious to revealing
personal info to an often faceless service provider along the Internet. This work proposes to administer
with the privacy issues surrounding personalized search and discusses ways that privacy can be improved
so that users can get easier with the dismissal of their personal information in order to obtain more precise
search results.
KEYWORDS
User Profile, Privacy Protection, Personalized Web Search.
1. INTRODUCTION
The size of the web continues to grow the users of search suppliers frequently demand search
results that area unit correct to their demands. customized Search is one in every of the choices on
the market to users so as to sculpt search results came to them supported their personal
information provided to the search supplier. Broadly there are two main categories of privacy
protection issues for PWS. One class includes those treat privacy because the recognition of a
private, as drawn in [2]. The author includes those think about the sensitivity of the data,
particularly the user profiles, presented the PWS server.
Typical works within the literature of safe user identifications plan to work out the privacy
limitations on totally different stages, as well as the pseudo identity, the cluster identity, no
individuality, and no private data. Answer to the primary level is proving to fragile [1]. The 3rd
and 4th levels area unit impractical attributable to high price in communication and secret
writing. Thus, the prevailing efforts target the second story. Both [2] give on-line namelessness
on user profiles by generating a bunch profile of k users.
Applying this arrange of attack, the linkage between the question and one user is disclosed. In [2],
the useless user profile protocol is designed to shuffle queries among a bunch of users World
Health Organization publish them. As a result any entity cannot profile a particular someone.
These works withstand the existence of a trustworthy third-party anonymised, that isn't pronto on
the market over the web at giant. In the theme, each user acts as a pursuit agency of his or her
neighbours. They will conceive to gift the question on behalf of World Health Organization
2. International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT)
Vol. 7, No. 3, September 2016
16
issued it, or forward it to different neighbours. The defects of current leads to category one area
unit the high price introduced attributable to the collaboration and communication. The
personalization is the utility of the user profile. On the opposite hand, they have to cover the
privacy contents existing within the user profile to spot the privacy risk in restraint.
Many previous studies [3], [4] recommend that plenty area unit willing to compromise privacy if
the personalization by providing user profile to the computer program yields higher search
quality. In a perfect case, substantial gain may be obtained by personalization at the expense of
solely a modest (and less-sensitive) portion of the user profile, particularly a generalized profile.
Therefore, user privacy may be protected while not compromising the customized search quality.
In universal, there's exchange between the search quality and therefore the tier of privacy
protection achieved from generalization.
The user provide conflicting or wrong information, the profile built is static whereas the user’s
importance may change over time, and the construction of the profile places a load on the user
that they may not wish to accept. Thus, many research trainings are underway to essentially
create.
2. PERSONALIZED WEB SEARCH
Personalization is a feature of web searching. All research on Google Search are correlated with a
browser cookie record. Then, when a user functions a search, the search results are not only based
on the purpose of each web page to the search term, but also on which websites the user visited
through previous search results. This provides a more personalized experience that can increase the
relevance of the search results for the particular user, but also has some side effects, such as
informing other users of the same IP address or computer what others have been searching for, or
creating a filter. The component only takes effect after several searches have been recorded, so that
it can be graded to the user's tastes.
In [9] this paper, author study this downside and provide some prior assurance. It presents an
outsized -scale analysis framework for customized search supported question logs and hen
evaluates with the clicking and profile primarily based methods. By analysing the results, the
author brings out. That customized search has important improvement over the common net
search on some queries, however, it's very slight impact on different questions. Author
additionally reveals that each long run and short-run contexts area unit important in improving
search performance for profile -based customized search methods. During this paper, the writer
attempts to explore whether or not personalization is systematically effective beneath totally
different matters.
The profile based customized search methods planned during this paper don't seem to be as stable
because the click - primarily based ones. They might improve the search accuracy on some
questions, however, they additionally damage several queries. Since these methods are a unit far
away from optimum, and source can extend his work to heighten them in future [10]. It
additionally finds for profile -based schemes, each long - term and short -term contexts area unit
vital in improving search performance. The acceptable combination of them is frequently a bunch
of reliable than only victimization either of them. From the author [11], they studied a style to
exploit implicit user modelling to showing intelligence alter info retrieval and improve search
accuracy. Not like most previous work, it emphasizes the use of immediate search context and
implicit feedback info similarly as an eager change of search results to maximally profit a user.
Author bestowed a decision- attractive framework for optimizing interactive info retrieval
supported the eager user model change, during which the organization responds to each action of
the user by selecting a system action to optimize a utility function.
3. International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT)
Vol. 7, No. 3, September 2016
17
Author proposes [12] specific techniques to capture and exploit 2 kinds of implicit feedback
information: (1) distinguishing connected straightaway preceding question and victimization the
question and also the corresponding search results to pick applicable terms to expand this
question, and (2) exploiting the viewed document summaries to right away re-rank any
documents that haven't yet been considered by the user. Using these techniques, the author builds
up a shopper aspect net search agent (UCAIR) on high of a well-liked program (Google) with
none extra effort from the user. From the [13] author has explored a style to exploit implicit
feedback info, as well as question history and click-through history at intervals an equivalent
search session, to enhance info retrieval performance.
3. PRIVACY PROTECTION
This paper [14] comes with 2 rising trend: internet users wish personalized services and internet
users wish privacy. One challenge is that non-public information should be created anonymous
beneath the belief that the collaborating parties, together with the online service, aren't utterly
sure, owing to a systematic assortment of private info additionally to queries. Another challenge
is that the on-line and dynamic nature of cyberspace users. Author planned the notion of online
obscurity to guard internet users and planned an approach to bring concern of on-line obscurity
through time. This approach makes use of a 3rd party known as the user pool and it doesn't
require the user pool to be indisputable. The simulation work of real U.S.A. demographics
showed promising results: it's possible to achieve personalization for affordable privacy settings.
From this approach [15, 16] they need users to contribution the server full access to non-public
information on the web, that break users’ privacy. During this report, author inspects the
likelihood of achieving a balance between users’ privacy and hunting quality. First, formula is
provided to the user for aggregation, abbreviation, and coordinating their personal info into a
class-conscious user profile, wherever the general term area unit hierarchal to higher levels than
express terms. Through this profile, user management what section of their personal info is
uncovered to the server by setting the min Detail threshold.
An additional privacy live, expRatio, is planned to approximation the number of privacy is
endangered to the required min Detail price. However, this paper has been wildcat work on the 2
features: 1st, author modify unstructured knowledge like personal documents, that it's still an
open downside on a room to outline privacy. Secondly, the author bridge the conflict wants of
personalization and privacy protection by developing the premise on privacy as an absolute
customary. Likewise, the writer believes that AN increased balance between privacy protection
and search quality are often achieved if the internet search area unit, personalized by providing
solely revealing this info associated with a selected question.
It performs less protection for the user knowledge and that they were no assured in the user
knowledge and their profile information’s. In this paper [17] the author considered the prevailing
generalization ways area unit meagrely as an upshot of them cannot assurance, privacy protection
all told cases, and often get redundant info loss by paying an inordinate measure of abstraction.
During this paper, the writer suggests the idea of personalized secrecy, and builds up a
replacement generalization structure that brings into consideration bespoken privacy wants. This
method with success avoid privacy intrusion even in eventualities.
4. EXISTING SYSTEM
The personalization utility of the user profile. On the other hand, they have to cover the privacy
contents existing within the user profile to put the privacy risk in restraint. A number of previous
studies [4], [3] counsel that folks are willing to compromise privacy if the personalization by
provision user profile to the computer program yields higher search quality. In a perfect case,
4. International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT)
vital gain is obtained by personalization at the expense of solely a tiny low (and less
portion of the user profile, specifically a general
not compromising the customized search quality. In general, there's an exchange between the
search quality and also the level of privacy protection achieved from generalization.
Profile-based PWS principally specialize in up the search
works is to tailor the search results by bearing on, usually
personal info goal. Within the remainder of this section, we tend to review the pr
to PWS on 2 aspects, particularly the illustration of profiles, and also the live of the effectiveness
of personalization.
Personalization is that the method of
moment. So as to be told a couple of u
the information, and store the results of the analysis in an exceedingly user profile. info is
collected from users in 2 ways: expressly, as an example soliciting for feedbac
or ratings; and implicitly, as an example observant user
web document. Express construction of user profiles has many drawbacks. The user give
inconsistent or propaganda, the profile designed is s
amendment over time, and also the construction of the profile places a burden on the user that
they'll not would like to just accept. Thus,
produce.
5. PROPOSED WORK
International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT)
Vol. 7, No. 3, September 2016
vital gain is obtained by personalization at the expense of solely a tiny low (and less
portion of the user profile, specifically a generalized profile. Thus, user privacy is protected while
not compromising the customized search quality. In general, there's an exchange between the
search quality and also the level of privacy protection achieved from generalization.
pally specialize in up the search utility. The necessary plan of those
works is to tailor the search results by bearing on, usually essentially, a user profile that
personal info goal. Within the remainder of this section, we tend to review the previous solutions
to PWS on 2 aspects, particularly the illustration of profiles, and also the live of the effectiveness
Personalization is that the method of representing the exact info to the proper user at the proper
to be told a couple of user, systems should collect data concerning them,
nformation, and store the results of the analysis in an exceedingly user profile. info is
collected from users in 2 ways: expressly, as an example soliciting for feedback like preferences
or ratings; and implicitly, as an example observant user behaviours like the time spent reading a
web document. Express construction of user profiles has many drawbacks. The user give
inconsistent or propaganda, the profile designed is static whereas the user’s interests might
amendment over time, and also the construction of the profile places a burden on the user that
they'll not would like to just accept. Thus, several analysis efforts area unit afoot to implicitly
Figure 1: System Architecture
International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT)
18
vital gain is obtained by personalization at the expense of solely a tiny low (and less-sensitive)
ized profile. Thus, user privacy is protected while
not compromising the customized search quality. In general, there's an exchange between the
plan of those
, a user profile that report a
evious solutions
to PWS on 2 aspects, particularly the illustration of profiles, and also the live of the effectiveness
info to the proper user at the proper
concerning them, analyse
nformation, and store the results of the analysis in an exceedingly user profile. info is
k like preferences
like the time spent reading a
web document. Express construction of user profiles has many drawbacks. The user give
tatic whereas the user’s interests might
amendment over time, and also the construction of the profile places a burden on the user that
several analysis efforts area unit afoot to implicitly
5. International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT)
Vol. 7, No. 3, September 2016
19
The proposed architecture consisting of following models,
• User Profile Personalization
• Generalizing User Profile
• Online Decision
• Re-ranking
User Profile Personalization:
An access to personalize digital multimedia content based on user profile data. For this, two main
mechanisms were developed: a profile generator that creates user profiles automatically which
representing the user preferences, and a content-based recommendation algorithm which calculates
the interest of user in unknown content by checking her profile to metadata descriptions of the
substance. Both characteristics are incorporated into a personalization scheme.
Generalizing User Profile:
This process has to meet unique precondition to handle the user profile. This is achieved by pre-
processing the user profile. At first, the process compute the user profile by taking the recorded
parent user profile into account. The process adds the rooted properties to the properties of the
local user profile. Thereafter the process loads the data for the foreground and the background of
the map according to the described selection in the user profile.
Additionally, using references facilitate caching and is helpful when considering an
implementation in a production environment. The reference to the user profile can be used as an
attribute for already refined user profiles. It allows functioning the customization process once, but
repeating the result multiple times. However, it has to be made sure, that an update of the user
profile is also proliferated to the generalization process. This requires specific update planning,
which check after a specific timeout or a specific event, if the user profile has not changed yet.
Additionally, as the generalization process involves remote data services, which might be updated
frequently, the cached generalization results might become outdated. Thus selecting a specific
caching strategy requires careful analysis.
Online Decision:
The profile-based personalization committed little or even diminish the search quality,
while disclosing the profile to a server would for sure risk the user’s privacy. To address
this problem, we develop an online mechanism to agree whether to personalize a query.
The basic idea is straightforward. If a different query is identified during generalization,
the entire runtime profiling will be terminated and the query will be sent to the server
without a user profile.
Re-ranking:
Searching deep web pages and ranking to them for impressive search query. It contains
relevant or irrelevant search result. For that we uses reverse searching algorithm.
6. International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT)
Vol. 7, No. 3, September 2016
20
5. ALGORITHMS
According to our click through technique, we require to categorize unlabeled data in order to
discover the predicted negative urls. Naive Bayes is a simple and efficient text categorization
method. However, conventional Naïve Bayes requires both positive and negative examples as
training data, while we only have positive examples. To address this problem, we apply a spying
technique to train Naive Bayes by organizing unlabelled training examples. Moreover, in order to
obtain more detailed predicted negatives, we further suggest a voting procedure to make full use
of all potential spies. Finally, we propose our Spy Naive Bayes algorithm.
Training the Naïve Bayes Algorithm
Input:
{ }1 2 NL l ,l ,.....,l=
/*a set of links*/
Output: Prior probabilities: Pr(+) and Pr(-)
Likelihoods
( )jPr w |+
and
( ) { }1jPr w | j ,.....,M− ∀ ∈
Procedure:
1:
( )
( )1
N
i
i
|l
Pr ;
N
δ=
+
+ =
∑
2:
( )
( )1
N
i
i
|l
Pr ;
N
δ=
−
− =
∑
3: for each attribute jw W∈ do
4:
( )
( ) ( )
( ) ( )
1
1 1
N
j, i i
i
j
M N
k , i i
k i
Num w l |l
Pr w | ;
M Num w l |l
λ δ
λ δ
=
= =
+ +
+ =
+ +
∑
∑ ∑
5:
( )
( ) ( )
( ) ( )
1
1 1
N
j, i i
i
j
M N
k , i i
k i
Num w l |l
Pr w | ;
M Num w l |l
λ δ
λ δ
=
= =
+ −
− =
+ −
∑
∑ ∑
6: end for
6. CONCLUSION
This paper proposed a client-side privacy protection framework called UPS for personalized web
search. UPS could possibly be approved by any PWS that collects user profiles in a hierarchical
taxonomy. The framework make users easy users to specify custom-made privacy requirements
via the hierarchical profiles. In addition, UPS also functioned online generalization on user profiles
to protect the personal privacy without negotiating the search quality. The results also confirmed
the effectiveness and efficiency of the solution.
7. International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT)
Vol. 7, No. 3, September 2016
21
ACKNOWLEDGEMENTS
The authors would like to thank the Department of Computer Engineering of D. Y. Patil School
of Engineering and Technology, Pune for its generous support. They would also like to thank the
Principal Dr. Ashok Kasnale, HOD Ms. Arti Mohanpurkar and all Staff Members of Computer
Engineering department for their valuable guidance.
REFERENCES
[1] K. Sugiyama, K. Hatano, and M. Yoshikawa, “Adaptive Web Search Based on User Profile
Constructed without any Effort from Users,” Proc. 13th Int’l Conf. World Wide Web (WWW),
2004.
[2] J. Teevan, S.T. Dumais, and E. Horvitz, “Personalizing Search via Automated Analysis of Interests
and Activities,” Proc. 28th Ann. Int’l ACM SIGIR Conf. Research and Development in Information
Retrieval (SIGIR), pp. 449-456, 2005.
[3] M. Spertta and S. Gach, “Personalizing Search Based on User Search Histories,” Proc.
IEEE/WIC/ACM Int’l Conf. Web Intelligence (WI), 2005.
[4] Z. Dou, R. Song, and J.-R. Wen, “A Large-Scale Evaluation and Analysis of Personalized
Search Strategies,” Proc. Int’l Conf. World Wide Web (WWW), pp. 581-590, 2007.
[5] X. Shen, B. Tan, and C. Zhai, “Context-Sensitive Information Retrieval Using Implicit
Feedback,” Proc. 28th Ann. Int’l ACM SIGIR Conf. Research and Development Information
Retrieval (SIGIR), 2005.
[6] Y. Xu, K. Wang, B. Zhang, and Z. Chen, “Privacy-Enhancing Personalized Web Search,” Proc. 16th
Int’l Conf. World Wide Web (WWW), pp. 591-600, 2007.
[7] X. Shen, B. Tan, and C. Zhai, “Privacy Protection in Personalized Search,” SIGIR Forum, vol. 41,
no. 1, pp. 4-17, 2007.
[8] Y. Zhu, L. Xiong, and C. Verdery, “Anonymizing User Profiles for Personalized Web Search,” Proc.
19th Int’l Conf. World Wide Web (WWW), pp. 1225-1226, 2010.
[9] Dou, Zhicheng, Ruihua Song, and Ji-Rong Wen. "A large-scale evaluation and analysis of
personalized search strategies", Proceedings of the 16th international conference on World Wide
Web. ACM, 2007.
[10] J. Teevan, S.T. Dumais, and D.J. Liebling, “To Personalize or Not to Personalize: Modeling Queries
with Variation in User Intent,” Proc. 31st Ann. Int’l ACM SIGIR Conf. Research and
Development in Information Retrieval (SIGIR), pp. 163-170, 2008.
[11] Shen, Xuehua, Bin Tan, and Cheng Xiang Zhai. "Implicit user modeling for personalized
search." Proceedings of the 14th ACM international conference on Information and knowledge
management. ACM, 2005.
[12] T. Joachims, L. Granka, B. Pang, H. Hembrooke, and G. Gay, “Accurately Interpreting
Clickthrough Data as Implicit Feedback,” Proc. 28th Ann. Int’l ACM SIGIR Conf. Research and
Development in Information Retrieval (SIGIR ’05), pp. 154-161, 2005.
[13] Shen, Xuehua, Bin Tan, and Cheng Xiang Zhai. "Context-sensitive information retrieval using
implicit feedback." Proceedings of the 28th annual international ACM SIGIR conference on
Research and development in information retrieval. ACM, 2005.
[14] Xu, Yabo, et al. "Online anonymity for personalized web services." Proceedings of the 18th
ACM conference on Information and knowledge management. ACM, 2009.
[15] A. Viejo and J. Castell_a-Roca, “Using Social Networks to Distort Users’ Profiles Generated by
Web Search Engines,” Computer Networks, vol. 54, no. 9, pp. 1343-1357, 2010.
[16] Xu, Yabo, et al. "Privacy-enhancing personalized web search." Proceedings of the 16th
international conference on World Wide Web. ACM, 2007
[17] Xiao, Xiaokui, and Yufei Tao. "Personalized privacy preservation", Proceedings of the 2006
ACM SIGMOD international conference on Management of data. ACM, -2006.
8. International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT)
Vol. 7, No. 3, September 2016
22
Authors
Najneen Tamboli is M.E second year student of Computer Engg. Department,
Dr. D. Y. Patil School of Engineering. And Technology, Lohegaon, Pune. And
her research interest includes Data Mining and Information Retrieval
Sathish Kumar Penchala presently working as an Assistant. Professor,
Department of Computer Engineering, Dr. D. Y. Patil School Of Engineering and
Technology, Charoli, B.K. Via –Lohegaon, Pune, Maharashtra, India. He has 7
year of teaching experience at various institutions. He has completed Master’s
degree in computer science with A grade from Pondicherry University. He is
pursuing Doctor of Philosophy (PhD) from Hindustan University. His main
research interest include Information Retrieval, Ontology, and Distributed System
etc