Collaborative Framework with User Personalization for Efficient web Search : A D3 Mining approach
Journal Title: Indian Journal of Computer Science and Engineering - Year 2011, Vol 2, Issue 2
Abstract
User personalization becomes more important task for web search engines. We develop a unified model to provide user personalization for efficient web search. We collect implicit feedback from the users by tracking their behavior on the web page based on their actions on the web page. We track actions like save, copy, bookmark, time spent and logging into data base, which will be used to build unified model. Our model is used as a collaborative framework using which related users can mine the information collaboratively with little amount of time. Based on the feed back from the users we categorize the users and search query. We build the unified model based on the categorized information, using which we provide personalized results to the user during web search. Our methodology minimizes the search time and provides more amount of relevant information.
Authors and Affiliations
V. Vijayadeepa , , Dr. D. K. Ghosh
Visual Query in Temporal Database with Multi Dimensions
A wide range of database applications manage time-varying data. In contrast, existing database technology provides little support for managing such data. The research area of temporal databases aims to change this state...
Performance Evolution of Various Wavelets in Cervical Lesion Detection
Cervical cancer is one of most common cancers among women in the world caused by human papilloma virus infection. It develops in the tissue of cervix which connects upper body of the uterus to the vagina. The types of ca...
AN EXHAUSTIVE FRAMEWORK FOR BETTER DATA CENTERS’ ENERGY EFFICIENCY AND GREENNESS BY USING METRICS
As data centers become more popular today and power cost and energy consumption exponentially raised, considering energy efficiency in data centers seems imperative. To achieve more energy efficiency and greener data cen...
Two Methodes to Release a New Real-time Task
In some real-time systems, sometimes there is a need to insert a new task at run time. If the system is fully loaded, the scheduler has to compress one or more current tasks to free some bandwidth. Naturally, finding the...
PROPERTIES AND APPROACH OF CRYPTOGRAPHIC HASH ALGORITHMS
The importance of hash functions for protecting the authenticity of information is demonstrated. Applications include integrity protection, conventional message authentication and digital signatures. An overview is given...