Open Access   Article Go Back

An Innovative Approach for Top-K Spot Monitoring Based On Trust Worthy Data

E. Renuga1 , S. Baskaran2

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-8 , Page no. 530-533, Aug-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i8.530533

Online published on Aug 31, 2018

Copyright © E. Renuga, S. Baskaran . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: E. Renuga, S. Baskaran, “An Innovative Approach for Top-K Spot Monitoring Based On Trust Worthy Data,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.530-533, 2018.

MLA Style Citation: E. Renuga, S. Baskaran "An Innovative Approach for Top-K Spot Monitoring Based On Trust Worthy Data." International Journal of Computer Sciences and Engineering 6.8 (2018): 530-533.

APA Style Citation: E. Renuga, S. Baskaran, (2018). An Innovative Approach for Top-K Spot Monitoring Based On Trust Worthy Data. International Journal of Computer Sciences and Engineering, 6(8), 530-533.

BibTex Style Citation:
@article{Renuga_2018,
author = {E. Renuga, S. Baskaran},
title = {An Innovative Approach for Top-K Spot Monitoring Based On Trust Worthy Data},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2018},
volume = {6},
Issue = {8},
month = {8},
year = {2018},
issn = {2347-2693},
pages = {530-533},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2726},
doi = {https://doi.org/10.26438/ijcse/v6i8.530533}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i8.530533}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2726
TI - An Innovative Approach for Top-K Spot Monitoring Based On Trust Worthy Data
T2 - International Journal of Computer Sciences and Engineering
AU - E. Renuga, S. Baskaran
PY - 2018
DA - 2018/08/31
PB - IJCSE, Indore, INDIA
SP - 530-533
IS - 8
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
310 185 downloads 184 downloads
  
  
           

Abstract

Recommender Systems are established progressively popular in now-a-days and developed in a variety of zones counting master`s associates, jokes, and eateries, articles of clothing, budgetary administrations, life coverage, emotional accomplices and Twitter pages. The proficient management of record streams assumes an essential part in abundant information filtering systems. A focal server displays the archive stream and constantly reports to every client the best k records that are most appropriate to catch phrases. By using estimated procedure client can discover top k result in light of put stock in admirable information. The approach gives perpetual best k spot brings about powerful path by engaging data mining measures. The proposed organization helps user to download trust worthy data based on only the amount of files transferred by users not based on ratings and assessments. This technique filter outs the unworthy data from the whole evidence. It coordinates rating and puts stock in data to progress the rating positioning model, which adequately augments the nature of the best k thing depressed of all clients. A development of tests on genuine datasets establishes the competence of our intention

Key-Words / Index Term

Recommender System, Information Filtering, Top-K Algorithm, Trust worthy Data, Commendable Information

References

[1] P. Haghani, S. Michel, and K. Aberer, “The gist of everything new: personalized top-k processing over web 2.0 streams.” in CIKM, 2010, pp. 489–498.
[2] K. Mouratidis and H. Pang, “Efficient evaluation of continuous text search queries,” IEEE Trans. Knowl. Data Eng., vol. 23, no. 10, pp. 1469–1482, 2011.
[3] N. Vouzoukidou, B. Amann, and V. Christophides, “Processing continuous text queries featuring non-homogeneous scoring functions.” in CIKM, 2012, pp. 1065–1074.
[4] A. Hoppe, “Automatic ontology-based user profile learning from heterogeneous web resources in a big data context.” PVLDB, pp. 1428–1433, 2013.
[5] A. Lacerda and N. Ziviani, “Building user profiles to improve user experience in recommender systems,” in WSDM, 2013, pp. 759–764.
[6] M. Busch, K. Gade, B. Larson, P. Lok, S. Luckenbill, and J. J. Lin, “Earlybird: Real-time search at twitter,” in ICDE, 2012, pp. 1360– 1369.
[7] L. Wu, W. Lin, X. Xiao, and Y. Xu, “LSII: an indexing structure for exact real-time search on microblogs,” in ICDE, 2013, pp. 482–493.
[8] J. Zobel and A. Moffat, “Inverted files for text search engines,” ACM Comput. Surv., vol. 38, no. 2, 2006.
[9] R. Fagin, A. Lotem, and M. Naor, “Optimal aggregation algorithms for middleware,” J. Comput. Syst. Sci., vol. 66, no. 4, pp. 614–656, 2003.
[10] A. Z. Broder, D. Carmel, M. Herscovici, A. Soffer, and J. Y. Zien, “Efficient query evaluation using a two-level retrieval process.” in CIKM, 2003, pp. 426–434.
[11] S. Prabhakar, Y. Xia, D. V. Kalashnikov, W. G. Aref, and S. E. Hambrusch, “Query indexing and velocity constrained indexing: Scalable techniques for continuous queries on moving objects,” IEEE Trans. Computers, vol. 51, no. 10, pp. 1124–1140, 2002.
[12] S. E. Robertson and D. A. Hull, “The TREC-9 Filtering Track Final Report,” in Text REtrieval Conference, 2000, pp. 25–40.
[13] Y. Zhang and J. Callan, “Maximum Likelihood Estimation for Filtering Thresholds,” in SIGIR, 2001, pp. 294–302.
[14] F. Fabret, H. Jacobsen, F. Llirbat, J. L. M. Pereira, K. A. Ross, and D. Shasha, “Filtering algorithms and implementation for very fast publish/subscribe,” in SIGMOD Conference, 2001, pp. 115–126.
[15] W. Rao, L. Chen, A. W.-C. Fu, H. Chen, and F. Zou, “On efficient content matching in distributed pub/sub systems.” in INFOCOM, 2009, pp. 756–764.