An Innovative Approach for Top-K Spot Monitoring Based On Trust Worthy Data
E. Renuga1 , S. Baskaran2
Section:Review Paper, Product Type: Journal Paper
Volume-6 ,
Issue-8 , Page no. 530-533, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.530533
Online published on Aug 31, 2018
Copyright © E. Renuga, S. Baskaran . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: E. Renuga, S. Baskaran, “An Innovative Approach for Top-K Spot Monitoring Based On Trust Worthy Data,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.530-533, 2018.
MLA Style Citation: E. Renuga, S. Baskaran "An Innovative Approach for Top-K Spot Monitoring Based On Trust Worthy Data." International Journal of Computer Sciences and Engineering 6.8 (2018): 530-533.
APA Style Citation: E. Renuga, S. Baskaran, (2018). An Innovative Approach for Top-K Spot Monitoring Based On Trust Worthy Data. International Journal of Computer Sciences and Engineering, 6(8), 530-533.
BibTex Style Citation:
@article{Renuga_2018,
author = {E. Renuga, S. Baskaran},
title = {An Innovative Approach for Top-K Spot Monitoring Based On Trust Worthy Data},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2018},
volume = {6},
Issue = {8},
month = {8},
year = {2018},
issn = {2347-2693},
pages = {530-533},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2726},
doi = {https://doi.org/10.26438/ijcse/v6i8.530533}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i8.530533}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2726
TI - An Innovative Approach for Top-K Spot Monitoring Based On Trust Worthy Data
T2 - International Journal of Computer Sciences and Engineering
AU - E. Renuga, S. Baskaran
PY - 2018
DA - 2018/08/31
PB - IJCSE, Indore, INDIA
SP - 530-533
IS - 8
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
345 | 202 downloads | 205 downloads |
Abstract
Recommender Systems are established progressively popular in now-a-days and developed in a variety of zones counting master`s associates, jokes, and eateries, articles of clothing, budgetary administrations, life coverage, emotional accomplices and Twitter pages. The proficient management of record streams assumes an essential part in abundant information filtering systems. A focal server displays the archive stream and constantly reports to every client the best k records that are most appropriate to catch phrases. By using estimated procedure client can discover top k result in light of put stock in admirable information. The approach gives perpetual best k spot brings about powerful path by engaging data mining measures. The proposed organization helps user to download trust worthy data based on only the amount of files transferred by users not based on ratings and assessments. This technique filter outs the unworthy data from the whole evidence. It coordinates rating and puts stock in data to progress the rating positioning model, which adequately augments the nature of the best k thing depressed of all clients. A development of tests on genuine datasets establishes the competence of our intention
Key-Words / Index Term
Recommender System, Information Filtering, Top-K Algorithm, Trust worthy Data, Commendable Information
References
[1] P. Haghani, S. Michel, and K. Aberer, “The gist of everything new: personalized top-k processing over web 2.0 streams.” in CIKM, 2010, pp. 489–498.
[2] K. Mouratidis and H. Pang, “Efficient evaluation of continuous text search queries,” IEEE Trans. Knowl. Data Eng., vol. 23, no. 10, pp. 1469–1482, 2011.
[3] N. Vouzoukidou, B. Amann, and V. Christophides, “Processing continuous text queries featuring non-homogeneous scoring functions.” in CIKM, 2012, pp. 1065–1074.
[4] A. Hoppe, “Automatic ontology-based user profile learning from heterogeneous web resources in a big data context.” PVLDB, pp. 1428–1433, 2013.
[5] A. Lacerda and N. Ziviani, “Building user profiles to improve user experience in recommender systems,” in WSDM, 2013, pp. 759–764.
[6] M. Busch, K. Gade, B. Larson, P. Lok, S. Luckenbill, and J. J. Lin, “Earlybird: Real-time search at twitter,” in ICDE, 2012, pp. 1360– 1369.
[7] L. Wu, W. Lin, X. Xiao, and Y. Xu, “LSII: an indexing structure for exact real-time search on microblogs,” in ICDE, 2013, pp. 482–493.
[8] J. Zobel and A. Moffat, “Inverted files for text search engines,” ACM Comput. Surv., vol. 38, no. 2, 2006.
[9] R. Fagin, A. Lotem, and M. Naor, “Optimal aggregation algorithms for middleware,” J. Comput. Syst. Sci., vol. 66, no. 4, pp. 614–656, 2003.
[10] A. Z. Broder, D. Carmel, M. Herscovici, A. Soffer, and J. Y. Zien, “Efficient query evaluation using a two-level retrieval process.” in CIKM, 2003, pp. 426–434.
[11] S. Prabhakar, Y. Xia, D. V. Kalashnikov, W. G. Aref, and S. E. Hambrusch, “Query indexing and velocity constrained indexing: Scalable techniques for continuous queries on moving objects,” IEEE Trans. Computers, vol. 51, no. 10, pp. 1124–1140, 2002.
[12] S. E. Robertson and D. A. Hull, “The TREC-9 Filtering Track Final Report,” in Text REtrieval Conference, 2000, pp. 25–40.
[13] Y. Zhang and J. Callan, “Maximum Likelihood Estimation for Filtering Thresholds,” in SIGIR, 2001, pp. 294–302.
[14] F. Fabret, H. Jacobsen, F. Llirbat, J. L. M. Pereira, K. A. Ross, and D. Shasha, “Filtering algorithms and implementation for very fast publish/subscribe,” in SIGMOD Conference, 2001, pp. 115–126.
[15] W. Rao, L. Chen, A. W.-C. Fu, H. Chen, and F. Zou, “On efficient content matching in distributed pub/sub systems.” in INFOCOM, 2009, pp. 756–764.