2,647 research outputs found

    An Overview of Personalized Recommendation System to Improve Web Navigation

    Get PDF
    We present a new personalized recommendation system, which means the searches of each user is done according to their interest which is based on ranking or preference method. It also maintains the logs which records the sessions of each user and brings out the exact data required by the user. This is done by fetching the data that is already stored in the database. Web server logs maintains history of page results and consists of a log file which automatically creates and maintains the list of activities performed by the users. For extracting the data according to the user’s previous searches, we are using Stemming Algorithm. The Stemming Algorithm is a process where the exact, meaningful words are extracted from the URL. Because of this process the user’s search time will be reduced. It also improves the quality of web navigation and overcomes the limitation of existing system. In the proposed system we extract user’s behaviour from web server logs in the actual process whereas, in the anticipated system, the user’s behaviour is done with the help of cognitive user model and we perform the comparison between the two usage processes. The data produced from this comparison can help the users to discover usability issues and take actions to improve usability. In the anticipated usage the cognitive user model is done that can be used to simulate or predict human behaviour or by performance and task. Finally, the system is executed by using the top-k ranking algorithm. The advantage of this system are accuracy and better processing speed. The user’s convenience deals with the ease of navigation which helps the users to interact with their interface

    Detection of Android Malware using Feature Selection with a Hybrid Genetic Algorithm and Simulated Annealing (SVM and DBN)

    Get PDF
    Because of the widespread use of the Android operating system and the simplicity with which applications can be created on the Android platform, anyone can easily create malware using pre-made tools. Due to the spread of malware among many helpful applications, Android users are experiencing issues. In this study, we showed how to use permissions gleaned from static analysis to identify Android malware. Utilising support vector machines and deep belief networks, we choose the pertinent features from the set of permissions based on this methodology. The suggested technique increases the effectiveness of Android malware detection

    Binary Particle Swarm Optimization based Biclustering of Web usage Data

    Full text link
    Web mining is the nontrivial process to discover valid, novel, potentially useful knowledge from web data using the data mining techniques or methods. It may give information that is useful for improving the services offered by web portals and information access and retrieval tools. With the rapid development of biclustering, more researchers have applied the biclustering technique to different fields in recent years. When biclustering approach is applied to the web usage data it automatically captures the hidden browsing patterns from it in the form of biclusters. In this work, swarm intelligent technique is combined with biclustering approach to propose an algorithm called Binary Particle Swarm Optimization (BPSO) based Biclustering for Web Usage Data. The main objective of this algorithm is to retrieve the global optimal bicluster from the web usage data. These biclusters contain relationships between web users and web pages which are useful for the E-Commerce applications like web advertising and marketing. Experiments are conducted on real dataset to prove the efficiency of the proposed algorithms

    Relevance of Negative Links in Graph Partitioning: A Case Study Using Votes From the European Parliament

    Get PDF
    In this paper, we want to study the informative value of negative links in signed complex networks. For this purpose, we extract and analyze a collection of signed networks representing voting sessions of the European Parliament (EP). We first process some data collected by the VoteWatch Europe Website for the whole 7 th term (2009-2014), by considering voting similarities between Members of the EP to define weighted signed links. We then apply a selection of community detection algorithms, designed to process only positive links, to these data. We also apply Parallel Iterative Local Search (Parallel ILS), an algorithm recently proposed to identify balanced partitions in signed networks. Our results show that, contrary to the conclusions of a previous study focusing on other data, the partitions detected by ignoring or considering the negative links are indeed remarkably different for these networks. The relevance of negative links for graph partitioning therefore is an open question which should be further explored.Comment: in 2nd European Network Intelligence Conference (ENIC), Sep 2015, Karlskrona, Swede

    A Methodology for Planning Road Best Management Practices Combining WEPP: Road Erosion Modeling and Simulated Annealing Optimization

    Get PDF
    Erosion from forest roads is a known problem in mountainous terrain. To abate these negative consequences, physical Best Management Practices (BMPs) are implemented, sometimes with no knowledge of erosion hot spots. With the need to minimize water quality impacts while at the same time accounting for multiple considerations and constraints, road BMP planning at the watershed scale is a difficult task. To assist in this planning process, a methodology is presented here that combines WEPP: Road erosion predictions with simulated annealing optimization. Under this methodology, erosion predictions associated with BMP options for a segment comprise the objective function of an optimization problem. This methodology was tested on a watershed in the Lake Tahoe Basin. WEPP: Road input data was gathered through road surveys. Modeling results predicted relatively little sediment leaving the forest buffer, as a result of numerous well-maintained BMPs and the dry climate found in the watershed. A sensitivity analysis for all WEPP: Road input parameters is presented, which provides insight into the general applicability of these erosion estimates as well as the relative importance of each input parameter. After evaluating erosion risk across the entire watershed, applicable BMPs were assigned to problem road segments and WEPP: Road was used to predict change in sediment leaving the buffer with BMP implementation at a given site. These predictions, combined with budget constraints as well as equipment scheduling considerations, were incorporated into an algorithm using simulated annealing as its optimization engine. Three modeled scenarios demonstrate the viability of this methodology in reducing total sediment leaving the road buffer over a planning horizon. Of the 173 segments surveyed, 38 segments could be treated using generic BMPs. For all three scenarios, BMP-SA reduced sediment leaving the buffer by as much as 70% over the course of a 20-year planning horizon. For the 38 segments treated with BMPs, sediment was reduced by greater than 90% over the planning horizon. This methodology is a viable approach for streamlining watershed-scale road network BMP planning, despite its heavy reliance on road erosion estimates
    • …
    corecore