Mining User Profile Exploitation Cluster from Computer Program Logs | Abstract

ISSN ONLINE(2320-9801) PRINT (2320-9798)

Research Article Open Access

Mining User Profile Exploitation Cluster from Computer Program Logs

Abstract

Fundamental part of any personalization application is user identification, the present user identification ways ar supported users interest (i.e. positive preferences).The main focus is on computer program personalization and to develop many concept-based user identification strategies. Concept-based user identification strategies deals with each positive and negative preferences. This user profiles may be integrated into the ranking algorithmic program of a hunt engine in order that search result may be hierarchic in keeping with individual users interest. The RSCF makes a hunt of knowledge containing the item within the search results, the specified information is been clicked by the user and this clicked information is given because the input and generates the rankers because the output. The negative preference will increase the separation between the similar and dissimilar queries. This separation provides a transparent threshold for collective cluster algorithmic program and improves the general quality.

K.G.S. Venkatesan1, V. Khanna, Jay Prakash Thakur, Banbari Kumar

To read the full article Download Full Article