Implementing Efficient Search Results and Navigation in website J.Prasanth kumar

J Prasanth kumar

Abstract


Designing structured website and organizing search results in website is Challenging task. For this we propose mathematical programming model to improve user navigation as well as novel search interface that enables the user to navigate large number of query results by organizing them using the concept hierarchy. The results are organized into a navigation tree. At each node expansion step we implement classification algorithms [TF-IDF, SVM] for efficient classification of nodes and an advanced k-means algorithm for assigning priorities to the web site navigation links based on the efficient content retrieved. It reveals only a small subset of the concept nodes finally the expected user navigation cost is minimized.


Keywords


Website Design, User Navigation, Page Ranking, Mathematical Programming Model.

References


B. SakthiSaravanan., M.Tech#1, R.DheenadayaluM.Sc (Engg) #2 “Improving Efficiency and Security Based Data Sharing in Large Scale Network” International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 1, January 2013, ISSN: 2319-5967

Mr. RupeshVaishnav “Attribute Based Signature Scheme For Attribute Based Encrypted Data In Cloud” International Journal of Engineering Research & Technology (IJERT) Vol. 1 Issue 10, December 2012 ISSN: 2278-0181.

M. Armbrust, A. Fox, R. Gri±th, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, A view of cloud computing," Communications of the ACM, vol. 53, pp. 50{58, 2010.

D.Khader ,” Attribute Based Authentication Schemes,” PhD Dissertation University of Bath, 2009.

M. D. Dikaiakos, D. Katsaros, P. Mehra, G. Pallis, and Athena Vakali, Cloud computing: Distributed internet computing for it and scientific research," IEEE Internet Computing, vol. 13, pp. 10 {13, 2009.

A. Sahai and B. Waters. Fuzzy identity based encryption. In Eurocrypt 2005.

D. Boneh and M. K. Franklin. Identity-based encryption from the weil pairing. In Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, pages 213–229. Springer Verlag, 2001.

C. Cocks. An identity based encryption scheme based on quadratic residues. In IMA Int. Conf., pages 360–363, 2001.

A. Shamir. Identity based cryptosystems and signature schemes. In Proceedings of CRYPTO 84 on Advances in Cryptology, pages 47–53. Springer Verlag New York, Inc., 1985.

Matthew Pirretti , Patrick Traynor “Secure Attribute Based Systems”


Full Text: PDF[FULL TEXT]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.