Home > Criminology essays > Personalized web search

Essay: Personalized web search

Essay details and download:

  • Subject area(s): Criminology essays
  • Reading time: 5 minutes
  • Price: Free download
  • Published: 15 October 2019*
  • Last Modified: 22 July 2024
  • File format: Text
  • Words: 1,328 (approx)
  • Number of pages: 6 (approx)

Text preview of this essay:

This page of the essay has 1,328 words.

Personalized web search has provided its effectiveness in improving the quality of various search services on the Internet. Personalized search is a promising way to improve the accuracy of web search, and has been drawing much attention now days. But effective, personalized search requires aggregating and collecting user information, which cause privacy infringement for many users; these infringements have become one of the main obstacles to deploying personalized search applications, and great challenge of how to do privacy preserving personalization. Privacy protection in PWS applications that model user preference as hierarchical user profiles. Propose PWS framework called UPS (User customizable Privacy preserving Search) that can adaptively generalize profiles by queries while respecting user specified privacy requirements.  Runtime generalization has aims of keeping a balance between two predictive metrics that evaluate the utility of personalization and the privacy risk of exposing the user generalized profile. They present two greedy algorithms, namely GreedyDP and GreedyIL, for runtime generalization. They also provide an online prediction mechanism for deciding whether personalizing a query is beneficial.  In a proposed method we are using profile and location information of user to search user preferred results.

Keywords: Personalized web search, greedy algorithm, user profile

I INTRODUCTION

The web search engine is an important portal for ordinary people who are looking for useful information on the web. Generally, users facing failure and get improper results when search engines return irrelevant results that do not meet their real intentions. A traditional search engine provides a similar set of results without considering of who submitted the query. Therefore, the requirement arises to have personalized web search system, which gives outputs appropriate to the user as highly ranked pages[6].

In process of search engine adaptation, an adaptable search engine adopts a general (not adapted) ranking function to serve a new user. Then, the user enters queries and clicks on the search results while the search engine maintains logs of the user’s preferred action as click through data for analysis. The click through data is first processed by a preference web pages mining algorithm, which outputs explicit user preferences in the form of the user prefers “Ia and Ib”. After that a ranking function optimizer takes the explicit user interested results  as input data, then produces an optimized ranking function with respect to the user’s preferences. Finally, the updated ranking function replaces the old general ranking function to predict the future queries of this particular user. At this stage, a round of search engine adaptation is over. The adaptation process can be repeated regularly to find the most updated user preferences. Privacy protection in Personalized Web Search (PWS) applications system user preferences as hierarchical user profiles [4][7].

Some researcher Suggest a PWS framework called UPS that can adaptively simplify profiles by queries while respecting user particular privacy requirements. Run time simplification aspires at impressive a equilibrium between two predictive metrics that assess the helpfulness of personalization and the privacy jeopardy of revealing the generalized profile. Then present two algorithms namely GreedyDP and GreedyIL for run time profile generalization.  Our system also work on an online prediction mechanism for deciding whether personalizing a query is valuable.  With increasing usage of individual and performance information to profile its users which is regularly get together absolutely from query history, browsing history, click through data bookmarks, user documents and so forth [12].

II RELATED WORK

Click-through data in search engines can be thought of as triplets (q, r, c) in which q is query, the ranking r presented to the user, and the set c represent links the user clicked on[1][2].

Each query is assigned a single ID which is saved in the query-log along with the query words and the presented ranking. The links on the results page presented to the user do not lead directly to the suggested pages, but point to a proxy server. These links encode the query ID and the URL of the suggested document. When the user clicks on the link, the proxy server records the URL and the query ID in the click-log. The proxy then uses the HTTP Location command to forward the user to the target URL. This process can be made clear to the user and does not influence system performance[3].

Web pages are retrieved using various method which are should be Ranked. Here ranking helps to make the user preferred web pages links at the top most which  is done based  on the following attributes .Ranking preference of the web page is based on the following attributes such us  Term Weighting Technique (TWT) ,PageRank , User’s Feedback , Visitor Count , Access time length,  Https[8].

Most work on machine learning in information retrieval does  not consider the formulation, but simplifies the task to a binary classification problem with the two classes “non-relevant” and “relevant” . Such a simplification has several limitation. For example, due to a strong majority of “non-relevant” web pages, a learner will typically achieve the maximum predictive classification accuracy, if it always responds “non-relevant”, independent of where the relevant web pages are ranked[10].

As per B. Tan, X. Shen, and C. Zhai, they proposed Statistical language modeling based methods  to mine contextual  information  from long term search history.  Exploit  it for a more accurate  estimate  of query language model.  The web search engines, suffer from the problem of documents to return  is “one size fits all”  the decision of which documents to return  is based on query, without  attention  of a particular user’s preferences and search context  [9].

III  SYSTEM  ARCHITECTURE

A. System Overview

Now a days there are many types of personalized web search engine are available over web for helping users select best search result among the infinite many available. Developing such web search engine in which privacy problems are much more critical, and having a single PWS called UPS framework is the essence of time.  In proposed method for PWS we are using profile and location information.

UPS framework assumes that the queries do not contain any sensitive information, and aims at protecting the privacy in single user profiles while retaining their usefulness. UPS Framework which generalized profiles for each query according to user specified privacy requirements. The problems of privacy conserving personalized search as Risk Profile Generalization, with its NP-Hardness proved. A Tradeoff between search quality and level of privacy protection achieved from generalization. Generalization algorithms are used namely GreedyDP and GreedyIL to find out a utilization of user search and improving performance.

IV. EXPERIMENTAL SETUP

For the experimentation work JAVA (NetBeans IDE 8.0) is used with Processor Pentium IV, RAM 1 GB & operating system Windows 7. MySQL server is used for storing path of trained images.

VI. RESULT

Ranking of web pages is improved in  many systems  based on user feedbacks, access time spent for a single link by the user  document strength, number of inlink and outlinks of the webpage and visitor count.  In the proposed system we are using profile based searching algorithm and also using location information for searching user preference results.

Proposed method results depend on user privacy and personalized web search. Fig 2 represent after profile construction, if user want privacy, then user can customized it.

VII CONCLUSION

PWS has been improved by using profile based sensitive node ranking which helps to improve privacy of users.  Proposed system also work on location information and click based method preferred pages at the top most and location of users. Privacy protection is done by using generalized profile and cryptography to the unauthorized user account and also by restricting the access of the unauthorized user.

In the future enhancement personalized web search can be improved by sending their search details to others immediately by instant messaging.

VIII. ACKNOWLEDGMENT

The authors would like to thank the publishers, researchers for making their resources available and teachers for their guidance. We would also thank the college authority for providing the required infrastructure and support. Finally we would like to extend a heartfelt gratitude to friends and family members.

About this essay:

If you use part of this page in your own work, you need to provide a citation, as follows:

Essay Sauce, Personalized web search. Available from:<https://www.essaysauce.com/criminology-essays/2016-3-28-1459145059/> [Accessed 25-04-26].

These Criminology essays have been submitted to us by students in order to help you with your studies.

* This essay may have been previously published on EssaySauce.com and/or Essay.uk.com at an earlier date than indicated.