Main Article Content

Abstract

The web search engine has long become the most important portal for ordinary people looking for useful information on the web. However, users might experience failure when search engines return irrelevant results that do not meet their real intentions. Such irrelevance is largely due to the enormous variety of users’ contexts and backgrounds, as well as the ambiguity of texts. Personalized web search (PWS) is a general category of search techniques aiming at providing better search results, which are tailored for individual user needs. As the expense, user information has to be collected and analyzed to figure out the user intention behind the issued query.Personalized web search (PWS) has demonstrated its effectiveness in improving the quality of various search services on the Internet. However, evidences show that users’ reluctance to disclose their private information during search has become a major barrier for the wide proliferation of PWS. This research studies privacy protection in PWS applications that model user preferences as hierarchical user profiles. This project proposes a PWS framework called UPS that can adaptively generalize profiles by queries while respecting user-specified privacy requirements. The proposed runtime generalization aims at striking a balance between two predictive metrics that evaluate the utility of personalization and the privacy risk of exposing the generalized profile. The study presents two greedy algorithms, namely Greedy DP and Greedy IL, for runtime generalization. It also provides an online prediction mechanism for deciding whether personalizing a query is beneficial. In addition, research study to improve personalized web search model using re-ranking with catch services algorithm in web database.

Article Details

How to Cite
R.Navinkumar, & D.Uvarani. (2017). Improve secure personal web search temporal behavior search over re-ranking with catch services model . International Journal of Intellectual Advancements and Research in Engineering Computations, 5(2), 1180–1188. Retrieved from https://ijiarec.com/ijiarec/article/view/1487