Social Bookmarking and Web Search

Author(s):  
Yusuke Yanbe ◽  
Adam Jatowt ◽  
Satoshi Nakamura ◽  
Katsumi Tanaka

Social bookmarking is an emerging type of a Web service for reusing, sharing, and discovering resources. By bookmarking, users preserve access points to encountered documents for their future access. On the other hand, the social aspect of bookmarking results from the visibility of bookmarks to other users helping them to discover new, potentially interesting resources. In addition, social bookmarking systems allow for better estimation of the popularity and relevance of documents. In this chapter, we provide an overview of major aspects involved with social bookmarking and investigate their potential for enhancing Web search and for building novel applications. We make a comparative analysis of two popularity measures of Web pages, PageRank and SBRank, where SBRank is defined as an aggregate number of bookmarks that a given page accumulates in a selected social bookmarking system. The results of this analysis reveal the advantages of SBRank when compared to PageRank measure and provide the foundations for utilizing social bookmarking information in order to enhance and improve search in the Web. In the second part of the chapter, we describe an application that combines SBRank and PageRank measures in order to rerank results delivered by Web search engines and that offers several complimentary functions for realizing more effective search.

Compiler ◽  
2013 ◽  
Vol 2 (2) ◽  
Author(s):  
Saryanto Saryanto ◽  
Sumarsono Sumarsono ◽  
Nurcahyani Dewi Retnowati

Data communication in the internet today is so complex as an example of the speed factor becomes very important in communicating, everyone wants fast data communication services provided in order to maximum. In relation to the application as a communication liaison with client server applications, web service using a data serialization format to transmit the data. Before the data is sent, either fromthe client to the server or vice versa, should be modified in a specific data format beforehand according to the web service is used. Types of data serialization format used in the web service such as XML and JSON. The method used for testing include data serialization method, data measurement method and data parsing method. Data serialization method is used to calculate the time serialization of data from the database to the form of XML and JSON in applications with PHP platform. Data measurement method used to measure the size of the XML and JSON data which based on many fields of data serialization process. Data parsing method is used to calculate the processing time and JSON parsing XML data. Results o f comparative analysis o f XML and JSON in PHP applications using thearchitecture Rest can be concluded that the test result o f the difference in time and time serialization and JSON parsing XML data is influenced by the number o f records, if the number of records the greater the difference in eating time data serialization and parsing the data the greater the time also itcan be concluded that the faster the process JSON serialization and parsing XML data is compared. Testing results o f the JSON data size is smaller than the size of XML. Data exchange using XML format has a size limit of up to 31456.31 KB while JSON XML exceeds the size limit. Testing results on the Internet when the number o f records up to 50,000 data when the data serialization and parsing time data can not be detected in the database.


2017 ◽  
Vol 10 (2) ◽  
pp. 359-363
Author(s):  
Rupal Sharma ◽  
Ravi Sheth

Today, web application security is most significant battlefield between victim, attacker and resource of web service. The owner of web applications can’t see security vulnerability in web application which develops in ASP.NET. This paper explain one algorithm which aim to identify broken authentication and session management vulnerability. The given method of this paper scan the web application files. The created scanner generator relies on studying the source character of the application limited ASP.NET files and the code be beholden files. A program develop for this motive is to bring about a report which describes vulnerabilities types by mentioning the indict name, disclose description and its location. The aim of the paper is to discover the broken authentication and session management vulnerabilities. The indicated algorithm will uphold organization and developer to repair the vulnerabilities and recover from one end to the other security.


2018 ◽  
Vol 14 (09) ◽  
pp. 19
Author(s):  
Velin Spasov Kralev ◽  
Radoslava Stankova Kraleva ◽  
Ninа Sinyagina ◽  
Petia Koprinkova-Hristova ◽  
Nadejda Bocheva

<span lang="EN-US">This paper presents the results obtained from a comparative analysis of two methods for experimental data sharing. </span><span>Several </span><span lang="EN-US">works</span><span> related to the </span><span lang="EN-US">topic</span><span> and some </span><span lang="EN-US">approaches</span><span> for </span><span lang="EN-US">processing data</span><span> have been discussed. Different </span><span lang="EN-US">technolgoies related to the web services</span><span>, ways of using them and the areas of their application are analyzed. For the purposes of the study, a </span><span lang="EN-US">web service</span><span> for </span><span lang="EN-US">retrieving </span><span>specific data</span><span lang="EN-US"> from a behavioral experiments database</span><span> was de</span><span lang="EN-US">veloped</span><span>.</span><span>The methodology and conditions for conducting </span><span lang="EN-US">the </span><span>experiments are described. T</span><span lang="EN-US">wo</span><span> different indicators </span><span lang="EN-US">a</span><span>re analyzed, respectively: </span><span lang="EN-US">time to retrieve the data from a database </span><span>and iteration time across all records through one </span><span lang="EN-US">loop</span><span>. The results show that when </span><span lang="EN-US">retrieving</span><span> thousands of records both </span><span lang="EN-US">web service based approach</span><span> and an approach based on a remote database</span><span lang="EN-US"> server can be used. However, when retrieving millions of records</span><span>, </span><span lang="EN-US">the fastest approach was the one that uses remote database server</span><span>.</span><span> <span lang="EN-US">T</span></span><span>he obtained</span><span>results</span><span>show that </span><span lang="EN-US">the </span><span>dynamic arrays</span><span lang="EN-US"> (containing strings) </span><span>iterated much faster </span><span lang="EN-US">across all data records </span><span>than </span><span lang="EN-US">the dataset </span><span>approach.</span>


Author(s):  
Li Weigang ◽  
Wu Man Qi

This chapter presents a study of Ant Colony Optimization (ACO) to Interlegis Web portal, Brazilian legislation Website. The approach of AntWeb is inspired by ant colonies foraging behavior to adaptively mark the most significant link by means of the shortest route to arrive the target pages. The system considers the users in the Web portal as artificial ants and the links among the pages of the Web pages as the researching network. To identify the group of the visitors, Web mining is applied to extract knowledge based on preprocessing Web log files. The chapter describes the theory, model, main utilities and implementation of AntWeb prototype in Interlegis Web portal. The case study shows Off-line Web mining; simulations without and with the use of AntWeb; testing by modification of the parameters. The result demonstrates the sensibility and accessibility of AntWeb and the benefits for the Interlegis Web users.


Author(s):  
Melih Kirlidog

Virtual Communities (VC), as defined by Rheingold (2000), are the social groups formed in the cyberspace when enough people carry on public discussions long enough and with sufficient human feeling. VC enabled by the ICT technologies are formed in two ways. Either their members can be actively engaged with each other and tightly coupled in e-mail discussion and communication groups, or they can be the passive observers of the Web pages and thereby loosely coupled with other members of the community.


Author(s):  
Ji-Rong Wen

The Web is an open and free environment for people to publish and get information. Everyone on the Web can be either an author, a reader, or both. The language of the Web, HTML (Hypertext Markup Language), is mainly designed for information display, not for semantic representation. Therefore, current Web search engines usually treat Web pages as unstructured documents, and traditional information retrieval (IR) technologies are employed for Web page parsing, indexing, and searching. The unstructured essence of Web pages seriously blocks more accurate search and advanced applications on the Web. For example, many sites contain structured information about various products. Extracting and integrating product information from multiple Web sites could lead to powerful search functions, such as comparison shopping and business intelligence. However, these structured data are embedded in Web pages, and there are no proper traditional methods to extract and integrate them. Another example is the link structure of the Web. If used properly, information hidden in the links could be taken advantage of to effectively improve search performance and make Web search go beyond traditional information retrieval (Page, Brin, Motwani, & Winograd, 1998, Kleinberg, 1998).


2020 ◽  
Vol 62 (1) ◽  
pp. 4-34 ◽  
Author(s):  
David Mosse

AbstractCaste has always generated political and scholarly controversy, but the forms that this takes today newly combine anti-caste activism with counter-claims that caste is irrelevant or non-existent, or claims to castelessness. Claims to castelessness are, in turn, viewed by some as a new disguise for caste power and privilege, while castlessness is also an aspiration for people subject to caste-based discrimination. This article looks at elite claims to “enclose” caste within religion, specifically Hinduism, and the Indian nation so as to restrict the field of social policy that caste applies to, to exempt caste-based discrimination from the law, and to limit the social politics of caste. It does so through a comparative analysis of two cases. The first is the exclusion of Christian and Muslim Dalits—members of castes subordinated as “untouchable”—from provisions and protections as Scheduled Castes in India. The other case is that of responses to the introduction of caste into anti-discrimination law in the UK. While Hindu organizations in the UK reject “caste” as a colonial and racist term and deploy postcolonial scholarship to deny caste discrimination, Dalit organizations, representing its potential victims, turn to scholarly discourse on caste, race, or human rights to support their cause. These are epistemological disputes about categories of description and how “the social” is made available for public debate, and especially for law. Such disputes engage with anthropology, whose analytical terms animate and change the social world that is their subject.


2020 ◽  
Vol 39 (3) ◽  
pp. 347-364
Author(s):  
Marianne Thejls Ziegler ◽  

This article outlines different attempts to define integrity, and argues, with reference to the theory of moral particularism, that definitions acquire universal applicability at the expense of their informative value. The article then proceeds to more delimitating definitions that emphasise the social aspect, and argues that their ideas of the concept, like courage, require certain situations in order to unfold. Since not every person is challenged to act with integrity, the delimitation requires a distinction between manifest integrity and dormant integrity, or dormant lack of integrity. Persons of influence, like politicians and managers, on the other hand, are challenged on a regular basis because their position requires communication of values in a public space, against which the public can evaluate their actions. A delimitating definition therefore ties the question of integrity to people in leading positions.


Author(s):  
Dr. R.Rooba Et.al

The web page recommendation is generated by using the navigational history from web server log files. Semantic Variable Length Markov Chain Model (SVLMC) is a web page recommendation system used to generate recommendation by combining a higher order Markov model with rich semantic data. The problem of state space complexity and time complexity in SVLMC was resolved by Semantic Variable Length confidence pruned Markov Chain Model (SVLCPMC) and Support vector machine based SVLCPMC (SSVLCPMC) meth-ods respectively. The recommendation accuracy was further improved by quickest change detection using Kullback-Leibler Divergence method. In this paper, socio semantic information is included with the similarity score which improves the recommendation accuracy. The social information from the social websites such as twitter is considered for web page recommendation. Initially number of web pages is collected and the similari-ty between web pages is computed by comparing their semantic information. The term frequency and inverse document frequency (tf-idf) is used to produce a composite weight, the most important terms in the web pages are extracted. Then the Pointwise Mutual Information (PMI) between the most important terms and the terms in the twitter dataset are calculated. The PMI metric measures the closeness between the twitter terms and the most important terms in the web pages. Then this measure is added with the similarity score matrix to provide the socio semantic search information for recommendation generation. The experimental results show that the pro-posed method has better performance in terms of prediction accuracy, precision, F1 measure, R measure and coverage.


2019 ◽  
Vol 10 (1) ◽  
pp. 68-75
Author(s):  
Aleksandra Marcinkiewicz-Wilk

Aim. The aim of this article is to show the significance of educational activeness among the elderly in the context of its adaptation to the ageing process itself (the psychological aspect), as well as to a rapidly changing society defined by technological progress (the social aspect). Method. The article has been formulated with the aid of critical literature on the subject Conclusion. Educational activeness is crucial in late adulthood. On the one hand it is an important element in allowing the elderly to adapt to a new stage of life, and on the other hand to keep up with a rapidly changing society, defined in the literature as the information society.


Sign in / Sign up

Export Citation Format

Share Document