RECOMMENDER SYSTEM ON STRUCTURED DATA

The publications of research papers are increasing exponentially and to find the relevant paper to a research area or according a user query is crucial task. It is due to the large corpus of text data in different formats. If a user query on search engine to read a research paper, it will provide him a bundle of papers, now to find the relevancy of the paper; user will read one by one each paper. There are some techniques already exist as TF*IDF with many variations and content match search cited by and co-citation. Document ranking and the vector space model is nearest to our system. In this paper, we used a new approach for recommender system , it examine identify paper section then assign weights to each section , applying Paper section weights to determine what documents are more relevant to a user query. When papers retrieved then rank it on the basis of section weights. each paper ha four main sections are Paper Title, Abstract, Keywords, Introduction and Conclusion. In online survey we get best results against paper content match.

[1]  Dik Lun Lee,et al.  Document Ranking and the Vector-Space Model , 1997, IEEE Softw..

[2]  Deepak Puthal,et al.  Secure Data Collection & Critical Data Transmission in Mobile Sink WSN: Secure and Energy efficient data collection technique , 2012 .

[3]  Juan Enrique Ramos,et al.  Using TF-IDF to Determine Word Relevance in Document Queries , 2003 .

[4]  F. Khan,et al.  Dual head clustering scheme in wireless sensor networks , 2012, 2012 International Conference on Emerging Technologies.

[5]  Susan T. Dumais,et al.  Using Linear Algebra for Intelligent Information Retrieval , 1995, SIAM Rev..

[6]  Xiangjian He,et al.  PAWN: a payload‐based mutual authentication scheme for wireless sensor networks , 2017, Concurr. Comput. Pract. Exp..

[7]  Jinjun Chen,et al.  A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream , 2015, WISE.

[8]  Deepak Puthal,et al.  Effective Machine to Machine Communications in Smart Grid Networks , 2012 .

[9]  Xiangjian He,et al.  A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[10]  Xiangjian He,et al.  A Sybil attack detection scheme for a forest wildfire monitoring application , 2018, Future Gener. Comput. Syst..

[11]  Xiangjian He,et al.  PASCCC: Priority-based application-specific congestion control clustering protocol , 2014, Comput. Networks.

[12]  YED,et al.  SURVEY: DEALING NON-FUNCTIONAL REQUIREMENTS AT ARCHITECTURE LEVEL , 2016 .

[13]  Jinjun Chen,et al.  DPBSV -- An Efficient and Secure Scheme for Big Sensing Data Stream , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[14]  Fahim Arif,et al.  Fairness improvement in long chain multihop wireless ad hoc networks , 2013, 2013 International Conference on Connected Vehicles and Expo (ICCVE).

[15]  Fazlullah Khan,et al.  An Innovative Approach to Investigate Various Software Testing Techniques and Strategies , 2016 .

[16]  Xiangjian He,et al.  Energy Evaluation Model for an Improved Centralized Clustering Hierarchical Algorithm in WSN , 2013, WWIC.

[17]  Fazlullah Khan,et al.  Secure communication and routing architecture in wireless sensor networks , 2014, 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE).

[18]  Mian Ahmad Jan,et al.  Energy-efficient routing and secure communication in wireless sensor networks , 2016 .

[19]  Kenji Nakagawa,et al.  B-8-10 Cooperative Spectrum Sensing Techniques in Cognitive Radio Networks , 2012 .

[20]  Syed Roohullah Jan,et al.  Issues In Global Software Development (Communication, Coordination and Trust) - A Critical Review , 2016 .

[21]  Mian Ahmad Jan,et al.  A Survey of Cluster-based Hierarchical Routing Protocols , 2013 .

[22]  Hashim Ali,et al.  Enhanced and Effective Learning through Mobile Learning an Insight into Students Perception of Mobile Learning at University Level , 2016 .

[23]  Farman Ullah,et al.  Survey: Dealing Non-Functional Requirements at Architecture Level , 2016 .

[24]  Abdelkrim Haqiq,et al.  Secure Communication and Routing Architecture in Wireless Sensor Networks , 2014 .

[25]  Xiangjian He,et al.  Cryptography-based secure data storage and sharing using HEVC and public clouds , 2017, Inf. Sci..

[26]  Xiangjian He,et al.  Enhancing Lifetime and Quality of Data in Cluster-Based Hierarchical Routing Protocol for Wireless Sensor Network , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.

[27]  Shahzad Khan,et al.  Performance improvement in wireless sensor and actor networks based on actor repositioning , 2015, 2015 International Conference on Connected Vehicles and Expo (ICCVE).

[28]  Xiangjian He,et al.  A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[29]  Farman Ullah,et al.  A Survey: Embedded Systems Supporting By Different Operating Systems , 2016, ArXiv.

[30]  Anna-Lan Huang,et al.  Similarity Measures for Text Document Clustering , 2008 .

[31]  Jinjun Chen,et al.  A dynamic prime number based efficient security mechanism for big sensing data streams , 2017, J. Comput. Syst. Sci..

[32]  Kenji Nakagawa,et al.  Comparative study of spectrum sensing techniques in cognitive radio networks , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).