International Journal of P2P
Network Trends and Technology

Research Article | Open Access | Download PDF
Volume 3 | Issue 1 | Year 2013 | Article Id. IJPTT-V3I1P403 | DOI : https://doi.org/10.14445/22492615/IJPTT-V3I1P403

Efficient Patterns Using Hidden Web Trajectory Concept


K.Kavitha, Dr. E.Ramaraj

Citation :

K.Kavitha, Dr. E.Ramaraj, "Efficient Patterns Using Hidden Web Trajectory Concept," International Journal of P2P Network Trends and Technology (IJPTT), vol. 3, no. 1, pp. 7-11, 2013. Crossref, https://doi.org/10.14445/22492615/IJPTT-V3I1P403

Abstract

Previous Existing concepts of pattern discovery focus on background knowledge and ranking [1][2][5]. These kinds of patterns are not gives that any kind of benefits in business models. Background knowledge based patterns are contains some kinds of fake objects present it. That’s why these patterns are not show the quality. Previous existing patterns are random and rotate patterns in implementation process. Solving previous existing problems introduces the new continuous pattern with back ground and hidden web concepts. Continuous pattern works with GPS and intersection patterns [6][7]. These kinds of new patterns based results show accuracy in implementation process. This paper discusses about previous patterns to present patterns how privacy it can reaches the accuracy.

Keywords

GPS, Pattern Mining, Fake Objects, intersection patterns.

References

[1] Atzori, Francesco Bonchi, Fosca Giannotti, Dino Pedreschi.- Anonymity Preserving Pattern Discovery, Maurizio
[2] Longbing Cao, Li Lin, Chengqi Zhang -Domain Driven InDepth Pattern Discovery: A practical Methodology.
[3] Jimeng Sun Spiros Papadimitriou Christos Faloutsos - Distributed Pattern Discovery in Multiple Streams.
[4] R.Cooley, B. Mobasheer, J. Srinivastava - Web Mining: Information and pattern Discovery on the World Wide Web.
[5] Usama Fayyad, Gregory Piatetsky-Shapiro, and Padhraic Smyth - Knowledge Discovery and Data Mining in Databases.
[6] Despina Kopanaki, Nikos Pelekis, Aris Gkoulalas-Divanis, Marios Vodas Yannis Theodoridis - A Framework for Mobility Pattern Mining and Privacy-Aware Querying of Trajectory Data.
[7]
Dummy-Based Schemes for Protecting Movement Trajectories, www.iis.sinica.edu.tw/page/jise/2012/201203_06.html
[8] Quanquan Gu and Jiawei Han, Fosca Giannotti, Dino Pedreschi - Data Mining Research Group.
[9] Mobility, Data Mining and Privacy.
[10] Tun-Hao You Wen-Chih Peng Wang-Chien Lee, Protecting Moving Trajectories with Dummies.
[11] Fosca Giannotti, Mobility Data Analysis and Mining: Understanding Human Movement Patterns from Trajectory Data.
[12] Jae-Gil Lee, Jiawei Han Fellow Xiaolei Li, and Hong Mining Discriminative Patterns for Classifying Trajectories on Road Networks.