SlideShare a Scribd company logo
1 of 7
Download to read offline
Implementation of Context Features using Context-
Aware Information Filters in OSN
A Venkateswarlu1
, B Sudhakar2
.
1
M.Tech , Dept. of CSE, Audisankara College of Engineering & Technology, Gudur, A.P, India.
2
Assoc Professor, Dept. of CSE, Audisankara College of Engineering & Technology, Gudur, A.P
Abstract – Information filtering has becoming a
key technology for current information systems.
The goal of information filter is to filter the
unwanted messages from user walls in online
social networks. In order to deal with huge
amount of messages, the information filtering is
very crucial. In the current system we study the
filter walls a rule-based information filtering
system in which we implement the filtered rules
and discuss the blacklist rules in online social
network such as facebook. But the current
system not considers the context features of a
message. To address this problem, in this paper
we propose context aware information Filtering
(CAIF) using the EAGER Algorithm.
Index terms – Information Filtering, Context-
aware information filtering, AGILE Algorithm,
indexing.
I. INTRODUCTION
Information filter systems manage continuous
streams of messages that must be routed
according to rules or so-called profiles. In order
to implement information filters, several
methods have been proposed in the past. The
focus of all that work was on the development of
scalable rule-based system for filtering system
which specifies the filtering rules to filter the
unwanted messages.
But these methods or filtered rules are inefficient
in identifying context updates of the message
and message routing. To address this problem,
this paper presents Context-aware Information
Filters (CAIF). In contrast to the current
information filters, a CAIF has two input
streams: (i) an order of messages that need to be
routed and (ii) a stream of context information
updates. This way, a CIF provides a undefined
solution to information delivery for the routing
of messages and to handle the context
information.
The problem of implementing Context-aware
Information Filters is that the two goals to route
messages and record context updates efficiently
are crucial. The current approaches to identifying
profiles are very efficient in routing messages,
but are inefficient when it comes to processing
context updates.
To close this gap, this paper presents AGILE.
AGILE is generic way to extend existing
structures in order to make them consistency to
context updates and achieve a huge amount of
message throughput at the same time.
282
INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
ISBN: 378 - 26 - 138420 - 5
www.iaetsd.in
A) Usecases for CAIF
To implement better understanding of what a
context is and what the benefits of a context-
ware information filter are a few usecases are as
follows:
Massage Broker with State
A message broker routes messages to a specific
application and location. Each message can
change the state of the receivers and affects
future routing decisions dynamically.
Generalized Location-Based Services
With an increased availability of mobile, yet
network-connected devices, the possibilities for
personalized information delivery have
multiplied. So far, those services mostly use very
little context information, such as the location of
the device. A more solution is to extend those
systems to a more elaborate context.
Stock Brokering
Financial information systems require sending
only the relevant market updates to specific
applications or brokers.
To sum up, some contexts have a high update
rate, others have a low update rate, but many
have varying, “bursty” update rates. All
examples involve a high message rate and a
large number of profiles.
Skipping updates in order to reduce update rates
has to be avoided because it leads to costly errors
in information filtering.
II. PROBLEM STATEMENT
The main issue for context-based information
filters can be summarized as follows: “Given a
large set of profiles, high message rates and
varying rates of context updates, provide the best
possible throughput of messages”. No message
must be dropped or sent to the wrong user
because a change in context has not yet been
considered by the filter. This constraint rules out
methods that update the context only
periodically. In the following, we define the
terms context, profile and message.
i) Context
A context is set of attributes associated with an
entity the values of those attributes can change at
varying rates.
Gathering context information is outside the
scope of this paper and has been addressed, e.g.,
in the work on sensor networks, data cooking,
context/sensor fusion, or the Berkeley HiFi
project.
ii) Messages
A message is a set of attributes associated to
values.
iii) Profiles
A profile is a continuous query specifying the
information interests of a subscriber.
Expressions in profiles can refer to a static
condition or a dynamic context. Static conditions
change relatively seldom, since they specify
abstract interests. In contrast, context
information can change frequently. We define
profiles as proposed in pub/sub-systems, using
the disjunctive normal form (DNF) of atomic
comparisons. This definition allows the use of
283
INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
ISBN: 378 - 26 - 138420 - 5
www.iaetsd.in
context information in profiles in multiple ways:
Message attributes can be compared with
constants and with context attributes. The latter
is the novel aspect of this work and a significant
extension to the way profiles are defined in
traditional pub/sub systems and information
filters. This extension enables easier modeling,
richer profiles and, as we will see, several
opportunities for optimization.
III. CONTEXT – AWARE INFORMATION FILTERS
This section introduces a processing model and
reference architecture for Context-Aware
Information Filters (CIF).
Fig. 1 Architecture of a CIF
a) CIF Processing Model
Figure 1 shows the processing of a CIF. The CIF
keeps profiles of subscribers and context
information. The CIF receives two input streams:
a message stream and a context update stream.
These two streams are serialized so that at each
point in time either one message or one update is
processed.
In order to deal with the two input streams, a CIF
must support the following methods:
1. Handle_message(Message m):
Find all profiles that match the message m,
considering the current state. Return this set of
profiles.
2. update_context(Context x, Attribute a, Value
v):
Set the attribute a of context c to the new value
v, i.e., c.a:=v. All profiles referencing this
context must consider this new value.
b) CIF Architecture
As shown also in Figure, a CIF has four main
components: (a) context management, (b)
indexes, (c) merge, (d) postifier. A similar
architecture without context management has
also been devised for information filters.
i) Context management
The first component manages context
information. It stores the values of static
attributes and values of context attributes which
are used in predicates of profiles. Any context
change is recorded by this component.
This component interacts heavily with indexes
and postfiltering, which both consume this
information. Both indexes and postfiltering
require values of constants and context attributes
in order to evaluate predicates of profiles for
incoming messages.
ii) Indexes
Given a message, the information filter must find
all profiles that match. This filtering can be
accelerated by indexing the profiles or predicates
of the profiles. The most important method
supported by an index is probe, which is invoked
by the CIF’s handle message method. Probe
takes a message as input and returns a set of
284
INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
ISBN: 378 - 26 - 138420 - 5
www.iaetsd.in
profiles that potentially match that message.
Furthermore, an index provides insert and delete
methods in order to register new profiles or
delete existing profiles.
iii) Merge
Profiles are conjunctions and disjunctions of
predicates. Since it is not efficient to use a high-
dimensional index to cover all conjunctions and
disjunctions, an individual index typically only
covers one type of predicate. Therefore, several
potential indexes are probed in order to process a
message.
Several optimization techniques for this merge
operation exist. One idea is to optimize the order
in which intersection and union operations are
applied. Another class of optimizations involves
the algorithms and data structures used to
implement the intersect and union operations.
iv) Postfilter
The last step of processing a message eliminates
false positives. This step is necessary if
inaccurate indexes are used or if the merge
operation does not involve all kinds of
predicates. The Postfilter operation takes a set of
profiles as input and checks which profiles
match the message by reevaluating the
predicates of the profiles based on the current
state of the context.
IV. ADAPTIVE INDEXING : AGILE
This section presents the AGILE (Adaptive
Generic Indexing with Local Escalations)
algorithm.
i) General Idea
The key idea of AGILE is to dynamically reduce
the accuracy and scope of an index if context
updates are frequent and to increase the accuracy
and scope of an index if context updates are
seldom and handle message calls are frequent.
This way, AGILE tries to act in the same way as
the NOINDEX approach for update context
operations and like the EAGER approach for
handle message operations, thereby combining
the advantages of both approaches. In order to do
so, AGILE generalizes techniques from
PARTIAL and GBU.
The operation to reduce the accuracy is called
escalation; it is triggered by context updates in
order to make future context updates cheaper.
The operation that increases the accuracy of an
index is called de-escalation; it is triggered by
handle message events in order to make future
message processing more efficient. Both
operations are carried out in the granularity of
individual index entries. This way, the index
remains accurate for profiles that are associated
with contexts that are rarely updated and the
index moves profiles that are associated with
contexts that are frequently updated out of scope.
As a result, AGILE only escalates and
deescalates as much as necessary and can get the
best level of accuracy for all profiles. AGILE is
generic and can be applied to any index
structure; in particular, it can be used for the
index structures devised specifically for
information filtering. It works particularly well
for hierarchical index structures.
285
INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
ISBN: 378 - 26 - 138420 - 5
www.iaetsd.in
Escalation
This operation is triggered by increasing the
stock of Warehouse by one; i.e., a context update
from two to three. Rather than carrying out an
insert and delete on the binary tree, the
escalation moves the Identifier up to the left set
of the parent node.
De-escalation
This operation is triggered if the handle message
operation is called several times for orders of,
say, three or four items and Warehouse A was
returned by the index as a potential candidate
and had to be filtered out by the Postfilter step. If
this happens, AGILE decides to deescalate the
index entry for Warehouse in order to improve
the performance of future calls to the handle
message operation.
ii) Properties of AGILE Indexes
The escalate and deescalate operations can be
implemented on any index structure, and thus
AGILE can be used to extend any index
structure for context-aware information filtering.
The insert and delete operations of an index are
not modified and are the same as in the basic
(non AGILE) version of the index. However,
AGILE allows efficient implementations of the
update operation that assigns a new value to an
identifier.
What are escalations and de-escalations in this
framework? Both operations re-assign a new set
of keys to an identifier. Escalations are carried
out as a result of update context operations in
order to make future calls to update context
cheaper. De-escalations are carried out as a
result of a handle message operation in order to
reduce the number of false positives for future
calls to handle message.
The advantages of AGILE are that it effectively
combines the advantages of the NOINDEX and
EAGER approaches in a fine-grained way. It can
deal with workloads in which certain contexts
are frequently updated by escalating the entries
for those contexts: in the extreme case to the root
of the data structure or even outside of the scope
of the index. Likewise, AGILE is suitable for
workloads in which context updates are seldom
and many messages need to be processed.
The basic idea of AGILE is not new. In some
sense, R-Trees and other indexes for spatial data
apply a similar approach. In R-Trees, identifiers
are associated with bounding boxes which can
also be interpreted as sets of keys.
The difference is that AGILE uses escalatations
and de-escalations in order to control the
accuracy of the index, whereas an R-Tree does
not adjust its accuracy depending on the
update/probe workload.
iii) AGILE Algorithm
Based on the escalate and deescalate operations,
we are now ready to present the algorithms for
the handle message and update context
operations. The algorithm for the handle
message operation is almost the same as the
algorithm for the EAGER approach. The only
difference is that a special implementation of the
Postfilter operation is used (Lines 2 to 9). If a
profile is detected to be a false positive (i.e., test
in Line 3 fails for one of the predicates of the
profile), then a DEpolicy function (Line 5)
286
INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
ISBN: 378 - 26 - 138420 - 5
www.iaetsd.in
determines whether to deescalate the index for
that profile. The function that tests the profile
(test) returns 0 if the profile matches the
message. If not, test returns a reference to the
index for the predicate that failed; this index
returned the profile as a false positive and
therefore is a candidate for de-escalation (Line
6). Since de-escalation is an expensive operation,
it is not necessarily a good idea to carry it out
whenever a false positive occurs.
The algorithm for update context is
straightforward. In the first step (Lines 2 to 5), it
checks whether an escalation is necessary. In the
second step (Line 6), the context is updated, just
as in every other CIF approach.
Function AGILE.handle message
Input: Message m
Output: Set of matching profiles RES
(1) RES := merge(AGILEindex[1].probe(m),...
AGILEindex[N].probe(m))
(2) forEach p in RES
(3) f := test(p, m)
(4) if (f > 0)
(5) RES := RES  {p}
(6) if (DEpolicy(p))
(7) AGILEindex[f].deescalate(p)
(8) endIf
(9) endIf
(10) EndFor
(11) return RES
Procedure AGILE.update context
Input: Context c, Attribute a, Value v
(1) For (i:=1 to Att)
(2) If (AGILEindex[i] indexes a ^
(c.a ∉	AGILEindex[i].probe(v))
(3) AGILEindex[i].escalate(c, v)
(4) EndIf
(5) EndFor
(6) DataStore[c].a := v;
CONCLUSION
Information filtering has matured to a key
information processing technology. Various
optimization techniques and index structures
have been proposed for various kinds of
applications, data formats and workloads. This
paper picked up this challenge by providing
simple extensions to existing index structures for
information filtering systems. We called this
approach AGILE for Adaptive Generic Indexing
with Local Escalations. The proposed extensions
are universal and can, in theory, be applied to
any index structure. The key idea is to adapt the
accuracy and scope of an index to the workload
of a context-aware information filter or more
generally, to information filtering and message
routing with state.
REFERENCES
[1] S. Abiteboul. Querying Semi-Structured
Data. In ICDT, 1997.
[2] N. Beckmann, H. Kriegel, R. Schneider, and
B. Seeger. The R*-Tree: An Efficient and
Robust Access Method for Points and
Rectangles. In SIGMOD, 1990.
[3] R. R. Brooks and S. Iyengar. Multi-Sensor
Fusion: Fundamentals and Applications in
Software. Prentice Hall, 1997.
287
INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
ISBN: 378 - 26 - 138420 - 5
www.iaetsd.in
[4] H.-J. Cho, J.-K. Min, and C.-W. Chung. An
Adaptive Indexing Technique Using Spatio-
Temporal Query Workloads. Information
and Software Technology, 46(4):229–241,
2004.
[5] O. Cooper, A. Edakkunni, M. J. Franklin, W.
Hong, S. R. Jeffery, S. Krishnamurthy, F.
Reiss, S. Rizvi, and E. Wu. HiFi: A Unified
Architecture for High Fan-in Systems. In
VLDB, 2004.
[6] A. K. Dey. Understanding and Using
Context. Personal and Ubiquitous
Computing Journal, 5(1):4–7, 2001.
[7] Y. Diao, M. Altinel, M. J. Franklin, H.
Zhang, and P. Fischer. Path Sharing and
Predicate Evaluation for High-Performance
XML Filtering. TODS, 28(4):467–516,
2003.
[8] P. T. Eugster, P. A. Felber, R. Guerraoui, and
A.-M. Kermarrec. The Many Faces of
Publish/Subscribe. ACM Comput. Surv.,
35(2):114–131, 2003.
[9] F. Fabret, H. A. Jacobsen, F. Llirbat, J.
Pereira, K. A. Ross, and D. Shasha. Filtering
Algorithms and Implementation for Very
Fast Publish/Subscribe Systems. In
SIGMOD, 2001.
288
INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
ISBN: 378 - 26 - 138420 - 5
www.iaetsd.in

More Related Content

What's hot

Usage and Research Challenges in the Area of Frequent Pattern in Data Mining
Usage and Research Challenges in the Area of Frequent Pattern in Data MiningUsage and Research Challenges in the Area of Frequent Pattern in Data Mining
Usage and Research Challenges in the Area of Frequent Pattern in Data MiningIOSR Journals
 
Emr a scalable graph based ranking model for content-based image retrieval
Emr a scalable graph based ranking model for content-based image retrievalEmr a scalable graph based ranking model for content-based image retrieval
Emr a scalable graph based ranking model for content-based image retrievalPvrtechnologies Nellore
 
Cross Domain Data Fusion
Cross Domain Data FusionCross Domain Data Fusion
Cross Domain Data FusionIRJET Journal
 
EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
EMR: A Scalable Graph-based Ranking Model for Content-based Image RetrievalEMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval1crore projects
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
A flexible phasor data concentrator design
A flexible phasor data concentrator designA flexible phasor data concentrator design
A flexible phasor data concentrator designsunder fou
 
Improvement from proof of concept into the production environment cater for...
Improvement from proof of concept into the production environment   cater for...Improvement from proof of concept into the production environment   cater for...
Improvement from proof of concept into the production environment cater for...Conference Papers
 
A Review on Text Mining in Data Mining
A Review on Text Mining in Data MiningA Review on Text Mining in Data Mining
A Review on Text Mining in Data Miningijsc
 
Comp8 unit7 lecture_slides
Comp8 unit7 lecture_slidesComp8 unit7 lecture_slides
Comp8 unit7 lecture_slidesCMDLMS
 
IRJET- Comparative Study of PCA, KPCA, KFA and LDA Algorithms for Face Re...
IRJET-  	  Comparative Study of PCA, KPCA, KFA and LDA Algorithms for Face Re...IRJET-  	  Comparative Study of PCA, KPCA, KFA and LDA Algorithms for Face Re...
IRJET- Comparative Study of PCA, KPCA, KFA and LDA Algorithms for Face Re...IRJET Journal
 
Visualization of Computer Forensics Analysis on Digital Evidence
Visualization of Computer Forensics Analysis on Digital EvidenceVisualization of Computer Forensics Analysis on Digital Evidence
Visualization of Computer Forensics Analysis on Digital EvidenceMuhd Mu'izuddin
 
A case study in computer
A case study in computerA case study in computer
A case study in computercsandit
 
Intrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor NetworksIntrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor Networksrahulmonikasharma
 
IRJET- On-AIR Based Information Retrieval System for Semi-Structure Data
IRJET-  	  On-AIR Based Information Retrieval System for Semi-Structure DataIRJET-  	  On-AIR Based Information Retrieval System for Semi-Structure Data
IRJET- On-AIR Based Information Retrieval System for Semi-Structure DataIRJET Journal
 
Re-enactment of Newspaper Articles
Re-enactment of Newspaper ArticlesRe-enactment of Newspaper Articles
Re-enactment of Newspaper ArticlesEditor IJCATR
 
XML Retrieval: A Survey
XML Retrieval: A SurveyXML Retrieval: A Survey
XML Retrieval: A Surveyijceronline
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

What's hot (20)

H1803014347
H1803014347H1803014347
H1803014347
 
MLHIM FHIES 2013
MLHIM FHIES 2013 MLHIM FHIES 2013
MLHIM FHIES 2013
 
Usage and Research Challenges in the Area of Frequent Pattern in Data Mining
Usage and Research Challenges in the Area of Frequent Pattern in Data MiningUsage and Research Challenges in the Area of Frequent Pattern in Data Mining
Usage and Research Challenges in the Area of Frequent Pattern in Data Mining
 
Emr a scalable graph based ranking model for content-based image retrieval
Emr a scalable graph based ranking model for content-based image retrievalEmr a scalable graph based ranking model for content-based image retrieval
Emr a scalable graph based ranking model for content-based image retrieval
 
Cross Domain Data Fusion
Cross Domain Data FusionCross Domain Data Fusion
Cross Domain Data Fusion
 
EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
EMR: A Scalable Graph-based Ranking Model for Content-based Image RetrievalEMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A flexible phasor data concentrator design
A flexible phasor data concentrator designA flexible phasor data concentrator design
A flexible phasor data concentrator design
 
Improvement from proof of concept into the production environment cater for...
Improvement from proof of concept into the production environment   cater for...Improvement from proof of concept into the production environment   cater for...
Improvement from proof of concept into the production environment cater for...
 
A Review on Text Mining in Data Mining
A Review on Text Mining in Data MiningA Review on Text Mining in Data Mining
A Review on Text Mining in Data Mining
 
Comp8 unit7 lecture_slides
Comp8 unit7 lecture_slidesComp8 unit7 lecture_slides
Comp8 unit7 lecture_slides
 
IRJET- Comparative Study of PCA, KPCA, KFA and LDA Algorithms for Face Re...
IRJET-  	  Comparative Study of PCA, KPCA, KFA and LDA Algorithms for Face Re...IRJET-  	  Comparative Study of PCA, KPCA, KFA and LDA Algorithms for Face Re...
IRJET- Comparative Study of PCA, KPCA, KFA and LDA Algorithms for Face Re...
 
Visualization of Computer Forensics Analysis on Digital Evidence
Visualization of Computer Forensics Analysis on Digital EvidenceVisualization of Computer Forensics Analysis on Digital Evidence
Visualization of Computer Forensics Analysis on Digital Evidence
 
Mca titles
Mca titlesMca titles
Mca titles
 
A case study in computer
A case study in computerA case study in computer
A case study in computer
 
Intrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor NetworksIntrusion detection with Parameterized Methods for Wireless Sensor Networks
Intrusion detection with Parameterized Methods for Wireless Sensor Networks
 
IRJET- On-AIR Based Information Retrieval System for Semi-Structure Data
IRJET-  	  On-AIR Based Information Retrieval System for Semi-Structure DataIRJET-  	  On-AIR Based Information Retrieval System for Semi-Structure Data
IRJET- On-AIR Based Information Retrieval System for Semi-Structure Data
 
Re-enactment of Newspaper Articles
Re-enactment of Newspaper ArticlesRe-enactment of Newspaper Articles
Re-enactment of Newspaper Articles
 
XML Retrieval: A Survey
XML Retrieval: A SurveyXML Retrieval: A Survey
XML Retrieval: A Survey
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 

Viewers also liked

Paradigmas educativos Diego Armijos
Paradigmas educativos Diego ArmijosParadigmas educativos Diego Armijos
Paradigmas educativos Diego ArmijosDieggGOO
 
여성용 비아그라 "EVO.OW.TO" 카톡:DDF11 여성용비아그라 구입,레비트라 정품처방방법,비아그라 구합니다,비아그라 50mg구입처,비...
여성용 비아그라 "EVO.OW.TO" 카톡:DDF11 여성용비아그라 구입,레비트라 정품처방방법,비아그라 구합니다,비아그라 50mg구입처,비...여성용 비아그라 "EVO.OW.TO" 카톡:DDF11 여성용비아그라 구입,레비트라 정품처방방법,비아그라 구합니다,비아그라 50mg구입처,비...
여성용 비아그라 "EVO.OW.TO" 카톡:DDF11 여성용비아그라 구입,레비트라 정품처방방법,비아그라 구합니다,비아그라 50mg구입처,비...kuuyr loot
 
EL CONOCIMIENTO Y LA CIENCIA
EL CONOCIMIENTO Y LA CIENCIAEL CONOCIMIENTO Y LA CIENCIA
EL CONOCIMIENTO Y LA CIENCIAJorge Villa
 
Greguerías 6º curso
Greguerías 6º cursoGreguerías 6º curso
Greguerías 6º cursoJaume Cesar
 
Mubarak Abdullah Murie CV doc.
Mubarak Abdullah Murie CV doc.Mubarak Abdullah Murie CV doc.
Mubarak Abdullah Murie CV doc.mubarak Murie
 
Iaetsd estimation of frequency for a single link-flexible
Iaetsd estimation of frequency for a single link-flexibleIaetsd estimation of frequency for a single link-flexible
Iaetsd estimation of frequency for a single link-flexibleIaetsd Iaetsd
 
정품시알리스 "EVO.OW.TO" 카톡:DDF11 정품 시알리스 구입,레비트라 정품처방방법,시알리스 판매,시알리스 구해요,시알리스 팔아요,...
정품시알리스 "EVO.OW.TO" 카톡:DDF11 정품 시알리스 구입,레비트라 정품처방방법,시알리스 판매,시알리스 구해요,시알리스 팔아요,...정품시알리스 "EVO.OW.TO" 카톡:DDF11 정품 시알리스 구입,레비트라 정품처방방법,시알리스 판매,시알리스 구해요,시알리스 팔아요,...
정품시알리스 "EVO.OW.TO" 카톡:DDF11 정품 시알리스 구입,레비트라 정품처방방법,시알리스 판매,시알리스 구해요,시알리스 팔아요,...kuuyr loot
 
El conocimiento y método científico UCE
El conocimiento y método científico UCEEl conocimiento y método científico UCE
El conocimiento y método científico UCEDieggGOO
 
L'EDAT MITJANA D'Izan,Adri,Hua Chuan,Luis,Vazgen,Shayaan
L'EDAT MITJANA D'Izan,Adri,Hua Chuan,Luis,Vazgen,ShayaanL'EDAT MITJANA D'Izan,Adri,Hua Chuan,Luis,Vazgen,Shayaan
L'EDAT MITJANA D'Izan,Adri,Hua Chuan,Luis,Vazgen,ShayaanDolors
 

Viewers also liked (14)

Paradigmas educativos Diego Armijos
Paradigmas educativos Diego ArmijosParadigmas educativos Diego Armijos
Paradigmas educativos Diego Armijos
 
여성용 비아그라 "EVO.OW.TO" 카톡:DDF11 여성용비아그라 구입,레비트라 정품처방방법,비아그라 구합니다,비아그라 50mg구입처,비...
여성용 비아그라 "EVO.OW.TO" 카톡:DDF11 여성용비아그라 구입,레비트라 정품처방방법,비아그라 구합니다,비아그라 50mg구입처,비...여성용 비아그라 "EVO.OW.TO" 카톡:DDF11 여성용비아그라 구입,레비트라 정품처방방법,비아그라 구합니다,비아그라 50mg구입처,비...
여성용 비아그라 "EVO.OW.TO" 카톡:DDF11 여성용비아그라 구입,레비트라 정품처방방법,비아그라 구합니다,비아그라 50mg구입처,비...
 
EL CONOCIMIENTO Y LA CIENCIA
EL CONOCIMIENTO Y LA CIENCIAEL CONOCIMIENTO Y LA CIENCIA
EL CONOCIMIENTO Y LA CIENCIA
 
Greguerías 6º curso
Greguerías 6º cursoGreguerías 6º curso
Greguerías 6º curso
 
Mubarak Abdullah Murie CV doc.
Mubarak Abdullah Murie CV doc.Mubarak Abdullah Murie CV doc.
Mubarak Abdullah Murie CV doc.
 
Iaetsd estimation of frequency for a single link-flexible
Iaetsd estimation of frequency for a single link-flexibleIaetsd estimation of frequency for a single link-flexible
Iaetsd estimation of frequency for a single link-flexible
 
정품시알리스 "EVO.OW.TO" 카톡:DDF11 정품 시알리스 구입,레비트라 정품처방방법,시알리스 판매,시알리스 구해요,시알리스 팔아요,...
정품시알리스 "EVO.OW.TO" 카톡:DDF11 정품 시알리스 구입,레비트라 정품처방방법,시알리스 판매,시알리스 구해요,시알리스 팔아요,...정품시알리스 "EVO.OW.TO" 카톡:DDF11 정품 시알리스 구입,레비트라 정품처방방법,시알리스 판매,시알리스 구해요,시알리스 팔아요,...
정품시알리스 "EVO.OW.TO" 카톡:DDF11 정품 시알리스 구입,레비트라 정품처방방법,시알리스 판매,시알리스 구해요,시알리스 팔아요,...
 
GP Isakymas del SVP_NCerniauskiene
GP Isakymas del SVP_NCerniauskieneGP Isakymas del SVP_NCerniauskiene
GP Isakymas del SVP_NCerniauskiene
 
Programacion nxt.8
Programacion nxt.8Programacion nxt.8
Programacion nxt.8
 
NC_Kvalifikaciju patvirtinimas MRU_2016
NC_Kvalifikaciju patvirtinimas MRU_2016NC_Kvalifikaciju patvirtinimas MRU_2016
NC_Kvalifikaciju patvirtinimas MRU_2016
 
D161 Final Plate
D161 Final PlateD161 Final Plate
D161 Final Plate
 
El conocimiento y método científico UCE
El conocimiento y método científico UCEEl conocimiento y método científico UCE
El conocimiento y método científico UCE
 
L'EDAT MITJANA D'Izan,Adri,Hua Chuan,Luis,Vazgen,Shayaan
L'EDAT MITJANA D'Izan,Adri,Hua Chuan,Luis,Vazgen,ShayaanL'EDAT MITJANA D'Izan,Adri,Hua Chuan,Luis,Vazgen,Shayaan
L'EDAT MITJANA D'Izan,Adri,Hua Chuan,Luis,Vazgen,Shayaan
 
Presentación Robert Gagne
Presentación Robert GagnePresentación Robert Gagne
Presentación Robert Gagne
 

Similar to Iaetsd implementation of context features using context-aware information filters in osn

IRJET- Towards Efficient Framework for Semantic Query Search Engine in Large-...
IRJET- Towards Efficient Framework for Semantic Query Search Engine in Large-...IRJET- Towards Efficient Framework for Semantic Query Search Engine in Large-...
IRJET- Towards Efficient Framework for Semantic Query Search Engine in Large-...IRJET Journal
 
IRJET- Determining Document Relevance using Keyword Extraction
IRJET-  	  Determining Document Relevance using Keyword ExtractionIRJET-  	  Determining Document Relevance using Keyword Extraction
IRJET- Determining Document Relevance using Keyword ExtractionIRJET Journal
 
Phenoflow: A Microservice Architecture for Portable Workflow-based Phenotype ...
Phenoflow: A Microservice Architecture for Portable Workflow-based Phenotype ...Phenoflow: A Microservice Architecture for Portable Workflow-based Phenotype ...
Phenoflow: A Microservice Architecture for Portable Workflow-based Phenotype ...Martin Chapman
 
Chapter 2 - Enterprise Application Integration.pdf
Chapter 2 - Enterprise Application Integration.pdfChapter 2 - Enterprise Application Integration.pdf
Chapter 2 - Enterprise Application Integration.pdfKhairul Anwar Sedek
 
BSA 385 Week 3 Individual Assignment Essay
BSA 385 Week 3 Individual Assignment EssayBSA 385 Week 3 Individual Assignment Essay
BSA 385 Week 3 Individual Assignment EssayTara Smith
 
Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...inventy
 
A Case Study of Innovation of an Information Communication System and Upgrade...
A Case Study of Innovation of an Information Communication System and Upgrade...A Case Study of Innovation of an Information Communication System and Upgrade...
A Case Study of Innovation of an Information Communication System and Upgrade...gerogepatton
 
Paper id 25201463
Paper id 25201463Paper id 25201463
Paper id 25201463IJRAT
 
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...IRJET Journal
 
Application-oriented ping-pong benchmarking: how to assess the real communica...
Application-oriented ping-pong benchmarking: how to assess the real communica...Application-oriented ping-pong benchmarking: how to assess the real communica...
Application-oriented ping-pong benchmarking: how to assess the real communica...Trieu Nguyen
 
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET Journal
 
A CASE STUDY OF INNOVATION OF AN INFORMATION COMMUNICATION SYSTEM AND UPGRADE...
A CASE STUDY OF INNOVATION OF AN INFORMATION COMMUNICATION SYSTEM AND UPGRADE...A CASE STUDY OF INNOVATION OF AN INFORMATION COMMUNICATION SYSTEM AND UPGRADE...
A CASE STUDY OF INNOVATION OF AN INFORMATION COMMUNICATION SYSTEM AND UPGRADE...ijaia
 
SDN Federation White Paper
SDN Federation White PaperSDN Federation White Paper
SDN Federation White PaperBrian Hedstrom
 
A Comparative Study of Forward and Reverse Engineering
A Comparative Study of Forward and Reverse EngineeringA Comparative Study of Forward and Reverse Engineering
A Comparative Study of Forward and Reverse Engineeringijsrd.com
 
IRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework EnvironmentIRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework EnvironmentIRJET Journal
 
Webhook Support for Alert Policies
Webhook Support for Alert PoliciesWebhook Support for Alert Policies
Webhook Support for Alert PoliciesIRJET Journal
 

Similar to Iaetsd implementation of context features using context-aware information filters in osn (20)

IRJET- Towards Efficient Framework for Semantic Query Search Engine in Large-...
IRJET- Towards Efficient Framework for Semantic Query Search Engine in Large-...IRJET- Towards Efficient Framework for Semantic Query Search Engine in Large-...
IRJET- Towards Efficient Framework for Semantic Query Search Engine in Large-...
 
IRJET- Determining Document Relevance using Keyword Extraction
IRJET-  	  Determining Document Relevance using Keyword ExtractionIRJET-  	  Determining Document Relevance using Keyword Extraction
IRJET- Determining Document Relevance using Keyword Extraction
 
Phenoflow: A Microservice Architecture for Portable Workflow-based Phenotype ...
Phenoflow: A Microservice Architecture for Portable Workflow-based Phenotype ...Phenoflow: A Microservice Architecture for Portable Workflow-based Phenotype ...
Phenoflow: A Microservice Architecture for Portable Workflow-based Phenotype ...
 
Chapter 2 - Enterprise Application Integration.pdf
Chapter 2 - Enterprise Application Integration.pdfChapter 2 - Enterprise Application Integration.pdf
Chapter 2 - Enterprise Application Integration.pdf
 
BSA 385 Week 3 Individual Assignment Essay
BSA 385 Week 3 Individual Assignment EssayBSA 385 Week 3 Individual Assignment Essay
BSA 385 Week 3 Individual Assignment Essay
 
Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...
 
Netkit
NetkitNetkit
Netkit
 
A Case Study of Innovation of an Information Communication System and Upgrade...
A Case Study of Innovation of an Information Communication System and Upgrade...A Case Study of Innovation of an Information Communication System and Upgrade...
A Case Study of Innovation of an Information Communication System and Upgrade...
 
Paper id 25201463
Paper id 25201463Paper id 25201463
Paper id 25201463
 
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...
 
Application-oriented ping-pong benchmarking: how to assess the real communica...
Application-oriented ping-pong benchmarking: how to assess the real communica...Application-oriented ping-pong benchmarking: how to assess the real communica...
Application-oriented ping-pong benchmarking: how to assess the real communica...
 
BigDataDebugging
BigDataDebuggingBigDataDebugging
BigDataDebugging
 
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
 
A CASE STUDY OF INNOVATION OF AN INFORMATION COMMUNICATION SYSTEM AND UPGRADE...
A CASE STUDY OF INNOVATION OF AN INFORMATION COMMUNICATION SYSTEM AND UPGRADE...A CASE STUDY OF INNOVATION OF AN INFORMATION COMMUNICATION SYSTEM AND UPGRADE...
A CASE STUDY OF INNOVATION OF AN INFORMATION COMMUNICATION SYSTEM AND UPGRADE...
 
SDN Federation White Paper
SDN Federation White PaperSDN Federation White Paper
SDN Federation White Paper
 
Is 4 th
Is 4 thIs 4 th
Is 4 th
 
A Comparative Study of Forward and Reverse Engineering
A Comparative Study of Forward and Reverse EngineeringA Comparative Study of Forward and Reverse Engineering
A Comparative Study of Forward and Reverse Engineering
 
IRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework EnvironmentIRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework Environment
 
Webhook Support for Alert Policies
Webhook Support for Alert PoliciesWebhook Support for Alert Policies
Webhook Support for Alert Policies
 
Only Abstract
Only AbstractOnly Abstract
Only Abstract
 

More from Iaetsd Iaetsd

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissionIaetsd Iaetsd
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdlIaetsd Iaetsd
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmIaetsd Iaetsd
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...Iaetsd Iaetsd
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatIaetsd Iaetsd
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationIaetsd Iaetsd
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSIaetsd Iaetsd
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...Iaetsd Iaetsd
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bikeIaetsd Iaetsd
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technologyIaetsd Iaetsd
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...Iaetsd Iaetsd
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdIaetsd Iaetsd
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid GrowthIaetsd Iaetsd
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT AlgorithmIaetsd Iaetsd
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...Iaetsd Iaetsd
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...Iaetsd Iaetsd
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesIaetsd Iaetsd
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesIaetsd Iaetsd
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolicIaetsd Iaetsd
 

More from Iaetsd Iaetsd (20)

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdl
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarm
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seat
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan application
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bike
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technology
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic bird
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolic
 

Recently uploaded

Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 

Recently uploaded (20)

Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 

Iaetsd implementation of context features using context-aware information filters in osn

  • 1. Implementation of Context Features using Context- Aware Information Filters in OSN A Venkateswarlu1 , B Sudhakar2 . 1 M.Tech , Dept. of CSE, Audisankara College of Engineering & Technology, Gudur, A.P, India. 2 Assoc Professor, Dept. of CSE, Audisankara College of Engineering & Technology, Gudur, A.P Abstract – Information filtering has becoming a key technology for current information systems. The goal of information filter is to filter the unwanted messages from user walls in online social networks. In order to deal with huge amount of messages, the information filtering is very crucial. In the current system we study the filter walls a rule-based information filtering system in which we implement the filtered rules and discuss the blacklist rules in online social network such as facebook. But the current system not considers the context features of a message. To address this problem, in this paper we propose context aware information Filtering (CAIF) using the EAGER Algorithm. Index terms – Information Filtering, Context- aware information filtering, AGILE Algorithm, indexing. I. INTRODUCTION Information filter systems manage continuous streams of messages that must be routed according to rules or so-called profiles. In order to implement information filters, several methods have been proposed in the past. The focus of all that work was on the development of scalable rule-based system for filtering system which specifies the filtering rules to filter the unwanted messages. But these methods or filtered rules are inefficient in identifying context updates of the message and message routing. To address this problem, this paper presents Context-aware Information Filters (CAIF). In contrast to the current information filters, a CAIF has two input streams: (i) an order of messages that need to be routed and (ii) a stream of context information updates. This way, a CIF provides a undefined solution to information delivery for the routing of messages and to handle the context information. The problem of implementing Context-aware Information Filters is that the two goals to route messages and record context updates efficiently are crucial. The current approaches to identifying profiles are very efficient in routing messages, but are inefficient when it comes to processing context updates. To close this gap, this paper presents AGILE. AGILE is generic way to extend existing structures in order to make them consistency to context updates and achieve a huge amount of message throughput at the same time. 282 INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT ISBN: 378 - 26 - 138420 - 5 www.iaetsd.in
  • 2. A) Usecases for CAIF To implement better understanding of what a context is and what the benefits of a context- ware information filter are a few usecases are as follows: Massage Broker with State A message broker routes messages to a specific application and location. Each message can change the state of the receivers and affects future routing decisions dynamically. Generalized Location-Based Services With an increased availability of mobile, yet network-connected devices, the possibilities for personalized information delivery have multiplied. So far, those services mostly use very little context information, such as the location of the device. A more solution is to extend those systems to a more elaborate context. Stock Brokering Financial information systems require sending only the relevant market updates to specific applications or brokers. To sum up, some contexts have a high update rate, others have a low update rate, but many have varying, “bursty” update rates. All examples involve a high message rate and a large number of profiles. Skipping updates in order to reduce update rates has to be avoided because it leads to costly errors in information filtering. II. PROBLEM STATEMENT The main issue for context-based information filters can be summarized as follows: “Given a large set of profiles, high message rates and varying rates of context updates, provide the best possible throughput of messages”. No message must be dropped or sent to the wrong user because a change in context has not yet been considered by the filter. This constraint rules out methods that update the context only periodically. In the following, we define the terms context, profile and message. i) Context A context is set of attributes associated with an entity the values of those attributes can change at varying rates. Gathering context information is outside the scope of this paper and has been addressed, e.g., in the work on sensor networks, data cooking, context/sensor fusion, or the Berkeley HiFi project. ii) Messages A message is a set of attributes associated to values. iii) Profiles A profile is a continuous query specifying the information interests of a subscriber. Expressions in profiles can refer to a static condition or a dynamic context. Static conditions change relatively seldom, since they specify abstract interests. In contrast, context information can change frequently. We define profiles as proposed in pub/sub-systems, using the disjunctive normal form (DNF) of atomic comparisons. This definition allows the use of 283 INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT ISBN: 378 - 26 - 138420 - 5 www.iaetsd.in
  • 3. context information in profiles in multiple ways: Message attributes can be compared with constants and with context attributes. The latter is the novel aspect of this work and a significant extension to the way profiles are defined in traditional pub/sub systems and information filters. This extension enables easier modeling, richer profiles and, as we will see, several opportunities for optimization. III. CONTEXT – AWARE INFORMATION FILTERS This section introduces a processing model and reference architecture for Context-Aware Information Filters (CIF). Fig. 1 Architecture of a CIF a) CIF Processing Model Figure 1 shows the processing of a CIF. The CIF keeps profiles of subscribers and context information. The CIF receives two input streams: a message stream and a context update stream. These two streams are serialized so that at each point in time either one message or one update is processed. In order to deal with the two input streams, a CIF must support the following methods: 1. Handle_message(Message m): Find all profiles that match the message m, considering the current state. Return this set of profiles. 2. update_context(Context x, Attribute a, Value v): Set the attribute a of context c to the new value v, i.e., c.a:=v. All profiles referencing this context must consider this new value. b) CIF Architecture As shown also in Figure, a CIF has four main components: (a) context management, (b) indexes, (c) merge, (d) postifier. A similar architecture without context management has also been devised for information filters. i) Context management The first component manages context information. It stores the values of static attributes and values of context attributes which are used in predicates of profiles. Any context change is recorded by this component. This component interacts heavily with indexes and postfiltering, which both consume this information. Both indexes and postfiltering require values of constants and context attributes in order to evaluate predicates of profiles for incoming messages. ii) Indexes Given a message, the information filter must find all profiles that match. This filtering can be accelerated by indexing the profiles or predicates of the profiles. The most important method supported by an index is probe, which is invoked by the CIF’s handle message method. Probe takes a message as input and returns a set of 284 INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT ISBN: 378 - 26 - 138420 - 5 www.iaetsd.in
  • 4. profiles that potentially match that message. Furthermore, an index provides insert and delete methods in order to register new profiles or delete existing profiles. iii) Merge Profiles are conjunctions and disjunctions of predicates. Since it is not efficient to use a high- dimensional index to cover all conjunctions and disjunctions, an individual index typically only covers one type of predicate. Therefore, several potential indexes are probed in order to process a message. Several optimization techniques for this merge operation exist. One idea is to optimize the order in which intersection and union operations are applied. Another class of optimizations involves the algorithms and data structures used to implement the intersect and union operations. iv) Postfilter The last step of processing a message eliminates false positives. This step is necessary if inaccurate indexes are used or if the merge operation does not involve all kinds of predicates. The Postfilter operation takes a set of profiles as input and checks which profiles match the message by reevaluating the predicates of the profiles based on the current state of the context. IV. ADAPTIVE INDEXING : AGILE This section presents the AGILE (Adaptive Generic Indexing with Local Escalations) algorithm. i) General Idea The key idea of AGILE is to dynamically reduce the accuracy and scope of an index if context updates are frequent and to increase the accuracy and scope of an index if context updates are seldom and handle message calls are frequent. This way, AGILE tries to act in the same way as the NOINDEX approach for update context operations and like the EAGER approach for handle message operations, thereby combining the advantages of both approaches. In order to do so, AGILE generalizes techniques from PARTIAL and GBU. The operation to reduce the accuracy is called escalation; it is triggered by context updates in order to make future context updates cheaper. The operation that increases the accuracy of an index is called de-escalation; it is triggered by handle message events in order to make future message processing more efficient. Both operations are carried out in the granularity of individual index entries. This way, the index remains accurate for profiles that are associated with contexts that are rarely updated and the index moves profiles that are associated with contexts that are frequently updated out of scope. As a result, AGILE only escalates and deescalates as much as necessary and can get the best level of accuracy for all profiles. AGILE is generic and can be applied to any index structure; in particular, it can be used for the index structures devised specifically for information filtering. It works particularly well for hierarchical index structures. 285 INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT ISBN: 378 - 26 - 138420 - 5 www.iaetsd.in
  • 5. Escalation This operation is triggered by increasing the stock of Warehouse by one; i.e., a context update from two to three. Rather than carrying out an insert and delete on the binary tree, the escalation moves the Identifier up to the left set of the parent node. De-escalation This operation is triggered if the handle message operation is called several times for orders of, say, three or four items and Warehouse A was returned by the index as a potential candidate and had to be filtered out by the Postfilter step. If this happens, AGILE decides to deescalate the index entry for Warehouse in order to improve the performance of future calls to the handle message operation. ii) Properties of AGILE Indexes The escalate and deescalate operations can be implemented on any index structure, and thus AGILE can be used to extend any index structure for context-aware information filtering. The insert and delete operations of an index are not modified and are the same as in the basic (non AGILE) version of the index. However, AGILE allows efficient implementations of the update operation that assigns a new value to an identifier. What are escalations and de-escalations in this framework? Both operations re-assign a new set of keys to an identifier. Escalations are carried out as a result of update context operations in order to make future calls to update context cheaper. De-escalations are carried out as a result of a handle message operation in order to reduce the number of false positives for future calls to handle message. The advantages of AGILE are that it effectively combines the advantages of the NOINDEX and EAGER approaches in a fine-grained way. It can deal with workloads in which certain contexts are frequently updated by escalating the entries for those contexts: in the extreme case to the root of the data structure or even outside of the scope of the index. Likewise, AGILE is suitable for workloads in which context updates are seldom and many messages need to be processed. The basic idea of AGILE is not new. In some sense, R-Trees and other indexes for spatial data apply a similar approach. In R-Trees, identifiers are associated with bounding boxes which can also be interpreted as sets of keys. The difference is that AGILE uses escalatations and de-escalations in order to control the accuracy of the index, whereas an R-Tree does not adjust its accuracy depending on the update/probe workload. iii) AGILE Algorithm Based on the escalate and deescalate operations, we are now ready to present the algorithms for the handle message and update context operations. The algorithm for the handle message operation is almost the same as the algorithm for the EAGER approach. The only difference is that a special implementation of the Postfilter operation is used (Lines 2 to 9). If a profile is detected to be a false positive (i.e., test in Line 3 fails for one of the predicates of the profile), then a DEpolicy function (Line 5) 286 INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT ISBN: 378 - 26 - 138420 - 5 www.iaetsd.in
  • 6. determines whether to deescalate the index for that profile. The function that tests the profile (test) returns 0 if the profile matches the message. If not, test returns a reference to the index for the predicate that failed; this index returned the profile as a false positive and therefore is a candidate for de-escalation (Line 6). Since de-escalation is an expensive operation, it is not necessarily a good idea to carry it out whenever a false positive occurs. The algorithm for update context is straightforward. In the first step (Lines 2 to 5), it checks whether an escalation is necessary. In the second step (Line 6), the context is updated, just as in every other CIF approach. Function AGILE.handle message Input: Message m Output: Set of matching profiles RES (1) RES := merge(AGILEindex[1].probe(m),... AGILEindex[N].probe(m)) (2) forEach p in RES (3) f := test(p, m) (4) if (f > 0) (5) RES := RES {p} (6) if (DEpolicy(p)) (7) AGILEindex[f].deescalate(p) (8) endIf (9) endIf (10) EndFor (11) return RES Procedure AGILE.update context Input: Context c, Attribute a, Value v (1) For (i:=1 to Att) (2) If (AGILEindex[i] indexes a ^ (c.a ∉ AGILEindex[i].probe(v)) (3) AGILEindex[i].escalate(c, v) (4) EndIf (5) EndFor (6) DataStore[c].a := v; CONCLUSION Information filtering has matured to a key information processing technology. Various optimization techniques and index structures have been proposed for various kinds of applications, data formats and workloads. This paper picked up this challenge by providing simple extensions to existing index structures for information filtering systems. We called this approach AGILE for Adaptive Generic Indexing with Local Escalations. The proposed extensions are universal and can, in theory, be applied to any index structure. The key idea is to adapt the accuracy and scope of an index to the workload of a context-aware information filter or more generally, to information filtering and message routing with state. REFERENCES [1] S. Abiteboul. Querying Semi-Structured Data. In ICDT, 1997. [2] N. Beckmann, H. Kriegel, R. Schneider, and B. Seeger. The R*-Tree: An Efficient and Robust Access Method for Points and Rectangles. In SIGMOD, 1990. [3] R. R. Brooks and S. Iyengar. Multi-Sensor Fusion: Fundamentals and Applications in Software. Prentice Hall, 1997. 287 INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT ISBN: 378 - 26 - 138420 - 5 www.iaetsd.in
  • 7. [4] H.-J. Cho, J.-K. Min, and C.-W. Chung. An Adaptive Indexing Technique Using Spatio- Temporal Query Workloads. Information and Software Technology, 46(4):229–241, 2004. [5] O. Cooper, A. Edakkunni, M. J. Franklin, W. Hong, S. R. Jeffery, S. Krishnamurthy, F. Reiss, S. Rizvi, and E. Wu. HiFi: A Unified Architecture for High Fan-in Systems. In VLDB, 2004. [6] A. K. Dey. Understanding and Using Context. Personal and Ubiquitous Computing Journal, 5(1):4–7, 2001. [7] Y. Diao, M. Altinel, M. J. Franklin, H. Zhang, and P. Fischer. Path Sharing and Predicate Evaluation for High-Performance XML Filtering. TODS, 28(4):467–516, 2003. [8] P. T. Eugster, P. A. Felber, R. Guerraoui, and A.-M. Kermarrec. The Many Faces of Publish/Subscribe. ACM Comput. Surv., 35(2):114–131, 2003. [9] F. Fabret, H. A. Jacobsen, F. Llirbat, J. Pereira, K. A. Ross, and D. Shasha. Filtering Algorithms and Implementation for Very Fast Publish/Subscribe Systems. In SIGMOD, 2001. 288 INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT ISBN: 378 - 26 - 138420 - 5 www.iaetsd.in