Open Access   Article Go Back

R.Sumathi and V.Geetha

Privacy Enhanced Web Search Using MKSE In KNN1

Section:Review Paper, Product Type: Journal Paper
Volume-3 , Issue-8 , Page no. 153-159, Aug-2015

Online published on Aug 31, 2015

Copyright © Privacy Enhanced Web Search Using MKSE In KNN . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Privacy Enhanced Web Search Using MKSE In KNN, “R.Sumathi and V.Geetha,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.153-159, 2015.

MLA Style Citation: Privacy Enhanced Web Search Using MKSE In KNN "R.Sumathi and V.Geetha." International Journal of Computer Sciences and Engineering 3.8 (2015): 153-159.

APA Style Citation: Privacy Enhanced Web Search Using MKSE In KNN, (2015). R.Sumathi and V.Geetha. International Journal of Computer Sciences and Engineering, 3(8), 153-159.

BibTex Style Citation:
@article{KNN_2015,
author = {Privacy Enhanced Web Search Using MKSE In KNN},
title = {R.Sumathi and V.Geetha},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2015},
volume = {3},
Issue = {8},
month = {8},
year = {2015},
issn = {2347-2693},
pages = {153-159},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=627},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=627
TI - R.Sumathi and V.Geetha
T2 - International Journal of Computer Sciences and Engineering
AU - Privacy Enhanced Web Search Using MKSE In KNN
PY - 2015
DA - 2015/08/31
PB - IJCSE, Indore, INDIA
SP - 153-159
IS - 8
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2315 2285 downloads 2379 downloads
  
  
           

Abstract

Customized Web Look has established to make strides the quality of different look administrations on the Internet. Due to tremendous data opportunities in the internet, the security assurance is exceptionally critical to preserve customer look behaviors and their profiles. In the existing framework the summed up calculation specifically Covetous DP calculation were connected to secure private data’s in modified look engine. The existing frame lives up to expectations failed to resist successive and foundation information adversaries who has the broader foundation information such as richer relationship among topics. The proposed framework introduces vector that point again quantization approach piecewise on the datasets which segmented each column of datasets and that quantization approach is performed on each segment, utilizing the proposed approach which later is again united to structure a transformed data set. The proposed work is implemented and is analyzed utilizing certain parameters such as Precision, Recall, Frequency Measure, Distortion and Computational Delay.

Key-Words / Index Term

Security Protection, Customized Web Search, Profile, Vector, Quantization

References

[1] I. F. Akyildiz, X. Wang, and W. Wang, “Wireless Mesh Networks: A Survey”, Computer Networks and ISDN Systems, Vol.47, Issue-2, 2005, pp.445-487.
[2] I. F. Akyildiz, and X. Wang, “A Survey on Wireless Mesh Networks”, IEEE Radio Communications, Vol.43, Issue-3, 2005, pp.23-30.
[3] M. Lee et al., “Emerging Standards for Wireless Mesh Technology”, IEEE Wireless Communications, Vol.13, Issue-4, 2006, pp.56-63.
[4] N.B. Salem, and J-P Hubaux, “Securing Wireless Mesh Networks”, IEEE Wireless Communications, Vol.13, Issue-2, 2006, pp.50-55.
[5] S. Han, E. Chang, L. Gao, T. Dillon, T., Taxonomy of Attacks on Wireless Sensor Networks, in the Proceedings of the 1st European Conference on Computer Network Defence (EC2ND), University of Glamorgan, UK, Springer Press, SpringerLink Date: December 2007.
[6] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks 1, 2003, pp. 293-315.
[7] Y. Yang, Y. Gu, X. Tan and L. Ma, “A New Wireless Mesh Networks Authentication Scheme Based on Threshold Method,” 9th International Conference for Young Computer Scientists (ICYCS-2008), 2008, pp. 2260-2265
[8] He Bai ; Ke Chen ; Gang Chen,” Supporting Privacy Protection in Personalized Web Search” Published in:Knowledge and Data Engineering, IEEE Transactions on (Volume:26 , Issue: 2 )Page(s):453 – 467.
[9] Wanying Ding ; Mengwen Liu ; Xiaoli Song more authors,” Scalable user intent mining using a multimodal Restricted Boltzmann Machine”. Published in:Computing, Networking and Communications (ICNC), 2015 International Conference of Date of Conference 16-19 Feb. 2015Page(s):618 – 624.
[10] Lina Zhou ; Dongsong Zhang,” An integrated method for hierarchy construction of domain-specific terms” Published in:Computer and Information Science (ICIS), 2014 IEEE/ACIS 13th International Conference onDate of Conference:4-6 June 2014Page(s):485 – 490
[11] Shekhar, S. ; Jalal, A.S.,” Semantic Based Image Retrieval using multi-agent model by searching and filtering replicated web images”. Published in:Information and Communication Technologies (WICT), 2012 World Congress ofDate of f Conference:Oct. 30 2012-Nov. 2 2012Page(s):817 - 821