Privacy Enhanced Web Search Using MKSE in KNN

Authors

  • R Sumathi Department of Computer Science, STET Women’s College, Mannargudi
  • V Geetha Department of Computer Science, STET Women’s College, Mannargudi

Keywords:

Security Protection, Customized Web Search, Profile, Vector, Quantization

Abstract

Customized Web Look has established to make strides the quality of different look administrations on the Internet. Due to tremendous data opportunities in the internet, the security assurance is exceptionally critical to preserve customer look behaviors and their profiles. In the existing framework the summed up calculation specifically Covetous DP calculation were connected to secure private data’s in modified look engine. The existing frame lives up to expectations failed to resist successive and foundation information adversaries who has the broader foundation information such as richer relationship among topics. The proposed framework introduces vector that point again quantization approach piecewise on the datasets which segmented each column of datasets and that quantization approach is performed on each segment, utilizing the proposed approach which later is again united to structure a transformed data set. The proposed work is implemented and is analyzed utilizing certain parameters such as Precision, Recall, Frequency Measure, Distortion and Computational Delay.

References

I. F. Akyildiz, X. Wang, and W. Wang, “Wireless Mesh Networks: A Survey”, Computer Networks and ISDN Systems, Vol.47, Issue-2, 2005, pp.445-487.

I. F. Akyildiz, and X. Wang, “A Survey on Wireless Mesh Networks”, IEEE Radio Communications, Vol.43, Issue-3, 2005, pp.23-30.

M. Lee et al., “Emerging Standards for Wireless Mesh Technology”, IEEE Wireless Communications, Vol.13, Issue-4, 2006, pp.56-63.

N.B. Salem, and J-P Hubaux, “Securing Wireless Mesh Networks”, IEEE Wireless Communications, Vol.13, Issue-2, 2006, pp.50-55.

S. Han, E. Chang, L. Gao, T. Dillon, T., Taxonomy of Attacks on Wireless Sensor Networks, in the Proceedings of the 1st European Conference on Computer Network Defence (EC2ND), University of Glamorgan, UK, Springer Press, SpringerLink Date: December 2007.

C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks 1, 2003, pp. 293-315.

Y. Yang, Y. Gu, X. Tan and L. Ma, “A New Wireless Mesh Networks Authentication Scheme Based on Threshold Method,” 9th International Conference for Young Computer Scientists (ICYCS-2008), 2008, pp. 2260-2265

He Bai ; Ke Chen ; Gang Chen,” Supporting Privacy Protection in Personalized Web Search” Published in:Knowledge and Data Engineering, IEEE Transactions on (Volume:26 , Issue: 2 )Page(s):453 – 467, 2013

Wanying Ding ; Mengwen Liu ; Xiaoli Song more authors,” Scalable user intent mining using a multimodal Restricted Boltzmann Machine”. Published in:Computing, Networking and Communications (ICNC), 2015 International Conference of Date of Conference 16-19 Feb. 2015 Page(s):618 – 624.

Lina Zhou ; Dongsong Zhang,” An integrated method for hierarchy construction of domain-specific terms” Published in:Computer and Information Science (ICIS), 2014 IEEE/ACIS 13th International Conference onDate of Conference:4-6 June 2014 Page(s):485 – 490

Shekhar, S. ; Jalal, A.S.,” Semantic Based Image Retrieval using multi-agent model by searching and filtering replicated web images”. Published in:Information and Communication Technologies (WICT), 2012 World Congress ofDate of f Conference:Oct. 30 2012-Nov. 2 2012 Page(s):817 - 821

Downloads

Published

2025-11-10

How to Cite

[1]
R. Sumathi and V. Geetha, “Privacy Enhanced Web Search Using MKSE in KNN”, Int. J. Comp. Sci. Eng., vol. 3, no. 8, pp. 153–159, Nov. 2025.

Issue

Section

Review Article