Privacy Enhanced Web Search Using MKSE in KNN
Keywords:
Security Protection, Customized Web Search, Profile, Vector, QuantizationAbstract
Customized Web Look has established to make strides the quality of different look administrations on the Internet. Due to tremendous data opportunities in the internet, the security assurance is exceptionally critical to preserve customer look behaviors and their profiles. In the existing framework the summed up calculation specifically Covetous DP calculation were connected to secure private data’s in modified look engine. The existing frame lives up to expectations failed to resist successive and foundation information adversaries who has the broader foundation information such as richer relationship among topics. The proposed framework introduces vector that point again quantization approach piecewise on the datasets which segmented each column of datasets and that quantization approach is performed on each segment, utilizing the proposed approach which later is again united to structure a transformed data set. The proposed work is implemented and is analyzed utilizing certain parameters such as Precision, Recall, Frequency Measure, Distortion and Computational Delay.
References
I. F. Akyildiz, X. Wang, and W. Wang, “Wireless Mesh Networks: A Survey”, Computer Networks and ISDN Systems, Vol.47, Issue-2, 2005, pp.445-487.
I. F. Akyildiz, and X. Wang, “A Survey on Wireless Mesh Networks”, IEEE Radio Communications, Vol.43, Issue-3, 2005, pp.23-30.
M. Lee et al., “Emerging Standards for Wireless Mesh Technology”, IEEE Wireless Communications, Vol.13, Issue-4, 2006, pp.56-63.
N.B. Salem, and J-P Hubaux, “Securing Wireless Mesh Networks”, IEEE Wireless Communications, Vol.13, Issue-2, 2006, pp.50-55.
S. Han, E. Chang, L. Gao, T. Dillon, T., Taxonomy of Attacks on Wireless Sensor Networks, in the Proceedings of the 1st European Conference on Computer Network Defence (EC2ND), University of Glamorgan, UK, Springer Press, SpringerLink Date: December 2007.
C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks 1, 2003, pp. 293-315.
Y. Yang, Y. Gu, X. Tan and L. Ma, “A New Wireless Mesh Networks Authentication Scheme Based on Threshold Method,” 9th International Conference for Young Computer Scientists (ICYCS-2008), 2008, pp. 2260-2265
He Bai ; Ke Chen ; Gang Chen,” Supporting Privacy Protection in Personalized Web Search” Published in:Knowledge and Data Engineering, IEEE Transactions on (Volume:26 , Issue: 2 )Page(s):453 – 467, 2013
Wanying Ding ; Mengwen Liu ; Xiaoli Song more authors,” Scalable user intent mining using a multimodal Restricted Boltzmann Machine”. Published in:Computing, Networking and Communications (ICNC), 2015 International Conference of Date of Conference 16-19 Feb. 2015 Page(s):618 – 624.
Lina Zhou ; Dongsong Zhang,” An integrated method for hierarchy construction of domain-specific terms” Published in:Computer and Information Science (ICIS), 2014 IEEE/ACIS 13th International Conference onDate of Conference:4-6 June 2014 Page(s):485 – 490
Shekhar, S. ; Jalal, A.S.,” Semantic Based Image Retrieval using multi-agent model by searching and filtering replicated web images”. Published in:Information and Communication Technologies (WICT), 2012 World Congress ofDate of f Conference:Oct. 30 2012-Nov. 2 2012 Page(s):817 - 821
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
