International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014

Organizing User Search Histories on User Precedence Based Search with Security

Pappula Praveen, S. Kalyani

Now, users are facing many complicated and complex task-oriented goals on the search engine. Those are managing finances, making travel arrangements or any other planning and purchases. To reduce this problem, usually break down the tasks into a few codependent steps and issuing multiple queries, and which store repeatedly over a long period of time, whatever the user can search in the search engine, that information search engines keep track of their queries and clicks while search in the search engine or online. In this paper we become skilled at the complexity of organizing users historical queries into in an active and expected manner. Automatic identifying query groups are compassionate for the number of different search engines, deals with applications. Those are query suggestions, result status, query alterations. In this we are proposing security for the related query groups. When we work in the single or any organization, security will provides the security for the users data or information in the search engine or any data base.

Keywords: Selective Jamming, Denial-of-Service, Wireless Networks, query reformulation, click graph, Packet Classification

Edition: Volume 3 Issue 9, September 2014

Pages: 1468 - 1471


How to Cite this Article?

Pappula Praveen, S. Kalyani, "Organizing User Search Histories on User Precedence Based Search with Security", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SEP14399, Volume 3 Issue 9, September 2014, 1468 - 1471

27 PDF Views | 27 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Selective Jamming'

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 6, June 2018

Pages: 1590 - 1594

A Detail Review of Jamming Attack Mitigation Techniques in Mobile Wireless Networks

Kalpana, Raj Kumar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1468 - 1471

Organizing User Search Histories on User Precedence Based Search with Security

Pappula Praveen, S. Kalyani

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 18 - 25

Selective Jamming Attacks Prevented By Packet-Hiding Methods

Sontam Sunil Kumar Reddy, K. Raghavendra Rao

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 324 - 328

Avoiding selective jam attack by packet hiding method in wireless sensor network

Dilip kumar D.P, H. Venugopal

Share this article



Similar Articles with Keyword 'Denial-of-Service'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 511 - 516

Graph-based Attack Detection in Cloud using KDD CUP 99 Dataset

Swapnali G. Game, S. B. Natikar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1317 - 1328

An Efficient Approach of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Shaik Shanawaz, K. Thyagarajan

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 873 - 876

Analysis of Password based Multi-server Authentication Schemes

Swati Nema, Anamika Soni

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2373 - 2377

A Review of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Trupti Dange, Pankaj Bhalerao

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1485 - 1487

NICE A: Implementation with Active Intrusion Detection System

Rasika R. Pawar, Mrunalinee Patole

Share this article



Similar Articles with Keyword 'Wireless Networks'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2591 - 2595

DASU: High Quality Video Streaming Over Multiple Wireless Access Network Using Real Time Adaptive Algorithm

Prathibha T P

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1743 - 1745

A Survey Paper on Wireless Transport Layer Security

Parmar Paresh B., Ketan Patel

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2118 - 2123

QoS Support for Cross-Layer Scheduling Algorithm in Wireless Networks

K. Raghavendra Rao, Vadipina Amarnadh

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANET's Routing Protocols

Sunita, Sunil Makkar

Share this article



Similar Articles with Keyword 'query reformulation'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2494 - 2497

A Survey on a New Approach for Improving Efficiency and Accuracy in String Transformation

Swapnali S. Maske, Prashant Jawalkar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1468 - 1471

Organizing User Search Histories on User Precedence Based Search with Security

Pappula Praveen, S. Kalyani

Share this article



Similar Articles with Keyword 'Packet Classification'

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 6, June 2018

Pages: 1590 - 1594

A Detail Review of Jamming Attack Mitigation Techniques in Mobile Wireless Networks

Kalpana, Raj Kumar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1113 - 1115

Survey of SDN based Packet Classification Techniques

Nilofar Landage, Dr. Tanuja Dhope

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1468 - 1471

Organizing User Search Histories on User Precedence Based Search with Security

Pappula Praveen, S. Kalyani

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 18 - 25

Selective Jamming Attacks Prevented By Packet-Hiding Methods

Sontam Sunil Kumar Reddy, K. Raghavendra Rao

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 1060 - 1063

A Survey Paper of Novel Approach towards Multidimensional Packet Classification

Priti Rathi, Prof. Ganesh Bandal

Share this article
Top