International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 109 | Views: 321

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014 | Popularity: 6.9 / 10


     

Organizing User Search Histories on User Precedence Based Search with Security

Pappula Praveen, S. Kalyani


Abstract: Now, users are facing many complicated and complex task-oriented goals on the search engine. Those are managing finances, making travel arrangements or any other planning and purchases. To reduce this problem, usually break down the tasks into a few codependent steps and issuing multiple queries, and which store repeatedly over a long period of time, whatever the user can search in the search engine, that information search engines keep track of their queries and clicks while search in the search engine or online. In this paper we become skilled at the complexity of organizing users historical queries into in an active and expected manner. Automatic identifying query groups are compassionate for the number of different search engines, deals with applications. Those are query suggestions, result status, query alterations. In this we are proposing security for the related query groups. When we work in the single or any organization, security will provides the security for the users data or information in the search engine or any data base.


Keywords: Selective Jamming, Denial-of-Service, Wireless Networks, query reformulation, click graph, Packet Classification


Edition: Volume 3 Issue 9, September 2014


Pages: 1468 - 1471



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Pappula Praveen, S. Kalyani, "Organizing User Search Histories on User Precedence Based Search with Security", International Journal of Science and Research (IJSR), Volume 3 Issue 9, September 2014, pp. 1468-1471, https://www.ijsr.net/getabstract.php?paperid=SEP14399

Similar Articles

Downloads: 107

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2494 - 2497

A Survey on a New Approach for Improving Efficiency and Accuracy in String Transformation

Swapnali S. Maske, Prashant Jawalkar

Share this Article

Downloads: 113

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 6, June 2018

Pages: 1590 - 1594

A Detail Review of Jamming Attack Mitigation Techniques in Mobile Wireless Networks

Kalpana, Raj Kumar

Share this Article

Downloads: 116

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 18 - 25

Selective Jamming Attacks Prevented By Packet-Hiding Methods

Sontam Sunil Kumar Reddy, K. Raghavendra Rao

Share this Article

Downloads: 125

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 324 - 328

Avoiding selective jam attack by packet hiding method in wireless sensor network

Dilip kumar D.P, H. Venugopal

Share this Article
Top