Downloads: 109 | Views: 321
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014 | Popularity: 6.9 / 10
Organizing User Search Histories on User Precedence Based Search with Security
Pappula Praveen, S. Kalyani
Abstract: Now, users are facing many complicated and complex task-oriented goals on the search engine. Those are managing finances, making travel arrangements or any other planning and purchases. To reduce this problem, usually break down the tasks into a few codependent steps and issuing multiple queries, and which store repeatedly over a long period of time, whatever the user can search in the search engine, that information search engines keep track of their queries and clicks while search in the search engine or online. In this paper we become skilled at the complexity of organizing users historical queries into in an active and expected manner. Automatic identifying query groups are compassionate for the number of different search engines, deals with applications. Those are query suggestions, result status, query alterations. In this we are proposing security for the related query groups. When we work in the single or any organization, security will provides the security for the users data or information in the search engine or any data base.
Keywords: Selective Jamming, Denial-of-Service, Wireless Networks, query reformulation, click graph, Packet Classification
Edition: Volume 3 Issue 9, September 2014
Pages: 1468 - 1471
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 107
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2494 - 2497A Survey on a New Approach for Improving Efficiency and Accuracy in String Transformation
Swapnali S. Maske, Prashant Jawalkar
Downloads: 113
Research Paper, Computer Science & Engineering, India, Volume 7 Issue 6, June 2018
Pages: 1590 - 1594A Detail Review of Jamming Attack Mitigation Techniques in Mobile Wireless Networks
Kalpana, Raj Kumar
Downloads: 116
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 18 - 25Selective Jamming Attacks Prevented By Packet-Hiding Methods
Sontam Sunil Kumar Reddy, K. Raghavendra Rao
Downloads: 125
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013
Pages: 324 - 328Avoiding selective jam attack by packet hiding method in wireless sensor network
Dilip kumar D.P, H. Venugopal