A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Suganya, R.
- Supporting Privacy Protection in Personalized Web Search - A Survey
Authors
1 Department of Information Technology, Sri Krishna College of Engineering and Technology, Kuniamuthur, Coimbatore, IN
Source
Indian Journal of Innovations and Developments, Vol 3, No 3 (2014), Pagination: 45-49Abstract
Objectives: This survey investigates the several privacy preserving techniques and provides the idea about the new efficient method in the future. The main goal of this work is to assure the privacy guarantee to the user who is involved in the personalized web search. To do this several mechanism which is related to the privacy protection is investigated.
Methods: In this manuscript, a survey has been done on the several privacy preserving mechanism that has been used to assure a users privacy guarantee and as well as accurate retrieval. Among the different methodologies that are discussed, it has been found that UPS framework is one of the efficient techniques which guarantees the user privacy and retrieves the contents as per user requirement accurately.
Results: This survey expansively studies the problems in the privacy preserving mechanism in the personalized web search environment. The performance of the various methods is evaluated with numerous parameters like accuracy, failure rate and the privacy assurance. The survey analysis conducted were proves that.
Conclusion: the UPS framework is one of the efficient methodology which aims to retrieve the user wanted contents with the assurance of privacy guarantee.
Keywords
Personalization, Utility, Privacy Protection, Runtime Generalization.- Consuming Webservices and Caching their Responses for Mobile Devices in MANET
Authors
1 Pervasive Computing Technologies, Anna University of Technology, Tiruchirappalli, TamilNadu, IN
2 Centre for Convergence of Technologies, Anna University of Technology, Tiruchirappalli, TamilNadu, IN
Source
Wireless Communication, Vol 2, No 6 (2010), Pagination:Abstract
In ad hoc networks, most researches focus on routing, and not much work has been done on data access. The basic function of Web services is standardizing of how services expose their data and interface, method of discovery of reliable interaction and applicative environment with them. Mobile computing devices can invoke web service methods to gain access to desired data like location information, currency exchange rates etc. This paper focuses on the challenges of mobile devices consuming Web Services and caching their responses in MANET environment and introduces a caching framework to overcome problems arising from temporarily loss of connectivity and fluctuations in bandwidth.
Keywords
Web Services, Caching, Mobile Adhoc Network, Data Searching.- Data Mining Concepts and Techniques
Authors
1 Department of Computer Science, Dr. SNS Rajalakshmi College of Arts and Science, Coimbatore, IN
2 Department of Computer Science, Dr. SNS Rajalakshmi College of Arts and Science, Coimbatore
Source
Data Mining and Knowledge Engineering, Vol 2, No 9 (2010), Pagination: 256-263Abstract
Understand the need for analyses of large, complex, information-rich data sets.
- Identify the goals and primary tasks of the data-mining process.
- Describe the ischolar_mains of data-mining technology.
- Recognize the iterative character of a data-mining process and specify its basic steps.
- Explain the influence of data quality on a data-mining process.
- Establish the relation between data warehousing and data mining.
Data mining is an iterative process within which progress is defined by discovery, through either automatic or manual methods. Data mining is most useful in an exploratory analysis scenario in which there are no predetermined notions about what will constitute an "interesting" outcome. Data mining is the search for new, valuable, and nontrivial information in large volumes of data. It is a cooperative effort of humans and computers. Best results are achieved by balancing the knowledge of human experts in describing problems and goals with the search capabilities of computers.
In practice, the two primary goals of data mining tend to be prediction and description. Prediction involves using some variables or fields in the data set to predict unknown or future values of other variables of interest. Description, on the other hand, focuses on finding patterns describing the data that can be interpreted by humans. Therefore, it is possible to put data-mining activities into one of two categories:
- Predictive data mining, which produces the model of the system described by the given data set, or
- Descriptive data mining, which produces new, nontrivial information based on the available data set.
Keywords
Data Mining, Prediction and Decision-Support.- GSIS: A Secure and Timed-Efficient Stream Loss-Tolerant Authentication Protocol For Vehicular Communications
Authors
1 Department of Computer Science, Karpagam University, Coimbatore, IN
2 Department of Computer Science, Tamil University, Thanjavur, IN
Source
International Journal of Advanced Networking and Applications, Vol 5, No 1 (2013), Pagination: 1837-1841Abstract
In this paper, we first identify some unique design requirements in the aspects of security and TESLA for communication between different communication devices in vehicular ad hoc networks. We propose a Time-Efficient stream Loss -Tolerant Authentication broadcast authentication protocol based on Group signature and Identify (ID) based signature techniques. We demonstrate that the proposed protocol as an efficient protocol with communication and computation overhead, which scales to large number of receiver, and tolerate packet loss. TESLA protocol guarantee the requirements of security can provide the desired traceability of each vehicle in the case where the ID of the message sender has to be receiver by the authority of any dispute event Extensive simulation is conducted to verify the efficiency, effectiveness and applicability of the proposed protocol in various application scenarios under different road systems.Keywords
ID – Based Signature, TESLA, and Vehicular Communication.- OTP Generation for ATM Theft Protection
Authors
Source
International Journal of Innovative Research and Development, Vol 3, No 6 (2014), Pagination:Abstract
Anself-governing ATM host has a right to use any bank. There is no security layer is implemented in the ATM card except pin number. It is very costly for the bank to include the fingerprint and Iris scanner. In this paper, we monitor the location of the ATM usage, time taken for the user to accessing the ATM machine, sequence of events processed by the user and expected amount of withdrawal by the user. All these four factors are verified for the authentication purpose of the user along with password. If any of the above said, parameter are differing and then the One Time Password is generated to the User’s Mobile number for further more secure authentication system. In the modification phase, an automation user Internet recognition model is designed to enhance the user comfort and detection of the time span spend by the user in the ATM machine. If due to signal problem of the mobile One Time Password will not be received in that cause secret process is used to private ATM users.
Keywords
ATM, Transaction, Identity theft, One Time Password, Secret process- Effective Mechanism of Graduate Attributes distribution in Engineering Education Curriculum
Authors
1 Department of Information Technology, King Abdulaziz University, Jeddah, SA
2 Department of Information Technology, Thiagarajar College of Engineering, Madurai, Tamil Nadu, IN
3 Head and Registrar (Academics), Department of ECE, Thiagarajar College of Engineering, Madurai, Tamil Nadu, IN