Profile Based Personalized Web Search and Download Blocker

Size: px
Start display at page:

Download "Profile Based Personalized Web Search and Download Blocker"

Transcription

1 Profile Based Personalized Web Search and Download Blocker 1 K.Sheeba, 2 G.Kalaiarasi Dhanalakshmi Srinivasan College of Engineering and Technology, Mamallapuram, Chennai, Tamil nadu, India Abstract - The Personalized Web Search (PWS) is different from the normal web search. Profile based Personalized Web Search(PBPWS) provides different results to the different users even though they give same query based on the user profile. It provides relevant results to each user based on the user intention. Ranking is done for each user according to their search interest in the profile. The content based recommendation algorithm is used for profile ranking. To know the user intention it creates two stages of profile for the user. In offline stage it collects the basic information from the user. In online stage the profile is updated by the queries given by user during their search. These two stages of profiles are collectively called as profile generator. The PBPWS also allows the user to save the bytes needed to re-download the file unknowingly which was already downloaded by the user by tracking the downloaded file. Keywords - Profile ranking, Content based recommendation algorithm, Profile generator. I. INTRODUCTION Data mining technology is used for identifying the relevant data from the large amount of data set. It is an analytic process designed to explore data in systematic relationships between variables and in search consistent pattern and then to validate the findings by applying the detected pattern to the new subsets of data. Prediction is the ultimate goal of data mining. The most common types of data mining is the Predictive data mining and one that has the most direct business applications. The most commonly used techniques in data mining are decision trees, artificial neural networks and the nearest neighbor method. Each of these techniques analyses data in different ways. Profile ranking method is used to rank the pages based on the user profile. The user profile contains basic information about the user and the user s search interest. Content based recommendation algorithm is a technique to retrieve the relevant results related to each user intention. This algorithm recommends the relevant results to user based on the contents of the profile and the keyword mentioned in the user query. Profile generator is used to create the profile for each user. There are two stages in profile generation such as online and offline. II. RELATED WORKS Personalized information retrieval and search promises to improve the internet search experience. An important requirement for building personalized web applications is to build user profiles that represent the user s interests[3]. The user has to provide Personal information and preferences, in addition to the query, to the web service to receive personalized web services. The sender of sensitive queries can be identified by the personal information that compromise user privacy[2]. To improve retrieval performance Long-term search history contains rich information about a user s search preferences, which can be used as search context [7]. Personalization is consistently effective on different queries for different users, and under different search contexts. It provides a large-scale evaluation framework for personalized search based on query logs, and then evaluate personalized search strategies[5]. The search engine uses user profiles, descriptions of user interests, to provide personalized search results. Creating user profiles capture user information through proxy servers (to capture browsing histories) or desktop bots (to capture all activities on a personal computer). These both require participation of the user to install the proxy server or the bot. It builds user profiles based on activity at the search site itself and study the use of these profiles to provide personalized search results[10]. A personalized web search is a promising way to improve search quality by customizing search results for people with individual information goals and present a scalable way for users to automatically build rich user profiles. User s interests can be summarized into a hierarchical organization according to specific interests by these profiles. For specifying privacy requirements two parameters are proposed to help the user to choose the content and degree of detail of the profile information that is exposed to the search engine[4]. It uses techniques that leverage implicit information about the user s interests. These information about the user interest helps to re rank web search results within a relevance feedback framework. It explores rich models of user interests, such as previously visited web pages 10

2 and previously issued queries from both search related information and other information such as documents and the user has read and created[8]. Personalized search has got significant attention recently in the web search community to address this challenge based on the premise that a user s general preference may help the search engine disambiguate the true intention of a query[6]. Several context sensitive retrieval algorithms based on statistical language models to combine the preceding queries and clicked document summaries with the current query for better ranking of documents and the Implicit feedback is shown by the experiment results, especially the clicked document summaries can improve retrieval performance[9]. Personalized web search (PWS) has demonstrated its effectiveness in improving the quality of various search services on the Internet. However, evidences show that user s reluctance to disclose their private information during search has become a major barrier for the wide proliferation of PWS[2]. III. PROPOSED WORK The proposed Profile based personalized web search improves the quality of search over the internet. It generates profile based on two aspects. i. Collecting requirements from the user. ii. Queries given by the user. It provides result relevant to user by comparing these aspects. If two users having different search intention gives query to the server then the server gives relevant results suitable to each user intention. To know the user intention it creates two stages of profile for the user. In offline stage it collects the basic information from the user. In online stage the profile is updated by the queries given by user during their search. Then the sever analysis these two aspects of profile and provide better results to each user. The content based recommendation algorithm is used for this purpose. This profile method is adapted for both image search and content search separately. The Personalized Web Search (PWS) is different from the normal web search. The user query is forwarded along with the user profile to the server for better results. Each user has a separate login to view their own profile. Profile generator creates the user profile according to the user s search and preferences given by the user. After creating the profile the system maps the profile with the query given by the user to know the preference of the user. Thereby the system provides better results to each user by tracking their intention. Ranking is done for each user according to their search interest in the profile. The user can take the online decision whether to update the query to the profile. The profile is updated frequently by the user requirements and queries given by the users. The profile is only visible to the user. Profile based Personalized Web Search provides different results to the different users even though they give same query. It provides relevant results to each user based on the user intention. The user can separate their own profile history for web search and image search. Download blocker is a mechanism which helps to save the wastage of bytes when re-downloading the same file by the user unknowingly. Fig. 1. Profile Based Personalized Web Search A. Profile Based Personalization To personalize digital content based on user profile information. For this purpose two main mechanisms are used : a profile generator that automatically creates user profiles representing the user preferences, and a contentbased recommendation algorithm that estimates the user's interest in unknown content by matching their profile to meta data descriptions of the content. The personalization system integrates both features. When the user gives query the personalization method add that query to their own profile if it is not already added. The query is added to the user interest section in the profile. The profile can also be generated by the explicit requirements given by the user at the registration time. The user can delete or update their explicit requirements according to their need and wish. The user can also delete the query saved in the profile. Therefore the profile generation method in this system is totally developed in user friendly manner. This modification allows user to update their own profile without the help of server. Therefore the user can update their profile with their preferences. The processing time needed to retrieve a result is less in PWS. 11

3 Fig. 2. Personalization Method Fig.3.CBR Algorithm B. Generalizing User Profile The generalization process has to meet specific prerequisites to handle the user profile. This is achieved by pre-processing the user profile. Firstly, the system initializes the user profile by taking the indicated parent user profile into account. The process adds the inherited properties to the properties of the local user profile. Then the system loads the data in the foreground and the background for mapping according to the described selection in the user profile. Additionally, the usage of references enables caching and is helpful when considering an implementation in a production environment. The references to the user profile act as an identifier for identifying already processed user profiles. It allows to customize the process once and it can reuses the result multiple times. The update of the user profile based on the user search and preference are also propagated into the generalization process. It requires specific update strategies, which is used to check after a specific timeout or a specific event and notify if the user profile has not changed yet. The generalization process involves remote data services, which might be updated frequently. Mapping profile with user queries allows user to get their results back quickly. The mapping process is performed by the system for each and every query submitted by the user to server. C. Profile based search A PWS framework called Un-interruptible Power Supply (UPS) that can generalize profiles for each query according to user-specified requirements and perform search based on the keywords in the user profile. The profile is only visible to the user. Each user has a login to view their profile. Updation and search process is also done through their login only. The results provided by the profile based search method is different from the existing search engine results. The search engine provides same result for the same query given by different users having different needs. It didn t analyze the intention and need of the user search but the Personalized Web Search (PWS) identifies the individual user intention by analyzing the user profile. It provides relevant result by profile ranking method. Normal search engine rank the web page based on the query given by the user. The PWS ranks the web page based on the profile of each individual user. Therefore it satisfies the user intention by analyzing the user interest in the user profile. It gives individual result to individual user giving same query with different intention. The normal web search gives same result to the query given by different users having different search intention. q1 - query. r1,r2,r3 - result. PWS - Personalized web search. D. Online Decision Fig.4. Process of profile based search An online decision mechanism is to decide whether to personalize a query or not. The basic idea is straight forward. The system categorize the query as two types such as profiled query and distinct query. 12

4 Fig.5. Online Decision Mechanism If a given query is already in profile then the server gives the result by taking less processing time. During generalization process if a distinct query is identified, the entire runtime profiling will be aborted and the query will be sent to the server without a user profile. If the user wants to update the profile with a different query then the result will be based on profile for further search. The ranking of web page is done for each user and it totally depends on two things such as user query and user profile. E. Download Blocker It helps to save the wastage of bytes when redownloading the same file unknowingly. It blocks that download by comparing three major factors of the file such as file name, file size, address location of the file. If these three factors of new file coincide with the existing downloaded file. The system will check and show where the file located or saved by the user and notifies the user about file existence which helps the user to save their bytes. It is more beneficial when the file size is greater. Fig.6. Download Blocker V. CONCLUSION This profile based Personalized Web Search (PWS) improves the quality of search over the internet. It analyze the background of each user to produce relevant results to them. The relevant results are produced by mapping user profile with the query. It provides different results to different users giving the same query by analyzing user intention The time taken to response the query is comparatively low. Ranking is done for each user according to their search interest. This profile based method provides better results when compared to all other previous methods of Personalized Web Search (PWS). VI. FUTURE WORK For future work we will try to provide privacy to the user search by encrypting the user profile. Therefore the user can maintain their profile secretly and avoid personal information leakage. REFFERENCES [1] Dou.Z, Song.R, and Wen.J.R.,(2007) A Large Scale Evaluation and Analysis of Personalized Search Strategies, Proc.Int 1 World Wide Web(WWW),pp [2] Lidan Shou,He Bai,Ke Chen and Gang Chen,(2014) Supporting Privacy Protection in Personalized Web Search, IEEE Transactions on knowledge and Data Engineering, Vol. 26,No. 2. [3] Qiu.F and Cho.J, (2006) Automatic Identification of User Interest for Personalized Search, Proc.15th Int l Conf. World Wide Web (WWW), pp [4] Ramanathan.K,Giraudi.J and Gupta.A, (2008) Creating Hierarchical User Profiles Using Wikipedia, HP Labs. [5] Shen.X, Tan.B and Zhai.C (2005) Context Sensitive Information Retrieval Using Implicit Feedback, Proc. 28th Ann. Intl ACM SIGIR Conf. Research and Development of Information Retrieval (SIGIR). [6] Spertta.M and Gach.S, (2005) Personalizing Search Based on User Search Histories, Proc.IEEE/WIC/ IACM Int l Conf. Web Intelligence (WI). [7] Sugiyama.K, Hatano.K, and Yoshikawa.M, (2004) Adaptive Web Searches Based on the User Profile Constructed without Any Effort from Users, Proc. 13th Int l Conf. World Wide Web (WWW). [8] Tan.B, Shen.X, and Zhai.C, (2006) Mining Long- Term Search History to Improve Search Accuracy,,Proc. ACM SIGKDD Int l Conf. Knowledge Discovery and Data Mining (KDD). 13

5 [9] Teevan.J, Dumais.S.T, and E. Horvitz, (2005), Personalizing Search via Automated Analysis of Interests and Activities, Proc.28th Ann.Int l ACM SIGIR Conf. Research and Development in Information Retrieval (SIGIR), pp [10] Xu.Y, Wang.K, Yang.G, and Fu.A.W.C., (2009) Online Anonymity for Personalized Web Services, Proc.18th ACM Conf. Information and Knowledge Management (CIKM), pp [11] Xu.Y, Wang.K, Zhang.B, and Chen.Z, (2007) Privacy Enhancing Personalized Web Search, Proc. 16th Int l Conf. World Wide Web(WWW) pp

A UPS Framework for Providing Privacy Protection in Personalized Web Search

A UPS Framework for Providing Privacy Protection in Personalized Web Search A UPS Framework for Providing Privacy Protection in Personalized Web Search V. Sai kumar 1, P.N.V.S. Pavan Kumar 2 PG Scholar, Dept. of CSE, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh,

More information

International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.

International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer. REVIEW ARTICLE ISSN: 2321-7758 UPS EFFICIENT SEARCH ENGINE BASED ON WEB-SNIPPET HIERARCHICAL CLUSTERING MS.MANISHA DESHMUKH, PROF. UMESH KULKARNI Department of Computer Engineering, ARMIET, Department

More information

Personalization of Web Search With Protected Privacy

Personalization of Web Search With Protected Privacy Personalization of Web Search With Protected Privacy S.S DIVYA, R.RUBINI,P.EZHIL Final year, Information Technology,KarpagaVinayaga College Engineering and Technology, Kanchipuram [D.t] Final year, Information

More information

Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior

Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior N.Jagatheshwaran 1 R.Menaka 2 1 Final B.Tech (IT), jagatheshwaran.n@gmail.com, Velalar College of Engineering and Technology,

More information

Supporting Privacy Protection in Personalized Web Search

Supporting Privacy Protection in Personalized Web Search Supporting Privacy Protection in Personalized Web Search Kamatam Amala P.G. Scholar (M. Tech), Department of CSE, Srinivasa Institute of Technology & Sciences, Ukkayapalli, Kadapa, Andhra Pradesh. ABSTRACT:

More information

LDA Based Security in Personalized Web Search

LDA Based Security in Personalized Web Search LDA Based Security in Personalized Web Search R. Dhivya 1 / PG Scholar, B. Vinodhini 2 /Assistant Professor, S. Karthik 3 /Prof & Dean Department of Computer Science & Engineering SNS College of Technology

More information

Privacy Protection in Personalized Web Search- A Survey

Privacy Protection in Personalized Web Search- A Survey Privacy Protection in Personalized Web Search- A Survey Greeshma A S. * Lekshmy P. L. M.Tech Student Assistant Professor Dept. of CSE & Kerala University Dept. of CSE & Kerala University Thiruvananthapuram

More information

SUSTAINING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH WITH TEMPORAL BEHAVIOR

SUSTAINING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH WITH TEMPORAL BEHAVIOR International Journal of Latest Research in Science and Technology Volume 4, Issue 5: Page No.73-77, September-October 2015 http://www.mnkjournals.com/ijlrst.htm ISSN (Online):2278-5299 SUSTAINING PRIVACY

More information

Advances in Natural and Applied Sciences

Advances in Natural and Applied Sciences AENSI Journals Advances in Natural and Applied Sciences ISSN:1995-0772 EISSN: 1998-1090 Journal home page: www.aensiweb.com/anas Privacy Protection in Personalized Web Search 1 M. Abinaya and 2 D. Vijay

More information

REVIEW ON QUERY CLUSTERING ALGORITHMS FOR SEARCH ENGINE OPTIMIZATION

REVIEW ON QUERY CLUSTERING ALGORITHMS FOR SEARCH ENGINE OPTIMIZATION Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: A REVIEW ON QUERY CLUSTERING

More information

Data Mining in Web Search Engine Optimization and User Assisted Rank Results

Data Mining in Web Search Engine Optimization and User Assisted Rank Results Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management

More information

DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING

DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014 RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer

More information

GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES

GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES ADVANCED AND ROBUST MOBILE SEARCH ENGINE FOR PERSONALIZED Mr. Yogesh B.Jadhao *1 and Assoc.Prof. Shyam S. Gupta 2 *1 Research scholar,computer Engineering,

More information

Mining Signatures in Healthcare Data Based on Event Sequences and its Applications

Mining Signatures in Healthcare Data Based on Event Sequences and its Applications Mining Signatures in Healthcare Data Based on Event Sequences and its Applications Siddhanth Gokarapu 1, J. Laxmi Narayana 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India 1

More information

Research and Development of Data Preprocessing in Web Usage Mining

Research and Development of Data Preprocessing in Web Usage Mining Research and Development of Data Preprocessing in Web Usage Mining Li Chaofeng School of Management, South-Central University for Nationalities,Wuhan 430074, P.R. China Abstract Web Usage Mining is the

More information

ISSN: 2321-7782 (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com

More information

Opinion Mining and Preferences Mining in Mobile Search

Opinion Mining and Preferences Mining in Mobile Search Opinion Mining and Preferences Mining in Mobile Search P. Anandajayam 1, D. Ashok Kumar 2. Asst.Professor, Dept. of Computer Science, MANAKULA VINAYAGAR INSTITUTE OF TECHNOLOGY, India 1. PG Scholar, MANAKULA

More information

SECURED AN IMPLEMENTATION OF PERSONALIZED WEB SEARCH

SECURED AN IMPLEMENTATION OF PERSONALIZED WEB SEARCH SECURED AN IMPLEMENTATION OF PERSONALIZED WEB SEARCH 1 Mr. A. MANIKANDAN, 2 Dr. A.VIJAYA KATHIRAVAN 1 Research Scholar, 2 Assistant Professor in Computer Science, 1 Dept of Computer Science, 2 Dept of

More information

Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment

Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment International Journal of Computational Engineering Research Vol, 03 Issue, 11 Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment D.Dhivya 1, S.CHINNADURAI 2 1,M.E.(Cse),

More information

Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains

Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains P.Satheesh Associate professor Dept of Computer Science and Engineering MVGR college of

More information

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM Macha Arun 1, B.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Holy Mary

More information

Decision Trees for Mining Data Streams Based on the Gaussian Approximation

Decision Trees for Mining Data Streams Based on the Gaussian Approximation International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-3 E-ISSN: 2347-2693 Decision Trees for Mining Data Streams Based on the Gaussian Approximation S.Babu

More information

Mobile Phone APP Software Browsing Behavior using Clustering Analysis

Mobile Phone APP Software Browsing Behavior using Clustering Analysis Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 Mobile Phone APP Software Browsing Behavior using Clustering Analysis

More information

Advanced Preprocessing using Distinct User Identification in web log usage data

Advanced Preprocessing using Distinct User Identification in web log usage data Advanced Preprocessing using Distinct User Identification in web log usage data Sheetal A. Raiyani 1, Shailendra Jain 2, Ashwin G. Raiyani 3 Department of CSE (Software System), Technocrats Institute of

More information

Ranked Keyword Search Using RSE over Outsourced Cloud Data

Ranked Keyword Search Using RSE over Outsourced Cloud Data Ranked Keyword Search Using RSE over Outsourced Cloud Data Payal Akriti 1, Ms. Preetha Mary Ann 2, D.Sarvanan 3 1 Final Year MCA, Sathyabama University, Tamilnadu, India 2&3 Assistant Professor, Sathyabama

More information

To Enhance The Security In Data Mining Using Integration Of Cryptograhic And Data Mining Algorithms

To Enhance The Security In Data Mining Using Integration Of Cryptograhic And Data Mining Algorithms IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 06 (June. 2014), V2 PP 34-38 www.iosrjen.org To Enhance The Security In Data Mining Using Integration Of Cryptograhic

More information

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE Reshma Mary Abraham and P. Sriramya Computer Science Engineering, Saveetha University, Chennai, India E-Mail: reshmamaryabraham@gmail.com

More information

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of

More information

Achieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services

Achieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services Achieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services Ms. M. Subha #1, Mr. K. Saravanan *2 # Student, * Assistant Professor Department of Computer Science and Engineering Regional

More information

Mining Navigation Histories for User Need Recognition

Mining Navigation Histories for User Need Recognition Mining Navigation Histories for User Need Recognition Fabio Gasparetti and Alessandro Micarelli and Giuseppe Sansonetti Roma Tre University, Via della Vasca Navale 79, Rome, 00146 Italy {gaspare,micarel,gsansone}@dia.uniroma3.it

More information

Understanding Web personalization with Web Usage Mining and its Application: Recommender System

Understanding Web personalization with Web Usage Mining and its Application: Recommender System Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,

More information

Web Personalization based on Usage Mining

Web Personalization based on Usage Mining Web Personalization based on Usage Mining Sharhida Zawani Saad School of Computer Science and Electronic Engineering, University of Essex, Wivenhoe Park, Colchester, Essex, CO4 3SQ, UK szsaad@essex.ac.uk

More information

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN

More information

Enhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud

Enhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Volume 1, Number 2, November 2014 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Enhanced Algorithm for Efficient Retrieval of Data from a Secure

More information

A PREDICTIVE MODEL FOR QUERY OPTIMIZATION TECHNIQUES IN PERSONALIZED WEB SEARCH

A PREDICTIVE MODEL FOR QUERY OPTIMIZATION TECHNIQUES IN PERSONALIZED WEB SEARCH International Journal of Computer Science and System Analysis Vol. 5, No. 1, January-June 2011, pp. 37-43 Serials Publications ISSN 0973-7448 A PREDICTIVE MODEL FOR QUERY OPTIMIZATION TECHNIQUES IN PERSONALIZED

More information

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor

More information

Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data

Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data Sheetal A. Raiyani 1, Shailendra Jain 2 Dept. of CSE(SS),TIT,Bhopal 1, Dept. of CSE,TIT,Bhopal 2 sheetal.raiyani@gmail.com

More information

Bisecting K-Means for Clustering Web Log data

Bisecting K-Means for Clustering Web Log data Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining

More information

Natural Language to Relational Query by Using Parsing Compiler

Natural Language to Relational Query by Using Parsing Compiler Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,

More information

Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com ISSN: 2321-7782

More information

Data Mining for Customer Service Support. Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin

Data Mining for Customer Service Support. Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin Data Mining for Customer Service Support Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin Traditional Hotline Services Problem Traditional Customer Service Support (manufacturing)

More information

A Near Real-Time Personalization for ecommerce Platform Amit Rustagi arustagi@ebay.com

A Near Real-Time Personalization for ecommerce Platform Amit Rustagi arustagi@ebay.com A Near Real-Time Personalization for ecommerce Platform Amit Rustagi arustagi@ebay.com Abstract. In today's competitive environment, you only have a few seconds to help site visitors understand that you

More information

Filtering Noisy Contents in Online Social Network by using Rule Based Filtering System

Filtering Noisy Contents in Online Social Network by using Rule Based Filtering System Filtering Noisy Contents in Online Social Network by using Rule Based Filtering System Bala Kumari P 1, Bercelin Rose Mary W 2 and Devi Mareeswari M 3 1, 2, 3 M.TECH / IT, Dr.Sivanthi Aditanar College

More information

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.

More information

Pre-Processing: Procedure on Web Log File for Web Usage Mining

Pre-Processing: Procedure on Web Log File for Web Usage Mining Pre-Processing: Procedure on Web Log File for Web Usage Mining Shaily Langhnoja 1, Mehul Barot 2, Darshak Mehta 3 1 Student M.E.(C.E.), L.D.R.P. ITR, Gandhinagar, India 2 Asst.Professor, C.E. Dept., L.D.R.P.

More information

Prerequisites. Course Outline

Prerequisites. Course Outline MS-55040: Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot Description This three-day instructor-led course will introduce the students to the concepts of data mining,

More information

A MACHINE LEARNING APPROACH TO FILTER UNWANTED MESSAGES FROM ONLINE SOCIAL NETWORKS

A MACHINE LEARNING APPROACH TO FILTER UNWANTED MESSAGES FROM ONLINE SOCIAL NETWORKS A MACHINE LEARNING APPROACH TO FILTER UNWANTED MESSAGES FROM ONLINE SOCIAL NETWORKS Charanma.P 1, P. Ganesh Kumar 2, 1 PG Scholar, 2 Assistant Professor,Department of Information Technology, Anna University

More information

Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis

Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 6, Issue 5 (Nov. - Dec. 2012), PP 36-41 Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services

More information

SPATIAL DATA CLASSIFICATION AND DATA MINING

SPATIAL DATA CLASSIFICATION AND DATA MINING , pp.-40-44. Available online at http://www. bioinfo. in/contents. php?id=42 SPATIAL DATA CLASSIFICATION AND DATA MINING RATHI J.B. * AND PATIL A.D. Department of Computer Science & Engineering, Jawaharlal

More information

Web Advertising Personalization using Web Content Mining and Web Usage Mining Combination

Web Advertising Personalization using Web Content Mining and Web Usage Mining Combination 8 Web Advertising Personalization using Web Content Mining and Web Usage Mining Combination Ketul B. Patel 1, Dr. A.R. Patel 2, Natvar S. Patel 3 1 Research Scholar, Hemchandracharya North Gujarat University,

More information

72. Ontology Driven Knowledge Discovery Process: a proposal to integrate Ontology Engineering and KDD

72. Ontology Driven Knowledge Discovery Process: a proposal to integrate Ontology Engineering and KDD 72. Ontology Driven Knowledge Discovery Process: a proposal to integrate Ontology Engineering and KDD Paulo Gottgtroy Auckland University of Technology Paulo.gottgtroy@aut.ac.nz Abstract This paper is

More information

Enhancing Accountability for Distributed Data Sharing in the Cloud

Enhancing Accountability for Distributed Data Sharing in the Cloud Enhancing Accountability for Distributed Data Sharing in the Cloud MdMasoomRabbani M.Sc(Computer Sc.), Final Year School of Computing Science & Engineering, VIT University, Vellore - 632014, Tamil Nadu,

More information

ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL

ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL International Journal Of Advanced Technology In Engineering And Science Www.Ijates.Com Volume No 03, Special Issue No. 01, February 2015 ISSN (Online): 2348 7550 ASSOCIATION RULE MINING ON WEB LOGS FOR

More information

Data Integrity by Aes Algorithm ISSN 2319-9725

Data Integrity by Aes Algorithm ISSN 2319-9725 Data Integrity by Aes Algorithm ISSN 2319-9725 Alpha Vijayan Nidhiya Krishna Sreelakshmi T N Jyotsna Shukla Abstract: In the cloud computing, data is moved to a remotely located cloud server. Cloud will

More information

Intinno: A Web Integrated Digital Library and Learning Content Management System

Intinno: A Web Integrated Digital Library and Learning Content Management System Intinno: A Web Integrated Digital Library and Learning Content Management System Synopsis of the Thesis to be submitted in Partial Fulfillment of the Requirements for the Award of the Degree of Master

More information

Web Log Based Analysis of User s Browsing Behavior

Web Log Based Analysis of User s Browsing Behavior Web Log Based Analysis of User s Browsing Behavior Ashwini Ladekar 1, Dhanashree Raikar 2,Pooja Pawar 3 B.E Student, Department of Computer, JSPM s BSIOTR, Wagholi,Pune, India 1 B.E Student, Department

More information

Introduction to Data Mining

Introduction to Data Mining Introduction to Data Mining Jay Urbain Credits: Nazli Goharian & David Grossman @ IIT Outline Introduction Data Pre-processing Data Mining Algorithms Naïve Bayes Decision Tree Neural Network Association

More information

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10 1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom

More information

A Survey on Web Research for Data Mining

A Survey on Web Research for Data Mining A Survey on Web Research for Data Mining Gaurav Saini 1 gauravhpror@gmail.com 1 Abstract Web mining is the application of data mining techniques to extract knowledge from web data, including web documents,

More information

Periodic Web Personalization for Meta Search Engine

Periodic Web Personalization for Meta Search Engine ISSN : 0976-8491(Online) ISSN : 2229-4333(Print) Abstract In this paper we propose a unique approach to integrate Meta search engine to build web personalization. Our approach makes the web personalization

More information

ANALYSIS OF WEB SERVER LOG FILES TO INCREASE THE EFFECTIVENESS OF THE WEBSITE USING WEB MINING TOOL

ANALYSIS OF WEB SERVER LOG FILES TO INCREASE THE EFFECTIVENESS OF THE WEBSITE USING WEB MINING TOOL International Journal of Advanced Computer and Mathematical Sciences ISSN 2230-9624. Vol 4, Issue 1, 2013, pp1-8 http://bipublication.com ANALYSIS OF WEB SERVER LOG FILES TO INCREASE THE EFFECTIVENESS

More information

COURSE SYLLABUS COURSE TITLE:

COURSE SYLLABUS COURSE TITLE: 1 COURSE SYLLABUS COURSE TITLE: FORMAT: CERTIFICATION EXAMS: 55040 Data Mining: Predictive Analytics with Microsoft SQL Server Analysis Services and Excel Using PowerPivot and the Data Mining Add-Ins Instructor-Led

More information

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage Pranita Bakka 1, Dr. Jayashree Agarkhed 2 1 P.G.Student, Department of Computer Science & Engineering,

More information

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,

More information

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,

More information

IMPROVISATION OF STUDYING COMPUTER BY CLUSTER STRATEGIES

IMPROVISATION OF STUDYING COMPUTER BY CLUSTER STRATEGIES INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE IMPROVISATION OF STUDYING COMPUTER BY CLUSTER STRATEGIES C.Priyanka 1, T.Giri Babu 2 1 M.Tech Student, Dept of CSE, Malla Reddy Engineering

More information

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud T.Vijayalakshmi 1, Balika J Chelliah 2,S.Alagumani 3 and Dr.J.Jagadeesan 4 1 PG

More information

ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability

ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India

More information

Advanced Peer to Peer Discovery and Interaction Framework

Advanced Peer to Peer Discovery and Interaction Framework Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 peeyush_tugnawat@jdedwards.com Mohamed E. Fayad Computer Engineering

More information

Analysis of Server Log by Web Usage Mining for Website Improvement

Analysis of Server Log by Web Usage Mining for Website Improvement IJCSI International Journal of Computer Science Issues, Vol., Issue 4, 8, July 2010 1 Analysis of Server Log by Web Usage Mining for Website Improvement Navin Kumar Tyagi 1, A. K. Solanki 2 and Manoj Wadhwa

More information

Effective Prediction of Kid s Behaviour Based on Internet Use

Effective Prediction of Kid s Behaviour Based on Internet Use International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 183-188 International Research Publications House http://www. irphouse.com /ijict.htm Effective

More information

Web Mining as a Tool for Understanding Online Learning

Web Mining as a Tool for Understanding Online Learning Web Mining as a Tool for Understanding Online Learning Jiye Ai University of Missouri Columbia Columbia, MO USA jadb3@mizzou.edu James Laffey University of Missouri Columbia Columbia, MO USA LaffeyJ@missouri.edu

More information

Web Usage Mining: Identification of Trends Followed by the user through Neural Network

Web Usage Mining: Identification of Trends Followed by the user through Neural Network International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 617-624 International Research Publications House http://www. irphouse.com /ijict.htm Web

More information

Data Mining for Knowledge Management in Technology Enhanced Learning

Data Mining for Knowledge Management in Technology Enhanced Learning Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29, 2007 115 Data Mining for Knowledge Management in Technology Enhanced Learning

More information

Healthcare Measurement Analysis Using Data mining Techniques

Healthcare Measurement Analysis Using Data mining Techniques www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 03 Issue 07 July, 2014 Page No. 7058-7064 Healthcare Measurement Analysis Using Data mining Techniques 1 Dr.A.Shaik

More information

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Configuring SonicWALL TSA on Citrix and Terminal Services Servers Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,

More information

A Review of Data Mining Techniques

A Review of Data Mining Techniques Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

Privacy Preserving Health Monitoring Data Using a Proxy Re-encryption

Privacy Preserving Health Monitoring Data Using a Proxy Re-encryption RESEARCH ARTICLE OPEN ACCESS Privacy Preserving Health Monitoring Data Using a Proxy Re-encryption Lakshmipriya.V 1, Praveena.V(Assistant Professor) 2 Department of Computer Science and Engineering, SRM

More information

A COGNITIVE APPROACH IN PATTERN ANALYSIS TOOLS AND TECHNIQUES USING WEB USAGE MINING

A COGNITIVE APPROACH IN PATTERN ANALYSIS TOOLS AND TECHNIQUES USING WEB USAGE MINING A COGNITIVE APPROACH IN PATTERN ANALYSIS TOOLS AND TECHNIQUES USING WEB USAGE MINING M.Gnanavel 1 & Dr.E.R.Naganathan 2 1. Research Scholar, SCSVMV University, Kanchipuram,Tamil Nadu,India. 2. Professor

More information

A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage

A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India

More information

Data Warehousing and Data Mining in Business Applications

Data Warehousing and Data Mining in Business Applications 133 Data Warehousing and Data Mining in Business Applications Eesha Goel CSE Deptt. GZS-PTU Campus, Bathinda. Abstract Information technology is now required in all aspect of our lives that helps in business

More information

A survey on Data Mining based Intrusion Detection Systems

A survey on Data Mining based Intrusion Detection Systems International Journal of Computer Networks and Communications Security VOL. 2, NO. 12, DECEMBER 2014, 485 490 Available online at: www.ijcncs.org ISSN 2308-9830 A survey on Data Mining based Intrusion

More information

Research trends relevant to data warehousing and OLAP include [Cuzzocrea et al.]: Combining the benefits of RDBMS and NoSQL database systems

Research trends relevant to data warehousing and OLAP include [Cuzzocrea et al.]: Combining the benefits of RDBMS and NoSQL database systems DATA WAREHOUSING RESEARCH TRENDS Research trends relevant to data warehousing and OLAP include [Cuzzocrea et al.]: Data source heterogeneity and incongruence Filtering out uncorrelated data Strongly unstructured

More information

Arti Tyagi Sunita Choudhary

Arti Tyagi Sunita Choudhary Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Usage Mining

More information

Efficient Detection of Ddos Attacks by Entropy Variation

Efficient Detection of Ddos Attacks by Entropy Variation IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 7, Issue 1 (Nov-Dec. 2012), PP 13-18 Efficient Detection of Ddos Attacks by Entropy Variation 1 V.Sus hma R eddy,

More information

Accessibility of E-Cloud: An Algorithm for Implementing Interface Specification for Visually Impaired

Accessibility of E-Cloud: An Algorithm for Implementing Interface Specification for Visually Impaired , July 2-4, 2014, London, U.K. Accessibility of E-Cloud: An Algorithm for Implementing Interface Specification for Visually Impaired Mohammed Fakrudeen, Sufian Yousef, Abdelrahman H. Hussein Abstract This

More information

International Journal of Innovative Research in Computer and Communication Engineering

International Journal of Innovative Research in Computer and Communication Engineering Achieve Ranking Accuracy Using Cloudrank Framework for Cloud Services R.Yuvarani 1, M.Sivalakshmi 2 M.E, Department of CSE, Syed Ammal Engineering College, Ramanathapuram, India ABSTRACT: Building high

More information

Proof of Retrivability: A Third Party Auditor Using Cloud Computing

Proof of Retrivability: A Third Party Auditor Using Cloud Computing Proof of Retrivability: A Third Party Auditor Using Cloud Computing Vijayaraghavan U 1, Madonna Arieth R 2, Geethanjali K 3 1,2 Asst. Professor, Dept of CSE, RVS College of Engineering& Technology, Pondicherry

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,

More information

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Data Integrity for Secure Dynamic Cloud Storage System Using TPA International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure

More information

Mobile Image Offloading Using Cloud Computing

Mobile Image Offloading Using Cloud Computing Mobile Image Offloading Using Cloud Computing Chintan Shah, Aruna Gawade Student, Dept. of Computer., D.J.Sanghvi College of Engineering, Mumbai University, Mumbai, India Assistant Professor, Dept. of

More information

RANKING WEB PAGES RELEVANT TO SEARCH KEYWORDS

RANKING WEB PAGES RELEVANT TO SEARCH KEYWORDS ISBN: 978-972-8924-93-5 2009 IADIS RANKING WEB PAGES RELEVANT TO SEARCH KEYWORDS Ben Choi & Sumit Tyagi Computer Science, Louisiana Tech University, USA ABSTRACT In this paper we propose new methods for

More information

International Journal of Innovative Research in Computer and Communication Engineering

International Journal of Innovative Research in Computer and Communication Engineering FP Tree Algorithm and Approaches in Big Data T.Rathika 1, J.Senthil Murugan 2 Assistant Professor, Department of CSE, SRM University, Ramapuram Campus, Chennai, Tamil Nadu,India 1 Assistant Professor,

More information

Data Preprocessing and Easy Access Retrieval of Data through Data Ware House

Data Preprocessing and Easy Access Retrieval of Data through Data Ware House Data Preprocessing and Easy Access Retrieval of Data through Data Ware House Suneetha K.R, Dr. R. Krishnamoorthi Abstract-The World Wide Web (WWW) provides a simple yet effective media for users to search,

More information

Verifying Correctness of Trusted data in Clouds

Verifying Correctness of Trusted data in Clouds Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in

More information

Study and Analysis of Data Mining Concepts

Study and Analysis of Data Mining Concepts Study and Analysis of Data Mining Concepts M.Parvathi Head/Department of Computer Applications Senthamarai college of Arts and Science,Madurai,TamilNadu,India/ Dr. S.Thabasu Kannan Principal Pannai College

More information

ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at:

More information

A SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH CARE SERVICES

A SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH CARE SERVICES A SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH CARE SERVICES K.M.Ruba Malini #1 and R.Lakshmi *2 # P.G.Scholar, Computer Science and Engineering, K. L. N College Of

More information