Efficient Approach for Query Based Search in Data Mining

Size: px
Start display at page:

Download "Efficient Approach for Query Based Search in Data Mining"

Transcription

1 International Journal of Private Cloud Computing Environment and Management Vol. 3, No. 2, (2016), pp Efficient Approach for Query Based Search in Data Mining K Praveen Kumar 1 Department of Information Technology VFSTR University, Vadlamudi, Guntur praveenkumarkazipeta@gmail.com Abstract A search-as-you-type system gives us the answers to the on-the-fly system by using the user types and also by using the keyword query character by character. The support searchas-you-type on data residing on a relational DBMS its problems and solutions are studies. Here we mainly look after that how we support this type of searching using a longstanding database language, SQL. Here we will get the problem of how to control existing system database functionalities and also will not get the high performance in a very high speed. So to overcome these problems in the existing system we introduce Random walk propagation over the query fusion graph methods support complex search which will be giving us the control over existing system database and also increases the performance of the in a very high speed. Our experimental results shows query attribute extraction regarding query representation with user intention. Keywords: Search-as-you-type, On-the-fly, Random walk propagation, Query fusion graph. 1. Introduction There are many web engines that will be a for the most part giving the data to the clients as a pursuit inquiry related hunt which will state that there will be a name that we need to hunt so we enter the word without fruition of the writing of word we will get some proposal in regards to that word. There will be moment criticism and that will help us from getting the further hunts these searches of frameworks are called as inquiry as-you-write or sort ahead pursuit. These all web engines will be put away in the backend in social databases. There will be just a few databases that will give these administrations to illustration Oracle and SQL server. So we can use benefit gave by these Databases not all Databases give this sort of administration. So we utilize the proposed system. In this paper we concentrate how to support search-as-you-type on DBMS frameworks utilizing the structured query language (SQL). As it were, we need to utilize SQL to discover answers to a hunt inquiry as a client sorts in catchphrases character by character. We will likely use the inherent inquiry motor of the database framework however much as could be expected. Along these lines, we can decrease the programming endeavors to bolster seek asyou-write. To enhance client's search involvement, most real business web crawlers give inquiry proposals to help clients detail more powerful questions. At the point when a client presents Article history: Received (June 9, 2016), Review Result (August 3, 2016), Accepted (September 1, 2016) ISSN: IJPCCEM Copyright c 2016 GV School Publication

2 Efficient Approach for Query Based Search in Data Mining an inquiry, a rundown of terms that are semantically identified with the submitted question is given to help the client recognize terms that he/she truly needs, henceforth enhancing the recovery adequacy. Yahoo's "Additionally Try" and Google's "Quests identified with" elements give related inquiries to Lessening look, while Ask Jeeves recommends both more particular and more broad questions to the client. One essential stride towards empowering administrations and components that can help clients amid their intricate hunt journeys online is the capacity to recognize and gather related inquiries together. As of late, a portion of the significant web crawlers have presented another "Search History" include, which permits clients to track their online inquiries by recording their questions and snaps. This history incorporates a succession of four inquiries showed backward Chronological request together with their comparing clicks. Notwithstanding seeing their pursuit history, clients can control it by physically altering and sorting out related questions and snaps into gatherings, or by imparting them to their companions. 2. Related work Baeza-Yates et al proposed an inquiry bunching technique that gatherings comparable questions as per their semantics. The strategy makes a vector representation Q or a question q, and the vector Q is made out of terms from the clicked reports of q. Cosine similitude is connected to the question vectors to find comparative inquiries. All the more as of late, Zhang and Nasraoui introduced a technique that finds comparable inquiries by breaking down clients' successive pursuit conduct. The strategy expect that successive inquiries put together by a client are identified with each other. The successive inquiry conduct is consolidated with a customary substance based closeness technique to adjust for the high sparsity of genuine question log information. Teevan and Eytan Adar expressed that People regularly rehash Web seeks, both to discover new data on themes they have already investigated and to re-discover data they have found previously. The inquiry connected with a rehash pursuit may contrast from the underlying question yet can in any case prompt to taps on similar results. This paper investigates rehash seek conduct through the examination of a one-year Web question log of 114 mysterious clients and a different controlled overview of an extra 119 volunteers. Our study shows that upwards of 40% of all questions are re-discovering inquiries. Re-observing has all the earmarks of being an imperative conduct for web crawlers to unequivocally support, and we investigate how this should be possible. We exhibit that progressions to web search tool results can ruin re-finding, and give an approach to naturally identify rehash seeks and anticipate rehash clicks. Paolo Boldi and Francesco Bonchi expressed that Query logs record the inquiries and the activities of the clients of web crawlers, and all things considered they contain significant data about the interests, the inclinations, and the conduct of the clients, and their certain input to search engine comes about. Mining the abundance of data accessible in the question logs has numerous essential applications including inquiry log investigation, client profiling and personalization, publicizing, inquiry proposal, and that's only the tip of the iceberg. In this paper we present the question stream chart, a diagram representation of the fascinating learning about inactive questioning conduct. Instinctively, in the inquiry stream chart a guided edge from question qi to question qj implies that the two inquiries are probably going to be a piece of the same "pursuit mission". Any way over the inquiry stream chart might be viewed as a seeking conduct, whose probability is given by the quality of the edges along the way. 2 K Praveen Kumar

3 International Journal of Private Cloud Computing Environment and Management Vol. 3, No. 2, (2016), pp Existing system 3.1. Search-as-You-Type for single-keyword queries exact search As a client sorts in a solitary incomplete (prefix) catchphrase w character by character, seek as-you-write on the-fly finds the records that contain watchwords with a prefix w. We call this hunt worldview prefix look. Without loss of consensus, each tokenized watchword in the information set and inquiries is accepted to utilize bring down case characters. For instance, consider the information in Table 1, A1 = title, A2 =authors, A3 =book title, and A4 = year. R ={fr1;... ; r10}. r3[book title] = ''sigmod''. W = fprivacy; sigmod; sigir;...g: In the event that a client sorts in an inquiry "sig," we return records r3, r6, and r9. Specifically, r3 contains a watchword "sigmod" with a prefix "sig." 3.2. Fuzzy search As a client sorts in a solitary fractional catchphrase w character by character, fluffy hunt onthe-fly discovers records with watchwords like the question catchphrase. In Table 1, expecting a client sorts in a question "corel," record r7 is a significant reply since it contains a catchphrase "relationship" with a prefix "correl" like the inquiry watchword "corel." We utilize alter separation to quantify the similitude between strings. Formally, the alter remove between two strings s1 and s2, indicated by ed(s1, s2), is the base number of singlecharacter alter operations (i.e., inclusion, erasure, and substitution) expected to change s1 to s2. For instance, ed (corelation; connection) = 1 a n d ed(coralation,correlation)= 2. Given an alter separate edge t, we say a prefix p of a watchword in W is like the halfway catchphrase w if ed(p;w) t. We say a catchphrase d in W is like the halfway watchword w if d has a prefix p with the end goal that ed(p;wþ ) t. Fluffy inquiry finds the records with watchwords like the question catchphrases Search-as-You-Type for multikeyword queries: Exact Search: Given a multi catchphrase inquiry Q with m watchwords w1; w2;... ; wm, as the client is finishing the last catchphrase wm, we regard wm as a fractional watchword and different watchwords as entire keywords.2 As a client sorts in question Q character by character, look as-you-write on-the-fly finds the records that contain the total watchwords and a watchword with a prefix wm. For instance, if a client sorts in a question "protection sig," look as-you-write returns records r3, r6, and r9. Specifically, r3 contains the total watchword "protection" and a catchphrase "sigmod" with a prefix "sig." 3.4. Search-as-You-Type for Multikeyword Queries Exact Search: Given a multi keyword query Q with m keywords w1; w2;... ; wm, as the user is completing the last keyword wm, we treat wm as a partial keyword and other keywords as complete keywords.2 As a user types in query Q character by character, searchas-you-type on-the-fly finds the records that contain the complete keywords and a keyword with a prefix wm. For example, if a user types in a query privacy sig, search-as-you-type returns records r3, r6, and r9. In particular, r3 contains the complete keyword privacy and a keyword sigmod with a prefix sig. Copyright c 2016 GV School Publication 3

4 Efficient Approach for Query Based Search in Data Mining 4. Proposed system A client inquiries a web index Search Engine tries to build client profile in view of his ip address/login qualifications from its client look history storehouses. On the off chance that the client as of now exists, the web crawler checks from its client seek history stores up to a specific limit whether the client as of now questioned a similar inquiry already If the client did, then web index encourage recovers click focuses from client look history vaults and reformulates question comes about by creating click diagrams. Click charts contain helpful data on client conduct while looking on the web. This progression is called question combination chart. Utilizes arbitrary walk engendering over the question combination diagram rather than time-based and watchword similitude based methodologies. This whole procedure is called sorting out client look histories into question bunches. This approach helps clients to seek after complex pursuit journeys on the web. 5. Query relevance using search logs We now develop the machinery to define the query relevance based on Web search logs. Our measure of relevance is aimed at capturing two important properties of relevant queries, namely: (1) queries that frequently appear together as reformulations and (2) queries that have induced the users to click on similar sets of pages. Find the relevance Input: QFG, factor, given query, q. Output: Relevance vector for given query. Step 1: Initially rel=0 Step 2: random walk propagation, number of visits. Step 3: for each user processing results are displayed based on numvisits Step 4: above two steps are repeated to every user processing in search process. Figure 1. Algorithm for calculating the query relevance by simulating random walks over the query fusion graph 6. Experimental results In the experimental results we show that the native data base systems will not be providing the services quickly such as query related data storing in backend so that it would be easy to retrieve the data whenever we want but there are only some data bases that would be proving these services quickly. So we introduce Random walk propagation over the query fusion graph methods which will be giving us the services to those data bases that will not be providing by them in the past 4 K Praveen Kumar

5 International Journal of Private Cloud Computing Environment and Management Vol. 3, No. 2, (2016), pp Conclusion Figure 2. Comparison of proposed and existing In this paper, the proposed framework will give propelled administrations to the client by utilizing the Random walk engendering over the query combination graph strategies which will give us the administrations to those information bases that won't give by them previously. So we can state that our current system will give us not full administrations that are required by the client. That will make the search procedure back off furthermore takes additional time that will give us issues. References [1] R. Baeza-Yates and A. Tiberi, Extracting semantic relations from query logs, in KDD, (2007). [2] G. Li, J. Feng and C. Li, Supporting Search-As-You-Type Using SQL in Databases, IEEE Transactions on Knowledge and Data Engineering, Vol. 25, No. 2, pp , Feb. (2013). [3] J. Teevan, and Eytan Adar, Information Re-Retrieval: Repeat Queries in Yahoo s Logs, SIGIR '07 Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval, ACM, pp , (2007). [4] P. Boldi and F. Bonchi, The Query-flow Graph: Model and Applications, CIKM '08 Proceedings of the 17th ACM conference on Information and knowledge management, ACM, pp , (2008). [5] B.J. Jansen, A. Spink, C. Blakely, and S. Koshman, Defining a session on Web search engines: Research articles, Journal of the American Society for Information Science and Technology, Vol. 58, No. 6, pp , (2007). [6] J. Han and M. Kamber, Data Mining: Concepts and Techniques, Morgan Kaufmann, (2000). [7] P. Anick, Using terminological feedback for web search refinement: A log-based study, in SIGIR, ACM, (2003). Copyright c 2016 GV School Publication 5

6 Efficient Approach for Query Based Search in Data Mining 6 K Praveen Kumar

Improving Keyword Query Suggestions On Document Proximity With Using LKS Framework And PA Algorithm

Improving Keyword Query Suggestions On Document Proximity With Using LKS Framework And PA Algorithm Improving Keyword Query Suggestions On Document Proximity With Using LKS Framework And PA Algorithm 1 N.VARUN KUMARI 2 MRS. P. SREE LAKSHMI 1 M. Tech Student, Department of CSE, B.V. Raju Institute of

More information

Query Modifications Patterns During Web Searching

Query Modifications Patterns During Web Searching Bernard J. Jansen The Pennsylvania State University jjansen@ist.psu.edu Query Modifications Patterns During Web Searching Amanda Spink Queensland University of Technology ah.spink@qut.edu.au Bhuva Narayan

More information

Supporting Fuzzy Keyword Search in Databases

Supporting Fuzzy Keyword Search in Databases I J C T A, 9(24), 2016, pp. 385-391 International Science Press Supporting Fuzzy Keyword Search in Databases Jayavarthini C.* and Priya S. ABSTRACT An efficient keyword search system computes answers as

More information

Internet Usage Transaction Log Studies: The Next Generation

Internet Usage Transaction Log Studies: The Next Generation Internet Usage Transaction Log Studies: The Next Generation Sponsored by SIG USE Dietmar Wolfram, Moderator. School of Information Studies, University of Wisconsin-Milwaukee Milwaukee, WI 53201. dwolfram@uwm.edu

More information

ABSTRACT I. INTRODUCTION

ABSTRACT I. INTRODUCTION 2015 IJSRSET Volume 1 Issue 2 Print ISSN : 2395-1990 Online ISSN : 2394-4099 Themed Section: Engineering and Technology ABSTRACT Database Traversal to Support Search Enhance Technique using SQL Sivakumar

More information

A Comparative Study of Data Mining Process Models (KDD, CRISP-DM and SEMMA)

A Comparative Study of Data Mining Process Models (KDD, CRISP-DM and SEMMA) International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 12 No. 1 Nov. 2014, pp. 217-222 2014 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/

More information

Web Searcher Interactions with Multiple Federate Content Collections

Web Searcher Interactions with Multiple Federate Content Collections Web Searcher Interactions with Multiple Federate Content Collections Amanda Spink Faculty of IT Queensland University of Technology QLD 4001 Australia ah.spink@qut.edu.au Bernard J. Jansen School of IST

More information

Automatic New Topic Identification in Search Engine Transaction Log Using Goal Programming

Automatic New Topic Identification in Search Engine Transaction Log Using Goal Programming Proceedings of the 2012 International Conference on Industrial Engineering and Operations Management Istanbul, Turkey, July 3 6, 2012 Automatic New Topic Identification in Search Engine Transaction Log

More information

Query Result Extraction Using Dynamic Query Forms

Query Result Extraction Using Dynamic Query Forms Query Result Extraction Using Dynamic Query Forms #1 Mrs. I. Anitha Rani, #2 Y.Vijay, #3 Abdul Moseen #1 Assistant Professor, Department of Computer Science Engineering,Andhra Loyola Institute Of Engineering

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, ISSN:

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, ISSN: IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 20131 Improve Search Engine Relevance with Filter session Addlin Shinney R 1, Saravana Kumar T

More information

Domain Specific Search Engine for Students

Domain Specific Search Engine for Students Domain Specific Search Engine for Students Domain Specific Search Engine for Students Wai Yuen Tang The Department of Computer Science City University of Hong Kong, Hong Kong wytang@cs.cityu.edu.hk Lam

More information

Design and Implementation of Search Engine Using Vector Space Model for Personalized Search

Design and Implementation of Search Engine Using Vector Space Model for Personalized Search Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Deep Web Content Mining

Deep Web Content Mining Deep Web Content Mining Shohreh Ajoudanian, and Mohammad Davarpanah Jazi Abstract The rapid expansion of the web is causing the constant growth of information, leading to several problems such as increased

More information

VIDEO SEARCHING AND BROWSING USING VIEWFINDER

VIDEO SEARCHING AND BROWSING USING VIEWFINDER VIDEO SEARCHING AND BROWSING USING VIEWFINDER By Dan E. Albertson Dr. Javed Mostafa John Fieber Ph. D. Student Associate Professor Ph. D. Candidate Information Science Information Science Information Science

More information

Using Clusters on the Vivisimo Web Search Engine

Using Clusters on the Vivisimo Web Search Engine Using Clusters on the Vivisimo Web Search Engine Sherry Koshman and Amanda Spink School of Information Sciences University of Pittsburgh 135 N. Bellefield Ave., Pittsburgh, PA 15237 skoshman@sis.pitt.edu,

More information

Secure Multi-Keyword Ranked Search over Encrypted Cloud Data Dynamically

Secure Multi-Keyword Ranked Search over Encrypted Cloud Data Dynamically Secure Multi-Keyword Ranked Search over Encrypted Cloud Data Dynamically G. Sunil Santhosh Kumar 1, M. Swapna 2 1 Assistant Professor, Marri Laxman Reddy Institute of Technology and Management, Telangana

More information

A New Technique to Optimize User s Browsing Session using Data Mining

A New Technique to Optimize User s Browsing Session using Data Mining Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,

More information

A Secure & Encrypted Multi-Keyword Ranked Search in Cloud Storage

A Secure & Encrypted Multi-Keyword Ranked Search in Cloud Storage A Secure & Encrypted Multi-Keyword Ranked Search in Cloud Storage Jeniphar Francis #, Chetna Getme # Priyanka Bagde # Ruchika Bansod # Prof. Ashish Palandurkar * # Student, Dept. of Information Technology

More information

An Improved Apriori Algorithm for Association Rules

An Improved Apriori Algorithm for Association Rules Research article An Improved Apriori Algorithm for Association Rules Hassan M. Najadat 1, Mohammed Al-Maolegi 2, Bassam Arkok 3 Computer Science, Jordan University of Science and Technology, Irbid, Jordan

More information

Ramesh Polisetti, Chikram Sridhar, Chenagoni Nagaraju

Ramesh Polisetti, Chikram Sridhar, Chenagoni Nagaraju International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Dynamic Secure Multi-Keyword Ranked Search over

More information

DATA WAREHOUSING DEVELOPING OPTIMIZED ALGORITHMS TO ENHANCE THE USABILITY OF SCHEMA IN DATA MINING AND ALLIED DATA INTELLIGENCE MODELS

DATA WAREHOUSING DEVELOPING OPTIMIZED ALGORITHMS TO ENHANCE THE USABILITY OF SCHEMA IN DATA MINING AND ALLIED DATA INTELLIGENCE MODELS DATA WAREHOUSING DEVELOPING OPTIMIZED ALGORITHMS TO ENHANCE THE USABILITY OF SCHEMA IN DATA MINING AND ALLIED DATA INTELLIGENCE MODELS Harshit Yadav Student, Bal Bharati Public School, Dwarka, New Delhi

More information

ISSN: (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com

More information

A NEW PERFORMANCE EVALUATION TECHNIQUE FOR WEB INFORMATION RETRIEVAL SYSTEMS

A NEW PERFORMANCE EVALUATION TECHNIQUE FOR WEB INFORMATION RETRIEVAL SYSTEMS A NEW PERFORMANCE EVALUATION TECHNIQUE FOR WEB INFORMATION RETRIEVAL SYSTEMS Fidel Cacheda, Francisco Puentes, Victor Carneiro Department of Information and Communications Technologies, University of A

More information

A Model for Interactive Web Information Retrieval

A Model for Interactive Web Information Retrieval A Model for Interactive Web Information Retrieval Orland Hoeber and Xue Dong Yang University of Regina, Regina, SK S4S 0A2, Canada {hoeber, yang}@uregina.ca Abstract. The interaction model supported by

More information

An Adaptive Agent for Web Exploration Based on Concept Hierarchies

An Adaptive Agent for Web Exploration Based on Concept Hierarchies An Adaptive Agent for Web Exploration Based on Concept Hierarchies Scott Parent, Bamshad Mobasher, Steve Lytinen School of Computer Science, Telecommunication and Information Systems DePaul University

More information

Multi-Keyword Ranked Search in Encrypted Cloud Storage

Multi-Keyword Ranked Search in Encrypted Cloud Storage Multi-Keyword Ranked Search in Encrypted Cloud Storage Akshay Kasulkar, Sahil Kamble, Nikhil Shettiwar, Tejaswini Dongre Prof. Vijay Masne UG Student, Dept. of Computer Science & Engineering, DBACER College,

More information

INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN EFFECTIVE KEYWORD SEARCH OF FUZZY TYPE IN XML

INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN EFFECTIVE KEYWORD SEARCH OF FUZZY TYPE IN XML INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 EFFECTIVE KEYWORD SEARCH OF FUZZY TYPE IN XML Mr. Mohammed Tariq Alam 1,Mrs.Shanila Mahreen 2 Assistant Professor

More information

Enabling Users to Visually Evaluate the Effectiveness of Different Search Queries or Engines

Enabling Users to Visually Evaluate the Effectiveness of Different Search Queries or Engines Appears in WWW 04 Workshop: Measuring Web Effectiveness: The User Perspective, New York, NY, May 18, 2004 Enabling Users to Visually Evaluate the Effectiveness of Different Search Queries or Engines Anselm

More information

Re-Ranking Based Personalized Web Search Using Browsing History and Domain Knowledge

Re-Ranking Based Personalized Web Search Using Browsing History and Domain Knowledge Re-Ranking Based Personalized Web Search Using Browsing History and Domain Knowledge 1 N.P.Sasi Thev, 2 N.Vivekanantha Moor 1 Post Graduate Student, 2 Asst. Professor Dept. of Information Technology, SRM

More information

WEB PAGE RE-RANKING TECHNIQUE IN SEARCH ENGINE

WEB PAGE RE-RANKING TECHNIQUE IN SEARCH ENGINE WEB PAGE RE-RANKING TECHNIQUE IN SEARCH ENGINE Ms.S.Muthukakshmi 1, R. Surya 2, M. Umira Taj 3 Assistant Professor, Department of Information Technology, Sri Krishna College of Technology, Kovaipudur,

More information

Enhancing Wrapper Usability through Ontology Sharing and Large Scale Cooperation

Enhancing Wrapper Usability through Ontology Sharing and Large Scale Cooperation Enhancing Wrapper Usability through Ontology Enhancing Sharing Wrapper and Large Usability Scale Cooperation through Ontology Sharing and Large Scale Cooperation Christian Schindler, Pranjal Arya, Andreas

More information

Finding Hubs and authorities using Information scent to improve the Information Retrieval precision

Finding Hubs and authorities using Information scent to improve the Information Retrieval precision Finding Hubs and authorities using Information scent to improve the Information Retrieval precision Suruchi Chawla 1, Dr Punam Bedi 2 1 Department of Computer Science, University of Delhi, Delhi, INDIA

More information

Open Access Apriori Algorithm Research Based on Map-Reduce in Cloud Computing Environments

Open Access Apriori Algorithm Research Based on Map-Reduce in Cloud Computing Environments Send Orders for Reprints to reprints@benthamscience.ae 368 The Open Automation and Control Systems Journal, 2014, 6, 368-373 Open Access Apriori Algorithm Research Based on Map-Reduce in Cloud Computing

More information

Received on Accepted on

Received on Accepted on ISSN: 0975-766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com EFFICIENT SEARCHING WITH MULTIPLE KEYWORD OVER ENCRYPTED CLOUD DATA BY BLIND STORAGE K.Santhi* 1, M.Deepa 2, M.Lawanya

More information

Proximity Prestige using Incremental Iteration in Page Rank Algorithm

Proximity Prestige using Incremental Iteration in Page Rank Algorithm Indian Journal of Science and Technology, Vol 9(48), DOI: 10.17485/ijst/2016/v9i48/107962, December 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Proximity Prestige using Incremental Iteration

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 4.14 International Journal of Advance Engineering and Research Development Volume 3, Issue 3, March -2016 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Identify

More information

Web document summarisation: a task-oriented evaluation

Web document summarisation: a task-oriented evaluation Web document summarisation: a task-oriented evaluation Ryen White whiter@dcs.gla.ac.uk Ian Ruthven igr@dcs.gla.ac.uk Joemon M. Jose jj@dcs.gla.ac.uk Abstract In this paper we present a query-biased summarisation

More information

Mining User - Aware Rare Sequential Topic Pattern in Document Streams

Mining User - Aware Rare Sequential Topic Pattern in Document Streams Mining User - Aware Rare Sequential Topic Pattern in Document Streams A.Mary Assistant Professor, Department of Computer Science And Engineering Alpha College Of Engineering, Thirumazhisai, Tamil Nadu,

More information

Enhancing Cluster Quality by Using User Browsing Time

Enhancing Cluster Quality by Using User Browsing Time Enhancing Cluster Quality by Using User Browsing Time Rehab M. Duwairi* and Khaleifah Al.jada'** * Department of Computer Information Systems, Jordan University of Science and Technology, Irbid 22110,

More information

Dynamic Optimization of Generalized SQL Queries with Horizontal Aggregations Using K-Means Clustering

Dynamic Optimization of Generalized SQL Queries with Horizontal Aggregations Using K-Means Clustering Dynamic Optimization of Generalized SQL Queries with Horizontal Aggregations Using K-Means Clustering Abstract Mrs. C. Poongodi 1, Ms. R. Kalaivani 2 1 PG Student, 2 Assistant Professor, Department of

More information

Web Service Recommendation Using Hybrid Approach

Web Service Recommendation Using Hybrid Approach e-issn 2455 1392 Volume 2 Issue 5, May 2016 pp. 648 653 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Web Service Using Hybrid Approach Priyanshi Barod 1, M.S.Bhamare 2, Ruhi Patankar

More information

MATRIX BASED INDEXING TECHNIQUE FOR VIDEO DATA

MATRIX BASED INDEXING TECHNIQUE FOR VIDEO DATA Journal of Computer Science, 9 (5): 534-542, 2013 ISSN 1549-3636 2013 doi:10.3844/jcssp.2013.534.542 Published Online 9 (5) 2013 (http://www.thescipub.com/jcs.toc) MATRIX BASED INDEXING TECHNIQUE FOR VIDEO

More information

KDD, SEMMA AND CRISP-DM: A PARALLEL OVERVIEW. Ana Azevedo and M.F. Santos

KDD, SEMMA AND CRISP-DM: A PARALLEL OVERVIEW. Ana Azevedo and M.F. Santos KDD, SEMMA AND CRISP-DM: A PARALLEL OVERVIEW Ana Azevedo and M.F. Santos ABSTRACT In the last years there has been a huge growth and consolidation of the Data Mining field. Some efforts are being done

More information

Auto Secured Text Monitor in Natural Scene Images

Auto Secured Text Monitor in Natural Scene Images IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 4, Ver. V (Jul.-Aug. 2016), PP 148-152 www.iosrjournals.org Auto Secured Text Monitor in Natural Scene

More information

Enhancing Cluster Quality by Using User Browsing Time

Enhancing Cluster Quality by Using User Browsing Time Enhancing Cluster Quality by Using User Browsing Time Rehab Duwairi Dept. of Computer Information Systems Jordan Univ. of Sc. and Technology Irbid, Jordan rehab@just.edu.jo Khaleifah Al.jada' Dept. of

More information

Catch You in the event that You Misbehave Ranked Keyword Search Results Verification in Cloud Computing

Catch You in the event that You Misbehave Ranked Keyword Search Results Verification in Cloud Computing International Journal for Modern Trends in Science and Technology Volume: 03, Issue No: 09, September 2017 ISSN: 2455-3778 http://www.ijmtst.com Catch You in the event that You Misbehave Ranked Keyword

More information

Clustering and Recommending Services based on ClubCF approach for Big Data Application

Clustering and Recommending Services based on ClubCF approach for Big Data Application Clustering and Recommending Services based on ClubCF approach for Big Data Application G.Uma Mahesh Department of Computer Science and Engineering Vemu Institute of Technology, P.Kothakota, Andhra Pradesh,India

More information

International Journal of Computer Engineering and Applications, Volume VIII, Issue III, Part I, December 14

International Journal of Computer Engineering and Applications, Volume VIII, Issue III, Part I, December 14 International Journal of Computer Engineering and Applications, Volume VIII, Issue III, Part I, December 14 DESIGN OF AN EFFICIENT DATA ANALYSIS CLUSTERING ALGORITHM Dr. Dilbag Singh 1, Ms. Priyanka 2

More information

Interpreting User Inactivity on Search Results

Interpreting User Inactivity on Search Results Interpreting User Inactivity on Search Results Sofia Stamou 1, Efthimis N. Efthimiadis 2 1 Computer Engineering and Informatics Department, Patras University Patras, 26500 GREECE, and Department of Archives

More information

Finding Topic-centric Identified Experts based on Full Text Analysis

Finding Topic-centric Identified Experts based on Full Text Analysis Finding Topic-centric Identified Experts based on Full Text Analysis Hanmin Jung, Mikyoung Lee, In-Su Kang, Seung-Woo Lee, Won-Kyung Sung Information Service Research Lab., KISTI, Korea jhm@kisti.re.kr

More information

Web Page Recommendation by Functional and Non Functional Evaluation

Web Page Recommendation by Functional and Non Functional Evaluation Global Journal of Pure and Applied Mathematics. ISSN 0973-1768 Volume 13, Number 6 (2017), pp. 2683-2692 Research India Publications http://www.ripublication.com Web Page Recommendation by Functional and

More information

Competitive Intelligence and Web Mining:

Competitive Intelligence and Web Mining: Competitive Intelligence and Web Mining: Domain Specific Web Spiders American University in Cairo (AUC) CSCE 590: Seminar1 Report Dr. Ahmed Rafea 2 P age Khalid Magdy Salama 3 P age Table of Contents Introduction

More information

Enhanced Web Usage Mining Using Fuzzy Clustering and Collaborative Filtering Recommendation Algorithms

Enhanced Web Usage Mining Using Fuzzy Clustering and Collaborative Filtering Recommendation Algorithms International Journal of Mathematics and Statistics Invention (IJMSI) E-ISSN: 2321 4767 P-ISSN: 2321-4759 Volume 4 Issue 10 December. 2016 PP-09-13 Enhanced Web Usage Mining Using Fuzzy Clustering and

More information

Automated Online News Classification with Personalization

Automated Online News Classification with Personalization Automated Online News Classification with Personalization Chee-Hong Chan Aixin Sun Ee-Peng Lim Center for Advanced Information Systems, Nanyang Technological University Nanyang Avenue, Singapore, 639798

More information

Grid Resources Search Engine based on Ontology

Grid Resources Search Engine based on Ontology based on Ontology 12 E-mail: emiao_beyond@163.com Yang Li 3 E-mail: miipl606@163.com Weiguang Xu E-mail: miipl606@163.com Jiabao Wang E-mail: miipl606@163.com Lei Song E-mail: songlei@nudt.edu.cn Jiang

More information

HYBRIDIZED MODEL FOR EFFICIENT MATCHING AND DATA PREDICTION IN INFORMATION RETRIEVAL

HYBRIDIZED MODEL FOR EFFICIENT MATCHING AND DATA PREDICTION IN INFORMATION RETRIEVAL International Journal of Mechanical Engineering & Computer Sciences, Vol.1, Issue 1, Jan-Jun, 2017, pp 12-17 HYBRIDIZED MODEL FOR EFFICIENT MATCHING AND DATA PREDICTION IN INFORMATION RETRIEVAL BOMA P.

More information

IMPLEMENTATION OF INFORMATION RETRIEVAL (IR) ALGORITHM FOR CLOUD COMPUTING: A COMPARATIVE STUDY BETWEEN WITH AND WITHOUT MAPREDUCE MECHANISM *

IMPLEMENTATION OF INFORMATION RETRIEVAL (IR) ALGORITHM FOR CLOUD COMPUTING: A COMPARATIVE STUDY BETWEEN WITH AND WITHOUT MAPREDUCE MECHANISM * Journal of Contemporary Issues in Business Research ISSN 2305-8277 (Online), 2012, Vol. 1, No. 2, 42-56. Copyright of the Academic Journals JCIBR All rights reserved. IMPLEMENTATION OF INFORMATION RETRIEVAL

More information

THE WEB SEARCH ENGINE

THE WEB SEARCH ENGINE International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR) Vol.1, Issue 2 Dec 2011 54-60 TJPRC Pvt. Ltd., THE WEB SEARCH ENGINE Mr.G. HANUMANTHA RAO hanu.abc@gmail.com

More information

Inferring User Search for Feedback Sessions

Inferring User Search for Feedback Sessions Inferring User Search for Feedback Sessions Sharayu Kakade 1, Prof. Ranjana Barde 2 PG Student, Department of Computer Science, MIT Academy of Engineering, Pune, MH, India 1 Assistant Professor, Department

More information

SQL. History. From Wikipedia, the free encyclopedia.

SQL. History. From Wikipedia, the free encyclopedia. SQL From Wikipedia, the free encyclopedia. Structured Query Language (SQL) is the most popular computer language used to create, modify and retrieve data from relational database management systems. The

More information

EXTRACTION INFORMATION ADAPTIVE WEB. The Amorphic system works to extract Web information for use in business intelligence applications.

EXTRACTION INFORMATION ADAPTIVE WEB. The Amorphic system works to extract Web information for use in business intelligence applications. By Dawn G. Gregg and Steven Walczak ADAPTIVE WEB INFORMATION EXTRACTION The Amorphic system works to extract Web information for use in business intelligence applications. Web mining has the potential

More information

CS 8803 AIAD Prof Ling Liu. Project Proposal for Automated Classification of Spam Based on Textual Features Gopal Pai

CS 8803 AIAD Prof Ling Liu. Project Proposal for Automated Classification of Spam Based on Textual Features Gopal Pai CS 8803 AIAD Prof Ling Liu Project Proposal for Automated Classification of Spam Based on Textual Features Gopal Pai Under the supervision of Steve Webb Motivations and Objectives Spam, which was until

More information

IDENTITY BASED REMOTE DATA INTEGRITY CHECKING WITH PERFECT DATA PRIVACY PRESERVING FOR CLOUD STORAGE BASED ON OTP 1 S.V.KAVYA, 2M.HEMAMALINI, 3 K.

IDENTITY BASED REMOTE DATA INTEGRITY CHECKING WITH PERFECT DATA PRIVACY PRESERVING FOR CLOUD STORAGE BASED ON OTP 1 S.V.KAVYA, 2M.HEMAMALINI, 3 K. Volume 119 No. 15 2018, 995-1000 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ IDENTITY BASED REMOTE DATA INTEGRITY CHECKING WITH PERFECT DATA PRIVACY PRESERVING

More information

Dynamic Visualization of Hubs and Authorities during Web Search

Dynamic Visualization of Hubs and Authorities during Web Search Dynamic Visualization of Hubs and Authorities during Web Search Richard H. Fowler 1, David Navarro, Wendy A. Lawrence-Fowler, Xusheng Wang Department of Computer Science University of Texas Pan American

More information

Enhanced Performance of Search Engine with Multitype Feature Co-Selection of Db-scan Clustering Algorithm

Enhanced Performance of Search Engine with Multitype Feature Co-Selection of Db-scan Clustering Algorithm Enhanced Performance of Search Engine with Multitype Feature Co-Selection of Db-scan Clustering Algorithm K.Parimala, Assistant Professor, MCA Department, NMS.S.Vellaichamy Nadar College, Madurai, Dr.V.Palanisamy,

More information

Format of Session 1. Forensic Accounting then and now 2. Overview of Data Analytics 3. Fraud Analytics Basics 4. Advanced Fraud Analytics 5. Data Visualization 6. Wrap-up Question are welcome and encouraged!

More information

Analyzing Web Multimedia Query Reformulation Behavior

Analyzing Web Multimedia Query Reformulation Behavior Analyzing Web Multimedia Query Reformulation Behavior Liang-Chun Jack Tseng Faculty of Science and Queensland University of Brisbane, QLD 4001, Australia ntjack.au@hotmail.com Dian Tjondronegoro Faculty

More information

CHAPTER 4 HUMAN FACTOR BASED USER INTERFACE DESIGN

CHAPTER 4 HUMAN FACTOR BASED USER INTERFACE DESIGN CHAPTER 4 HUMAN FACTOR BASED USER INTERFACE DESIGN 4.1 Introduction Today one of the most important concerns is how to use the system with effectiveness, efficiency and satisfaction. The ease or comfort

More information

A Document-centered Approach to a Natural Language Music Search Engine

A Document-centered Approach to a Natural Language Music Search Engine A Document-centered Approach to a Natural Language Music Search Engine Peter Knees, Tim Pohle, Markus Schedl, Dominik Schnitzer, and Klaus Seyerlehner Dept. of Computational Perception, Johannes Kepler

More information

Overview of Web Mining Techniques and its Application towards Web

Overview of Web Mining Techniques and its Application towards Web Overview of Web Mining Techniques and its Application towards Web *Prof.Pooja Mehta Abstract The World Wide Web (WWW) acts as an interactive and popular way to transfer information. Due to the enormous

More information

Research Article Apriori Association Rule Algorithms using VMware Environment

Research Article Apriori Association Rule Algorithms using VMware Environment Research Journal of Applied Sciences, Engineering and Technology 8(2): 16-166, 214 DOI:1.1926/rjaset.8.955 ISSN: 24-7459; e-issn: 24-7467 214 Maxwell Scientific Publication Corp. Submitted: January 2,

More information

Retrieval of Web Documents Using a Fuzzy Hierarchical Clustering

Retrieval of Web Documents Using a Fuzzy Hierarchical Clustering International Journal of Computer Applications (97 8887) Volume No., August 2 Retrieval of Documents Using a Fuzzy Hierarchical Clustering Deepti Gupta Lecturer School of Computer Science and Information

More information

Database Systems: Design, Implementation, and Management Tenth Edition. Chapter 9 Database Design

Database Systems: Design, Implementation, and Management Tenth Edition. Chapter 9 Database Design Database Systems: Design, Implementation, and Management Tenth Edition Chapter 9 Database Design Objectives In this chapter, you will learn: That successful database design must reflect the information

More information

Open Research Online The Open University s repository of research publications and other research outputs

Open Research Online The Open University s repository of research publications and other research outputs Open Research Online The Open University s repository of research publications and other research outputs Incorporating seasonality into search suggestions derived from intranet query logs Conference or

More information

Privacy-Preserving of Check-in Services in MSNS Based on a Bit Matrix

Privacy-Preserving of Check-in Services in MSNS Based on a Bit Matrix BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 2 Sofia 2015 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2015-0032 Privacy-Preserving of Check-in

More information

Applying for Jobs Online

Applying for Jobs Online Applying for Jobs Online Hi, I m Sarah. I m here to show you how to apply for a job using an online application form. Most jobs now require you to fill out an application on the Internet. In this course

More information

Discovery of Frequent Itemset and Promising Frequent Itemset Using Incremental Association Rule Mining Over Stream Data Mining

Discovery of Frequent Itemset and Promising Frequent Itemset Using Incremental Association Rule Mining Over Stream Data Mining Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.923

More information

Web Data mining-a Research area in Web usage mining

Web Data mining-a Research area in Web usage mining IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 13, Issue 1 (Jul. - Aug. 2013), PP 22-26 Web Data mining-a Research area in Web usage mining 1 V.S.Thiyagarajan,

More information

Deep Web Crawling and Mining for Building Advanced Search Application

Deep Web Crawling and Mining for Building Advanced Search Application Deep Web Crawling and Mining for Building Advanced Search Application Zhigang Hua, Dan Hou, Yu Liu, Xin Sun, Yanbing Yu {hua, houdan, yuliu, xinsun, yyu}@cc.gatech.edu College of computing, Georgia Tech

More information

International Journal of Scientific & Engineering Research Volume 2, Issue 12, December ISSN Web Search Engine

International Journal of Scientific & Engineering Research Volume 2, Issue 12, December ISSN Web Search Engine International Journal of Scientific & Engineering Research Volume 2, Issue 12, December-2011 1 Web Search Engine G.Hanumantha Rao*, G.NarenderΨ, B.Srinivasa Rao+, M.Srilatha* Abstract This paper explains

More information

International Journal of Modern Engineering and Research Technology

International Journal of Modern Engineering and Research Technology Volume 2, Issue 4, October 2015 ISSN: 2348-8565 (Online) International Journal of Modern Engineering and Research Technology Website: http://www.ijmert.org Privacy Preservation in Data Mining Using Mixed

More information

EXECUTION OF PRIVACY - PRESERVING MULTI-KEYWORD POSITIONED SEARCH OVER CLOUD INFORMATION

EXECUTION OF PRIVACY - PRESERVING MULTI-KEYWORD POSITIONED SEARCH OVER CLOUD INFORMATION EXECUTION OF PRIVACY - PRESERVING MULTI-KEYWORD POSITIONED SEARCH OVER CLOUD INFORMATION Sunitha. N 1 and Prof. B. Sakthivel 2 sunithank.dvg@gmail.com and everrock17@gmail.com 1PG Student and 2 Professor

More information

Mobile Query Interfaces

Mobile Query Interfaces Mobile Query Interfaces Matthew Krog Abstract There are numerous alternatives to the application-oriented mobile interfaces. Since users use their mobile devices to manage personal information, a PIM interface

More information

A World Wide Web-based HCI-library Designed for Interaction Studies

A World Wide Web-based HCI-library Designed for Interaction Studies A World Wide Web-based HCI-library Designed for Interaction Studies Ketil Perstrup, Erik Frøkjær, Maria Konstantinovitz, Thorbjørn Konstantinovitz, Flemming S. Sørensen, Jytte Varming Department of Computing,

More information

Inferring User Search Goals Using Click Through Log

Inferring User Search Goals Using Click Through Log Inferring User Search Goals Using Click Through Log Amruta Sangavikar 1, Prof. Deepak Uplaonkar 2 P.G. Student, Department of Computer Engineering, JSPM Narhe, Pune, Maharashtra, India 1 Assistant Professor,

More information

Designing and Building an Automatic Information Retrieval System for Handling the Arabic Data

Designing and Building an Automatic Information Retrieval System for Handling the Arabic Data American Journal of Applied Sciences (): -, ISSN -99 Science Publications Designing and Building an Automatic Information Retrieval System for Handling the Arabic Data Ibrahiem M.M. El Emary and Ja'far

More information

Abstract. 1. Introduction

Abstract. 1. Introduction A Visualization System using Data Mining Techniques for Identifying Information Sources on the Web Richard H. Fowler, Tarkan Karadayi, Zhixiang Chen, Xiaodong Meng, Wendy A. L. Fowler Department of Computer

More information

Quick Reference Guide

Quick Reference Guide The Cochrane Library on Wiley InterScience Quick Reference Guide Go to www.thecochranelibrary.com to discover the best single source of reliable evidence for healthcare decision-making Go to www.thecochranelibrary.com

More information

Data Mining: Dynamic Past and Promising Future

Data Mining: Dynamic Past and Promising Future SDM@10 Anniversary Panel: Data Mining: A Decade of Progress and Future Outlook Data Mining: Dynamic Past and Promising Future Jiawei Han Department of Computer Science University of Illinois at Urbana

More information

PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA

PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA Supriya Pentewad 1, Siddhivinayak Kulkarni 2 1 Department of Computer Engineering. MIT College of Engineering, Pune, India 2 Department

More information

TERM BASED WEIGHT MEASURE FOR INFORMATION FILTERING IN SEARCH ENGINES

TERM BASED WEIGHT MEASURE FOR INFORMATION FILTERING IN SEARCH ENGINES TERM BASED WEIGHT MEASURE FOR INFORMATION FILTERING IN SEARCH ENGINES Mu. Annalakshmi Research Scholar, Department of Computer Science, Alagappa University, Karaikudi. annalakshmi_mu@yahoo.co.in Dr. A.

More information

Letter Pair Similarity Classification and URL Ranking Based on Feedback Approach

Letter Pair Similarity Classification and URL Ranking Based on Feedback Approach Letter Pair Similarity Classification and URL Ranking Based on Feedback Approach P.T.Shijili 1 P.G Student, Department of CSE, Dr.Nallini Institute of Engineering & Technology, Dharapuram, Tamilnadu, India

More information

How Primo Works VE. 1.1 Welcome. Notes: Published by Articulate Storyline Welcome to how Primo works.

How Primo Works VE. 1.1 Welcome. Notes: Published by Articulate Storyline   Welcome to how Primo works. How Primo Works VE 1.1 Welcome Welcome to how Primo works. 1.2 Objectives By the end of this session, you will know - What discovery, delivery, and optimization are - How the library s collections and

More information

DATA MINING - 1DL105, 1DL111

DATA MINING - 1DL105, 1DL111 1 DATA MINING - 1DL105, 1DL111 Fall 2007 An introductory class in data mining http://user.it.uu.se/~udbl/dut-ht2007/ alt. http://www.it.uu.se/edu/course/homepage/infoutv/ht07 Kjell Orsborn Uppsala Database

More information

Query Sugges*ons. Debapriyo Majumdar Information Retrieval Spring 2015 Indian Statistical Institute Kolkata

Query Sugges*ons. Debapriyo Majumdar Information Retrieval Spring 2015 Indian Statistical Institute Kolkata Query Sugges*ons Debapriyo Majumdar Information Retrieval Spring 2015 Indian Statistical Institute Kolkata Search engines User needs some information search engine tries to bridge this gap ssumption: the

More information

3. Information Organization {and,or,vs} Search

3. Information Organization {and,or,vs} Search 1 of 36 8/31/2006 3:14 PM 3. Information Organization {and,or,vs} Search IS 202-5 September 2006 Bob Glushko 2 of 36 8/31/2006 3:14 PM Plan for IO & IR Lecture #3 The Information Life Cycle "Search"!=

More information

Fast and Effective System for Name Entity Recognition on Big Data

Fast and Effective System for Name Entity Recognition on Big Data International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-3, Issue-2 E-ISSN: 2347-2693 Fast and Effective System for Name Entity Recognition on Big Data Jigyasa Nigam

More information

Appendix A: Syntax Diagrams

Appendix A: Syntax Diagrams A. Syntax Diagrams A-1 Appendix A: Syntax Diagrams References: Kathleen Jensen/Niklaus Wirth: PASCAL User Manual and Report, 4th Edition. Springer, 1991. Niklaus Wirth: Compilerbau (in German). Teubner,

More information

User Session Identification Using Enhanced Href Method

User Session Identification Using Enhanced Href Method User Session Identification Using Enhanced Href Method Department of Computer Science, Constantine the Philosopher University in Nitra, Slovakia jkapusta@ukf.sk, psvec@ukf.sk, mmunk@ukf.sk, jskalka@ukf.sk

More information

Exploration Encryption Mechanism Using Single Key for Public Cloud Storage

Exploration Encryption Mechanism Using Single Key for Public Cloud Storage International Journal of Emerging Trends in Science and Technology Impact Factor: 2.838 DOI: http://dx.doi.org/10.18535/ijetst/v3i05.07 Exploration Encryption Mechanism Using Single Key for Public Cloud

More information