Pragmatic Security for Efficient Web Search Using Amalgamation

Authors

  • Anithaashri T.P. Associate Professor, Department of Innovative Informatics, Institute of CSE, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Thandalam, Chennai Author
  • Saranya M. Assistant Professor, Department of Computer Science and Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Thandalam, Chennai Author
  • Ravichandran G. Research Scholar, AMET University Author

DOI:

https://doi.org/10.61841/q37vkg37

Keywords:

Natural Language Processing, Phrase Matching, Steganography, Game Theory

Abstract

Natural language processing alone does not improve the accuracy of information retrieval systems. If the focus is shifted to short phrases rather than full documents, the situation becomes extremely different. The proposed system uses the combination of game theory, natural language processing techniques, and steganography to obtain high-accuracy retrieval of images that have been annotated with a descriptive textual caption. The natural language techniques also allow additional contextual information to be derived from the relation between the query and the caption, along with high security to store the information in a database, which can help users to understand the overall protected collection of retrieval results. 

Downloads

Download data is not yet available.

References

[1] P. Selvi Rajendran, Virtual Bulletin Board using Man-Machine Interface (MMI) for Authorized Users,” Indian Journal of Science and Technology, 12(34), DOI:10.17485/ijst/2019/v12i34/112683, September 2019. Web of Science.

[2] Anithaashri, G. Ravichandran, Baskaran, Software Defined Network Security enhancement using Game Theory, Elsevier COMNET, vol. 157, pp. 112-121, 2019

[3] Selvi Rajendran, Virtual Information Kiosk Using Augmented Reality for Easy Shopping,” International Journal of Pure and Applied Mathematics (IJPAM), special issue, Volume 118 No. 20, 2018, 985-994

[4] T.P. Anithaashri, G. Ravichandran, et al., Secure Data Access Through Electronic Devices Using Artificial Intelligence, ICCES, 2018.

[5] T.P. Anithaashri, R. Baskaran, Enhancing Multi-user Network using sagacity dismissal of conquered movements, International Journal of American Scientific Publishers, pp. 69-78, 2016

[6] Deng, X, Deng, Y, & Chan, F. T. „An improved operator of combination with adapted conflict, Ann. Oper. Res.,

vol. 223, no. 1, pp. 451–459, 2014,

[7] Deng, X., Wang, Z., Liu, Q., Deng, Y., & Mahadevan, S. „A belief-based evolutionarily stable strategy, J. Theor.

Biol., vol. 361, pp. 81–86, 2014.

[8] TPAnithaashri and R Baskaran. Reign Monitor service for web enabled distributed system in the International

journal on Computation of Power, Energy, Information and Communication, Vol-12. 12, April 2013

[9] TP. Anithaashri and R Baskaran, Enhancing the Network Security using Lexicographic Game-—Second

International Conference, Advances in Computer Science and Information Technology-Bangalore, India, Part III, Jan 2-4, 2012.

[10] Florea, MC, Jousselme, AL, Bossé, E & Grenier, D. „Robust combination rules for evidence theory‟, Inf. Fusion,

vol. 10, no. 2, pp. 183–197, 2009,

[11] D. Elworthy. A finite set parser with dependency structure output in the 6th international workshop at Italy 2009

[12] Daugman, J. „How iris recognition works‟, IEEE Transactions on Circuits and Systems for Video Technology,

vol. 14, no. 1, pp. 21-30, 2004,

[13] Lefevre, E., Colot, O., & Vannoorenberghe, P. „Belief function combination and conflict management, Inf.

Fusion, vol. 3, no. 2, pp. 149–162, 2002,

[14] Hespanha, JP & Bohacek, S. „Preliminary results in routing games‟, in Proceedings, American Control

Conference, vol. 3, pp. 1904-1909, 2001,

[15] Z. Shan, C. Lin, F. Ren, and Y. Wei. Modeling and performance analysis of a multi-server, multi queue system on

the grid. In Proceedings of the 9th International Workshop on Future Trends of Distributed Computing Systems,

pages 337-343, 2000.

[16] S. Flank. A layered approach to NLP-based information retrieval in proceedings of 17th COLING at

Montreal, 1998

[17] Pollock and A. Hockley. What's wrong with internet searching? D - Lib magazine, 1997

[18] A.F. Smeaton. Information retrieval: Still butting heads with NLP in Springer, 1997.

[19] A.F. Smeaton and I. Quigley. Experiments on using semantic distances between words in image caption retrieval

in , proceedings of 19th SIGIR, pages 174-180 , 1996

[20] T. Strazalkowski. Robust text processing in information retrieval in the proceedings at the 4th conference at Stuttgart, 1994.

[21] J.L. Fagan. Experiments in automatic phrase indexing for document retrieval in 1987 at Cornell University

[22] C. Sindhu and G. Vadivu. Effects of Adjective Verb Adverb on Sentiment Classification Using Support Vector

Machine for Green Communication. Journal of green engineering, Volume 10, Issue 1, pp. 91–102, 2020

[23] M. Gayathri, C. Malathy, and Siddharth Singh, MARK42: The Secured Personal Assistant Using Biometric Traits Integrated with Green IOT, Journal of Green Engineering, vol. 10, issue 1, pp. 255–267, 2020.

Downloads

Published

31.07.2020

How to Cite

T.P. , A., M. , S., & G. , R. (2020). Pragmatic Security for Efficient Web Search Using Amalgamation. International Journal of Psychosocial Rehabilitation, 24(5), 4162-4169. https://doi.org/10.61841/q37vkg37