Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Janet Rajeswari

    Janet Rajeswari

    The tendency of analyzing user reviews has been increasing tremendously due to the inherent nature of online web users. The scenario of buying/selling products online with a hassle free environment has attracted people of all age groups.... more
    The tendency of analyzing user reviews has been increasing tremendously due to the inherent nature of online web users. The scenario of buying/selling products online with a hassle free environment has attracted people of all age groups. The commercial web sites attract people through various ways advertisements and offers and increase their online marketing. There lies some negative impact in introducing fake products, poor recommendation by offenders and others. Therefore recommender systems are of greater importance in providing valuable reviews to end users for online buyers/sellers. We present a hybrid product recommender system with the integration of multiple features to mine the real time Web 2.0 applications. Experiments performed show the significance of the proposed approach in terms of standard evaluation metrics.
    Personalized recommender system has attracted wide range of attention among researchers in recent years. There has been a huge demand for development of web search apps for gaining knowledge pertaining to user‟s choice. A strong knowledge... more
    Personalized recommender system has attracted wide range of attention among researchers in recent years. There has been a huge demand for development of web search apps for gaining knowledge pertaining to user‟s choice. A strong knowledge base, type of approach for search and several other factors make it accountable for a good personalized web search engine. This paper presents the state of art, challenges and other issues in this context, thereby providing the need for an improved personalized system. The paper describes an approach integrating the news feeds and users opinion on web news using content, collaborative and hybrid approaches. Experiments carried out shows the effectiveness of the proposed system using popular dataset such as MovieLens.
    The jammer controls the probability of jamming and the transmission range in order to cause maximal damage to the network in terms of corrupted communication links. The jammer action ceases when it is detected by the network (namely by a... more
    The jammer controls the probability of jamming and the transmission range in order to cause maximal damage to the network in terms of corrupted communication links. The jammer action ceases when it is detected by the network (namely by a monitoring node), and a notification message is transferred out of the jammed region. The jammer is detected by employing an optimal detection test based on the percentage of incurred collisions. On the other hand, the network defends itself by computing the channel access probability to minimize the jamming detection plus notification time. The necessary knowledge of the jammer in order to optimize its benefit consists of knowledge about the network channel access probability and the number of neighbors of the monitor node. Accordingly, the network needs to know the jamming probability of the jammer. Monitoring node gives the message about the jamming region. The jammer is detected by optimal detection based on collision. The jamming detection and ...
    Security in a networked environment, especially in cloud computing, is the hottest field that is attracting several research communities. Storage of data and security using standard cryptographic algorithms has become an important topic... more
    Security in a networked environment, especially in cloud computing, is the hottest field that is attracting several research communities. Storage of data and security using standard cryptographic algorithms has become an important topic of discussion and research. Cloud computing moves the software and databases to data centers that are not trustworthy. Also, cloud storage faces many new security challenges that need more attention. The major threats of data security in cloud storage arise out of scheduling the computing resources using network, storage and retrieval of data. In this paper, we suggest a framework that enhances data security in the cloud storage system. We use Unicode, colors and private keys to develop a new and simple method that ensures secure storage of data in the cloud.