SlideShare a Scribd company logo
1 of 2
Download to read offline
IJSRD - International Journal for Scientific Research & Development| Vol. 3, Issue 10, 2015 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 1035
Filter Unwanted Messages from Walls and Blocking Non-Legitimate
Users in OSN
Miss. Gaikwad Rupali B.1 Miss. Kharat Mohini K.2 Mr. Tamhane Ajinkya V.3
Mr. Harde Pradeep S.4
1,2,3,4
Department of Computer Engineering
1,2,3,4
SCSCOE, Rahuri Factory
Abstract— Today’s life is totally based on Internet. Now a
days people cannot imagine life without Internet.
Information and communication technology plays vital role
in today’s online networked society. In today’s life, we are
very close to the online social networks. Online social
networks are used for posting and sharing information
across various social networking sites. But user’s privacy is
not maintained by online social networks. For maintaining
users sensitive information’s privacy online social networks
provides little or no support. For filtering unwanted
messages we propose a system using machine learning
(ML). Using machine learning in soft classifier content
based filtering performed. In proposed system filtering rules
(FR’s) are provided for content independent filtering..
Blacklists are used for more flexibility by which filtering
choices are increased. Proposed system provides security to
the Online Social Networks.
Key words: Online Social Networks, Machine Learning,
Information Filtering, Content based Filtering
I. INTRODUCTION
Online social networks are today’s are very popular
interactive medium for communication, sharing and
dissemination of large amount of human life information
across various social networking sites. In communication,
exchange of different types of content like text, image,
audio, and video data. For useful information extraction
filtering is used. In OSN’s for posting or commenting or
posts on particular public or private area called walls. Using
information filtering user can control the messages written
on their walls, by filtering out unwanted messages. Today
OSN’s provide little support or no support for unwanted
messages. But no content based filtering supported.
Therefore, It is hard to prevent unwanted messages, such as
political or vulgar. Therefore Proposed a system for filtering
or preventing unwanted messages called Filtered Walls
(FW’s). Use Machine Learning (ML) text categorization
techniques[5]. For short text classification use radial basis
function networks (RBFN), In managing noisy data[6]. We
insert two level classification strategy, in first level RBFN
categorize short messages as a neutral and non-neutral; in
the second, Non-neutral messages are classified and
correctness estimate are produced. In proposed system
filtering rules are provided. FR’s are the rules in which user
can stste what contents are not displayed on their walls. In
addition the system used user defined Blacklists (BL’s). In
which it makes lists of users that are temporarily prevented
to post any type of messages on a user wall. Proposed
system filters unwanted messages from OSN user walls. On
the basis of message content and message creator
relationship.
II. LITERATURE SURVEY
We are using Content based filtering and Policy based
Personalisation for filtering unwanted or vulgar messages or
text from users Online Social Networks (OSN) walls. So for
that purpose we are surveying the literature in both fields.
The Main motive of this paper is to implement an
architecture which provides customized content based
filtering for OSN’s, based on machine learning techniques.
Our related work is related with both content based filtering
and Policy based personalisation.
For Example: In Facebook user states who is
allowed to insert messages on their walls (like friends,
friends of Friends and Groups of friends) but no content
based filtering are supported.
A. Content based Filtering:
In content based filtering, each user is assumed to work
separately. A content based filtering collects the information
of items based on the relationship between the item’s
content and the user choices. An electronic mail is well
known example of Content based filtering. Only textual data
is processed in content based filtering, Therefore content
based filtering is closely similar to Text Classification.
Content Based filtering is based on the use of machine
learning paradigm. According to machine learning paradigm
a classifier is automatically induced by learning from a sets
of predefined examples. The Information Retrieval is
presented by P.W. Foltz and S.T. Dumais [1].There is no
information filtering in this approach.in our approach we are
using information filtering. Information retrieval is very
much similar to information filtering. filtering involves
process of removing information from stream, while IR
involves process of finding information in that stream.
B. Policy Based Personalization:
Policy based personalization is useful in different types of
contexts. In Online Social Networking sites user defined
policies can define how communication between two parties
or more parties can handled. The policy based
personalization mostly focuses the Twitter. It categorizes the
each tweet and only shows those tweets which are of user’s
interest. Policy based personalization shows the ability of
use to filter unwanted messages based on filtering criteria
suggested by him or the customized settings chosen by him
B. Sriram, D.fuhry, E.Demir, H. Ferhatosmanogly,
and M. Demirbas [2], our paper describes classification of
tweets into general. our approach allows settings of filter
rules according to a variety criteria’s described by him and
classifies the text into various pre-defined sets of classes like
various categories like sports, politics, Bollywood etc.
L. Fang and K. LeFevre [3], this paper is related to
privacy control but no facility for stopping anyone for
Filter Unwanted Messages from Walls and Blocking Non-Legitimate Users in OSN
(IJSRD/Vol. 3/Issue 10/2015/237)
All rights reserved by www.ijsrd.com 1036
posting something on wall. Our approach can stop posting
particular categories as per users choice.
Fong, P.W.L., Anwar, M.M., Zhao, Z. [4], this
paper describes policies such as topology based, history
based. So that it is time consuming our approach presents
content based filtering and Policy based personalization.
III. PROPOSED SYSTEM
From above literature survey we can conclude that there is
no any prevention on post which is posted by friends or any
person. So, if any person is not interested to see or to read
specific category of messages then he cannot apply any filter
on their walls. In this situation he can receive any type of
messages.in our proposed system we apply prevention to
messages by using or providing filtering rules. The main
aim of system is to prevent or filter unwanted messages
from user walls. In proposed system, filtering are supported
by content based preferences. The main part of proposed
system is content base message filtering(CBMF) and the
short text classifier module. The second element that is short
text classifier are used to categorize messages according to
set of different categories. In comparison, the first element
uses the message categorization provided by short text
classifier to implement filtering rules specified by the user.
For enhancing the filtering process Blacklist can also be
used. Blacklists are the list of users which are temporarily
prevented to post messages or text on user walls.
In our system architecture we designed a filter to
discard those messages which are vulgar in nature and
prevented to be displayed on another users wall. If User1
wants to posts some content on someone’s wall then before
it will display on that user wall, it will be checked that
whether the content is vulgar, we have provided predefined
dataset which include those words which are vulgar in
nature. If User1 data matched to the dataset then this
message is vulgar in nature so it cannot displayed on wall
and that user who wants to write message will be blocked.
This process is carried out through user defined rules and in
some cases BlackList(BL) are also used.
Fig. 1: System Architecture
IV. CONCLUSION
In our proposed system, Filtered wall is a system to prevent
or filter unwanted or unnecessary messages from online
social networks walls. This system approach decides when
user should be inserted into a blacklist. Filtered wall has a
wide variety of applications in OSN wall. In future, more
work is needed on further improving the performance
measures.
REFERENCES
[1] P.W. Foltz and S.T. Dumais, Personalized Information
Delivery: An Analysis of Information Filtering
Methods, Comm. ACM, vol. 35, no. 12, pp. 51-
60,1992.
[2] Fong, P.W.L., Anwar, M.M., Zhao, Z., A privacy
preservation model for facebook-style social network
systems; In: Proceedings of 14th European Symposium
on Research in Computer Security (ESORICS), pp.
303320, 2009.
[3] Fang, L., LeFevre, K., Privacy wizards for social
networking sites; In: WWW 10: Proceedings of the 19th
international conference on World Wide Web,pp.
351360. ACM, New York, NY, USA, 2010.
[4] B. Sriram, D. Fuhry, E. Demir, H. Ferhatosmanoglu,
and M. Demirbas,Short Text Classi_cation in Twitter
to Improve Information Filtering, Proc.33rd Intl ACM
SIGIR Conf. Research and Development in Information
Retrieval (SIGIR 10), pp. 841-842, 2010.
[5] F. Sebastiani, “Machine Learning in Automated Text
Categorization,”ACM Computing Surveys, vol. 34, no.
1, pp. 1-47, 2002.
[6] M. Vanetti, E. Binaghi, B. Carminati, M. Carullo, and
E. Ferrari,“Content-Based Filtering in On-Line Social
Networks,” Proc.ECML/PKDD Workshop Privacy and
Security Issues in Data Mining and Machine Learning
(PSDML ’10), 2010.

More Related Content

What's hot

Paper id 152013128
Paper id 152013128Paper id 152013128
Paper id 152013128IJRAT
 
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...IOSR Journals
 
An automatic filtering task in osn using content based approach
An automatic filtering task in osn using content based approachAn automatic filtering task in osn using content based approach
An automatic filtering task in osn using content based approachIAEME Publication
 
Iaetsd efficient filteration of unwanted messages
Iaetsd efficient filteration of unwanted messagesIaetsd efficient filteration of unwanted messages
Iaetsd efficient filteration of unwanted messagesIaetsd Iaetsd
 
Rule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social networkRule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social networkeSAT Publishing House
 
Assignment 2(data communication)
Assignment 2(data communication)Assignment 2(data communication)
Assignment 2(data communication)MstMarjuka
 
A system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user wallsA system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user wallsJPINFOTECH JAYAPRAKASH
 
Smart detection of offensive words in social media using the soundex algorith...
Smart detection of offensive words in social media using the soundex algorith...Smart detection of offensive words in social media using the soundex algorith...
Smart detection of offensive words in social media using the soundex algorith...IJECEIAES
 
An educational bluetooth quizzing application in android
An educational bluetooth quizzing application in androidAn educational bluetooth quizzing application in android
An educational bluetooth quizzing application in androidijwmn
 
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Kato Mivule
 
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSA SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSIJCI JOURNAL
 
Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on ...
Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on ...Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on ...
Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on ...Prachi Jain
 
Semantic Massage Addressing based on Social Cloud Actor's Interests
Semantic Massage Addressing based on Social Cloud Actor's InterestsSemantic Massage Addressing based on Social Cloud Actor's Interests
Semantic Massage Addressing based on Social Cloud Actor's InterestsCSCJournals
 

What's hot (18)

Paper id 152013128
Paper id 152013128Paper id 152013128
Paper id 152013128
 
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
 
An automatic filtering task in osn using content based approach
An automatic filtering task in osn using content based approachAn automatic filtering task in osn using content based approach
An automatic filtering task in osn using content based approach
 
S180304116124
S180304116124S180304116124
S180304116124
 
Cb4301449454
Cb4301449454Cb4301449454
Cb4301449454
 
D0351020025
D0351020025D0351020025
D0351020025
 
Iaetsd efficient filteration of unwanted messages
Iaetsd efficient filteration of unwanted messagesIaetsd efficient filteration of unwanted messages
Iaetsd efficient filteration of unwanted messages
 
Rule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social networkRule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social network
 
Assignment 2(data communication)
Assignment 2(data communication)Assignment 2(data communication)
Assignment 2(data communication)
 
A system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user wallsA system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user walls
 
D018132226
D018132226D018132226
D018132226
 
Smart detection of offensive words in social media using the soundex algorith...
Smart detection of offensive words in social media using the soundex algorith...Smart detection of offensive words in social media using the soundex algorith...
Smart detection of offensive words in social media using the soundex algorith...
 
An educational bluetooth quizzing application in android
An educational bluetooth quizzing application in androidAn educational bluetooth quizzing application in android
An educational bluetooth quizzing application in android
 
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
 
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSA SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
 
Ijcatr04041017
Ijcatr04041017Ijcatr04041017
Ijcatr04041017
 
Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on ...
Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on ...Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on ...
Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on ...
 
Semantic Massage Addressing based on Social Cloud Actor's Interests
Semantic Massage Addressing based on Social Cloud Actor's InterestsSemantic Massage Addressing based on Social Cloud Actor's Interests
Semantic Massage Addressing based on Social Cloud Actor's Interests
 

Viewers also liked

Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsHari Krishnan
 
Good presentations matter
Good presentations matterGood presentations matter
Good presentations matterNed Potter
 
7 Tips to Beautiful PowerPoint by @itseugenec
7 Tips to Beautiful PowerPoint by @itseugenec7 Tips to Beautiful PowerPoint by @itseugenec
7 Tips to Beautiful PowerPoint by @itseugenecEugene Cheng
 
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShareSlideShare
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShareSlideShare
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShareSlideShare
 

Viewers also liked (8)

Rise
RiseRise
Rise
 
Technology tips for educators
Technology tips for educatorsTechnology tips for educators
Technology tips for educators
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click points
 
Good presentations matter
Good presentations matterGood presentations matter
Good presentations matter
 
7 Tips to Beautiful PowerPoint by @itseugenec
7 Tips to Beautiful PowerPoint by @itseugenec7 Tips to Beautiful PowerPoint by @itseugenec
7 Tips to Beautiful PowerPoint by @itseugenec
 
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShare
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
 

Similar to Filter unwanted messages from walls and blocking nonlegitimate user in osn

Iaetsd hierarchical fuzzy rule based classification
Iaetsd hierarchical fuzzy rule based classificationIaetsd hierarchical fuzzy rule based classification
Iaetsd hierarchical fuzzy rule based classificationIaetsd Iaetsd
 
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...IJARIIT
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...ijtsrd
 
Intelligent access control policies for Social network site
Intelligent access control policies for Social network siteIntelligent access control policies for Social network site
Intelligent access control policies for Social network siteijcsit
 
Automatic Hate Speech Detection: A Literature Review
Automatic Hate Speech Detection: A Literature ReviewAutomatic Hate Speech Detection: A Literature Review
Automatic Hate Speech Detection: A Literature ReviewDr. Amarjeet Singh
 
Privacy Protection Using Formal Logics in Onlne Social Networks
Privacy Protection Using   Formal Logics in Onlne Social NetworksPrivacy Protection Using   Formal Logics in Onlne Social Networks
Privacy Protection Using Formal Logics in Onlne Social NetworksIRJET Journal
 
A Literature Survey on Recommendation Systems for Scientific Articles.pdf
A Literature Survey on Recommendation Systems for Scientific Articles.pdfA Literature Survey on Recommendation Systems for Scientific Articles.pdf
A Literature Survey on Recommendation Systems for Scientific Articles.pdfAmber Ford
 
A Review: Text Classification on Social Media Data
A Review: Text Classification on Social Media DataA Review: Text Classification on Social Media Data
A Review: Text Classification on Social Media DataIOSR Journals
 
Current trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networksCurrent trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networkseSAT Publishing House
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2IAEME Publication
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2IAEME Publication
 
Experimental of vectorizer and classifier for scrapped social media data
Experimental of vectorizer and classifier for scrapped social media dataExperimental of vectorizer and classifier for scrapped social media data
Experimental of vectorizer and classifier for scrapped social media dataTELKOMNIKA JOURNAL
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...ijsptm
 
Detecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social NetworksDetecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social NetworksIRJET Journal
 

Similar to Filter unwanted messages from walls and blocking nonlegitimate user in osn (16)

Iaetsd hierarchical fuzzy rule based classification
Iaetsd hierarchical fuzzy rule based classificationIaetsd hierarchical fuzzy rule based classification
Iaetsd hierarchical fuzzy rule based classification
 
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
 
Intelligent access control policies for Social network site
Intelligent access control policies for Social network siteIntelligent access control policies for Social network site
Intelligent access control policies for Social network site
 
Automatic Hate Speech Detection: A Literature Review
Automatic Hate Speech Detection: A Literature ReviewAutomatic Hate Speech Detection: A Literature Review
Automatic Hate Speech Detection: A Literature Review
 
Privacy Protection Using Formal Logics in Onlne Social Networks
Privacy Protection Using   Formal Logics in Onlne Social NetworksPrivacy Protection Using   Formal Logics in Onlne Social Networks
Privacy Protection Using Formal Logics in Onlne Social Networks
 
A Literature Survey on Recommendation Systems for Scientific Articles.pdf
A Literature Survey on Recommendation Systems for Scientific Articles.pdfA Literature Survey on Recommendation Systems for Scientific Articles.pdf
A Literature Survey on Recommendation Systems for Scientific Articles.pdf
 
A Review: Text Classification on Social Media Data
A Review: Text Classification on Social Media DataA Review: Text Classification on Social Media Data
A Review: Text Classification on Social Media Data
 
O017148084
O017148084O017148084
O017148084
 
Current trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networksCurrent trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networks
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
 
Experimental of vectorizer and classifier for scrapped social media data
Experimental of vectorizer and classifier for scrapped social media dataExperimental of vectorizer and classifier for scrapped social media data
Experimental of vectorizer and classifier for scrapped social media data
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
 
Detecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social NetworksDetecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social Networks
 
tweet segmentation
tweet segmentation tweet segmentation
tweet segmentation
 

More from IJSRD

#IJSRD #Research Paper Publication
#IJSRD #Research Paper Publication#IJSRD #Research Paper Publication
#IJSRD #Research Paper PublicationIJSRD
 
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...IJSRD
 
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...IJSRD
 
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEWPreclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEWIJSRD
 
Prevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolPrevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolIJSRD
 
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...IJSRD
 
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild SteelEvaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild SteelIJSRD
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemIJSRD
 
Diagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural NetworksDiagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural NetworksIJSRD
 
A Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion MiningA Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion MiningIJSRD
 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISIJSRD
 
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...IJSRD
 
Product Quality Analysis based on online Reviews
Product Quality Analysis based on online ReviewsProduct Quality Analysis based on online Reviews
Product Quality Analysis based on online ReviewsIJSRD
 
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy NumbersSolving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy NumbersIJSRD
 
Study of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data MiningStudy of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data MiningIJSRD
 
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...IJSRD
 
Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...IJSRD
 
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a RotavatorReview Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a RotavatorIJSRD
 
A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionIJSRD
 
Studies on Physico - Mechanical Properties of Chloroprene Rubber Vulcanizate ...
Studies on Physico - Mechanical Properties of Chloroprene Rubber Vulcanizate ...Studies on Physico - Mechanical Properties of Chloroprene Rubber Vulcanizate ...
Studies on Physico - Mechanical Properties of Chloroprene Rubber Vulcanizate ...IJSRD
 

More from IJSRD (20)

#IJSRD #Research Paper Publication
#IJSRD #Research Paper Publication#IJSRD #Research Paper Publication
#IJSRD #Research Paper Publication
 
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
 
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
 
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEWPreclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
 
Prevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolPrevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV Protocol
 
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
 
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild SteelEvaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
 
Diagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural NetworksDiagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural Networks
 
A Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion MiningA Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion Mining
 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFIS
 
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
 
Product Quality Analysis based on online Reviews
Product Quality Analysis based on online ReviewsProduct Quality Analysis based on online Reviews
Product Quality Analysis based on online Reviews
 
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy NumbersSolving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
 
Study of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data MiningStudy of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data Mining
 
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
 
Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...
 
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a RotavatorReview Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
 
A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots Prediction
 
Studies on Physico - Mechanical Properties of Chloroprene Rubber Vulcanizate ...
Studies on Physico - Mechanical Properties of Chloroprene Rubber Vulcanizate ...Studies on Physico - Mechanical Properties of Chloroprene Rubber Vulcanizate ...
Studies on Physico - Mechanical Properties of Chloroprene Rubber Vulcanizate ...
 

Recently uploaded

ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 

Recently uploaded (20)

ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

Filter unwanted messages from walls and blocking nonlegitimate user in osn

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 3, Issue 10, 2015 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 1035 Filter Unwanted Messages from Walls and Blocking Non-Legitimate Users in OSN Miss. Gaikwad Rupali B.1 Miss. Kharat Mohini K.2 Mr. Tamhane Ajinkya V.3 Mr. Harde Pradeep S.4 1,2,3,4 Department of Computer Engineering 1,2,3,4 SCSCOE, Rahuri Factory Abstract— Today’s life is totally based on Internet. Now a days people cannot imagine life without Internet. Information and communication technology plays vital role in today’s online networked society. In today’s life, we are very close to the online social networks. Online social networks are used for posting and sharing information across various social networking sites. But user’s privacy is not maintained by online social networks. For maintaining users sensitive information’s privacy online social networks provides little or no support. For filtering unwanted messages we propose a system using machine learning (ML). Using machine learning in soft classifier content based filtering performed. In proposed system filtering rules (FR’s) are provided for content independent filtering.. Blacklists are used for more flexibility by which filtering choices are increased. Proposed system provides security to the Online Social Networks. Key words: Online Social Networks, Machine Learning, Information Filtering, Content based Filtering I. INTRODUCTION Online social networks are today’s are very popular interactive medium for communication, sharing and dissemination of large amount of human life information across various social networking sites. In communication, exchange of different types of content like text, image, audio, and video data. For useful information extraction filtering is used. In OSN’s for posting or commenting or posts on particular public or private area called walls. Using information filtering user can control the messages written on their walls, by filtering out unwanted messages. Today OSN’s provide little support or no support for unwanted messages. But no content based filtering supported. Therefore, It is hard to prevent unwanted messages, such as political or vulgar. Therefore Proposed a system for filtering or preventing unwanted messages called Filtered Walls (FW’s). Use Machine Learning (ML) text categorization techniques[5]. For short text classification use radial basis function networks (RBFN), In managing noisy data[6]. We insert two level classification strategy, in first level RBFN categorize short messages as a neutral and non-neutral; in the second, Non-neutral messages are classified and correctness estimate are produced. In proposed system filtering rules are provided. FR’s are the rules in which user can stste what contents are not displayed on their walls. In addition the system used user defined Blacklists (BL’s). In which it makes lists of users that are temporarily prevented to post any type of messages on a user wall. Proposed system filters unwanted messages from OSN user walls. On the basis of message content and message creator relationship. II. LITERATURE SURVEY We are using Content based filtering and Policy based Personalisation for filtering unwanted or vulgar messages or text from users Online Social Networks (OSN) walls. So for that purpose we are surveying the literature in both fields. The Main motive of this paper is to implement an architecture which provides customized content based filtering for OSN’s, based on machine learning techniques. Our related work is related with both content based filtering and Policy based personalisation. For Example: In Facebook user states who is allowed to insert messages on their walls (like friends, friends of Friends and Groups of friends) but no content based filtering are supported. A. Content based Filtering: In content based filtering, each user is assumed to work separately. A content based filtering collects the information of items based on the relationship between the item’s content and the user choices. An electronic mail is well known example of Content based filtering. Only textual data is processed in content based filtering, Therefore content based filtering is closely similar to Text Classification. Content Based filtering is based on the use of machine learning paradigm. According to machine learning paradigm a classifier is automatically induced by learning from a sets of predefined examples. The Information Retrieval is presented by P.W. Foltz and S.T. Dumais [1].There is no information filtering in this approach.in our approach we are using information filtering. Information retrieval is very much similar to information filtering. filtering involves process of removing information from stream, while IR involves process of finding information in that stream. B. Policy Based Personalization: Policy based personalization is useful in different types of contexts. In Online Social Networking sites user defined policies can define how communication between two parties or more parties can handled. The policy based personalization mostly focuses the Twitter. It categorizes the each tweet and only shows those tweets which are of user’s interest. Policy based personalization shows the ability of use to filter unwanted messages based on filtering criteria suggested by him or the customized settings chosen by him B. Sriram, D.fuhry, E.Demir, H. Ferhatosmanogly, and M. Demirbas [2], our paper describes classification of tweets into general. our approach allows settings of filter rules according to a variety criteria’s described by him and classifies the text into various pre-defined sets of classes like various categories like sports, politics, Bollywood etc. L. Fang and K. LeFevre [3], this paper is related to privacy control but no facility for stopping anyone for
  • 2. Filter Unwanted Messages from Walls and Blocking Non-Legitimate Users in OSN (IJSRD/Vol. 3/Issue 10/2015/237) All rights reserved by www.ijsrd.com 1036 posting something on wall. Our approach can stop posting particular categories as per users choice. Fong, P.W.L., Anwar, M.M., Zhao, Z. [4], this paper describes policies such as topology based, history based. So that it is time consuming our approach presents content based filtering and Policy based personalization. III. PROPOSED SYSTEM From above literature survey we can conclude that there is no any prevention on post which is posted by friends or any person. So, if any person is not interested to see or to read specific category of messages then he cannot apply any filter on their walls. In this situation he can receive any type of messages.in our proposed system we apply prevention to messages by using or providing filtering rules. The main aim of system is to prevent or filter unwanted messages from user walls. In proposed system, filtering are supported by content based preferences. The main part of proposed system is content base message filtering(CBMF) and the short text classifier module. The second element that is short text classifier are used to categorize messages according to set of different categories. In comparison, the first element uses the message categorization provided by short text classifier to implement filtering rules specified by the user. For enhancing the filtering process Blacklist can also be used. Blacklists are the list of users which are temporarily prevented to post messages or text on user walls. In our system architecture we designed a filter to discard those messages which are vulgar in nature and prevented to be displayed on another users wall. If User1 wants to posts some content on someone’s wall then before it will display on that user wall, it will be checked that whether the content is vulgar, we have provided predefined dataset which include those words which are vulgar in nature. If User1 data matched to the dataset then this message is vulgar in nature so it cannot displayed on wall and that user who wants to write message will be blocked. This process is carried out through user defined rules and in some cases BlackList(BL) are also used. Fig. 1: System Architecture IV. CONCLUSION In our proposed system, Filtered wall is a system to prevent or filter unwanted or unnecessary messages from online social networks walls. This system approach decides when user should be inserted into a blacklist. Filtered wall has a wide variety of applications in OSN wall. In future, more work is needed on further improving the performance measures. REFERENCES [1] P.W. Foltz and S.T. Dumais, Personalized Information Delivery: An Analysis of Information Filtering Methods, Comm. ACM, vol. 35, no. 12, pp. 51- 60,1992. [2] Fong, P.W.L., Anwar, M.M., Zhao, Z., A privacy preservation model for facebook-style social network systems; In: Proceedings of 14th European Symposium on Research in Computer Security (ESORICS), pp. 303320, 2009. [3] Fang, L., LeFevre, K., Privacy wizards for social networking sites; In: WWW 10: Proceedings of the 19th international conference on World Wide Web,pp. 351360. ACM, New York, NY, USA, 2010. [4] B. Sriram, D. Fuhry, E. Demir, H. Ferhatosmanoglu, and M. Demirbas,Short Text Classi_cation in Twitter to Improve Information Filtering, Proc.33rd Intl ACM SIGIR Conf. Research and Development in Information Retrieval (SIGIR 10), pp. 841-842, 2010. [5] F. Sebastiani, “Machine Learning in Automated Text Categorization,”ACM Computing Surveys, vol. 34, no. 1, pp. 1-47, 2002. [6] M. Vanetti, E. Binaghi, B. Carminati, M. Carullo, and E. Ferrari,“Content-Based Filtering in On-Line Social Networks,” Proc.ECML/PKDD Workshop Privacy and Security Issues in Data Mining and Machine Learning (PSDML ’10), 2010.