Submit Search
Upload
Protect Social Connection Using Privacy Predictive Algorithm
•
0 likes
•
28 views
IRJET Journal
Follow
https://irjet.net/archives/V4/i2/IRJET-V4I2189.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
IRJET- A Novel Technique for Inferring User Search using Feedback Sessions
IRJET- A Novel Technique for Inferring User Search using Feedback Sessions
IRJET Journal
Ijcet 06 10_004
Ijcet 06 10_004
IAEME Publication
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET Journal
ENHANCED WEB IMAGE RE-RANKING USING SEMANTIC SIGNATURES
ENHANCED WEB IMAGE RE-RANKING USING SEMANTIC SIGNATURES
IAEME Publication
Adaptive Search Based On User Tags in Social Networking
Adaptive Search Based On User Tags in Social Networking
IOSR Journals
iaetsd Adaptive privacy policy prediction for user uploaded images on
iaetsd Adaptive privacy policy prediction for user uploaded images on
Iaetsd Iaetsd
A tutorial review of automatic image tagging technique using text mining
A tutorial review of automatic image tagging technique using text mining
eSAT Publishing House
IRJET- Classification and Filtration of Resources with Collaborative Tagging ...
IRJET- Classification and Filtration of Resources with Collaborative Tagging ...
IRJET Journal
Recommended
IRJET- A Novel Technique for Inferring User Search using Feedback Sessions
IRJET- A Novel Technique for Inferring User Search using Feedback Sessions
IRJET Journal
Ijcet 06 10_004
Ijcet 06 10_004
IAEME Publication
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET Journal
ENHANCED WEB IMAGE RE-RANKING USING SEMANTIC SIGNATURES
ENHANCED WEB IMAGE RE-RANKING USING SEMANTIC SIGNATURES
IAEME Publication
Adaptive Search Based On User Tags in Social Networking
Adaptive Search Based On User Tags in Social Networking
IOSR Journals
iaetsd Adaptive privacy policy prediction for user uploaded images on
iaetsd Adaptive privacy policy prediction for user uploaded images on
Iaetsd Iaetsd
A tutorial review of automatic image tagging technique using text mining
A tutorial review of automatic image tagging technique using text mining
eSAT Publishing House
IRJET- Classification and Filtration of Resources with Collaborative Tagging ...
IRJET- Classification and Filtration of Resources with Collaborative Tagging ...
IRJET Journal
IRJET- Analysis on Existing Methodologies of User Service Rating Prediction S...
IRJET- Analysis on Existing Methodologies of User Service Rating Prediction S...
IRJET Journal
IRJET- Analysis of Rating Difference and User Interest
IRJET- Analysis of Rating Difference and User Interest
IRJET Journal
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
Journal For Research
FACILITATING VIDEO SOCIAL MEDIA SEARCH USING SOCIAL-DRIVEN TAGS COMPUTING
FACILITATING VIDEO SOCIAL MEDIA SEARCH USING SOCIAL-DRIVEN TAGS COMPUTING
csandit
IRJET- A Literature Review and Classification of Semantic Web Approaches for ...
IRJET- A Literature Review and Classification of Semantic Web Approaches for ...
IRJET Journal
IRJET- Development of College Enquiry Chatbot using Snatchbot
IRJET- Development of College Enquiry Chatbot using Snatchbot
IRJET Journal
SIF IDM Profile Introduction
SIF IDM Profile Introduction
Richard Tong
Naresh sharma
Naresh sharma
Nishanthi Bheeman
IRJET- Scalable Content Aware Collaborative Filtering for Location Recommenda...
IRJET- Scalable Content Aware Collaborative Filtering for Location Recommenda...
IRJET Journal
User search goal inference and feedback session using fast generalized – fuzz...
User search goal inference and feedback session using fast generalized – fuzz...
eSAT Publishing House
Projection Multi Scale Hashing Keyword Search in Multidimensional Datasets
Projection Multi Scale Hashing Keyword Search in Multidimensional Datasets
IRJET Journal
Personalized web search using browsing history and domain knowledge
Personalized web search using browsing history and domain knowledge
Rishikesh Pathak
Image Search by using various Reranking Methods
Image Search by using various Reranking Methods
IRJET Journal
iCTRE: The Informal community Transformer into Recommendation Engine
iCTRE: The Informal community Transformer into Recommendation Engine
IRJET Journal
At4102337341
At4102337341
IJERA Editor
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
Richard Tong
Structural Balance Theory Based Recommendation for Social Service Portal
Structural Balance Theory Based Recommendation for Social Service Portal
YogeshIJTSRD
Business Intelligence
Business Intelligence
Athari_1996
Contextual model of recommending resources on an academic networking portal
Contextual model of recommending resources on an academic networking portal
csandit
CONTEXTUAL MODEL OF RECOMMENDING RESOURCES ON AN ACADEMIC NETWORKING PORTAL
CONTEXTUAL MODEL OF RECOMMENDING RESOURCES ON AN ACADEMIC NETWORKING PORTAL
cscpconf
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
IRJET Journal
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
IRJET Journal
More Related Content
What's hot
IRJET- Analysis on Existing Methodologies of User Service Rating Prediction S...
IRJET- Analysis on Existing Methodologies of User Service Rating Prediction S...
IRJET Journal
IRJET- Analysis of Rating Difference and User Interest
IRJET- Analysis of Rating Difference and User Interest
IRJET Journal
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
Journal For Research
FACILITATING VIDEO SOCIAL MEDIA SEARCH USING SOCIAL-DRIVEN TAGS COMPUTING
FACILITATING VIDEO SOCIAL MEDIA SEARCH USING SOCIAL-DRIVEN TAGS COMPUTING
csandit
IRJET- A Literature Review and Classification of Semantic Web Approaches for ...
IRJET- A Literature Review and Classification of Semantic Web Approaches for ...
IRJET Journal
IRJET- Development of College Enquiry Chatbot using Snatchbot
IRJET- Development of College Enquiry Chatbot using Snatchbot
IRJET Journal
SIF IDM Profile Introduction
SIF IDM Profile Introduction
Richard Tong
Naresh sharma
Naresh sharma
Nishanthi Bheeman
IRJET- Scalable Content Aware Collaborative Filtering for Location Recommenda...
IRJET- Scalable Content Aware Collaborative Filtering for Location Recommenda...
IRJET Journal
User search goal inference and feedback session using fast generalized – fuzz...
User search goal inference and feedback session using fast generalized – fuzz...
eSAT Publishing House
Projection Multi Scale Hashing Keyword Search in Multidimensional Datasets
Projection Multi Scale Hashing Keyword Search in Multidimensional Datasets
IRJET Journal
Personalized web search using browsing history and domain knowledge
Personalized web search using browsing history and domain knowledge
Rishikesh Pathak
Image Search by using various Reranking Methods
Image Search by using various Reranking Methods
IRJET Journal
iCTRE: The Informal community Transformer into Recommendation Engine
iCTRE: The Informal community Transformer into Recommendation Engine
IRJET Journal
At4102337341
At4102337341
IJERA Editor
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
Richard Tong
Structural Balance Theory Based Recommendation for Social Service Portal
Structural Balance Theory Based Recommendation for Social Service Portal
YogeshIJTSRD
Business Intelligence
Business Intelligence
Athari_1996
Contextual model of recommending resources on an academic networking portal
Contextual model of recommending resources on an academic networking portal
csandit
CONTEXTUAL MODEL OF RECOMMENDING RESOURCES ON AN ACADEMIC NETWORKING PORTAL
CONTEXTUAL MODEL OF RECOMMENDING RESOURCES ON AN ACADEMIC NETWORKING PORTAL
cscpconf
What's hot
(20)
IRJET- Analysis on Existing Methodologies of User Service Rating Prediction S...
IRJET- Analysis on Existing Methodologies of User Service Rating Prediction S...
IRJET- Analysis of Rating Difference and User Interest
IRJET- Analysis of Rating Difference and User Interest
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
FACILITATING VIDEO SOCIAL MEDIA SEARCH USING SOCIAL-DRIVEN TAGS COMPUTING
FACILITATING VIDEO SOCIAL MEDIA SEARCH USING SOCIAL-DRIVEN TAGS COMPUTING
IRJET- A Literature Review and Classification of Semantic Web Approaches for ...
IRJET- A Literature Review and Classification of Semantic Web Approaches for ...
IRJET- Development of College Enquiry Chatbot using Snatchbot
IRJET- Development of College Enquiry Chatbot using Snatchbot
SIF IDM Profile Introduction
SIF IDM Profile Introduction
Naresh sharma
Naresh sharma
IRJET- Scalable Content Aware Collaborative Filtering for Location Recommenda...
IRJET- Scalable Content Aware Collaborative Filtering for Location Recommenda...
User search goal inference and feedback session using fast generalized – fuzz...
User search goal inference and feedback session using fast generalized – fuzz...
Projection Multi Scale Hashing Keyword Search in Multidimensional Datasets
Projection Multi Scale Hashing Keyword Search in Multidimensional Datasets
Personalized web search using browsing history and domain knowledge
Personalized web search using browsing history and domain knowledge
Image Search by using various Reranking Methods
Image Search by using various Reranking Methods
iCTRE: The Informal community Transformer into Recommendation Engine
iCTRE: The Informal community Transformer into Recommendation Engine
At4102337341
At4102337341
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
Structural Balance Theory Based Recommendation for Social Service Portal
Structural Balance Theory Based Recommendation for Social Service Portal
Business Intelligence
Business Intelligence
Contextual model of recommending resources on an academic networking portal
Contextual model of recommending resources on an academic networking portal
CONTEXTUAL MODEL OF RECOMMENDING RESOURCES ON AN ACADEMIC NETWORKING PORTAL
CONTEXTUAL MODEL OF RECOMMENDING RESOURCES ON AN ACADEMIC NETWORKING PORTAL
Similar to Protect Social Connection Using Privacy Predictive Algorithm
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
IRJET Journal
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
IRJET Journal
A Review on User Personalized Tag Based Image Search by Tag Relevance
A Review on User Personalized Tag Based Image Search by Tag Relevance
IRJET Journal
IRJET-A Review on User Personalized Tag Based Image Search by Tag Relevance
IRJET-A Review on User Personalized Tag Based Image Search by Tag Relevance
IRJET Journal
IRJET- Hybrid Recommendation System for Movies
IRJET- Hybrid Recommendation System for Movies
IRJET Journal
Detection of Behavior using Machine Learning
Detection of Behavior using Machine Learning
IRJET Journal
Recommendation System using Machine Learning Techniques
Recommendation System using Machine Learning Techniques
IRJET Journal
Image based search engine
Image based search engine
IRJET Journal
A Survey on Recommendation System based on Knowledge Graph and Machine Learning
A Survey on Recommendation System based on Knowledge Graph and Machine Learning
IRJET Journal
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking Websites
IRJET Journal
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijripublishers Ijri
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
IRJET Journal
Visual Relation Identification Using BoFT Labels in Social Media Feeds
Visual Relation Identification Using BoFT Labels in Social Media Feeds
IRJET Journal
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
IRJET Journal
Face Annotation using Co-Relation based Matching for Improving Image Mining ...
Face Annotation using Co-Relation based Matching for Improving Image Mining ...
IRJET Journal
An Efficient Content, Collaborative – Based and Hybrid Approach for Movie Rec...
An Efficient Content, Collaborative – Based and Hybrid Approach for Movie Rec...
ijtsrd
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image Segmentation
IRJET Journal
Image Based Information Retrieval Using Deep Learning and Clustering Techniques
Image Based Information Retrieval Using Deep Learning and Clustering Techniques
IRJET Journal
Image Based Information Retrieval Using Deep Learning and Clustering Techniques
Image Based Information Retrieval Using Deep Learning and Clustering Techniques
IRJET Journal
Challenges Faced by Novices While Developing and Designing the Visualization ...
Challenges Faced by Novices While Developing and Designing the Visualization ...
IRJET Journal
Similar to Protect Social Connection Using Privacy Predictive Algorithm
(20)
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
A Review on User Personalized Tag Based Image Search by Tag Relevance
A Review on User Personalized Tag Based Image Search by Tag Relevance
IRJET-A Review on User Personalized Tag Based Image Search by Tag Relevance
IRJET-A Review on User Personalized Tag Based Image Search by Tag Relevance
IRJET- Hybrid Recommendation System for Movies
IRJET- Hybrid Recommendation System for Movies
Detection of Behavior using Machine Learning
Detection of Behavior using Machine Learning
Recommendation System using Machine Learning Techniques
Recommendation System using Machine Learning Techniques
Image based search engine
Image based search engine
A Survey on Recommendation System based on Knowledge Graph and Machine Learning
A Survey on Recommendation System based on Knowledge Graph and Machine Learning
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking Websites
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
Visual Relation Identification Using BoFT Labels in Social Media Feeds
Visual Relation Identification Using BoFT Labels in Social Media Feeds
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
Face Annotation using Co-Relation based Matching for Improving Image Mining ...
Face Annotation using Co-Relation based Matching for Improving Image Mining ...
An Efficient Content, Collaborative – Based and Hybrid Approach for Movie Rec...
An Efficient Content, Collaborative – Based and Hybrid Approach for Movie Rec...
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image Segmentation
Image Based Information Retrieval Using Deep Learning and Clustering Techniques
Image Based Information Retrieval Using Deep Learning and Clustering Techniques
Image Based Information Retrieval Using Deep Learning and Clustering Techniques
Image Based Information Retrieval Using Deep Learning and Clustering Techniques
Challenges Faced by Novices While Developing and Designing the Visualization ...
Challenges Faced by Novices While Developing and Designing the Visualization ...
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
RajkumarAkumalla
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
ranjana rawat
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
SIVASHANKAR N
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Suman Mia
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
pranjaldaimarysona
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
DeelipZope
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Asutosh Ranjan
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
ssuser5c9d4b1
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Recently uploaded
(20)
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Internship report on mechanical engineering
Internship report on mechanical engineering
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Protect Social Connection Using Privacy Predictive Algorithm
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1 Divya Raj1, Harsha Annie Babu2, Jerin Iducula Thomas3, Jomal James4 Ghilby Varghese Jaison5 Student of Computer Science & Engineering,MBCCET,Peermade,kerala,India[1],[2],[3]&[4] Professor, MBCCET,Peermade,kerala , India[5] ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - With the expanding volume of pictures clients share through social destinations, keeping up privacy has turned into a noteworthy problem, as showed by a current rush of broadcasted episodes whereclientsincidentallyshared individual data. We propose an Adaptive Privacy Policy Prediction framework to help clientsformsecuritysettingsfor their pictures. A recommendation system is conceivableinour venture. In suggestion framework the mutual pictures can prescribe for different companions if necessary, however the prescribed client can just view the pictures impractical to download it. In Adaptive Privacy Policy Prediction the client can see the pictures in light of substance, companions and metadata. Client can likewise remark the mutualpictures. Itis conceivable to hinder the other client who remarked the picture as low standard. Key Words: Security, proposal framework, social destinations, metadata. 1.INTRODUCTION Online networking is a two way correspondence. It intends to impart, impart and collaborate to an individual or with a huge gathering of people. Long range interpersonal communication destinations are the most well-known locales on the web and a great many individuals utilizethem to associate with other individuals.Onthesesocial sitesmost shared substance is pictures. Clientofthissitetransferstheir pictures on the sites and furthermore impartsthesepictures to other individuals. The sharing of pictures depends on the gathering of individuals he/she knows, group of friends or open and private environment. Now and again pictures may contain the touchy data. For instance, considera photograph of family capacity. It could be imparted to a Google+ circle or Flicker gather, yet may pointlessly open to the school companions. In this manner, the sharing of pictures online destinations prompt toa security infringement.Theconstant way of online media, can brings aboutanabuseofone'sclose to home data and its social surroundings. Most substance sharing sites permit clients to enter their protection inclinations. Shockingly, late reviews have demonstrated that clients battle to set up and keep up such protection settings. One of the primary reasons gave is that, in given the measure of shared data this procedure can be monotonous and mistake inclined. This manner, many have recognized the need of approach proposal frameworks which can help clients to effortlessly and legitimately configure security settings. Be that as it may, existing proposition for robotizing protection settings give off an impression of being deficient to address the one of a kind security needs of pictures because of the measure of data certainly conveyed inside pictures, and their association with the online environment wherein they are uncovered. In this paper, we propose an Adaptive Privacy Policy Prediction (A3P) framework which gives client advantageous protection settings via naturally creating customized arrangements. The A3P framework handles client transferred pictures and calculates the accompanying criteria that impact ones protection settings of pictures:The effect of social environment and individual characteristics: users' social surroundings, for example, their profile data and association with different clients give helpful data in regards to the clients' security inclinations. Likewise, for a similar kind of pictures clientshaveanalternatesupposition. So it is critical to discover the adjusting indicate between these two anticipate the strategies that match every individual's needs. The part of pictures substance and metadata. In general, comparative pictures regularly bring about comparativeprotectioninclinations,particularlywhen individuals show up in the pictures. Examining the visual substance may not be adequate to catch clients' security inclinations. Labels and other metadata are characteristic of the social setting of the picture, including whereit wastaken and why and furthermore give an engineered portrayal of pictures, supplementing the data got from visual substance investigation. 2. RELATED WORK Some past frameworks demonstrates distinctive reviews on consequently appoint the protection settings. One such framework which Bonneau et al.[ 5] proposeddemonstrates the idea of security suites. The protection "suites" suggests the client's security setting with the assistance of master clients. The master clients are trusted companions who effectively set the settings for the clients. Also, Danesiz [2] proposed a programmed protection extraction framework with a machine taking in approach from the information created from the pictures. In light of the idea of "groups of friends" i.e framing bunches of companions was proposed by Adu-Oppong et al. Protect Social Connection Using Privacy Predictive Algorithm
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 979 [3]Prediction of the clients protection inclinations for area based information (i.e., share the area or no) was contemplated by Ravichandran et. Al[4]. This was done on the premise of time and location. The investigation of whether the watchwords and inscriptions utilized for labeling the clients photographs can be utilized all the more proficiently to make and keep up get to control strategies was finished by Klemperer et al. Chen et al. proposed a framework named Sheep Dog to consequently embed photographs into proper gatherings and prescribe appropriate labels for clients on Flickr. They receive idea identification to anticipate pertinent ideas (labels) of a photograph. In view of some current data from Flickr, they utilized a positioning based technique which is connected to acquire dependablepreparinginformationand to give sensible gathering/label suggestions for information photographs. Choudhury et al[8]. proposed a suggestion system to interface picture content with groups in online web-based social networking. They describe pictures through three sorts of components: visual elements, client produced content labels, and social connection, from which they prescribe the probably amasses for a given picture. At that point they utilize the model learning, pack of- components based representations of the gatherings are created and a model is learnt to speak to the gatherings in an inert space. There is additionally an expansive group of work on the customization and personalization of label based data recovery, which uses methods, for example, affiliation govern mining. For example, Bonneau [5] proposes an intriguing exploratory assessment of a few collective separating calculations to prescribe bunches for Flickr clients. They display a probabilistic inert subjectmodel in an incorporated structure, hoping to together find the idle premiums for clients and bunches and all the while take in the suggestion work. Tag Based Access Control of Data is a framework that makes get to control arrangements from photograph administration labels. Each photograph isfused with a get to matrix for mapping the photograph with the member's companions. The members can choose an appropriate inclination and get to the data. Photograph labels can be sorted as authoritative or open in view of the client needs. There are a few imperative impedimentstoour review plan. To begin with, our outcomes are restricted by the members we selected and the photographs they gave. A moment set of restrictions concerns our utilization of machine created get to control rules. The calculation has no entrance to the unique situation and importance of labels and no knowledge into the approach the member planned when labeling for get to control.Each photograph is fused with a get to matrix for mapping the photograph with the member's companions. The members can choose an appropriate inclination and get to the data. Photograph labels can be sorted as authoritative or open in view of the client needs. There are a few imperative impedimentstoour review plan. To begin with, our outcomes are restricted by the members we selected and the photographs they gave. A moment set of restrictions concerns our utilization of machine created get to control rules. The calculation has no entrance to the unique situation and importance of labels and no knowledge into the approach the member planned when labeling for get to control. Accordingly, a few guidelines seemed abnormal or discretionary to the members, conceivably driving them toward unequivocal strategy based labels like "private" and "open". To naturally identify private pictures and to empower protection arranged picture look Privacy Aware Image Classification and Search L.Church [5] consolidates literary meta information pictures with assortment of visual elements to give security approaches. In this the chose picture highlights (edges, confronts, shading histograms) which can help separate amongst normal and artificial articles/scenes (the EDCV include) thatcandemonstrate the nearness or nonattendanceofspecificitems(SIFT).Itutilizes different order models prepared on a vast scale datasetwith security assignments acquired through a social comment diversion. Social Circle, A.Kapadia[6] gives an electronic answer for secure individual data. The strategy named Social Circles Finder naturally creates the companion's rundown. It is a method that investigations the group of friends ofa manand distinguishes the power of relationship and subsequently groups of friends give an important arrangement of companions for setting security strategies. The application will recognize the groups of friends of the subject however not indicate them to the subject. The subject will then be made inquiries about their readiness to share a bit of their own data. In light of the appropriate responses the application finds the visual chart of clients. 3. FRAMEWORK REVIEW The A3P framework comprises of two fundamental segments: A3P-core and A3P-social.Thegeneral information flow is the accompanying. At the point when a client transfers a picture, the picture will be first sent to the A3P- core. The A3P-core classifies the picture and figures out if there is a need to conjure the A3P-social. As a rule, the A3P- core predicts approaches for the clients specifically in view of their verifiable conduct. In the event that one of the accompanying two cases is verified valid, A3P-core will summon A3Psocial: (i) The client does not have enough information for the kind of the transferred picture to direct arrangement forecast; (ii) The A3P-core distinguishes the current significant changes among the client's group about their protection rehearses alongside client's expansion of long range interpersonal communication exercises (expansion of new companions, new posts on one's profile and so on).
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 980 In above cases, it would be beneficial to answer to the client the most recent security routine of social groups that have comparative foundation as the client. The A3P-social gatherings clients into social groups withcomparativesocial setting and security inclinations, and constantly screens the social gatherings. At the point when the A3P-social is summoned, it consequentlyidentifiesthesocial gathering for the client and sends back the data about the gathering to the A3P-core for approach forecast. Toward the end, the anticipated strategy will be shown to the client. On the off chance that the client is completely satisfied by the anticipated approach, he or she can simply acknowledge it. Something else, the client can reconsider the approach. The real approach will be put away in the strategy store of the framework for the arrangement forecast of future transfers. The arrangement proposal handle in view of the social gatherings that a client transferred another picture and the A3P-center summoned the A3P-social for strategy suggestion. The A3P-social will locate the social gathering which is most like client and after that pick the delegate client in the social gathering alongside hispicturesto besent to the A3P-Core strategy forecast module to create the prescribed arrangement for client.Giventhatthe quantityof clients in informal organization might be immense and that clients may join countless gatherings, it would be exceptionally tedious to look atthenewclient'ssocial setting qualities against the regular example of every social gathering. With a specific end goal to accelerate the gathering recognizableproof processandguaranteesensible reaction time, we use the transformed record structure to arrange the social gathering data. The rearranged record maps watchwords (estimations of social setting property) happening in the incessant examples to thesocial gatherings that contain the catchphrases. In particular, in first sort the catchphrases (aside from the social association) in the successive examples in an in sequential orderarrange.Every catchphrase is related with a connection rundown which stores social gathering ID andpointerstothenittygritty data of the social gathering. In image classification pictures are grouped in light of their content and after that refine every classification into subcategories in view of their metadata. In content based picture order we consider spatial data of pictures, for example, picture shading, estimate, shape, surface, symmetry, and so forth. In metadata based order we first concentrate catchphrases from the metadata related with a picture. That is we recognize every one of the things, verbs and descriptive words in the metadata and store them inthe metadata vector. Additionally we tallyitsrecurrence. What's more, toward the end we discovera subcategorythatpicture has a place with. For this we figure the separation amongst picture and subcategory is registered as a weighted aggregate of alter separation between relating pair of agent hypernym. The arrangement expectationgivesananticipatedstrategy of a recently transferred picture to the client for his/her reference. Theforecastprocedurecomprisesoftwoprinciple stages: (i) strategy mining;and(ii)arrangementexpectation. Strategy mining utilizes progressive approach which is completed in three stages. In initial step we search for well known subjects characterized by client that is in a similar classification of the new picture we direct affiliation govern mining regarding the matter segment of strategies and signify such strategy. In second step we search for the prevalent activities in the approach containing mainstream subjects that is in every strategy, we lead affiliation administer mining on the activity part. Furthermore,inthird step we search for well known conditions in the arrangement containing both famous subjects and conditions.Strategy expectationcharacterizesthe prescribed arrangement to the client. Client can choose one of the arrangements he is settled upon and that approach is connected to that picture. A3P social produces the agent approaches by utilizing data identified with client's social setting. A3P core summons the A3P social in two cases: (i) The client does not have enough data for the kind of the transferred picture (ii) There are late real changes in the client's group. Social setting catch the normal social components of client and recognizegroupsframedbyclients with comparative security concerns. In the initial step it shows every client's social setting as a rundown of qualities and in the second step we amass the client depends on the recognized elements. At that point we locate the social gathering which is most like client and after that pick the agent client. For that reason we utilize altereddocumentlist. Next, given new client, we seek his trait values in the modified document and acquire an arrangement of competitor social gatherings. We additionally check thequantityofeventsofthehopeful gathering amid the inquiry. We select the hopeful gathering
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 981 with the most elevated event as the social gathering for the new client. We can look the picture either class shrewd or in light of the substance of that picture.Atthepoint whenclient transfer a picture or enter a classification to scan a picture then for a similar picture or class, we first consider the contact rundown of that picture. In contact list we can consider the companions, relatives of the client. After that we check the blocking status of every companion in the contact list. After that we check the security level of every last client for a similar picture. Toward the end we consider the arrangement which we gave to see the picture is shown to the asked for client or not. At that point we get the last consequence of the inquiry picture. We assess the viability of our A3P framework as far as the strategy expectation precision and client adequacy.TheA3P was executed as a Java file inserted in an open source content administration site, sent utilizing an Apache server. Encourage, we contrast the A3Pcore and two variations of itself, keeping in mind the end goal to assess the commitment of every segment in the A3P-center made for protection forecast. The first variationutilizesjustsubstance based picture classification took after by our arrangement mining calculation. The second variation utilizes just label classification took after by the sLater on our framework can productively tag different clients on the premise of their file rate utilizing machinelearning.trategymining,indicated .We finish this test on the second informational index of more than 2,000 pictures. The objective is to examine whetherthe distinctive populace, and the heterogeneousarrangement of pictures from the second informational collectioninfluences the nature of the forecast. Additionally, this informational index is portrayed by a superior meta-information, as manual assessment uncovered that the user entered labels are altogether finished, important and withlittlelanguage or utilization of stop words inside them. We likewise tried the quality accomplished by A3P-center on the off chance that labels just were utilized, since the past trial demonstrated that labels had little pertinence for the forecast reason. A3P- center performed well, and demonstrated an exactness like the past analysis. We take note of that the precision per client ran from 85 to 100 percent. 3. CONCLUSION AND FUTURE WORK We have proposed an Adaptive Privacy Policy Prediction (A3P) framework that helps clients automace the security approach settings for their transferred pictures. The A3P framework gives a far reaching system to surmise security inclinations in view of the data accessible for a given client. We likewise successfully handled the issue of frosty begin, utilizing social setting data. The A3P framework gives a structure to deduce protection inclinations in light of the data accessible for a given user. The test ponder demonstrates that the A3P is a functional device that offers significant changes over current ways to deal with security. Later on our framework can productively tag different clients on the premise of their index rate utilizing machine learning . REFERENCES [1] H.-M. Chen, M.-H. Chang, P.-C. Chang, M.-C. Tien, W. H. Hsu, and J.-L. Wu, “Sheepdog: Group and tag recommendation for flickr photos by automatic search- based learning,” in Proc. 16thACMInt.Conf.Multimedia, 2008, pp. 737–740. [2] J. Bonneau, J. Anderson, and G. Danezis, “Prying data out of a social network,” in Proc. Int. Conf. Adv. Soc. Netw. Anal. Mining., 2009, pp.249–254. [3] A. Kapadia, F. Adu-Oppong, C. K. Gardiner, and P. P. Tsang, “Social circles: Tackling privacy in social networks,” in Proc. Symp. UsablePrivacySecurity,2008. [4] R. Ravichandran, M. Benisch, P. Kelley, and N. Sadeh, “Capturing social networking privacy preferences,” in Proc. Symp. Usable Privacy Security, 2009. [5] Bonneau, J. Anderson, and L. Church, “Privacy suites: Shared privacy for social networks,” in Proc. Symp. Usable Privacy Security, 2009. [6] A. Kapadia, F. Adu-Oppong, C. K. Gardiner, and P. P. Tsang, “Social circles: Tackling privacy in social networks,” in Proc. Symp. UsablePrivacySecurity,2008. [7] K. Lerman, A. Plangprasopchok, and C. Wong, “Personalizing image search resultsonflickr,”CoRR,vol. abs/0704.1676, 2007. [8] M. D. Choudhury, H. Sundaram, Y.-R. Lin, A. John, and D. D. Seligmann, “Connecting content to community in social media via image content, user tags and user communication,” in Proc. IEEE Int. Conf. Multimedia Expo, 2009, pp.1238–1241.
Download now