SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 678 – 683
_______________________________________________________________________________________________
678
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
0Cross-Site Bonding of Anonymous Users in Multiple Social Media Networks
0
Ambresh Bhadra Shetty
Assistant Professor,
Dept. of Studies in Computer Applications (MCA),
Visvesvaraya Technological University,
Centre for PG studies, Kalaburagi
ambresh.bhadrashetty@gmail.com
Pooja Guttedar
Student,MCA VI Semester,
Dept. of Studies in Computer Applications (MCA),
Visvesvaraya Technological University,
Centre for PG studies, Kalaburagi
poojadg666@gmail.com
Abstract: From last few years many online Social Media Networks (SMN) platforms came into existence only those users who connected
through similar site network can communicate each other by exchanging their information. For example, a Facebook user can connect only
with Facebook user not with cross site user like Twitter so to connect users through multiple cross site network we have introduced a new
social networking site calledCross platform network. Cross platform is a site which helps people to connect with huge number of different
online Social Media Networks such as Facebook, Twitter,and Wechat. Using Cross platform networkpeople can communicate each other by
exchanging the information from different sites.
Keywords: Similar Site, Cross Site, Social Media Network
__________________________________________________*****_________________________________________________
I. INTRODUCTION
Social Networks are one of the highest growing
industries in the world Social Networking sites such as
Facebook, Twitter, Wechat, Instagram are extremely a
powerful communication tools. Most of people think that
using these social media network they can communicate
each other easily and also it helps to run a successful
business.
Twitter is an online news and social networking service
where users post and interact with messages, "Tweets",
restricted to 140 characters [1]. Registered users can post
tweets, but those who are unregistered can only read them.
Based on the number of active users Facebook is
considered as most popular social networking sites in the
world. It has totally 2billion monthly users. Users of age
between 13 to 18 are consideredas minors therefore their
profiles are set to share with friends only. On year of 2010
Facebook has announced with domain name called fb.com
from American Farm Bureau Federation. It allow people to
share information like pictures, video’s what we have been
up to with friends.
In cross platform network they have proposed an
algorithm called Friend Relationship-Based User
Identification(FRUI). FRUI computes a match degree for all
hopeful User Matched Pairs (UMPs), and just UMPs with
top positions are considered as indistinguishable clients. We
likewise created two recommendations to enhance the
productivity of the calculation. Aftereffects of broad
investigations show that FRUI performs much superior to
anything current system structure-based calculations.
Cross-Platform research faces many new challenges. As
shown in Fig. 1, with the growth of different SMN platforms
on the Internet, the cross-platform approach is used to merge
as various SMN to create richer raw data and more complete
SMNs for social computing tasks. The main purpose of
using cross-platform SMN research is for identification of
users in multiple SMNs. Many studies have addressed the
user identification problem by examining public user profile
attributes, including screen name, birth- date, location,
gender, profile photo, etc. [4], [5], [7], [8], [9]. Since these
attributes are not used by any fake users. Cross platform
encompasses of the two groupings: The single-following
and the mutual-following associations. : The first one can
also be referred to as the tracking up of the associations or
the relations. It can be explained as: when the user with A
as name tag along the user with name B, in this case it is
considered as the A and the B user will be having the
tracking relationship, where one is known by the other but
the same thing is not with the other. This type of following
is seen in the SMNs relating to micro-blogging that takes in
Twitter. While the mutual-following associations are said to
be as friend associations, in which SMNs related to micro-
blogging they refer to commonly tracking associations
amongst the two users.
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 678 – 683
_______________________________________________________________________________________________
679
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Fig 1: Cross-application research to merge a variety of SMN’s
II. LITERATURE SURVEY
In year of 2011 B. Zhou and J. Pei introduced a technique
called the k-anonymity and l-diversity approaches to
provide privacy for different social networks to maintain
data privately by providing security. Because many online
social networks has lead to the problem of leaking
confidential information of individual person. This
requires a preservation of privacy before that network
data has introduced by service provider. Providing
privacy in different social networks has a one of most
important concern. Many published academics studies
have proposed solution for providing privacy but those
technique have not worked properly to overcome this
problem they have proposed a new technique called The
k-anonymity and l-diversity to maintain privacy [3].
In year of 2013 P. Jain and P. Kumaraguruhas developed
Finding Nemo, it is a method which matches accounts
called Facebook and Twitter. However,this text based
network search method has low accuracy and high
complexity in term of user identification,since only text of
same nick name are recognized while searching the friend
sets of friends [5].
In 2013 O.Goga linked accounts belonging to the same
person identity, based solely on the profile information.
Organization has started to collect a personal data of user
who generates their day to day activities through online.
In this work we need to set the capabilitiesmachine
learning to link aindependent accounts to maintain users
in different social networks. Based on that information
users provide their profiles publicly. Large scale
correlation approach helps to match account
betweendifferent social networks such as Twitter,
Facebookand Google+. In result it shows user names, real
names, location, photos using this information we can
identify 80% of the matching user account between
combinations of any two social networks [8].
Inyear of 2014 X. Qian et al. introduced a method called
Personalized Recommendation to combine the users based
on their interest and social circle. With the appearance and
notoriety of interpersonal organization, an ever increasing
number of clients get a kick out of the chance to share their
encounters, for example, evaluations, audits, and online
journals. The new factors of informal organization like
relational impact and intrigue in light of friend networks
bring openings and difficulties for recommender system
(RS) to tackle the cool begin and sparsity issue of datasets.
A portion of the social factors have been utilized as a part of
RS, yet have not been completely considered. In this paper,
three social variables, individual intrigue, relational intrigue
comparability, and relational impact, meld into a bound
together customized proposal demonstrate in light of
probabilistic grid factorization. The factor of individual
intrigue can make the RS prescribe things to meet clients'
distinctions, particularly for experienced clients. Also, for
chilly begin clients, the relational intrigue comparability and
relational impact can improve their connection among
highlights in the dormant space [10].
III. PROBLEM DEFINITION
The problem can be defined as in the existing we can send
or receive friend requests only to the person if he or she
holds an account in the same social networking site, for
example consider a person A who has an account in
Facebook and another person B has an account in Twitter,
now A cannot send
friend request to B because A & B are in different social
networking sites. To overcome this we are
designing a Cross-Site where in which the users of different
social networking sites can send or receive friend requests
with each other.
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 678 – 683
_______________________________________________________________________________________________
680
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
III. ARCHITECTURE
In above Fig 2 cross site management server list all users
and authorize the register user to get login to
corresponding networks after that the user has to view his
own profile and send request to make friends with cross
site and also he can add posts like title, description, image
in both cross site as well as in same site. To make friends
in cross site admin has to give permission then only the
user can send request to cross site user. Here admin list all
friends from cross site and similar site network andview
all user posts with image description and finally chart
results to count number of users in same site and cross site
will be displayed.
IV. IMPLEMENTATION
FRUI ALGORITHM:
In this study, we propose an innovative approach to address
the challenges faced by previous studies. This new approach
focuses on the friendship structure, and develops the Friend
Relationship-based User Identification (FRUI) algorithm.
FRUI differs from the two existing algorithms, JLA and NS,
in the following aspects
(1) NS is suitable for directed networks, while JLA and
FRUI focus on undirected networks. JLA is restricted in
undirected networks by Conditional
Random Fields, while FRUI relies on friend relationships, as
this is more reliable and consistent with real-life friendship.
(2) JLA compares unmapped neighbors of nodes from one
of the two SMNs, while NS matches unidentified usersfrom
different networks by
comparing the mapped neighbors of each node. FRUI aims
to identify the most matched pairs among mapped users, but
does not iterate unmapped users. Therefore, it markedly
reduces computational complexity.
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 678 – 683
_______________________________________________________________________________________________
681
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
V. RESULTS
Fig 3:All User and Authorize
In Fig. 3 admin is giving permission to the userto login into system after giving permission the status will be changed from
waiting to authorized
Fig 4: All Friend Request and Response
In Fig. 4 admin can view all friend request and response with respect to name of a person and social site
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 678 – 683
_______________________________________________________________________________________________
682
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Fig 5: Search Friends in Cross Site
In Fig. 5 user can search friends from cross site and send request to a particular person
Fig 6: Graph Result
In Fig. 6 graph result will display based on connected users that may either same site and cross site
VI. CONCLUSION
In this study we have designed new solution called
cross platform to identify unknown users across multiple
social media networks. We also developed a new method
called friend relationship based user identification (FRUI).
FRUI helps to computes a match degree for all hopeful User
Matched Pairs (UMPs), and UMPs with top positions are
considered as indistinguishable clients. Using this method
user can connect easily though different cross site network.
REFERENCES
[1] X. Ying and X. Wu, “Randomizing social networks: a
spectrum preserving approach”, 24, 26 April 2008.
[2] I. Konstas, V. Stathopoulos, and J.M. Jose, “On social
networks and recommendation “, 19-23 July 2009.
[3] B. Zhou and J. Pei, “The k-anonymity and l-diversity
approaches for privacy preservation in social networks
against neighborhood attacks”, 1 July 2011.
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 678 – 683
_______________________________________________________________________________________________
683
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
[4] F. Abel, E. Herder, G.J. Houben, “Cross-system user
modeling and personalization on the social web”, 23 April
2012.
[5] P. Jain and P. Kumaraguru, "Finding Nemo: searching and
re-solving identities of users across online social
networks”, 26 Dec 2012.
[6] X. Kong, J. Zhang, and P.S. Yu, “Inferring anchor links
across multiple heterogeneous social networks”, 11 Dec
2013.
[7] R. Zafarani and H. Liu, "Connecting users across social
media sites: a behavioral-modeling approach "11-14
August 2013
[8] O. Goga, D. Perito, H. Lei, R. Teixeira, and R. Sommer,
"Large-scale Correlation of Accounts across Social
Networks”, April 2013.
[9] P. Jain, P. Kumaraguru, and A. Joshi, "@ i seek 'fb. me':
identifying users across multiple online social networks",
13 May 2013.
[10] X. Qian, H. Feng, G. Zhao, and T. Mei, "Personalized
Recommendation Combining User Interest and Social
Circle", 7July 2014.
[11] S. Tan, Y. Li, H. Sun, Z. Guan, X. Yan, J. Bu, C. Chen, and
X. He, "Interpreting the Public Sentiment Variations on
Twitter", 5 May 2014.

More Related Content

What's hot

Integrating social media into your marketing
Integrating social media into your marketingIntegrating social media into your marketing
Integrating social media into your marketingzingopen
 
Authentication and Verification of Social Networking Accounts Using Blockchai...
Authentication and Verification of Social Networking Accounts Using Blockchai...Authentication and Verification of Social Networking Accounts Using Blockchai...
Authentication and Verification of Social Networking Accounts Using Blockchai...AIRCC Publishing Corporation
 
The State of Social Media in Vietnam
The State of Social Media in VietnamThe State of Social Media in Vietnam
The State of Social Media in Vietnamzingopen
 
Evolving social data mining and affective analysis
Evolving social data mining and affective analysis  Evolving social data mining and affective analysis
Evolving social data mining and affective analysis Athena Vakali
 
Social media mining PPT
Social media mining PPTSocial media mining PPT
Social media mining PPTChhavi Mathur
 
Adecco global recruiters research 2014
Adecco global recruiters research 2014Adecco global recruiters research 2014
Adecco global recruiters research 2014Adecco RU
 
Marketing over social media networks
Marketing over social media networksMarketing over social media networks
Marketing over social media networksghayth ali
 
Internet magazines practical tips for improving website traffic
Internet magazines  practical tips for improving website trafficInternet magazines  practical tips for improving website traffic
Internet magazines practical tips for improving website trafficHamideh Iraj
 
Third parties are actively seeking out end-user information using Facebook
Third parties are actively seeking out end-user information using FacebookThird parties are actively seeking out end-user information using Facebook
Third parties are actively seeking out end-user information using FacebookDaniel Ilunga
 
IRJET- Private Social Media and Data Security
IRJET- Private Social Media and Data SecurityIRJET- Private Social Media and Data Security
IRJET- Private Social Media and Data SecurityIRJET Journal
 
Social Media Define the Era in Digital Media
Social Media Define the Era in Digital MediaSocial Media Define the Era in Digital Media
Social Media Define the Era in Digital Mediainventionjournals
 
Significant factors for Detecting Redirection Spam
Significant factors for Detecting Redirection SpamSignificant factors for Detecting Redirection Spam
Significant factors for Detecting Redirection Spamijtsrd
 
MSLGROUP China whitepaper: We Chat about WeChat
MSLGROUP China whitepaper: We Chat about WeChatMSLGROUP China whitepaper: We Chat about WeChat
MSLGROUP China whitepaper: We Chat about WeChatLeslie Lin
 
Social Networking Intro
Social Networking IntroSocial Networking Intro
Social Networking IntroSena Loyd
 
News construction from microblogging post using open data
News construction from microblogging post using open dataNews construction from microblogging post using open data
News construction from microblogging post using open dataFrancisco Berrizbeitia
 
Research on how_facebook_industry_is_using_data_mining_by_shafiu_umar_abubaka...
Research on how_facebook_industry_is_using_data_mining_by_shafiu_umar_abubaka...Research on how_facebook_industry_is_using_data_mining_by_shafiu_umar_abubaka...
Research on how_facebook_industry_is_using_data_mining_by_shafiu_umar_abubaka...ShafiuUmar1
 

What's hot (19)

Integrating social media into your marketing
Integrating social media into your marketingIntegrating social media into your marketing
Integrating social media into your marketing
 
Authentication and Verification of Social Networking Accounts Using Blockchai...
Authentication and Verification of Social Networking Accounts Using Blockchai...Authentication and Verification of Social Networking Accounts Using Blockchai...
Authentication and Verification of Social Networking Accounts Using Blockchai...
 
Capsm twitter study 2010
Capsm twitter study 2010Capsm twitter study 2010
Capsm twitter study 2010
 
linkedin report
linkedin reportlinkedin report
linkedin report
 
The State of Social Media in Vietnam
The State of Social Media in VietnamThe State of Social Media in Vietnam
The State of Social Media in Vietnam
 
Evolving social data mining and affective analysis
Evolving social data mining and affective analysis  Evolving social data mining and affective analysis
Evolving social data mining and affective analysis
 
Social media mining PPT
Social media mining PPTSocial media mining PPT
Social media mining PPT
 
Adecco global recruiters research 2014
Adecco global recruiters research 2014Adecco global recruiters research 2014
Adecco global recruiters research 2014
 
Marketing over social media networks
Marketing over social media networksMarketing over social media networks
Marketing over social media networks
 
Internet magazines practical tips for improving website traffic
Internet magazines  practical tips for improving website trafficInternet magazines  practical tips for improving website traffic
Internet magazines practical tips for improving website traffic
 
Third parties are actively seeking out end-user information using Facebook
Third parties are actively seeking out end-user information using FacebookThird parties are actively seeking out end-user information using Facebook
Third parties are actively seeking out end-user information using Facebook
 
IRJET- Private Social Media and Data Security
IRJET- Private Social Media and Data SecurityIRJET- Private Social Media and Data Security
IRJET- Private Social Media and Data Security
 
Social Media Define the Era in Digital Media
Social Media Define the Era in Digital MediaSocial Media Define the Era in Digital Media
Social Media Define the Era in Digital Media
 
Significant factors for Detecting Redirection Spam
Significant factors for Detecting Redirection SpamSignificant factors for Detecting Redirection Spam
Significant factors for Detecting Redirection Spam
 
MSLGROUP China whitepaper: We Chat about WeChat
MSLGROUP China whitepaper: We Chat about WeChatMSLGROUP China whitepaper: We Chat about WeChat
MSLGROUP China whitepaper: We Chat about WeChat
 
Social Networking Introduction
Social Networking IntroductionSocial Networking Introduction
Social Networking Introduction
 
Social Networking Intro
Social Networking IntroSocial Networking Intro
Social Networking Intro
 
News construction from microblogging post using open data
News construction from microblogging post using open dataNews construction from microblogging post using open data
News construction from microblogging post using open data
 
Research on how_facebook_industry_is_using_data_mining_by_shafiu_umar_abubaka...
Research on how_facebook_industry_is_using_data_mining_by_shafiu_umar_abubaka...Research on how_facebook_industry_is_using_data_mining_by_shafiu_umar_abubaka...
Research on how_facebook_industry_is_using_data_mining_by_shafiu_umar_abubaka...
 

Similar to Cross-Site Bonding of Anonymous Users in Multiple Social Media Networks

Identity Resolution across Different Social Networks using Similarity Analysis
Identity Resolution across Different Social Networks using Similarity AnalysisIdentity Resolution across Different Social Networks using Similarity Analysis
Identity Resolution across Different Social Networks using Similarity Analysisrahulmonikasharma
 
Enhancement of Privacy and User Interaction in a Social Network with the Aid ...
Enhancement of Privacy and User Interaction in a Social Network with the Aid ...Enhancement of Privacy and User Interaction in a Social Network with the Aid ...
Enhancement of Privacy and User Interaction in a Social Network with the Aid ...rahulmonikasharma
 
Internet based Social Networking Services
Internet based Social Networking ServicesInternet based Social Networking Services
Internet based Social Networking Servicesrahulmonikasharma
 
Predicting the Brand Popularity from the Brand Metadata
Predicting the Brand Popularity from the Brand MetadataPredicting the Brand Popularity from the Brand Metadata
Predicting the Brand Popularity from the Brand MetadataIJECEIAES
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkeSAT Publishing House
 
Determining Strategic Value of Online Social Engagements
Determining Strategic Value of Online Social EngagementsDetermining Strategic Value of Online Social Engagements
Determining Strategic Value of Online Social Engagementsinventionjournals
 
20 9131 a review of social media edit septian
20 9131 a review of social media edit septian20 9131 a review of social media edit septian
20 9131 a review of social media edit septianIAESIJEECS
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...ijtsrd
 
Social Networking Websites and Image Privacy
Social Networking Websites and Image PrivacySocial Networking Websites and Image Privacy
Social Networking Websites and Image PrivacyIOSR Journals
 
Classification of instagram fake users using supervised machine learning algo...
Classification of instagram fake users using supervised machine learning algo...Classification of instagram fake users using supervised machine learning algo...
Classification of instagram fake users using supervised machine learning algo...IJECEIAES
 
01 01-evaluating-uses.pdf abstract
01 01-evaluating-uses.pdf abstract01 01-evaluating-uses.pdf abstract
01 01-evaluating-uses.pdf abstractjerry guhyem
 
IRJET- Fake Profile Identification using Machine Learning
IRJET-  	  Fake Profile Identification using Machine LearningIRJET-  	  Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine LearningIRJET Journal
 
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORK
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORKINFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORK
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORKIAEME Publication
 
Top five chapter 6 group presentation
Top five chapter 6 group presentationTop five chapter 6 group presentation
Top five chapter 6 group presentationmontoyva
 
Top five chapter 6 group presentation
Top five chapter 6 group presentationTop five chapter 6 group presentation
Top five chapter 6 group presentationsantishe
 
Social Media App Development An Ultimate Guide 2024.pdf
Social Media App Development An Ultimate Guide 2024.pdfSocial Media App Development An Ultimate Guide 2024.pdf
Social Media App Development An Ultimate Guide 2024.pdfJPLoft Solutions
 
AUTHENTICATION AND VERIFICATION OF SOCIAL NETWORKING ACCOUNTS USING BLOCKCHAI...
AUTHENTICATION AND VERIFICATION OF SOCIAL NETWORKING ACCOUNTS USING BLOCKCHAI...AUTHENTICATION AND VERIFICATION OF SOCIAL NETWORKING ACCOUNTS USING BLOCKCHAI...
AUTHENTICATION AND VERIFICATION OF SOCIAL NETWORKING ACCOUNTS USING BLOCKCHAI...ijcsit
 
Using Social Media for Business
Using Social Media for BusinessUsing Social Media for Business
Using Social Media for Businessmiriam1874
 
IRJET- Privacy Preserving Friend Matching
IRJET- Privacy Preserving Friend MatchingIRJET- Privacy Preserving Friend Matching
IRJET- Privacy Preserving Friend MatchingIRJET Journal
 

Similar to Cross-Site Bonding of Anonymous Users in Multiple Social Media Networks (20)

Identity Resolution across Different Social Networks using Similarity Analysis
Identity Resolution across Different Social Networks using Similarity AnalysisIdentity Resolution across Different Social Networks using Similarity Analysis
Identity Resolution across Different Social Networks using Similarity Analysis
 
Enhancement of Privacy and User Interaction in a Social Network with the Aid ...
Enhancement of Privacy and User Interaction in a Social Network with the Aid ...Enhancement of Privacy and User Interaction in a Social Network with the Aid ...
Enhancement of Privacy and User Interaction in a Social Network with the Aid ...
 
Internet based Social Networking Services
Internet based Social Networking ServicesInternet based Social Networking Services
Internet based Social Networking Services
 
Predicting the Brand Popularity from the Brand Metadata
Predicting the Brand Popularity from the Brand MetadataPredicting the Brand Popularity from the Brand Metadata
Predicting the Brand Popularity from the Brand Metadata
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social network
 
Determining Strategic Value of Online Social Engagements
Determining Strategic Value of Online Social EngagementsDetermining Strategic Value of Online Social Engagements
Determining Strategic Value of Online Social Engagements
 
20 9131 a review of social media edit septian
20 9131 a review of social media edit septian20 9131 a review of social media edit septian
20 9131 a review of social media edit septian
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
 
Social Networking Websites and Image Privacy
Social Networking Websites and Image PrivacySocial Networking Websites and Image Privacy
Social Networking Websites and Image Privacy
 
Classification of instagram fake users using supervised machine learning algo...
Classification of instagram fake users using supervised machine learning algo...Classification of instagram fake users using supervised machine learning algo...
Classification of instagram fake users using supervised machine learning algo...
 
JFrank_1
JFrank_1JFrank_1
JFrank_1
 
01 01-evaluating-uses.pdf abstract
01 01-evaluating-uses.pdf abstract01 01-evaluating-uses.pdf abstract
01 01-evaluating-uses.pdf abstract
 
IRJET- Fake Profile Identification using Machine Learning
IRJET-  	  Fake Profile Identification using Machine LearningIRJET-  	  Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
 
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORK
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORKINFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORK
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORK
 
Top five chapter 6 group presentation
Top five chapter 6 group presentationTop five chapter 6 group presentation
Top five chapter 6 group presentation
 
Top five chapter 6 group presentation
Top five chapter 6 group presentationTop five chapter 6 group presentation
Top five chapter 6 group presentation
 
Social Media App Development An Ultimate Guide 2024.pdf
Social Media App Development An Ultimate Guide 2024.pdfSocial Media App Development An Ultimate Guide 2024.pdf
Social Media App Development An Ultimate Guide 2024.pdf
 
AUTHENTICATION AND VERIFICATION OF SOCIAL NETWORKING ACCOUNTS USING BLOCKCHAI...
AUTHENTICATION AND VERIFICATION OF SOCIAL NETWORKING ACCOUNTS USING BLOCKCHAI...AUTHENTICATION AND VERIFICATION OF SOCIAL NETWORKING ACCOUNTS USING BLOCKCHAI...
AUTHENTICATION AND VERIFICATION OF SOCIAL NETWORKING ACCOUNTS USING BLOCKCHAI...
 
Using Social Media for Business
Using Social Media for BusinessUsing Social Media for Business
Using Social Media for Business
 
IRJET- Privacy Preserving Friend Matching
IRJET- Privacy Preserving Friend MatchingIRJET- Privacy Preserving Friend Matching
IRJET- Privacy Preserving Friend Matching
 

More from rahulmonikasharma

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paperrahulmonikasharma
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...rahulmonikasharma
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Frameworkrahulmonikasharma
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systemsrahulmonikasharma
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Surveyrahulmonikasharma
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETrahulmonikasharma
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formularahulmonikasharma
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...rahulmonikasharma
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pirahulmonikasharma
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...rahulmonikasharma
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticlesrahulmonikasharma
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMrahulmonikasharma
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoringrahulmonikasharma
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...rahulmonikasharma
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...rahulmonikasharma
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM Systemrahulmonikasharma
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosisrahulmonikasharma
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Techniquerahulmonikasharma
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Couplerrahulmonikasharma
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motorrahulmonikasharma
 

More from rahulmonikasharma (20)

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paper
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Framework
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Survey
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANET
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pi
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticles
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Technique
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Coupler
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
 

Recently uploaded

Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 

Recently uploaded (20)

Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 

Cross-Site Bonding of Anonymous Users in Multiple Social Media Networks

  • 1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 678 – 683 _______________________________________________________________________________________________ 678 IJRITCC | July 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ 0Cross-Site Bonding of Anonymous Users in Multiple Social Media Networks 0 Ambresh Bhadra Shetty Assistant Professor, Dept. of Studies in Computer Applications (MCA), Visvesvaraya Technological University, Centre for PG studies, Kalaburagi ambresh.bhadrashetty@gmail.com Pooja Guttedar Student,MCA VI Semester, Dept. of Studies in Computer Applications (MCA), Visvesvaraya Technological University, Centre for PG studies, Kalaburagi poojadg666@gmail.com Abstract: From last few years many online Social Media Networks (SMN) platforms came into existence only those users who connected through similar site network can communicate each other by exchanging their information. For example, a Facebook user can connect only with Facebook user not with cross site user like Twitter so to connect users through multiple cross site network we have introduced a new social networking site calledCross platform network. Cross platform is a site which helps people to connect with huge number of different online Social Media Networks such as Facebook, Twitter,and Wechat. Using Cross platform networkpeople can communicate each other by exchanging the information from different sites. Keywords: Similar Site, Cross Site, Social Media Network __________________________________________________*****_________________________________________________ I. INTRODUCTION Social Networks are one of the highest growing industries in the world Social Networking sites such as Facebook, Twitter, Wechat, Instagram are extremely a powerful communication tools. Most of people think that using these social media network they can communicate each other easily and also it helps to run a successful business. Twitter is an online news and social networking service where users post and interact with messages, "Tweets", restricted to 140 characters [1]. Registered users can post tweets, but those who are unregistered can only read them. Based on the number of active users Facebook is considered as most popular social networking sites in the world. It has totally 2billion monthly users. Users of age between 13 to 18 are consideredas minors therefore their profiles are set to share with friends only. On year of 2010 Facebook has announced with domain name called fb.com from American Farm Bureau Federation. It allow people to share information like pictures, video’s what we have been up to with friends. In cross platform network they have proposed an algorithm called Friend Relationship-Based User Identification(FRUI). FRUI computes a match degree for all hopeful User Matched Pairs (UMPs), and just UMPs with top positions are considered as indistinguishable clients. We likewise created two recommendations to enhance the productivity of the calculation. Aftereffects of broad investigations show that FRUI performs much superior to anything current system structure-based calculations. Cross-Platform research faces many new challenges. As shown in Fig. 1, with the growth of different SMN platforms on the Internet, the cross-platform approach is used to merge as various SMN to create richer raw data and more complete SMNs for social computing tasks. The main purpose of using cross-platform SMN research is for identification of users in multiple SMNs. Many studies have addressed the user identification problem by examining public user profile attributes, including screen name, birth- date, location, gender, profile photo, etc. [4], [5], [7], [8], [9]. Since these attributes are not used by any fake users. Cross platform encompasses of the two groupings: The single-following and the mutual-following associations. : The first one can also be referred to as the tracking up of the associations or the relations. It can be explained as: when the user with A as name tag along the user with name B, in this case it is considered as the A and the B user will be having the tracking relationship, where one is known by the other but the same thing is not with the other. This type of following is seen in the SMNs relating to micro-blogging that takes in Twitter. While the mutual-following associations are said to be as friend associations, in which SMNs related to micro- blogging they refer to commonly tracking associations amongst the two users.
  • 2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 678 – 683 _______________________________________________________________________________________________ 679 IJRITCC | July 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Fig 1: Cross-application research to merge a variety of SMN’s II. LITERATURE SURVEY In year of 2011 B. Zhou and J. Pei introduced a technique called the k-anonymity and l-diversity approaches to provide privacy for different social networks to maintain data privately by providing security. Because many online social networks has lead to the problem of leaking confidential information of individual person. This requires a preservation of privacy before that network data has introduced by service provider. Providing privacy in different social networks has a one of most important concern. Many published academics studies have proposed solution for providing privacy but those technique have not worked properly to overcome this problem they have proposed a new technique called The k-anonymity and l-diversity to maintain privacy [3]. In year of 2013 P. Jain and P. Kumaraguruhas developed Finding Nemo, it is a method which matches accounts called Facebook and Twitter. However,this text based network search method has low accuracy and high complexity in term of user identification,since only text of same nick name are recognized while searching the friend sets of friends [5]. In 2013 O.Goga linked accounts belonging to the same person identity, based solely on the profile information. Organization has started to collect a personal data of user who generates their day to day activities through online. In this work we need to set the capabilitiesmachine learning to link aindependent accounts to maintain users in different social networks. Based on that information users provide their profiles publicly. Large scale correlation approach helps to match account betweendifferent social networks such as Twitter, Facebookand Google+. In result it shows user names, real names, location, photos using this information we can identify 80% of the matching user account between combinations of any two social networks [8]. Inyear of 2014 X. Qian et al. introduced a method called Personalized Recommendation to combine the users based on their interest and social circle. With the appearance and notoriety of interpersonal organization, an ever increasing number of clients get a kick out of the chance to share their encounters, for example, evaluations, audits, and online journals. The new factors of informal organization like relational impact and intrigue in light of friend networks bring openings and difficulties for recommender system (RS) to tackle the cool begin and sparsity issue of datasets. A portion of the social factors have been utilized as a part of RS, yet have not been completely considered. In this paper, three social variables, individual intrigue, relational intrigue comparability, and relational impact, meld into a bound together customized proposal demonstrate in light of probabilistic grid factorization. The factor of individual intrigue can make the RS prescribe things to meet clients' distinctions, particularly for experienced clients. Also, for chilly begin clients, the relational intrigue comparability and relational impact can improve their connection among highlights in the dormant space [10]. III. PROBLEM DEFINITION The problem can be defined as in the existing we can send or receive friend requests only to the person if he or she holds an account in the same social networking site, for example consider a person A who has an account in Facebook and another person B has an account in Twitter, now A cannot send friend request to B because A & B are in different social networking sites. To overcome this we are designing a Cross-Site where in which the users of different social networking sites can send or receive friend requests with each other.
  • 3. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 678 – 683 _______________________________________________________________________________________________ 680 IJRITCC | July 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ III. ARCHITECTURE In above Fig 2 cross site management server list all users and authorize the register user to get login to corresponding networks after that the user has to view his own profile and send request to make friends with cross site and also he can add posts like title, description, image in both cross site as well as in same site. To make friends in cross site admin has to give permission then only the user can send request to cross site user. Here admin list all friends from cross site and similar site network andview all user posts with image description and finally chart results to count number of users in same site and cross site will be displayed. IV. IMPLEMENTATION FRUI ALGORITHM: In this study, we propose an innovative approach to address the challenges faced by previous studies. This new approach focuses on the friendship structure, and develops the Friend Relationship-based User Identification (FRUI) algorithm. FRUI differs from the two existing algorithms, JLA and NS, in the following aspects (1) NS is suitable for directed networks, while JLA and FRUI focus on undirected networks. JLA is restricted in undirected networks by Conditional Random Fields, while FRUI relies on friend relationships, as this is more reliable and consistent with real-life friendship. (2) JLA compares unmapped neighbors of nodes from one of the two SMNs, while NS matches unidentified usersfrom different networks by comparing the mapped neighbors of each node. FRUI aims to identify the most matched pairs among mapped users, but does not iterate unmapped users. Therefore, it markedly reduces computational complexity.
  • 4. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 678 – 683 _______________________________________________________________________________________________ 681 IJRITCC | July 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ V. RESULTS Fig 3:All User and Authorize In Fig. 3 admin is giving permission to the userto login into system after giving permission the status will be changed from waiting to authorized Fig 4: All Friend Request and Response In Fig. 4 admin can view all friend request and response with respect to name of a person and social site
  • 5. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 678 – 683 _______________________________________________________________________________________________ 682 IJRITCC | July 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Fig 5: Search Friends in Cross Site In Fig. 5 user can search friends from cross site and send request to a particular person Fig 6: Graph Result In Fig. 6 graph result will display based on connected users that may either same site and cross site VI. CONCLUSION In this study we have designed new solution called cross platform to identify unknown users across multiple social media networks. We also developed a new method called friend relationship based user identification (FRUI). FRUI helps to computes a match degree for all hopeful User Matched Pairs (UMPs), and UMPs with top positions are considered as indistinguishable clients. Using this method user can connect easily though different cross site network. REFERENCES [1] X. Ying and X. Wu, “Randomizing social networks: a spectrum preserving approach”, 24, 26 April 2008. [2] I. Konstas, V. Stathopoulos, and J.M. Jose, “On social networks and recommendation “, 19-23 July 2009. [3] B. Zhou and J. Pei, “The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks”, 1 July 2011.
  • 6. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 678 – 683 _______________________________________________________________________________________________ 683 IJRITCC | July 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ [4] F. Abel, E. Herder, G.J. Houben, “Cross-system user modeling and personalization on the social web”, 23 April 2012. [5] P. Jain and P. Kumaraguru, "Finding Nemo: searching and re-solving identities of users across online social networks”, 26 Dec 2012. [6] X. Kong, J. Zhang, and P.S. Yu, “Inferring anchor links across multiple heterogeneous social networks”, 11 Dec 2013. [7] R. Zafarani and H. Liu, "Connecting users across social media sites: a behavioral-modeling approach "11-14 August 2013 [8] O. Goga, D. Perito, H. Lei, R. Teixeira, and R. Sommer, "Large-scale Correlation of Accounts across Social Networks”, April 2013. [9] P. Jain, P. Kumaraguru, and A. Joshi, "@ i seek 'fb. me': identifying users across multiple online social networks", 13 May 2013. [10] X. Qian, H. Feng, G. Zhao, and T. Mei, "Personalized Recommendation Combining User Interest and Social Circle", 7July 2014. [11] S. Tan, Y. Li, H. Sun, Z. Guan, X. Yan, J. Bu, C. Chen, and X. He, "Interpreting the Public Sentiment Variations on Twitter", 5 May 2014.