SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 7 17 - 21
______________________________________________________________________________________
17
IJRITCC | July 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Enhancement of Privacy and User Interaction in a Social Network with the Aid
of Adaptive Intelligence
Puneet Palagi
Assistant Professor,
CSE Department,
NHCE, Bangalore.
Dr. Ashok Kumar PS
Professor and Head,
Department Of ISE
DBIT, Bangalore
ABSTRACT: Focusing on enhanced user-interaction avoiding a simple like button by adding a post-interaction rate feature that technically
creates an extra dimension into liking a post. User is able to save pictures to the cloud. Saving memory effectively and creating on-time content.
The main purpose is to enhance Privacy and creating an advanced user interface/interaction allowing a fair share of reaction to a post. When a
user posts a picture, the following user interacts with the picture after tapping the PIB (Post Interaction Button). The picture will be evaluated as
long as the user has the post in view. Also allow no duplication to the post shared by the user. When a user posts a p icture it shouldn’t be
devalued. Our app ensures that the post will be rated according to the user interaction. Able to publish posts on other social medias, making it
uni-directional. Introducing this unique social networking mobile-based application where a user can share photos, videos and texts with extreme
privacy, uploading them even by making them anonymous to the group. Assuring a reliable place to take and share and save posts from
anywhere around the world.
__________________________________________________*****_________________________________________________
1. INTRODUCTION
Enhanced privacy and an advanced User-Interface is what
is lacking in our current world. We need an app that can
fulfill all these issues and come up with something that is
essential, that creates urgency in using it when it comes to
photography.
Introducing a unique social networking mobile-based
application where a user can share photos, videos and texts,
with extreme privacy, uploading them even by making them
anonymous to the group. Assuring a reliable place to take
and share and save posts for the people and users.
Storing the posts onto the cloud, by our cloud storage
system, saves the phone memory to its fullest. Hence,
allowing the user to produce on-time content.
Irrelevant suggestions from our social media networks,
leading to duplication is eradication by our app-alone
upload system. Unrestricted access to other accounts or
viewing them compromising a private connection letting
them see users activities. Mandatory response to posts
made by our friends and followers and thus, making it an
unavoidable actions due to prioritization.
Such interactions prevent a media to have its anonymity as
well as being social enough to others. We focus on
enhanced user- interaction avoiding a simple like button by
adding a post- interaction rate feature that technically
creates an extra dimension into liking and enjoying a post.
2. PROBLEM DEFINITION
We define social networking application as a
mobile-based services that allow individuals to construct a
public or semi-public profile within a bounded system,
articulate a list of other users with whom they share a
connection and view and traverse their list of connections
and those made by others within the system. The nature and
nomenclature of these connections may vary from app to
app.
Since their introduction, social network sites (SNSs) such
as Facebook, Instagram have attracted millions of users,
many of whom have integrated these sites into their daily
practices. As of this writing, there are thousands of SNSs,
with various technological affordances, supporting a wide
range of interests and practices. While their key
technological features are fairly consistent, the cultures that
emerge around SNSs are varied. Most sites support the
maintenance of pre-existing social networks but others help
strangers connect based on shared interests, political views,
or activities. Some sites cater to diverse audiences, while
others attract people based on common language or shared
racial, sexual, religious, or nationality-based identities.
Sites also vary in the extent to which they incorporate new
information and communication tools, such as mobile
connectivity, blogging and photo/video-sharing.
Social networking sites are not only for you to
communicate or interact with each other globally but, this
is also one effective way for business promotion. A lot of
business minded people these days are now doing business
online and use these social networking sites/app to respond
to customer queries. It isn’t just a social media site used to
socialize with your friends but also, represents a huge pool
of information from day today living.
A social networking service is an online service,
platform, site or a mobile application that focuses on
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 7 17 - 21
______________________________________________________________________________________
18
IJRITCC | July 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
messaging. Online community services are sometimes
considered as a social network service, though a broader
sense, social network service usually means an individual-
centered service whereas online community services are
group-centered. Social networking sites/app allow users to
share ideas, activities, events and interests within their
individual networks or through their own Smartphone.
3. PROJECT PURPOSE
Allow no duplication to the post shared by the
user. When a user post a picture it shouldn’t be devalued.
Our app ensures that the post will be rated according to the
user interaction. Genuine content which can be posted once.
Uploading pictures captured from the app alone. User is
able to save pictures to the cloud. The main purpose is
Enhanced Privacy and an advanced and unique user
interface/interaction allowing a fair share of reaction to a
post.
4. PROJECT FEATURES
When a user posts a picture, the following user
interacts with the picture after tapping the PIB (Post
Interaction Button). The picture will be evaluated as long as
the user has the post in view, based on the algorithm
developed in - PHP. Both Public or Private accounts will
have 3 intro images in their home page. Activities of the
users are only shown anonymously. Hence privacy is a
main feature – algorithm that checks if the user has
permission to view the post first before displaying it – PHP,
Search bar used in the app used to display contents from
around the globe .Notification log file that interacts with the
server to check if data is available to display. Also a
floating notification button
– ease of access to home/profile/search/notification. Able to
publish posts on other social medias .Making it uni-
directional. Any new updates will be notified to the user.
Elite users - Users with higher number of post : response
ratio, once hits a threshold turns into an Elite. With less
resistance in Post-Interaction Rate. Additionally every post
has a report/abuse icon, allowing the user to respond to the
post instantly if it contains any abuse content. The owner of
the post will be notified about the same to delete the
5. SYSTEM REQUIREMENTS
5.1 Literature Survey
Advances in mobile technology have enabled a
wide range of applications to be developed that can be used
by people on the move. Developers sometimes overlook the
fact that users will want to interact with such devices while
on the move. Small screen sizes, limited connectivity, high
power consumption rates and limited input modalities are
just some of the issues that arise when designing for small,
portable devices. One of the biggest issues is the context in
which they are used. As these devices are designed to
enable users to use them while mobile, the impact that the
use of these devices has on the mobility of the user is a
critical factor to the success or failure of the application.
Current research has demonstrated that cognitive overload
can be an important aspect of usability (Adams, 2007;
Adams, 2006). It seems likely that mobile devices may be
particularly sensitive to the effects of cognitive overload,
due to their likely deployment in multiple task settings and
limitations of size.
The Mobile-based social networking services
make it possible to connect people who share interests and
activities across political, economic and geographic
borders. Through email and instant messaging, online
communities are created where a gift economy and
reciprocal altruism are encouraged through cooperation.
The first photo sharing sites originated during mid to late
1990’s and provided photofinishing service(i.e. online
ordering of prints). Later, during early 2000’s , many more
sites came into market with the goal of providing
permanent and centralized access to a user’s photos and in
some cases video clips too. Webshots, SmugMug, Yahoo!
Photos and Flickr were among them.
5.2 EXISTING SYSTEM
Photo sharing application is used to share pictures
with their friends. An application like instagram allows
users to post pictures and value the pictures based on likes.
The privacy option of such application is minimal. When a
user wants to follow another user, user can see only the
thumbnail picture of the other user. User will not be able to
figure out the face of the user, this causes confusion in
users mind whether to follow the user or not.
Disadvantages:
Liking and disliking a post with wrong purpose to value or
devalue the content.
Compromised privacy connections.
Unavoidable actions on a content post by other user
(friends, families, etc) due to priorities.
5.3 PROPOSED SYSTEM
The project allows users to interact with the
picture posted. And value the content of the post based on
user interaction. It helps the post to get the appreciation
based on the amount of effort the user has put to capture
the picture and the outcome of the captured picture.
Advantages:
Value the content based on user interaction.
Give rating based on the user( those who viewed the picture)
liking.
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 7 17 - 21
______________________________________________________________________________________
19
IJRITCC | July 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Enhanced privacy by providing intro images.
It reduces the confusion of the user whether to follow or not.
Gives importance to the efforts put by the user to capture the
picture.
6. REQUIREMENT ANALYSIS
6.1 FUNCTIONAL REQUIREMENTS
In software engineering, a functional requirement defines a
function of a software system or its component. A function
is described as a set of inputs, the behavior, and outputs.
Functional requirements may be calculations, technical
details, data manipulation and processing and other specific
functionality that define what a system is supposed to
accomplish. Behavioral requirements describing all the
cases where the system uses the functional requirements are
captured in use cases.
Here, the system has to perform the following tasks:
 Take username and password, match it with
corresponding database entries. If a match is found then
continue else raise an error message.
 Login the application
 Post pictures
 Interact with the picture of the following user
 Edit profile info
 Post intro images
6.2 NON-FUNCTIONAL REQUIREMENTS
In systems engineering and requirements
engineering, a non-functional requirement is a requirement
that specifies criteria that can be used to judge the operation
of a system, rather than specific behaviors. This should be
contrasted with functional requirements that define specific
behavior or functions. The plan for implementing
functional requirements is detailed in the system design.
The plan for implementing non-functional requirements is
detailed in the system architecture.
Other terms for non-functional requirements are
"constraints", "quality attributes", "quality goals", "quality
of service requirements" and "non-behavioral requirements".
Some of the quality attributes are as follows:
6.2.1 ACCESSIBILITY:
Accessibility is a general term used to describe the degree to
which a product, device, service, or environment is
accessible by as many people as possible.
In our project people who have registered with the
application can access the social network to post their
picture.
User interface is simple and efficient and easy to use.
6.2.2 MAINTAINABILITY:
In software engineering, maintainability is the ease with
which a software product can be modified in order to:
 Correct defects
 Meet new requirements
New functionalities can be added in the project based on the
user requirements just by adding the appropriate functions to
existing project using AngularJS and PHP programming
languages.
It is easier to find and correct the defects and to make the
changes in the project.
6.2.3 SCALABILITY:
Application can run in any conditions (24 X 7) and
there are no fixed number of users to log in and use the
application.
7. DESIGN
7.1 MODULAR DESIGN
The application comprises the following major modules:
7.1.1 MEMBER MODULE
This module provides functionalities for those people who
wants to open an account. Applicants can post their views
with personal and professional details. They can also update
the profile as frequently as required. The member can also
browse through the friends profile available. Members can
also get message when their friends message them.
7.1.2 PROFILE MODULE
This module provides functionalities related to members
profile. Logged users can see their details and if they wish to
change any of their information they can edit it.
7.1.3 ADMIN MODULE
This module provides administrator related functionalities.
Administrator manages entire application and maintain the
profile of all the registered users and their activities.
7.2 DATA FLOW DIAGRAM
Data flow diagrams model the flow of data into, through,
and out of an information system:
 Show the processes that change or transform data
 Show the movement of data between processes
 Represent a system as a network of processes which
transform data flowing between them
7.3 USE CASE DIAGRAM
A use case diagram is a graphic depiction of the interaction
among the elements of a system. A use case methodology
is used in system analysis to identify clarify and organize
system requirements. In this context the term system refers
to something being developed or operated, such as
messaging between two users. Use case diagrams are
employed in UML, a standard notation for modeling of
real-world objects and systems.
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 7 17 - 21
______________________________________________________________________________________
20
IJRITCC | July 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
The actors, usually individuals involved with the system
defined according to their roles.
The use cases, which are the specific roles played by the
actors within and around the system.
The relationship between and among the actors and the use
cases.
7.4. DATABASE
A database is an organized collection of data. It is the
collection of schemas, tables, queries, reports, views and
other objects. The data are typically organized to model the
aspects of reality in a way that supports processes requiring
information, such as modeling the availability of rooms in a
hotel in a way that supports finding a hotel with vacancies.
A database management system (DBMS) is a computer
software application that interacts with the user, other
applications, and the database itself to capture and analyze
data. A general-purpose DBMS is designed to allow the
definition, creation, querying, update, and administration of
databases. A database is not generally portable across
different DBMSs, but different DBMS can interoperate by
using standards such as SQL and ODBC or JDBC to allow
a single application to work with more than one DBMS.
Database management systems are often classified
according to the database model that they support; the most
popular database systems since the 1980s have all
supported the relational model as represented by the SQL
language. Sometimes a DBMS is loosely referred to as a
"database".
Formally, a "database" refers to a set of related data and the
way it is organized. Access to this data is usually provided
by a "database management system" (DBMS) consisting of
an integrated set of computer software that allows users to
interact with one or more databases and provides access to
all of the data contained in the database (although
restrictions may exist that limit access to particular data).
The DBMS provides various functions that allow entry,
storage and retrieval of large quantities of information and
provides ways to manage how that information is
organized.
Because of the close relationship between them, the term
"database" is often used casually to refer to both a database
and the DBMS used to manipulate it.
Outside the world of professional information technology,
the term database is often used to refer to any collection of
related data (such as a spreadsheet or a card index). This
article is concerned only with databases where the size and
usage requirements necessitate use of a database
management system.
Existing DBMSs provide various functions that allow
management of a database and its data which can be
classified into four main functional groups:
 Data definition – Creation, modification and removal
of definitions that define the organization of the data. 
 Update – Insertion, modification, and deletion of the
actual data. 
 Retrieval – Providing information in a form directly
usable or for further processing by other applications.
The retrieved data may be made available in a form
basically the same as it is stored in the database or in a
new form obtained by altering or combining existing
data from the database. 
 Administration – Registering and monitoring users,
enforcing data security, monitoring performance,
maintaining data integrity, dealing with concurrency
control, and recovering information that has been
corrupted by some event such as an unexpected
system failure. 
Both database and its DBMS conform to the principles of a
particular database model. Database system refers
collectively to the database model, DBMS and database.
Physically, database servers are dedicated computers that
hold the actual databases and run only the DBMS and
related software. Database servers are usually
multiprocessor computers, with generous memory and
RAID disk arrays used for stable storage. RAID is used for
recovery of data if any of the disks fail. Hardware database
accelerators, connected to one or more servers via a high-
speed channel, are also used in large volume transaction
processing environments. DBMS are found at the heart of
most database applications. DBMS may be built around a
custom multitasking kernel with built-in networking
support, but modern DBMSs typically rely on a standard
operating system to provide these functions.
Since DBMSs comprise a significant market, computer and
storage vendors often take into account DBMS
requirements in their own development plans.
Databases and DBMSs can be categorized according to the
database model(s) that they support (such as relational or
XML), the type(s) of computer they run on (from a server
cluster to a mobile phone), the query language(s) used to
access the database (such as SQL or XQuery), and their
internal engineering, which affects performance, scalability,
resilience, and security.
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 7 17 - 21
______________________________________________________________________________________
21
IJRITCC | July 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Fig 4.4.1 List of tables
7.5 TEST CASES
Table 6.1: Test Case for User Registration (Signup)
S.
NO INPUT
TEST
CASE
CONDITIO
NS
BEING
CHECKED RESULT
1
USERNA
ME
ALRE
ADY
EXIST
OR
NOT
USERNAM
E
SHOULD
BE
UNIQUE
SUCCES
SFUL
2
USERN
AME
EMPT
Y
ENTER
VALID
USERNAM
E
SUCCES
SFUL
3 EMAIL
EMPT
Y
ENTER
VALID
EMAIL
SUCCES
SFUL
4 EMAIL
ALRE
ADY
EXIST
OR
NOT
ENTER
UNIQUE
EMAIL
SUCCESS
FUL
5
PASSW
ORD
EMPT
Y
ENTER
VALID
PASSWO
SUCCES
SFUL
6
CONFI
RM
PASSW
ORD
EMPT
Y
PASSWOR
D AND
CONFIRM
ATION
PASSWOR
D MUST
BE SAME
SUCCES
SFUL
CHAPTER 8
CONCLUSION AND FUTURE ENHANCEMENT
8.1 CONCLUSION
While developing the system a conscious effort
has been made to create and develop a software package,
making use of available tools, techniques and resources that
would generate a proper system for a Social Media.
While making the system, an eye has been kept on
making it as user- friendly. As such on may hope that the
system will be acceptable to any user and will adequately
meet user needs. As in case of any system development
process, where there are a number of short comings, there
have been some shortcomings in the development of this
system also.
There are some of the areas of improvement
which couldn’t be implemented due to time constraints.
One such feature was Photo Sharing based on Location.
8.2 FUTURE ENHANCEMENT
 Photo sharing based on Location 
 Suggestion of pictures based on Location 
 Editing of Pictures 
 Capture Picture from app alone camera and
produce on-time content 
Sites Referred:
[1]. http://www.angularjs.org
[2]. https://w3techs.com/sites
[3]. https://.codeconquest.com
[4]. http://www.computer.org/publications/dlib
[5]. http://www.developerfusion.com/

More Related Content

What's hot

Mapping The Consequences Of Technology On Public Relations
Mapping The Consequences Of Technology On Public RelationsMapping The Consequences Of Technology On Public Relations
Mapping The Consequences Of Technology On Public Relationsmctripletwo
 
Mapping The Consequences Of Technology On Public Relations
Mapping The Consequences Of Technology On Public RelationsMapping The Consequences Of Technology On Public Relations
Mapping The Consequences Of Technology On Public Relationsmctripletwo
 
Social networks
Social networksSocial networks
Social networksvivek5110
 
Integrating social media into your marketing
Integrating social media into your marketingIntegrating social media into your marketing
Integrating social media into your marketingzingopen
 
Using Social Media in Education (and Statistics)
Using Social Media in Education (and Statistics)Using Social Media in Education (and Statistics)
Using Social Media in Education (and Statistics)Patricia Schlicht
 
Accelerating Social Innovation: NGOs, Open Networks & Developing Marketplaces
Accelerating Social Innovation: NGOs, Open Networks & Developing MarketplacesAccelerating Social Innovation: NGOs, Open Networks & Developing Marketplaces
Accelerating Social Innovation: NGOs, Open Networks & Developing MarketplacesAyelet Baron
 
Marketing over social media networks
Marketing over social media networksMarketing over social media networks
Marketing over social media networksghayth ali
 
Using Social Media for Business
Using Social Media for BusinessUsing Social Media for Business
Using Social Media for Businessmiriam1874
 
Social Media at Work
Social Media at WorkSocial Media at Work
Social Media at WorkGohar Khan
 
Mobile, Social, Global: Applications of Emerging Technologies in Survey Reseach
Mobile, Social, Global: Applications of Emerging Technologies in Survey ReseachMobile, Social, Global: Applications of Emerging Technologies in Survey Reseach
Mobile, Social, Global: Applications of Emerging Technologies in Survey ReseachAdamSage
 
OTOinsights "An Analysis of Digg.com Engagement and User Behavior"
OTOinsights "An Analysis of Digg.com Engagement and User Behavior"OTOinsights "An Analysis of Digg.com Engagement and User Behavior"
OTOinsights "An Analysis of Digg.com Engagement and User Behavior"One to One
 
Smac technical report
Smac technical reportSmac technical report
Smac technical reportNaga Pradeep
 
Collnet seoul-2013-2
Collnet seoul-2013-2Collnet seoul-2013-2
Collnet seoul-2013-2Gohar Khan
 

What's hot (20)

Mapping The Consequences Of Technology On Public Relations
Mapping The Consequences Of Technology On Public RelationsMapping The Consequences Of Technology On Public Relations
Mapping The Consequences Of Technology On Public Relations
 
Mapping The Consequences Of Technology On Public Relations
Mapping The Consequences Of Technology On Public RelationsMapping The Consequences Of Technology On Public Relations
Mapping The Consequences Of Technology On Public Relations
 
Social networks
Social networksSocial networks
Social networks
 
Social Media
Social Media Social Media
Social Media
 
Integrating social media into your marketing
Integrating social media into your marketingIntegrating social media into your marketing
Integrating social media into your marketing
 
U180203134138
U180203134138U180203134138
U180203134138
 
Oral recitations
Oral recitationsOral recitations
Oral recitations
 
Twitter
TwitterTwitter
Twitter
 
Social Media
Social MediaSocial Media
Social Media
 
Using Social Media in Education (and Statistics)
Using Social Media in Education (and Statistics)Using Social Media in Education (and Statistics)
Using Social Media in Education (and Statistics)
 
Accelerating Social Innovation: NGOs, Open Networks & Developing Marketplaces
Accelerating Social Innovation: NGOs, Open Networks & Developing MarketplacesAccelerating Social Innovation: NGOs, Open Networks & Developing Marketplaces
Accelerating Social Innovation: NGOs, Open Networks & Developing Marketplaces
 
Marketing over social media networks
Marketing over social media networksMarketing over social media networks
Marketing over social media networks
 
Using Social Media for Business
Using Social Media for BusinessUsing Social Media for Business
Using Social Media for Business
 
Social Media at Work
Social Media at WorkSocial Media at Work
Social Media at Work
 
Social media brief
Social media brief Social media brief
Social media brief
 
Mobile, Social, Global: Applications of Emerging Technologies in Survey Reseach
Mobile, Social, Global: Applications of Emerging Technologies in Survey ReseachMobile, Social, Global: Applications of Emerging Technologies in Survey Reseach
Mobile, Social, Global: Applications of Emerging Technologies in Survey Reseach
 
OTOinsights "An Analysis of Digg.com Engagement and User Behavior"
OTOinsights "An Analysis of Digg.com Engagement and User Behavior"OTOinsights "An Analysis of Digg.com Engagement and User Behavior"
OTOinsights "An Analysis of Digg.com Engagement and User Behavior"
 
Smac technical report
Smac technical reportSmac technical report
Smac technical report
 
Government 2.0 Explained
Government 2.0 ExplainedGovernment 2.0 Explained
Government 2.0 Explained
 
Collnet seoul-2013-2
Collnet seoul-2013-2Collnet seoul-2013-2
Collnet seoul-2013-2
 

Similar to Enhancement of Privacy and User Interaction in a Social Network with the Aid of Adaptive Intelligence

PERSONAL FINANCIAL APPLICATION BASED ON HYBRID MOBILE PLATFORM (UTILIZE SOCIA...
PERSONAL FINANCIAL APPLICATION BASED ON HYBRID MOBILE PLATFORM (UTILIZE SOCIA...PERSONAL FINANCIAL APPLICATION BASED ON HYBRID MOBILE PLATFORM (UTILIZE SOCIA...
PERSONAL FINANCIAL APPLICATION BASED ON HYBRID MOBILE PLATFORM (UTILIZE SOCIA...Rendy Marojahan Ompusunggu
 
Vertex – The All in one Web Application
Vertex – The All in one Web ApplicationVertex – The All in one Web Application
Vertex – The All in one Web ApplicationIRJET Journal
 
Social Media App Development An Ultimate Guide 2024.pdf
Social Media App Development An Ultimate Guide 2024.pdfSocial Media App Development An Ultimate Guide 2024.pdf
Social Media App Development An Ultimate Guide 2024.pdfJPLoft Solutions
 
Cross-Site Bonding of Anonymous Users in Multiple Social Media Networks
Cross-Site Bonding of Anonymous Users in Multiple Social Media NetworksCross-Site Bonding of Anonymous Users in Multiple Social Media Networks
Cross-Site Bonding of Anonymous Users in Multiple Social Media Networksrahulmonikasharma
 
Android Application Development for Social Network
Android Application Development for Social NetworkAndroid Application Development for Social Network
Android Application Development for Social NetworkIRJET Journal
 
Novel model to identify the success factors in marketing by social media
Novel model to identify the success factors in marketing by social mediaNovel model to identify the success factors in marketing by social media
Novel model to identify the success factors in marketing by social mediaDr Karunakar Diwakar Jha
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxsittiepalao
 
Planning To Build A Social Media App In 2022.pptx
Planning To Build A Social Media App In 2022.pptxPlanning To Build A Social Media App In 2022.pptx
Planning To Build A Social Media App In 2022.pptxZimbleCodeAustralia
 
The Synereo Whitepaper
The Synereo WhitepaperThe Synereo Whitepaper
The Synereo WhitepaperJoseph Denman
 
Social Network in marketing (Social Media Marketing) Opportunities and Risks
Social Network in marketing (Social Media Marketing) Opportunities and RisksSocial Network in marketing (Social Media Marketing) Opportunities and Risks
Social Network in marketing (Social Media Marketing) Opportunities and Risksijmpict
 
Application of mobile apps in financial services institutes:with special refe...
Application of mobile apps in financial services institutes:with special refe...Application of mobile apps in financial services institutes:with special refe...
Application of mobile apps in financial services institutes:with special refe...Room to Read
 
E-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGM
E-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGME-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGM
E-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGMijait
 
IRJET- Animal Welfare and Wellness Application using Javascript
IRJET- Animal Welfare and Wellness Application using JavascriptIRJET- Animal Welfare and Wellness Application using Javascript
IRJET- Animal Welfare and Wellness Application using JavascriptIRJET Journal
 
Empowerment Technologies
Empowerment TechnologiesEmpowerment Technologies
Empowerment TechnologiesMichelle Faina
 
Identity Resolution across Different Social Networks using Similarity Analysis
Identity Resolution across Different Social Networks using Similarity AnalysisIdentity Resolution across Different Social Networks using Similarity Analysis
Identity Resolution across Different Social Networks using Similarity Analysisrahulmonikasharma
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkeSAT Publishing House
 
Empowerment Tech Lesson 1 What is ICT.pptx
Empowerment Tech Lesson 1 What is ICT.pptxEmpowerment Tech Lesson 1 What is ICT.pptx
Empowerment Tech Lesson 1 What is ICT.pptxNicoleBitgue
 

Similar to Enhancement of Privacy and User Interaction in a Social Network with the Aid of Adaptive Intelligence (20)

PERSONAL FINANCIAL APPLICATION BASED ON HYBRID MOBILE PLATFORM (UTILIZE SOCIA...
PERSONAL FINANCIAL APPLICATION BASED ON HYBRID MOBILE PLATFORM (UTILIZE SOCIA...PERSONAL FINANCIAL APPLICATION BASED ON HYBRID MOBILE PLATFORM (UTILIZE SOCIA...
PERSONAL FINANCIAL APPLICATION BASED ON HYBRID MOBILE PLATFORM (UTILIZE SOCIA...
 
Vertex – The All in one Web Application
Vertex – The All in one Web ApplicationVertex – The All in one Web Application
Vertex – The All in one Web Application
 
Social Media App Development An Ultimate Guide 2024.pdf
Social Media App Development An Ultimate Guide 2024.pdfSocial Media App Development An Ultimate Guide 2024.pdf
Social Media App Development An Ultimate Guide 2024.pdf
 
Cross-Site Bonding of Anonymous Users in Multiple Social Media Networks
Cross-Site Bonding of Anonymous Users in Multiple Social Media NetworksCross-Site Bonding of Anonymous Users in Multiple Social Media Networks
Cross-Site Bonding of Anonymous Users in Multiple Social Media Networks
 
Android Application Development for Social Network
Android Application Development for Social NetworkAndroid Application Development for Social Network
Android Application Development for Social Network
 
Novel model to identify the success factors in marketing by social media
Novel model to identify the success factors in marketing by social mediaNovel model to identify the success factors in marketing by social media
Novel model to identify the success factors in marketing by social media
 
How to Create a Social Media App Guide on Feature Cost Benefits.pdf
How to Create a Social Media App Guide on Feature Cost  Benefits.pdfHow to Create a Social Media App Guide on Feature Cost  Benefits.pdf
How to Create a Social Media App Guide on Feature Cost Benefits.pdf
 
L1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptxL1 Introduction to Information and Communication Technology.pptx
L1 Introduction to Information and Communication Technology.pptx
 
Kastriot Blakaj
Kastriot BlakajKastriot Blakaj
Kastriot Blakaj
 
Planning To Build A Social Media App In 2022.pptx
Planning To Build A Social Media App In 2022.pptxPlanning To Build A Social Media App In 2022.pptx
Planning To Build A Social Media App In 2022.pptx
 
The Synereo Whitepaper
The Synereo WhitepaperThe Synereo Whitepaper
The Synereo Whitepaper
 
Social Network in marketing (Social Media Marketing) Opportunities and Risks
Social Network in marketing (Social Media Marketing) Opportunities and RisksSocial Network in marketing (Social Media Marketing) Opportunities and Risks
Social Network in marketing (Social Media Marketing) Opportunities and Risks
 
Application of mobile apps in financial services institutes:with special refe...
Application of mobile apps in financial services institutes:with special refe...Application of mobile apps in financial services institutes:with special refe...
Application of mobile apps in financial services institutes:with special refe...
 
E-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGM
E-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGME-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGM
E-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGM
 
IRJET- Animal Welfare and Wellness Application using Javascript
IRJET- Animal Welfare and Wellness Application using JavascriptIRJET- Animal Welfare and Wellness Application using Javascript
IRJET- Animal Welfare and Wellness Application using Javascript
 
Are Subscription-Based & Open-Source Apps, The Future of Social Media.pdf
Are Subscription-Based & Open-Source Apps, The Future of Social Media.pdfAre Subscription-Based & Open-Source Apps, The Future of Social Media.pdf
Are Subscription-Based & Open-Source Apps, The Future of Social Media.pdf
 
Empowerment Technologies
Empowerment TechnologiesEmpowerment Technologies
Empowerment Technologies
 
Identity Resolution across Different Social Networks using Similarity Analysis
Identity Resolution across Different Social Networks using Similarity AnalysisIdentity Resolution across Different Social Networks using Similarity Analysis
Identity Resolution across Different Social Networks using Similarity Analysis
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social network
 
Empowerment Tech Lesson 1 What is ICT.pptx
Empowerment Tech Lesson 1 What is ICT.pptxEmpowerment Tech Lesson 1 What is ICT.pptx
Empowerment Tech Lesson 1 What is ICT.pptx
 

More from rahulmonikasharma

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paperrahulmonikasharma
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...rahulmonikasharma
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Frameworkrahulmonikasharma
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systemsrahulmonikasharma
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Surveyrahulmonikasharma
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETrahulmonikasharma
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formularahulmonikasharma
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...rahulmonikasharma
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pirahulmonikasharma
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...rahulmonikasharma
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticlesrahulmonikasharma
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMrahulmonikasharma
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoringrahulmonikasharma
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...rahulmonikasharma
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...rahulmonikasharma
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM Systemrahulmonikasharma
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosisrahulmonikasharma
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Techniquerahulmonikasharma
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Couplerrahulmonikasharma
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motorrahulmonikasharma
 

More from rahulmonikasharma (20)

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paper
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Framework
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Survey
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANET
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pi
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticles
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Technique
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Coupler
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
 

Recently uploaded

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 

Recently uploaded (20)

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 

Enhancement of Privacy and User Interaction in a Social Network with the Aid of Adaptive Intelligence

  • 1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 6 Issue: 7 17 - 21 ______________________________________________________________________________________ 17 IJRITCC | July 2018, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Enhancement of Privacy and User Interaction in a Social Network with the Aid of Adaptive Intelligence Puneet Palagi Assistant Professor, CSE Department, NHCE, Bangalore. Dr. Ashok Kumar PS Professor and Head, Department Of ISE DBIT, Bangalore ABSTRACT: Focusing on enhanced user-interaction avoiding a simple like button by adding a post-interaction rate feature that technically creates an extra dimension into liking a post. User is able to save pictures to the cloud. Saving memory effectively and creating on-time content. The main purpose is to enhance Privacy and creating an advanced user interface/interaction allowing a fair share of reaction to a post. When a user posts a picture, the following user interacts with the picture after tapping the PIB (Post Interaction Button). The picture will be evaluated as long as the user has the post in view. Also allow no duplication to the post shared by the user. When a user posts a p icture it shouldn’t be devalued. Our app ensures that the post will be rated according to the user interaction. Able to publish posts on other social medias, making it uni-directional. Introducing this unique social networking mobile-based application where a user can share photos, videos and texts with extreme privacy, uploading them even by making them anonymous to the group. Assuring a reliable place to take and share and save posts from anywhere around the world. __________________________________________________*****_________________________________________________ 1. INTRODUCTION Enhanced privacy and an advanced User-Interface is what is lacking in our current world. We need an app that can fulfill all these issues and come up with something that is essential, that creates urgency in using it when it comes to photography. Introducing a unique social networking mobile-based application where a user can share photos, videos and texts, with extreme privacy, uploading them even by making them anonymous to the group. Assuring a reliable place to take and share and save posts for the people and users. Storing the posts onto the cloud, by our cloud storage system, saves the phone memory to its fullest. Hence, allowing the user to produce on-time content. Irrelevant suggestions from our social media networks, leading to duplication is eradication by our app-alone upload system. Unrestricted access to other accounts or viewing them compromising a private connection letting them see users activities. Mandatory response to posts made by our friends and followers and thus, making it an unavoidable actions due to prioritization. Such interactions prevent a media to have its anonymity as well as being social enough to others. We focus on enhanced user- interaction avoiding a simple like button by adding a post- interaction rate feature that technically creates an extra dimension into liking and enjoying a post. 2. PROBLEM DEFINITION We define social networking application as a mobile-based services that allow individuals to construct a public or semi-public profile within a bounded system, articulate a list of other users with whom they share a connection and view and traverse their list of connections and those made by others within the system. The nature and nomenclature of these connections may vary from app to app. Since their introduction, social network sites (SNSs) such as Facebook, Instagram have attracted millions of users, many of whom have integrated these sites into their daily practices. As of this writing, there are thousands of SNSs, with various technological affordances, supporting a wide range of interests and practices. While their key technological features are fairly consistent, the cultures that emerge around SNSs are varied. Most sites support the maintenance of pre-existing social networks but others help strangers connect based on shared interests, political views, or activities. Some sites cater to diverse audiences, while others attract people based on common language or shared racial, sexual, religious, or nationality-based identities. Sites also vary in the extent to which they incorporate new information and communication tools, such as mobile connectivity, blogging and photo/video-sharing. Social networking sites are not only for you to communicate or interact with each other globally but, this is also one effective way for business promotion. A lot of business minded people these days are now doing business online and use these social networking sites/app to respond to customer queries. It isn’t just a social media site used to socialize with your friends but also, represents a huge pool of information from day today living. A social networking service is an online service, platform, site or a mobile application that focuses on
  • 2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 6 Issue: 7 17 - 21 ______________________________________________________________________________________ 18 IJRITCC | July 2018, Available @ http://www.ijritcc.org _______________________________________________________________________________________ messaging. Online community services are sometimes considered as a social network service, though a broader sense, social network service usually means an individual- centered service whereas online community services are group-centered. Social networking sites/app allow users to share ideas, activities, events and interests within their individual networks or through their own Smartphone. 3. PROJECT PURPOSE Allow no duplication to the post shared by the user. When a user post a picture it shouldn’t be devalued. Our app ensures that the post will be rated according to the user interaction. Genuine content which can be posted once. Uploading pictures captured from the app alone. User is able to save pictures to the cloud. The main purpose is Enhanced Privacy and an advanced and unique user interface/interaction allowing a fair share of reaction to a post. 4. PROJECT FEATURES When a user posts a picture, the following user interacts with the picture after tapping the PIB (Post Interaction Button). The picture will be evaluated as long as the user has the post in view, based on the algorithm developed in - PHP. Both Public or Private accounts will have 3 intro images in their home page. Activities of the users are only shown anonymously. Hence privacy is a main feature – algorithm that checks if the user has permission to view the post first before displaying it – PHP, Search bar used in the app used to display contents from around the globe .Notification log file that interacts with the server to check if data is available to display. Also a floating notification button – ease of access to home/profile/search/notification. Able to publish posts on other social medias .Making it uni- directional. Any new updates will be notified to the user. Elite users - Users with higher number of post : response ratio, once hits a threshold turns into an Elite. With less resistance in Post-Interaction Rate. Additionally every post has a report/abuse icon, allowing the user to respond to the post instantly if it contains any abuse content. The owner of the post will be notified about the same to delete the 5. SYSTEM REQUIREMENTS 5.1 Literature Survey Advances in mobile technology have enabled a wide range of applications to be developed that can be used by people on the move. Developers sometimes overlook the fact that users will want to interact with such devices while on the move. Small screen sizes, limited connectivity, high power consumption rates and limited input modalities are just some of the issues that arise when designing for small, portable devices. One of the biggest issues is the context in which they are used. As these devices are designed to enable users to use them while mobile, the impact that the use of these devices has on the mobility of the user is a critical factor to the success or failure of the application. Current research has demonstrated that cognitive overload can be an important aspect of usability (Adams, 2007; Adams, 2006). It seems likely that mobile devices may be particularly sensitive to the effects of cognitive overload, due to their likely deployment in multiple task settings and limitations of size. The Mobile-based social networking services make it possible to connect people who share interests and activities across political, economic and geographic borders. Through email and instant messaging, online communities are created where a gift economy and reciprocal altruism are encouraged through cooperation. The first photo sharing sites originated during mid to late 1990’s and provided photofinishing service(i.e. online ordering of prints). Later, during early 2000’s , many more sites came into market with the goal of providing permanent and centralized access to a user’s photos and in some cases video clips too. Webshots, SmugMug, Yahoo! Photos and Flickr were among them. 5.2 EXISTING SYSTEM Photo sharing application is used to share pictures with their friends. An application like instagram allows users to post pictures and value the pictures based on likes. The privacy option of such application is minimal. When a user wants to follow another user, user can see only the thumbnail picture of the other user. User will not be able to figure out the face of the user, this causes confusion in users mind whether to follow the user or not. Disadvantages: Liking and disliking a post with wrong purpose to value or devalue the content. Compromised privacy connections. Unavoidable actions on a content post by other user (friends, families, etc) due to priorities. 5.3 PROPOSED SYSTEM The project allows users to interact with the picture posted. And value the content of the post based on user interaction. It helps the post to get the appreciation based on the amount of effort the user has put to capture the picture and the outcome of the captured picture. Advantages: Value the content based on user interaction. Give rating based on the user( those who viewed the picture) liking.
  • 3. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 6 Issue: 7 17 - 21 ______________________________________________________________________________________ 19 IJRITCC | July 2018, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Enhanced privacy by providing intro images. It reduces the confusion of the user whether to follow or not. Gives importance to the efforts put by the user to capture the picture. 6. REQUIREMENT ANALYSIS 6.1 FUNCTIONAL REQUIREMENTS In software engineering, a functional requirement defines a function of a software system or its component. A function is described as a set of inputs, the behavior, and outputs. Functional requirements may be calculations, technical details, data manipulation and processing and other specific functionality that define what a system is supposed to accomplish. Behavioral requirements describing all the cases where the system uses the functional requirements are captured in use cases. Here, the system has to perform the following tasks:  Take username and password, match it with corresponding database entries. If a match is found then continue else raise an error message.  Login the application  Post pictures  Interact with the picture of the following user  Edit profile info  Post intro images 6.2 NON-FUNCTIONAL REQUIREMENTS In systems engineering and requirements engineering, a non-functional requirement is a requirement that specifies criteria that can be used to judge the operation of a system, rather than specific behaviors. This should be contrasted with functional requirements that define specific behavior or functions. The plan for implementing functional requirements is detailed in the system design. The plan for implementing non-functional requirements is detailed in the system architecture. Other terms for non-functional requirements are "constraints", "quality attributes", "quality goals", "quality of service requirements" and "non-behavioral requirements". Some of the quality attributes are as follows: 6.2.1 ACCESSIBILITY: Accessibility is a general term used to describe the degree to which a product, device, service, or environment is accessible by as many people as possible. In our project people who have registered with the application can access the social network to post their picture. User interface is simple and efficient and easy to use. 6.2.2 MAINTAINABILITY: In software engineering, maintainability is the ease with which a software product can be modified in order to:  Correct defects  Meet new requirements New functionalities can be added in the project based on the user requirements just by adding the appropriate functions to existing project using AngularJS and PHP programming languages. It is easier to find and correct the defects and to make the changes in the project. 6.2.3 SCALABILITY: Application can run in any conditions (24 X 7) and there are no fixed number of users to log in and use the application. 7. DESIGN 7.1 MODULAR DESIGN The application comprises the following major modules: 7.1.1 MEMBER MODULE This module provides functionalities for those people who wants to open an account. Applicants can post their views with personal and professional details. They can also update the profile as frequently as required. The member can also browse through the friends profile available. Members can also get message when their friends message them. 7.1.2 PROFILE MODULE This module provides functionalities related to members profile. Logged users can see their details and if they wish to change any of their information they can edit it. 7.1.3 ADMIN MODULE This module provides administrator related functionalities. Administrator manages entire application and maintain the profile of all the registered users and their activities. 7.2 DATA FLOW DIAGRAM Data flow diagrams model the flow of data into, through, and out of an information system:  Show the processes that change or transform data  Show the movement of data between processes  Represent a system as a network of processes which transform data flowing between them 7.3 USE CASE DIAGRAM A use case diagram is a graphic depiction of the interaction among the elements of a system. A use case methodology is used in system analysis to identify clarify and organize system requirements. In this context the term system refers to something being developed or operated, such as messaging between two users. Use case diagrams are employed in UML, a standard notation for modeling of real-world objects and systems.
  • 4. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 6 Issue: 7 17 - 21 ______________________________________________________________________________________ 20 IJRITCC | July 2018, Available @ http://www.ijritcc.org _______________________________________________________________________________________ The actors, usually individuals involved with the system defined according to their roles. The use cases, which are the specific roles played by the actors within and around the system. The relationship between and among the actors and the use cases. 7.4. DATABASE A database is an organized collection of data. It is the collection of schemas, tables, queries, reports, views and other objects. The data are typically organized to model the aspects of reality in a way that supports processes requiring information, such as modeling the availability of rooms in a hotel in a way that supports finding a hotel with vacancies. A database management system (DBMS) is a computer software application that interacts with the user, other applications, and the database itself to capture and analyze data. A general-purpose DBMS is designed to allow the definition, creation, querying, update, and administration of databases. A database is not generally portable across different DBMSs, but different DBMS can interoperate by using standards such as SQL and ODBC or JDBC to allow a single application to work with more than one DBMS. Database management systems are often classified according to the database model that they support; the most popular database systems since the 1980s have all supported the relational model as represented by the SQL language. Sometimes a DBMS is loosely referred to as a "database". Formally, a "database" refers to a set of related data and the way it is organized. Access to this data is usually provided by a "database management system" (DBMS) consisting of an integrated set of computer software that allows users to interact with one or more databases and provides access to all of the data contained in the database (although restrictions may exist that limit access to particular data). The DBMS provides various functions that allow entry, storage and retrieval of large quantities of information and provides ways to manage how that information is organized. Because of the close relationship between them, the term "database" is often used casually to refer to both a database and the DBMS used to manipulate it. Outside the world of professional information technology, the term database is often used to refer to any collection of related data (such as a spreadsheet or a card index). This article is concerned only with databases where the size and usage requirements necessitate use of a database management system. Existing DBMSs provide various functions that allow management of a database and its data which can be classified into four main functional groups:  Data definition – Creation, modification and removal of definitions that define the organization of the data.   Update – Insertion, modification, and deletion of the actual data.   Retrieval – Providing information in a form directly usable or for further processing by other applications. The retrieved data may be made available in a form basically the same as it is stored in the database or in a new form obtained by altering or combining existing data from the database.   Administration – Registering and monitoring users, enforcing data security, monitoring performance, maintaining data integrity, dealing with concurrency control, and recovering information that has been corrupted by some event such as an unexpected system failure.  Both database and its DBMS conform to the principles of a particular database model. Database system refers collectively to the database model, DBMS and database. Physically, database servers are dedicated computers that hold the actual databases and run only the DBMS and related software. Database servers are usually multiprocessor computers, with generous memory and RAID disk arrays used for stable storage. RAID is used for recovery of data if any of the disks fail. Hardware database accelerators, connected to one or more servers via a high- speed channel, are also used in large volume transaction processing environments. DBMS are found at the heart of most database applications. DBMS may be built around a custom multitasking kernel with built-in networking support, but modern DBMSs typically rely on a standard operating system to provide these functions. Since DBMSs comprise a significant market, computer and storage vendors often take into account DBMS requirements in their own development plans. Databases and DBMSs can be categorized according to the database model(s) that they support (such as relational or XML), the type(s) of computer they run on (from a server cluster to a mobile phone), the query language(s) used to access the database (such as SQL or XQuery), and their internal engineering, which affects performance, scalability, resilience, and security.
  • 5. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 6 Issue: 7 17 - 21 ______________________________________________________________________________________ 21 IJRITCC | July 2018, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Fig 4.4.1 List of tables 7.5 TEST CASES Table 6.1: Test Case for User Registration (Signup) S. NO INPUT TEST CASE CONDITIO NS BEING CHECKED RESULT 1 USERNA ME ALRE ADY EXIST OR NOT USERNAM E SHOULD BE UNIQUE SUCCES SFUL 2 USERN AME EMPT Y ENTER VALID USERNAM E SUCCES SFUL 3 EMAIL EMPT Y ENTER VALID EMAIL SUCCES SFUL 4 EMAIL ALRE ADY EXIST OR NOT ENTER UNIQUE EMAIL SUCCESS FUL 5 PASSW ORD EMPT Y ENTER VALID PASSWO SUCCES SFUL 6 CONFI RM PASSW ORD EMPT Y PASSWOR D AND CONFIRM ATION PASSWOR D MUST BE SAME SUCCES SFUL CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENT 8.1 CONCLUSION While developing the system a conscious effort has been made to create and develop a software package, making use of available tools, techniques and resources that would generate a proper system for a Social Media. While making the system, an eye has been kept on making it as user- friendly. As such on may hope that the system will be acceptable to any user and will adequately meet user needs. As in case of any system development process, where there are a number of short comings, there have been some shortcomings in the development of this system also. There are some of the areas of improvement which couldn’t be implemented due to time constraints. One such feature was Photo Sharing based on Location. 8.2 FUTURE ENHANCEMENT  Photo sharing based on Location   Suggestion of pictures based on Location   Editing of Pictures   Capture Picture from app alone camera and produce on-time content  Sites Referred: [1]. http://www.angularjs.org [2]. https://w3techs.com/sites [3]. https://.codeconquest.com [4]. http://www.computer.org/publications/dlib [5]. http://www.developerfusion.com/