SlideShare a Scribd company logo
1 of 21
CONTENTS
• Problem Definition
• Existing System
• Proposed System
• Literature Survey
• System Architecture
• Algorithm
• Mathematical Model
• Results
• Conclusion
• References
• Pulication
PROBLEM DEFINITION
• Online Social Media Has Become Face Of Internet Today.
• On-line Social Networks (OSNs) are most popular interactive medium to
communicate and share data, views and so much more .
• According to a rough estimate 30 billion pieces of content (web
links, news stories, blog posts, notes, photo albums, etc.) are shared
each month.
PROBLEM DEFINITION
• For the numerous positives there are a few negatives
which spoil the user experience .
• Primary among them is the inability to control what is
being posted on the wall.
• Our system exploits this weakness and comes up with a
solution for it .
PROBLEM DEFINITION (CONTD..)
• Blatant misuse of social media platforms
• Recent examples (Shivaji Issue)
• Unfiltered messages on wall can be a tool used to bully.
• The system aims at addressing such concerns and disallow the misuse.
EXISTING SYSTEM
• Platforms like Facebook ,Google do not provide filtering of any sort.
• Don’t have any mechanism to control fake profile menace .
• Can’t restrict updation and has been on the receiving end for a lot of such
issues.
EXISTING SYSTEM ARCHITECTURE
The architecture in support of OSN
services is a two-tier Structure.
Graphical User Interfaces
Social Network Manager
PROPOSED SYSTEM
• Propose and evaluate an automated system, called filtered wall (fw), able
to filter unwanted messages from osn user walls.
• We exploit machine learning (ml) text categorization techniques.
• Fake profile identification. IP monitoring.
• All existing features of the social media
PROPOSED SYSTEM (CONTD..)
• The concept of blocklist to further the utility value of the system .
• The blacklist will be a list where repeated offenders will be listed and
will be blocked from further usage
• The use of a THRESHHOLD VALUE for the same will be done
LITERATURE SURVEY
SR.
NO
PAPER TITLE AUTHORS ADVANTAGES LIMITATIONS PROPOSED SOLUTIONS
[1] A Comparison of
Classifiers and
Document
Representations for the
Routing Problem
[1995]
H. Schutze, D.A.
Hull, J.O. Pedersen
Error minimization Detail approach for
dimensional reduction
is required
Provides for detail
approach to dimensional
reduction
[2] Boos Texter: A Boosting-
based System for Text
Categorization
[2000]
Robert E Schapire,
Yoram Singer
Predict a good
approximation of
the set of labels
associated with a
given document
Issues in
implementation of
multilabel text
categorization
Provides for multilevel
text categorization
[3] Content-Based Book
Recommending Using
Learning for Text
Categorization[1995]
Raymond J. Mooney,
Loriene Roy
Being able to
recommended
previously unrated
items to users with
unique interests
Ratings are based on
random sampling of
items, so are having
less accurate
considerations
Ratings are based on a
group of experts
suggestions and review
and as such are more
accurate.
LITERATURE SURVEY (CONTD..)
SR.
NO
PAPER TITLE AUTHOR ADVANTAGES LIMITATIONS PROPOSED SOLUTIONS
[4] UNWANTED
MESSAGES ARE
FILTERED USING
CONTENT MINING
[Jan 2014]
Ms. Shruti C. Belsare,
Prof. R.R. Keole
A system will
automatically filter
unwanted messages
from OSN user
walls on the basis
of both message
content and the
message creator
relationships and
characteristics.
No assistance to users
for FR specification.
a different semantics for
filtering rules to better fit
the considered domain, an
online setup assistant
(OSA) to help users in FR
specification.
[5] A System Approach
to Avoid Unwanted
Messages
from User Walls
[feb 2014]
Dipali D. Vidhate,
Ajay. P. Thakare
concerns both the
rule
layer and the
classification
modules.
The analysis of related
work has highlighted
the lack of a publicly
available benchmark for
comparing different
approaches to content
based classification of
user walls short
texts.
To cope with this lack, we
have built and made
available a dataset D of
messages taken from
Facebook. The group of
experts has been chosen in
an attempt to
ensure high heterogeneity
concerning sex, age,
SYSTEM ARCHITECTURE
• The architecture in support of OSN services is
a three-tier Structure.
• The first layer Social Network Manager
(SNM)
• The second layer Social Network Applications
(SNAs).
• The third layer Graphical User Interfaces
(GUIs).
SYSTEM WORK FLOW
ALGORITHM
• SVM (Support vector machine) are supervised learning models that
analyze pattern and recognize pattern.
• Used for classification.
• SVM builds model that assigns examples in category or other .
• Representation of examples as points in space
MATHEMATICAL MODEL
• Set theory to make classifications of the content into relevant categories.
• Each of the categories will contain words which can be classified as
containing in those categories .
• The universal set will contain the input string which will be the text which
is posted on the wall .
• The sets will be AB(abusive ),V(vulgar),P(political),S(sexual) .
MATHEMATICAL MODEL (CONTD..)
[1] ML based classifier:
Input: Short Text
Output: contentSpec[showing which message belongs to particular class]
[2] Filtering mechanism:
Input: (author, creatorSpec, contentSpec, action)
Process:
FM=[UserSpec,contentSpec==category(Violence,Vulgar,offensive,Hate,Sexual)]
Output: {ContentSpec, M||Y}
RESULTS
RESULTS (CONTD.)
RESULTS (CONTD.)
CONCLUSION
• Filtered wall is a system to filter undesired messages from OSN walls.
• This system approach decides when user should be inserted into a black
list.
• Filtered wall has a wide variety of applications in OSN wall.
REFERENCES
• [1] A. Adomavicius, G.and Tuzhilin, “Toward the next generation of
recommender systems: A survey of the state-of-the-art and possible
extensions,” IEEE Transaction on Knowledge and Data Engineering,vol.
17, no. 6, pp. 734–749, 2005.
• [2] M. Chau and H. Chen, “A machine learning approach to web page
filtering using content and structure analysis,” Decision Support Systems,
vol. 44, no. 2, pp. 482–494, 2008.
• [3] R. J. Mooney and L. Roy, “Content-based book recommending using
learning for text categorization,” in Proceedings of the Fifth ACM
Conference on Digital Libraries. New York: ACM Press, 2000, pp. 195–
204.
• [4] F. Sebastiani,“Machine learning in automated text
categorization,”ACM Computing Surveys, vol. 34, no. 1, pp. 1–47, 2002.
PUBLICATIONS
• Published literature survey paper in National conference on inter
disciplinary research on recent trends in information technology and
computer engineering (NCRTIT).
• Published in IJAFRC journal (ISSN:2348-4853)
• Published in Indira college of engineering and management under
QUANTONIUM ’15.
• Presented and placed FIRST in DY.PATIL COLLEGE OF ENGINEERING
paper presentation competition judged by industry experts.
• Submitted paper Asian Journal for Engineering and Technological
Innovation (AJETI) (ISSN 2347-7385).

More Related Content

What's hot

Paper id 152013128
Paper id 152013128Paper id 152013128
Paper id 152013128IJRAT
 
A system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user wallsA system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user wallsJPINFOTECH JAYAPRAKASH
 
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnIJSRD
 
Iaetsd efficient filteration of unwanted messages
Iaetsd efficient filteration of unwanted messagesIaetsd efficient filteration of unwanted messages
Iaetsd efficient filteration of unwanted messagesIaetsd Iaetsd
 
Iaetsd hierarchical fuzzy rule based classification
Iaetsd hierarchical fuzzy rule based classificationIaetsd hierarchical fuzzy rule based classification
Iaetsd hierarchical fuzzy rule based classificationIaetsd Iaetsd
 
An automatic filtering task in osn using content based approach
An automatic filtering task in osn using content based approachAn automatic filtering task in osn using content based approach
An automatic filtering task in osn using content based approachIAEME Publication
 
CROSS-PLATFORM IDENTIFICATION OF ANONYMOUS IDENTICAL USERS IN MULTIPLE SOCIAL...
CROSS-PLATFORM IDENTIFICATION OF ANONYMOUS IDENTICAL USERS IN MULTIPLE SOCIAL...CROSS-PLATFORM IDENTIFICATION OF ANONYMOUS IDENTICAL USERS IN MULTIPLE SOCIAL...
CROSS-PLATFORM IDENTIFICATION OF ANONYMOUS IDENTICAL USERS IN MULTIPLE SOCIAL...Nexgen Technology
 
Rule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social networkRule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social networkeSAT Publishing House
 
DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR ...
DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR ...DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR ...
DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR ...IJNSA Journal
 
New prediction method for data spreading in social networks based on machine ...
New prediction method for data spreading in social networks based on machine ...New prediction method for data spreading in social networks based on machine ...
New prediction method for data spreading in social networks based on machine ...TELKOMNIKA JOURNAL
 
Identifying features in opinion mining via intrinsic and extrinsic domain rel...
Identifying features in opinion mining via intrinsic and extrinsic domain rel...Identifying features in opinion mining via intrinsic and extrinsic domain rel...
Identifying features in opinion mining via intrinsic and extrinsic domain rel...Gajanand Sharma
 
JPJ1419 Discovering Emerging Topics in Social Streams via Link-Anomaly Detec...
JPJ1419  Discovering Emerging Topics in Social Streams via Link-Anomaly Detec...JPJ1419  Discovering Emerging Topics in Social Streams via Link-Anomaly Detec...
JPJ1419 Discovering Emerging Topics in Social Streams via Link-Anomaly Detec...chennaijp
 
A Fuzzy Approach to Text Classification WithTwo-Stage Training for Ambiguous ...
A Fuzzy Approach to Text Classification WithTwo-Stage Training for Ambiguous ...A Fuzzy Approach to Text Classification WithTwo-Stage Training for Ambiguous ...
A Fuzzy Approach to Text Classification WithTwo-Stage Training for Ambiguous ...JAYAPRAKASH JPINFOTECH
 
2009-Social computing-First steps to netviz nirvana
2009-Social computing-First steps to netviz nirvana2009-Social computing-First steps to netviz nirvana
2009-Social computing-First steps to netviz nirvanaMarc Smith
 
Semantic Massage Addressing based on Social Cloud Actor's Interests
Semantic Massage Addressing based on Social Cloud Actor's InterestsSemantic Massage Addressing based on Social Cloud Actor's Interests
Semantic Massage Addressing based on Social Cloud Actor's InterestsCSCJournals
 

What's hot (20)

Paper id 152013128
Paper id 152013128Paper id 152013128
Paper id 152013128
 
A system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user wallsA system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user walls
 
S180304116124
S180304116124S180304116124
S180304116124
 
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osn
 
Cb4301449454
Cb4301449454Cb4301449454
Cb4301449454
 
D0351020025
D0351020025D0351020025
D0351020025
 
Iaetsd efficient filteration of unwanted messages
Iaetsd efficient filteration of unwanted messagesIaetsd efficient filteration of unwanted messages
Iaetsd efficient filteration of unwanted messages
 
Iaetsd hierarchical fuzzy rule based classification
Iaetsd hierarchical fuzzy rule based classificationIaetsd hierarchical fuzzy rule based classification
Iaetsd hierarchical fuzzy rule based classification
 
An automatic filtering task in osn using content based approach
An automatic filtering task in osn using content based approachAn automatic filtering task in osn using content based approach
An automatic filtering task in osn using content based approach
 
CROSS-PLATFORM IDENTIFICATION OF ANONYMOUS IDENTICAL USERS IN MULTIPLE SOCIAL...
CROSS-PLATFORM IDENTIFICATION OF ANONYMOUS IDENTICAL USERS IN MULTIPLE SOCIAL...CROSS-PLATFORM IDENTIFICATION OF ANONYMOUS IDENTICAL USERS IN MULTIPLE SOCIAL...
CROSS-PLATFORM IDENTIFICATION OF ANONYMOUS IDENTICAL USERS IN MULTIPLE SOCIAL...
 
Rule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social networkRule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social network
 
DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR ...
DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR ...DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR ...
DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR ...
 
New prediction method for data spreading in social networks based on machine ...
New prediction method for data spreading in social networks based on machine ...New prediction method for data spreading in social networks based on machine ...
New prediction method for data spreading in social networks based on machine ...
 
Identifying features in opinion mining via intrinsic and extrinsic domain rel...
Identifying features in opinion mining via intrinsic and extrinsic domain rel...Identifying features in opinion mining via intrinsic and extrinsic domain rel...
Identifying features in opinion mining via intrinsic and extrinsic domain rel...
 
JPJ1419 Discovering Emerging Topics in Social Streams via Link-Anomaly Detec...
JPJ1419  Discovering Emerging Topics in Social Streams via Link-Anomaly Detec...JPJ1419  Discovering Emerging Topics in Social Streams via Link-Anomaly Detec...
JPJ1419 Discovering Emerging Topics in Social Streams via Link-Anomaly Detec...
 
A Fuzzy Approach to Text Classification WithTwo-Stage Training for Ambiguous ...
A Fuzzy Approach to Text Classification WithTwo-Stage Training for Ambiguous ...A Fuzzy Approach to Text Classification WithTwo-Stage Training for Ambiguous ...
A Fuzzy Approach to Text Classification WithTwo-Stage Training for Ambiguous ...
 
2009-Social computing-First steps to netviz nirvana
2009-Social computing-First steps to netviz nirvana2009-Social computing-First steps to netviz nirvana
2009-Social computing-First steps to netviz nirvana
 
D1803022335
D1803022335D1803022335
D1803022335
 
Semantic Massage Addressing based on Social Cloud Actor's Interests
Semantic Massage Addressing based on Social Cloud Actor's InterestsSemantic Massage Addressing based on Social Cloud Actor's Interests
Semantic Massage Addressing based on Social Cloud Actor's Interests
 
Node similarity
Node similarityNode similarity
Node similarity
 

Similar to ONLINE SOCIAL NETWORK

User interface software tools past present and future
User interface software tools past present and futureUser interface software tools past present and future
User interface software tools past present and futureAlison HONG
 
Domain Modeling for Personalized Learning
Domain Modeling for Personalized LearningDomain Modeling for Personalized Learning
Domain Modeling for Personalized LearningPeter Brusilovsky
 
KASW'08 - Invited Talk
KASW'08 - Invited TalkKASW'08 - Invited Talk
KASW'08 - Invited TalkRalf Klamma
 
On data-driven systems analyzing, supporting and enhancing users’ interaction...
On data-driven systems analyzing, supporting and enhancing users’ interaction...On data-driven systems analyzing, supporting and enhancing users’ interaction...
On data-driven systems analyzing, supporting and enhancing users’ interaction...Grial - University of Salamanca
 
Exploiting classical bibliometrics of CSCW: classification, evaluation, limit...
Exploiting classical bibliometrics of CSCW: classification, evaluation, limit...Exploiting classical bibliometrics of CSCW: classification, evaluation, limit...
Exploiting classical bibliometrics of CSCW: classification, evaluation, limit...António Correia
 
The Revolution Of Cloud Computing
The Revolution Of Cloud ComputingThe Revolution Of Cloud Computing
The Revolution Of Cloud ComputingCarmen Sanborn
 
2015-11-11 research seminar
2015-11-11 research seminar2015-11-11 research seminar
2015-11-11 research seminarifi8106tlu
 
Auto Mapping Texts for Human-Machine Analysis and Sensemaking
Auto Mapping Texts for Human-Machine Analysis and SensemakingAuto Mapping Texts for Human-Machine Analysis and Sensemaking
Auto Mapping Texts for Human-Machine Analysis and SensemakingShalin Hai-Jew
 
Statistical and Empirical Approaches to Spoken Dialog Systems
Statistical and Empirical Approaches to Spoken Dialog SystemsStatistical and Empirical Approaches to Spoken Dialog Systems
Statistical and Empirical Approaches to Spoken Dialog Systemsbutest
 
RUNNING HEADER Analytics Ecosystem1Analytics Ecosystem4.docx
RUNNING HEADER Analytics Ecosystem1Analytics Ecosystem4.docxRUNNING HEADER Analytics Ecosystem1Analytics Ecosystem4.docx
RUNNING HEADER Analytics Ecosystem1Analytics Ecosystem4.docxanhlodge
 
Exploring Generative Models of Tripartite Graphs for Recommendation in Social...
Exploring Generative Models of Tripartite Graphs for Recommendation in Social...Exploring Generative Models of Tripartite Graphs for Recommendation in Social...
Exploring Generative Models of Tripartite Graphs for Recommendation in Social...Charalampos Chelmis
 
USING ONTOLOGIES TO OVERCOMING DRAWBACKS OF DATABASES AND VICE VERSA: A SURVEY
USING ONTOLOGIES TO OVERCOMING DRAWBACKS OF DATABASES AND VICE VERSA: A SURVEYUSING ONTOLOGIES TO OVERCOMING DRAWBACKS OF DATABASES AND VICE VERSA: A SURVEY
USING ONTOLOGIES TO OVERCOMING DRAWBACKS OF DATABASES AND VICE VERSA: A SURVEYcseij
 
SYS5160 a review of a GIS system
SYS5160 a review of a GIS system SYS5160 a review of a GIS system
SYS5160 a review of a GIS system Peter Timusk
 
Activating Research Collaboratories with Collaboration Patterns
Activating Research Collaboratories with Collaboration PatternsActivating Research Collaboratories with Collaboration Patterns
Activating Research Collaboratories with Collaboration PatternsCommunitySense
 
Social media community using optimized algorithm by M. Gomathi / Lecturer
Social media community using optimized algorithm by M. Gomathi / LecturerSocial media community using optimized algorithm by M. Gomathi / Lecturer
Social media community using optimized algorithm by M. Gomathi / Lecturergomathi chlm
 

Similar to ONLINE SOCIAL NETWORK (20)

User interface software tools past present and future
User interface software tools past present and futureUser interface software tools past present and future
User interface software tools past present and future
 
Domain Modeling for Personalized Learning
Domain Modeling for Personalized LearningDomain Modeling for Personalized Learning
Domain Modeling for Personalized Learning
 
KASW'08 - Invited Talk
KASW'08 - Invited TalkKASW'08 - Invited Talk
KASW'08 - Invited Talk
 
On data-driven systems analyzing, supporting and enhancing users’ interaction...
On data-driven systems analyzing, supporting and enhancing users’ interaction...On data-driven systems analyzing, supporting and enhancing users’ interaction...
On data-driven systems analyzing, supporting and enhancing users’ interaction...
 
Exploiting classical bibliometrics of CSCW: classification, evaluation, limit...
Exploiting classical bibliometrics of CSCW: classification, evaluation, limit...Exploiting classical bibliometrics of CSCW: classification, evaluation, limit...
Exploiting classical bibliometrics of CSCW: classification, evaluation, limit...
 
The Revolution Of Cloud Computing
The Revolution Of Cloud ComputingThe Revolution Of Cloud Computing
The Revolution Of Cloud Computing
 
Text Mining
Text MiningText Mining
Text Mining
 
Q046049397
Q046049397Q046049397
Q046049397
 
2015-11-11 research seminar
2015-11-11 research seminar2015-11-11 research seminar
2015-11-11 research seminar
 
Ux prototyping
Ux prototypingUx prototyping
Ux prototyping
 
Auto Mapping Texts for Human-Machine Analysis and Sensemaking
Auto Mapping Texts for Human-Machine Analysis and SensemakingAuto Mapping Texts for Human-Machine Analysis and Sensemaking
Auto Mapping Texts for Human-Machine Analysis and Sensemaking
 
06 Community Detection
06 Community Detection06 Community Detection
06 Community Detection
 
Statistical and Empirical Approaches to Spoken Dialog Systems
Statistical and Empirical Approaches to Spoken Dialog SystemsStatistical and Empirical Approaches to Spoken Dialog Systems
Statistical and Empirical Approaches to Spoken Dialog Systems
 
RUNNING HEADER Analytics Ecosystem1Analytics Ecosystem4.docx
RUNNING HEADER Analytics Ecosystem1Analytics Ecosystem4.docxRUNNING HEADER Analytics Ecosystem1Analytics Ecosystem4.docx
RUNNING HEADER Analytics Ecosystem1Analytics Ecosystem4.docx
 
CI_for_NA
CI_for_NACI_for_NA
CI_for_NA
 
Exploring Generative Models of Tripartite Graphs for Recommendation in Social...
Exploring Generative Models of Tripartite Graphs for Recommendation in Social...Exploring Generative Models of Tripartite Graphs for Recommendation in Social...
Exploring Generative Models of Tripartite Graphs for Recommendation in Social...
 
USING ONTOLOGIES TO OVERCOMING DRAWBACKS OF DATABASES AND VICE VERSA: A SURVEY
USING ONTOLOGIES TO OVERCOMING DRAWBACKS OF DATABASES AND VICE VERSA: A SURVEYUSING ONTOLOGIES TO OVERCOMING DRAWBACKS OF DATABASES AND VICE VERSA: A SURVEY
USING ONTOLOGIES TO OVERCOMING DRAWBACKS OF DATABASES AND VICE VERSA: A SURVEY
 
SYS5160 a review of a GIS system
SYS5160 a review of a GIS system SYS5160 a review of a GIS system
SYS5160 a review of a GIS system
 
Activating Research Collaboratories with Collaboration Patterns
Activating Research Collaboratories with Collaboration PatternsActivating Research Collaboratories with Collaboration Patterns
Activating Research Collaboratories with Collaboration Patterns
 
Social media community using optimized algorithm by M. Gomathi / Lecturer
Social media community using optimized algorithm by M. Gomathi / LecturerSocial media community using optimized algorithm by M. Gomathi / Lecturer
Social media community using optimized algorithm by M. Gomathi / Lecturer
 

More from Shailesh kumar

Segmentation of bank customer
Segmentation of bank customerSegmentation of bank customer
Segmentation of bank customerShailesh kumar
 
Project report Segmentation and Penetration in HDFC bank
Project report Segmentation and Penetration in HDFC bank Project report Segmentation and Penetration in HDFC bank
Project report Segmentation and Penetration in HDFC bank Shailesh kumar
 
Merger of Vodafone and hutch
Merger of Vodafone and hutchMerger of Vodafone and hutch
Merger of Vodafone and hutchShailesh kumar
 
SOLAR MPPT, INVERTER AND AUTOSWITCHING
SOLAR MPPT, INVERTER AND AUTOSWITCHINGSOLAR MPPT, INVERTER AND AUTOSWITCHING
SOLAR MPPT, INVERTER AND AUTOSWITCHINGShailesh kumar
 
MultiModal Image Search on Mobile Device
MultiModal Image Search on Mobile DeviceMultiModal Image Search on Mobile Device
MultiModal Image Search on Mobile DeviceShailesh kumar
 
Reports on Fairness aware and privacy preserving friend matching protocol in ...
Reports on Fairness aware and privacy preserving friend matching protocol in ...Reports on Fairness aware and privacy preserving friend matching protocol in ...
Reports on Fairness aware and privacy preserving friend matching protocol in ...Shailesh kumar
 
Fairness aware and privacy preserving friend matching protocol in mobile soci...
Fairness aware and privacy preserving friend matching protocol in mobile soci...Fairness aware and privacy preserving friend matching protocol in mobile soci...
Fairness aware and privacy preserving friend matching protocol in mobile soci...Shailesh kumar
 
Recognition and enhancement of traffic sign for computer generated images
Recognition and enhancement of traffic sign for computer generated imagesRecognition and enhancement of traffic sign for computer generated images
Recognition and enhancement of traffic sign for computer generated imagesShailesh kumar
 
TELEPHONE BILLING SYSTEM
TELEPHONE BILLING SYSTEMTELEPHONE BILLING SYSTEM
TELEPHONE BILLING SYSTEMShailesh kumar
 

More from Shailesh kumar (11)

Segmentation of bank customer
Segmentation of bank customerSegmentation of bank customer
Segmentation of bank customer
 
Project report Segmentation and Penetration in HDFC bank
Project report Segmentation and Penetration in HDFC bank Project report Segmentation and Penetration in HDFC bank
Project report Segmentation and Penetration in HDFC bank
 
Merger of Vodafone and hutch
Merger of Vodafone and hutchMerger of Vodafone and hutch
Merger of Vodafone and hutch
 
Drivetrain
DrivetrainDrivetrain
Drivetrain
 
SOLAR MPPT, INVERTER AND AUTOSWITCHING
SOLAR MPPT, INVERTER AND AUTOSWITCHINGSOLAR MPPT, INVERTER AND AUTOSWITCHING
SOLAR MPPT, INVERTER AND AUTOSWITCHING
 
snake game
snake gamesnake game
snake game
 
MultiModal Image Search on Mobile Device
MultiModal Image Search on Mobile DeviceMultiModal Image Search on Mobile Device
MultiModal Image Search on Mobile Device
 
Reports on Fairness aware and privacy preserving friend matching protocol in ...
Reports on Fairness aware and privacy preserving friend matching protocol in ...Reports on Fairness aware and privacy preserving friend matching protocol in ...
Reports on Fairness aware and privacy preserving friend matching protocol in ...
 
Fairness aware and privacy preserving friend matching protocol in mobile soci...
Fairness aware and privacy preserving friend matching protocol in mobile soci...Fairness aware and privacy preserving friend matching protocol in mobile soci...
Fairness aware and privacy preserving friend matching protocol in mobile soci...
 
Recognition and enhancement of traffic sign for computer generated images
Recognition and enhancement of traffic sign for computer generated imagesRecognition and enhancement of traffic sign for computer generated images
Recognition and enhancement of traffic sign for computer generated images
 
TELEPHONE BILLING SYSTEM
TELEPHONE BILLING SYSTEMTELEPHONE BILLING SYSTEM
TELEPHONE BILLING SYSTEM
 

Recently uploaded

Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 

Recently uploaded (20)

Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 

ONLINE SOCIAL NETWORK

  • 1. CONTENTS • Problem Definition • Existing System • Proposed System • Literature Survey • System Architecture • Algorithm • Mathematical Model • Results • Conclusion • References • Pulication
  • 2. PROBLEM DEFINITION • Online Social Media Has Become Face Of Internet Today. • On-line Social Networks (OSNs) are most popular interactive medium to communicate and share data, views and so much more . • According to a rough estimate 30 billion pieces of content (web links, news stories, blog posts, notes, photo albums, etc.) are shared each month.
  • 3. PROBLEM DEFINITION • For the numerous positives there are a few negatives which spoil the user experience . • Primary among them is the inability to control what is being posted on the wall. • Our system exploits this weakness and comes up with a solution for it .
  • 4. PROBLEM DEFINITION (CONTD..) • Blatant misuse of social media platforms • Recent examples (Shivaji Issue) • Unfiltered messages on wall can be a tool used to bully. • The system aims at addressing such concerns and disallow the misuse.
  • 5. EXISTING SYSTEM • Platforms like Facebook ,Google do not provide filtering of any sort. • Don’t have any mechanism to control fake profile menace . • Can’t restrict updation and has been on the receiving end for a lot of such issues.
  • 6. EXISTING SYSTEM ARCHITECTURE The architecture in support of OSN services is a two-tier Structure. Graphical User Interfaces Social Network Manager
  • 7. PROPOSED SYSTEM • Propose and evaluate an automated system, called filtered wall (fw), able to filter unwanted messages from osn user walls. • We exploit machine learning (ml) text categorization techniques. • Fake profile identification. IP monitoring. • All existing features of the social media
  • 8. PROPOSED SYSTEM (CONTD..) • The concept of blocklist to further the utility value of the system . • The blacklist will be a list where repeated offenders will be listed and will be blocked from further usage • The use of a THRESHHOLD VALUE for the same will be done
  • 9. LITERATURE SURVEY SR. NO PAPER TITLE AUTHORS ADVANTAGES LIMITATIONS PROPOSED SOLUTIONS [1] A Comparison of Classifiers and Document Representations for the Routing Problem [1995] H. Schutze, D.A. Hull, J.O. Pedersen Error minimization Detail approach for dimensional reduction is required Provides for detail approach to dimensional reduction [2] Boos Texter: A Boosting- based System for Text Categorization [2000] Robert E Schapire, Yoram Singer Predict a good approximation of the set of labels associated with a given document Issues in implementation of multilabel text categorization Provides for multilevel text categorization [3] Content-Based Book Recommending Using Learning for Text Categorization[1995] Raymond J. Mooney, Loriene Roy Being able to recommended previously unrated items to users with unique interests Ratings are based on random sampling of items, so are having less accurate considerations Ratings are based on a group of experts suggestions and review and as such are more accurate.
  • 10. LITERATURE SURVEY (CONTD..) SR. NO PAPER TITLE AUTHOR ADVANTAGES LIMITATIONS PROPOSED SOLUTIONS [4] UNWANTED MESSAGES ARE FILTERED USING CONTENT MINING [Jan 2014] Ms. Shruti C. Belsare, Prof. R.R. Keole A system will automatically filter unwanted messages from OSN user walls on the basis of both message content and the message creator relationships and characteristics. No assistance to users for FR specification. a different semantics for filtering rules to better fit the considered domain, an online setup assistant (OSA) to help users in FR specification. [5] A System Approach to Avoid Unwanted Messages from User Walls [feb 2014] Dipali D. Vidhate, Ajay. P. Thakare concerns both the rule layer and the classification modules. The analysis of related work has highlighted the lack of a publicly available benchmark for comparing different approaches to content based classification of user walls short texts. To cope with this lack, we have built and made available a dataset D of messages taken from Facebook. The group of experts has been chosen in an attempt to ensure high heterogeneity concerning sex, age,
  • 11. SYSTEM ARCHITECTURE • The architecture in support of OSN services is a three-tier Structure. • The first layer Social Network Manager (SNM) • The second layer Social Network Applications (SNAs). • The third layer Graphical User Interfaces (GUIs).
  • 13. ALGORITHM • SVM (Support vector machine) are supervised learning models that analyze pattern and recognize pattern. • Used for classification. • SVM builds model that assigns examples in category or other . • Representation of examples as points in space
  • 14. MATHEMATICAL MODEL • Set theory to make classifications of the content into relevant categories. • Each of the categories will contain words which can be classified as containing in those categories . • The universal set will contain the input string which will be the text which is posted on the wall . • The sets will be AB(abusive ),V(vulgar),P(political),S(sexual) .
  • 15. MATHEMATICAL MODEL (CONTD..) [1] ML based classifier: Input: Short Text Output: contentSpec[showing which message belongs to particular class] [2] Filtering mechanism: Input: (author, creatorSpec, contentSpec, action) Process: FM=[UserSpec,contentSpec==category(Violence,Vulgar,offensive,Hate,Sexual)] Output: {ContentSpec, M||Y}
  • 19. CONCLUSION • Filtered wall is a system to filter undesired messages from OSN walls. • This system approach decides when user should be inserted into a black list. • Filtered wall has a wide variety of applications in OSN wall.
  • 20. REFERENCES • [1] A. Adomavicius, G.and Tuzhilin, “Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions,” IEEE Transaction on Knowledge and Data Engineering,vol. 17, no. 6, pp. 734–749, 2005. • [2] M. Chau and H. Chen, “A machine learning approach to web page filtering using content and structure analysis,” Decision Support Systems, vol. 44, no. 2, pp. 482–494, 2008. • [3] R. J. Mooney and L. Roy, “Content-based book recommending using learning for text categorization,” in Proceedings of the Fifth ACM Conference on Digital Libraries. New York: ACM Press, 2000, pp. 195– 204. • [4] F. Sebastiani,“Machine learning in automated text categorization,”ACM Computing Surveys, vol. 34, no. 1, pp. 1–47, 2002.
  • 21. PUBLICATIONS • Published literature survey paper in National conference on inter disciplinary research on recent trends in information technology and computer engineering (NCRTIT). • Published in IJAFRC journal (ISSN:2348-4853) • Published in Indira college of engineering and management under QUANTONIUM ’15. • Presented and placed FIRST in DY.PATIL COLLEGE OF ENGINEERING paper presentation competition judged by industry experts. • Submitted paper Asian Journal for Engineering and Technological Innovation (AJETI) (ISSN 2347-7385).