SlideShare a Scribd company logo
A System to Filter Unwanted Messages from 
OSN User Walls 
Presented By: 
Gajanand Sharma 
M. E. Scholar 
UVCE Bangalore 
Guided By: 
Ms. Vandana Jha 
Ph. D. Scholar 
UVCE Bangalore
 Introduction 
 Related Work 
 Model 
 Algorithm 
 Implementation 
 Performance 
 Conclusion 
 Bibliography
 The underlying issue in today’s Online Social Networks is to give users the 
ability to control the messages posted on their own timeline. 
 Online Social Networks provide a little support to this necessity. 
 The proposed system allows users to have a direct control on their timeline 
posts. 
 This is achieved by using a flexible rule based system allowing users to 
customize the filtering criteria.
 Online Social Networks are one of the most popular medium for communication, 
sharing and broadcasting the human life information. 
 Due to huge and dynamic character of data, web content mining strategies are 
assumed to automatically discover the useful information from the data. 
 In OSNs this strategy is used to filter and remove unwanted posts on the user walls. 
 It can be implemented using ad - hoc classification strategies because wall messages 
contain short text for which traditional classification methods do not work.
 So the aim of proposed system is to evaluate an automated system able to filter 
unwanted messages form user walls. 
 Machine Learning text categorization techniques are used to automatically assign with 
each short text message a set of categories based on its content. 
 By using this technique, short messages are categorized into neutral and non-neutral. 
Then Non-neutral messages are further classified into different categories. 
 By using Filtering Rules, users can state what contents should not be displayed on 
their walls. 
 Filtering Rules exploit user profiles, user relationships as well as the output of the 
Machine Learning categorization process to state the filtering criteria to be enforced.
 The system also provides the support for user-defined Black-Lists. i.e., lists of users 
that are temporarily prevented to post any kind of messages on a user wall.
 N.J. Belkin and W.B. Croft, introduced Information filtering system, in “Information 
Filtering and Information Retrieval: Two Sides of the Same Coin?” 
 P.J. Denning, introduced content based filtering system in paper entitled “Electronic Junk,” 
 P.W. Foltz and S.T. Dumais, also discussed information filtering system in the paper 
“Personalized Information Delivery: An Analysis of Information Filtering Methods,” 
 M. Vanetti, E. Binaghi, B. Carminati, M. Carullo, and E. Ferrari, given the concept of content 
based filtering in the paper “Content-Based Filtering in On-Line Social Networks,”
 The architecture in support of OSN services is a three-tier structure. 
1. Social Network Manager (SNM) 
-Aims to provide the basic OSN functionalities… 
2. Social Network Applications (SNAs) 
-Provides the support for external Social Network Applications… 
3. Graphical User Interfaces (GUIs) 
-GUI to set up and manage FRs/ BLs by users…
Information 
Filtering 
OSN 
Policy-based 
Personalization 
Short Text 
Classification
 Information filtering 
 Information filtering can be used for a different, more sensitive, purpose. This is 
due to the fact that in OSNs there is the possibility of posting or commenting other 
posts on particular public/private areas, called in general walls. 
 Information filtering can therefore be used to give users the ability to automatically 
control the messages written on their own walls, by filtering out unwanted 
messages.
 Short Text Classifier 
 It is something like first identifying Neutral sentences, then classifying Non-neutral 
sentences… 
 First level task is somehow hard task i.e. labeling massage sentences Neutral or Non- 
Neutral… 
 In second level non-neutral sentences are further classified into different classes… 
 The second level soft classifier produces a gradual membership for each non-neutral 
sentence…
 Policy based Personalization 
 A classification method has been proposed to categorize short text messages in 
order to avoid overwhelming users of microblogging services by raw data. 
 Filtering policy language allows the setting of FRs according to a variety of 
criteria, that do not consider only the results of the classification process but also 
the relationships of the wall owner with other OSN users as well as information on 
the user profile.
Vector Space Model 
 This is the underlying model for text representation according to which a text 
document dj is represented as a vector of binary or real weights. 
underlying model for text representation 
 T is the set of terms that occur at least once in at least one document of the 
collection Tr. 
 wkj є [0,1] represents how much term tk contributes to the semantics of 
document dj.
 RBFN Model 
 RFBNs have a single hidden layer of processing units with local, restricted 
activation domain: A Gaussian function is commonly used. 
 RBFN main advantages are that classification function is nonlinear, the model 
may produce confidence values and it may be robust to outliers. 
 Drawbacks are the potential sensitivity to input parameters, and potential 
overtraining sensitivity.
 Creator specification 
A creator specification creatorSpec implicitly denotes a set of OSN users. It can 
have following forms- 
 A set of attribute constraints of the form an OP av 
 A set of relationship constraints of the form (m, rt, minDepth, maxTrust) 
 Filtering Rule 
A filtering rule FR is a tuple (author, creatorSpec, contentSpec, action)
 Black Lists 
A BL rule is a tuple (author, creatorSpec, creatorBehavior, T) 
 author is the OSN user who specifies the rule, i.e., the wall owner; 
 creatorSpec is a creator specification, specified according to Definition 1; 
 creatorBehavior consists of two components RFBlocked and minBanned. 
RFBlocked = (RF, mode, window) 
minBanned = (min, mode, window) 
 T denotes the time period the users identified by creatorSpec and 
creatorBehavior have to be banned from author wall.
 The short message goes in user’s filtering wall and checked using the filtering rules 
defined by the user. 
 According to the user defined filtering rules, it is labeled as the class in it resides. 
 Then the gradual value of message is compared with the system defined threshold 
value. 
 If message crosses the threshold value then it goes to block list. Otherwise it is posted 
to user’s wall.
 Evaluation Metrics 
 Two different types of measures will be used to evaluate the effectiveness of first-level 
and second-level classifications. 
 In the first level, the short text classification procedure is evaluated on the basis of the 
contingency table approach. 
 At second level, measures Precision (P) that permits to evaluate the number of false 
positives, Recall (R), that permits to evaluate the number of false negatives, and the 
overall metric F-measure (F β) defined as the harmonic mean between the above two 
indexes.
 Overall Performance 
 The blacklist guarantees 100% filtering of messages 
coming from suspicious sources. 
 The process of detecting and filtering spam is transparent, 
regulated by standards and fairly reliable. 
 Flexibility, and the possibility to fine-tune the settings. 
Rarely make mistakes in distinguishing spam from 
legitimate messages.
 DicomFW 
 DicomFW is the GUI of this study work. It is a prototype Facebook application. 
 The main focus is on implementation of Filtering Rules throughout the 
implementation. 
 This application permits to- 
1. View the list of users’ FilteringWalls; 
2. View messages and post a new one on a FilteringWalls; 
3. Define Filtering Rules using the OSA tool.
 In this whole study work, a system to filter undesired messages from Online Social 
Network walls is presented. 
 The system exploits a Machine Learning soft classifier to enforce customizable 
content-dependent Filtering Rules. 
 The flexibility of the system in terms of filtering options is enhanced through the 
management of Black Lists. 
 The aim behind this work is to investigate a tool able to automatically recommend 
trust values for those contacts user does not personally known.
[1] M. Vanetti, E. Binaghi, B. Carminati, M. Carullo, and E. Ferrari, “Content-Based Filtering in On- 
Line Social Networks,” Proc. ECML/PKDD Workshop Privacy and Security Issues in Data Mining and 
Machine Learning (PSDML ’10), 2010. 
[2] Y. Zhang and J. Callan, “Maximum Likelihood Estimation for Filtering Thresholds,” Proc. 24th Ann. 
Int’l ACM SIGIR Conf. Research and Development in Information Retrieval, pp. 294-302, 2001. 
[3] M. Carullo, E. Binaghi, and I. Gallo, “An Online Document Clustering Technique for Short Web 
Contents,” Pattern Recognition Letters, vol. 30, pp. 870-876, July 2009. 
[4] M. Carullo, E. Binaghi, I. Gallo, and N. Lamberti, “Clustering of Short Commercial Documents for 
the Web,” Proc. 19th Int’l Conf. Pattern Recognition (ICPR ’08), 2008. 
[5] C.D. Manning, P. Raghavan, and H. Schu ¨tze, Introduction to Information Retrieval. Cambridge 
Univ. Press, 2008.
[6] J. Moody and C. Darken, “Fast Learning in Networks of LocallyTuned Processing Units,” Neural 
Computation, vol. 1, no. 2, pp. 281-294, 1989. 
[7] M.J.D. Powell, “Radial Basis Functions for Multivariable Interpolation: A Review,” Algorithms for 
Approximation, pp. 143-167, Clarendon Press, 1987. 
[8] J. Park and I.W. Sandberg, “Approximation and Radial-BasisFunction Networks,” Neural 
Computation, vol. 5, pp. 305-316, 1993. 
[9] C. Cleverdon, “Optimizing Convenient Online Access to Bibliographic Databases,” Information 
Services and Use, vol. 4, no. 1, pp. 37-47, 1984. 
[10] J.A. Golbeck, “Computing and Applying Trust in Web-Based Social Networks,” PhD dissertation, 
Graduate School of the Univ. of Maryland, College Park, 2005.
A system to filter unwanted messages from OSN user walls
A system to filter unwanted messages from OSN user walls

More Related Content

What's hot

Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021
Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021
Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021
Florian Roth
 
Protection
ProtectionProtection
Snort
SnortSnort
Лекція №1
Лекція №1Лекція №1
Лекція №1
Michael Attwood
 
Snort
SnortSnort
What You're Missing With Your Current WAF Provider
What You're Missing With Your Current WAF ProviderWhat You're Missing With Your Current WAF Provider
What You're Missing With Your Current WAF Provider
Cloudflare
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
Santosh Khadsare
 
Introduction to SOC
Introduction to SOCIntroduction to SOC
Introduction to SOC
Boni Yeamin
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
BAKOTECH
 
Synchronization in distributed computing
Synchronization in distributed computingSynchronization in distributed computing
Synchronization in distributed computing
SVijaylakshmi
 
5G Security Briefing
5G Security Briefing5G Security Briefing
5G Security Briefing
3G4G
 
Threads presentation
Threads presentationThreads presentation
Threads presentation
Lawrence Galvez
 
Systems analysis and design lecture 1
Systems analysis and design lecture 1Systems analysis and design lecture 1
Systems analysis and design lecture 1
Nova Divine Dela Peña
 
Wireless Hacking
Wireless HackingWireless Hacking
Wireless Hacking
VIKAS SINGH BHADOURIA
 
Introduction to firewalls through Iptables
Introduction to firewalls through IptablesIntroduction to firewalls through Iptables
Introduction to firewalls through Iptables
Bud Siddhisena
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
LakshmiSamivel
 
VMware Disaster Recovery Planning: Essential Checklist
VMware Disaster Recovery Planning: Essential ChecklistVMware Disaster Recovery Planning: Essential Checklist
VMware Disaster Recovery Planning: Essential Checklist
Veeam Software
 
User Expert forum Wildfire configuration
User Expert forum Wildfire configurationUser Expert forum Wildfire configuration
User Expert forum Wildfire configuration
Alberto Rivai
 
Spectrum Scale Memory Usage
Spectrum Scale Memory UsageSpectrum Scale Memory Usage
Spectrum Scale Memory Usage
Tomer Perry
 
BSidesDFW2022-PurpleTeam_Cloud_Identity.pptx
BSidesDFW2022-PurpleTeam_Cloud_Identity.pptxBSidesDFW2022-PurpleTeam_Cloud_Identity.pptx
BSidesDFW2022-PurpleTeam_Cloud_Identity.pptx
JasonOstrom1
 

What's hot (20)

Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021
Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021
Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021
 
Protection
ProtectionProtection
Protection
 
Snort
SnortSnort
Snort
 
Лекція №1
Лекція №1Лекція №1
Лекція №1
 
Snort
SnortSnort
Snort
 
What You're Missing With Your Current WAF Provider
What You're Missing With Your Current WAF ProviderWhat You're Missing With Your Current WAF Provider
What You're Missing With Your Current WAF Provider
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Introduction to SOC
Introduction to SOCIntroduction to SOC
Introduction to SOC
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
 
Synchronization in distributed computing
Synchronization in distributed computingSynchronization in distributed computing
Synchronization in distributed computing
 
5G Security Briefing
5G Security Briefing5G Security Briefing
5G Security Briefing
 
Threads presentation
Threads presentationThreads presentation
Threads presentation
 
Systems analysis and design lecture 1
Systems analysis and design lecture 1Systems analysis and design lecture 1
Systems analysis and design lecture 1
 
Wireless Hacking
Wireless HackingWireless Hacking
Wireless Hacking
 
Introduction to firewalls through Iptables
Introduction to firewalls through IptablesIntroduction to firewalls through Iptables
Introduction to firewalls through Iptables
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
VMware Disaster Recovery Planning: Essential Checklist
VMware Disaster Recovery Planning: Essential ChecklistVMware Disaster Recovery Planning: Essential Checklist
VMware Disaster Recovery Planning: Essential Checklist
 
User Expert forum Wildfire configuration
User Expert forum Wildfire configurationUser Expert forum Wildfire configuration
User Expert forum Wildfire configuration
 
Spectrum Scale Memory Usage
Spectrum Scale Memory UsageSpectrum Scale Memory Usage
Spectrum Scale Memory Usage
 
BSidesDFW2022-PurpleTeam_Cloud_Identity.pptx
BSidesDFW2022-PurpleTeam_Cloud_Identity.pptxBSidesDFW2022-PurpleTeam_Cloud_Identity.pptx
BSidesDFW2022-PurpleTeam_Cloud_Identity.pptx
 

Viewers also liked

A system to filter unwanted messages from the
A system to filter unwanted messages from theA system to filter unwanted messages from the
A system to filter unwanted messages from the
Madan Golla
 
A system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user wallsA system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user walls
IEEEFINALYEARPROJECTS
 
seminar on To block unwanted messages _from osn
seminar on To block  unwanted  messages _from osnseminar on To block  unwanted  messages _from osn
seminar on To block unwanted messages _from osn
Shailesh kumar
 
A system to filter unwanted messages
A system to filter unwanted messagesA system to filter unwanted messages
A system to filter unwanted messages
Ninad Samel
 
Content Based Message Filtering For OSNS Using Machine Learning Classifier
Content Based Message Filtering For OSNS Using Machine  Learning ClassifierContent Based Message Filtering For OSNS Using Machine  Learning Classifier
Content Based Message Filtering For OSNS Using Machine Learning Classifier
IJMER
 
Filter unwanted messages from walls and blocking non legitimate users in osn
Filter unwanted messages from walls and blocking non legitimate users in osnFilter unwanted messages from walls and blocking non legitimate users in osn
Filter unwanted messages from walls and blocking non legitimate users in osn
IAEME Publication
 
ONLINE SOCIAL NETWORK
ONLINE SOCIAL NETWORKONLINE SOCIAL NETWORK
ONLINE SOCIAL NETWORK
Shailesh kumar
 
Identifying features in opinion mining via intrinsic and extrinsic domain rel...
Identifying features in opinion mining via intrinsic and extrinsic domain rel...Identifying features in opinion mining via intrinsic and extrinsic domain rel...
Identifying features in opinion mining via intrinsic and extrinsic domain rel...
Gajanand Sharma
 
Designing a Prosthetic Memory for Software Developers
Designing a Prosthetic Memory for Software DevelopersDesigning a Prosthetic Memory for Software Developers
Designing a Prosthetic Memory for Software Developers
Uri Dekel
 
NYMBLE BLOCKING
NYMBLE BLOCKINGNYMBLE BLOCKING
NYMBLE BLOCKING
Vatsalya Eranky
 
String matching algorithms(knuth morris-pratt)
String matching algorithms(knuth morris-pratt)String matching algorithms(knuth morris-pratt)
String matching algorithms(knuth morris-pratt)
Neel Shah
 
Scalable sentiment classification for big data analysis using naive bayes cla...
Scalable sentiment classification for big data analysis using naive bayes cla...Scalable sentiment classification for big data analysis using naive bayes cla...
Scalable sentiment classification for big data analysis using naive bayes cla...
Tien-Yang (Aiden) Wu
 
Data preprocessing
Data preprocessingData preprocessing
Data preprocessing
Gajanand Sharma
 
Vertex cover Problem
Vertex cover ProblemVertex cover Problem
Vertex cover Problem
Gajanand Sharma
 
Web content mining
Web content miningWeb content mining
Web content mining
Akanksha Dombe
 
Rabin karp string matching algorithm
Rabin karp string matching algorithmRabin karp string matching algorithm
Rabin karp string matching algorithm
Gajanand Sharma
 
Image Classification And Support Vector Machine
Image Classification And Support Vector MachineImage Classification And Support Vector Machine
Image Classification And Support Vector Machine
Shao-Chuan Wang
 
Sentiment analysis using naive bayes classifier
Sentiment analysis using naive bayes classifier Sentiment analysis using naive bayes classifier
Sentiment analysis using naive bayes classifier
Dev Sahu
 
Support Vector Machines
Support Vector MachinesSupport Vector Machines
Support Vector Machines
nextlib
 
Support Vector Machines for Classification
Support Vector Machines for ClassificationSupport Vector Machines for Classification
Support Vector Machines for Classification
Prakash Pimpale
 

Viewers also liked (20)

A system to filter unwanted messages from the
A system to filter unwanted messages from theA system to filter unwanted messages from the
A system to filter unwanted messages from the
 
A system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user wallsA system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user walls
 
seminar on To block unwanted messages _from osn
seminar on To block  unwanted  messages _from osnseminar on To block  unwanted  messages _from osn
seminar on To block unwanted messages _from osn
 
A system to filter unwanted messages
A system to filter unwanted messagesA system to filter unwanted messages
A system to filter unwanted messages
 
Content Based Message Filtering For OSNS Using Machine Learning Classifier
Content Based Message Filtering For OSNS Using Machine  Learning ClassifierContent Based Message Filtering For OSNS Using Machine  Learning Classifier
Content Based Message Filtering For OSNS Using Machine Learning Classifier
 
Filter unwanted messages from walls and blocking non legitimate users in osn
Filter unwanted messages from walls and blocking non legitimate users in osnFilter unwanted messages from walls and blocking non legitimate users in osn
Filter unwanted messages from walls and blocking non legitimate users in osn
 
ONLINE SOCIAL NETWORK
ONLINE SOCIAL NETWORKONLINE SOCIAL NETWORK
ONLINE SOCIAL NETWORK
 
Identifying features in opinion mining via intrinsic and extrinsic domain rel...
Identifying features in opinion mining via intrinsic and extrinsic domain rel...Identifying features in opinion mining via intrinsic and extrinsic domain rel...
Identifying features in opinion mining via intrinsic and extrinsic domain rel...
 
Designing a Prosthetic Memory for Software Developers
Designing a Prosthetic Memory for Software DevelopersDesigning a Prosthetic Memory for Software Developers
Designing a Prosthetic Memory for Software Developers
 
NYMBLE BLOCKING
NYMBLE BLOCKINGNYMBLE BLOCKING
NYMBLE BLOCKING
 
String matching algorithms(knuth morris-pratt)
String matching algorithms(knuth morris-pratt)String matching algorithms(knuth morris-pratt)
String matching algorithms(knuth morris-pratt)
 
Scalable sentiment classification for big data analysis using naive bayes cla...
Scalable sentiment classification for big data analysis using naive bayes cla...Scalable sentiment classification for big data analysis using naive bayes cla...
Scalable sentiment classification for big data analysis using naive bayes cla...
 
Data preprocessing
Data preprocessingData preprocessing
Data preprocessing
 
Vertex cover Problem
Vertex cover ProblemVertex cover Problem
Vertex cover Problem
 
Web content mining
Web content miningWeb content mining
Web content mining
 
Rabin karp string matching algorithm
Rabin karp string matching algorithmRabin karp string matching algorithm
Rabin karp string matching algorithm
 
Image Classification And Support Vector Machine
Image Classification And Support Vector MachineImage Classification And Support Vector Machine
Image Classification And Support Vector Machine
 
Sentiment analysis using naive bayes classifier
Sentiment analysis using naive bayes classifier Sentiment analysis using naive bayes classifier
Sentiment analysis using naive bayes classifier
 
Support Vector Machines
Support Vector MachinesSupport Vector Machines
Support Vector Machines
 
Support Vector Machines for Classification
Support Vector Machines for ClassificationSupport Vector Machines for Classification
Support Vector Machines for Classification
 

Similar to A system to filter unwanted messages from OSN user walls

Paper id 152013128
Paper id 152013128Paper id 152013128
Paper id 152013128
IJRAT
 
Rule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social networkRule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social network
eSAT Publishing House
 
Iaetsd efficient filteration of unwanted messages
Iaetsd efficient filteration of unwanted messagesIaetsd efficient filteration of unwanted messages
Iaetsd efficient filteration of unwanted messages
Iaetsd Iaetsd
 
Cb4301449454
Cb4301449454Cb4301449454
Cb4301449454
IJERA Editor
 
D0351020025
D0351020025D0351020025
D0351020025
inventionjournals
 
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osn
IJSRD
 
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osn
IJSRD
 
Iaetsd hierarchical fuzzy rule based classification
Iaetsd hierarchical fuzzy rule based classificationIaetsd hierarchical fuzzy rule based classification
Iaetsd hierarchical fuzzy rule based classification
Iaetsd Iaetsd
 
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
IOSR Journals
 
A system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user wallsA system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user walls
JPINFOTECH JAYAPRAKASH
 
S180304116124
S180304116124S180304116124
S180304116124
IOSR Journals
 
An automatic filtering task in osn using content based approach
An automatic filtering task in osn using content based approachAn automatic filtering task in osn using content based approach
An automatic filtering task in osn using content based approach
IAEME Publication
 
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Editor IJAIEM
 
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
paperpublications3
 
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSA SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
IJCI JOURNAL
 
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACYMUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
paperpublications3
 
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACYMUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
paperpublications3
 
DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR ...
DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR ...DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR ...
DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR ...
IJNSA Journal
 
The Revolution Of Cloud Computing
The Revolution Of Cloud ComputingThe Revolution Of Cloud Computing
The Revolution Of Cloud Computing
Carmen Sanborn
 
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
IJARIIT
 

Similar to A system to filter unwanted messages from OSN user walls (20)

Paper id 152013128
Paper id 152013128Paper id 152013128
Paper id 152013128
 
Rule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social networkRule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social network
 
Iaetsd efficient filteration of unwanted messages
Iaetsd efficient filteration of unwanted messagesIaetsd efficient filteration of unwanted messages
Iaetsd efficient filteration of unwanted messages
 
Cb4301449454
Cb4301449454Cb4301449454
Cb4301449454
 
D0351020025
D0351020025D0351020025
D0351020025
 
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osn
 
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osn
 
Iaetsd hierarchical fuzzy rule based classification
Iaetsd hierarchical fuzzy rule based classificationIaetsd hierarchical fuzzy rule based classification
Iaetsd hierarchical fuzzy rule based classification
 
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
 
A system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user wallsA system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user walls
 
S180304116124
S180304116124S180304116124
S180304116124
 
An automatic filtering task in osn using content based approach
An automatic filtering task in osn using content based approachAn automatic filtering task in osn using content based approach
An automatic filtering task in osn using content based approach
 
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
 
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
 
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSA SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
 
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACYMUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
 
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACYMUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
 
DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR ...
DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR ...DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR ...
DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR ...
 
The Revolution Of Cloud Computing
The Revolution Of Cloud ComputingThe Revolution Of Cloud Computing
The Revolution Of Cloud Computing
 
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
 

Recently uploaded

The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 

Recently uploaded (20)

The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 

A system to filter unwanted messages from OSN user walls

  • 1. A System to Filter Unwanted Messages from OSN User Walls Presented By: Gajanand Sharma M. E. Scholar UVCE Bangalore Guided By: Ms. Vandana Jha Ph. D. Scholar UVCE Bangalore
  • 2.  Introduction  Related Work  Model  Algorithm  Implementation  Performance  Conclusion  Bibliography
  • 3.  The underlying issue in today’s Online Social Networks is to give users the ability to control the messages posted on their own timeline.  Online Social Networks provide a little support to this necessity.  The proposed system allows users to have a direct control on their timeline posts.  This is achieved by using a flexible rule based system allowing users to customize the filtering criteria.
  • 4.  Online Social Networks are one of the most popular medium for communication, sharing and broadcasting the human life information.  Due to huge and dynamic character of data, web content mining strategies are assumed to automatically discover the useful information from the data.  In OSNs this strategy is used to filter and remove unwanted posts on the user walls.  It can be implemented using ad - hoc classification strategies because wall messages contain short text for which traditional classification methods do not work.
  • 5.  So the aim of proposed system is to evaluate an automated system able to filter unwanted messages form user walls.  Machine Learning text categorization techniques are used to automatically assign with each short text message a set of categories based on its content.  By using this technique, short messages are categorized into neutral and non-neutral. Then Non-neutral messages are further classified into different categories.  By using Filtering Rules, users can state what contents should not be displayed on their walls.  Filtering Rules exploit user profiles, user relationships as well as the output of the Machine Learning categorization process to state the filtering criteria to be enforced.
  • 6.  The system also provides the support for user-defined Black-Lists. i.e., lists of users that are temporarily prevented to post any kind of messages on a user wall.
  • 7.  N.J. Belkin and W.B. Croft, introduced Information filtering system, in “Information Filtering and Information Retrieval: Two Sides of the Same Coin?”  P.J. Denning, introduced content based filtering system in paper entitled “Electronic Junk,”  P.W. Foltz and S.T. Dumais, also discussed information filtering system in the paper “Personalized Information Delivery: An Analysis of Information Filtering Methods,”  M. Vanetti, E. Binaghi, B. Carminati, M. Carullo, and E. Ferrari, given the concept of content based filtering in the paper “Content-Based Filtering in On-Line Social Networks,”
  • 8.  The architecture in support of OSN services is a three-tier structure. 1. Social Network Manager (SNM) -Aims to provide the basic OSN functionalities… 2. Social Network Applications (SNAs) -Provides the support for external Social Network Applications… 3. Graphical User Interfaces (GUIs) -GUI to set up and manage FRs/ BLs by users…
  • 9.
  • 10. Information Filtering OSN Policy-based Personalization Short Text Classification
  • 11.  Information filtering  Information filtering can be used for a different, more sensitive, purpose. This is due to the fact that in OSNs there is the possibility of posting or commenting other posts on particular public/private areas, called in general walls.  Information filtering can therefore be used to give users the ability to automatically control the messages written on their own walls, by filtering out unwanted messages.
  • 12.  Short Text Classifier  It is something like first identifying Neutral sentences, then classifying Non-neutral sentences…  First level task is somehow hard task i.e. labeling massage sentences Neutral or Non- Neutral…  In second level non-neutral sentences are further classified into different classes…  The second level soft classifier produces a gradual membership for each non-neutral sentence…
  • 13.  Policy based Personalization  A classification method has been proposed to categorize short text messages in order to avoid overwhelming users of microblogging services by raw data.  Filtering policy language allows the setting of FRs according to a variety of criteria, that do not consider only the results of the classification process but also the relationships of the wall owner with other OSN users as well as information on the user profile.
  • 14. Vector Space Model  This is the underlying model for text representation according to which a text document dj is represented as a vector of binary or real weights. underlying model for text representation  T is the set of terms that occur at least once in at least one document of the collection Tr.  wkj є [0,1] represents how much term tk contributes to the semantics of document dj.
  • 15.  RBFN Model  RFBNs have a single hidden layer of processing units with local, restricted activation domain: A Gaussian function is commonly used.  RBFN main advantages are that classification function is nonlinear, the model may produce confidence values and it may be robust to outliers.  Drawbacks are the potential sensitivity to input parameters, and potential overtraining sensitivity.
  • 16.
  • 17.  Creator specification A creator specification creatorSpec implicitly denotes a set of OSN users. It can have following forms-  A set of attribute constraints of the form an OP av  A set of relationship constraints of the form (m, rt, minDepth, maxTrust)  Filtering Rule A filtering rule FR is a tuple (author, creatorSpec, contentSpec, action)
  • 18.  Black Lists A BL rule is a tuple (author, creatorSpec, creatorBehavior, T)  author is the OSN user who specifies the rule, i.e., the wall owner;  creatorSpec is a creator specification, specified according to Definition 1;  creatorBehavior consists of two components RFBlocked and minBanned. RFBlocked = (RF, mode, window) minBanned = (min, mode, window)  T denotes the time period the users identified by creatorSpec and creatorBehavior have to be banned from author wall.
  • 19.
  • 20.  The short message goes in user’s filtering wall and checked using the filtering rules defined by the user.  According to the user defined filtering rules, it is labeled as the class in it resides.  Then the gradual value of message is compared with the system defined threshold value.  If message crosses the threshold value then it goes to block list. Otherwise it is posted to user’s wall.
  • 21.  Evaluation Metrics  Two different types of measures will be used to evaluate the effectiveness of first-level and second-level classifications.  In the first level, the short text classification procedure is evaluated on the basis of the contingency table approach.  At second level, measures Precision (P) that permits to evaluate the number of false positives, Recall (R), that permits to evaluate the number of false negatives, and the overall metric F-measure (F β) defined as the harmonic mean between the above two indexes.
  • 22.  Overall Performance  The blacklist guarantees 100% filtering of messages coming from suspicious sources.  The process of detecting and filtering spam is transparent, regulated by standards and fairly reliable.  Flexibility, and the possibility to fine-tune the settings. Rarely make mistakes in distinguishing spam from legitimate messages.
  • 23.  DicomFW  DicomFW is the GUI of this study work. It is a prototype Facebook application.  The main focus is on implementation of Filtering Rules throughout the implementation.  This application permits to- 1. View the list of users’ FilteringWalls; 2. View messages and post a new one on a FilteringWalls; 3. Define Filtering Rules using the OSA tool.
  • 24.  In this whole study work, a system to filter undesired messages from Online Social Network walls is presented.  The system exploits a Machine Learning soft classifier to enforce customizable content-dependent Filtering Rules.  The flexibility of the system in terms of filtering options is enhanced through the management of Black Lists.  The aim behind this work is to investigate a tool able to automatically recommend trust values for those contacts user does not personally known.
  • 25. [1] M. Vanetti, E. Binaghi, B. Carminati, M. Carullo, and E. Ferrari, “Content-Based Filtering in On- Line Social Networks,” Proc. ECML/PKDD Workshop Privacy and Security Issues in Data Mining and Machine Learning (PSDML ’10), 2010. [2] Y. Zhang and J. Callan, “Maximum Likelihood Estimation for Filtering Thresholds,” Proc. 24th Ann. Int’l ACM SIGIR Conf. Research and Development in Information Retrieval, pp. 294-302, 2001. [3] M. Carullo, E. Binaghi, and I. Gallo, “An Online Document Clustering Technique for Short Web Contents,” Pattern Recognition Letters, vol. 30, pp. 870-876, July 2009. [4] M. Carullo, E. Binaghi, I. Gallo, and N. Lamberti, “Clustering of Short Commercial Documents for the Web,” Proc. 19th Int’l Conf. Pattern Recognition (ICPR ’08), 2008. [5] C.D. Manning, P. Raghavan, and H. Schu ¨tze, Introduction to Information Retrieval. Cambridge Univ. Press, 2008.
  • 26. [6] J. Moody and C. Darken, “Fast Learning in Networks of LocallyTuned Processing Units,” Neural Computation, vol. 1, no. 2, pp. 281-294, 1989. [7] M.J.D. Powell, “Radial Basis Functions for Multivariable Interpolation: A Review,” Algorithms for Approximation, pp. 143-167, Clarendon Press, 1987. [8] J. Park and I.W. Sandberg, “Approximation and Radial-BasisFunction Networks,” Neural Computation, vol. 5, pp. 305-316, 1993. [9] C. Cleverdon, “Optimizing Convenient Online Access to Bibliographic Databases,” Information Services and Use, vol. 4, no. 1, pp. 37-47, 1984. [10] J.A. Golbeck, “Computing and Applying Trust in Web-Based Social Networks,” PhD dissertation, Graduate School of the Univ. of Maryland, College Park, 2005.