SlideShare a Scribd company logo
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 678 – 683
_______________________________________________________________________________________________
678
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
0Cross-Site Bonding of Anonymous Users in Multiple Social Media Networks
0
Ambresh Bhadra Shetty
Assistant Professor,
Dept. of Studies in Computer Applications (MCA),
Visvesvaraya Technological University,
Centre for PG studies, Kalaburagi
ambresh.bhadrashetty@gmail.com
Pooja Guttedar
Student,MCA VI Semester,
Dept. of Studies in Computer Applications (MCA),
Visvesvaraya Technological University,
Centre for PG studies, Kalaburagi
poojadg666@gmail.com
Abstract: From last few years many online Social Media Networks (SMN) platforms came into existence only those users who connected
through similar site network can communicate each other by exchanging their information. For example, a Facebook user can connect only
with Facebook user not with cross site user like Twitter so to connect users through multiple cross site network we have introduced a new
social networking site calledCross platform network. Cross platform is a site which helps people to connect with huge number of different
online Social Media Networks such as Facebook, Twitter,and Wechat. Using Cross platform networkpeople can communicate each other by
exchanging the information from different sites.
Keywords: Similar Site, Cross Site, Social Media Network
__________________________________________________*****_________________________________________________
I. INTRODUCTION
Social Networks are one of the highest growing
industries in the world Social Networking sites such as
Facebook, Twitter, Wechat, Instagram are extremely a
powerful communication tools. Most of people think that
using these social media network they can communicate
each other easily and also it helps to run a successful
business.
Twitter is an online news and social networking service
where users post and interact with messages, "Tweets",
restricted to 140 characters [1]. Registered users can post
tweets, but those who are unregistered can only read them.
Based on the number of active users Facebook is
considered as most popular social networking sites in the
world. It has totally 2billion monthly users. Users of age
between 13 to 18 are consideredas minors therefore their
profiles are set to share with friends only. On year of 2010
Facebook has announced with domain name called fb.com
from American Farm Bureau Federation. It allow people to
share information like pictures, video’s what we have been
up to with friends.
In cross platform network they have proposed an
algorithm called Friend Relationship-Based User
Identification(FRUI). FRUI computes a match degree for all
hopeful User Matched Pairs (UMPs), and just UMPs with
top positions are considered as indistinguishable clients. We
likewise created two recommendations to enhance the
productivity of the calculation. Aftereffects of broad
investigations show that FRUI performs much superior to
anything current system structure-based calculations.
Cross-Platform research faces many new challenges. As
shown in Fig. 1, with the growth of different SMN platforms
on the Internet, the cross-platform approach is used to merge
as various SMN to create richer raw data and more complete
SMNs for social computing tasks. The main purpose of
using cross-platform SMN research is for identification of
users in multiple SMNs. Many studies have addressed the
user identification problem by examining public user profile
attributes, including screen name, birth- date, location,
gender, profile photo, etc. [4], [5], [7], [8], [9]. Since these
attributes are not used by any fake users. Cross platform
encompasses of the two groupings: The single-following
and the mutual-following associations. : The first one can
also be referred to as the tracking up of the associations or
the relations. It can be explained as: when the user with A
as name tag along the user with name B, in this case it is
considered as the A and the B user will be having the
tracking relationship, where one is known by the other but
the same thing is not with the other. This type of following
is seen in the SMNs relating to micro-blogging that takes in
Twitter. While the mutual-following associations are said to
be as friend associations, in which SMNs related to micro-
blogging they refer to commonly tracking associations
amongst the two users.
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 678 – 683
_______________________________________________________________________________________________
679
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Fig 1: Cross-application research to merge a variety of SMN’s
II. LITERATURE SURVEY
In year of 2011 B. Zhou and J. Pei introduced a technique
called the k-anonymity and l-diversity approaches to
provide privacy for different social networks to maintain
data privately by providing security. Because many online
social networks has lead to the problem of leaking
confidential information of individual person. This
requires a preservation of privacy before that network
data has introduced by service provider. Providing
privacy in different social networks has a one of most
important concern. Many published academics studies
have proposed solution for providing privacy but those
technique have not worked properly to overcome this
problem they have proposed a new technique called The
k-anonymity and l-diversity to maintain privacy [3].
In year of 2013 P. Jain and P. Kumaraguruhas developed
Finding Nemo, it is a method which matches accounts
called Facebook and Twitter. However,this text based
network search method has low accuracy and high
complexity in term of user identification,since only text of
same nick name are recognized while searching the friend
sets of friends [5].
In 2013 O.Goga linked accounts belonging to the same
person identity, based solely on the profile information.
Organization has started to collect a personal data of user
who generates their day to day activities through online.
In this work we need to set the capabilitiesmachine
learning to link aindependent accounts to maintain users
in different social networks. Based on that information
users provide their profiles publicly. Large scale
correlation approach helps to match account
betweendifferent social networks such as Twitter,
Facebookand Google+. In result it shows user names, real
names, location, photos using this information we can
identify 80% of the matching user account between
combinations of any two social networks [8].
Inyear of 2014 X. Qian et al. introduced a method called
Personalized Recommendation to combine the users based
on their interest and social circle. With the appearance and
notoriety of interpersonal organization, an ever increasing
number of clients get a kick out of the chance to share their
encounters, for example, evaluations, audits, and online
journals. The new factors of informal organization like
relational impact and intrigue in light of friend networks
bring openings and difficulties for recommender system
(RS) to tackle the cool begin and sparsity issue of datasets.
A portion of the social factors have been utilized as a part of
RS, yet have not been completely considered. In this paper,
three social variables, individual intrigue, relational intrigue
comparability, and relational impact, meld into a bound
together customized proposal demonstrate in light of
probabilistic grid factorization. The factor of individual
intrigue can make the RS prescribe things to meet clients'
distinctions, particularly for experienced clients. Also, for
chilly begin clients, the relational intrigue comparability and
relational impact can improve their connection among
highlights in the dormant space [10].
III. PROBLEM DEFINITION
The problem can be defined as in the existing we can send
or receive friend requests only to the person if he or she
holds an account in the same social networking site, for
example consider a person A who has an account in
Facebook and another person B has an account in Twitter,
now A cannot send
friend request to B because A & B are in different social
networking sites. To overcome this we are
designing a Cross-Site where in which the users of different
social networking sites can send or receive friend requests
with each other.
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 678 – 683
_______________________________________________________________________________________________
680
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
III. ARCHITECTURE
In above Fig 2 cross site management server list all users
and authorize the register user to get login to
corresponding networks after that the user has to view his
own profile and send request to make friends with cross
site and also he can add posts like title, description, image
in both cross site as well as in same site. To make friends
in cross site admin has to give permission then only the
user can send request to cross site user. Here admin list all
friends from cross site and similar site network andview
all user posts with image description and finally chart
results to count number of users in same site and cross site
will be displayed.
IV. IMPLEMENTATION
FRUI ALGORITHM:
In this study, we propose an innovative approach to address
the challenges faced by previous studies. This new approach
focuses on the friendship structure, and develops the Friend
Relationship-based User Identification (FRUI) algorithm.
FRUI differs from the two existing algorithms, JLA and NS,
in the following aspects
(1) NS is suitable for directed networks, while JLA and
FRUI focus on undirected networks. JLA is restricted in
undirected networks by Conditional
Random Fields, while FRUI relies on friend relationships, as
this is more reliable and consistent with real-life friendship.
(2) JLA compares unmapped neighbors of nodes from one
of the two SMNs, while NS matches unidentified usersfrom
different networks by
comparing the mapped neighbors of each node. FRUI aims
to identify the most matched pairs among mapped users, but
does not iterate unmapped users. Therefore, it markedly
reduces computational complexity.
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 678 – 683
_______________________________________________________________________________________________
681
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
V. RESULTS
Fig 3:All User and Authorize
In Fig. 3 admin is giving permission to the userto login into system after giving permission the status will be changed from
waiting to authorized
Fig 4: All Friend Request and Response
In Fig. 4 admin can view all friend request and response with respect to name of a person and social site
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 678 – 683
_______________________________________________________________________________________________
682
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Fig 5: Search Friends in Cross Site
In Fig. 5 user can search friends from cross site and send request to a particular person
Fig 6: Graph Result
In Fig. 6 graph result will display based on connected users that may either same site and cross site
VI. CONCLUSION
In this study we have designed new solution called
cross platform to identify unknown users across multiple
social media networks. We also developed a new method
called friend relationship based user identification (FRUI).
FRUI helps to computes a match degree for all hopeful User
Matched Pairs (UMPs), and UMPs with top positions are
considered as indistinguishable clients. Using this method
user can connect easily though different cross site network.
REFERENCES
[1] X. Ying and X. Wu, “Randomizing social networks: a
spectrum preserving approach”, 24, 26 April 2008.
[2] I. Konstas, V. Stathopoulos, and J.M. Jose, “On social
networks and recommendation “, 19-23 July 2009.
[3] B. Zhou and J. Pei, “The k-anonymity and l-diversity
approaches for privacy preservation in social networks
against neighborhood attacks”, 1 July 2011.
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 678 – 683
_______________________________________________________________________________________________
683
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
[4] F. Abel, E. Herder, G.J. Houben, “Cross-system user
modeling and personalization on the social web”, 23 April
2012.
[5] P. Jain and P. Kumaraguru, "Finding Nemo: searching and
re-solving identities of users across online social
networks”, 26 Dec 2012.
[6] X. Kong, J. Zhang, and P.S. Yu, “Inferring anchor links
across multiple heterogeneous social networks”, 11 Dec
2013.
[7] R. Zafarani and H. Liu, "Connecting users across social
media sites: a behavioral-modeling approach "11-14
August 2013
[8] O. Goga, D. Perito, H. Lei, R. Teixeira, and R. Sommer,
"Large-scale Correlation of Accounts across Social
Networks”, April 2013.
[9] P. Jain, P. Kumaraguru, and A. Joshi, "@ i seek 'fb. me':
identifying users across multiple online social networks",
13 May 2013.
[10] X. Qian, H. Feng, G. Zhao, and T. Mei, "Personalized
Recommendation Combining User Interest and Social
Circle", 7July 2014.
[11] S. Tan, Y. Li, H. Sun, Z. Guan, X. Yan, J. Bu, C. Chen, and
X. He, "Interpreting the Public Sentiment Variations on
Twitter", 5 May 2014.

More Related Content

What's hot

Integrating social media into your marketing
Integrating social media into your marketingIntegrating social media into your marketing
Integrating social media into your marketing
zingopen
 
Authentication and Verification of Social Networking Accounts Using Blockchai...
Authentication and Verification of Social Networking Accounts Using Blockchai...Authentication and Verification of Social Networking Accounts Using Blockchai...
Authentication and Verification of Social Networking Accounts Using Blockchai...
AIRCC Publishing Corporation
 
Capsm twitter study 2010
Capsm twitter study 2010Capsm twitter study 2010
Capsm twitter study 2010
Christa M. Miller
 
linkedin report
linkedin reportlinkedin report
linkedin report
Leslie Cambron
 
The State of Social Media in Vietnam
The State of Social Media in VietnamThe State of Social Media in Vietnam
The State of Social Media in Vietnam
zingopen
 
Evolving social data mining and affective analysis
Evolving social data mining and affective analysis  Evolving social data mining and affective analysis
Evolving social data mining and affective analysis
Athena Vakali
 
Social media mining PPT
Social media mining PPTSocial media mining PPT
Social media mining PPT
Chhavi Mathur
 
Adecco global recruiters research 2014
Adecco global recruiters research 2014Adecco global recruiters research 2014
Adecco global recruiters research 2014
Adecco RU
 
Marketing over social media networks
Marketing over social media networksMarketing over social media networks
Marketing over social media networks
ghayth ali
 
Internet magazines practical tips for improving website traffic
Internet magazines  practical tips for improving website trafficInternet magazines  practical tips for improving website traffic
Internet magazines practical tips for improving website traffic
Hamideh Iraj
 
Third parties are actively seeking out end-user information using Facebook
Third parties are actively seeking out end-user information using FacebookThird parties are actively seeking out end-user information using Facebook
Third parties are actively seeking out end-user information using Facebook
Daniel Ilunga
 
IRJET- Private Social Media and Data Security
IRJET- Private Social Media and Data SecurityIRJET- Private Social Media and Data Security
IRJET- Private Social Media and Data Security
IRJET Journal
 
Social Media Define the Era in Digital Media
Social Media Define the Era in Digital MediaSocial Media Define the Era in Digital Media
Social Media Define the Era in Digital Media
inventionjournals
 
Significant factors for Detecting Redirection Spam
Significant factors for Detecting Redirection SpamSignificant factors for Detecting Redirection Spam
Significant factors for Detecting Redirection Spam
ijtsrd
 
MSLGROUP China whitepaper: We Chat about WeChat
MSLGROUP China whitepaper: We Chat about WeChatMSLGROUP China whitepaper: We Chat about WeChat
MSLGROUP China whitepaper: We Chat about WeChat
Leslie Lin
 
Social Networking Introduction
Social Networking IntroductionSocial Networking Introduction
Social Networking Introduction
Carson City Library
 
Social Networking Intro
Social Networking IntroSocial Networking Intro
Social Networking Intro
Sena Loyd
 
News construction from microblogging post using open data
News construction from microblogging post using open dataNews construction from microblogging post using open data
News construction from microblogging post using open data
Francisco Berrizbeitia
 
Research on how_facebook_industry_is_using_data_mining_by_shafiu_umar_abubaka...
Research on how_facebook_industry_is_using_data_mining_by_shafiu_umar_abubaka...Research on how_facebook_industry_is_using_data_mining_by_shafiu_umar_abubaka...
Research on how_facebook_industry_is_using_data_mining_by_shafiu_umar_abubaka...
ShafiuUmar1
 

What's hot (19)

Integrating social media into your marketing
Integrating social media into your marketingIntegrating social media into your marketing
Integrating social media into your marketing
 
Authentication and Verification of Social Networking Accounts Using Blockchai...
Authentication and Verification of Social Networking Accounts Using Blockchai...Authentication and Verification of Social Networking Accounts Using Blockchai...
Authentication and Verification of Social Networking Accounts Using Blockchai...
 
Capsm twitter study 2010
Capsm twitter study 2010Capsm twitter study 2010
Capsm twitter study 2010
 
linkedin report
linkedin reportlinkedin report
linkedin report
 
The State of Social Media in Vietnam
The State of Social Media in VietnamThe State of Social Media in Vietnam
The State of Social Media in Vietnam
 
Evolving social data mining and affective analysis
Evolving social data mining and affective analysis  Evolving social data mining and affective analysis
Evolving social data mining and affective analysis
 
Social media mining PPT
Social media mining PPTSocial media mining PPT
Social media mining PPT
 
Adecco global recruiters research 2014
Adecco global recruiters research 2014Adecco global recruiters research 2014
Adecco global recruiters research 2014
 
Marketing over social media networks
Marketing over social media networksMarketing over social media networks
Marketing over social media networks
 
Internet magazines practical tips for improving website traffic
Internet magazines  practical tips for improving website trafficInternet magazines  practical tips for improving website traffic
Internet magazines practical tips for improving website traffic
 
Third parties are actively seeking out end-user information using Facebook
Third parties are actively seeking out end-user information using FacebookThird parties are actively seeking out end-user information using Facebook
Third parties are actively seeking out end-user information using Facebook
 
IRJET- Private Social Media and Data Security
IRJET- Private Social Media and Data SecurityIRJET- Private Social Media and Data Security
IRJET- Private Social Media and Data Security
 
Social Media Define the Era in Digital Media
Social Media Define the Era in Digital MediaSocial Media Define the Era in Digital Media
Social Media Define the Era in Digital Media
 
Significant factors for Detecting Redirection Spam
Significant factors for Detecting Redirection SpamSignificant factors for Detecting Redirection Spam
Significant factors for Detecting Redirection Spam
 
MSLGROUP China whitepaper: We Chat about WeChat
MSLGROUP China whitepaper: We Chat about WeChatMSLGROUP China whitepaper: We Chat about WeChat
MSLGROUP China whitepaper: We Chat about WeChat
 
Social Networking Introduction
Social Networking IntroductionSocial Networking Introduction
Social Networking Introduction
 
Social Networking Intro
Social Networking IntroSocial Networking Intro
Social Networking Intro
 
News construction from microblogging post using open data
News construction from microblogging post using open dataNews construction from microblogging post using open data
News construction from microblogging post using open data
 
Research on how_facebook_industry_is_using_data_mining_by_shafiu_umar_abubaka...
Research on how_facebook_industry_is_using_data_mining_by_shafiu_umar_abubaka...Research on how_facebook_industry_is_using_data_mining_by_shafiu_umar_abubaka...
Research on how_facebook_industry_is_using_data_mining_by_shafiu_umar_abubaka...
 

Similar to Cross-Site Bonding of Anonymous Users in Multiple Social Media Networks

Identity Resolution across Different Social Networks using Similarity Analysis
Identity Resolution across Different Social Networks using Similarity AnalysisIdentity Resolution across Different Social Networks using Similarity Analysis
Identity Resolution across Different Social Networks using Similarity Analysis
rahulmonikasharma
 
Enhancement of Privacy and User Interaction in a Social Network with the Aid ...
Enhancement of Privacy and User Interaction in a Social Network with the Aid ...Enhancement of Privacy and User Interaction in a Social Network with the Aid ...
Enhancement of Privacy and User Interaction in a Social Network with the Aid ...
rahulmonikasharma
 
Internet based Social Networking Services
Internet based Social Networking ServicesInternet based Social Networking Services
Internet based Social Networking Services
rahulmonikasharma
 
Predicting the Brand Popularity from the Brand Metadata
Predicting the Brand Popularity from the Brand MetadataPredicting the Brand Popularity from the Brand Metadata
Predicting the Brand Popularity from the Brand Metadata
IJECEIAES
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social network
eSAT Publishing House
 
Determining Strategic Value of Online Social Engagements
Determining Strategic Value of Online Social EngagementsDetermining Strategic Value of Online Social Engagements
Determining Strategic Value of Online Social Engagements
inventionjournals
 
20 9131 a review of social media edit septian
20 9131 a review of social media edit septian20 9131 a review of social media edit septian
20 9131 a review of social media edit septian
IAESIJEECS
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
ijtsrd
 
Social Networking Websites and Image Privacy
Social Networking Websites and Image PrivacySocial Networking Websites and Image Privacy
Social Networking Websites and Image Privacy
IOSR Journals
 
Classification of instagram fake users using supervised machine learning algo...
Classification of instagram fake users using supervised machine learning algo...Classification of instagram fake users using supervised machine learning algo...
Classification of instagram fake users using supervised machine learning algo...
IJECEIAES
 
JFrank_1
JFrank_1JFrank_1
JFrank_1
Julian Frank
 
01 01-evaluating-uses.pdf abstract
01 01-evaluating-uses.pdf abstract01 01-evaluating-uses.pdf abstract
01 01-evaluating-uses.pdf abstract
jerry guhyem
 
IRJET- Fake Profile Identification using Machine Learning
IRJET-  	  Fake Profile Identification using Machine LearningIRJET-  	  Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
IRJET Journal
 
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORK
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORKINFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORK
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORK
IAEME Publication
 
Top five chapter 6 group presentation
Top five chapter 6 group presentationTop five chapter 6 group presentation
Top five chapter 6 group presentation
montoyva
 
Top five chapter 6 group presentation
Top five chapter 6 group presentationTop five chapter 6 group presentation
Top five chapter 6 group presentation
santishe
 
Social Media App Development An Ultimate Guide 2024.pdf
Social Media App Development An Ultimate Guide 2024.pdfSocial Media App Development An Ultimate Guide 2024.pdf
Social Media App Development An Ultimate Guide 2024.pdf
JPLoft Solutions
 
AUTHENTICATION AND VERIFICATION OF SOCIAL NETWORKING ACCOUNTS USING BLOCKCHAI...
AUTHENTICATION AND VERIFICATION OF SOCIAL NETWORKING ACCOUNTS USING BLOCKCHAI...AUTHENTICATION AND VERIFICATION OF SOCIAL NETWORKING ACCOUNTS USING BLOCKCHAI...
AUTHENTICATION AND VERIFICATION OF SOCIAL NETWORKING ACCOUNTS USING BLOCKCHAI...
ijcsit
 
Using Social Media for Business
Using Social Media for BusinessUsing Social Media for Business
Using Social Media for Business
miriam1874
 
IRJET- Privacy Preserving Friend Matching
IRJET- Privacy Preserving Friend MatchingIRJET- Privacy Preserving Friend Matching
IRJET- Privacy Preserving Friend Matching
IRJET Journal
 

Similar to Cross-Site Bonding of Anonymous Users in Multiple Social Media Networks (20)

Identity Resolution across Different Social Networks using Similarity Analysis
Identity Resolution across Different Social Networks using Similarity AnalysisIdentity Resolution across Different Social Networks using Similarity Analysis
Identity Resolution across Different Social Networks using Similarity Analysis
 
Enhancement of Privacy and User Interaction in a Social Network with the Aid ...
Enhancement of Privacy and User Interaction in a Social Network with the Aid ...Enhancement of Privacy and User Interaction in a Social Network with the Aid ...
Enhancement of Privacy and User Interaction in a Social Network with the Aid ...
 
Internet based Social Networking Services
Internet based Social Networking ServicesInternet based Social Networking Services
Internet based Social Networking Services
 
Predicting the Brand Popularity from the Brand Metadata
Predicting the Brand Popularity from the Brand MetadataPredicting the Brand Popularity from the Brand Metadata
Predicting the Brand Popularity from the Brand Metadata
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social network
 
Determining Strategic Value of Online Social Engagements
Determining Strategic Value of Online Social EngagementsDetermining Strategic Value of Online Social Engagements
Determining Strategic Value of Online Social Engagements
 
20 9131 a review of social media edit septian
20 9131 a review of social media edit septian20 9131 a review of social media edit septian
20 9131 a review of social media edit septian
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
 
Social Networking Websites and Image Privacy
Social Networking Websites and Image PrivacySocial Networking Websites and Image Privacy
Social Networking Websites and Image Privacy
 
Classification of instagram fake users using supervised machine learning algo...
Classification of instagram fake users using supervised machine learning algo...Classification of instagram fake users using supervised machine learning algo...
Classification of instagram fake users using supervised machine learning algo...
 
JFrank_1
JFrank_1JFrank_1
JFrank_1
 
01 01-evaluating-uses.pdf abstract
01 01-evaluating-uses.pdf abstract01 01-evaluating-uses.pdf abstract
01 01-evaluating-uses.pdf abstract
 
IRJET- Fake Profile Identification using Machine Learning
IRJET-  	  Fake Profile Identification using Machine LearningIRJET-  	  Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
 
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORK
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORKINFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORK
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORK
 
Top five chapter 6 group presentation
Top five chapter 6 group presentationTop five chapter 6 group presentation
Top five chapter 6 group presentation
 
Top five chapter 6 group presentation
Top five chapter 6 group presentationTop five chapter 6 group presentation
Top five chapter 6 group presentation
 
Social Media App Development An Ultimate Guide 2024.pdf
Social Media App Development An Ultimate Guide 2024.pdfSocial Media App Development An Ultimate Guide 2024.pdf
Social Media App Development An Ultimate Guide 2024.pdf
 
AUTHENTICATION AND VERIFICATION OF SOCIAL NETWORKING ACCOUNTS USING BLOCKCHAI...
AUTHENTICATION AND VERIFICATION OF SOCIAL NETWORKING ACCOUNTS USING BLOCKCHAI...AUTHENTICATION AND VERIFICATION OF SOCIAL NETWORKING ACCOUNTS USING BLOCKCHAI...
AUTHENTICATION AND VERIFICATION OF SOCIAL NETWORKING ACCOUNTS USING BLOCKCHAI...
 
Using Social Media for Business
Using Social Media for BusinessUsing Social Media for Business
Using Social Media for Business
 
IRJET- Privacy Preserving Friend Matching
IRJET- Privacy Preserving Friend MatchingIRJET- Privacy Preserving Friend Matching
IRJET- Privacy Preserving Friend Matching
 

More from rahulmonikasharma

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paper
rahulmonikasharma
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
rahulmonikasharma
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Framework
rahulmonikasharma
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
rahulmonikasharma
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Survey
rahulmonikasharma
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANET
rahulmonikasharma
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
rahulmonikasharma
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
rahulmonikasharma
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pi
rahulmonikasharma
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
rahulmonikasharma
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticles
rahulmonikasharma
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
rahulmonikasharma
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
rahulmonikasharma
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
rahulmonikasharma
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
rahulmonikasharma
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
rahulmonikasharma
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
rahulmonikasharma
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Technique
rahulmonikasharma
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Coupler
rahulmonikasharma
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
rahulmonikasharma
 

More from rahulmonikasharma (20)

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paper
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Framework
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Survey
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANET
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pi
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticles
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Technique
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Coupler
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
 

Recently uploaded

Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
Prakhyath Rai
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
bijceesjournal
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
AjmalKhan50578
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
GauravCar
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
IJECEIAES
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
gowrishankartb2005
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
SakkaravarthiShanmug
 

Recently uploaded (20)

Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
 

Cross-Site Bonding of Anonymous Users in Multiple Social Media Networks

  • 1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 678 – 683 _______________________________________________________________________________________________ 678 IJRITCC | July 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ 0Cross-Site Bonding of Anonymous Users in Multiple Social Media Networks 0 Ambresh Bhadra Shetty Assistant Professor, Dept. of Studies in Computer Applications (MCA), Visvesvaraya Technological University, Centre for PG studies, Kalaburagi ambresh.bhadrashetty@gmail.com Pooja Guttedar Student,MCA VI Semester, Dept. of Studies in Computer Applications (MCA), Visvesvaraya Technological University, Centre for PG studies, Kalaburagi poojadg666@gmail.com Abstract: From last few years many online Social Media Networks (SMN) platforms came into existence only those users who connected through similar site network can communicate each other by exchanging their information. For example, a Facebook user can connect only with Facebook user not with cross site user like Twitter so to connect users through multiple cross site network we have introduced a new social networking site calledCross platform network. Cross platform is a site which helps people to connect with huge number of different online Social Media Networks such as Facebook, Twitter,and Wechat. Using Cross platform networkpeople can communicate each other by exchanging the information from different sites. Keywords: Similar Site, Cross Site, Social Media Network __________________________________________________*****_________________________________________________ I. INTRODUCTION Social Networks are one of the highest growing industries in the world Social Networking sites such as Facebook, Twitter, Wechat, Instagram are extremely a powerful communication tools. Most of people think that using these social media network they can communicate each other easily and also it helps to run a successful business. Twitter is an online news and social networking service where users post and interact with messages, "Tweets", restricted to 140 characters [1]. Registered users can post tweets, but those who are unregistered can only read them. Based on the number of active users Facebook is considered as most popular social networking sites in the world. It has totally 2billion monthly users. Users of age between 13 to 18 are consideredas minors therefore their profiles are set to share with friends only. On year of 2010 Facebook has announced with domain name called fb.com from American Farm Bureau Federation. It allow people to share information like pictures, video’s what we have been up to with friends. In cross platform network they have proposed an algorithm called Friend Relationship-Based User Identification(FRUI). FRUI computes a match degree for all hopeful User Matched Pairs (UMPs), and just UMPs with top positions are considered as indistinguishable clients. We likewise created two recommendations to enhance the productivity of the calculation. Aftereffects of broad investigations show that FRUI performs much superior to anything current system structure-based calculations. Cross-Platform research faces many new challenges. As shown in Fig. 1, with the growth of different SMN platforms on the Internet, the cross-platform approach is used to merge as various SMN to create richer raw data and more complete SMNs for social computing tasks. The main purpose of using cross-platform SMN research is for identification of users in multiple SMNs. Many studies have addressed the user identification problem by examining public user profile attributes, including screen name, birth- date, location, gender, profile photo, etc. [4], [5], [7], [8], [9]. Since these attributes are not used by any fake users. Cross platform encompasses of the two groupings: The single-following and the mutual-following associations. : The first one can also be referred to as the tracking up of the associations or the relations. It can be explained as: when the user with A as name tag along the user with name B, in this case it is considered as the A and the B user will be having the tracking relationship, where one is known by the other but the same thing is not with the other. This type of following is seen in the SMNs relating to micro-blogging that takes in Twitter. While the mutual-following associations are said to be as friend associations, in which SMNs related to micro- blogging they refer to commonly tracking associations amongst the two users.
  • 2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 678 – 683 _______________________________________________________________________________________________ 679 IJRITCC | July 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Fig 1: Cross-application research to merge a variety of SMN’s II. LITERATURE SURVEY In year of 2011 B. Zhou and J. Pei introduced a technique called the k-anonymity and l-diversity approaches to provide privacy for different social networks to maintain data privately by providing security. Because many online social networks has lead to the problem of leaking confidential information of individual person. This requires a preservation of privacy before that network data has introduced by service provider. Providing privacy in different social networks has a one of most important concern. Many published academics studies have proposed solution for providing privacy but those technique have not worked properly to overcome this problem they have proposed a new technique called The k-anonymity and l-diversity to maintain privacy [3]. In year of 2013 P. Jain and P. Kumaraguruhas developed Finding Nemo, it is a method which matches accounts called Facebook and Twitter. However,this text based network search method has low accuracy and high complexity in term of user identification,since only text of same nick name are recognized while searching the friend sets of friends [5]. In 2013 O.Goga linked accounts belonging to the same person identity, based solely on the profile information. Organization has started to collect a personal data of user who generates their day to day activities through online. In this work we need to set the capabilitiesmachine learning to link aindependent accounts to maintain users in different social networks. Based on that information users provide their profiles publicly. Large scale correlation approach helps to match account betweendifferent social networks such as Twitter, Facebookand Google+. In result it shows user names, real names, location, photos using this information we can identify 80% of the matching user account between combinations of any two social networks [8]. Inyear of 2014 X. Qian et al. introduced a method called Personalized Recommendation to combine the users based on their interest and social circle. With the appearance and notoriety of interpersonal organization, an ever increasing number of clients get a kick out of the chance to share their encounters, for example, evaluations, audits, and online journals. The new factors of informal organization like relational impact and intrigue in light of friend networks bring openings and difficulties for recommender system (RS) to tackle the cool begin and sparsity issue of datasets. A portion of the social factors have been utilized as a part of RS, yet have not been completely considered. In this paper, three social variables, individual intrigue, relational intrigue comparability, and relational impact, meld into a bound together customized proposal demonstrate in light of probabilistic grid factorization. The factor of individual intrigue can make the RS prescribe things to meet clients' distinctions, particularly for experienced clients. Also, for chilly begin clients, the relational intrigue comparability and relational impact can improve their connection among highlights in the dormant space [10]. III. PROBLEM DEFINITION The problem can be defined as in the existing we can send or receive friend requests only to the person if he or she holds an account in the same social networking site, for example consider a person A who has an account in Facebook and another person B has an account in Twitter, now A cannot send friend request to B because A & B are in different social networking sites. To overcome this we are designing a Cross-Site where in which the users of different social networking sites can send or receive friend requests with each other.
  • 3. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 678 – 683 _______________________________________________________________________________________________ 680 IJRITCC | July 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ III. ARCHITECTURE In above Fig 2 cross site management server list all users and authorize the register user to get login to corresponding networks after that the user has to view his own profile and send request to make friends with cross site and also he can add posts like title, description, image in both cross site as well as in same site. To make friends in cross site admin has to give permission then only the user can send request to cross site user. Here admin list all friends from cross site and similar site network andview all user posts with image description and finally chart results to count number of users in same site and cross site will be displayed. IV. IMPLEMENTATION FRUI ALGORITHM: In this study, we propose an innovative approach to address the challenges faced by previous studies. This new approach focuses on the friendship structure, and develops the Friend Relationship-based User Identification (FRUI) algorithm. FRUI differs from the two existing algorithms, JLA and NS, in the following aspects (1) NS is suitable for directed networks, while JLA and FRUI focus on undirected networks. JLA is restricted in undirected networks by Conditional Random Fields, while FRUI relies on friend relationships, as this is more reliable and consistent with real-life friendship. (2) JLA compares unmapped neighbors of nodes from one of the two SMNs, while NS matches unidentified usersfrom different networks by comparing the mapped neighbors of each node. FRUI aims to identify the most matched pairs among mapped users, but does not iterate unmapped users. Therefore, it markedly reduces computational complexity.
  • 4. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 678 – 683 _______________________________________________________________________________________________ 681 IJRITCC | July 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ V. RESULTS Fig 3:All User and Authorize In Fig. 3 admin is giving permission to the userto login into system after giving permission the status will be changed from waiting to authorized Fig 4: All Friend Request and Response In Fig. 4 admin can view all friend request and response with respect to name of a person and social site
  • 5. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 678 – 683 _______________________________________________________________________________________________ 682 IJRITCC | July 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Fig 5: Search Friends in Cross Site In Fig. 5 user can search friends from cross site and send request to a particular person Fig 6: Graph Result In Fig. 6 graph result will display based on connected users that may either same site and cross site VI. CONCLUSION In this study we have designed new solution called cross platform to identify unknown users across multiple social media networks. We also developed a new method called friend relationship based user identification (FRUI). FRUI helps to computes a match degree for all hopeful User Matched Pairs (UMPs), and UMPs with top positions are considered as indistinguishable clients. Using this method user can connect easily though different cross site network. REFERENCES [1] X. Ying and X. Wu, “Randomizing social networks: a spectrum preserving approach”, 24, 26 April 2008. [2] I. Konstas, V. Stathopoulos, and J.M. Jose, “On social networks and recommendation “, 19-23 July 2009. [3] B. Zhou and J. Pei, “The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks”, 1 July 2011.
  • 6. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 678 – 683 _______________________________________________________________________________________________ 683 IJRITCC | July 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ [4] F. Abel, E. Herder, G.J. Houben, “Cross-system user modeling and personalization on the social web”, 23 April 2012. [5] P. Jain and P. Kumaraguru, "Finding Nemo: searching and re-solving identities of users across online social networks”, 26 Dec 2012. [6] X. Kong, J. Zhang, and P.S. Yu, “Inferring anchor links across multiple heterogeneous social networks”, 11 Dec 2013. [7] R. Zafarani and H. Liu, "Connecting users across social media sites: a behavioral-modeling approach "11-14 August 2013 [8] O. Goga, D. Perito, H. Lei, R. Teixeira, and R. Sommer, "Large-scale Correlation of Accounts across Social Networks”, April 2013. [9] P. Jain, P. Kumaraguru, and A. Joshi, "@ i seek 'fb. me': identifying users across multiple online social networks", 13 May 2013. [10] X. Qian, H. Feng, G. Zhao, and T. Mei, "Personalized Recommendation Combining User Interest and Social Circle", 7July 2014. [11] S. Tan, Y. Li, H. Sun, Z. Guan, X. Yan, J. Bu, C. Chen, and X. He, "Interpreting the Public Sentiment Variations on Twitter", 5 May 2014.