SlideShare a Scribd company logo
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 5, May (2015), pp. 47-54© IAEME
47
FILTER UNWANTED MESSAGES FROM WALLS AND
BLOCKING NON-LEGITIMATE USERS IN OSN
Pallavi Shinde1
, Prof. Vishal Mogal2
1,2
Department of Computer Engineering,
RMD Sinhgad School of Engineering, Warje, Pune-58, India
Savitribai Phule Pune University,
ABSTRACT
In recent years, on-line Social Networks (OSNs) became a crucial part of daily life. Users
build particular networks to represent their social relationships. Users are able to upload and share
information associated to their personal lives. The privacy risks of such behaviour are typically
unnoticed. Nowadays OSNs give little or no support to stop unwanted messages on user walls. For
that purpose, a new system is designed to permit OSN users to have a direct control on the messages
posted on their walls. This can be achieved through a flexible rule based system, that allows users to
customise the filtering criteria to be applied to their walls, and a Machine Learning (ML) primarily
based soft classifier mechanically labelling messages in support of content based filtering. The
system make use of a ML soft classifier to enforce customizable content-dependent Filtering Rules
(FRs). And also the flexibility of the system in terms of filtering choices is increased through the
management of Blacklists. Filtered wall is a system to filter undesired messages from OSN walls.
This system approach decides when user should be inserted into a black list. The proposed system
offers security to the On-line Social Networks.
Keywords: Online Social Network (OSN), Machine Learning, Information Filtering, Content- based
Filtering.
1. INTRODUCTION
Today’s life is totally based on Internet. Now a days people cannot imagine life without
Internet. Information and communication technology plays vital role in today’s online networked
society. It has affected the online interaction between different users. Online Social networks (OSNs)
provide platform to meet different users and share information with them. Communication on these
web sites involves exchange of different content like text, image, audio and video. A social network
include personal messaging, blogs, chat facility, photos sharing facility and other ways to share text
and multimedia content. A wall may be a section in online site user profile where others can post
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 6, Issue 5, May (2015), pp. 47-54
© IAEME: www.iaeme.com/IJCET.asp
Journal Impact Factor (2015): 8.9958 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 5, May (2015), pp. 47-54© IAEME
48
messages. This OSN wall is a public writing space so others can view what has been written on wall.
So, in online sites there is possibility of posting illegal or undesirable messages on wall which is
visible to others too. There is a requirement to develop a lot of security techniques for different
communication technologies, particularly online social networks. Networking sites provide very
little support to prevent unwanted messages on user walls. Consider for example, facebook permits
users to state who is authorized and who is not authorized to insert messages in their walls i.e.
friends, friends of a friend (FOAF) or defined group of friends.
But there is no any content based preference for messages like sports, politics etc no matter of
the user who post them [8]. So it is impossible to prevent undesired messages. So, with the shortage
of classification or filtering tools, the user receives all messages posted by the users he or she
follows. So disadvantages of existing system are as follows-
LIMITATIONS OF EXISTING SYSTEM
1. However, no content-based preferences are supported and therefore it is not possible to prevent
undesired messages. No matter user who post them.
2. Providing this service is not only a matter of using previously defined web content mining
techniques for a different application, rather it requires to design ad-hoc classification
strategies.
SYSTEM ARCHITECTURE OF EXISTING SYSTEM
Fig. 1: System Architecture of Existing System
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 5, May (2015), pp. 47-54© IAEME
49
So, to control this type of activity and prevent the unwanted messages which are written on user’s
wall we can implement filtering rules (FR) in our system. Also, Black List (BL) will maintain in this
system. In most cases, the user receives a noisy stream of updates from other users.
Our main aim behind this research is to filter unwanted messages from user wall in order to
improve the security and efficiency. The main idea of proposed system is to support for content
based preferences. We utilize the machine learning text categorization techniques based soft
classifier automatically labelling messages with the help of content based filtering. To classify the
text for labelling messages by using the short text classifier (STC). Short text classifier are
concentrated in the extraction and selection of a set of characterizing features.
So, in proposed mechanism, a user can specify what contents should not be displayed on
his/her wall, by specifying a set of filtering rules. FRs are permitted to specify filtering conditions
based on user profiles. In addition, system provides the support for user defined blacklist means list
of users that are temporarily prevented to post any kind of messages on user wall. We have using the
wordNet dictionary in our project which gives the synonyms of a particular word. By using the
wordNet dictionary we have increased the robustness of the system.
2. LITURATURE SURVEY
Our related work has using content-based filtering and policy based personalization to filter
unwanted contents in user’s space.
Content-based filtering
In content based filtering, each user is assumed to operate independently. As a result, a
content-based filtering system selects information items based on the correlation between the content
of the items and the user preferences [1, 8].
P.W. Foltz and S.T. Dumais [1] presented information retrieval (IR) techniques. There is no
any individual based filtering. In our approach, we have used information filtering (IF). Information
retrieval is very closely related to to information filtering. User preferences in information filtering
typically represent long term interest. While queries in information retrieval tend to represent short
term interest. Information filtering is typically applied to stream of incoming data, while in
information retrieval, changes in databases do not occur often. Filtering involves process of
removing information from stream, while IR involves process of finding information in that stream.
Policy based personalization
Policy based personalization is applicable in many different contexts. It adapts a service in
specific context according user defined policies. In online social networking sites user oriented
policies can define how communication between two parties or more can be handled. The policy
based personalization system is focuses on Twitter. It assigns a category to each tweet and shows
only those tweet to the user which are of his interest [2, 8]. Policy based personalization represent the
ability of the user to filter wall messages according to filtering criteria suggested by him.
B. Sriram, D. Fuhry, E. Demir, H. Ferhatosmanoglu, and M. Demirbas [2], this paper
describes classification of tweets into general but important categorizes by using the author
information and features within tweet. But our approach permits setting of FRs according to a variety
of criteria and classify the text to predefined set of classes like sports, politics etc.
L. Fang and K. LeFevre [3], this paper is related to privacy control but no facility for
stopping anyone for posting something on wall. Our approach can stop posting particular categories
as per user’s choice.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976
ISSN 0976 - 6375(Online), Volume 6, Issue 5, May (2015), pp.
Fong, P.W.L., Anwar, M.M., Zhao, Z.
based, history based. So that it is time consuming.
policy based personalization.
3. METHODOLOGY
The section is divided into following parts.
1) The first section shows the basic idea behind the approach.
2) The second section proposes an algorithm to filter out unwanted messages.
3.1 System Architecture
3.2 Algorithm
1. Post the message.
2. Load the model file in application.
3. Create instance for each category.
4. Classify the message and get the relevance of entered message with each category.
5. Checks for blocking/filtering criteria according
6. If message follows any of the condition then message gets filtered out.
7. Identify the number of attempts over or not.
8. If attempts get over then find the number of days user account
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976
6375(Online), Volume 6, Issue 5, May (2015), pp. 47-54© IAEME
50
Fong, P.W.L., Anwar, M.M., Zhao, Z. [4], this paper describes policies such as topology
. So that it is time consuming. Our approach presents content based filte
The section is divided into following parts.
The first section shows the basic idea behind the approach.
The second section proposes an algorithm to filter out unwanted messages.
Fig.2: System Architecture
Load the model file in application.
Create instance for each category.
Classify the message and get the relevance of entered message with each category.
ng/filtering criteria according to message category, gender,
If message follows any of the condition then message gets filtered out.
Identify the number of attempts over or not.
If attempts get over then find the number of days user account needs to be blocked.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
© IAEME
his paper describes policies such as topology
Our approach presents content based filtering and
The second section proposes an algorithm to filter out unwanted messages.
Classify the message and get the relevance of entered message with each category.
gender, age, threshold.
needs to be blocked.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 5, May (2015), pp. 47-54© IAEME
51
9. Block the user temporarily for blocking duration.
10. If the user is blocked temporarily by its n/2 friends then block the user permanently.
11. If message not belonging to the blocking criteria then post the message on the OSN wall.
4. RESULTS
4.1 Input Dataset
Post enter by the user is the input data. We have used arff file (Attribute Relationship File
Format). This file contains messages categories as other, politics, bollywood, sports, vulgar,
violence.
4.2 Outcomes
Following snapshots are showing results for practical work done. User name P’s profile as
shown below. Like facebook, our OSN also has options as news feed, requests, friends, find friends,
friend of friend. Also our OSN has options like filtered posts, filter rules.
Fig. 3: User Profile of OSN
In filter rule option, user can set the categories which he/she doesn’t want to display on
his/her profile. User can also set threshold, gender, age etc. Threshold is used for blocking purpose.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 5, May (2015), pp. 47-54© IAEME
52
Fig. 4: Filter Rules of OSN
Below snapshot shows that, user name Komal doesn’t want sport category message but some
of her friend post the sport category. So message has popped as sports category is blocked.
Fig. 5: Sports category blocked
Below snapshot shows that, sport category message had been posted 3 times, and threshold
was set as 0.7. Therefore, user got message as “You are blocked for another 5 days.”
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 5, May (2015), pp. 47-54© IAEME
53
Fig. 6: Temporary Blocking of User
Permanent blocking of user is shown in below snapshot.
Fig. 7: Permanent blocking of user
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 5, May (2015), pp. 47-54© IAEME
54
5. CONCLUSION
This paper describes our work to provide unwanted message filtering for social networks. We
have given a system to filter undesired messages from OSN walls. This system approach decides
when user should be inserted into a black list. The system GUI and a set of tools which make
blacklists and filter rules specifications more easy and simple. We have used the wordNet dictionary
in our project which gives the synonyms of a particular word. By using the wordNet dictionary we
have increased the robustness of the system. We would prefer to remark that the system proposed
during this paper represents simply the core set of functionalities required to produce a sophisticated
tool for OSN message filtering.
REFERENCES
1. P.W. Foltz and S.T. Dumais, Personalized Information Delivery: An Analysis of Information
Filtering Methods, Comm. ACM, vol. 35, no. 12, pp. 51-60, 1992.
2. B. Sriram, D. Fuhry, E. Demir, H. Ferhatosmanoglu, and M. Demirbas, “Short Text
Classification in Twitter to Improve Information Filtering,” Proc. 33rd Int’l ACM SIGIR Conf.
Research and Development in Information Retrieval (SIGIR ’10), pp. 841-842, 2010.
3. Fang, L., LeFevre, K., Privacy wizards for social networking sites; In: WWW 10: Proceedings
of the 19th international conference on World Wide Web, pp. 351360. ACM, NewYork, NY,
USA, 2010.
4. Fong, P.W.L., Anwar, M.M., Zhao, Z., A privacy preservation model for facebook-style social
network systems; In: Proceedings of 14th European Symposium on Research in Computer
Security (ESORICS), pp. 303320, 2009.
5. F. Sebastiani, Machine Learning in Automated Text Categorization, ACM Computing Surveys,
vol. 34, no. 1, pp. 1-47, 2002.
6. M. Vanetti, E. Binaghi, B. Carminati, M. Carullo, and E. Ferrari, Content- Based Filtering in
On-Line Social Networks, Proc. ECML/PKDD Workshop Privacy and Security Issues in Data
Mining and Machine Learning( PSDML 10), 2010.
7. M. Chau and H. Chen, A Machine Learning Approach to Web Page Filtering Using Content
and Structure Analysis, Decision Support Systems, vol. 44, no. 2, pp. 482-494, 2008.
8. Marco Vanetti, Elisabetta Binaghi, Elena Ferrari, Barbara Carminati, and Moreno Carullo, “A
System to Filter Unwanted Messages from OSN User Walls”, IEEE Transactions On
Knowledge And Data Engineering, Vol. 25, No. 2, February 2013.
9. Mrs. L.Rajeswari and Dr.S.S.Dhenakaran, “Page Access Coefficient Algorithm For
Information Filtering In Social Network” International journal of Computer Engineering &
Technology (IJCET), Volume 4, Issue 3, 2013, pp. 60 - 69, ISSN Print: 0976 – 6367, ISSN
Online: 0976 – 6375.
10. Muhanad A. Al-Khalisy and Dr.Haider K. Hoomod, “Posn: Private Information Protection In
Online Social Networks” International journal of Computer Engineering & Technology
(IJCET), Volume 4, Issue 2, 2013, pp. 340 - 355, ISSN Print: 0976 – 6367, ISSN Online: 0976
– 6375.
11. Mr. Yogesh P Murumkar and Prof. Yogesh B. Gurav, “Sampling Online Social Networks
Using Outlier Indexing” International journal of Computer Engineering & Technology
(IJCET), Volume 5, Issue 6, 2014, pp. 11 - 18, ISSN Print: 0976 – 6367, ISSN Online: 0976 –
6375.

More Related Content

What's hot

Paper id 152013128
Paper id 152013128Paper id 152013128
Paper id 152013128
IJRAT
 
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osn
IJSRD
 
Iaetsd efficient filteration of unwanted messages
Iaetsd efficient filteration of unwanted messagesIaetsd efficient filteration of unwanted messages
Iaetsd efficient filteration of unwanted messages
Iaetsd Iaetsd
 
S180304116124
S180304116124S180304116124
S180304116124
IOSR Journals
 
Cb4301449454
Cb4301449454Cb4301449454
Cb4301449454
IJERA Editor
 
D0351020025
D0351020025D0351020025
D0351020025
inventionjournals
 
An automatic filtering task in osn using content based approach
An automatic filtering task in osn using content based approachAn automatic filtering task in osn using content based approach
An automatic filtering task in osn using content based approach
IAEME Publication
 
A system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user wallsA system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user walls
JPINFOTECH JAYAPRAKASH
 
Rule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social networkRule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social network
eSAT Publishing House
 
Ijcatr04041017
Ijcatr04041017Ijcatr04041017
Ijcatr04041017
Editor IJCATR
 
DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR ...
DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR ...DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR ...
DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR ...
IJNSA Journal
 
Benchmarking the Privacy-­Preserving People Search
Benchmarking the Privacy-­Preserving People SearchBenchmarking the Privacy-­Preserving People Search
Benchmarking the Privacy-­Preserving People Search
Daqing He
 
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
IJARIIT
 
Trust Based Content Distribution for Peer-ToPeer Overlay Networks
Trust Based Content Distribution for Peer-ToPeer Overlay NetworksTrust Based Content Distribution for Peer-ToPeer Overlay Networks
Trust Based Content Distribution for Peer-ToPeer Overlay Networks
IJNSA Journal
 
JPJ1419 Discovering Emerging Topics in Social Streams via Link-Anomaly Detec...
JPJ1419  Discovering Emerging Topics in Social Streams via Link-Anomaly Detec...JPJ1419  Discovering Emerging Topics in Social Streams via Link-Anomaly Detec...
JPJ1419 Discovering Emerging Topics in Social Streams via Link-Anomaly Detec...
chennaijp
 
Improving Online Deliberation with Argument Network Visualization
Improving Online Deliberation with Argument Network Visualization Improving Online Deliberation with Argument Network Visualization
Improving Online Deliberation with Argument Network Visualization
Anna De Liddo
 
Semantic Massage Addressing based on Social Cloud Actor's Interests
Semantic Massage Addressing based on Social Cloud Actor's InterestsSemantic Massage Addressing based on Social Cloud Actor's Interests
Semantic Massage Addressing based on Social Cloud Actor's Interests
CSCJournals
 
Simple Program for Enhancing Quality in Discussion Boards
Simple Program for Enhancing Quality in Discussion BoardsSimple Program for Enhancing Quality in Discussion Boards
Simple Program for Enhancing Quality in Discussion Boards
Rafael Hernandez
 
University of Missouri - Saint Louis Cyber Security
University of Missouri - Saint Louis Cyber SecurityUniversity of Missouri - Saint Louis Cyber Security
University of Missouri - Saint Louis Cyber Security
Maurice Dawson
 
Social media visualization for crisis management
Social media visualization for crisis managementSocial media visualization for crisis management
Social media visualization for crisis management
Mustafa Alkhunni
 

What's hot (20)

Paper id 152013128
Paper id 152013128Paper id 152013128
Paper id 152013128
 
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osn
 
Iaetsd efficient filteration of unwanted messages
Iaetsd efficient filteration of unwanted messagesIaetsd efficient filteration of unwanted messages
Iaetsd efficient filteration of unwanted messages
 
S180304116124
S180304116124S180304116124
S180304116124
 
Cb4301449454
Cb4301449454Cb4301449454
Cb4301449454
 
D0351020025
D0351020025D0351020025
D0351020025
 
An automatic filtering task in osn using content based approach
An automatic filtering task in osn using content based approachAn automatic filtering task in osn using content based approach
An automatic filtering task in osn using content based approach
 
A system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user wallsA system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user walls
 
Rule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social networkRule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social network
 
Ijcatr04041017
Ijcatr04041017Ijcatr04041017
Ijcatr04041017
 
DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR ...
DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR ...DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR ...
DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR ...
 
Benchmarking the Privacy-­Preserving People Search
Benchmarking the Privacy-­Preserving People SearchBenchmarking the Privacy-­Preserving People Search
Benchmarking the Privacy-­Preserving People Search
 
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
 
Trust Based Content Distribution for Peer-ToPeer Overlay Networks
Trust Based Content Distribution for Peer-ToPeer Overlay NetworksTrust Based Content Distribution for Peer-ToPeer Overlay Networks
Trust Based Content Distribution for Peer-ToPeer Overlay Networks
 
JPJ1419 Discovering Emerging Topics in Social Streams via Link-Anomaly Detec...
JPJ1419  Discovering Emerging Topics in Social Streams via Link-Anomaly Detec...JPJ1419  Discovering Emerging Topics in Social Streams via Link-Anomaly Detec...
JPJ1419 Discovering Emerging Topics in Social Streams via Link-Anomaly Detec...
 
Improving Online Deliberation with Argument Network Visualization
Improving Online Deliberation with Argument Network Visualization Improving Online Deliberation with Argument Network Visualization
Improving Online Deliberation with Argument Network Visualization
 
Semantic Massage Addressing based on Social Cloud Actor's Interests
Semantic Massage Addressing based on Social Cloud Actor's InterestsSemantic Massage Addressing based on Social Cloud Actor's Interests
Semantic Massage Addressing based on Social Cloud Actor's Interests
 
Simple Program for Enhancing Quality in Discussion Boards
Simple Program for Enhancing Quality in Discussion BoardsSimple Program for Enhancing Quality in Discussion Boards
Simple Program for Enhancing Quality in Discussion Boards
 
University of Missouri - Saint Louis Cyber Security
University of Missouri - Saint Louis Cyber SecurityUniversity of Missouri - Saint Louis Cyber Security
University of Missouri - Saint Louis Cyber Security
 
Social media visualization for crisis management
Social media visualization for crisis managementSocial media visualization for crisis management
Social media visualization for crisis management
 

Similar to Filter unwanted messages from walls and blocking non legitimate users in osn

Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osn
IJSRD
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
ijtsrd
 
Intelligent access control policies for Social network site
Intelligent access control policies for Social network siteIntelligent access control policies for Social network site
Intelligent access control policies for Social network site
ijcsit
 
Collusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networksCollusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networks
IJECEIAES
 
IRJET- Review on the Simple Text Messages Classification
IRJET- Review on the Simple Text Messages ClassificationIRJET- Review on the Simple Text Messages Classification
IRJET- Review on the Simple Text Messages Classification
IRJET Journal
 
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSA SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
IJCI JOURNAL
 
Iaetsd hierarchical fuzzy rule based classification
Iaetsd hierarchical fuzzy rule based classificationIaetsd hierarchical fuzzy rule based classification
Iaetsd hierarchical fuzzy rule based classification
Iaetsd Iaetsd
 
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
IRJET Journal
 
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksMy Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
IRJET Journal
 
Paper Titled Information Security in an organization
Paper Titled Information Security in an organizationPaper Titled Information Security in an organization
Paper Titled Information Security in an organization
Mohammed Mahfouz Alhassan
 
820 1961-1-pb
820 1961-1-pb820 1961-1-pb
tweet segmentation
tweet segmentation tweet segmentation
tweet segmentation
prashanttarone
 
IRJET- Detecting Fake News
IRJET- Detecting Fake NewsIRJET- Detecting Fake News
IRJET- Detecting Fake News
IRJET Journal
 
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
IRJET Journal
 
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET Journal
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
IAEME Publication
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
IAEME Publication
 
IRJET - Social Network Message Credibility: An Agent-based Approach
IRJET -  	  Social Network Message Credibility: An Agent-based ApproachIRJET -  	  Social Network Message Credibility: An Agent-based Approach
IRJET - Social Network Message Credibility: An Agent-based Approach
IRJET Journal
 
IRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based ApproachIRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based Approach
IRJET Journal
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
IRJET Journal
 

Similar to Filter unwanted messages from walls and blocking non legitimate users in osn (20)

Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osn
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
 
Intelligent access control policies for Social network site
Intelligent access control policies for Social network siteIntelligent access control policies for Social network site
Intelligent access control policies for Social network site
 
Collusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networksCollusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networks
 
IRJET- Review on the Simple Text Messages Classification
IRJET- Review on the Simple Text Messages ClassificationIRJET- Review on the Simple Text Messages Classification
IRJET- Review on the Simple Text Messages Classification
 
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSA SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
 
Iaetsd hierarchical fuzzy rule based classification
Iaetsd hierarchical fuzzy rule based classificationIaetsd hierarchical fuzzy rule based classification
Iaetsd hierarchical fuzzy rule based classification
 
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
 
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksMy Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
 
Paper Titled Information Security in an organization
Paper Titled Information Security in an organizationPaper Titled Information Security in an organization
Paper Titled Information Security in an organization
 
820 1961-1-pb
820 1961-1-pb820 1961-1-pb
820 1961-1-pb
 
tweet segmentation
tweet segmentation tweet segmentation
tweet segmentation
 
IRJET- Detecting Fake News
IRJET- Detecting Fake NewsIRJET- Detecting Fake News
IRJET- Detecting Fake News
 
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
 
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
 
IRJET - Social Network Message Credibility: An Agent-based Approach
IRJET -  	  Social Network Message Credibility: An Agent-based ApproachIRJET -  	  Social Network Message Credibility: An Agent-based Approach
IRJET - Social Network Message Credibility: An Agent-based Approach
 
IRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based ApproachIRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based Approach
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
shahdabdulbaset
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
gowrishankartb2005
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
Madan Karki
 
AI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptxAI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptx
architagupta876
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 

Recently uploaded (20)

Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
 
AI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptxAI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptx
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 

Filter unwanted messages from walls and blocking non legitimate users in osn

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 5, May (2015), pp. 47-54© IAEME 47 FILTER UNWANTED MESSAGES FROM WALLS AND BLOCKING NON-LEGITIMATE USERS IN OSN Pallavi Shinde1 , Prof. Vishal Mogal2 1,2 Department of Computer Engineering, RMD Sinhgad School of Engineering, Warje, Pune-58, India Savitribai Phule Pune University, ABSTRACT In recent years, on-line Social Networks (OSNs) became a crucial part of daily life. Users build particular networks to represent their social relationships. Users are able to upload and share information associated to their personal lives. The privacy risks of such behaviour are typically unnoticed. Nowadays OSNs give little or no support to stop unwanted messages on user walls. For that purpose, a new system is designed to permit OSN users to have a direct control on the messages posted on their walls. This can be achieved through a flexible rule based system, that allows users to customise the filtering criteria to be applied to their walls, and a Machine Learning (ML) primarily based soft classifier mechanically labelling messages in support of content based filtering. The system make use of a ML soft classifier to enforce customizable content-dependent Filtering Rules (FRs). And also the flexibility of the system in terms of filtering choices is increased through the management of Blacklists. Filtered wall is a system to filter undesired messages from OSN walls. This system approach decides when user should be inserted into a black list. The proposed system offers security to the On-line Social Networks. Keywords: Online Social Network (OSN), Machine Learning, Information Filtering, Content- based Filtering. 1. INTRODUCTION Today’s life is totally based on Internet. Now a days people cannot imagine life without Internet. Information and communication technology plays vital role in today’s online networked society. It has affected the online interaction between different users. Online Social networks (OSNs) provide platform to meet different users and share information with them. Communication on these web sites involves exchange of different content like text, image, audio and video. A social network include personal messaging, blogs, chat facility, photos sharing facility and other ways to share text and multimedia content. A wall may be a section in online site user profile where others can post INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 6, Issue 5, May (2015), pp. 47-54 © IAEME: www.iaeme.com/IJCET.asp Journal Impact Factor (2015): 8.9958 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 5, May (2015), pp. 47-54© IAEME 48 messages. This OSN wall is a public writing space so others can view what has been written on wall. So, in online sites there is possibility of posting illegal or undesirable messages on wall which is visible to others too. There is a requirement to develop a lot of security techniques for different communication technologies, particularly online social networks. Networking sites provide very little support to prevent unwanted messages on user walls. Consider for example, facebook permits users to state who is authorized and who is not authorized to insert messages in their walls i.e. friends, friends of a friend (FOAF) or defined group of friends. But there is no any content based preference for messages like sports, politics etc no matter of the user who post them [8]. So it is impossible to prevent undesired messages. So, with the shortage of classification or filtering tools, the user receives all messages posted by the users he or she follows. So disadvantages of existing system are as follows- LIMITATIONS OF EXISTING SYSTEM 1. However, no content-based preferences are supported and therefore it is not possible to prevent undesired messages. No matter user who post them. 2. Providing this service is not only a matter of using previously defined web content mining techniques for a different application, rather it requires to design ad-hoc classification strategies. SYSTEM ARCHITECTURE OF EXISTING SYSTEM Fig. 1: System Architecture of Existing System
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 5, May (2015), pp. 47-54© IAEME 49 So, to control this type of activity and prevent the unwanted messages which are written on user’s wall we can implement filtering rules (FR) in our system. Also, Black List (BL) will maintain in this system. In most cases, the user receives a noisy stream of updates from other users. Our main aim behind this research is to filter unwanted messages from user wall in order to improve the security and efficiency. The main idea of proposed system is to support for content based preferences. We utilize the machine learning text categorization techniques based soft classifier automatically labelling messages with the help of content based filtering. To classify the text for labelling messages by using the short text classifier (STC). Short text classifier are concentrated in the extraction and selection of a set of characterizing features. So, in proposed mechanism, a user can specify what contents should not be displayed on his/her wall, by specifying a set of filtering rules. FRs are permitted to specify filtering conditions based on user profiles. In addition, system provides the support for user defined blacklist means list of users that are temporarily prevented to post any kind of messages on user wall. We have using the wordNet dictionary in our project which gives the synonyms of a particular word. By using the wordNet dictionary we have increased the robustness of the system. 2. LITURATURE SURVEY Our related work has using content-based filtering and policy based personalization to filter unwanted contents in user’s space. Content-based filtering In content based filtering, each user is assumed to operate independently. As a result, a content-based filtering system selects information items based on the correlation between the content of the items and the user preferences [1, 8]. P.W. Foltz and S.T. Dumais [1] presented information retrieval (IR) techniques. There is no any individual based filtering. In our approach, we have used information filtering (IF). Information retrieval is very closely related to to information filtering. User preferences in information filtering typically represent long term interest. While queries in information retrieval tend to represent short term interest. Information filtering is typically applied to stream of incoming data, while in information retrieval, changes in databases do not occur often. Filtering involves process of removing information from stream, while IR involves process of finding information in that stream. Policy based personalization Policy based personalization is applicable in many different contexts. It adapts a service in specific context according user defined policies. In online social networking sites user oriented policies can define how communication between two parties or more can be handled. The policy based personalization system is focuses on Twitter. It assigns a category to each tweet and shows only those tweet to the user which are of his interest [2, 8]. Policy based personalization represent the ability of the user to filter wall messages according to filtering criteria suggested by him. B. Sriram, D. Fuhry, E. Demir, H. Ferhatosmanoglu, and M. Demirbas [2], this paper describes classification of tweets into general but important categorizes by using the author information and features within tweet. But our approach permits setting of FRs according to a variety of criteria and classify the text to predefined set of classes like sports, politics etc. L. Fang and K. LeFevre [3], this paper is related to privacy control but no facility for stopping anyone for posting something on wall. Our approach can stop posting particular categories as per user’s choice.
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 ISSN 0976 - 6375(Online), Volume 6, Issue 5, May (2015), pp. Fong, P.W.L., Anwar, M.M., Zhao, Z. based, history based. So that it is time consuming. policy based personalization. 3. METHODOLOGY The section is divided into following parts. 1) The first section shows the basic idea behind the approach. 2) The second section proposes an algorithm to filter out unwanted messages. 3.1 System Architecture 3.2 Algorithm 1. Post the message. 2. Load the model file in application. 3. Create instance for each category. 4. Classify the message and get the relevance of entered message with each category. 5. Checks for blocking/filtering criteria according 6. If message follows any of the condition then message gets filtered out. 7. Identify the number of attempts over or not. 8. If attempts get over then find the number of days user account International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6375(Online), Volume 6, Issue 5, May (2015), pp. 47-54© IAEME 50 Fong, P.W.L., Anwar, M.M., Zhao, Z. [4], this paper describes policies such as topology . So that it is time consuming. Our approach presents content based filte The section is divided into following parts. The first section shows the basic idea behind the approach. The second section proposes an algorithm to filter out unwanted messages. Fig.2: System Architecture Load the model file in application. Create instance for each category. Classify the message and get the relevance of entered message with each category. ng/filtering criteria according to message category, gender, If message follows any of the condition then message gets filtered out. Identify the number of attempts over or not. If attempts get over then find the number of days user account needs to be blocked. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), © IAEME his paper describes policies such as topology Our approach presents content based filtering and The second section proposes an algorithm to filter out unwanted messages. Classify the message and get the relevance of entered message with each category. gender, age, threshold. needs to be blocked.
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 5, May (2015), pp. 47-54© IAEME 51 9. Block the user temporarily for blocking duration. 10. If the user is blocked temporarily by its n/2 friends then block the user permanently. 11. If message not belonging to the blocking criteria then post the message on the OSN wall. 4. RESULTS 4.1 Input Dataset Post enter by the user is the input data. We have used arff file (Attribute Relationship File Format). This file contains messages categories as other, politics, bollywood, sports, vulgar, violence. 4.2 Outcomes Following snapshots are showing results for practical work done. User name P’s profile as shown below. Like facebook, our OSN also has options as news feed, requests, friends, find friends, friend of friend. Also our OSN has options like filtered posts, filter rules. Fig. 3: User Profile of OSN In filter rule option, user can set the categories which he/she doesn’t want to display on his/her profile. User can also set threshold, gender, age etc. Threshold is used for blocking purpose.
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 5, May (2015), pp. 47-54© IAEME 52 Fig. 4: Filter Rules of OSN Below snapshot shows that, user name Komal doesn’t want sport category message but some of her friend post the sport category. So message has popped as sports category is blocked. Fig. 5: Sports category blocked Below snapshot shows that, sport category message had been posted 3 times, and threshold was set as 0.7. Therefore, user got message as “You are blocked for another 5 days.”
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 5, May (2015), pp. 47-54© IAEME 53 Fig. 6: Temporary Blocking of User Permanent blocking of user is shown in below snapshot. Fig. 7: Permanent blocking of user
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 5, May (2015), pp. 47-54© IAEME 54 5. CONCLUSION This paper describes our work to provide unwanted message filtering for social networks. We have given a system to filter undesired messages from OSN walls. This system approach decides when user should be inserted into a black list. The system GUI and a set of tools which make blacklists and filter rules specifications more easy and simple. We have used the wordNet dictionary in our project which gives the synonyms of a particular word. By using the wordNet dictionary we have increased the robustness of the system. We would prefer to remark that the system proposed during this paper represents simply the core set of functionalities required to produce a sophisticated tool for OSN message filtering. REFERENCES 1. P.W. Foltz and S.T. Dumais, Personalized Information Delivery: An Analysis of Information Filtering Methods, Comm. ACM, vol. 35, no. 12, pp. 51-60, 1992. 2. B. Sriram, D. Fuhry, E. Demir, H. Ferhatosmanoglu, and M. Demirbas, “Short Text Classification in Twitter to Improve Information Filtering,” Proc. 33rd Int’l ACM SIGIR Conf. Research and Development in Information Retrieval (SIGIR ’10), pp. 841-842, 2010. 3. Fang, L., LeFevre, K., Privacy wizards for social networking sites; In: WWW 10: Proceedings of the 19th international conference on World Wide Web, pp. 351360. ACM, NewYork, NY, USA, 2010. 4. Fong, P.W.L., Anwar, M.M., Zhao, Z., A privacy preservation model for facebook-style social network systems; In: Proceedings of 14th European Symposium on Research in Computer Security (ESORICS), pp. 303320, 2009. 5. F. Sebastiani, Machine Learning in Automated Text Categorization, ACM Computing Surveys, vol. 34, no. 1, pp. 1-47, 2002. 6. M. Vanetti, E. Binaghi, B. Carminati, M. Carullo, and E. Ferrari, Content- Based Filtering in On-Line Social Networks, Proc. ECML/PKDD Workshop Privacy and Security Issues in Data Mining and Machine Learning( PSDML 10), 2010. 7. M. Chau and H. Chen, A Machine Learning Approach to Web Page Filtering Using Content and Structure Analysis, Decision Support Systems, vol. 44, no. 2, pp. 482-494, 2008. 8. Marco Vanetti, Elisabetta Binaghi, Elena Ferrari, Barbara Carminati, and Moreno Carullo, “A System to Filter Unwanted Messages from OSN User Walls”, IEEE Transactions On Knowledge And Data Engineering, Vol. 25, No. 2, February 2013. 9. Mrs. L.Rajeswari and Dr.S.S.Dhenakaran, “Page Access Coefficient Algorithm For Information Filtering In Social Network” International journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 3, 2013, pp. 60 - 69, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. 10. Muhanad A. Al-Khalisy and Dr.Haider K. Hoomod, “Posn: Private Information Protection In Online Social Networks” International journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2, 2013, pp. 340 - 355, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. 11. Mr. Yogesh P Murumkar and Prof. Yogesh B. Gurav, “Sampling Online Social Networks Using Outlier Indexing” International journal of Computer Engineering & Technology (IJCET), Volume 5, Issue 6, 2014, pp. 11 - 18, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.