SlideShare a Scribd company logo
IJSRD - International Journal for Scientific Research & Development| Vol. 3, Issue 10, 2015 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 1035
Filter Unwanted Messages from Walls and Blocking Non-Legitimate
Users in OSN
Miss. Gaikwad Rupali B.1 Miss. Kharat Mohini K.2 Mr. Tamhane Ajinkya V.3
Mr. Harde Pradeep S.4
1,2,3,4
Department of Computer Engineering
1,2,3,4
SCSCOE, Rahuri Factory
Abstract— Today’s life is totally based on Internet. Now a
days people cannot imagine life without Internet.
Information and communication technology plays vital role
in today’s online networked society. In today’s life, we are
very close to the online social networks. Online social
networks are used for posting and sharing information
across various social networking sites. But user’s privacy is
not maintained by online social networks. For maintaining
users sensitive information’s privacy online social networks
provides little or no support. For filtering unwanted
messages we propose a system using machine learning
(ML). Using machine learning in soft classifier content
based filtering performed. In proposed system filtering rules
(FR’s) are provided for content independent filtering..
Blacklists are used for more flexibility by which filtering
choices are increased. Proposed system provides security to
the Online Social Networks.
Key words: Online Social Networks, Machine Learning,
Information Filtering, Content based Filtering
I. INTRODUCTION
Online social networks are today’s are very popular
interactive medium for communication, sharing and
dissemination of large amount of human life information
across various social networking sites. In communication,
exchange of different types of content like text, image,
audio, and video data. For useful information extraction
filtering is used. In OSN’s for posting or commenting or
posts on particular public or private area called walls. Using
information filtering user can control the messages written
on their walls, by filtering out unwanted messages. Today
OSN’s provide little support or no support for unwanted
messages. But no content based filtering supported.
Therefore, It is hard to prevent unwanted messages, such as
political or vulgar. Therefore Proposed a system for filtering
or preventing unwanted messages called Filtered Walls
(FW’s). Use Machine Learning (ML) text categorization
techniques[5]. For short text classification use radial basis
function networks (RBFN), In managing noisy data[6]. We
insert two level classification strategy, in first level RBFN
categorize short messages as a neutral and non-neutral; in
the second, Non-neutral messages are classified and
correctness estimate are produced. In proposed system
filtering rules are provided. FR’s are the rules in which user
can stste what contents are not displayed on their walls. In
addition the system used user defined Blacklists (BL’s). In
which it makes lists of users that are temporarily prevented
to post any type of messages on a user wall. Proposed
system filters unwanted messages from OSN user walls. On
the basis of message content and message creator
relationship.
II. LITERATURE SURVEY
We are using Content based filtering and Policy based
Personalisation for filtering unwanted or vulgar messages or
text from users Online Social Networks (OSN) walls. So for
that purpose we are surveying the literature in both fields.
The Main motive of this paper is to implement an
architecture which provides customized content based
filtering for OSN’s, based on machine learning techniques.
Our related work is related with both content based filtering
and Policy based personalisation.
For Example: In Facebook user states who is
allowed to insert messages on their walls (like friends,
friends of Friends and Groups of friends) but no content
based filtering are supported.
A. Content based Filtering:
In content based filtering, each user is assumed to work
separately. A content based filtering collects the information
of items based on the relationship between the item’s
content and the user choices. An electronic mail is well
known example of Content based filtering. Only textual data
is processed in content based filtering, Therefore content
based filtering is closely similar to Text Classification.
Content Based filtering is based on the use of machine
learning paradigm. According to machine learning paradigm
a classifier is automatically induced by learning from a sets
of predefined examples. The Information Retrieval is
presented by P.W. Foltz and S.T. Dumais [1].There is no
information filtering in this approach.in our approach we are
using information filtering. Information retrieval is very
much similar to information filtering. filtering involves
process of removing information from stream, while IR
involves process of finding information in that stream.
B. Policy Based Personalization:
Policy based personalization is useful in different types of
contexts. In Online Social Networking sites user defined
policies can define how communication between two parties
or more parties can handled. The policy based
personalization mostly focuses the Twitter. It categorizes the
each tweet and only shows those tweets which are of user’s
interest. Policy based personalization shows the ability of
use to filter unwanted messages based on filtering criteria
suggested by him or the customized settings chosen by him
B. Sriram, D.fuhry, E.Demir, H. Ferhatosmanogly,
and M. Demirbas [2], our paper describes classification of
tweets into general. our approach allows settings of filter
rules according to a variety criteria’s described by him and
classifies the text into various pre-defined sets of classes like
various categories like sports, politics, Bollywood etc.
L. Fang and K. LeFevre [3], this paper is related to
privacy control but no facility for stopping anyone for
Filter Unwanted Messages from Walls and Blocking Non-Legitimate Users in OSN
(IJSRD/Vol. 3/Issue 10/2015/237)
All rights reserved by www.ijsrd.com 1036
posting something on wall. Our approach can stop posting
particular categories as per users choice.
Fong, P.W.L., Anwar, M.M., Zhao, Z. [4], this
paper describes policies such as topology based, history
based. So that it is time consuming our approach presents
content based filtering and Policy based personalization.
III. PROPOSED SYSTEM
From above literature survey we can conclude that there is
no any prevention on post which is posted by friends or any
person. So, if any person is not interested to see or to read
specific category of messages then he cannot apply any filter
on their walls. In this situation he can receive any type of
messages.in our proposed system we apply prevention to
messages by using or providing filtering rules. The main
aim of system is to prevent or filter unwanted messages
from user walls. In proposed system, filtering are supported
by content based preferences. The main part of proposed
system is content base message filtering(CBMF) and the
short text classifier module. The second element that is short
text classifier are used to categorize messages according to
set of different categories. In comparison, the first element
uses the message categorization provided by short text
classifier to implement filtering rules specified by the user.
For enhancing the filtering process Blacklist can also be
used. Blacklists are the list of users which are temporarily
prevented to post messages or text on user walls.
In our system architecture we designed a filter to
discard those messages which are vulgar in nature and
prevented to be displayed on another users wall. If User1
wants to posts some content on someone’s wall then before
it will display on that user wall, it will be checked that
whether the content is vulgar, we have provided predefined
dataset which include those words which are vulgar in
nature. If User1 data matched to the dataset then this
message is vulgar in nature so it cannot displayed on wall
and that user who wants to write message will be blocked.
This process is carried out through user defined rules and in
some cases BlackList(BL) are also used.
Fig. 1: System Architecture
IV. CONCLUSION
In our proposed system, Filtered wall is a system to prevent
or filter unwanted or unnecessary messages from online
social networks walls. This system approach decides when
user should be inserted into a blacklist. Filtered wall has a
wide variety of applications in OSN wall. In future, more
work is needed on further improving the performance
measures.
REFERENCES
[1] P.W. Foltz and S.T. Dumais, Personalized Information
Delivery: An Analysis of Information Filtering
Methods, Comm. ACM, vol. 35, no. 12, pp. 51-
60,1992.
[2] Fong, P.W.L., Anwar, M.M., Zhao, Z., A privacy
preservation model for facebook-style social network
systems; In: Proceedings of 14th European Symposium
on Research in Computer Security (ESORICS), pp.
303320, 2009.
[3] Fang, L., LeFevre, K., Privacy wizards for social
networking sites; In: WWW 10: Proceedings of the 19th
international conference on World Wide Web,pp.
351360. ACM, New York, NY, USA, 2010.
[4] B. Sriram, D. Fuhry, E. Demir, H. Ferhatosmanoglu,
and M. Demirbas,Short Text Classi_cation in Twitter
to Improve Information Filtering, Proc.33rd Intl ACM
SIGIR Conf. Research and Development in Information
Retrieval (SIGIR 10), pp. 841-842, 2010.
[5] F. Sebastiani, “Machine Learning in Automated Text
Categorization,”ACM Computing Surveys, vol. 34, no.
1, pp. 1-47, 2002.
[6] M. Vanetti, E. Binaghi, B. Carminati, M. Carullo, and
E. Ferrari,“Content-Based Filtering in On-Line Social
Networks,” Proc.ECML/PKDD Workshop Privacy and
Security Issues in Data Mining and Machine Learning
(PSDML ’10), 2010.

More Related Content

What's hot

Paper id 152013128
Paper id 152013128Paper id 152013128
Paper id 152013128IJRAT
 
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
IOSR Journals
 
An automatic filtering task in osn using content based approach
An automatic filtering task in osn using content based approachAn automatic filtering task in osn using content based approach
An automatic filtering task in osn using content based approach
IAEME Publication
 
S180304116124
S180304116124S180304116124
S180304116124
IOSR Journals
 
Cb4301449454
Cb4301449454Cb4301449454
Cb4301449454
IJERA Editor
 
D0351020025
D0351020025D0351020025
D0351020025
inventionjournals
 
Iaetsd efficient filteration of unwanted messages
Iaetsd efficient filteration of unwanted messagesIaetsd efficient filteration of unwanted messages
Iaetsd efficient filteration of unwanted messages
Iaetsd Iaetsd
 
Rule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social networkRule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social network
eSAT Publishing House
 
Assignment 2(data communication)
Assignment 2(data communication)Assignment 2(data communication)
Assignment 2(data communication)
MstMarjuka
 
A system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user wallsA system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user walls
JPINFOTECH JAYAPRAKASH
 
D018132226
D018132226D018132226
D018132226
IOSR Journals
 
Smart detection of offensive words in social media using the soundex algorith...
Smart detection of offensive words in social media using the soundex algorith...Smart detection of offensive words in social media using the soundex algorith...
Smart detection of offensive words in social media using the soundex algorith...
IJECEIAES
 
An educational bluetooth quizzing application in android
An educational bluetooth quizzing application in androidAn educational bluetooth quizzing application in android
An educational bluetooth quizzing application in android
ijwmn
 
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Kato Mivule
 
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSA SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
IJCI JOURNAL
 
Ijcatr04041017
Ijcatr04041017Ijcatr04041017
Ijcatr04041017
Editor IJCATR
 
Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on ...
Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on ...Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on ...
Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on ...
Prachi Jain
 
Semantic Massage Addressing based on Social Cloud Actor's Interests
Semantic Massage Addressing based on Social Cloud Actor's InterestsSemantic Massage Addressing based on Social Cloud Actor's Interests
Semantic Massage Addressing based on Social Cloud Actor's Interests
CSCJournals
 

What's hot (18)

Paper id 152013128
Paper id 152013128Paper id 152013128
Paper id 152013128
 
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
 
An automatic filtering task in osn using content based approach
An automatic filtering task in osn using content based approachAn automatic filtering task in osn using content based approach
An automatic filtering task in osn using content based approach
 
S180304116124
S180304116124S180304116124
S180304116124
 
Cb4301449454
Cb4301449454Cb4301449454
Cb4301449454
 
D0351020025
D0351020025D0351020025
D0351020025
 
Iaetsd efficient filteration of unwanted messages
Iaetsd efficient filteration of unwanted messagesIaetsd efficient filteration of unwanted messages
Iaetsd efficient filteration of unwanted messages
 
Rule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social networkRule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social network
 
Assignment 2(data communication)
Assignment 2(data communication)Assignment 2(data communication)
Assignment 2(data communication)
 
A system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user wallsA system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user walls
 
D018132226
D018132226D018132226
D018132226
 
Smart detection of offensive words in social media using the soundex algorith...
Smart detection of offensive words in social media using the soundex algorith...Smart detection of offensive words in social media using the soundex algorith...
Smart detection of offensive words in social media using the soundex algorith...
 
An educational bluetooth quizzing application in android
An educational bluetooth quizzing application in androidAn educational bluetooth quizzing application in android
An educational bluetooth quizzing application in android
 
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
 
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSA SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
 
Ijcatr04041017
Ijcatr04041017Ijcatr04041017
Ijcatr04041017
 
Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on ...
Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on ...Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on ...
Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on ...
 
Semantic Massage Addressing based on Social Cloud Actor's Interests
Semantic Massage Addressing based on Social Cloud Actor's InterestsSemantic Massage Addressing based on Social Cloud Actor's Interests
Semantic Massage Addressing based on Social Cloud Actor's Interests
 

Viewers also liked

Rise
RiseRise
Technology tips for educators
Technology tips for educatorsTechnology tips for educators
Technology tips for educators
Ottawa Catholic School Board
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click points
Hari Krishnan
 
Good presentations matter
Good presentations matterGood presentations matter
Good presentations matter
Ned Potter
 
7 Tips to Beautiful PowerPoint by @itseugenec
7 Tips to Beautiful PowerPoint by @itseugenec7 Tips to Beautiful PowerPoint by @itseugenec
7 Tips to Beautiful PowerPoint by @itseugenec
Eugene Cheng
 
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare
SlideShare
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShare
SlideShare
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
SlideShare
 

Viewers also liked (8)

Rise
RiseRise
Rise
 
Technology tips for educators
Technology tips for educatorsTechnology tips for educators
Technology tips for educators
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click points
 
Good presentations matter
Good presentations matterGood presentations matter
Good presentations matter
 
7 Tips to Beautiful PowerPoint by @itseugenec
7 Tips to Beautiful PowerPoint by @itseugenec7 Tips to Beautiful PowerPoint by @itseugenec
7 Tips to Beautiful PowerPoint by @itseugenec
 
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShare
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
 

Similar to Filter unwanted messages from walls and blocking nonlegitimate user in osn

Iaetsd hierarchical fuzzy rule based classification
Iaetsd hierarchical fuzzy rule based classificationIaetsd hierarchical fuzzy rule based classification
Iaetsd hierarchical fuzzy rule based classification
Iaetsd Iaetsd
 
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
IJARIIT
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
ijtsrd
 
Intelligent access control policies for Social network site
Intelligent access control policies for Social network siteIntelligent access control policies for Social network site
Intelligent access control policies for Social network site
ijcsit
 
Automatic Hate Speech Detection: A Literature Review
Automatic Hate Speech Detection: A Literature ReviewAutomatic Hate Speech Detection: A Literature Review
Automatic Hate Speech Detection: A Literature Review
Dr. Amarjeet Singh
 
Privacy Protection Using Formal Logics in Onlne Social Networks
Privacy Protection Using   Formal Logics in Onlne Social NetworksPrivacy Protection Using   Formal Logics in Onlne Social Networks
Privacy Protection Using Formal Logics in Onlne Social Networks
IRJET Journal
 
A Literature Survey on Recommendation Systems for Scientific Articles.pdf
A Literature Survey on Recommendation Systems for Scientific Articles.pdfA Literature Survey on Recommendation Systems for Scientific Articles.pdf
A Literature Survey on Recommendation Systems for Scientific Articles.pdf
Amber Ford
 
A Review: Text Classification on Social Media Data
A Review: Text Classification on Social Media DataA Review: Text Classification on Social Media Data
A Review: Text Classification on Social Media Data
IOSR Journals
 
O017148084
O017148084O017148084
O017148084
IOSR Journals
 
Current trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networksCurrent trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networks
eSAT Publishing House
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2IAEME Publication
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2IAEME Publication
 
Experimental of vectorizer and classifier for scrapped social media data
Experimental of vectorizer and classifier for scrapped social media dataExperimental of vectorizer and classifier for scrapped social media data
Experimental of vectorizer and classifier for scrapped social media data
TELKOMNIKA JOURNAL
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
ijsptm
 
Detecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social NetworksDetecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social Networks
IRJET Journal
 
tweet segmentation
tweet segmentation tweet segmentation
tweet segmentation
prashanttarone
 

Similar to Filter unwanted messages from walls and blocking nonlegitimate user in osn (16)

Iaetsd hierarchical fuzzy rule based classification
Iaetsd hierarchical fuzzy rule based classificationIaetsd hierarchical fuzzy rule based classification
Iaetsd hierarchical fuzzy rule based classification
 
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
 
Intelligent access control policies for Social network site
Intelligent access control policies for Social network siteIntelligent access control policies for Social network site
Intelligent access control policies for Social network site
 
Automatic Hate Speech Detection: A Literature Review
Automatic Hate Speech Detection: A Literature ReviewAutomatic Hate Speech Detection: A Literature Review
Automatic Hate Speech Detection: A Literature Review
 
Privacy Protection Using Formal Logics in Onlne Social Networks
Privacy Protection Using   Formal Logics in Onlne Social NetworksPrivacy Protection Using   Formal Logics in Onlne Social Networks
Privacy Protection Using Formal Logics in Onlne Social Networks
 
A Literature Survey on Recommendation Systems for Scientific Articles.pdf
A Literature Survey on Recommendation Systems for Scientific Articles.pdfA Literature Survey on Recommendation Systems for Scientific Articles.pdf
A Literature Survey on Recommendation Systems for Scientific Articles.pdf
 
A Review: Text Classification on Social Media Data
A Review: Text Classification on Social Media DataA Review: Text Classification on Social Media Data
A Review: Text Classification on Social Media Data
 
O017148084
O017148084O017148084
O017148084
 
Current trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networksCurrent trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networks
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
 
Experimental of vectorizer and classifier for scrapped social media data
Experimental of vectorizer and classifier for scrapped social media dataExperimental of vectorizer and classifier for scrapped social media data
Experimental of vectorizer and classifier for scrapped social media data
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
 
Detecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social NetworksDetecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social Networks
 
tweet segmentation
tweet segmentation tweet segmentation
tweet segmentation
 

More from IJSRD

#IJSRD #Research Paper Publication
#IJSRD #Research Paper Publication#IJSRD #Research Paper Publication
#IJSRD #Research Paper Publication
IJSRD
 
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
IJSRD
 
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
IJSRD
 
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEWPreclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
IJSRD
 
Prevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolPrevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV Protocol
IJSRD
 
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
IJSRD
 
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild SteelEvaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
IJSRD
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
IJSRD
 
Diagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural NetworksDiagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural Networks
IJSRD
 
A Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion MiningA Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion Mining
IJSRD
 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFIS
IJSRD
 
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
IJSRD
 
Product Quality Analysis based on online Reviews
Product Quality Analysis based on online ReviewsProduct Quality Analysis based on online Reviews
Product Quality Analysis based on online Reviews
IJSRD
 
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy NumbersSolving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
IJSRD
 
Study of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data MiningStudy of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data Mining
IJSRD
 
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
IJSRD
 
Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...
IJSRD
 
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a RotavatorReview Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
IJSRD
 
A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots Prediction
IJSRD
 
Studies on Physico - Mechanical Properties of Chloroprene Rubber Vulcanizate ...
Studies on Physico - Mechanical Properties of Chloroprene Rubber Vulcanizate ...Studies on Physico - Mechanical Properties of Chloroprene Rubber Vulcanizate ...
Studies on Physico - Mechanical Properties of Chloroprene Rubber Vulcanizate ...
IJSRD
 

More from IJSRD (20)

#IJSRD #Research Paper Publication
#IJSRD #Research Paper Publication#IJSRD #Research Paper Publication
#IJSRD #Research Paper Publication
 
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
 
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
 
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEWPreclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
 
Prevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolPrevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV Protocol
 
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
 
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild SteelEvaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
 
Diagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural NetworksDiagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural Networks
 
A Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion MiningA Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion Mining
 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFIS
 
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
 
Product Quality Analysis based on online Reviews
Product Quality Analysis based on online ReviewsProduct Quality Analysis based on online Reviews
Product Quality Analysis based on online Reviews
 
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy NumbersSolving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
 
Study of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data MiningStudy of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data Mining
 
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
 
Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...
 
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a RotavatorReview Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
 
A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots Prediction
 
Studies on Physico - Mechanical Properties of Chloroprene Rubber Vulcanizate ...
Studies on Physico - Mechanical Properties of Chloroprene Rubber Vulcanizate ...Studies on Physico - Mechanical Properties of Chloroprene Rubber Vulcanizate ...
Studies on Physico - Mechanical Properties of Chloroprene Rubber Vulcanizate ...
 

Recently uploaded

"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 

Recently uploaded (20)

"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 

Filter unwanted messages from walls and blocking nonlegitimate user in osn

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 3, Issue 10, 2015 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 1035 Filter Unwanted Messages from Walls and Blocking Non-Legitimate Users in OSN Miss. Gaikwad Rupali B.1 Miss. Kharat Mohini K.2 Mr. Tamhane Ajinkya V.3 Mr. Harde Pradeep S.4 1,2,3,4 Department of Computer Engineering 1,2,3,4 SCSCOE, Rahuri Factory Abstract— Today’s life is totally based on Internet. Now a days people cannot imagine life without Internet. Information and communication technology plays vital role in today’s online networked society. In today’s life, we are very close to the online social networks. Online social networks are used for posting and sharing information across various social networking sites. But user’s privacy is not maintained by online social networks. For maintaining users sensitive information’s privacy online social networks provides little or no support. For filtering unwanted messages we propose a system using machine learning (ML). Using machine learning in soft classifier content based filtering performed. In proposed system filtering rules (FR’s) are provided for content independent filtering.. Blacklists are used for more flexibility by which filtering choices are increased. Proposed system provides security to the Online Social Networks. Key words: Online Social Networks, Machine Learning, Information Filtering, Content based Filtering I. INTRODUCTION Online social networks are today’s are very popular interactive medium for communication, sharing and dissemination of large amount of human life information across various social networking sites. In communication, exchange of different types of content like text, image, audio, and video data. For useful information extraction filtering is used. In OSN’s for posting or commenting or posts on particular public or private area called walls. Using information filtering user can control the messages written on their walls, by filtering out unwanted messages. Today OSN’s provide little support or no support for unwanted messages. But no content based filtering supported. Therefore, It is hard to prevent unwanted messages, such as political or vulgar. Therefore Proposed a system for filtering or preventing unwanted messages called Filtered Walls (FW’s). Use Machine Learning (ML) text categorization techniques[5]. For short text classification use radial basis function networks (RBFN), In managing noisy data[6]. We insert two level classification strategy, in first level RBFN categorize short messages as a neutral and non-neutral; in the second, Non-neutral messages are classified and correctness estimate are produced. In proposed system filtering rules are provided. FR’s are the rules in which user can stste what contents are not displayed on their walls. In addition the system used user defined Blacklists (BL’s). In which it makes lists of users that are temporarily prevented to post any type of messages on a user wall. Proposed system filters unwanted messages from OSN user walls. On the basis of message content and message creator relationship. II. LITERATURE SURVEY We are using Content based filtering and Policy based Personalisation for filtering unwanted or vulgar messages or text from users Online Social Networks (OSN) walls. So for that purpose we are surveying the literature in both fields. The Main motive of this paper is to implement an architecture which provides customized content based filtering for OSN’s, based on machine learning techniques. Our related work is related with both content based filtering and Policy based personalisation. For Example: In Facebook user states who is allowed to insert messages on their walls (like friends, friends of Friends and Groups of friends) but no content based filtering are supported. A. Content based Filtering: In content based filtering, each user is assumed to work separately. A content based filtering collects the information of items based on the relationship between the item’s content and the user choices. An electronic mail is well known example of Content based filtering. Only textual data is processed in content based filtering, Therefore content based filtering is closely similar to Text Classification. Content Based filtering is based on the use of machine learning paradigm. According to machine learning paradigm a classifier is automatically induced by learning from a sets of predefined examples. The Information Retrieval is presented by P.W. Foltz and S.T. Dumais [1].There is no information filtering in this approach.in our approach we are using information filtering. Information retrieval is very much similar to information filtering. filtering involves process of removing information from stream, while IR involves process of finding information in that stream. B. Policy Based Personalization: Policy based personalization is useful in different types of contexts. In Online Social Networking sites user defined policies can define how communication between two parties or more parties can handled. The policy based personalization mostly focuses the Twitter. It categorizes the each tweet and only shows those tweets which are of user’s interest. Policy based personalization shows the ability of use to filter unwanted messages based on filtering criteria suggested by him or the customized settings chosen by him B. Sriram, D.fuhry, E.Demir, H. Ferhatosmanogly, and M. Demirbas [2], our paper describes classification of tweets into general. our approach allows settings of filter rules according to a variety criteria’s described by him and classifies the text into various pre-defined sets of classes like various categories like sports, politics, Bollywood etc. L. Fang and K. LeFevre [3], this paper is related to privacy control but no facility for stopping anyone for
  • 2. Filter Unwanted Messages from Walls and Blocking Non-Legitimate Users in OSN (IJSRD/Vol. 3/Issue 10/2015/237) All rights reserved by www.ijsrd.com 1036 posting something on wall. Our approach can stop posting particular categories as per users choice. Fong, P.W.L., Anwar, M.M., Zhao, Z. [4], this paper describes policies such as topology based, history based. So that it is time consuming our approach presents content based filtering and Policy based personalization. III. PROPOSED SYSTEM From above literature survey we can conclude that there is no any prevention on post which is posted by friends or any person. So, if any person is not interested to see or to read specific category of messages then he cannot apply any filter on their walls. In this situation he can receive any type of messages.in our proposed system we apply prevention to messages by using or providing filtering rules. The main aim of system is to prevent or filter unwanted messages from user walls. In proposed system, filtering are supported by content based preferences. The main part of proposed system is content base message filtering(CBMF) and the short text classifier module. The second element that is short text classifier are used to categorize messages according to set of different categories. In comparison, the first element uses the message categorization provided by short text classifier to implement filtering rules specified by the user. For enhancing the filtering process Blacklist can also be used. Blacklists are the list of users which are temporarily prevented to post messages or text on user walls. In our system architecture we designed a filter to discard those messages which are vulgar in nature and prevented to be displayed on another users wall. If User1 wants to posts some content on someone’s wall then before it will display on that user wall, it will be checked that whether the content is vulgar, we have provided predefined dataset which include those words which are vulgar in nature. If User1 data matched to the dataset then this message is vulgar in nature so it cannot displayed on wall and that user who wants to write message will be blocked. This process is carried out through user defined rules and in some cases BlackList(BL) are also used. Fig. 1: System Architecture IV. CONCLUSION In our proposed system, Filtered wall is a system to prevent or filter unwanted or unnecessary messages from online social networks walls. This system approach decides when user should be inserted into a blacklist. Filtered wall has a wide variety of applications in OSN wall. In future, more work is needed on further improving the performance measures. REFERENCES [1] P.W. Foltz and S.T. Dumais, Personalized Information Delivery: An Analysis of Information Filtering Methods, Comm. ACM, vol. 35, no. 12, pp. 51- 60,1992. [2] Fong, P.W.L., Anwar, M.M., Zhao, Z., A privacy preservation model for facebook-style social network systems; In: Proceedings of 14th European Symposium on Research in Computer Security (ESORICS), pp. 303320, 2009. [3] Fang, L., LeFevre, K., Privacy wizards for social networking sites; In: WWW 10: Proceedings of the 19th international conference on World Wide Web,pp. 351360. ACM, New York, NY, USA, 2010. [4] B. Sriram, D. Fuhry, E. Demir, H. Ferhatosmanoglu, and M. Demirbas,Short Text Classi_cation in Twitter to Improve Information Filtering, Proc.33rd Intl ACM SIGIR Conf. Research and Development in Information Retrieval (SIGIR 10), pp. 841-842, 2010. [5] F. Sebastiani, “Machine Learning in Automated Text Categorization,”ACM Computing Surveys, vol. 34, no. 1, pp. 1-47, 2002. [6] M. Vanetti, E. Binaghi, B. Carminati, M. Carullo, and E. Ferrari,“Content-Based Filtering in On-Line Social Networks,” Proc.ECML/PKDD Workshop Privacy and Security Issues in Data Mining and Machine Learning (PSDML ’10), 2010.