SlideShare a Scribd company logo
Friend book A Semantic-based Friend Recommendation System for Social Networks 
Friend book A Semantic-based Friend Recommendation System for 
Social Networks 
Existing social networking services recommend friends to users based on their social graphs, 
which may not be the most appropriate to reflect a user’s preferences on friend selection in real 
life. In this paper, we present Friendbook, a novel semantic-based friend recommendation system 
for social networks, which recommends friends to users based on their life styles instead of 
social graphs. By taking advantage of sensor-rich smartphones, Friendbook discovers life styles 
of users from user-centric sensor data, measures the similarity of life styles between users, and 
recommends friends to users if their life styles have high similarity. Inspired by text mining, we 
model a user’s daily life as life documents, from which his/her life styles are extracted by using 
the Latent Dirichlet Allocation algorithm. We further propose a similarity metric to meas ure the 
similarity of life styles between users, and calculate users’ impact in terms of life styles with a 
friend-matching graph. Upon receiving a request, Friendbook returns a list of people with highest 
recommendation scores to the query user. Finally, Friendbook integrates a feedback mechanism 
to further improve the recommendation accuracy. We have implemented Friendbook on the 
Android-based smartphones, and evaluated its performance on both small-scale experiments and 
large-scale simulations. The results show that the recommendations accurately reflect the 
preferences of users in choosing friends. 
Most of the friend suggestions mechanism relies on pre-existing user relationships to pick friend 
candidates. For example, Facebook relies on a social link analysis among those who already 
share common friends and recommends symmetrical users as potential friends. The rules to 
group people together include: 
Contact: 9703109334, 9533694296 
ABSTRACT: 
EXISTING SYSTEM: 
1) Habits or life style 
2) Attitudes 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in 
3) Tastes
Friend book A Semantic-based Friend Recommendation System for Social Networks 
6) People they already know. 
Apparently, rule #3 and rule #6 are the mainstream factors considered by existing 
recommendation systems. 
DISADVANTAGES OF EXISTING SYSTEM: 
 Existing social networking services recommend friends to users based on their social 
graphs, which may not be the most appropriate to reflect a user’s preferences on friend 
selection in real life 
 A novel semantic-based friend recommendation system for social networks, which 
recommends friends to users based on their life styles instead of social graphs. 
 By taking advantage of sensor-rich smartphones, Friendbook discovers life styles of users 
from user-centric sensor data, measures the similarity of life styles between users, and 
recommends friends to users if their life styles have high similarity. 
 We model a user’s daily life as life documents, from which his/her life styles are 
extracted by using the Latent Dirichlet Allocation algorithm. 
 Similarity metric to measure the similarity of life styles between users, and calculate 
Contact: 9703109334, 9533694296 
4) Moral standards 
5) Economic level; and 
PROPOSED SYSTEM: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in 
users’ 
 Impact in terms of life styles with a friend-matching graph. 
 We integrate a linear feedback mechanism that exploits the user’s feedback to improve 
recommendation accuracy. 
ADVANTAGES OF PROPOSED SYSTEM: 
 Recommendeds potential friends to users if they share similar life styles.
Friend book A Semantic-based Friend Recommendation System for Social Networks 
 The feedback mechanism allows us to measure the satisfaction of users, by providing a 
user interface that allows the user to rate the friend list 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : JAVA/J2EE 
 IDE : Netbeans 7.4 
 Database : MYSQL 
Zhibo Wang, Jilong Liao, Qing Cao, Hairong Qi, and Zhi Wang, “Friendbook: A Semantic-based 
Friend Recommendation System for Social Networks ”, IEEE TRANSACTIONS ON 
MOBILE COMPUTING, 2014 
Contact: 9703109334, 9533694296 
REFERENCE: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in

More Related Content

What's hot

Social friend recommendation based on multiple network correlation
Social friend recommendation based on multiple network correlationSocial friend recommendation based on multiple network correlation
Social friend recommendation based on multiple network correlation
Shakas Technologies
 
Friendbook ppt
Friendbook pptFriendbook ppt
Friendbook ppt
Rohit Singal
 
Duke talk
Duke talkDuke talk
Relationships In Wbs Ns (Tin180 Com)
Relationships In Wbs Ns (Tin180 Com)Relationships In Wbs Ns (Tin180 Com)
Relationships In Wbs Ns (Tin180 Com)
Tin180 VietNam
 
Friendbook: A Semantic-Based Friend Recommendation System for Social Networks
Friendbook: A Semantic-Based Friend Recommendation System for Social NetworksFriendbook: A Semantic-Based Friend Recommendation System for Social Networks
Friendbook: A Semantic-Based Friend Recommendation System for Social Networks
1crore projects
 
Ucs813 syllabus
Ucs813 syllabusUcs813 syllabus
Ucs813 syllabus
Nitin Saxena
 
COLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTING
COLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTINGCOLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTING
COLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTING
Prasadu Peddi
 
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...
IJMTST Journal
 
Trust_Recommendation_System
Trust_Recommendation_SystemTrust_Recommendation_System
Trust_Recommendation_System
chettykulkarni
 
INFO4990_Hossain
INFO4990_HossainINFO4990_Hossain
INFO4990_Hossain
webuploader
 
Service rating prediction by exploring social mobile users’ geographical loca...
Service rating prediction by exploring social mobile users’ geographical loca...Service rating prediction by exploring social mobile users’ geographical loca...
Service rating prediction by exploring social mobile users’ geographical loca...
CloudTechnologies
 
Social Interaction and the Power of Mobility Estimation (2013)
Social Interaction and the Power of Mobility Estimation (2013)Social Interaction and the Power of Mobility Estimation (2013)
Social Interaction and the Power of Mobility Estimation (2013)
Rute C. Sofia
 
Sos a distributed mobile q&a system based on social networks
Sos a distributed mobile q&a system based on social networksSos a distributed mobile q&a system based on social networks
Sos a distributed mobile q&a system based on social networks
Papitha Velumani
 
SOS: A DISTRIBUTED MOBILE Q&A SYSTEM BASED ON SOCIAL NETWORKS
SOS: A DISTRIBUTED MOBILE Q&A SYSTEM BASED ON SOCIAL NETWORKSSOS: A DISTRIBUTED MOBILE Q&A SYSTEM BASED ON SOCIAL NETWORKS
SOS: A DISTRIBUTED MOBILE Q&A SYSTEM BASED ON SOCIAL NETWORKS
Shakas Technologies
 
JPJ1442 SOS: A Distributed Mobile Q&A System Based on Social Networks
JPJ1442 SOS: A Distributed Mobile Q&A System Based on Social NetworksJPJ1442 SOS: A Distributed Mobile Q&A System Based on Social Networks
JPJ1442 SOS: A Distributed Mobile Q&A System Based on Social Networks
chennaijp
 
WTFW
WTFWWTFW
sos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networkssos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networks
swathi78
 
A graph based action network framework to identify prestigious members through
A graph based action network framework to identify prestigious members throughA graph based action network framework to identify prestigious members through
A graph based action network framework to identify prestigious members through
柏宇 陳
 
Dave Schneck (Lab 1 Typed Portion)
Dave Schneck (Lab 1   Typed Portion)Dave Schneck (Lab 1   Typed Portion)
Dave Schneck (Lab 1 Typed Portion)
DRS444
 
Stanford Info Seminar: Unfollowing and Emotion on Twitter
Stanford Info Seminar: Unfollowing and Emotion on TwitterStanford Info Seminar: Unfollowing and Emotion on Twitter
Stanford Info Seminar: Unfollowing and Emotion on Twitter
mor
 

What's hot (20)

Social friend recommendation based on multiple network correlation
Social friend recommendation based on multiple network correlationSocial friend recommendation based on multiple network correlation
Social friend recommendation based on multiple network correlation
 
Friendbook ppt
Friendbook pptFriendbook ppt
Friendbook ppt
 
Duke talk
Duke talkDuke talk
Duke talk
 
Relationships In Wbs Ns (Tin180 Com)
Relationships In Wbs Ns (Tin180 Com)Relationships In Wbs Ns (Tin180 Com)
Relationships In Wbs Ns (Tin180 Com)
 
Friendbook: A Semantic-Based Friend Recommendation System for Social Networks
Friendbook: A Semantic-Based Friend Recommendation System for Social NetworksFriendbook: A Semantic-Based Friend Recommendation System for Social Networks
Friendbook: A Semantic-Based Friend Recommendation System for Social Networks
 
Ucs813 syllabus
Ucs813 syllabusUcs813 syllabus
Ucs813 syllabus
 
COLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTING
COLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTINGCOLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTING
COLLABORATIVE FILTERING-BASED RECOMMENDATION OF ONLINE SOCIAL VOTING
 
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...
 
Trust_Recommendation_System
Trust_Recommendation_SystemTrust_Recommendation_System
Trust_Recommendation_System
 
INFO4990_Hossain
INFO4990_HossainINFO4990_Hossain
INFO4990_Hossain
 
Service rating prediction by exploring social mobile users’ geographical loca...
Service rating prediction by exploring social mobile users’ geographical loca...Service rating prediction by exploring social mobile users’ geographical loca...
Service rating prediction by exploring social mobile users’ geographical loca...
 
Social Interaction and the Power of Mobility Estimation (2013)
Social Interaction and the Power of Mobility Estimation (2013)Social Interaction and the Power of Mobility Estimation (2013)
Social Interaction and the Power of Mobility Estimation (2013)
 
Sos a distributed mobile q&a system based on social networks
Sos a distributed mobile q&a system based on social networksSos a distributed mobile q&a system based on social networks
Sos a distributed mobile q&a system based on social networks
 
SOS: A DISTRIBUTED MOBILE Q&A SYSTEM BASED ON SOCIAL NETWORKS
SOS: A DISTRIBUTED MOBILE Q&A SYSTEM BASED ON SOCIAL NETWORKSSOS: A DISTRIBUTED MOBILE Q&A SYSTEM BASED ON SOCIAL NETWORKS
SOS: A DISTRIBUTED MOBILE Q&A SYSTEM BASED ON SOCIAL NETWORKS
 
JPJ1442 SOS: A Distributed Mobile Q&A System Based on Social Networks
JPJ1442 SOS: A Distributed Mobile Q&A System Based on Social NetworksJPJ1442 SOS: A Distributed Mobile Q&A System Based on Social Networks
JPJ1442 SOS: A Distributed Mobile Q&A System Based on Social Networks
 
WTFW
WTFWWTFW
WTFW
 
sos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networkssos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networks
 
A graph based action network framework to identify prestigious members through
A graph based action network framework to identify prestigious members throughA graph based action network framework to identify prestigious members through
A graph based action network framework to identify prestigious members through
 
Dave Schneck (Lab 1 Typed Portion)
Dave Schneck (Lab 1   Typed Portion)Dave Schneck (Lab 1   Typed Portion)
Dave Schneck (Lab 1 Typed Portion)
 
Stanford Info Seminar: Unfollowing and Emotion on Twitter
Stanford Info Seminar: Unfollowing and Emotion on TwitterStanford Info Seminar: Unfollowing and Emotion on Twitter
Stanford Info Seminar: Unfollowing and Emotion on Twitter
 

Viewers also liked

Mobi context a context aware cloud-based venue recommendation framework
Mobi context a context aware cloud-based venue recommendation frameworkMobi context a context aware cloud-based venue recommendation framework
Mobi context a context aware cloud-based venue recommendation framework
Nagamalleswararao Tadikonda
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
Mandy Suzanne
 
Foundations for a Platform to Develop Context-Aware Systems by Domain Experts
Foundations for a Platform to Develop Context-Aware Systems by Domain ExpertsFoundations for a Platform to Develop Context-Aware Systems by Domain Experts
Foundations for a Platform to Develop Context-Aware Systems by Domain Experts
damarcant
 
Infrared image enhancement using wavelet transform
Infrared image enhancement using wavelet transformInfrared image enhancement using wavelet transform
Infrared image enhancement using wavelet transform
Alexander Decker
 
Presentation12 130428221311-phpapp02 (1)
Presentation12 130428221311-phpapp02 (1)Presentation12 130428221311-phpapp02 (1)
Presentation12 130428221311-phpapp02 (1)
ARCHANA S
 
Presentation1 (2)
Presentation1 (2)Presentation1 (2)
Presentation1 (2)
Pooja Bidwai
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
Simeon Oriko
 
Blueprint ppt
Blueprint pptBlueprint ppt
Blueprint ppt
Maurice Valcourt
 
Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)
Sandeep Kumar Panda
 
Improved single image dehazing by fusion
Improved single image dehazing by fusionImproved single image dehazing by fusion
Improved single image dehazing by fusion
eSAT Publishing House
 
SOLAR POWER VAPOUR ABSORPTION REFRIGERATION SYSTEM
SOLAR POWER VAPOUR ABSORPTION REFRIGERATION SYSTEMSOLAR POWER VAPOUR ABSORPTION REFRIGERATION SYSTEM
SOLAR POWER VAPOUR ABSORPTION REFRIGERATION SYSTEM
aj12345ay
 
Under Water Image Enhancement by Fusion
Under Water Image Enhancement by FusionUnder Water Image Enhancement by Fusion
Under Water Image Enhancement by Fusion
IJMER
 
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherryIeee projects-in-pondicherry | 2015 ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherry
LeMeniz Infotech
 
State of the Word 2011
State of the Word 2011State of the Word 2011
State of the Word 2011
photomatt
 

Viewers also liked (14)

Mobi context a context aware cloud-based venue recommendation framework
Mobi context a context aware cloud-based venue recommendation frameworkMobi context a context aware cloud-based venue recommendation framework
Mobi context a context aware cloud-based venue recommendation framework
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 
Foundations for a Platform to Develop Context-Aware Systems by Domain Experts
Foundations for a Platform to Develop Context-Aware Systems by Domain ExpertsFoundations for a Platform to Develop Context-Aware Systems by Domain Experts
Foundations for a Platform to Develop Context-Aware Systems by Domain Experts
 
Infrared image enhancement using wavelet transform
Infrared image enhancement using wavelet transformInfrared image enhancement using wavelet transform
Infrared image enhancement using wavelet transform
 
Presentation12 130428221311-phpapp02 (1)
Presentation12 130428221311-phpapp02 (1)Presentation12 130428221311-phpapp02 (1)
Presentation12 130428221311-phpapp02 (1)
 
Presentation1 (2)
Presentation1 (2)Presentation1 (2)
Presentation1 (2)
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
Blueprint ppt
Blueprint pptBlueprint ppt
Blueprint ppt
 
Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)
 
Improved single image dehazing by fusion
Improved single image dehazing by fusionImproved single image dehazing by fusion
Improved single image dehazing by fusion
 
SOLAR POWER VAPOUR ABSORPTION REFRIGERATION SYSTEM
SOLAR POWER VAPOUR ABSORPTION REFRIGERATION SYSTEMSOLAR POWER VAPOUR ABSORPTION REFRIGERATION SYSTEM
SOLAR POWER VAPOUR ABSORPTION REFRIGERATION SYSTEM
 
Under Water Image Enhancement by Fusion
Under Water Image Enhancement by FusionUnder Water Image Enhancement by Fusion
Under Water Image Enhancement by Fusion
 
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherryIeee projects-in-pondicherry | 2015 ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherry
 
State of the Word 2011
State of the Word 2011State of the Word 2011
State of the Word 2011
 

Similar to friend book a semantic-based friend recommendation system for social networks

Friend Recommendation on Social Network Site Based on Their Life Style
Friend Recommendation on Social Network Site Based on Their Life StyleFriend Recommendation on Social Network Site Based on Their Life Style
Friend Recommendation on Social Network Site Based on Their Life Style
paperpublications3
 
Stabilization of Black Cotton Soil with Red Mud and Formulation of Linear Reg...
Stabilization of Black Cotton Soil with Red Mud and Formulation of Linear Reg...Stabilization of Black Cotton Soil with Red Mud and Formulation of Linear Reg...
Stabilization of Black Cotton Soil with Red Mud and Formulation of Linear Reg...
IRJET Journal
 
PROFILR : Toward Preserving Privacy and Functionality in Geosocial Networks
PROFILR : Toward Preserving Privacy and Functionality in Geosocial NetworksPROFILR : Toward Preserving Privacy and Functionality in Geosocial Networks
PROFILR : Toward Preserving Privacy and Functionality in Geosocial Networks
Amarnath Reddy
 
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
syeda yasmeen
 
Friendbook a semantic based friend recommendation system for social networks
Friendbook a semantic based friend recommendation system for social networksFriendbook a semantic based friend recommendation system for social networks
Friendbook a semantic based friend recommendation system for social networks
Shakas Technologies
 
IJSRED-V2I2P09
IJSRED-V2I2P09IJSRED-V2I2P09
IJSRED-V2I2P09
IJSRED
 
IRJET- Privacy Preserving Friend Matching
IRJET- Privacy Preserving Friend MatchingIRJET- Privacy Preserving Friend Matching
IRJET- Privacy Preserving Friend Matching
IRJET Journal
 
FIND MY VENUE: Content & Review Based Location Recommendation System
FIND MY VENUE: Content & Review Based Location Recommendation SystemFIND MY VENUE: Content & Review Based Location Recommendation System
FIND MY VENUE: Content & Review Based Location Recommendation System
IJTET Journal
 
Recommendation System Using Social Networking
Recommendation System Using Social Networking Recommendation System Using Social Networking
Recommendation System Using Social Networking
ijcseit
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
FRIEND SUGGESTION SYSTEM FOR THE SOCIAL NETWORK BASED ON USER BEHAVIOR
FRIEND SUGGESTION SYSTEM FOR THE SOCIAL NETWORK BASED ON USER BEHAVIORFRIEND SUGGESTION SYSTEM FOR THE SOCIAL NETWORK BASED ON USER BEHAVIOR
FRIEND SUGGESTION SYSTEM FOR THE SOCIAL NETWORK BASED ON USER BEHAVIOR
ijcseit
 
Scalable recommendation with social contextual information
Scalable recommendation with social contextual informationScalable recommendation with social contextual information
Scalable recommendation with social contextual information
eSAT Journals
 
Scalable recommendation with social contextual information
Scalable recommendation with social contextual informationScalable recommendation with social contextual information
Scalable recommendation with social contextual information
eSAT Journals
 
An Efficient Trust Evaluation using Fact-Finder Technique
An Efficient Trust Evaluation using Fact-Finder TechniqueAn Efficient Trust Evaluation using Fact-Finder Technique
An Efficient Trust Evaluation using Fact-Finder Technique
IJCSIS Research Publications
 
typicality-based collaborative filtering recommendation
typicality-based collaborative filtering recommendationtypicality-based collaborative filtering recommendation
typicality-based collaborative filtering recommendation
swathi78
 
Contextual model of recommending resources on an academic networking portal
Contextual model of recommending resources on an academic networking portalContextual model of recommending resources on an academic networking portal
Contextual model of recommending resources on an academic networking portal
csandit
 
CONTEXTUAL MODEL OF RECOMMENDING RESOURCES ON AN ACADEMIC NETWORKING PORTAL
CONTEXTUAL MODEL OF RECOMMENDING RESOURCES ON AN ACADEMIC NETWORKING PORTALCONTEXTUAL MODEL OF RECOMMENDING RESOURCES ON AN ACADEMIC NETWORKING PORTAL
CONTEXTUAL MODEL OF RECOMMENDING RESOURCES ON AN ACADEMIC NETWORKING PORTAL
cscpconf
 
Dynamic personalized recommendation on sparse data
Dynamic personalized recommendation on sparse dataDynamic personalized recommendation on sparse data
Dynamic personalized recommendation on sparse data
JPINFOTECH JAYAPRAKASH
 
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
1crore projects
 
A LOCATION-BASED RECOMMENDER SYSTEM FRAMEWORK TO IMPROVE ACCURACY IN USERBASE...
A LOCATION-BASED RECOMMENDER SYSTEM FRAMEWORK TO IMPROVE ACCURACY IN USERBASE...A LOCATION-BASED RECOMMENDER SYSTEM FRAMEWORK TO IMPROVE ACCURACY IN USERBASE...
A LOCATION-BASED RECOMMENDER SYSTEM FRAMEWORK TO IMPROVE ACCURACY IN USERBASE...
ijcsa
 

Similar to friend book a semantic-based friend recommendation system for social networks (20)

Friend Recommendation on Social Network Site Based on Their Life Style
Friend Recommendation on Social Network Site Based on Their Life StyleFriend Recommendation on Social Network Site Based on Their Life Style
Friend Recommendation on Social Network Site Based on Their Life Style
 
Stabilization of Black Cotton Soil with Red Mud and Formulation of Linear Reg...
Stabilization of Black Cotton Soil with Red Mud and Formulation of Linear Reg...Stabilization of Black Cotton Soil with Red Mud and Formulation of Linear Reg...
Stabilization of Black Cotton Soil with Red Mud and Formulation of Linear Reg...
 
PROFILR : Toward Preserving Privacy and Functionality in Geosocial Networks
PROFILR : Toward Preserving Privacy and Functionality in Geosocial NetworksPROFILR : Toward Preserving Privacy and Functionality in Geosocial Networks
PROFILR : Toward Preserving Privacy and Functionality in Geosocial Networks
 
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
 
Friendbook a semantic based friend recommendation system for social networks
Friendbook a semantic based friend recommendation system for social networksFriendbook a semantic based friend recommendation system for social networks
Friendbook a semantic based friend recommendation system for social networks
 
IJSRED-V2I2P09
IJSRED-V2I2P09IJSRED-V2I2P09
IJSRED-V2I2P09
 
IRJET- Privacy Preserving Friend Matching
IRJET- Privacy Preserving Friend MatchingIRJET- Privacy Preserving Friend Matching
IRJET- Privacy Preserving Friend Matching
 
FIND MY VENUE: Content & Review Based Location Recommendation System
FIND MY VENUE: Content & Review Based Location Recommendation SystemFIND MY VENUE: Content & Review Based Location Recommendation System
FIND MY VENUE: Content & Review Based Location Recommendation System
 
Recommendation System Using Social Networking
Recommendation System Using Social Networking Recommendation System Using Social Networking
Recommendation System Using Social Networking
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
FRIEND SUGGESTION SYSTEM FOR THE SOCIAL NETWORK BASED ON USER BEHAVIOR
FRIEND SUGGESTION SYSTEM FOR THE SOCIAL NETWORK BASED ON USER BEHAVIORFRIEND SUGGESTION SYSTEM FOR THE SOCIAL NETWORK BASED ON USER BEHAVIOR
FRIEND SUGGESTION SYSTEM FOR THE SOCIAL NETWORK BASED ON USER BEHAVIOR
 
Scalable recommendation with social contextual information
Scalable recommendation with social contextual informationScalable recommendation with social contextual information
Scalable recommendation with social contextual information
 
Scalable recommendation with social contextual information
Scalable recommendation with social contextual informationScalable recommendation with social contextual information
Scalable recommendation with social contextual information
 
An Efficient Trust Evaluation using Fact-Finder Technique
An Efficient Trust Evaluation using Fact-Finder TechniqueAn Efficient Trust Evaluation using Fact-Finder Technique
An Efficient Trust Evaluation using Fact-Finder Technique
 
typicality-based collaborative filtering recommendation
typicality-based collaborative filtering recommendationtypicality-based collaborative filtering recommendation
typicality-based collaborative filtering recommendation
 
Contextual model of recommending resources on an academic networking portal
Contextual model of recommending resources on an academic networking portalContextual model of recommending resources on an academic networking portal
Contextual model of recommending resources on an academic networking portal
 
CONTEXTUAL MODEL OF RECOMMENDING RESOURCES ON AN ACADEMIC NETWORKING PORTAL
CONTEXTUAL MODEL OF RECOMMENDING RESOURCES ON AN ACADEMIC NETWORKING PORTALCONTEXTUAL MODEL OF RECOMMENDING RESOURCES ON AN ACADEMIC NETWORKING PORTAL
CONTEXTUAL MODEL OF RECOMMENDING RESOURCES ON AN ACADEMIC NETWORKING PORTAL
 
Dynamic personalized recommendation on sparse data
Dynamic personalized recommendation on sparse dataDynamic personalized recommendation on sparse data
Dynamic personalized recommendation on sparse data
 
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
 
A LOCATION-BASED RECOMMENDER SYSTEM FRAMEWORK TO IMPROVE ACCURACY IN USERBASE...
A LOCATION-BASED RECOMMENDER SYSTEM FRAMEWORK TO IMPROVE ACCURACY IN USERBASE...A LOCATION-BASED RECOMMENDER SYSTEM FRAMEWORK TO IMPROVE ACCURACY IN USERBASE...
A LOCATION-BASED RECOMMENDER SYSTEM FRAMEWORK TO IMPROVE ACCURACY IN USERBASE...
 

More from swathi78

secure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasessecure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databases
swathi78
 
a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...
swathi78
 
web service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s informationweb service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s information
swathi78
 
privacy-enhanced web service composition
privacy-enhanced web service compositionprivacy-enhanced web service composition
privacy-enhanced web service composition
swathi78
 
optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...
swathi78
 
efficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingefficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computing
swathi78
 
cooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networkscooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networks
swathi78
 
an incentive framework for cellular traffic offloading
an incentive framework for cellular traffic offloadingan incentive framework for cellular traffic offloading
an incentive framework for cellular traffic offloading
swathi78
 
secure outsourced attribute-based signatures
secure outsourced attribute-based signaturessecure outsourced attribute-based signatures
secure outsourced attribute-based signatures
swathi78
 
traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...
swathi78
 
the design and evaluation of an information sharing system for human networks
the design and evaluation of an information sharing system for human networksthe design and evaluation of an information sharing system for human networks
the design and evaluation of an information sharing system for human networks
swathi78
 
the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...
swathi78
 
securing broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryptionsecuring broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryption
swathi78
 
rre a game-theoretic intrusion response and recovery engine
rre a game-theoretic intrusion response and recovery enginerre a game-theoretic intrusion response and recovery engine
rre a game-theoretic intrusion response and recovery engine
swathi78
 
on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...
swathi78
 
loca ward a security and privacy aware location-based rewarding system
loca ward a security and privacy aware location-based rewarding systemloca ward a security and privacy aware location-based rewarding system
loca ward a security and privacy aware location-based rewarding system
swathi78
 
exploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesexploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queries
swathi78
 
enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...
swathi78
 
secure data retrieval for decentralized disruption-tolerant military networks
secure data retrieval for decentralized disruption-tolerant military networkssecure data retrieval for decentralized disruption-tolerant military networks
secure data retrieval for decentralized disruption-tolerant military networks
swathi78
 
boundary cutting for packet classification
boundary cutting for packet classificationboundary cutting for packet classification
boundary cutting for packet classification
swathi78
 

More from swathi78 (20)

secure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasessecure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databases
 
a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...
 
web service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s informationweb service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s information
 
privacy-enhanced web service composition
privacy-enhanced web service compositionprivacy-enhanced web service composition
privacy-enhanced web service composition
 
optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...
 
efficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingefficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computing
 
cooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networkscooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networks
 
an incentive framework for cellular traffic offloading
an incentive framework for cellular traffic offloadingan incentive framework for cellular traffic offloading
an incentive framework for cellular traffic offloading
 
secure outsourced attribute-based signatures
secure outsourced attribute-based signaturessecure outsourced attribute-based signatures
secure outsourced attribute-based signatures
 
traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...
 
the design and evaluation of an information sharing system for human networks
the design and evaluation of an information sharing system for human networksthe design and evaluation of an information sharing system for human networks
the design and evaluation of an information sharing system for human networks
 
the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...
 
securing broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryptionsecuring broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryption
 
rre a game-theoretic intrusion response and recovery engine
rre a game-theoretic intrusion response and recovery enginerre a game-theoretic intrusion response and recovery engine
rre a game-theoretic intrusion response and recovery engine
 
on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...
 
loca ward a security and privacy aware location-based rewarding system
loca ward a security and privacy aware location-based rewarding systemloca ward a security and privacy aware location-based rewarding system
loca ward a security and privacy aware location-based rewarding system
 
exploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesexploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queries
 
enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...
 
secure data retrieval for decentralized disruption-tolerant military networks
secure data retrieval for decentralized disruption-tolerant military networkssecure data retrieval for decentralized disruption-tolerant military networks
secure data retrieval for decentralized disruption-tolerant military networks
 
boundary cutting for packet classification
boundary cutting for packet classificationboundary cutting for packet classification
boundary cutting for packet classification
 

Recently uploaded

FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdfFUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
EMERSON EDUARDO RODRIGUES
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
Atif Razi
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
upoux
 
Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...
pvpriya2
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
uqyfuc
 
UNIT-III- DATA CONVERTERS ANALOG TO DIGITAL CONVERTER
UNIT-III- DATA CONVERTERS ANALOG TO DIGITAL CONVERTERUNIT-III- DATA CONVERTERS ANALOG TO DIGITAL CONVERTER
UNIT-III- DATA CONVERTERS ANALOG TO DIGITAL CONVERTER
vmspraneeth
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
PreethaV16
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
Indrajeet sahu
 
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
b0754201
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
snaprevwdev
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
PreethaV16
 
Unit -II Spectroscopy - EC I B.Tech.pdf
Unit -II Spectroscopy - EC  I B.Tech.pdfUnit -II Spectroscopy - EC  I B.Tech.pdf
Unit -II Spectroscopy - EC I B.Tech.pdf
TeluguBadi
 
Impartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 StandardImpartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 Standard
MuhammadJazib15
 
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEERDELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
EMERSON EDUARDO RODRIGUES
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
Kamal Acharya
 
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
GiselleginaGloria
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
Kamal Acharya
 
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUESAN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
drshikhapandey2022
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 

Recently uploaded (20)

FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdfFUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
 
Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
UNIT-III- DATA CONVERTERS ANALOG TO DIGITAL CONVERTER
UNIT-III- DATA CONVERTERS ANALOG TO DIGITAL CONVERTERUNIT-III- DATA CONVERTERS ANALOG TO DIGITAL CONVERTER
UNIT-III- DATA CONVERTERS ANALOG TO DIGITAL CONVERTER
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
 
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
 
Unit -II Spectroscopy - EC I B.Tech.pdf
Unit -II Spectroscopy - EC  I B.Tech.pdfUnit -II Spectroscopy - EC  I B.Tech.pdf
Unit -II Spectroscopy - EC I B.Tech.pdf
 
Impartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 StandardImpartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 Standard
 
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEERDELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
 
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
 
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUESAN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 

friend book a semantic-based friend recommendation system for social networks

  • 1. Friend book A Semantic-based Friend Recommendation System for Social Networks Friend book A Semantic-based Friend Recommendation System for Social Networks Existing social networking services recommend friends to users based on their social graphs, which may not be the most appropriate to reflect a user’s preferences on friend selection in real life. In this paper, we present Friendbook, a novel semantic-based friend recommendation system for social networks, which recommends friends to users based on their life styles instead of social graphs. By taking advantage of sensor-rich smartphones, Friendbook discovers life styles of users from user-centric sensor data, measures the similarity of life styles between users, and recommends friends to users if their life styles have high similarity. Inspired by text mining, we model a user’s daily life as life documents, from which his/her life styles are extracted by using the Latent Dirichlet Allocation algorithm. We further propose a similarity metric to meas ure the similarity of life styles between users, and calculate users’ impact in terms of life styles with a friend-matching graph. Upon receiving a request, Friendbook returns a list of people with highest recommendation scores to the query user. Finally, Friendbook integrates a feedback mechanism to further improve the recommendation accuracy. We have implemented Friendbook on the Android-based smartphones, and evaluated its performance on both small-scale experiments and large-scale simulations. The results show that the recommendations accurately reflect the preferences of users in choosing friends. Most of the friend suggestions mechanism relies on pre-existing user relationships to pick friend candidates. For example, Facebook relies on a social link analysis among those who already share common friends and recommends symmetrical users as potential friends. The rules to group people together include: Contact: 9703109334, 9533694296 ABSTRACT: EXISTING SYSTEM: 1) Habits or life style 2) Attitudes Email id: academicliveprojects@gmail.com, www.logicsystems.org.in 3) Tastes
  • 2. Friend book A Semantic-based Friend Recommendation System for Social Networks 6) People they already know. Apparently, rule #3 and rule #6 are the mainstream factors considered by existing recommendation systems. DISADVANTAGES OF EXISTING SYSTEM:  Existing social networking services recommend friends to users based on their social graphs, which may not be the most appropriate to reflect a user’s preferences on friend selection in real life  A novel semantic-based friend recommendation system for social networks, which recommends friends to users based on their life styles instead of social graphs.  By taking advantage of sensor-rich smartphones, Friendbook discovers life styles of users from user-centric sensor data, measures the similarity of life styles between users, and recommends friends to users if their life styles have high similarity.  We model a user’s daily life as life documents, from which his/her life styles are extracted by using the Latent Dirichlet Allocation algorithm.  Similarity metric to measure the similarity of life styles between users, and calculate Contact: 9703109334, 9533694296 4) Moral standards 5) Economic level; and PROPOSED SYSTEM: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in users’  Impact in terms of life styles with a friend-matching graph.  We integrate a linear feedback mechanism that exploits the user’s feedback to improve recommendation accuracy. ADVANTAGES OF PROPOSED SYSTEM:  Recommendeds potential friends to users if they share similar life styles.
  • 3. Friend book A Semantic-based Friend Recommendation System for Social Networks  The feedback mechanism allows us to measure the satisfaction of users, by providing a user interface that allows the user to rate the friend list SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL Zhibo Wang, Jilong Liao, Qing Cao, Hairong Qi, and Zhi Wang, “Friendbook: A Semantic-based Friend Recommendation System for Social Networks ”, IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014 Contact: 9703109334, 9533694296 REFERENCE: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in