JPJ1442 SOS: A Distributed Mobile Q&A System Based on Social Networkschennaijp
We are good IEEE java projects development center in Chennai and Pondicherry. We guided advanced java technologies projects of cloud computing, data mining, Secure Computing, Networking, Parallel & Distributed Systems, Mobile Computing and Service Computing (Web Service).
For More Details:
http://jpinfotech.org/final-year-ieee-projects/2014-ieee-projects/java-projects/
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...syeda yasmeen
The document proposes new private matching protocols for online social networks that leverage community structures and define an asymmetric social proximity measure. It aims to address privacy issues with existing profile matching approaches. Three protocols with different privacy levels are designed based on the proposed proximity measure. The protocols protect user privacy better than previous works through considering a user's and their friends' perceptions of common communities between users. Analysis shows the protocols have lower computation and communication costs than existing solutions.
Stanford Info Seminar: Unfollowing and Emotion on Twittermor
This document summarizes two studies on social dynamics on Twitter. The first study examines the relationship between a user's expression of emotion in tweets and their social network characteristics like number of followers and network density. The second study analyzes what network structure properties like reciprocity and common connections predict whether users will unfollow each other on Twitter. Both studies analyzed data from over 100,000 tweets to understand social information sharing and tie persistence on Twitter.
This document summarizes a research paper about factors that predict whether users will unfollow other users on Twitter. The researchers analyzed structural properties of 911 Twitter users' social networks, such as number of followers, reciprocity of follows, and common connections. They found that reciprocity, network density, prestige ratio, follow-back rate, and number of common neighbors strongly predicted whether ties would be broken through unfollowing. The paper provides more detailed analysis using multi-level logistic regression to model how network structure impacts breaking ties on Twitter.
Social networking on internet is becoming very popular day to day.
Everyday people are connecting themselves with those websites.
It is now a great media of communication and interaction as well as socialization.
The document summarizes three key topics in mobile social networks (MSNs):
1) Profile matching protocols that allow two users to compare profiles without disclosing them by using techniques like k-anonymity and multiple pseudonyms.
2) Cooperative data forwarding strategies that enable privacy-preserving sharing of data between friends using proximity measurements and social behaviors.
3) Recommendation-based trustworthy service evaluation systems that generate structured reviews to evaluate local services while preserving user privacy through techniques like token generation and review submission.
JPJ1442 SOS: A Distributed Mobile Q&A System Based on Social Networkschennaijp
We are good IEEE java projects development center in Chennai and Pondicherry. We guided advanced java technologies projects of cloud computing, data mining, Secure Computing, Networking, Parallel & Distributed Systems, Mobile Computing and Service Computing (Web Service).
For More Details:
http://jpinfotech.org/final-year-ieee-projects/2014-ieee-projects/java-projects/
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...syeda yasmeen
The document proposes new private matching protocols for online social networks that leverage community structures and define an asymmetric social proximity measure. It aims to address privacy issues with existing profile matching approaches. Three protocols with different privacy levels are designed based on the proposed proximity measure. The protocols protect user privacy better than previous works through considering a user's and their friends' perceptions of common communities between users. Analysis shows the protocols have lower computation and communication costs than existing solutions.
Stanford Info Seminar: Unfollowing and Emotion on Twittermor
This document summarizes two studies on social dynamics on Twitter. The first study examines the relationship between a user's expression of emotion in tweets and their social network characteristics like number of followers and network density. The second study analyzes what network structure properties like reciprocity and common connections predict whether users will unfollow each other on Twitter. Both studies analyzed data from over 100,000 tweets to understand social information sharing and tie persistence on Twitter.
This document summarizes a research paper about factors that predict whether users will unfollow other users on Twitter. The researchers analyzed structural properties of 911 Twitter users' social networks, such as number of followers, reciprocity of follows, and common connections. They found that reciprocity, network density, prestige ratio, follow-back rate, and number of common neighbors strongly predicted whether ties would be broken through unfollowing. The paper provides more detailed analysis using multi-level logistic regression to model how network structure impacts breaking ties on Twitter.
Social networking on internet is becoming very popular day to day.
Everyday people are connecting themselves with those websites.
It is now a great media of communication and interaction as well as socialization.
The document summarizes three key topics in mobile social networks (MSNs):
1) Profile matching protocols that allow two users to compare profiles without disclosing them by using techniques like k-anonymity and multiple pseudonyms.
2) Cooperative data forwarding strategies that enable privacy-preserving sharing of data between friends using proximity measurements and social behaviors.
3) Recommendation-based trustworthy service evaluation systems that generate structured reviews to evaluate local services while preserving user privacy through techniques like token generation and review submission.
Friendbook a semantic based friend recommendation system for social networksPapitha Velumani
This document describes Friendbook, a semantic-based friend recommendation system that analyzes users' lifestyle data collected from sensors in smartphones to recommend potential friends. It aims to address limitations of existing social networks that rely only on users' social graphs. Friendbook uses topic modeling to extract lifestyle information from daily sensor data and measures similarity between users' lifestyles to identify likely friend candidates. The system was implemented on Android smartphones and evaluated through experiments.
Existing social network services provide list of friends to users based on their request given. But it will not fulfil the user’s preferences in real life. Due to overloaded memory of the server memory size increases and lacking its efficiency. By implementing the Latent Dirichlet Allocation Algorithm we extracting their lifestyles and sensing the similarity of lifestyles between users by using embedded sensors in the smartphones. Based on friend matching graphs we return a list of people with highest similarity of lifestyles. Feedback mechanism is integrated in this friendbook to get the results of users in choosing friends. We have implemented friendbook on the Android-based smartphones and evaluated its performance on both small scale experiments and large scale simulations. Finally, we reduce the memory size of the server and improving its performance.
This document provides an overview of social network analysis, including key concepts, analytic techniques, and examples of classic studies. It discusses the basic components of social networks like actors, ties, and relationships. It also describes different types of networks and measures used in social network analysis, such as degree centrality and betweenness centrality. Finally, it highlights some influential early social network analysis studies and resources for further information.
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
This document discusses social network analysis (SNA), a tool used to analyze social relationships and networks. SNA elicits, analyzes, and visualizes how actors interact and resources move through a network. It represents actors as nodes and their relationships as ties. The document provides examples of SNA's application in education, health, and agriculture. It outlines the process of conducting SNA through workshops or surveys to collect node attribute and tie/link data, which is then analyzed using software to visualize the network. The document suggests opportunities to further develop SNA, such as presenting networks back to communities and measuring social capital.
Graph theory concepts like centrality, clustering, and node-edge diagrams are used to analyze social networks. Visualization techniques include matrix representations and node-link diagrams, each with advantages. Hybrid representations combine these to leverage their strengths. MatrixExplorer allows interactive exploration of social networks using both matrix and node-link views.
Mining and analyzing social media part 2 - hicss47 tutorial - dave kingDave King
This document provides an overview and introduction to social network analysis metrics and techniques for analyzing social media data. It discusses common social network analysis concepts like degrees of separation, centrality measures to identify influential users, and cohesion measures to understand how well connected a network is. It also presents examples analyzing Facebook networks and techniques for identifying cohesive subgroups within large social networks. The document demonstrates how social network analysis can be used to systematically study relationships and information flow within social systems.
This document summarizes a lecture on social information retrieval. It discusses social search, which takes social networks into account. One study examined questions people ask their social networks on Facebook and Twitter. It found questions were short, directed to "anyone", and about acceptable topics like relationships. Fast responses were considered helpful. Centrality measures like degree, closeness, and betweenness are used to determine important nodes in social networks. Strong and weak ties play different roles in information diffusion. Tie strength can be estimated using topology, neighborhood overlap, and profile/interaction data.
This document discusses using trust and provenance for content filtering on the semantic web. It describes how trust can be inferred between individuals in social networks and how that trust information can be used to filter and recommend content. Applications mentioned include using trust ratings to help intelligence analysts sort through information by identifying reliable sources.
The document discusses a study that examines the correlation between actor centrality in social networks and their ability to coordinate projects. It outlines the research framework, which involves extracting coordination-related phrases from emails, calculating coordination scores bounded by project scopes, constructing social network matrices using centrality measures, and testing the association between centrality and coordination. Preliminary results on the Enron email network from 1997-2002 are presented. The methodology involves text mining the Enron dataset to calculate coordination scores and social network centrality metrics like degree, closeness, and betweenness centrality.
Friendbook a semantic based friend recommendation system for social networksLeMeniz Infotech
The document proposes Friendbook, a semantic-based friend recommendation system that recommends friends based on users' lifestyles rather than social graphs. It uses sensor data from smartphones to discover users' lifestyles and measure lifestyle similarity between users. Unlike existing systems that rely on social graphs, Friendbook more accurately reflects real-life friend preferences. It models daily life as documents, extracts lifestyles using LDA, calculates similarity and impact with a friend-matching graph, and returns highest recommendation scores. Small experiments and large simulations showed recommendations match user friend preferences.
interacting with social media content about eventsmor
This document discusses research into creating new experiences for consuming social media content about events. It describes three systems created: Vox Civitas for journalistic inquiry into events using Twitter data, Multiplayer for organizing YouTube videos from live events, and an evaluation of social multimedia experiences. Evaluations of Vox Civitas and Multiplayer provided insights into how journalists and users interact with such systems and tasks they support. The research aims to understand user interactions beyond a specific implementation and produce generalizable insights.
Social network analysis for modeling & tuning social media websiteEdward B. Rockower
Social Network Analysis of a Professional Online Social Media Collaboration Community. Tuning and optimizing based on observed social network dynamics and user behavior.
Social Network Analysis and Partnerships SNA presentation Guevara 2015Sophia Guevara
Social network analysis (SNA) is a methodology for studying relationships and how individuals fit within networks. SNA can help funders achieve better impact through relationships by identifying opportunities, potential obstacles, and influential individuals. Examples show how foundations have used SNA to scale impact, understand grant outcomes, and inform future funding. SNA software like NodeXL and Gephi allow users to analyze and visualize their networks from professional sites like LinkedIn to understand network density, hierarchy, and connections. Resources are provided for continuing SNA learning.
The document discusses key concepts related to social networks and social networking sites. It defines social networks as networks formed by social ties that can be both personal networks and community networks. Social networking involves using one's social networks, often for professional advantage, and is supported by social networking sites. Social networking sites are primarily designed for managing personal social networks and making social ties explicit. The document also discusses issues like privacy, data ownership, and the structure and management of social networks and ties on social media platforms.
12 Network Experiments and Interventions: Studying Information Diffusion and ...dnac
This document summarizes research on studying information diffusion and collective action through network experiments and interventions. The research aims to identify optimal strategies for information dissemination for public policy by comparing the effectiveness of different dissemination methods, including using phone/IVR, government representatives, and social network seeds. It also examines how an individual's decision to participate is influenced by information and participation within their social network, and whether there are threshold or free-riding effects. The proposed experiments will randomize information dissemination methods and incentives for individuals and networks to participate in community activities across villages in India. Network and individual participation data will be collected through surveys to analyze the impact of social networks and information on collective action.
seminar on To block unwanted messages _from osnShailesh kumar
The document summarizes a seminar on blocking unwanted messages from online social networks. It discusses the need for filtering spam, phishing, and malware attacks on social media. It proposes a filtered wall architecture, which is a three-tier structure consisting of a social network manager, social network application, and graphical user interface. The social network application includes content-based and short text classification to categorize messages. Filtering rules and blacklists are used to filter unwanted messages on the graphical user interface's filtered wall. The system aims to improve filtering of undesirable content from users' social media walls.
Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...IIIT Hyderabad
This document discusses research on detecting distracted driving content posted on social media platforms. It presents several research questions around understanding the extent of distracted driving posts, how it varies by user demographics, location, and time. It describes collecting a dataset of Snapchat posts and developing classifiers to identify distracted driving images and videos with over 90% accuracy. Key findings include some demographics and times of day having higher rates of distracted driving posts. The research aims to help inform interventions to reduce distracted driving.
Presentation topic is DECISION MAKING UNDER UNCERTAINTY and two criteria are shown - MAXI MAXI and MAXI MIN. This PPT is useful for 2nd year students of BBA or BBM course
Friendbook a semantic based friend recommendation system for social networksPapitha Velumani
This document describes Friendbook, a semantic-based friend recommendation system that analyzes users' lifestyle data collected from sensors in smartphones to recommend potential friends. It aims to address limitations of existing social networks that rely only on users' social graphs. Friendbook uses topic modeling to extract lifestyle information from daily sensor data and measures similarity between users' lifestyles to identify likely friend candidates. The system was implemented on Android smartphones and evaluated through experiments.
Existing social network services provide list of friends to users based on their request given. But it will not fulfil the user’s preferences in real life. Due to overloaded memory of the server memory size increases and lacking its efficiency. By implementing the Latent Dirichlet Allocation Algorithm we extracting their lifestyles and sensing the similarity of lifestyles between users by using embedded sensors in the smartphones. Based on friend matching graphs we return a list of people with highest similarity of lifestyles. Feedback mechanism is integrated in this friendbook to get the results of users in choosing friends. We have implemented friendbook on the Android-based smartphones and evaluated its performance on both small scale experiments and large scale simulations. Finally, we reduce the memory size of the server and improving its performance.
This document provides an overview of social network analysis, including key concepts, analytic techniques, and examples of classic studies. It discusses the basic components of social networks like actors, ties, and relationships. It also describes different types of networks and measures used in social network analysis, such as degree centrality and betweenness centrality. Finally, it highlights some influential early social network analysis studies and resources for further information.
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
This document discusses social network analysis (SNA), a tool used to analyze social relationships and networks. SNA elicits, analyzes, and visualizes how actors interact and resources move through a network. It represents actors as nodes and their relationships as ties. The document provides examples of SNA's application in education, health, and agriculture. It outlines the process of conducting SNA through workshops or surveys to collect node attribute and tie/link data, which is then analyzed using software to visualize the network. The document suggests opportunities to further develop SNA, such as presenting networks back to communities and measuring social capital.
Graph theory concepts like centrality, clustering, and node-edge diagrams are used to analyze social networks. Visualization techniques include matrix representations and node-link diagrams, each with advantages. Hybrid representations combine these to leverage their strengths. MatrixExplorer allows interactive exploration of social networks using both matrix and node-link views.
Mining and analyzing social media part 2 - hicss47 tutorial - dave kingDave King
This document provides an overview and introduction to social network analysis metrics and techniques for analyzing social media data. It discusses common social network analysis concepts like degrees of separation, centrality measures to identify influential users, and cohesion measures to understand how well connected a network is. It also presents examples analyzing Facebook networks and techniques for identifying cohesive subgroups within large social networks. The document demonstrates how social network analysis can be used to systematically study relationships and information flow within social systems.
This document summarizes a lecture on social information retrieval. It discusses social search, which takes social networks into account. One study examined questions people ask their social networks on Facebook and Twitter. It found questions were short, directed to "anyone", and about acceptable topics like relationships. Fast responses were considered helpful. Centrality measures like degree, closeness, and betweenness are used to determine important nodes in social networks. Strong and weak ties play different roles in information diffusion. Tie strength can be estimated using topology, neighborhood overlap, and profile/interaction data.
This document discusses using trust and provenance for content filtering on the semantic web. It describes how trust can be inferred between individuals in social networks and how that trust information can be used to filter and recommend content. Applications mentioned include using trust ratings to help intelligence analysts sort through information by identifying reliable sources.
The document discusses a study that examines the correlation between actor centrality in social networks and their ability to coordinate projects. It outlines the research framework, which involves extracting coordination-related phrases from emails, calculating coordination scores bounded by project scopes, constructing social network matrices using centrality measures, and testing the association between centrality and coordination. Preliminary results on the Enron email network from 1997-2002 are presented. The methodology involves text mining the Enron dataset to calculate coordination scores and social network centrality metrics like degree, closeness, and betweenness centrality.
Friendbook a semantic based friend recommendation system for social networksLeMeniz Infotech
The document proposes Friendbook, a semantic-based friend recommendation system that recommends friends based on users' lifestyles rather than social graphs. It uses sensor data from smartphones to discover users' lifestyles and measure lifestyle similarity between users. Unlike existing systems that rely on social graphs, Friendbook more accurately reflects real-life friend preferences. It models daily life as documents, extracts lifestyles using LDA, calculates similarity and impact with a friend-matching graph, and returns highest recommendation scores. Small experiments and large simulations showed recommendations match user friend preferences.
interacting with social media content about eventsmor
This document discusses research into creating new experiences for consuming social media content about events. It describes three systems created: Vox Civitas for journalistic inquiry into events using Twitter data, Multiplayer for organizing YouTube videos from live events, and an evaluation of social multimedia experiences. Evaluations of Vox Civitas and Multiplayer provided insights into how journalists and users interact with such systems and tasks they support. The research aims to understand user interactions beyond a specific implementation and produce generalizable insights.
Social network analysis for modeling & tuning social media websiteEdward B. Rockower
Social Network Analysis of a Professional Online Social Media Collaboration Community. Tuning and optimizing based on observed social network dynamics and user behavior.
Social Network Analysis and Partnerships SNA presentation Guevara 2015Sophia Guevara
Social network analysis (SNA) is a methodology for studying relationships and how individuals fit within networks. SNA can help funders achieve better impact through relationships by identifying opportunities, potential obstacles, and influential individuals. Examples show how foundations have used SNA to scale impact, understand grant outcomes, and inform future funding. SNA software like NodeXL and Gephi allow users to analyze and visualize their networks from professional sites like LinkedIn to understand network density, hierarchy, and connections. Resources are provided for continuing SNA learning.
The document discusses key concepts related to social networks and social networking sites. It defines social networks as networks formed by social ties that can be both personal networks and community networks. Social networking involves using one's social networks, often for professional advantage, and is supported by social networking sites. Social networking sites are primarily designed for managing personal social networks and making social ties explicit. The document also discusses issues like privacy, data ownership, and the structure and management of social networks and ties on social media platforms.
12 Network Experiments and Interventions: Studying Information Diffusion and ...dnac
This document summarizes research on studying information diffusion and collective action through network experiments and interventions. The research aims to identify optimal strategies for information dissemination for public policy by comparing the effectiveness of different dissemination methods, including using phone/IVR, government representatives, and social network seeds. It also examines how an individual's decision to participate is influenced by information and participation within their social network, and whether there are threshold or free-riding effects. The proposed experiments will randomize information dissemination methods and incentives for individuals and networks to participate in community activities across villages in India. Network and individual participation data will be collected through surveys to analyze the impact of social networks and information on collective action.
seminar on To block unwanted messages _from osnShailesh kumar
The document summarizes a seminar on blocking unwanted messages from online social networks. It discusses the need for filtering spam, phishing, and malware attacks on social media. It proposes a filtered wall architecture, which is a three-tier structure consisting of a social network manager, social network application, and graphical user interface. The social network application includes content-based and short text classification to categorize messages. Filtering rules and blacklists are used to filter unwanted messages on the graphical user interface's filtered wall. The system aims to improve filtering of undesirable content from users' social media walls.
Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...IIIT Hyderabad
This document discusses research on detecting distracted driving content posted on social media platforms. It presents several research questions around understanding the extent of distracted driving posts, how it varies by user demographics, location, and time. It describes collecting a dataset of Snapchat posts and developing classifiers to identify distracted driving images and videos with over 90% accuracy. Key findings include some demographics and times of day having higher rates of distracted driving posts. The research aims to help inform interventions to reduce distracted driving.
Presentation topic is DECISION MAKING UNDER UNCERTAINTY and two criteria are shown - MAXI MAXI and MAXI MIN. This PPT is useful for 2nd year students of BBA or BBM course
This paper proposes a K-Main Routes (KMR) approach to summarize spatial network activity. KMR discovers the k shortest paths to cluster activities, generalizing the K-means clustering algorithm for network data. KMR uses network Voronoi diagrams, divide-and-conquer strategies, and pruning to improve performance for applications involving observations along paths in a network, such as locations of pedestrian fatalities. The paper also discusses existing methods like MSGF that can cluster multiple paths, single paths, or no paths, and how KMR aims to improve upon these methods.
This presentation is about Indian Financial System. It includes introduction about financial system and then it includes classification of financial market.
This is a presentation on Britannia Company for Marketing Project.
This includes:
Britannia Introduction
Britannia LOGO
Britannia tagline
Britannia Products
Britannia Purpose
Britannia Market Share
Britannia Brand Ambassadors
Britannia Competitors
This ppt can be useful for BBA - 2nd year student - Marketing Subject.
This presentation is about The one minute manager novel. Topics covered are - Why i have chosen this book, about the authors, Introduction, two types of managers, secrets of one - minute manager, 1st secret, benefits of 1st secret, the one minute goal works well when, 2nd secret, benefits, the one minute praising works well when, 3rd secret, benefits, the one minute reprimand works well when, game plan, conclusion
This presentation is for Web designing students. Presentation Topic is HTML - 5 Introduction. This includes History of HTML, What is HTML 5, Goals of HTML 5, Difference between HTML 4 and HTML 5, Semantic Elements, HTML 5 New Inputs, Other new features, Key features of HTML 5 depicted by 2 pictures, HTML 5 web storage - Local storage and session storage, tags that are not supported in HTML 5.
This presentation is on Johnson Johnson company for marketing students of BBA 4th semester. Presentation is on Promotional tools used by Johnson Johnson.
This document outlines the key topics and activities to be covered in a marketing class, including an introduction to the marketing mix and its four Ps (product, price, place, promotion). Students will analyze products and pricing strategies, explore distribution channels, and develop a promotional mix. They will also create a marketing mix for a selected product, targeting a specific customer group and justifying their choices. The lesson aims to help students understand and apply the key elements of developing an effective marketing strategy.
This Presentation is for 2nd year - 4th semester - B.COM Hons. students for Business Management subject. This ppt includes Introduction of Vedanta Resources PLC and CSR activities of Vedanta Resources PLC.
This presentation is for Grade 9 student .
this is about how modern farming methods help in increasing the total production
This presentation is for economics .
It includes :
1) preface
2) acknowledgement
3)what is agriculture
4)Introduction
5)definition of modern farming
6)About modern farming
7)Methods
8)Why it is important
9)Modern agriculture revolution
10)difference between traditional and commercial agriculture
11)Advantages
12)Disadvantages
13)How to overcome to it by sustainable agriculture.
This presentation is about FEDEX courier services for MBA student 1st year for Organisational Behavior subject. This is about organisational change in FEDEX company and its competitors
This is a presentation on market structure - topic of Economics -
It includes:
What is Market?
What is market structure?
Characteristics of Market
Classification of Market
1)Area or region
2)Time
3)Functions
4)nature of Commodity
5)Legality
Types of Market structure
characteristics of all market structures
This can be useful for BBA student of 1st year.
Sos a distributed mobile q&a system based on social networksPapitha Velumani
SOS is a distributed mobile question and answer system based on social networks that leverages lightweight knowledge engineering techniques. It enables mobile users to forward questions to potential answerers in their friend lists in a decentralized manner for a number of hops before resorting to a server. This reduces costs compared to centralized systems by avoiding high server loads and bandwidth usage. The system was tested through simulation and deployment at Clemson University, showing high query precision and response times with low overhead.
A Novel Frame Work System Used In Mobile with Cloud Based Environmentpaperpublications3
Abstract: Recent era efforts have been taken in the field of social based Question and Answer (Q&A) which is used to search the answers for the non – factorial questions. But traditional search engines like Google, Bing is used to answer only for the factorial questions where we can get direct answer from the data base servers. The web search engine for the (Q&A) system does not dependent on the broadcasting methods and centralized server for identifying friends on the social network. The problem is recovered by using mobile Q&A system in that mobile nodes are help full for accessing internet because these techniques are used to generate low node overload, higher server bandwidth cost and highest cost of mobile internet access. Lately technical experts proposed a new method called Distributed Social – Based Mobile Q&A system (SOS) which makes very faster and quicker responses to the asker. SOS enables the mobile user’s to forward the question in the decentralized manner in order get effective, capable, and potential answers from the users. SOS is the light weighted knowledge engineering technique which is used find correct person who ready and willing to answer questions hence this type of search are used reduce searching time and computational cost of the mobile nodes. In this paper we proposed a new method called mobile Q&A system in the cloud based environment through which the data has been as been transmitted form cloud server to the centralized server at any time.
This document discusses enabling efficient data queries in Mobile Ad-hoc SOcial Networks (MASONs). MASONs allow users with shared interests to connect via Bluetooth or WiFi to query localized data from each other's devices. The challenges of opportunistic connectivity, distributed storage, and unknown expertise are addressed. A centralized optimization model is proposed to minimize communication costs while supporting query rates within delay budgets. A distributed query protocol uses "reachable expertise" routing and controlled redundancy to improve query delivery rates. The protocol's feasibility and efficiency are evaluated through a testbed and simulations.
efficient data query in intermittently-connected mobile ad hoc social networksswathi78
This document discusses efficient data query in intermittently connected mobile ad hoc social networks (MASONs). It proposes a centralized optimization model and distributed data query protocol to address challenges like opportunistic connectivity and unknown data providers. A testbed experiment using 25 tablets for 15 days demonstrated feasibility and efficiency. Simulations under various network settings provided additional performance insights not possible through lab experiments alone. The goal is to determine an optimal transmission strategy that supports the desired query rate within a delay budget while minimizing communication costs.
A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERSijait
Peer-to-peer systems have recently a remarkable success in the social, academic, and commercial communities. A fundamental problem in Peer-to-Peer systems is how to efficiently locate appropriate peers to answer a specific query (Query Routing Problem). A lot of approaches have been carried out to enhance search result quality as well as to reduce network overhead. Recently, researches focus on methods based on query-oriented routing indices. These methods utilize the historical information of past queries and query hits to build a local knowledge base per peer, which represents the user's interests or profile. When a peer forwards a given query, it evaluates the query against its local knowledge base in order to select a set of relevant peers to whom the query will be routed. Usually, an insufficient number of relevant peers is selected from the current peer's local knowledge base thus a broadcast search is investigated which badly affects the approach efficiency. To tackle this problem, we introduce a novel method that clusters peers having similar interests. It exploits not only the current peer's knowledge base but also that of the others in
the cluster to extract relevant peers. We implemented the proposed approach, and tested (i) its retrieval effectiveness in terms of recall and precision, (ii) its search cost in terms of messages traffic and visited peers number. Experimental results show that our approach improves the recall and precision metrics while reducing dramatically messages traffic.
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...IRJET Journal
1) The document proposes a new encryption scheme called Order-Retrievable Encryption (ORE) to protect user location privacy in location-based social networks.
2) ORE allows users to share their exact locations with friends without leaking location information to outside parties. It also enables efficient location queries with low computational and communication costs.
3) An experimental evaluation shows that the proposed privacy-preserving location sharing system using ORE has much lower computational and communication overhead compared to existing solutions.
First presented at Future of Digital Identity, British Library, 7 Jan 2010. Updated for presentation at Privacy and the Law Conference, London, 1 Dec 2010, and for an OxPILS seminar at Balliol College, 23 May 2012.
JPD1435 Preserving Location Privacy in Geosocial Applicationschennaijp
We have best 2014 free dot not projects topics are available along with all document, you can easy to find out number of documents for various projects titles.
For More Details:
http://jpinfotech.org/final-year-ieee-projects/2014-ieee-projects/dot-net-projects/
Travel Recommendation Approach using Collaboration Filter in Social NetworkingIRJET Journal
This document discusses a travel recommendation approach using collaboration filtering in social networks. It proposes personalized travel sequence recommendations based on travelogues and community photos posted on social media. Unlike other travel recommendation systems, it recommends a sequence of points of interest rather than individual locations. It maps user preferences and route descriptions to topic categories to calculate similarity and recommend routes. The system was evaluated on a dataset of over 7 million Flickr photos and 24,000 travelogues covering 864 travel locations in 9 cities.
Friendbook a semantic based friend recommendation system for social networksShakas Technologies
Existing social networking services recommend friends to users based on their social graphs, which may not be the most appropriate to reflect a user’s preferences on friend selection in real life. In this paper, we present Friend book, a novel semantic based friend recommendation system for social networks, which recommends friends to users based on their life styles instead of social graphs.
Privacy preserving location sharing services for social networks(1)Kamal Spring
A common functionality of many location-based social networking applications is a location sharing service that allows a group of friends to share their locations. With a potentially un-trusted server, such a location sharing service may threaten the privacy of users. Existing solutions for Privacy-Preserving Location Sharing Services (PPLSS) require a trusted third party that has access to the exact location of all users in the system or rely on expensive algorithms or protocols in terms of computational or communication overhead. Other solutions can only provide approximate query answers. To overcome these limitations, we propose a new encryption notion, called Order-Retrievable Encryption (ORE), for PPLSS for social networking applications. The distinguishing characteristics of our PPLSS are that it allows a group of friends to share their exact locations without the need of any third party or leaking any location information to any server or users outside the group, achieves low computational and communication cost by allowing users to receive the exact location of their friends without requiring any direct communication between users or multiple rounds of communication between a user and a server, provides efficient query processing by designing an index structure for our ORE scheme, supports dynamic location updates, and provides personalized privacy protection within a group of friends by specifying a maximum distance where a user is willing to be located by his/her friends. Experimental results show that the computational and communication cost of our PPLSS is much better than the state-of-the-art solution.
Privacy preserving location sharing services for social networks(1)Kamal Spring
A common functionality of many location-based social networking applications is a location sharing service that allows a group of friends to share their locations. With a potentially un-trusted server, such a location sharing service may threaten the privacy of users. Existing solutions for Privacy-Preserving Location Sharing Services (PPLSS) require a trusted third party that has access to the exact location of all users in the system or rely on expensive algorithms or protocols in terms of computational or communication overhead. Other solutions can only provide approximate query answers. To overcome these limitations, we propose a new encryption notion, called Order-Retrievable Encryption (ORE), for PPLSS for social networking applications. The distinguishing characteristics of our PPLSS are that it allows a group of friends to share their exact locations without the need of any third party or leaking any location information to any server or users outside the group, achieves low computational and communication cost by allowing users to receive the exact location of their friends without requiring any direct communication between users or multiple rounds of communication between a user and a server, provides efficient query processing by designing an index structure for our ORE scheme, supports dynamic location updates, and provides personalized privacy protection within a group of friends by specifying a maximum distance where a user is willing to be located by his/her friends. Experimental results show that the computational and communication cost of our PPLSS is much better than the state-of-the-art solution.
Service rating prediction by exploring social mobile users’ geographical loca...CloudTechnologies
Service rating prediction by exploring social mobile users’ geographical locations M-Tech IEEE 2017 Projects B-Tech Major Projects B-tech Main Projects Data mining Project
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...IEEEMEMTECHSTUDENTPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Social Network Analysis based on MOOC's (Massive Open Online Classes)ShankarPrasaadRajama
Collected data by conducting a survey about MOOC among fellow classmates and created edge lists of students and their skills and students and MOOC websites they do courses using Python from the survey data.
Performed visualization of student network in UCINET and found out the densities among clusters in the network.
Performed hypothesis testing to see whether characteristic of a student affects their position(centrality) in the network.
This document proposes a user-centric approach called MobiCrowd to improve location privacy in location-based services. MobiCrowd allows mobile users to collaborate by storing each other's location information and responding to queries, hiding users from the location server unless no collaborative peers have the requested information. An epidemic model is developed to analyze how parameters like query rates and data lifetime affect privacy. Results show MobiCrowd hides a high fraction of queries, significantly enhancing privacy, and implementation shows it is lightweight with negligible collaboration costs.
Need a project proposal for my computer science 3 course. I dont eve.pdfaristogifts99
Need a project proposal for my computer science 3 course. I dont even know where to start.
Need a unique program proposal as well as the program itself with all header files,
implementation files, and source files. Also need it commented.
In the proposal, describe what you intend to do for your project in terms of:
-general description of the problem you will be solving
-itemized list of use cases
-list of parameters that will be part of the user interface
-what structures and algorithms will you be using
Your proposal should be submitted as a Word document giving your name, project title and four
sections for each of the bulleted items listed above. Each section should have one paragraph
summarizing the section, followed by text or bullets detailing them. At the end should be a
References section that lists any outside sources (such as a particular implementation or problem
or code library) you plan on using.
Solution
HIDING IN THE MOBILE CROWD LOCATION PRIVACY THROUGH COLLABORATION
ABSTRACT
Location-aware smartphones support various location-based services (LBSs): users query the
LBS server and learnon the fly about their surroundings. However, such queries give away
private information, enabling the LBS to track users. A user-collaborative privacy-preserving
approach is proposed for LBSs. This solution does not requirechanging the LBS server
architecture and does not assume third party servers; yet, it significantly improves users’
locationprivacy. The gain stems from the collaboration of mobile devices: they keep their context
information in a buffer and pass it toothers seeking such information. Thus, a user remains
hidden from the server, unless all the collaborative peers in the vicinity lackthe sought
information. A novel epidemic model is developed to capture possibly time-dependent,dynamics
of information propagation among users. Used in the Bayesian inference framework, this model
helps analyze theeffects of various parameters, such as users’ querying rates and the lifetime of
context information, on users’ location privacy.The results show that our scheme hides a high
fraction of location-based queries, thus significantly enhancing users’ locationprivacy. Finally,
implementation indicates that it is lightweight and the cost of collaboration is negligible.
EXISTING SYSTEM
To enhance privacy for LBS users several solutions have been proposed and two main
categories are
Centralizedand
User-centric
Centralized approaches
Centralized approaches introduce a third party inthe system, which protects users’ privacy by
operatingbetween the user and the LBS. Such an intermediaryproxy server could anonymize
queriesby removing any information that identifies the useror her device.
It could blend a user’squery with those of other users, so that the LBS serveralways sees a group
of queries.
User-centric approaches
User-centric approaches operate on the device. Typicallythey aim to blur the location
information by,for example, having the user’s s.
Social Network Analysis is a study of relationships and ties between nodes/actors in a network. It seeks to understand the structure of relationships and how an individual's position in a network affects opportunities and constraints. SNA can be used to map and analyze networks in fields like public health, national security, and design. It provides insights into topics like information diffusion, social influence, and identifying important actors. SNA tools help visualize networks and analyze metrics like centrality, density, and connectivity.
Similar to SOS: A DISTRIBUTED MOBILE Q&A SYSTEM BASED ON SOCIAL NETWORKS (20)
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...Shakas Technologies
A Personal Privacy Data Protection Scheme for Encryption and Revocation of High-Dimensional Attri
Shakas Technologies ( Galaxy of Knowledge)
#11/A 2nd East Main Road,
Gandhi Nagar,
Vellore - 632006.
Mobile : +91-9500218218 / 8220150373| land line- 0416- 3552723
Shakas Training & Development | Shakas Sales & Services | Shakas Educational Trust|IEEE projects | Research & Development | Journal Publication |
Email : info@shakastech.com | shakastech@gmail.com |
website: www.shakastech.com
Facebook: https://www.facebook.com/pages/Shakas-Technologies
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Shakas Technologies
Detecting Mental Disorders in social Media through Emotional patterns-The case of Anorexia and depression
Shakas Technologies ( Galaxy of Knowledge)
#11/A 2nd East Main Road,
Gandhi Nagar,
Vellore - 632006.
Mobile : +91-9500218218 / 8220150373| land line- 0416- 3552723
Shakas Training & Development | Shakas Sales & Services | Shakas Educational Trust|IEEE projects | Research & Development | Journal Publication |
Email : info@shakastech.com | shakastech@gmail.com |
website: www.shakastech.com
Facebook: https://www.facebook.com/pages/Shakas-Technologies
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Shakas Technologies ( Galaxy of Knowledge)
#11/A 2nd East Main Road,
Gandhi Nagar,
Vellore - 632006.
Mobile : +91-9500218218 / 8220150373| land line- 0416- 3552723
Shakas Training & Development | Shakas Sales & Services | Shakas Educational Trust|IEEE projects | Research & Development | Journal Publication |
Email : info@shakastech.com | shakastech@gmail.com |
website: www.shakastech.com
Facebook: https://www.facebook.com/pages/Shakas-Technologies
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Shakas Technologies
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evolution Model Based on Distributed Representations.
Shakas Technologies ( Galaxy of Knowledge)
#11/A 2nd East Main Road,
Gandhi Nagar,
Vellore - 632006.
Mobile : +91-9500218218 / 8220150373| land line- 0416- 3552723
Shakas Training & Development | Shakas Sales & Services | Shakas Educational Trust|IEEE projects | Research & Development | Journal Publication |
Email : info@shakastech.com | shakastech@gmail.com |
website: www.shakastech.com
Facebook: https://www.facebook.com/pages/Shakas-Technologies
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 𝟏)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐄𝐏𝐏 𝐂𝐮𝐫𝐫𝐢𝐜𝐮𝐥𝐮𝐦 𝐢𝐧 𝐭𝐡𝐞 𝐏𝐡𝐢𝐥𝐢𝐩𝐩𝐢𝐧𝐞𝐬:
- Understand the goals and objectives of the Edukasyong Pantahanan at Pangkabuhayan (EPP) curriculum, recognizing its importance in fostering practical life skills and values among students. Students will also be able to identify the key components and subjects covered, such as agriculture, home economics, industrial arts, and information and communication technology.
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐍𝐚𝐭𝐮𝐫𝐞 𝐚𝐧𝐝 𝐒𝐜𝐨𝐩𝐞 𝐨𝐟 𝐚𝐧 𝐄𝐧𝐭𝐫𝐞𝐩𝐫𝐞𝐧𝐞𝐮𝐫:
-Define entrepreneurship, distinguishing it from general business activities by emphasizing its focus on innovation, risk-taking, and value creation. Students will describe the characteristics and traits of successful entrepreneurs, including their roles and responsibilities, and discuss the broader economic and social impacts of entrepreneurial activities on both local and global scales.
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
The chapter Lifelines of National Economy in Class 10 Geography focuses on the various modes of transportation and communication that play a vital role in the economic development of a country. These lifelines are crucial for the movement of goods, services, and people, thereby connecting different regions and promoting economic activities.
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
SOS: A DISTRIBUTED MOBILE Q&A SYSTEM BASED ON SOCIAL NETWORKS
1. SOS: A DISTRIBUTED MOBILE Q&A SYSTEM BASED ON SOCIAL
NETWORKS
ABSTRACT:
Recently, emerging research efforts have been focused on question and answer (Q&A) systems
based on social networks.The social-based Q&A systems can answer non-factual questions,
which cannot be easily resolved by web search engines. These systems either rely on a
centralized server for identifying friends based on social information or broadcast a user’s
questions to all of its friends. Mobile Q&A systems, where mobile nodes access the Q&A
systems through Internet, are very promising considering the rapid increase of mobile users and
the convenience of practical use. However, such systems cannot directly use the previous
centralized methods or broadcasting methods, which generate high cost of mobile Internet
access, node overload, and high server bandwidth cost with the tremendous number of mobile
users. We propose a distributed Social-based mObile Q&A System (SOS) with low overhead and
system cost as well as quick response to question askers. SOS enables mobile users to forward
questions to potential answerers in their friend lists in a decentralized manner for a number of
hops before resorting to the server. It leverages lightweight knowledge engineering techniques to
accurately identify friends who are able to and willing to answer questions, thus reducing the
search and computation costs of mobile nodes. The trace-driven simulation results show that
SOS can achieve a high query precision and recall rate, a short response latency and low
overhead. We have also deployed a pilot version of SOS for use in a small group in Clemson
University. The feedback from the users shows that SOS can provide high-quality answers.
2. EXISTING SYSTEM:
The search engines perform well in answering factual queries for information already in a
database,they are not suitable for non-factual queries that are more subjective, relative and multi-
dimensional , especially when the information is not in the database . One method to solve this
problem is to forward the non-factual queries to humans, which are the most “intelligent
machines”that are capable of parsing, interpreting and answering the queries, provided they are
familiar with the queries.Accordingly, a number of expertise location systems have been
proposed to search experts in social networks or Internet aided by a centralized search engine.To
enhance the asker satisfaction on the Q&A sites,recently, emerging research efforts have been
focused on social network based Q&A systems in which users post and answer questions
through social network maintained in a centralized server. As the answerers in the social network
know the backgrounds and preference of the askers, they are willing and able to provide more
tailored and personalized answers to the askers.The social-based Q&A systems can be classified
into two categories: broadcasting-based and centralized . The broadcasting-based systems
broadcast the questions of a user to all of the user’s friends. In the centralized systems , since the
centralized server constructs and maintains the social network of each user, it searches the
potential answerers for a given question from the asker’s friends, friends of friends and so on.
DISADVANTAGES OF EXISTING SYSTEM:
1. Broadcasting and centralized methods are not suitable to the mobile environment, where each
mobile node has limited resource.
2. Broadcasting to a large number of friends cannot guarantee the quality of the answers.
3. PROPOSED SYSTEM:
In this paper, we propose a distributed Social-based mobile Q&A System (SOS) with low
node overhead and system cost as well as quick response to question askers. SOS is novel
in that it achieves lightweight distributed answerer search, while still enabling a node to
accurately identify its friends that can answer a question.
We have also deployed a pilot version of SOS for use in a small group in Clemson
University. The analytical results of the data from the real application show the highly
satisfying Q&A service and high performance of SOS. SOS leverages the lightweight
knowledge engineering techniques to transform users’ social information and closeness,
as well as questions to IDs, respectively, so that a node can locally and accurately
identify its friends capable of answering a given question by mapping the question’s ID
with the social IDs. The node then forwards the question to the identified friends in a
decentralized manner. After receiving a question, the users answer the questions if they
can or forward the question to their friends. The question is forwarded along friend social
links for a number of hops, and then to the server. The cornerstone of SOS is that a
person usually issues a question that is closely related to his/her social life. As people
sharing similar interests are likely to be clustered in the social network the social network
can be regarded as social interest clusters intersecting with each other.
By locally choosing the most potential answerers in a node’s friend list, the queries can
be finally forwarded to the social clusters that have answers for the question. As the
answerers are socially close to the askers, they are more willing to answer the questions
compared to strangers in the Q&A websites.
4. ADVANTAGES OF PROPOSED SYSTEM:
1. This avoiding the query congestion and high server bandwidth and maintenance cost problem.
2. Reducing the node overhead, traffic and mobile Internet access.
3. An asker identifies potential answerers from his/her friends based on their past answer quality
and answering activeness to his/her questions.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
System : Pentium IV 2.4 GHz.
Hard Disk : 40 GB.
Floppy Drive : 1.44 Mb.
Monitor : 15 VGA Colour.
Mouse : Logitech.
Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
Operating system : Windows XP/7.
Coding Language : JAVA/J2EE
5. IDE : Netbeans 7.4
Database : MYSQL
REFERENCE:
Haiying Shen, Ze Li, Guoxin Liu, and Jin Li, “SOS: A Distributed Mobile Q&A System Based
on Social Networks” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED
SYSTEMS, VOL. 25, NO. 4, APRIL 2014.
6. IDE : Netbeans 7.4
Database : MYSQL
REFERENCE:
Haiying Shen, Ze Li, Guoxin Liu, and Jin Li, “SOS: A Distributed Mobile Q&A System Based
on Social Networks” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED
SYSTEMS, VOL. 25, NO. 4, APRIL 2014.