尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
94
AN AUTOMATIC FILTERING TASK IN OSN USING
CONTENT BASED APPROACH
Sachu.P.Sahi1
, Nayana Santhosh2
, Silpa Kamalan3
1, 2, 3
Department of CSE, SNGCE, Kadayiruppu, Kerala, India
ABSTRACT
In Online Social Network, information filtering can be used for different and more responsive functions. This is
owing to the fact that in OSN there is the possibility of posting or commenting other posts on particular public or private
regions called general walls. Information filtering can be used to give users the ability to control the messages written on
their walls automatically, by filtering out unwanted messages. OSN provide very little support to prevent unwanted
messages on user walls. For instance Facebook permits users only to state who is allowed to insert messages in their
walls. (friends, friends of friends, group of friends). Though no content based partialities are preserved and therefore it is
not possible to prevent undesired communications. For instance political or offensive ones, no matter of the user who
post them. By using the concept of content based techniques and rule based approach the contents from text and image
can be filtered and unwanted posts can be block.
Keywords: Online Social Network, Information Filtering, Content Filtering, Filtered Wall, Short Text Classification.
1. INTRODUCTION
Social network are today one of the hottest online trends. Social network provide the users have the ability to
share, communicate and distribute a significant amount of human life information. Social media were accessible from
anywhere and had become an integral part of our daily life. Social media are internet sites where people interact freely,
sharing and discussing about each other and their lives using a multimedia mix of personal words, pictures, videos and
audios. Now days huge amount of information are exchanged through social media sites. So there is a chance of posting
unwanted contents on others walls. OSN provide very little support to prevent such type contents. No content based
preference filtering is supported so not able to prevent unwanted messages.
Machine Learning techniques are used to categorize the messages based on their contents. The content filtering
is designed to control what contents may or may not be displayed. In this paper focus on filtered wall architecture, it’s
three tier architecture. Using this text from messages and images are filtered. Web content mining strategies are designed
for OSN to automatically discover the useful or unwanted information hidden within the data. Filtered wall intercepts the
message the user tries to post. Machine Learning based classifier extracts meta data. Enforce the filtering and Blacklist
rules and Message will be published or filtered by Filtered wall. Radial Basis Function networks classifier is used to
categorize the message because its handle the noise data effectively. Filtering rules can be used to state what contents
should be accepted and rejected. And also there is a list of users that are temporarily or permanently prevented from any
kind of posts in a authors wall and this list is known as Black list. The unwanted messages are filtered from OSN walls
on the basis of both message content and the message creator relationship and character.
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 5, Issue 12, December (2014), pp. 94-98
© IAEME: www.iaeme.com/IJCET.asp
Journal Impact Factor (2014): 8.5328 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
95
2. LITERATURE REVIEW AND RELATED WORK
2.1. Content-based filtering
In content based filtering to check the user’s interest and previous activity as well as item uses by users best
match is found [1].
For example OSNs such as Facebook, orkut used content based filtering policy. In that by checking
users profile attributes like education, work area, hobbies etc. suggested friend request may send. The main purpose of
content based filtering, the system is able to learn from user’s actions related to a particular content source and use them
for other content types.
2.2. Collaborative filtering
Collaborative filtering system selects information item based on user’s preferences, actions and predicts what
users will like based on his similarities to other users. Items are rated on the basis of user likes and dislikes [2].
When
filtering information using Collaborative filtering it contains collaboration of multiple agents. Collaborative filtering
system uses large dataset.Amazon.com uses item to item collaborative filtering for its Recommendation system. The
collaborative approach is suitable for popular items. The content based approach which is more suitable for unpopular
items and effective content information is easily available .The problem of collaborative filtering is to predict how well a
user will like an item that he has not rated given a set of historical preference judgments for a community of users.
C. Policy-based personalization
Policy based personalization is applicable in many different contexts. It adapts a service in specific context
according user defined policies. In online social networking sites user oriented policies can define how communication
between two parties or more can be handled. The policy based personalization system in [3]
focuses on Twitter2. Using
this it assigns a category to each tweet and shows the tweet to the user which are of his interest. Policy based
personalization represent the ability of the user to filter messages according to filtering criteria defined by him .
3. ANALYSIS OF PROBLEM
In the existing system there is a very little support to prevent undesired messages posting in the walls in such a
way that in face book users can specify who post messages in their walls and user can block the person who post
unwanted messages in their walls. Here only block the words from text messages. No Content based preference filtering
are supported in the current system. So we can’t able to filter text messages and also in the current system there is no
method to filter text from the images.
So all the contents posted by others are displayed on our walls. No automatic filtering is supported in current
system.
3.1. Disadvantages of Existing System
Today people misuse liberty of speech in social network. So there is a chance of posting or write down
unwanted words which are treated as unacceptable or uncalled in a civilized society. In the existing system there is no
technical approach to avoid this that is it provides very little support to prevent unwanted messages on user walls. No
content-based preferences are supported. Not possible to prevent undesired messages.
4. FILTERED WALL ARCHITECTURE
The architecture in support of OSN is three tier architecture. The lower layer is social network manager. It
provides the basic functionalities such as profile and it maintains the relationship management. The middle layer is
Social network applications here the message categorization is performed and also blacklist mechanism is applied in this
layer to block the users who send bad contents in their messages. The middle layer consists of two blocks content based
filtering and short text classifier. The top layer is graphical user interface, in this layer the users post his message and this
messages passing through the filtering rules to filter the unwanted contents and the users are block who post unwanted
contents on users wall [4].
When a user tries to post a message on other wall, the filtered wall intercept the user details from social graph
and user profile and metadata from messages are extracted. Then short text classifier divide the messages based on their
content based on the filtering rules applied from the message and from image.
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
96
Fig 1: System Architecture
After that only the filtered messages are displayed on the user walls. This is diagrammatically explained in the
figure1. For example the word ass is a slang word while pass is not bad word .And this system filters the first word but
not filter the second word according to the filtering criteria.
The bad words from the image can also be filtered. Before filtering the words from images the words from the
images need to be extracted. The words from the image can be extracted by using the technique optical character
recognition [5].
In OCR processing, the scanned-in image or bit map is analyzed for light and dark areas in order to
identify each alphabetic letter or numeric digit.
Fig 2: Flow chart of filtering message
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
97
4.1. Text Extraction from Image
One of the content in post or comment is image now a day. So the words in the image are also need to be
checked before they post. Optical character recognition is used for distinguish the words from the images. After
identifying the words then it can be given to the filtering rules. Then it decides whether the content is displayed or not.
The following steps are used to distinguish the character from image. (I) Read the image from the users wall. (II)
Convert the read image into a grey scale. (III) Convert the grey scale image into binary image.(IV) Identify the edges of
the image. (V) Dilate the image for finding connected components. (VI) Fill the image. (VII) Find the object present in
image. (VIII) Plot the location of the object. (IX) Crop the character based on location of the character in the image.
Fig 3: Word extraction from image
Using this technique the words in the images which are posted by the users can be checked. And these words
given as an input to the filtering rules specified by the user. Then the filtering rule filters the bad words in the image.
5. MACHINE LEARNING CLASSIFICATION
Short text categorization uses a two level hierarchical classification. First level classifier classifies the message
as neutral and non-neutral. Second level classifier classifies the non-neutral message based on their contents and assigns
a gradual membership to each of the non-neutral classes. Radial basis function neural network (RBFN) is used because it
has a good approximation and describe nature of the data very effectively. RBFN is feed forward neural network has a
single hidden layer of processing unit.
5.1. Filtering Rule
By using the filtering rule the user can state what contents should be displayed and what contents should be
blocked. Filtering rules are specified based on the lower layer of the filtered wall architecture .In filtering rule consists of
four factors .An author is the person who state the rule. The creator specification is a set of osn users. The Content
specification state how the contents are classified and an action denote the action performed by the system it may be
block the content or notify. More than a filtering rule can apply to same user[6][3].
Creator specification CS1 = {Age <18, Sex = female} denotes all females whose age is less than 18years. CS2 =
{Alice; colleague, 0.4} denotes all users who are colleagues of Alice and whose trust level is less than or equal to 0.4 .
CS3 = {(Alice, colleague; 0.4), (Sex = male)} selects only female users from those identified by CS2. Criteria can be
easily specified through following Filtering rule.
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
98
5.2. Black List Mechanism
A blacklist is a basic access control mechanism that allows everyone access, except for the members of the
black list (i.e. list of denied accesses). Blacklist rules can be used to ban particular users from sending unwanted
messages [6][1].
Banning can be done for a specific period of time. Relative frequency can be used by the system to detect
those users who send unwanted messages.
Like filtering rule blacklist mechanism also contain some factor. Blacklist rule is defined as a tuple of author,
creator spec, creator behavior and times .And the two main factors are author and time. Author is the person who
specifies the rule. Time denote the time period the users banned from authors wall.
By using this author can block a particular osn user from his/her wall for a particular period of time or block
permanently. It depends on authors who block the person. A user banned from OSNs wall being able to post in others
wall at the same time. Black list rule is defined as (Allen,(age<18),(0.6,mywall,2 week),5 days). This is inserted into the
Allen’s wall whose have age less than 18 have a relative frequency is greater than or equal to 0.6 in last week.
6. CONCLUSION
In this paper, a system to filter unwanted messages from OSN walls that is filter bad words from text message as
wells as extract words from image. The text from the words can be extracted by using optical character recognition.
Filtering rule allow users to state constraints on message creators. Filtering rule applies can be selected on the basis of
several different criteria. Black list rules can be specified by users to ban a particular user from sending unwanted
messages for specific period of times. Flexibility to the system provides by using filtering rules and blacklist
management. Up to now OSN provide very little support to prevent undesired contents. Users have direct control of wall
in specifying messages that is to be displayed.
As future work, not only the text from the images but also the images can be filtered.
REFERENCES
[1] “A System to Filter Unwanted Messages from OSN User Walls” Marco Vanetti, Elisabetta Binaghi, Elena
Ferrari, Barbara Carminati, Moreno Carullo, Department of Computer Science and Communication University
of Insubria 21100 Varese, Italy IEEE Transactions On Knowledge And Data Engineering Vol:25 Year 2013.
[2] “On Line Social Network Content And Image Filtering, Classifications” Prashant Tomer1*, Shrikant Lade1,
Manish Kumar Suman2 and Deepak Patel3, 2013.
[3] “Content-Based Filtering in On-line Social Networks” M. Vanetti, E. Binaghi, B. Carminati, M. Carullo and E.
Ferrari, Department of Computer Science and Communication University of Insubria 21100 Varese, Italy
fmarco.vanetti, elisabetta.binaghi, barbara.carminati, moreno.carullo, elena.ferrarig @uninsubria.it
[4] B. Sriram, D. Fuhry, E. Demir, H. Ferhatosmanoglu, and M.Demirbas, “Short Text Classification in Twitter to
Improve Information Filtering,” Proc. 33rd Int’l ACM SIGIR Conf. Research and Development in Information
Retrieval (SIGIR ’10), pp. 841-842,2010.
[5] J.Nin, B.Carminati, E.Ferrari, and V.Torra, “Computing Reputation for Collaborative Private Networks,”
Proc.33rd Ann. IEEE Int’l computer Software and Applications Conf., Vol.1, pp. 246-253, 2009.
[6] Unwanted Messages Are Filtered Using Content Mining Ms. Shruti C. Belsare1 ,Prof. R.R. Keole2
[7] K. Nirmala, S. Satheesh kumar, “A Survey on Text Categorization in Online Social Networks,” in Proceedings
of International Journal of Emerging Technology and Advanced Engineering,Volume 3, Issue 9, September
2013.
[8] P.S. Jacobs and L.F. Rau, “Scisor: Extracting Information from OnLine News,” Comm. ACM, vol. 33, no. 11,
pp. 88-97, 1990.
[9] R.J. Mooney and L. Roy, “Content-Based Book Recommending Using Learning for Text Categorization,” Proc.
Fifth ACM Conf.Digital Libraries, pp. 195-204, 2000
[10] A Review on Customizable Content-Based Message Filtering from OSN User Wall, Mayuri Uttarwar IJCSMC,
Vol. 2, Issue. 10, October 2013
[11] FilteringOfUndesiredmessages From Osn User Space PoliReddy,B.BalaKrishna,mar Suman2 and Deepak Patel3,2013
[12] A. Adomavicius and G. Tuzhilin, “Toward the Next Generation of Recommender Systems: A Survey of the
State-of-the-Art and Possible Extensions,” IEEE Trans. Knowledge and Data Eng., vol. 17, no. 6, pp. 734-749,
June 2005.
[13] S. Zelikovitz and H. Hirsh, “Improving short text classification using unlabeled background knowledge,” in
Proceedings of 17th International Conference on Machine Learning (ICML-00), P. Langley, Ed.Stanford, US:
Morgan Kaufmann Publishers, San Francisco, US,2000, pp. 1183–1190.
[14] P.E. Baclace, “Competitive Agents for Information Filtering,”
[15] “A probabilistic analysis of the rocchio algorithm with tfidf for text categorization,” in Proceedings of
International Conference on Machine Learning,pp. 143–151.

More Related Content

What's hot

A system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user wallsA system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user walls
IEEEFINALYEARPROJECTS
 
A system to filter unwanted messages from the
A system to filter unwanted messages from theA system to filter unwanted messages from the
A system to filter unwanted messages from the
Madan Golla
 
A system to filter unwanted messages
A system to filter unwanted messagesA system to filter unwanted messages
A system to filter unwanted messages
Ninad Samel
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social network
eSAT Publishing House
 
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
IOSR Journals
 
Improvement in the usability of gis based services by
Improvement in the usability of gis based services byImprovement in the usability of gis based services by
Improvement in the usability of gis based services by
eSAT Publishing House
 
Ijcatr04041017
Ijcatr04041017Ijcatr04041017
Ijcatr04041017
Editor IJCATR
 
USER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCHUSER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCH
ijmpict
 
Scalable recommendation with social contextual information
Scalable recommendation with social contextual informationScalable recommendation with social contextual information
Scalable recommendation with social contextual information
eSAT Journals
 
NLP-based personal learning assistant for school education
NLP-based personal learning assistant for school education NLP-based personal learning assistant for school education
NLP-based personal learning assistant for school education
IJECEIAES
 
IRJET- Post Summarization and Text Classification in Social Networking Sites
IRJET- Post Summarization and Text Classification in Social Networking SitesIRJET- Post Summarization and Text Classification in Social Networking Sites
IRJET- Post Summarization and Text Classification in Social Networking Sites
IRJET Journal
 
A survey on ontology based web personalization
A survey on ontology based web personalizationA survey on ontology based web personalization
A survey on ontology based web personalization
eSAT Publishing House
 
A survey on ontology based web personalization
A survey on ontology based web personalizationA survey on ontology based web personalization
A survey on ontology based web personalization
eSAT Journals
 
VIDEO OBJECTS DESCRIPTION IN HINDI TEXT LANGUAGE
VIDEO OBJECTS DESCRIPTION IN HINDI TEXT LANGUAGE VIDEO OBJECTS DESCRIPTION IN HINDI TEXT LANGUAGE
VIDEO OBJECTS DESCRIPTION IN HINDI TEXT LANGUAGE
ijmpict
 
Friend Recommendation on Social Network Site Based on Their Life Style
Friend Recommendation on Social Network Site Based on Their Life StyleFriend Recommendation on Social Network Site Based on Their Life Style
Friend Recommendation on Social Network Site Based on Their Life Style
paperpublications3
 
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSA SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
IJCI JOURNAL
 
An Anonymous System using Single Sign-on Protocol
An Anonymous System using Single Sign-on ProtocolAn Anonymous System using Single Sign-on Protocol
An Anonymous System using Single Sign-on Protocol
IJERA Editor
 
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACYMUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
paperpublications3
 

What's hot (18)

A system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user wallsA system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user walls
 
A system to filter unwanted messages from the
A system to filter unwanted messages from theA system to filter unwanted messages from the
A system to filter unwanted messages from the
 
A system to filter unwanted messages
A system to filter unwanted messagesA system to filter unwanted messages
A system to filter unwanted messages
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social network
 
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
 
Improvement in the usability of gis based services by
Improvement in the usability of gis based services byImprovement in the usability of gis based services by
Improvement in the usability of gis based services by
 
Ijcatr04041017
Ijcatr04041017Ijcatr04041017
Ijcatr04041017
 
USER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCHUSER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCH
 
Scalable recommendation with social contextual information
Scalable recommendation with social contextual informationScalable recommendation with social contextual information
Scalable recommendation with social contextual information
 
NLP-based personal learning assistant for school education
NLP-based personal learning assistant for school education NLP-based personal learning assistant for school education
NLP-based personal learning assistant for school education
 
IRJET- Post Summarization and Text Classification in Social Networking Sites
IRJET- Post Summarization and Text Classification in Social Networking SitesIRJET- Post Summarization and Text Classification in Social Networking Sites
IRJET- Post Summarization and Text Classification in Social Networking Sites
 
A survey on ontology based web personalization
A survey on ontology based web personalizationA survey on ontology based web personalization
A survey on ontology based web personalization
 
A survey on ontology based web personalization
A survey on ontology based web personalizationA survey on ontology based web personalization
A survey on ontology based web personalization
 
VIDEO OBJECTS DESCRIPTION IN HINDI TEXT LANGUAGE
VIDEO OBJECTS DESCRIPTION IN HINDI TEXT LANGUAGE VIDEO OBJECTS DESCRIPTION IN HINDI TEXT LANGUAGE
VIDEO OBJECTS DESCRIPTION IN HINDI TEXT LANGUAGE
 
Friend Recommendation on Social Network Site Based on Their Life Style
Friend Recommendation on Social Network Site Based on Their Life StyleFriend Recommendation on Social Network Site Based on Their Life Style
Friend Recommendation on Social Network Site Based on Their Life Style
 
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSA SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
 
An Anonymous System using Single Sign-on Protocol
An Anonymous System using Single Sign-on ProtocolAn Anonymous System using Single Sign-on Protocol
An Anonymous System using Single Sign-on Protocol
 
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACYMUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
 

Viewers also liked

Array facebook
Array facebookArray facebook
Array facebookJun Chiba
 
De ce sa apreciem craciunul traditional
De ce sa apreciem craciunul traditionalDe ce sa apreciem craciunul traditional
De ce sa apreciem craciunul traditional
Pavel Cristian Ionita
 
Neha BA
Neha BANeha BA
Neha BA
Neha Bansal
 
Patricia Kande's updated resume
Patricia Kande's updated resumePatricia Kande's updated resume
Patricia Kande's updated resume
Patricia Kande
 
Experiencies d'aprenentatge
Experiencies d'aprenentatgeExperiencies d'aprenentatge
Experiencies d'aprenentatgedospol1
 
eng - hazem abdelaziz
eng - hazem abdelazizeng - hazem abdelaziz
eng - hazem abdelaziz
hazem abdelaziz
 
Ndg briefing presentation
Ndg briefing presentationNdg briefing presentation
Ndg briefing presentation
Ramon Escalera
 
Wearable UX
Wearable UXWearable UX
Wearable UX
Jess Hamilton
 
PaiddailyLifestyle Updated Power Point 10.26.15
PaiddailyLifestyle Updated Power Point 10.26.15PaiddailyLifestyle Updated Power Point 10.26.15
PaiddailyLifestyle Updated Power Point 10.26.15
Ramon Escalera
 
Tutorial para registrarse en wix
Tutorial para registrarse en wixTutorial para registrarse en wix
Tutorial para registrarse en wix
clara-bonfanti
 

Viewers also liked (10)

Array facebook
Array facebookArray facebook
Array facebook
 
De ce sa apreciem craciunul traditional
De ce sa apreciem craciunul traditionalDe ce sa apreciem craciunul traditional
De ce sa apreciem craciunul traditional
 
Neha BA
Neha BANeha BA
Neha BA
 
Patricia Kande's updated resume
Patricia Kande's updated resumePatricia Kande's updated resume
Patricia Kande's updated resume
 
Experiencies d'aprenentatge
Experiencies d'aprenentatgeExperiencies d'aprenentatge
Experiencies d'aprenentatge
 
eng - hazem abdelaziz
eng - hazem abdelazizeng - hazem abdelaziz
eng - hazem abdelaziz
 
Ndg briefing presentation
Ndg briefing presentationNdg briefing presentation
Ndg briefing presentation
 
Wearable UX
Wearable UXWearable UX
Wearable UX
 
PaiddailyLifestyle Updated Power Point 10.26.15
PaiddailyLifestyle Updated Power Point 10.26.15PaiddailyLifestyle Updated Power Point 10.26.15
PaiddailyLifestyle Updated Power Point 10.26.15
 
Tutorial para registrarse en wix
Tutorial para registrarse en wixTutorial para registrarse en wix
Tutorial para registrarse en wix
 

Similar to An automatic filtering task in osn using content based approach

Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osn
IJSRD
 
Paper id 152013128
Paper id 152013128Paper id 152013128
Paper id 152013128
IJRAT
 
Iaetsd efficient filteration of unwanted messages
Iaetsd efficient filteration of unwanted messagesIaetsd efficient filteration of unwanted messages
Iaetsd efficient filteration of unwanted messages
Iaetsd Iaetsd
 
S180304116124
S180304116124S180304116124
S180304116124
IOSR Journals
 
Iaetsd hierarchical fuzzy rule based classification
Iaetsd hierarchical fuzzy rule based classificationIaetsd hierarchical fuzzy rule based classification
Iaetsd hierarchical fuzzy rule based classification
Iaetsd Iaetsd
 
Cb4301449454
Cb4301449454Cb4301449454
Cb4301449454
IJERA Editor
 
D0351020025
D0351020025D0351020025
D0351020025
inventionjournals
 
Experimental of vectorizer and classifier for scrapped social media data
Experimental of vectorizer and classifier for scrapped social media dataExperimental of vectorizer and classifier for scrapped social media data
Experimental of vectorizer and classifier for scrapped social media data
TELKOMNIKA JOURNAL
 
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
IRJET Journal
 
A Review: Text Classification on Social Media Data
A Review: Text Classification on Social Media DataA Review: Text Classification on Social Media Data
A Review: Text Classification on Social Media Data
IOSR Journals
 
O017148084
O017148084O017148084
O017148084
IOSR Journals
 
Review and analysis of machine learning and soft computing approaches for use...
Review and analysis of machine learning and soft computing approaches for use...Review and analysis of machine learning and soft computing approaches for use...
Review and analysis of machine learning and soft computing approaches for use...
IJwest
 
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksMy Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
IRJET Journal
 
Detecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social NetworksDetecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social Networks
IRJET Journal
 
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
IJARIIT
 
Current trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networksCurrent trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networks
eSAT Publishing House
 
Privacy Protection Using Formal Logics in Onlne Social Networks
Privacy Protection Using   Formal Logics in Onlne Social NetworksPrivacy Protection Using   Formal Logics in Onlne Social Networks
Privacy Protection Using Formal Logics in Onlne Social Networks
IRJET Journal
 
Intelligent access control policies for Social network site
Intelligent access control policies for Social network siteIntelligent access control policies for Social network site
Intelligent access control policies for Social network site
ijcsit
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
IRJET Journal
 
A Literature Survey on Recommendation Systems for Scientific Articles.pdf
A Literature Survey on Recommendation Systems for Scientific Articles.pdfA Literature Survey on Recommendation Systems for Scientific Articles.pdf
A Literature Survey on Recommendation Systems for Scientific Articles.pdf
Amber Ford
 

Similar to An automatic filtering task in osn using content based approach (20)

Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osn
 
Paper id 152013128
Paper id 152013128Paper id 152013128
Paper id 152013128
 
Iaetsd efficient filteration of unwanted messages
Iaetsd efficient filteration of unwanted messagesIaetsd efficient filteration of unwanted messages
Iaetsd efficient filteration of unwanted messages
 
S180304116124
S180304116124S180304116124
S180304116124
 
Iaetsd hierarchical fuzzy rule based classification
Iaetsd hierarchical fuzzy rule based classificationIaetsd hierarchical fuzzy rule based classification
Iaetsd hierarchical fuzzy rule based classification
 
Cb4301449454
Cb4301449454Cb4301449454
Cb4301449454
 
D0351020025
D0351020025D0351020025
D0351020025
 
Experimental of vectorizer and classifier for scrapped social media data
Experimental of vectorizer and classifier for scrapped social media dataExperimental of vectorizer and classifier for scrapped social media data
Experimental of vectorizer and classifier for scrapped social media data
 
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
 
A Review: Text Classification on Social Media Data
A Review: Text Classification on Social Media DataA Review: Text Classification on Social Media Data
A Review: Text Classification on Social Media Data
 
O017148084
O017148084O017148084
O017148084
 
Review and analysis of machine learning and soft computing approaches for use...
Review and analysis of machine learning and soft computing approaches for use...Review and analysis of machine learning and soft computing approaches for use...
Review and analysis of machine learning and soft computing approaches for use...
 
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksMy Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
 
Detecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social NetworksDetecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social Networks
 
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
 
Current trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networksCurrent trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networks
 
Privacy Protection Using Formal Logics in Onlne Social Networks
Privacy Protection Using   Formal Logics in Onlne Social NetworksPrivacy Protection Using   Formal Logics in Onlne Social Networks
Privacy Protection Using Formal Logics in Onlne Social Networks
 
Intelligent access control policies for Social network site
Intelligent access control policies for Social network siteIntelligent access control policies for Social network site
Intelligent access control policies for Social network site
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
 
A Literature Survey on Recommendation Systems for Scientific Articles.pdf
A Literature Survey on Recommendation Systems for Scientific Articles.pdfA Literature Survey on Recommendation Systems for Scientific Articles.pdf
A Literature Survey on Recommendation Systems for Scientific Articles.pdf
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
ScyllaDB
 
CTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database MigrationCTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database Migration
ScyllaDB
 
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc
 
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to SuccessMongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
ScyllaDB
 
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
dipikamodels1
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
ThousandEyes
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
leebarnesutopia
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
Tobias Schneck
 
So You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental DowntimeSo You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental Downtime
ScyllaDB
 
Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2
DianaGray10
 
Multivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back againMultivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back again
Kieran Kunhya
 
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
anilsa9823
 
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDBScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB
 
From NCSA to the National Research Platform
From NCSA to the National Research PlatformFrom NCSA to the National Research Platform
From NCSA to the National Research Platform
Larry Smarr
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
Real-Time Persisted Events at Supercell
Real-Time Persisted Events at  SupercellReal-Time Persisted Events at  Supercell
Real-Time Persisted Events at Supercell
ScyllaDB
 
An All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS MarketAn All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS Market
ScyllaDB
 

Recently uploaded (20)

Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
 
CTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database MigrationCTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database Migration
 
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
 
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to SuccessMongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
 
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
 
So You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental DowntimeSo You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental Downtime
 
Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2
 
Multivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back againMultivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back again
 
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
 
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDBScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
 
From NCSA to the National Research Platform
From NCSA to the National Research PlatformFrom NCSA to the National Research Platform
From NCSA to the National Research Platform
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
Real-Time Persisted Events at Supercell
Real-Time Persisted Events at  SupercellReal-Time Persisted Events at  Supercell
Real-Time Persisted Events at Supercell
 
An All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS MarketAn All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS Market
 

An automatic filtering task in osn using content based approach

  • 1. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 94 AN AUTOMATIC FILTERING TASK IN OSN USING CONTENT BASED APPROACH Sachu.P.Sahi1 , Nayana Santhosh2 , Silpa Kamalan3 1, 2, 3 Department of CSE, SNGCE, Kadayiruppu, Kerala, India ABSTRACT In Online Social Network, information filtering can be used for different and more responsive functions. This is owing to the fact that in OSN there is the possibility of posting or commenting other posts on particular public or private regions called general walls. Information filtering can be used to give users the ability to control the messages written on their walls automatically, by filtering out unwanted messages. OSN provide very little support to prevent unwanted messages on user walls. For instance Facebook permits users only to state who is allowed to insert messages in their walls. (friends, friends of friends, group of friends). Though no content based partialities are preserved and therefore it is not possible to prevent undesired communications. For instance political or offensive ones, no matter of the user who post them. By using the concept of content based techniques and rule based approach the contents from text and image can be filtered and unwanted posts can be block. Keywords: Online Social Network, Information Filtering, Content Filtering, Filtered Wall, Short Text Classification. 1. INTRODUCTION Social network are today one of the hottest online trends. Social network provide the users have the ability to share, communicate and distribute a significant amount of human life information. Social media were accessible from anywhere and had become an integral part of our daily life. Social media are internet sites where people interact freely, sharing and discussing about each other and their lives using a multimedia mix of personal words, pictures, videos and audios. Now days huge amount of information are exchanged through social media sites. So there is a chance of posting unwanted contents on others walls. OSN provide very little support to prevent such type contents. No content based preference filtering is supported so not able to prevent unwanted messages. Machine Learning techniques are used to categorize the messages based on their contents. The content filtering is designed to control what contents may or may not be displayed. In this paper focus on filtered wall architecture, it’s three tier architecture. Using this text from messages and images are filtered. Web content mining strategies are designed for OSN to automatically discover the useful or unwanted information hidden within the data. Filtered wall intercepts the message the user tries to post. Machine Learning based classifier extracts meta data. Enforce the filtering and Blacklist rules and Message will be published or filtered by Filtered wall. Radial Basis Function networks classifier is used to categorize the message because its handle the noise data effectively. Filtering rules can be used to state what contents should be accepted and rejected. And also there is a list of users that are temporarily or permanently prevented from any kind of posts in a authors wall and this list is known as Black list. The unwanted messages are filtered from OSN walls on the basis of both message content and the message creator relationship and character. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 12, December (2014), pp. 94-98 © IAEME: www.iaeme.com/IJCET.asp Journal Impact Factor (2014): 8.5328 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 95 2. LITERATURE REVIEW AND RELATED WORK 2.1. Content-based filtering In content based filtering to check the user’s interest and previous activity as well as item uses by users best match is found [1]. For example OSNs such as Facebook, orkut used content based filtering policy. In that by checking users profile attributes like education, work area, hobbies etc. suggested friend request may send. The main purpose of content based filtering, the system is able to learn from user’s actions related to a particular content source and use them for other content types. 2.2. Collaborative filtering Collaborative filtering system selects information item based on user’s preferences, actions and predicts what users will like based on his similarities to other users. Items are rated on the basis of user likes and dislikes [2]. When filtering information using Collaborative filtering it contains collaboration of multiple agents. Collaborative filtering system uses large dataset.Amazon.com uses item to item collaborative filtering for its Recommendation system. The collaborative approach is suitable for popular items. The content based approach which is more suitable for unpopular items and effective content information is easily available .The problem of collaborative filtering is to predict how well a user will like an item that he has not rated given a set of historical preference judgments for a community of users. C. Policy-based personalization Policy based personalization is applicable in many different contexts. It adapts a service in specific context according user defined policies. In online social networking sites user oriented policies can define how communication between two parties or more can be handled. The policy based personalization system in [3] focuses on Twitter2. Using this it assigns a category to each tweet and shows the tweet to the user which are of his interest. Policy based personalization represent the ability of the user to filter messages according to filtering criteria defined by him . 3. ANALYSIS OF PROBLEM In the existing system there is a very little support to prevent undesired messages posting in the walls in such a way that in face book users can specify who post messages in their walls and user can block the person who post unwanted messages in their walls. Here only block the words from text messages. No Content based preference filtering are supported in the current system. So we can’t able to filter text messages and also in the current system there is no method to filter text from the images. So all the contents posted by others are displayed on our walls. No automatic filtering is supported in current system. 3.1. Disadvantages of Existing System Today people misuse liberty of speech in social network. So there is a chance of posting or write down unwanted words which are treated as unacceptable or uncalled in a civilized society. In the existing system there is no technical approach to avoid this that is it provides very little support to prevent unwanted messages on user walls. No content-based preferences are supported. Not possible to prevent undesired messages. 4. FILTERED WALL ARCHITECTURE The architecture in support of OSN is three tier architecture. The lower layer is social network manager. It provides the basic functionalities such as profile and it maintains the relationship management. The middle layer is Social network applications here the message categorization is performed and also blacklist mechanism is applied in this layer to block the users who send bad contents in their messages. The middle layer consists of two blocks content based filtering and short text classifier. The top layer is graphical user interface, in this layer the users post his message and this messages passing through the filtering rules to filter the unwanted contents and the users are block who post unwanted contents on users wall [4]. When a user tries to post a message on other wall, the filtered wall intercept the user details from social graph and user profile and metadata from messages are extracted. Then short text classifier divide the messages based on their content based on the filtering rules applied from the message and from image.
  • 3. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 96 Fig 1: System Architecture After that only the filtered messages are displayed on the user walls. This is diagrammatically explained in the figure1. For example the word ass is a slang word while pass is not bad word .And this system filters the first word but not filter the second word according to the filtering criteria. The bad words from the image can also be filtered. Before filtering the words from images the words from the images need to be extracted. The words from the image can be extracted by using the technique optical character recognition [5]. In OCR processing, the scanned-in image or bit map is analyzed for light and dark areas in order to identify each alphabetic letter or numeric digit. Fig 2: Flow chart of filtering message
  • 4. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 97 4.1. Text Extraction from Image One of the content in post or comment is image now a day. So the words in the image are also need to be checked before they post. Optical character recognition is used for distinguish the words from the images. After identifying the words then it can be given to the filtering rules. Then it decides whether the content is displayed or not. The following steps are used to distinguish the character from image. (I) Read the image from the users wall. (II) Convert the read image into a grey scale. (III) Convert the grey scale image into binary image.(IV) Identify the edges of the image. (V) Dilate the image for finding connected components. (VI) Fill the image. (VII) Find the object present in image. (VIII) Plot the location of the object. (IX) Crop the character based on location of the character in the image. Fig 3: Word extraction from image Using this technique the words in the images which are posted by the users can be checked. And these words given as an input to the filtering rules specified by the user. Then the filtering rule filters the bad words in the image. 5. MACHINE LEARNING CLASSIFICATION Short text categorization uses a two level hierarchical classification. First level classifier classifies the message as neutral and non-neutral. Second level classifier classifies the non-neutral message based on their contents and assigns a gradual membership to each of the non-neutral classes. Radial basis function neural network (RBFN) is used because it has a good approximation and describe nature of the data very effectively. RBFN is feed forward neural network has a single hidden layer of processing unit. 5.1. Filtering Rule By using the filtering rule the user can state what contents should be displayed and what contents should be blocked. Filtering rules are specified based on the lower layer of the filtered wall architecture .In filtering rule consists of four factors .An author is the person who state the rule. The creator specification is a set of osn users. The Content specification state how the contents are classified and an action denote the action performed by the system it may be block the content or notify. More than a filtering rule can apply to same user[6][3]. Creator specification CS1 = {Age <18, Sex = female} denotes all females whose age is less than 18years. CS2 = {Alice; colleague, 0.4} denotes all users who are colleagues of Alice and whose trust level is less than or equal to 0.4 . CS3 = {(Alice, colleague; 0.4), (Sex = male)} selects only female users from those identified by CS2. Criteria can be easily specified through following Filtering rule.
  • 5. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 98 5.2. Black List Mechanism A blacklist is a basic access control mechanism that allows everyone access, except for the members of the black list (i.e. list of denied accesses). Blacklist rules can be used to ban particular users from sending unwanted messages [6][1]. Banning can be done for a specific period of time. Relative frequency can be used by the system to detect those users who send unwanted messages. Like filtering rule blacklist mechanism also contain some factor. Blacklist rule is defined as a tuple of author, creator spec, creator behavior and times .And the two main factors are author and time. Author is the person who specifies the rule. Time denote the time period the users banned from authors wall. By using this author can block a particular osn user from his/her wall for a particular period of time or block permanently. It depends on authors who block the person. A user banned from OSNs wall being able to post in others wall at the same time. Black list rule is defined as (Allen,(age<18),(0.6,mywall,2 week),5 days). This is inserted into the Allen’s wall whose have age less than 18 have a relative frequency is greater than or equal to 0.6 in last week. 6. CONCLUSION In this paper, a system to filter unwanted messages from OSN walls that is filter bad words from text message as wells as extract words from image. The text from the words can be extracted by using optical character recognition. Filtering rule allow users to state constraints on message creators. Filtering rule applies can be selected on the basis of several different criteria. Black list rules can be specified by users to ban a particular user from sending unwanted messages for specific period of times. Flexibility to the system provides by using filtering rules and blacklist management. Up to now OSN provide very little support to prevent undesired contents. Users have direct control of wall in specifying messages that is to be displayed. As future work, not only the text from the images but also the images can be filtered. REFERENCES [1] “A System to Filter Unwanted Messages from OSN User Walls” Marco Vanetti, Elisabetta Binaghi, Elena Ferrari, Barbara Carminati, Moreno Carullo, Department of Computer Science and Communication University of Insubria 21100 Varese, Italy IEEE Transactions On Knowledge And Data Engineering Vol:25 Year 2013. [2] “On Line Social Network Content And Image Filtering, Classifications” Prashant Tomer1*, Shrikant Lade1, Manish Kumar Suman2 and Deepak Patel3, 2013. [3] “Content-Based Filtering in On-line Social Networks” M. Vanetti, E. Binaghi, B. Carminati, M. Carullo and E. Ferrari, Department of Computer Science and Communication University of Insubria 21100 Varese, Italy fmarco.vanetti, elisabetta.binaghi, barbara.carminati, moreno.carullo, elena.ferrarig @uninsubria.it [4] B. Sriram, D. Fuhry, E. Demir, H. Ferhatosmanoglu, and M.Demirbas, “Short Text Classification in Twitter to Improve Information Filtering,” Proc. 33rd Int’l ACM SIGIR Conf. Research and Development in Information Retrieval (SIGIR ’10), pp. 841-842,2010. [5] J.Nin, B.Carminati, E.Ferrari, and V.Torra, “Computing Reputation for Collaborative Private Networks,” Proc.33rd Ann. IEEE Int’l computer Software and Applications Conf., Vol.1, pp. 246-253, 2009. [6] Unwanted Messages Are Filtered Using Content Mining Ms. Shruti C. Belsare1 ,Prof. R.R. Keole2 [7] K. Nirmala, S. Satheesh kumar, “A Survey on Text Categorization in Online Social Networks,” in Proceedings of International Journal of Emerging Technology and Advanced Engineering,Volume 3, Issue 9, September 2013. [8] P.S. Jacobs and L.F. Rau, “Scisor: Extracting Information from OnLine News,” Comm. ACM, vol. 33, no. 11, pp. 88-97, 1990. [9] R.J. Mooney and L. Roy, “Content-Based Book Recommending Using Learning for Text Categorization,” Proc. Fifth ACM Conf.Digital Libraries, pp. 195-204, 2000 [10] A Review on Customizable Content-Based Message Filtering from OSN User Wall, Mayuri Uttarwar IJCSMC, Vol. 2, Issue. 10, October 2013 [11] FilteringOfUndesiredmessages From Osn User Space PoliReddy,B.BalaKrishna,mar Suman2 and Deepak Patel3,2013 [12] A. Adomavicius and G. Tuzhilin, “Toward the Next Generation of Recommender Systems: A Survey of the State-of-the-Art and Possible Extensions,” IEEE Trans. Knowledge and Data Eng., vol. 17, no. 6, pp. 734-749, June 2005. [13] S. Zelikovitz and H. Hirsh, “Improving short text classification using unlabeled background knowledge,” in Proceedings of 17th International Conference on Machine Learning (ICML-00), P. Langley, Ed.Stanford, US: Morgan Kaufmann Publishers, San Francisco, US,2000, pp. 1183–1190. [14] P.E. Baclace, “Competitive Agents for Information Filtering,” [15] “A probabilistic analysis of the rocchio algorithm with tfidf for text categorization,” in Proceedings of International Conference on Machine Learning,pp. 143–151.
  翻译: