International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 112 | Views: 338

Research Paper | Information Technology | India | Volume 3 Issue 12, December 2014 | Popularity: 6.3 / 10


     

An Ensemble Classification Technique to Control Unwanted Messages in Online Social Networking

M. Lavanya, S. Subadra


Abstract: Online Social networks are vulnerable to the private data leakage through many data mining algorithm through Relational mining and Classification Algorithm. We explored many problems in preserving the private data of the social networks users and they currently do not provide any mechanism to enforce privacy concerns over data associated with multiple users. To this end, we propose a approach for protection of shared data associated with multiple users in OSNs through the devised sanitation techniques. We formulate an sanitation technique in terms of access control model to capture the essence of multiparty authorization requirements, along with a multiparty policy specification scheme and a policy enforcement mechanism. In additional, we present a logical representation of our access control model which allows us to leverage the features of existing logic solvers to perform various analysis tasks on our model. . Comparison with state-of-the-art data stream classification techniques establishes the effectiveness of the proposed approach


Keywords: Information Retrieval, Data Classification, Outlier Detection, Data extraction, Data filtering


Edition: Volume 3 Issue 12, December 2014


Pages: 1877 - 1881



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
M. Lavanya, S. Subadra, "An Ensemble Classification Technique to Control Unwanted Messages in Online Social Networking", International Journal of Science and Research (IJSR), Volume 3 Issue 12, December 2014, pp. 1877-1881, URL: https://www.ijsr.net/getabstract.php?paperid=SUB14890, DOI: https://www.doi.org/10.21275/SUB14890



Downloads: 357 | Views: 1000

Information Technology, Ghana, Volume 8 Issue 6, June 2019

Pages: 64 - 69

The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana

Abu Sulemana, Yahuza Abdul-Kadir


Downloads: 301 | Views: 558

Information Technology, India, Volume 8 Issue 1, January 2019

Pages: 456 - 460

Analysis of Blockchain and its Working Principle

S. Banupriya, G. Renuka Devi


Downloads: 266 | Views: 407

Information Technology, China, Volume 9 Issue 1, January 2020

Pages: 107 - 112

Network Optimization using Multi-Agent Genetic Algorithm

Sikandar Hanif


Downloads: 260 | Views: 471

Information Technology, Malaysia, Volume 8 Issue 1, January 2019

Pages: 64 - 70

University of the Future (UotF): Redesign Business Model for Local University in Malaysia through Humanising Education and 4IR

Nor Zaiasron Bin Yahaya, Abdul Rahman Bin Ahmad Dahlan


Downloads: 254 | Views: 418

Information Technology, India, Volume 9 Issue 1, January 2020

Pages: 477 - 479

IoT Based Smart Street Light for Energy Efficiency and Safety

Tanmay Patil, Arjun Ramendra


Top