Downloads: 112 | Views: 338
Research Paper | Information Technology | India | Volume 3 Issue 12, December 2014 | Popularity: 6.3 / 10
An Ensemble Classification Technique to Control Unwanted Messages in Online Social Networking
M. Lavanya, S. Subadra
Abstract: Online Social networks are vulnerable to the private data leakage through many data mining algorithm through Relational mining and Classification Algorithm. We explored many problems in preserving the private data of the social networks users and they currently do not provide any mechanism to enforce privacy concerns over data associated with multiple users. To this end, we propose a approach for protection of shared data associated with multiple users in OSNs through the devised sanitation techniques. We formulate an sanitation technique in terms of access control model to capture the essence of multiparty authorization requirements, along with a multiparty policy specification scheme and a policy enforcement mechanism. In additional, we present a logical representation of our access control model which allows us to leverage the features of existing logic solvers to perform various analysis tasks on our model. . Comparison with state-of-the-art data stream classification techniques establishes the effectiveness of the proposed approach
Keywords: Information Retrieval, Data Classification, Outlier Detection, Data extraction, Data filtering
Edition: Volume 3 Issue 12, December 2014
Pages: 1877 - 1881
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 357 | Views: 1000
Information Technology, Ghana, Volume 8 Issue 6, June 2019
Pages: 64 - 69The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana
Abu Sulemana, Yahuza Abdul-Kadir
Downloads: 301 | Views: 558
Information Technology, India, Volume 8 Issue 1, January 2019
Pages: 456 - 460Analysis of Blockchain and its Working Principle
S. Banupriya, G. Renuka Devi
Downloads: 266 | Views: 407
Information Technology, China, Volume 9 Issue 1, January 2020
Pages: 107 - 112Network Optimization using Multi-Agent Genetic Algorithm
Sikandar Hanif
Downloads: 260 | Views: 471
Information Technology, Malaysia, Volume 8 Issue 1, January 2019
Pages: 64 - 70University of the Future (UotF): Redesign Business Model for Local University in Malaysia through Humanising Education and 4IR
Nor Zaiasron Bin Yahaya, Abdul Rahman Bin Ahmad Dahlan
Downloads: 254 | Views: 418
Information Technology, India, Volume 9 Issue 1, January 2020
Pages: 477 - 479IoT Based Smart Street Light for Energy Efficiency and Safety
Tanmay Patil, Arjun Ramendra