SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 599
RULE BASED MESSEGE FILTERING AND BLACKLIST
MANAGEMENT FOR ONLINE SOCIAL NETWORK
V.Ezhilvani1
, K.Malathi2
, R.Nedunchelian3
1
Department of Computer Science and Engineering, Saveetha University, Chennai, India
2
Department of Computer Science and Engineering, Saveetha University, Chennai, India
3
Department of Computer Science and Engineering, Saveetha University, Chennai, India
Abstract
Online social network which play a most imperative role in today’s world, but the major issue in online social network is
displaying undesirable content in user walls. Main involvement of this paper is to propose an automated system to automatically
filter the undesirable messages for online social network user walls using content based filtering .so, that the user can able to
control directly the message which has been posted on their walls. In content based filtering the information item is been selected
based on correlation between the content of the item and the user preferences.
Keywords: Social network, machine learning techniques, blacklist management
--------------------------------------------------------------------***------------------------------------------------------------------
1. INTRODUCTION
Today online social network become most popular
interactive medium to communicate with people and, share
considerable amount of information and also gaining new
friends over the internet. More than 300 social networking
sites have common features in existence. The basic feature
of social network is the ability to create and share a personal
profile. This profile page includes a photo, and some basic
personal information such as name, age, sex, location. Most
of the social networks on the Internet also let you post
videos, photos, and personal blogs on your profile page. One
of the most important features of online social networks is to
find and make friends with other site members. These
friends also appear as links, so visitors can easily browse
your online friend network. According to face book statistics
1million link, 2millon friends are requested, 3million
messages have been send for every 20 minutes on face book.
The content present in social network is constituted by short
text, and the notable example is the messages written by
Online Social Network users on particular private or public
areas, known as general walls. Proposing an automated
system, to filter undesired comments from online social
network is the aim of the present work. This is named as,
Filtered Wall (FW).In previous work the wall owner does
not have the control of their own private area and this
shows there is no content based preferences. Therefore it is
not possible to prevent unwanted messages such as political
or vulgar once. To fill this gap, In proposed system ,user
specify what are the contents not to be displayed on his or
her walls by providing certain set of filtering rules .Thus, the
present idea support content based preferences ,that is the
user have the direct control of their walls. This is can be
done using Machine Learning (ML) text categorization
procedure .And, this ML have the capability to
automatically assign with each messages as a set of
categories based on contents. And, also using the blacklist
management to control the message posted on user walls
2. PROBLEM DEFINITION
Today most of the people splurge more time in social
network sites such as Face book, twitter, LinkedIn, Google
plus etc…And the major issue in social network is user does
not have a control over their walls because it does not
support content based preferences .Therefore it is not
possible to prevent undesired messages such as political or
vulgar ones which is posted on the private space of the
users. Likewise, huge volumes of data are extracted and
posted to the social sites, so it becomes a sophisticated task
to social network management. Most of the proposal is
mainly focus on providing a classification mechanism to
avoid useless data.
3. PROPOSED SYSTEM
The main focus of this paper is to develop a system for
online social network user to prevent unwanted messages
based on content given by the user. And, also using the
machine learning system to provide the flexible way to
control the incoming messages. Enforce blacklist rule to
avoid unwanted messages from unauthorized users to keep
the wall secure.
The three layer architecture in the below fig 1.In this three
layer, first layer shows the social network manager, second
layer shows the social network application and finally
graphical user interface.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 600
Fig 1: Filter wall system architecture
In the above Fig 1 first layer called social network manager
which is used to provide the basic online social network
functionalities that is the user profile and the relationship
between the managements. Proposed system is placed in the
second layer called as social network application in that it
perform content based message filtering and short text
classification based on the user profile. User interacts with
the system through graphical user interface and this will
manage the filter wall and blacklist management which is
present in the social network application layer. Moreover,
GUI provides a filter wall that is the wall will publish only
the message that is authorized according to the filtering rule.
The main components of the proposed system are content
based filtering and short text classification. And the system
makes use of blacklist management to improve the filtering
actions. This blacklist is used to prevent unwanted messages
from undesired users .so that the system can able to decide
whose are user can enter into the blacklist and how long the
message can present inside the blacklist.
4. METHODLOGY
The main focus of this paper is to avoid and filter unwanted
messages from online social network; this is supported by
content based filtering and short text classifier.
4.1 Content Based Filtering
Assume that content based filtering user can operate
independently, and the result shows that the information
selected based on the correlation between the content of the
item and user preferences. The information selected is
textual in nature so it makes use of text classification.
Content based filtering is present in the second layer in our
proposed work called as social network application layer
.This filter focus on filtering the short text messages rather
than wide range of topics. And this content based filtering
fully based on machine learning paradigm.
4.2 Short Text Classifier
In our approach the short text classifier is called as multi
class soft classification process and this process is composed
of two phases called as text representation and machine
learning based classification.
4.2.1 Text Representation
Extracting the particular features from a given set of
information is critical task; this will affect the entire
performance feature of classification. For our work we have
taken two features such as bag of words and document
property from literature[2].Text representation is called as
vector model [3] in which text document is represented as
𝑑j and the real weight of the 𝑑𝑗 = 𝑤1𝑗, … . , 𝑤𝑇𝑗 t is the set
of term that occur at least once from the collection of
documents 𝑇𝑟 and 𝑤𝑘𝑗𝜖 0; 1 represent 𝑡kcontribute to
document 𝑑𝑗.in back of words the terms are indentified with
the help of words. In case of non binary weight 𝑤𝑘𝑗,
document 𝑑𝑗 is computed according to the Inverse
Document Frequency weighting function in literature[9] is
defined as
𝑡𝑓 − 𝑖𝑑𝑓 𝑡𝑘, 𝑑𝑗 = #(𝑡𝑘, 𝑑𝑗). log
|𝑇𝑟|
#𝑇𝑟(𝑡𝑘)
Where #(𝑡𝑘, 𝑑𝑗)denotes the number of times 𝑡k occur in
document 𝑑𝑗 and #𝑇𝑟(𝑡k) denote document
frequency𝑡𝑘.document property is adopted by collecting the
correct words, bad words, capital words, punctuation
character, exclamation marks etc.
Correct Words: This can be expressed in terms of 𝑡𝑘 ∈T∩
𝐾, where 𝑡𝑘 is the term of document 𝑑𝑗, and k denotes the
known words.
Bad Words: This can be computed same as correct words
feature, where here K denote the bad words
Capital Words: This will denote the amount of words used
capital letters in the document and calculate the percentage
for the capital words. For example document containing the
word GOOD Work (here GOOD is capitalized and Work is
not capitalized) percentage can be calculated according to
the capital letter given in the document.
Punctuation Characters: This can be calculated by the
ratio of total number of punctuation character in the message
by total number of characters in the message. For example
the documents contain the message as hi!!!How are you? is
4/15.
Exclamation Marks: calculated by the ratio between the
total numbers of exclamation marks in the message by total
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 601
number of punctuation characters in the message. For
example consider Hello!!What doing? Is 2/3
Question Marks: this can be calculated by the ratio
between total numbers of question mark in the message by
total number of punctuation character in the message. For
example consider hi “Where are you?” is ½
4.2.2 Machine Learning Technique
In previous section we have discussed about shot text
classification and it is called as hierarchical two level
processes and it is named as first level and second level. In
first level messages are classified as neutral and non-neutral.
Second level partitions the non neutral messages. To
understand the machine learning technique let us consider
M1 and M2 as first level and second level classifier and y1
be the neutral class. The machine learning works as follows:
1. Let Mi be the message and it is processed such that
xi vector is extracted from the feature. Consider
two sets such as 𝑇𝑟𝑆𝑑 and 𝑇𝑒𝑆𝑑 are transformed
into 𝑇𝑟𝑆 = 𝑥𝑖, 𝑦𝑖 , . . , 𝑥 𝑇𝑟𝑆𝐷 , 𝑦 𝑇𝑟𝑆𝐷 and
TeS= 𝑥𝑖, 𝑦𝑖 , … , 𝑥 𝑇𝑒𝑆𝐷 , 𝑦 𝑇𝑒𝑆𝑑 .
2. Binary set is created for message M1 as𝑇𝑟𝑆1 =
{(𝑥𝑖, 𝑦𝑗)𝜖𝑇𝑟𝑆| 𝑥𝑖, 𝑦𝑗 , 𝑦𝑗 = 𝑦𝑗1}.
3. Multi class set is created for message M2 as
𝑇𝑟𝑆2 = {(𝑥𝑗, 𝑦𝑗)𝜖𝑇𝑟𝑆| 𝑥𝑗, 𝑦𝑗 , 𝑦𝑗𝑘 = 𝑦𝑗𝑘 + 1, 𝑘 =
2 … . . , |Ω|}
4. To find whether the message is neural are non
neutral for the message M1 is trained with TrS1
and Then the performance of message M1 is
evaluated using TeS1
5. Performance of the M2 is evaluated using TeS2.for
this message M2 is trained with Non neural TrS2
message.
5. IMPLEMENTATION
Our proposed system is implemented to avoid unwanted
messages from unauthorized users using blacklist and filter
rule.
5.1 Blacklist Management
Blacklist rule is used to avoid unwanted messages created
by the unauthorized users. This is the mechanism which is
managed by the system, such that the system may able to
decide who are users enter into the blacklist and how long
the message can be present in the system. That is the wall
owner must decide who are the users enter into his/her
private wall and how long they present in the wall. The wall
owner must specify the blacklist rules. This blacklist
management will block the users based on the user profiles
and the relationship in the online social networks such that
the wall owner key entity to identify the users.
5.2 Filtering Rule
Filtering rule is defined as the author or creator who
specifies the rules for example suppose rajev is an online
social network user and he always wants to avoid the high
vulgar messages. And rajev want to filter only the message
coming from indirect friends and not for the direct friends.
This can be done using filtering rule as follows:
((rajev, friendof, 1,1),(vulgar,0.60),block)
((rajev, friend of, 1,0.3),(vulgar,0.70,block)
The values given in the above examples are trust value 0.60
and 0.70.if the friend of rajev with the trust value of 0.60
wants to publish the message as “h*v*ng *x*”on rajev’s
private wall. After posting this message it will produce the
grade value as 0.65 for the class vulgar message. Therefore,
the message that containing huge degrees of vulgar content
will be filtered from the system and the filtered message will
not display in the user private wall. Hence, it reduces the
unwanted content and improves the performance of the
system. Moreover, filtering rule is the action performed by
the system on the message to satisfy the rule.
5.3 Enhancement of Filtering Wall
 When the user wants to post a message on a private
wall, he/she tries to enter into a wall and the user
tries to post messages on the private wall but it is
intercepted by the filter wall
 Secondly machine learning text classifier is used to
extract the metadata from the given content of
messages.
 Then the filter wall make use of this metadata
which is provided by the short text classifier and
along with the data extracted from the user profile
by enforcing the blacklist rule and filtering rule.
 The filter walls publish or block the message
depending on the result of previous step.
6. RESULTS AND DISCUSSION
The values of unwanted content such as neutral, non–
netural, violence and vulgar are determined based on the
first level and second level category of the message.
Fig 2: Test values for first and second level messages
0%
50%
100%
150%
200%
250%
300%
Average
Level 2
Level 1
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 602
Where set of classes such as neutral and non neutral belongs
to first level, violence and vulgar belongs to second level of
messages. And it is denoted by Ω= {𝑛𝑒𝑢𝑡𝑟𝑎𝑙, 𝑛𝑜𝑛 −
𝑛𝑒𝑢𝑡𝑟𝑎𝑙, 𝑣𝑖𝑜𝑙𝑒𝑛𝑐𝑒, 𝑣𝑢𝑙𝑔𝑎𝑟.
The above fig 2 shows the test result of first level and
second level for neutral, non-neutral, violence and vulgar
messages.
7. CONCLUSIONS
In this paper we have proposed a Filter wall to filter
unwanted messages from online social network private
walls. And we make use of blacklist management and
filtering rule to provide rules to the system. Blacklist rule is
used to avoid unwanted messages created by the
unauthorized users. This is the mechanism which is
managed by the system, such that the system may able to
decide who are users enter into the blacklist and how long
the message can be present in the system. So, we can avoid
unauthorized person and we can keep our private wall
secure.
REFERENCES
[1]. Macro Vanetti,Elisabetta Binaghi,Elena Ferrari,Barbana
Carminati and Moreno Carullo”A system to filter unwanted
messages from OSN user walls.” , IEEE Transaction on
knowledge and data Engineering,Feb2013
[2]. Carullo,M.Binaghi,E.Gallo “ An Online document
clustering technique for short web contents.In:Pattern
Recongnition letters”(july 2009)
[3]. manning .c, Raghavan.P,Schite.h”Introduction to
information retrieval”(2008)
[4]. M.Chau and H.Chen,” A Machine learning approach to
web page filtering using content and structure analysis “,
decision support system(2008)
[5]. R.J.Mooney and L.Roy ,”Content –based book
recommending using learning for text
categorization”,ACMConf.Digital Libraries(2000)
[6]. A.Adomavicius and G.Tuzhilin,”Towards the next
generation of recommender systems,”IEEE
Trans.Knowledge and Data eng (june 2005)
[7]. Sebastiani, F: Machine learning in automated text
categorization.ACM Computing Surveys34(1),(2002)
[8]. N.J.Belkin and W.B.Croft,”Information filtering and
information retrieval:Two sides of the same coin?”
comm..ACM(1992)
[9]. Salton.g,Buckley.c”Term – Weighting approaches in
automatic text retrieval.Information processing and
management(1988)

Weitere ähnliche Inhalte

Was ist angesagt?

seminar on To block unwanted messages _from osn
seminar on To block  unwanted  messages _from osnseminar on To block  unwanted  messages _from osn
seminar on To block unwanted messages _from osnShailesh kumar
 
USER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCHUSER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCHijmpict
 
A system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user wallsA system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user wallsIEEEFINALYEARPROJECTS
 
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnIJSRD
 
A system to filter unwanted messages from the
A system to filter unwanted messages from theA system to filter unwanted messages from the
A system to filter unwanted messages from theMadan Golla
 
Semantic Massage Addressing based on Social Cloud Actor's Interests
Semantic Massage Addressing based on Social Cloud Actor's InterestsSemantic Massage Addressing based on Social Cloud Actor's Interests
Semantic Massage Addressing based on Social Cloud Actor's InterestsCSCJournals
 
Stabilization of Black Cotton Soil with Red Mud and Formulation of Linear Reg...
Stabilization of Black Cotton Soil with Red Mud and Formulation of Linear Reg...Stabilization of Black Cotton Soil with Red Mud and Formulation of Linear Reg...
Stabilization of Black Cotton Soil with Red Mud and Formulation of Linear Reg...IRJET Journal
 
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...IOSR Journals
 
An iac approach for detecting profile cloning
An iac approach for detecting profile cloningAn iac approach for detecting profile cloning
An iac approach for detecting profile cloningIJNSA Journal
 
Smart detection of offensive words in social media using the soundex algorith...
Smart detection of offensive words in social media using the soundex algorith...Smart detection of offensive words in social media using the soundex algorith...
Smart detection of offensive words in social media using the soundex algorith...IJECEIAES
 
IRJET- Suspicious Email Detection System
IRJET- Suspicious Email Detection SystemIRJET- Suspicious Email Detection System
IRJET- Suspicious Email Detection SystemIRJET Journal
 
Indonesian language email spam detection using N-gram and Naïve Bayes algorithm
Indonesian language email spam detection using N-gram and Naïve Bayes algorithmIndonesian language email spam detection using N-gram and Naïve Bayes algorithm
Indonesian language email spam detection using N-gram and Naïve Bayes algorithmjournalBEEI
 
APPLICATION OF CLUSTERING TO ANALYZE ACADEMIC SOCIAL NETWORKS
APPLICATION OF CLUSTERING TO ANALYZE ACADEMIC SOCIAL NETWORKSAPPLICATION OF CLUSTERING TO ANALYZE ACADEMIC SOCIAL NETWORKS
APPLICATION OF CLUSTERING TO ANALYZE ACADEMIC SOCIAL NETWORKSIJwest
 
Prediction of User Rare Sequential Topic Patterns of Internet Users
Prediction of User Rare Sequential Topic Patterns of Internet UsersPrediction of User Rare Sequential Topic Patterns of Internet Users
Prediction of User Rare Sequential Topic Patterns of Internet UsersIRJET Journal
 
IRJET- Post Summarization and Text Classification in Social Networking Sites
IRJET- Post Summarization and Text Classification in Social Networking SitesIRJET- Post Summarization and Text Classification in Social Networking Sites
IRJET- Post Summarization and Text Classification in Social Networking SitesIRJET Journal
 

Was ist angesagt? (19)

seminar on To block unwanted messages _from osn
seminar on To block  unwanted  messages _from osnseminar on To block  unwanted  messages _from osn
seminar on To block unwanted messages _from osn
 
USER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCHUSER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCH
 
ONLINE SOCIAL NETWORK
ONLINE SOCIAL NETWORKONLINE SOCIAL NETWORK
ONLINE SOCIAL NETWORK
 
A system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user wallsA system to filter unwanted messages from osn user walls
A system to filter unwanted messages from osn user walls
 
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osn
 
A system to filter unwanted messages from the
A system to filter unwanted messages from theA system to filter unwanted messages from the
A system to filter unwanted messages from the
 
Semantic Massage Addressing based on Social Cloud Actor's Interests
Semantic Massage Addressing based on Social Cloud Actor's InterestsSemantic Massage Addressing based on Social Cloud Actor's Interests
Semantic Massage Addressing based on Social Cloud Actor's Interests
 
Stabilization of Black Cotton Soil with Red Mud and Formulation of Linear Reg...
Stabilization of Black Cotton Soil with Red Mud and Formulation of Linear Reg...Stabilization of Black Cotton Soil with Red Mud and Formulation of Linear Reg...
Stabilization of Black Cotton Soil with Red Mud and Formulation of Linear Reg...
 
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
 
An iac approach for detecting profile cloning
An iac approach for detecting profile cloningAn iac approach for detecting profile cloning
An iac approach for detecting profile cloning
 
Cb4301449454
Cb4301449454Cb4301449454
Cb4301449454
 
B1803020915
B1803020915B1803020915
B1803020915
 
Smart detection of offensive words in social media using the soundex algorith...
Smart detection of offensive words in social media using the soundex algorith...Smart detection of offensive words in social media using the soundex algorith...
Smart detection of offensive words in social media using the soundex algorith...
 
IRJET- Suspicious Email Detection System
IRJET- Suspicious Email Detection SystemIRJET- Suspicious Email Detection System
IRJET- Suspicious Email Detection System
 
Indonesian language email spam detection using N-gram and Naïve Bayes algorithm
Indonesian language email spam detection using N-gram and Naïve Bayes algorithmIndonesian language email spam detection using N-gram and Naïve Bayes algorithm
Indonesian language email spam detection using N-gram and Naïve Bayes algorithm
 
APPLICATION OF CLUSTERING TO ANALYZE ACADEMIC SOCIAL NETWORKS
APPLICATION OF CLUSTERING TO ANALYZE ACADEMIC SOCIAL NETWORKSAPPLICATION OF CLUSTERING TO ANALYZE ACADEMIC SOCIAL NETWORKS
APPLICATION OF CLUSTERING TO ANALYZE ACADEMIC SOCIAL NETWORKS
 
Prediction of User Rare Sequential Topic Patterns of Internet Users
Prediction of User Rare Sequential Topic Patterns of Internet UsersPrediction of User Rare Sequential Topic Patterns of Internet Users
Prediction of User Rare Sequential Topic Patterns of Internet Users
 
IRJET- Post Summarization and Text Classification in Social Networking Sites
IRJET- Post Summarization and Text Classification in Social Networking SitesIRJET- Post Summarization and Text Classification in Social Networking Sites
IRJET- Post Summarization and Text Classification in Social Networking Sites
 
E017433538
E017433538E017433538
E017433538
 

Andere mochten auch

Multi agent paradigm for cognitive parameter based feature similarity for soc...
Multi agent paradigm for cognitive parameter based feature similarity for soc...Multi agent paradigm for cognitive parameter based feature similarity for soc...
Multi agent paradigm for cognitive parameter based feature similarity for soc...eSAT Publishing House
 
Preliminary study of multi view imaging for accurate
Preliminary study of multi view imaging for accuratePreliminary study of multi view imaging for accurate
Preliminary study of multi view imaging for accurateeSAT Publishing House
 
Process design features of a 5 tonnesday multi – stage, intermittent drainage...
Process design features of a 5 tonnesday multi – stage, intermittent drainage...Process design features of a 5 tonnesday multi – stage, intermittent drainage...
Process design features of a 5 tonnesday multi – stage, intermittent drainage...eSAT Publishing House
 
Behavior of r.c.c. beam with rectangular opening
Behavior of r.c.c. beam with rectangular openingBehavior of r.c.c. beam with rectangular opening
Behavior of r.c.c. beam with rectangular openingeSAT Publishing House
 
Experimenal investigation of performance and
Experimenal investigation of performance andExperimenal investigation of performance and
Experimenal investigation of performance andeSAT Publishing House
 
Devlopement of the dynamic resistance measurement (drm) method for condition ...
Devlopement of the dynamic resistance measurement (drm) method for condition ...Devlopement of the dynamic resistance measurement (drm) method for condition ...
Devlopement of the dynamic resistance measurement (drm) method for condition ...eSAT Publishing House
 
Migration of application schema to windows azure
Migration of application schema to windows azureMigration of application schema to windows azure
Migration of application schema to windows azureeSAT Publishing House
 
Intelligent two axis dual-ccd image-servo shooting platform design
Intelligent two axis dual-ccd image-servo shooting platform designIntelligent two axis dual-ccd image-servo shooting platform design
Intelligent two axis dual-ccd image-servo shooting platform designeSAT Publishing House
 
A multilevel security scheme using chaos based
A multilevel security scheme using chaos basedA multilevel security scheme using chaos based
A multilevel security scheme using chaos basedeSAT Publishing House
 
Computerized spoiled tomato detection
Computerized spoiled tomato detectionComputerized spoiled tomato detection
Computerized spoiled tomato detectioneSAT Publishing House
 
View and illumination invariant iterative based image
View and illumination invariant iterative based imageView and illumination invariant iterative based image
View and illumination invariant iterative based imageeSAT Publishing House
 
Research issues and priorities in the field of
Research issues and priorities in the field ofResearch issues and priorities in the field of
Research issues and priorities in the field ofeSAT Publishing House
 
Maintenance performance metrics for manufacturing industry
Maintenance performance metrics for manufacturing industryMaintenance performance metrics for manufacturing industry
Maintenance performance metrics for manufacturing industryeSAT Publishing House
 
Road signs walking among shapes and colors
Road signs walking among shapes and colorsRoad signs walking among shapes and colors
Road signs walking among shapes and colorseSAT Publishing House
 
Survey on software remodularization techniques
Survey on software remodularization techniquesSurvey on software remodularization techniques
Survey on software remodularization techniqueseSAT Publishing House
 
Smart grid cost optimization using genetic algorithm
Smart grid cost optimization using genetic algorithmSmart grid cost optimization using genetic algorithm
Smart grid cost optimization using genetic algorithmeSAT Publishing House
 
Productivity improvement through lean deployment &
Productivity improvement through lean deployment &Productivity improvement through lean deployment &
Productivity improvement through lean deployment &eSAT Publishing House
 
Development of kinetic model for adsorption of
Development of kinetic model for adsorption ofDevelopment of kinetic model for adsorption of
Development of kinetic model for adsorption ofeSAT Publishing House
 
Experimental behavior of circular hsscfrc filled steel
Experimental behavior of circular hsscfrc filled steelExperimental behavior of circular hsscfrc filled steel
Experimental behavior of circular hsscfrc filled steeleSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 

Andere mochten auch (20)

Multi agent paradigm for cognitive parameter based feature similarity for soc...
Multi agent paradigm for cognitive parameter based feature similarity for soc...Multi agent paradigm for cognitive parameter based feature similarity for soc...
Multi agent paradigm for cognitive parameter based feature similarity for soc...
 
Preliminary study of multi view imaging for accurate
Preliminary study of multi view imaging for accuratePreliminary study of multi view imaging for accurate
Preliminary study of multi view imaging for accurate
 
Process design features of a 5 tonnesday multi – stage, intermittent drainage...
Process design features of a 5 tonnesday multi – stage, intermittent drainage...Process design features of a 5 tonnesday multi – stage, intermittent drainage...
Process design features of a 5 tonnesday multi – stage, intermittent drainage...
 
Behavior of r.c.c. beam with rectangular opening
Behavior of r.c.c. beam with rectangular openingBehavior of r.c.c. beam with rectangular opening
Behavior of r.c.c. beam with rectangular opening
 
Experimenal investigation of performance and
Experimenal investigation of performance andExperimenal investigation of performance and
Experimenal investigation of performance and
 
Devlopement of the dynamic resistance measurement (drm) method for condition ...
Devlopement of the dynamic resistance measurement (drm) method for condition ...Devlopement of the dynamic resistance measurement (drm) method for condition ...
Devlopement of the dynamic resistance measurement (drm) method for condition ...
 
Migration of application schema to windows azure
Migration of application schema to windows azureMigration of application schema to windows azure
Migration of application schema to windows azure
 
Intelligent two axis dual-ccd image-servo shooting platform design
Intelligent two axis dual-ccd image-servo shooting platform designIntelligent two axis dual-ccd image-servo shooting platform design
Intelligent two axis dual-ccd image-servo shooting platform design
 
A multilevel security scheme using chaos based
A multilevel security scheme using chaos basedA multilevel security scheme using chaos based
A multilevel security scheme using chaos based
 
Computerized spoiled tomato detection
Computerized spoiled tomato detectionComputerized spoiled tomato detection
Computerized spoiled tomato detection
 
View and illumination invariant iterative based image
View and illumination invariant iterative based imageView and illumination invariant iterative based image
View and illumination invariant iterative based image
 
Research issues and priorities in the field of
Research issues and priorities in the field ofResearch issues and priorities in the field of
Research issues and priorities in the field of
 
Maintenance performance metrics for manufacturing industry
Maintenance performance metrics for manufacturing industryMaintenance performance metrics for manufacturing industry
Maintenance performance metrics for manufacturing industry
 
Road signs walking among shapes and colors
Road signs walking among shapes and colorsRoad signs walking among shapes and colors
Road signs walking among shapes and colors
 
Survey on software remodularization techniques
Survey on software remodularization techniquesSurvey on software remodularization techniques
Survey on software remodularization techniques
 
Smart grid cost optimization using genetic algorithm
Smart grid cost optimization using genetic algorithmSmart grid cost optimization using genetic algorithm
Smart grid cost optimization using genetic algorithm
 
Productivity improvement through lean deployment &
Productivity improvement through lean deployment &Productivity improvement through lean deployment &
Productivity improvement through lean deployment &
 
Development of kinetic model for adsorption of
Development of kinetic model for adsorption ofDevelopment of kinetic model for adsorption of
Development of kinetic model for adsorption of
 
Experimental behavior of circular hsscfrc filled steel
Experimental behavior of circular hsscfrc filled steelExperimental behavior of circular hsscfrc filled steel
Experimental behavior of circular hsscfrc filled steel
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 

Ähnlich wie Rule based messege filtering and blacklist management for online social network

Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkeSAT Publishing House
 
A system to filter unwanted messages
A system to filter unwanted messagesA system to filter unwanted messages
A system to filter unwanted messagesNinad Samel
 
Iaetsd hierarchical fuzzy rule based classification
Iaetsd hierarchical fuzzy rule based classificationIaetsd hierarchical fuzzy rule based classification
Iaetsd hierarchical fuzzy rule based classificationIaetsd Iaetsd
 
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnIJSRD
 
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...IRJET Journal
 
IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social str...
IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social str...IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social str...
IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social str...IEEEFINALYEARSTUDENTPROJECTS
 
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...IEEEFINALYEARSTUDENTPROJECT
 
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...IEEEMEMTECHSTUDENTSPROJECTS
 
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster WarningIRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster WarningIRJET Journal
 
Local Service Search Engine Management System LSSEMS
Local Service Search Engine Management System LSSEMSLocal Service Search Engine Management System LSSEMS
Local Service Search Engine Management System LSSEMSYogeshIJTSRD
 
Improvement in the usability of gis based services by
Improvement in the usability of gis based services byImprovement in the usability of gis based services by
Improvement in the usability of gis based services byeSAT Publishing House
 
Current trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networksCurrent trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networkseSAT Publishing House
 
Experimental of vectorizer and classifier for scrapped social media data
Experimental of vectorizer and classifier for scrapped social media dataExperimental of vectorizer and classifier for scrapped social media data
Experimental of vectorizer and classifier for scrapped social media dataTELKOMNIKA JOURNAL
 
A survey on ontology based web personalization
A survey on ontology based web personalizationA survey on ontology based web personalization
A survey on ontology based web personalizationeSAT Publishing House
 
A survey on ontology based web personalization
A survey on ontology based web personalizationA survey on ontology based web personalization
A survey on ontology based web personalizationeSAT Journals
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...ijtsrd
 
IRJET- Review on the Simple Text Messages Classification
IRJET- Review on the Simple Text Messages ClassificationIRJET- Review on the Simple Text Messages Classification
IRJET- Review on the Simple Text Messages ClassificationIRJET Journal
 
Suspicious Email Detection
Suspicious Email DetectionSuspicious Email Detection
Suspicious Email DetectionSuraj Kumar
 
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...Rick Vogel
 

Ähnlich wie Rule based messege filtering and blacklist management for online social network (20)

D0351020025
D0351020025D0351020025
D0351020025
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social network
 
A system to filter unwanted messages
A system to filter unwanted messagesA system to filter unwanted messages
A system to filter unwanted messages
 
Iaetsd hierarchical fuzzy rule based classification
Iaetsd hierarchical fuzzy rule based classificationIaetsd hierarchical fuzzy rule based classification
Iaetsd hierarchical fuzzy rule based classification
 
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osn
 
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
 
IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social str...
IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social str...IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social str...
IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social str...
 
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
 
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
 
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster WarningIRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster Warning
 
Local Service Search Engine Management System LSSEMS
Local Service Search Engine Management System LSSEMSLocal Service Search Engine Management System LSSEMS
Local Service Search Engine Management System LSSEMS
 
Improvement in the usability of gis based services by
Improvement in the usability of gis based services byImprovement in the usability of gis based services by
Improvement in the usability of gis based services by
 
Current trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networksCurrent trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networks
 
Experimental of vectorizer and classifier for scrapped social media data
Experimental of vectorizer and classifier for scrapped social media dataExperimental of vectorizer and classifier for scrapped social media data
Experimental of vectorizer and classifier for scrapped social media data
 
A survey on ontology based web personalization
A survey on ontology based web personalizationA survey on ontology based web personalization
A survey on ontology based web personalization
 
A survey on ontology based web personalization
A survey on ontology based web personalizationA survey on ontology based web personalization
A survey on ontology based web personalization
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
 
IRJET- Review on the Simple Text Messages Classification
IRJET- Review on the Simple Text Messages ClassificationIRJET- Review on the Simple Text Messages Classification
IRJET- Review on the Simple Text Messages Classification
 
Suspicious Email Detection
Suspicious Email DetectionSuspicious Email Detection
Suspicious Email Detection
 
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...
 

Mehr von eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 
Disaster recovery sustainable housing
Disaster recovery sustainable housingDisaster recovery sustainable housing
Disaster recovery sustainable housingeSAT Publishing House
 

Mehr von eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 
Disaster recovery sustainable housing
Disaster recovery sustainable housingDisaster recovery sustainable housing
Disaster recovery sustainable housing
 

Kürzlich hochgeladen

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 

Kürzlich hochgeladen (20)

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 

Rule based messege filtering and blacklist management for online social network

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 599 RULE BASED MESSEGE FILTERING AND BLACKLIST MANAGEMENT FOR ONLINE SOCIAL NETWORK V.Ezhilvani1 , K.Malathi2 , R.Nedunchelian3 1 Department of Computer Science and Engineering, Saveetha University, Chennai, India 2 Department of Computer Science and Engineering, Saveetha University, Chennai, India 3 Department of Computer Science and Engineering, Saveetha University, Chennai, India Abstract Online social network which play a most imperative role in today’s world, but the major issue in online social network is displaying undesirable content in user walls. Main involvement of this paper is to propose an automated system to automatically filter the undesirable messages for online social network user walls using content based filtering .so, that the user can able to control directly the message which has been posted on their walls. In content based filtering the information item is been selected based on correlation between the content of the item and the user preferences. Keywords: Social network, machine learning techniques, blacklist management --------------------------------------------------------------------***------------------------------------------------------------------ 1. INTRODUCTION Today online social network become most popular interactive medium to communicate with people and, share considerable amount of information and also gaining new friends over the internet. More than 300 social networking sites have common features in existence. The basic feature of social network is the ability to create and share a personal profile. This profile page includes a photo, and some basic personal information such as name, age, sex, location. Most of the social networks on the Internet also let you post videos, photos, and personal blogs on your profile page. One of the most important features of online social networks is to find and make friends with other site members. These friends also appear as links, so visitors can easily browse your online friend network. According to face book statistics 1million link, 2millon friends are requested, 3million messages have been send for every 20 minutes on face book. The content present in social network is constituted by short text, and the notable example is the messages written by Online Social Network users on particular private or public areas, known as general walls. Proposing an automated system, to filter undesired comments from online social network is the aim of the present work. This is named as, Filtered Wall (FW).In previous work the wall owner does not have the control of their own private area and this shows there is no content based preferences. Therefore it is not possible to prevent unwanted messages such as political or vulgar once. To fill this gap, In proposed system ,user specify what are the contents not to be displayed on his or her walls by providing certain set of filtering rules .Thus, the present idea support content based preferences ,that is the user have the direct control of their walls. This is can be done using Machine Learning (ML) text categorization procedure .And, this ML have the capability to automatically assign with each messages as a set of categories based on contents. And, also using the blacklist management to control the message posted on user walls 2. PROBLEM DEFINITION Today most of the people splurge more time in social network sites such as Face book, twitter, LinkedIn, Google plus etc…And the major issue in social network is user does not have a control over their walls because it does not support content based preferences .Therefore it is not possible to prevent undesired messages such as political or vulgar ones which is posted on the private space of the users. Likewise, huge volumes of data are extracted and posted to the social sites, so it becomes a sophisticated task to social network management. Most of the proposal is mainly focus on providing a classification mechanism to avoid useless data. 3. PROPOSED SYSTEM The main focus of this paper is to develop a system for online social network user to prevent unwanted messages based on content given by the user. And, also using the machine learning system to provide the flexible way to control the incoming messages. Enforce blacklist rule to avoid unwanted messages from unauthorized users to keep the wall secure. The three layer architecture in the below fig 1.In this three layer, first layer shows the social network manager, second layer shows the social network application and finally graphical user interface.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 600 Fig 1: Filter wall system architecture In the above Fig 1 first layer called social network manager which is used to provide the basic online social network functionalities that is the user profile and the relationship between the managements. Proposed system is placed in the second layer called as social network application in that it perform content based message filtering and short text classification based on the user profile. User interacts with the system through graphical user interface and this will manage the filter wall and blacklist management which is present in the social network application layer. Moreover, GUI provides a filter wall that is the wall will publish only the message that is authorized according to the filtering rule. The main components of the proposed system are content based filtering and short text classification. And the system makes use of blacklist management to improve the filtering actions. This blacklist is used to prevent unwanted messages from undesired users .so that the system can able to decide whose are user can enter into the blacklist and how long the message can present inside the blacklist. 4. METHODLOGY The main focus of this paper is to avoid and filter unwanted messages from online social network; this is supported by content based filtering and short text classifier. 4.1 Content Based Filtering Assume that content based filtering user can operate independently, and the result shows that the information selected based on the correlation between the content of the item and user preferences. The information selected is textual in nature so it makes use of text classification. Content based filtering is present in the second layer in our proposed work called as social network application layer .This filter focus on filtering the short text messages rather than wide range of topics. And this content based filtering fully based on machine learning paradigm. 4.2 Short Text Classifier In our approach the short text classifier is called as multi class soft classification process and this process is composed of two phases called as text representation and machine learning based classification. 4.2.1 Text Representation Extracting the particular features from a given set of information is critical task; this will affect the entire performance feature of classification. For our work we have taken two features such as bag of words and document property from literature[2].Text representation is called as vector model [3] in which text document is represented as 𝑑j and the real weight of the 𝑑𝑗 = 𝑤1𝑗, … . , 𝑤𝑇𝑗 t is the set of term that occur at least once from the collection of documents 𝑇𝑟 and 𝑤𝑘𝑗𝜖 0; 1 represent 𝑡kcontribute to document 𝑑𝑗.in back of words the terms are indentified with the help of words. In case of non binary weight 𝑤𝑘𝑗, document 𝑑𝑗 is computed according to the Inverse Document Frequency weighting function in literature[9] is defined as 𝑡𝑓 − 𝑖𝑑𝑓 𝑡𝑘, 𝑑𝑗 = #(𝑡𝑘, 𝑑𝑗). log |𝑇𝑟| #𝑇𝑟(𝑡𝑘) Where #(𝑡𝑘, 𝑑𝑗)denotes the number of times 𝑡k occur in document 𝑑𝑗 and #𝑇𝑟(𝑡k) denote document frequency𝑡𝑘.document property is adopted by collecting the correct words, bad words, capital words, punctuation character, exclamation marks etc. Correct Words: This can be expressed in terms of 𝑡𝑘 ∈T∩ 𝐾, where 𝑡𝑘 is the term of document 𝑑𝑗, and k denotes the known words. Bad Words: This can be computed same as correct words feature, where here K denote the bad words Capital Words: This will denote the amount of words used capital letters in the document and calculate the percentage for the capital words. For example document containing the word GOOD Work (here GOOD is capitalized and Work is not capitalized) percentage can be calculated according to the capital letter given in the document. Punctuation Characters: This can be calculated by the ratio of total number of punctuation character in the message by total number of characters in the message. For example the documents contain the message as hi!!!How are you? is 4/15. Exclamation Marks: calculated by the ratio between the total numbers of exclamation marks in the message by total
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 601 number of punctuation characters in the message. For example consider Hello!!What doing? Is 2/3 Question Marks: this can be calculated by the ratio between total numbers of question mark in the message by total number of punctuation character in the message. For example consider hi “Where are you?” is ½ 4.2.2 Machine Learning Technique In previous section we have discussed about shot text classification and it is called as hierarchical two level processes and it is named as first level and second level. In first level messages are classified as neutral and non-neutral. Second level partitions the non neutral messages. To understand the machine learning technique let us consider M1 and M2 as first level and second level classifier and y1 be the neutral class. The machine learning works as follows: 1. Let Mi be the message and it is processed such that xi vector is extracted from the feature. Consider two sets such as 𝑇𝑟𝑆𝑑 and 𝑇𝑒𝑆𝑑 are transformed into 𝑇𝑟𝑆 = 𝑥𝑖, 𝑦𝑖 , . . , 𝑥 𝑇𝑟𝑆𝐷 , 𝑦 𝑇𝑟𝑆𝐷 and TeS= 𝑥𝑖, 𝑦𝑖 , … , 𝑥 𝑇𝑒𝑆𝐷 , 𝑦 𝑇𝑒𝑆𝑑 . 2. Binary set is created for message M1 as𝑇𝑟𝑆1 = {(𝑥𝑖, 𝑦𝑗)𝜖𝑇𝑟𝑆| 𝑥𝑖, 𝑦𝑗 , 𝑦𝑗 = 𝑦𝑗1}. 3. Multi class set is created for message M2 as 𝑇𝑟𝑆2 = {(𝑥𝑗, 𝑦𝑗)𝜖𝑇𝑟𝑆| 𝑥𝑗, 𝑦𝑗 , 𝑦𝑗𝑘 = 𝑦𝑗𝑘 + 1, 𝑘 = 2 … . . , |Ω|} 4. To find whether the message is neural are non neutral for the message M1 is trained with TrS1 and Then the performance of message M1 is evaluated using TeS1 5. Performance of the M2 is evaluated using TeS2.for this message M2 is trained with Non neural TrS2 message. 5. IMPLEMENTATION Our proposed system is implemented to avoid unwanted messages from unauthorized users using blacklist and filter rule. 5.1 Blacklist Management Blacklist rule is used to avoid unwanted messages created by the unauthorized users. This is the mechanism which is managed by the system, such that the system may able to decide who are users enter into the blacklist and how long the message can be present in the system. That is the wall owner must decide who are the users enter into his/her private wall and how long they present in the wall. The wall owner must specify the blacklist rules. This blacklist management will block the users based on the user profiles and the relationship in the online social networks such that the wall owner key entity to identify the users. 5.2 Filtering Rule Filtering rule is defined as the author or creator who specifies the rules for example suppose rajev is an online social network user and he always wants to avoid the high vulgar messages. And rajev want to filter only the message coming from indirect friends and not for the direct friends. This can be done using filtering rule as follows: ((rajev, friendof, 1,1),(vulgar,0.60),block) ((rajev, friend of, 1,0.3),(vulgar,0.70,block) The values given in the above examples are trust value 0.60 and 0.70.if the friend of rajev with the trust value of 0.60 wants to publish the message as “h*v*ng *x*”on rajev’s private wall. After posting this message it will produce the grade value as 0.65 for the class vulgar message. Therefore, the message that containing huge degrees of vulgar content will be filtered from the system and the filtered message will not display in the user private wall. Hence, it reduces the unwanted content and improves the performance of the system. Moreover, filtering rule is the action performed by the system on the message to satisfy the rule. 5.3 Enhancement of Filtering Wall  When the user wants to post a message on a private wall, he/she tries to enter into a wall and the user tries to post messages on the private wall but it is intercepted by the filter wall  Secondly machine learning text classifier is used to extract the metadata from the given content of messages.  Then the filter wall make use of this metadata which is provided by the short text classifier and along with the data extracted from the user profile by enforcing the blacklist rule and filtering rule.  The filter walls publish or block the message depending on the result of previous step. 6. RESULTS AND DISCUSSION The values of unwanted content such as neutral, non– netural, violence and vulgar are determined based on the first level and second level category of the message. Fig 2: Test values for first and second level messages 0% 50% 100% 150% 200% 250% 300% Average Level 2 Level 1
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 602 Where set of classes such as neutral and non neutral belongs to first level, violence and vulgar belongs to second level of messages. And it is denoted by Ω= {𝑛𝑒𝑢𝑡𝑟𝑎𝑙, 𝑛𝑜𝑛 − 𝑛𝑒𝑢𝑡𝑟𝑎𝑙, 𝑣𝑖𝑜𝑙𝑒𝑛𝑐𝑒, 𝑣𝑢𝑙𝑔𝑎𝑟. The above fig 2 shows the test result of first level and second level for neutral, non-neutral, violence and vulgar messages. 7. CONCLUSIONS In this paper we have proposed a Filter wall to filter unwanted messages from online social network private walls. And we make use of blacklist management and filtering rule to provide rules to the system. Blacklist rule is used to avoid unwanted messages created by the unauthorized users. This is the mechanism which is managed by the system, such that the system may able to decide who are users enter into the blacklist and how long the message can be present in the system. So, we can avoid unauthorized person and we can keep our private wall secure. REFERENCES [1]. Macro Vanetti,Elisabetta Binaghi,Elena Ferrari,Barbana Carminati and Moreno Carullo”A system to filter unwanted messages from OSN user walls.” , IEEE Transaction on knowledge and data Engineering,Feb2013 [2]. Carullo,M.Binaghi,E.Gallo “ An Online document clustering technique for short web contents.In:Pattern Recongnition letters”(july 2009) [3]. manning .c, Raghavan.P,Schite.h”Introduction to information retrieval”(2008) [4]. M.Chau and H.Chen,” A Machine learning approach to web page filtering using content and structure analysis “, decision support system(2008) [5]. R.J.Mooney and L.Roy ,”Content –based book recommending using learning for text categorization”,ACMConf.Digital Libraries(2000) [6]. A.Adomavicius and G.Tuzhilin,”Towards the next generation of recommender systems,”IEEE Trans.Knowledge and Data eng (june 2005) [7]. Sebastiani, F: Machine learning in automated text categorization.ACM Computing Surveys34(1),(2002) [8]. N.J.Belkin and W.B.Croft,”Information filtering and information retrieval:Two sides of the same coin?” comm..ACM(1992) [9]. Salton.g,Buckley.c”Term – Weighting approaches in automatic text retrieval.Information processing and management(1988)