Open Access   Article Go Back

Predicting Unwanted Conversation in Online Social Networks

S. Pauline Priya1 , L. Jayasimman2 , P. Nithya3

Section:Research Paper, Product Type: Journal Paper
Volume-06 , Issue-02 , Page no. 389-392, Mar-2018

Online published on Mar 31, 2018

Copyright © S. Pauline Priya, L. Jayasimman, P. Nithya . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. Pauline Priya, L. Jayasimman, P. Nithya, “Predicting Unwanted Conversation in Online Social Networks,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.389-392, 2018.

MLA Style Citation: S. Pauline Priya, L. Jayasimman, P. Nithya "Predicting Unwanted Conversation in Online Social Networks." International Journal of Computer Sciences and Engineering 06.02 (2018): 389-392.

APA Style Citation: S. Pauline Priya, L. Jayasimman, P. Nithya, (2018). Predicting Unwanted Conversation in Online Social Networks. International Journal of Computer Sciences and Engineering, 06(02), 389-392.

BibTex Style Citation:
@article{Priya_2018,
author = {S. Pauline Priya, L. Jayasimman, P. Nithya},
title = {Predicting Unwanted Conversation in Online Social Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2018},
volume = {06},
Issue = {02},
month = {3},
year = {2018},
issn = {2347-2693},
pages = {389-392},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=272},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=272
TI - Predicting Unwanted Conversation in Online Social Networks
T2 - International Journal of Computer Sciences and Engineering
AU - S. Pauline Priya, L. Jayasimman, P. Nithya
PY - 2018
DA - 2018/03/31
PB - IJCSE, Indore, INDIA
SP - 389-392
IS - 02
VL - 06
SN - 2347-2693
ER -

           

Abstract

Social network platforms have hastily changed the way that people communicate and interact. They have enabled the establishment of, and participation in, digital communities as well as the representation, documentation and exploration of social relationships. We believe that as ‘apps’ become more sophisticated, it will happen to easier for users to share their own services, resources and data via social networks. One essential topic in today On-line Social Networks (OSNs) is to give users the ability to control the messages post on their own confidential space to avoid that unnecessary content is displayed. Up to nowadays OSNs present modest sustain to this requirement. To fill the gap, in this paper, we suggest a system allowing OSN users to have a direct control on the messages posted on their walls. This is reach during a flexible rule-based scheme, that allow users to adapt the filtering criterion to be practical to their walls, and a Machine Learning base soft classifier instinctively category messages in bear of content-based filtering. Index Terms—On-line Social Networks, Information Filtering, Short Text Classification, Policy-based Personalization The key findings of this work demonstrate how social networks can be leveraged in the construction of cloud computing infrastructures and how resources can be due in the occurrence of user sharing preferences.

Key-Words / Index Term

Social Netowrk

References

[1] B. Wang, G. Chen, L. Fu, L. Song, and X. Wang, “Drimux: Dynamic rumor influence minimization with user experience in social networks,” in Proc. 30th AAAI Int. Conf. Artif. Intell., Feb. 2016.
[2] D. N. Yang, H. J. Hung, W. C. Lee, and W. Chen, “Maximizing acceptance probability for active friending in online social networks,” in Proc. 19th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2013, pp. 713–721.
[3] J. Leskovec, L. A. Adamic, and B. A. Huberman, “The dynamics oviral marketing,” in Proc. 7th ACM Conf. Electronic Commerce, 2006, pp. 228–237.
[4] A. McCallum, A. Corrada-Emmanuel, and X. Wang, “Topic and role discovery in social networks,” in Proc. 19th Int. Joint Conf. Artif. Intell., 2005, pp. 786–791.
[5] M. E. J. Newman, “The structure of scientific collaboration networks,” in Proceedings of National Academy of Science, 2001, pp. 404–409.
[6] L. Fu, W. Huang, X. Gan, F. Yang, and X. Wang, “Capacity of wireless networks with social characteristics,” IEEE Trans. Wireless Commun., vol. 15, pp. 1505–1516, Feb. 2016.
[7] A. Montanari and A. Saberi, “The spread of innovations in social networks,” in Proc. National Academy of Sciences of the United States of America PNAS, Aug. 2010, pp. 20 196–20 201.
[8] X. Rong and Q. Mei, “Diffusion of innovations revisited: From social network to innovation network,” in Proc. 22Nd ACM Int. Conf. Inf. Knowl. Manag., 2013, pp. 499–508.
[9] C. Budak, D. Agrawal, and A. E. Abbadi, “Limiting the spread of misinformation in social networks,” in Proc. 20th Int. Conf. World Wide Web, 2011, pp. 665–674.
[10] A. Bessi, F. Petroni, M. Del Vicario, F. Zollo, A. Anagnostopoulos, A. Scala, G. Caldarelli, and W. Quattrociocchi, “Viral misinformation: The role of homophily and polarization,” in Proc. 24th Int.
Conf. World Wide Web, 2015, pp. 355–356.
[11] E. Serrano, C. A. Iglesias, and M. Garijo, “A novel agent-based rumor spreading model in twitter,” in Proc. 24th Int. Conf. World Wide Web, 2015, pp. 811–814.
[12] S. Fiegerman, “Facebook, google, twitter accused of enabling isis,” http://money.cnn.com/2016/12/20/technology/twitterfacebook- google-lawsuit-isis, 2016.
[13] Facebook, “Facebook community standards,” https://www.facebook.com/communitystandards.
[14] D. Kempe, J. Kleinberg, and E. Tardos, “Maximizing the spread of influence through a social network,” in Proc. 9th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2003, pp. 1175–1180.
[15] W. Chen, C.Wang, and Y.Wang, “Scalable influence maximization
for prevalent viral marketing in large-scale social networks,” in
Proc. 16th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2010, pp. 1029–1038