Efficient Filteration of Unwanted Messages in Social Networking Sites
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 12
Abstract
Social networking sites that facilitate communication of information between users allow users to post messages as an important function. Unnecessary posts could spam a user’s wall, which is the page where posts are displayed, thus disabling the user from viewing relevant messages. TES ensures the “reputation” of reporters by tracking how often the larger recipient community agrees with their assessment of a message. In addition, Trust Evaluation System (TES) uses an automated system of highly-proficient, fingerprinting algorithms. Advanced Message Fingerprinting maintains the privacy of the content and reduces the amount of data to be analyzed. Once a message fingerprint is cataloged as spam, all future messages matching that fingerprint are automatically filtered. Because a reputation-based collaborative system does not draw blanket conclusions about terms, hosts, or people, it has proven to increase accuracy, particularly as it relates to false positives and critical false positives, while simultaneously decreasing administration costs.
Authors and Affiliations
Gunduboina Penchalaiah, Mr. P Jagadeeswara Rao
Conceptualization of Cloud Computing and its Security Threats, Challenges, Technologies and Application
Cloud computing is the utilization of computer resources i.e. hardware and software which are delivered as service over a network. It delivers infrastructure, platform and software (applications) as services, which are...
A Robust But Flexible Privacy Preserving Scheme Supporting Cloud Environments
Fog is the Ruby cloud services library. The fog binary allows quick and easy access to configured cloud services. Whether you need compute, storage, or a multitude of other services, fog provides an accessible entry poi...
Steganography for Secure Communication Using BPCS and HDWT
Steganography is an invisible communication for hiding existence of communicated information bits. In this paper, we propose Steganography for Secure Communication using BPCS and HDWT (SSCBH). The Bit Plane Complexity S...
A Study on Speech Recognition
Among human beings, speech is a primary medium of interaction. Speech is the most natural and easy way of information exchange. As modern devices are aimed to be user friendly, voice interaction with machines is the mos...
Review on Overview of Oracle Operators
SQL set operators allows combine results from two or more SELECT statements. At first sight this looks similar to SQL joins although there is big difference. SQL joins tends to combine columns i.e. with each additionall...