Informational Retrieval Using Crawler & Protecting Social Networking Data from Information leakage

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 4

Abstract

 Abstract: Online social networks, such as Facebook, Twitter, Yahoo!, Google+ are utilized by many people. These networks allow users to publish details about themselves and to connect to their friends. Some of the information revealed inside these networks is meant to be private or public. Yet it is possible to use learning algorithms on released data to predict private or public information and use the classification algorithm on the collected data. In this paper, we explore how to get social networking data to predict information. We then devise possible classification techniques that could be used in various situations. Then, we explore the effectiveness of these techniques and attempt to use. We collect the different information from the users groups. On which we concluded the classification of that data. By using the various algorithms we can predict information of users. Crawler programs for current profile work. We constructed a spider that crawls & indexes FACBOOK. In this paper we focus on crawler programs that proved to be an effective tool of data base.In this paper we elaborate the use of data mining technique to help retailers to identify user profile for a retail store and improved. The aim is to judge the accuracy of different data mining algorithms on various data sets. The performance analysis depends on many factors encompassing test mode, different nature of data sets, and size of data set

Authors and Affiliations

S. S. Wangikar , S. N. Deshmukh

Keywords

Related Articles

 Client Based System on Wireless Sensor Network for Efficient Packet Transmission

Abstract : Wireless sensor networks are vulnerable to the node distributor dividend, and several distributed protocols has been transfer the data in secure .Where MD5 algorithm that implements adaptive TTL, piggybacking,...

 Survey of Machine Learning Techniques in Textual Document  Classification

 Classification of Text Document points towards associating one or more predefined categories based on the likelihood expressed by the training set of labeled documents. Many machine learning algorithms plays &nbs...

 Holistic and Procedural Features for Authenticating Users

 Security systems help to protect machines or sensitive data from unauthorized users. The need for better and cheap security systems is growing with the growth in technologies and hacking skills of the people. Var...

 Modeling and Threshold Sensitivity Analysis of Computer VirusEpidemic

 Abstract: This paper analyzed the methods and techniques used in mathematical modeling of biologicalepidemics to the domain of information technology. A new epidemic model has been proposed byincorporating a range...

 Abstraction and Automation: A Software Design Approach forDeveloping Secure Data Management Application.

 Abstract: Security plays a vital role in data management application. For this purpose while developing, threedifferent views of applications are modeled namely conceptual, security and GUI model. It formalizes the...

Download PDF file
  • EP ID EP88695
  • DOI 10.9790/0661-16433949
  • Views 104
  • Downloads 0

How To Cite

S. S. Wangikar, S. N. Deshmukh (2014).  Informational Retrieval Using Crawler & Protecting Social Networking Data from Information leakage. IOSR Journals (IOSR Journal of Computer Engineering), 16(4), 39-49. https://europub.co.uk/articles/-A-88695