Percolate And M Supremacy User Walls By Using Pfw
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 11
Abstract
Users have attraction about on social networks they are ready to keep in touch with his/her friends by seesawing different information of meta data. Now a day social networks have more privacy and security problems and they are allowing un trustable matters on users space. That type unwanted messages disturb the walls of osn users and these type of messages will not be not blocked trusted users.so we are introduced a novel and superlative technology in our proposed method.In this paper we blocked undesired messages form walls. To propose experimental and decided an automated system, called Purified Filtered Wall (PFW), able to purely filter unwanted messages from OSN user walls. And the consistency of the system in terms of purified filtering options is amplify and magnetic techniques through the management of PFW. The proposed system gives security and privacy to the On-line Social Networks.
Authors and Affiliations
Katamaneni. Madhavi| Department of CST, Velagapudi Ramakrishna Siddhartha Engineering College, Vijayawada, Katikitala. Anush Chaitanya| student of M.Tech (C.S.T) and Department of CST, Velagapudi Ramakrishna Siddhartha Engineering College, Vijayawada
Internet of Things (IoTs): Applications in Home Automation
Over the last decade in the field of science & technology, the internet has made significant impact in our economies & societies by bringing in remarkable communication & networking infrastructure. In continuation wi...
A review of Data Mining Techniques Using in Big Data
The term Big Data comprises largevolume, complex, growing data sets with multiple, autonomous sources. With the fast development of networking, data storage, and the data collection capacity, Big Data are now rapidly...
Huddling For Anonymization Of Compacted And Disseminated Public Systems
Social network: a social structure consists of nodes and ties. Noes are the individual actors within the networks May be different kinds May have attributes, labels or classes Ties are the relationships between the a...
Protected data retrieval System using CP-ABE for decentralized Tolerant Networks (DTNs) where many key authorities manage their attributes separately
The Hostile Military situations like war zone and antagonistic systems work in specially appointed mode and they endure confined system network. Arrangement of Disruption-tolerant systems (DTN) improves the network b...
Efficient IP Trace back Mechanism for Identifying IP Spoofers
is well known that aggressors or spoofers may utilize fake source IP address to hide their genuine areas from victims. So, to catch these spoofers a number of techniques for tracing IP address have been proposed .But...