Percolate And M Supremacy User Walls By Using Pfw

Abstract

Users have attraction about on social networks they are ready to keep in touch with his/her friends by seesawing different information of meta data. Now a day social networks have more privacy and security problems and they are allowing un trustable matters on users space. That type unwanted messages disturb the walls of osn users and these type of messages will not be not blocked trusted users.so we are introduced a novel and superlative technology in our proposed method.In this paper we blocked undesired messages form walls. To propose experimental and decided an automated system, called Purified Filtered Wall (PFW), able to purely filter unwanted messages from OSN user walls. And the consistency of the system in terms of purified filtering options is amplify and magnetic techniques through the management of PFW. The proposed system gives security and privacy to the On-line Social Networks.

Authors and Affiliations

Katamaneni. Madhavi| Department of CST, Velagapudi Ramakrishna Siddhartha Engineering College, Vijayawada, Katikitala. Anush Chaitanya| student of M.Tech (C.S.T) and Department of CST, Velagapudi Ramakrishna Siddhartha Engineering College, Vijayawada

Keywords

Related Articles

Internet of Things (IoTs): Applications in Home Automation

Over the last decade in the field of science & technology, the internet has made significant impact in our economies & societies by bringing in remarkable communication & networking infrastructure. In continuation wi...

A review of Data Mining Techniques Using in Big Data

The term Big Data comprises largevolume, complex, growing data sets with multiple, autonomous sources. With the fast development of networking, data storage, and the data collection capacity, Big Data are now rapidly...

Huddling For Anonymization Of Compacted And Disseminated Public Systems

Social network: a social structure consists of nodes and ties. Noes are the individual actors within the networks May be different kinds May have attributes, labels or classes Ties are the relationships between the a...

Protected data retrieval System using CP-ABE for decentralized Tolerant Networks (DTNs) where many key authorities manage their attributes separately

The Hostile Military situations like war zone and antagonistic systems work in specially appointed mode and they endure confined system network. Arrangement of Disruption-tolerant systems (DTN) improves the network b...

Efficient IP Trace back Mechanism for Identifying IP Spoofers

is well known that aggressors or spoofers may utilize fake source IP address to hide their genuine areas from victims. So, to catch these spoofers a number of techniques for tracing IP address have been proposed .But...

Download PDF file
  • EP ID EP16386
  • DOI -
  • Views 322
  • Downloads 12

How To Cite

Katamaneni. Madhavi, Katikitala. Anush Chaitanya (2014). Percolate And M Supremacy User Walls By Using Pfw. International Journal of Science Engineering and Advance Technology, 2(11), 759-762. https://europub.co.uk/articles/-A-16386