Informational Retrieval Using Crawler & Protecting Social Networking Data from Information leakage
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 4
Abstract
Abstract: Online social networks, such as Facebook, Twitter, Yahoo!, Google+ are utilized by many people. These networks allow users to publish details about themselves and to connect to their friends. Some of the information revealed inside these networks is meant to be private or public. Yet it is possible to use learning algorithms on released data to predict private or public information and use the classification algorithm on the collected data. In this paper, we explore how to get social networking data to predict information. We then devise possible classification techniques that could be used in various situations. Then, we explore the effectiveness of these techniques and attempt to use. We collect the different information from the users groups. On which we concluded the classification of that data. By using the various algorithms we can predict information of users. Crawler programs for current profile work. We constructed a spider that crawls & indexes FACBOOK. In this paper we focus on crawler programs that proved to be an effective tool of data base.In this paper we elaborate the use of data mining technique to help retailers to identify user profile for a retail store and improved. The aim is to judge the accuracy of different data mining algorithms on various data sets. The performance analysis depends on many factors encompassing test mode, different nature of data sets, and size of data set
Authors and Affiliations
S. S. Wangikar , S. N. Deshmukh
Ab-Initio Protein Tertiary Structure Prediction Using Genetic Algorithm
Abstract : Proteins are vital components of all living cells and play a critical role in almost all biological processes. Protein structure identification is a significant challenging problem in computational biology. Th...
Development of Virtual Computing Lab Using Private Cloud
Abstract: Virtual Computing Lab (VCL) is a very effective answer for the educational institution to meet the increasing demand of physical machines, different computational laboratories and large number of users in alimi...
Simulation of ONVIF Network Devices Using JAVA
Abstract : In today’s world, cross platform integration of application plays important role to achieve economic viability and usability of the product. This paper describes technical details of the successfully implement...
RKO Technique for Color Visual Cryptography
Abstract : To maintain the secrecy and confidentiality of images two different approaches are being followed, Image Encryption and Visual Cryptography. The former being encrypting the images through encryption algo...
Web Server for Remote Monitoring and Control
Abstract: This paper presents an implementation of a platform independent embedded web server and itsintegration into a network of wireless sensor nodes. The embedded web server is designed and built as anexpansion...