slugPrediction of Concealed Information from Social Networks
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 3
Abstract
The online applications like social networks that allow the users to connect each other by different links. The users can update their profile with information of their friends and their private information. Some of their private information has higher possibilities to predict the private information from the user’s information using some learning algorithms. To reduce accuracy of the profile, three refinement techniques are created which is used in various situations and the effectiveness of these techniques are explored. These techniques remove the details and friendship links together. This is the best way to reduce classifier accuracy. This method is probably infeasible in maintaining the use of social networks. Naive Bayes algorithm is used to gives the maximum accuracy that is able to find the classifier of a profile. The objective is to reduce the classifier accuracy, while the details and the friendship links are removed together.
Authors and Affiliations
R. Shiny Jenita, J. A. M. Rexie
Estimation of Conveyance Pace in Urban Environment Using Kalman Algorithm
Vehicle speed is desirable for application such as Driving safety, driving behavior, traffic condition etc. In general if the speed is accurate then the application is said to be effective. In the project, we use Smartp...
Studies on Induction of Mutation in Fenugreek (Trigonella fonum-graecum)
Mutation means a sudden heritable change in the genetic material at the gene on chromosome level. Mutations are the tools used to study the nature and function of genes which are the building blocks and basis of plant g...
A Novel Islanding Detection Method Based On Rate of Change of Reactive Power
Micro-grids usage among consumers has become a new attraction due their several of advantage. Its major function is to ensure the stable operation during the fault and a variety of utility grid disruption. Since the uti...
Sharing Secure Data in the Cloud for the Multiuser Group
The data is stored in the cloud. Storing data should be risky. Cloud provider should be trustful because the data is confidentential. The Group manager keeps the record of group members. The key distribution is done to...
Embeeded Automatic Vehicle Control System Using Voice Recognition On ARM 7 Processor
This paper gives the design and implementation of embedded system for voice recognition in automatic vehicle driving using ARM cortex A7 for physically challenged people. ARM cortex A7 has features such as low power con...