Face Location - A Novel Approach to Post the User global Location

Similar documents
Digital Image Processing for Camera Application in Mobile Devices Using Artificial Neural Networks

On Demand Web Services with Quality of Service

Selection of Web Services using Service Agent: An optimized way for the selection of Non-functional requirements

An Algorithm for Generating New Mandelbrot and Julia Sets

Location Based Spatial Query Processing In Wireless System

Document Image Binarization Using Post Processing Method

Dynamic Instruction Scheduling For Microprocessors Having Out Of Order Execution

SQL Based Paperless Examination System

Harvesting Image Databases from The Web

Numerical solution of Fuzzy Hybrid Differential Equation by Third order Runge Kutta Nystrom Method

Bandwidth Recycling using Variable Bit Rate

Control Theory and Informatics ISSN (print) ISSN (online) Vol 2, No.1, 2012

Computer Engineering and Intelligent Systems ISSN (Paper) ISSN (Online) Vol.5, No.4, 2014

A Heuristic Based Multi-Objective Approach for Network Reconfiguration of Distribution Systems

Survey on Wireless Intelligent Video Surveillance System Using Moving Object Recognition Technology

A File System Level Snapshot In Ext4

A Deadlock Free Routing Algorithm for Torus Network

Two-stage Interval Time Minimization Transportation Problem with Capacity Constraints

The Fast Fourier Transform Algorithm and Its Application in Digital Image Processing

Video Calling Over Wi-Fi Network using Android Phones

Mobile Ad hoc Networks Dangling issues of optimal path. strategy

Numerical Flow Simulation using Star CCM+

Modeling of Piecewise functions via Microsoft Mathematics: Toward a computerized approach for fixed point theorem

A Novel Method to Solve Assignment Problem in Fuzzy Environment

A Novel Approach for Imputation of Missing Value Analysis using Canopy K-means Clustering

An Analysis of Researcher Network Evolution on the Web

Differential Evolution Biogeography Based Optimization for Linear Phase Fir Low Pass Filter Design

On Mobile Cloud Computing in a Mobile Learning System

Computer Engineering and Intelligent Systems ISSN (Paper) ISSN (Online) Vol 3, No.2, 2012 Cyber Forensics in Cloud Computing

Clustering Algorithm for Files and Data in Cloud (MMR Approach)

Root cause detection of call drops using feedforward neural network

A Novel Technique for Controlling CNC Systems

Gn-Dtd: Innovative Way for Normalizing XML Document

Design and Simulation of Wireless Local Area Network for Administrative Office using OPNET Network Simulator: A Practical Approach

Offering an Expert Electronic Roll Call and Teacher Assessment System Based on Mobile Phones for Higher Education

MSGI: MySQL Graphical Interface

An FPGA based Efficient Fruit Recognition System Using Minimum Distance Classifier

Algorithm for Classification

Fuzzy k-c-means Clustering Algorithm for Medical Image. Segmentation

Secure Transactions using Wireless Networks

Information and Knowledge Management ISSN (Paper) ISSN X (Online) Vol 2, No.2, 2012

Recursive Visual Secret Sharing Scheme using Fingerprint. Authentication

Social Media Tools. March 13, 2010 Presented by: Noble Studios, Inc.

Dynamic Load Balancing By Scheduling In Computational Grid System

TERM BASED WEIGHT MEASURE FOR INFORMATION FILTERING IN SEARCH ENGINES

3D- Discrete Cosine Transform For Image Compression

Discovery services: next generation of searching scholarly information

Overview of Web Mining Techniques and its Application towards Web

Overview. Data-mining. Commercial & Scientific Applications. Ongoing Research Activities. From Research to Technology Transfer

Modelling of a Sequential Low-level Language Program Using Petri Nets

WEB SEARCH, FILTERING, AND TEXT MINING: TECHNOLOGY FOR A NEW ERA OF INFORMATION ACCESS

Audio Compression Using DCT and DWT Techniques

Rainfall-runoff modelling of a watershed

Astrium Accelerates Research and Design with IHS Goldfire

Deep Web Crawling and Mining for Building Advanced Search Application

Remotely Sensed Image Processing Service Automatic Composition

Data Curation Profile Human Genomics

IJMIE Volume 2, Issue 9 ISSN:

PREDICTION OF POPULAR SMARTPHONE COMPANIES IN THE SOCIETY

DATA MINING II - 1DL460. Spring 2014"

WEB PAGE RE-RANKING TECHNIQUE IN SEARCH ENGINE

Query Optimization to Improve Performance of the Code Execution

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Efficient Retrieval of Web Services Using Prioritization and Clustering

Lukáš Plch at Mendel university in Brno

Website Vulnerability to Session Fixation Attacks

Improving the Efficiency of Fast Using Semantic Similarity Algorithm

Application of Light Weight Directory Access Protocol to Information Services Delivery in Nigerian Tertiary Institutions Libraries

Security at the Digital Cocktail Party. Social Networking meets IAM

Trusted Profile Identification and Validation Model

A Probabilistic Data Encryption scheme (PDES)

Step 1: Open browser to navigate to the data science challenge home page

Introduction April 27 th 2016

Performance study of Association Rule Mining Algorithms for Dyeing Processing System

Taccumulation of the social network data has raised

Demystifying Scopus APIs

SciVerse Scopus. Date: 21 Sept, Coen van der Krogt Product Sales Manager Presented by Andrea Kmety

CATEGORIZATION OF THE DOCUMENTS BY USING MACHINE LEARNING

Modelling Structures in Data Mining Techniques

Multi-class Multi-label Classification and Detection of Lumbar Intervertebral Disc Degeneration MR Images using Decision Tree Classifiers

CATALOG 2017/2018 BINUS UNIVERSITY. Cyber Security. Introduction. Vision. Mission

History and Backgound: Internet & Web 2.0

Design of A Mobile Phone Data Backup System

A Cultivated Differential Evolution Algorithm using modified Mutation and Selection Strategy

Development of an Ontology-Based Portal for Digital Archive Services

Hello, I m Melanie Feltner-Reichert, director of Digital Library Initiatives at the University of Tennessee. My colleague. Linda Phillips, is going

Data Mining of Web Access Logs Using Classification Techniques

How to Use Google Scholar An Educator s Guide

Semantic Web Mining and its application in Human Resource Management

Internet Resources - Data Bases and Search Tools. Module 7

Information Push Service of University Library in Network and Information Age

Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating

THE UIGARDEN PROJECT: A BILINGUAL WEBZINE Christina Li, Eleanor Lisney, Sean Liu UiGarden.net

Open Research Online The Open University s repository of research publications and other research outputs

THEORY AND PRACTICE OF CLASSIFICATION

Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation

ANALYSIS COMPUTER SCIENCE Discovery Science, Volume 9, Number 20, April 3, Comparative Study of Classification Algorithms Using Data Mining

Chapter 2 BACKGROUND OF WEB MINING

Featured Archive. Saturday, February 28, :50:18 PM RSS. Home Interviews Reports Essays Upcoming Transcripts About Black and White Contact

A Survey of Model Used for Web User s Browsing Behavior Prediction

Transcription:

Face Location - A Novel Approach to Post the User global Location Venkata Ramana Adari Department of Computer Science & Engineering, Chaitanya Engineering College Visakhapatnam,AP, India Tel: +919948319984 E-mail: prof_ramana@yahoo.com Dr.Ch.Diwakar Department of Computer Science & Engineering, Visakha Institute of Engineering &Technology Visakhapatnam,AP, India Tel: +919848105876 E-mail: divakar_c@yahoo.com Dr.P.Suresh Varma Department of Computer Science, Aadikavi Nannayya University, Rajahmundry,AP, India Tel: +919848105876 E-mail: vermaps@yahool.com Abstract Today Web users are facing the problems of information overload on the World Wide Web which stores vast source of data. As a result, how to provide Web users with more exactly needed information is becoming a critical issue in web based information. People populate more information on Social Network Sites as their profile data and etc. Now a days most of the users have accounts in social network sites. In this paper we are discussing the popular document classifiers to find the location of a user in the social networking sites,in this paper we make use of the profile data and other information to achieve the objective of RRR which is to give Right information to the Right set of People at Right Time In this paper, we present Supervised learning a method to cascade the decision tree learning methods in classifying locations of the users posted in a social network site. Keywords Supervised Learning, Web mining,social networks, Decision tree, facebook. I. Introduction 1.1 Web Mining Web mining aims to extract useful knowledge from the web and it is a rapid growing research area. It consists of Web usage mining, Web structure mining, and Web content mining. Web usage mining refers to the discovery of user access patterns from Web usage logs. Web structure mining tries to discover useful knowledge from the structure of hyperlinks. Web content mining aims to mine useful information or knowledge from web page contents. Web content mining is related to data mining because many data mining techniques can be applied in Web content mining. It is related to text mining because much of the web contents are texts. However, it is also quite different from data mining because Web data are mainly semi-structured and/or unstructured, while data mining deals primarily with structured data. Web content mining is also different from text mining because of the semi-structure nature of the Web, while text mining focuses on unstructured texts. Web content mining thus requires creative applications of data mining techniques and also its own unique approaches. 1.2 Social Networking and Facebook Users share a variety of information about themselves on their Facebook profiles, including photos,contact information, location,interested movies,books etc. It is very clear to understand that people are using social network sites such as Facebook,Twitter,,Myspace etc..as there is a broad demographic on these sites. Mainly social net working sites are used for personal reasons and sharing the information with many people.the other uses are business,marketing,entertainment etc. Facebook uses server-side Hypertext Preprocesser (PHP) scripts and applications to host and format the content available on the service. Content is stored centrally on Facebook servers. Scripts and applications at Facebook 34 P a g e

get, process, and filter information on demand, and deliver it to users in real time, to a Web browser over the Internet.. II. SECTION 2.1. Survey on Uses of Face Book: Facebook was reported to have more than 21 million registered users generating billion page views each day by 2007. The site integrated into media daily practices typical user spends about 20 minutes a day on the site and other users log in at least once a day Capitalizing on its success among college students and employees, Facebook launched a high school version in past September 2005. In 2008, the company introduced communities for commercial organizations; as of November 2008, almost 32,000 organizations had Facebook [8] directories (Smith, 2008). In 2008, Facebook was used at over 4,000 United States colleges and was the seventh most popular site on the World Wide Web with respect to total page views Most of the existing academic research on Facebook has focused on identity presentation and privacy concerns looking at the amount of information Facebook participants provide about themselves, the relatively open nature of the information, and the lack of privacy controls enacted by the users, Gross and Acquisti (2005) argue that users may be putting themselves at risk both offline (e.g., stalking) and online (e.g., identify theft). In contrast to popular press coverage which has primarily focused on negative outcomes of Facebook use stemming from users misconceptions about the nature of their online audience, we are interested in situations in which the intended audience for the profile such as well-meaning peers and friends and the actual audience are aligned. We use Facebook as a research context in order to determine whether offline social capital can be generated by online tools. 2.2. Related Issues on Social Networks: First recognizable social network site launched in 1997 introducing the Orkut.com users to create profiles, list their Friends and, beginning in 1998, surf the Friends lists. Each of these features existed in some form before orkut, of course. Profiles existed on most major dating sites and many community sites. AIM and ICQ buddy lists supported lists of Friends, although those Friends were not visible to others. Classmates.com allowed people to affiliate with their high school or college and [9] surf the network for others who were also affiliated, but users could not create profiles or list of Friends until years later. Orkut was the first to combine these features. Orkut promoted itself as a tool to help people connect with and send messages to others. While Orkut attracted millions of users, it failed to become a sustainable business and, in 2000, the service closed. Looking back, its founder believes that Orkut was simply ahead of its time, personal communication by jul2007. While people were already flocking to the Internet, most did not have extended networks of friends who were online. Early adopters complained that there was little to do after accepting Friend requests, and most users were not interested in meeting strangers. From 1997 to 2001, a number of community tools began supporting various combinations of profiles and publicly articulated Friends. Many users allowed to create personal, professional, and business profiles users could identify Friends on their personal profiles without seeking approval for those connections. Likewise, shortly [9] after its launch in In particular, the people behind Ryze, Tribe.net, LinkedIn, and Friendster were tightly entwined personally, business and professionally. They believed that they could support each other without competing. In the end, Ryze never acquired mass popularity, Tribe.net grew to attract a passionate niche user base, LinkedIn became a powerful business service, and Friendster became the most significant, if only as "one of the biggest disappointments in Internet history" 35 P a g e

Figure 1 shows the timeline of the social network sites when it was created In the Friendster, MySpace, and Facebook, three key SNSs that shaped the business, cultural, and research landscape. Don't talk to invisible strangers. New York Times. Retrieved III. SECTION 3. Problem Definition: People populate a lot more information on social network sites as their profile data and etc. Now, almost every Internet user has an account in social network sites. and they spend a significant part of time in browsing in social networks. Our thesis is an attempt to take the above facts as benefits and provides correct information to users to reach their needs at right time. Figure 2 Example screen of facebook Our proposed solution analysis aims to capture the user profile in facebook and post the data into locations such as India,UK,US and their hierarchy of states and so on.to implement this solution we consider that a data mining technique supervised learning. IV. SECTION 4. Usage of Mining Algorithms to post the data in facebook: 36 P a g e

Machine learning is a scientific discipline that is concerned with the design and development of algorithms that allow computers to learn based on data, such as from sensor data or databases. A major focus of machine learning research is to automatically learn to recognize complex patterns and make intelligent decisions based on data. Hence, machine learning is closely related to fields such as statistics, probability theory, data mining, pattern recognition, artificial intelligence, adaptive control, and theoretical computer science. 4.1.Decision Tree: Decision tree rules provide model transparency so that a business user, marketing analyst, or business analyst can understand the basis of the model's predictions, and therefore, be comfortable acting on them and explaining them to others Decision Tree does not support nested tables. Decision Tree Models can be converted to XML. Several algorithms in Decision trees are mention below 4.2. ID3 Decision Tree Iterative Dichotomiser is an algorithm to generate a decision tree invented by Ross Quinlan, based on Occam s razor. It prefers smaller decision trees(simpler theories) over larger ones. However it does not always produce smallest tree, and therefore heuristic. The decision tree is used by the concept of Information Entropy. The ID3 Algorithm steps are: 1)Take all unused attributes and count their entropy concerning test samples 2) Choose attribute for which entropy is maximum 3)Make node containing that attribute ID3 (Examples, Target _ Attribute, Attributes) Create a root node for the tree If all examples are positive, Return the single-node tree Root, with label = +. If all examples are negative, Return the single-node tree Root, with label = -. If number of predicting attributes is empty, then Return the single node tree Root, with label = most common value of the target attribute in the examples. Otherwise Begin A = The Attribute that best classifies examples. Decision Tree attribute for Root = A. For each possible value, v i, of A, Add a new tree branch below Root, corresponding to the test A = v i. Let Examples(v i ), be the subset of examples that have the value v i for A If Examples(v i ) is empty common target value in the examples Else below this new branch add the sub tree ID3 (Examples(v i ), Target_ Attribute, Attributes {A} End Return Root V. Conclusion In this paper a general supervised for classifying user location was described. The specific approaches of the implementation of location datasets posting system learning are characterized, we developed the ID3 decision tree method is based on cascading machine learning techniques the ID3 decision trees. The ID3 decision tree build on each dataset learns the sub classifies within the data and partitions the decision space into classification regions; there by improving the system classification performance. Our future direction is to utilize the geographic location of the user so that we can send useful information to the users based on their interests so that we can do effective e-business and other advertisements etc. based on the interest of the user. References S. Ghita, W. Nejdl, and R. Paiu. Semantically rich recommendations in social networks for sharing, exchanging and ranking semantic context. In Proc. ISWC05, 2005. J. Golbeck and B. Parsia. Trust network-based filtering of aggregated claims. International Journal of Metadata, Semantics and Ontologies, 2006. P. Massa and P. Avesani. Controversial users demand local trust metrics: an experimental study on epinions.com community. In Proc. AAAI-05, 2005. Y. Matsuo, M. Hamasaki, H. Takeda, J. Mori, D. Bollegala, Y. Nakamura T. Nishimura, K. Hasida, and M. Ishizuka. Spinning multiple social networks for semantic web. In Proc. AAAI- 06, 2006. 37 P a g e

P. Mika. Ontologies are us: A unified model of social networks and semantics. In Proc. ISWC2005, 2005. J. Mori, M. Ishizuka, T. Sugiyama, and Y. Matsuo. Real-world oriented information sharing using social networks. In Proc. ACM GROUP 05, 2005. July 21, 2007 from http://www.nytimes.com/2006/03/09/fashion/thursdaystyles/09parents.html Barnes, S. (2006). A privacy paradox: Social networking in the United States. First Monday, 11 (9). Retrieved September 8, 2007 from http://www.firstmonday.org/issues/issue11_9/barnes/index.htm Romero, C., Ventura, S. Educational Data Mining: a Survey from 1995 to 2005. Expert Systems with Applications, 2007, 33(1), pp.135-146. Yudelson, M.V., Medvedeva, O., Legowski, E., Castine, M., Jukic, D., Rebecca, C. Mining Student Learning Data to Develop High Level Pedagogic Strategy in a Medical ITS. AAAI Workshop on Educational Data Mining, 2006. pp.1-8. Piatetsky-Shapiro, G. (1991), Discovery, analysis, and presentation of strong rules, in G. Piatetsky- Shapiro & W. J. Frawley, eds, Knowledge Discovery in Databases, AAAI/MIT Press, Cambridge, MA. 38 P a g e

This academic article was published by The International Institute for Science, Technology and Education (IISTE). The IISTE is a pioneer in the Open Access Publishing service based in the U.S. and Europe. The aim of the institute is Accelerating Global Knowledge Sharing. More information about the publisher can be found in the IISTE s homepage: http:// The IISTE is currently hosting more than 30 peer-reviewed academic journals and collaborating with academic institutions around the world. Prospective authors of IISTE journals can find the submission instruction on the following page: http:///journals/ The IISTE editorial team promises to the review and publish all the qualified submissions in a fast manner. All the journals articles are available online to the readers all over the world without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. Printed version of the journals is also available upon request of readers and authors. IISTE Knowledge Sharing Partners EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library, NewJour, Google Scholar