SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
www.ijmer.com

International Journal of Modern Engineering Research (IJMER)
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2920-2923
ISSN: 2249-6645

Social Tagging Of Multimedia Content A Model
Abdul Rabbani1, P. U.V. Pavan Kumar2, Dr. Md. Ali Hussain3
1

M.Tech, Dept. of ECE, Sri Sunflower College of Engineering & Technology, A.P., India.
Asst.Professor, Dept. of ECE, Sri Sunflower College of Engineering & Technology, A.P., India.
3
Professor, Dept. of Electronics and Computer Engineering, KL University, Guntur, A.P., India.

2

ABSTRACT: Social networks are very popular now days, as it facilitates search and retrieval of multimedia features.
Anyway, noisy and spam annotations often make it difficult to perform an efficient search. Users may make mistakes in
tagging and irrelevant tags and content may be maliciously added for advertisement or self-promotion. This article examine
recent advances in techniques for combating such noise and spam in social tagging. The trust relationship among users has a
direct impact on the sharing and transmission mode of digital contents. To effectively assess direct or recommended trust
between users, this paper proposed a multimedia social networks trust model based on small world theory. Online and
Internet databases and early websites deployed them as a way for publishers to help users find content.
Keywords: Spam, Multimedia Social Networks, Websites.
I.

INTRODUCTION

When information is exchanged on the Internet, malicious individuals are everywhere, trying to take advantage of
the information exchange structure for their own benefit, while bothering and spamming others. Before social tagging
became popular, spam content was observed in various domains: first in e-mail, and then in Web search networks have been
also influenced by malicious peers, and thus various solutions based on trust and reputation have been proposed, which dealt
with collecting information on peer behavior, scoring and ranking peers, and responding based on the scores . Today, even
blogs are spammed. Ratings in online reputation systems, such as eBay, Amazon, and Epinions, are very similar to tagging
systems and they may face the problem of unfair ratings by artificially inflating or deflating reputations. Several filtering
techniques for excluding unfair ratings are proposed in the literature. Unfortunately, the countermeasures developed for email and Web spam do not directly apply to social networks.

II.

BACKGROUND

Social networks and multimedia content sharing Web sites have become increasingly popular in recent years. Their
service typically focuses on building online communities of people who share interests and activities, or are interested in
exploring the interests and activities of others. At the same time, they have become a popular way to share and disseminate
information. For

Example, users upload their personal photos and share them through online communities, letting other people comment or
rate them.
One important challenge in tagging is to identify the most appropriate tags for given content, and at the same time,
to eliminate noisy or spam tags. The shared content is sometimes assigned with inappropriate tags for several reasons. First
of all, users are human beings and may commit mistakes. Moreover, it is possible to provide wrong tags on purpose for
advertisement, self-promotion, or to increase the rank of a particular tag in automatic search engines. Consequently,
assigning free-form keywords (tags) to multimedia content has a risk that wrong or irrelevant tags eventually prevent users
from the benefits of annotated content.

www.ijmer.com

2920 | Page
www.ijmer.com

International Journal of Modern Engineering Research (IJMER)
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2920-2923
ISSN: 2249-6645

III.

TRUST MODELING

The social network approach to design large-scale systems has significant benefits including scalability, low cost of
ownership, robustness, and ability to provide site autonomy. However, this approach has several drawbacks as well including
trust issues and lack of coordination and control among the peers. We present a trust model for a social network structured
large-scale network computing system and completely define the trust model and describe the schemes used in it. Central to
the model is the idea of maintaining a recommender network that can be used to obtain references about a target domain.
Simulation results indicate that the trust model is capable of building and maintaining trust and also identifying the bad
domains. In a social tagging system, spam or noise can be injected at three different levels: spam content, spam tag-content
association, and spammer. Trust modeling can be performed at each level separately or different levels can be considered
jointly to produce trust models, for example, to assess a user’s reliability, one can consider not only the user profile, but also
the content that the user uploaded to a social system. In this article, we categorize trust modeling approaches into two classes
according to the target of trust, i.e., user and content trust modeling. Presented approaches are sorted based on their
complexity from simple to advanced, separately for both content and user trust models.

IV.

CONTENT TRUST MODELING

Approaches for content trust modeling utilize features extracted from content information, users profiles and/or
associated tags to detect specific spam content. Trust Rank relies on an important empirical observation called approximate
isolation of the good set: good pages seldom point to bad ones. It starts from a set of seeds selected as highly qualified,
credible and popular Web pages in the Web graph, and then iteratively propagates trust scores to all nodes in the graph by
splitting the trust score of a node among its neighbors according to a weighting scheme. Trust Rank effectively removes
most of the spam from the top-scored Web pages however it is unable to effectively separate low-scored good sites from bad
ones, due to the lack of distinguishing features.
Content trust modeling is used to classify content (e.g., Web pages, images, and videos) as spam or legitimate. In
this case, the target of trust is content (resource), and thus a trust score is given to each content based on its content and/or
associated tags. Content trust models reduce the prominence of content likely to be spam, usually in query-based retrieval
results. They try to provide better ordering of the results to reduce the exposure of the spam to users. The administrator can
go a step further and remove all content contributed by the user who posted the incorrect content.

V.

USER TRUST MODELING

The aforementioned studies consider users’ reliability as static at a specific moment. However, a user’s trust in a
social tagging system is dynamic, i.e., it changes over time. The tagging history of a user is better to consider, because a
consistent good behavior of a user in the past can suddenly change by a few mistakes, which consequently ruins his/her trust
in tagging.
In user trust modeling, trust is given to each user based on the information extracted from a user’s account, his/her
interaction with other participants within the social network, and/or the relationship between the content and tags that the
user contributed to the social tagging system. Given a user trust score, the user might be flagged as a legitimate user or
spammer
5.1 EVALUATION
Data sets used for development and evaluation of trust modeling techniques have a wide range of diversity in terms
of content, numbers of resources, tags and users, and type of spam. Some researchers dealing with bookmarks used a public
data set released by BibSonomy as a part of the ECML PKDD Discovery Challenge 2008 on Spam Detection in Social
Bookmarking Systems.
To model trust in other types of tagging systems, where spam is introduced through videos, tweets, or user profiles,
data are usually crawled from the corresponding social network, like YouTube, Twitter, or MySpace, respectively. For
example, Lee et al. [28] collected around 215,000 users and 4 million tweets from Twitter. Since this raw data are missing
ground truth for evaluation, they manually labeled a small portion of users distinguishing between legitimate users,
To model trust in other types of tagging systems, where spam is introduced through videos, tweets, or user profiles, data are
usually crawled from the corresponding social network, like YouTube, Twitter, or MySpace, respectively Since this raw data
are missing ground truth for evaluation, they manually labeled a small portion of users distinguishing between legitimate
users,
5.2 ALGORITHM
Trust modeling can be formulated as either a classification problem or a ranking problem, depending on the way of
treatment. In the classification problem, the results of an algorithm can be summarized by a confusion matrix from groundwww.ijmer.com

2921 | Page
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2920-2923
ISSN: 2249-6645
truth data and predicted labels, which contains the number of true positives, true negatives, false positives, and false
negatives. From these values, classical
measures such as a receiver operating characteristic (ROC), the area under the ROC curve (AUC), precision-recall (PR)
curves, and F-measure can be derived.

VI.

EXPERIMENTAL RESULTS

User profile

Image upload page

Image search page
www.ijmer.com

2922 | Page
www.ijmer.com

International Journal of Modern Engineering Research (IJMER)
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2920-2923
ISSN: 2249-6645

VII.

CONCLUSION AND FUTURE RESEARCH

In this article, we dealt with one of the key issues in social tagging systems: combating noise and spam. We
classified existing studies in the literature into two categories, i.e., content and user trust modeling. Representative
techniques in each category were analyzed and compared. In addition, existing databases and evaluation protocols were re
viewed. An example system was presented to demonstrate how trust modeling can be particularly employed in a popular
application of image sharing and geotagging. Finally, open issues and future research trends were prospected. As online
social networks and content sharing services evolve rapidly, we believe that the research on enhancing reliability and
trustworthiness of such services will become increasingly important

REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]

Wikimedia Foundation Inc. (2011, Dec.). Flickr. [Online]. Available: http://en.wikipedia.org/wiki/Flickr.
Pingdom Blog. (2011, Jan.). Internet 2010 in numbers. [Online]. Available: http://royal.pingdom.com/2011/01/12/internet-2010-innumbers
C. Marlow, M. Naaman, D. Boyd, and M. Davis, ―HT06, tagging paper, taxonomy, Flickr, academic article, to read,‖ in Proc.
ACM HT, Aug. 2006, pp. 31–40.
K. Liu, B. Fang, and Y. Zhang, ―Detecting tag spam in social tagging systems with collaborative knowledge,‖ in Proc. IEEE
FSKD, Aug. 2009, pp. 427–431.
L. S. Kennedy, S.-F. Chang, and I. V. Kozintsev, ―To search or to label?: Predicting the performance of search-based automatic
image classifiers,‖ in Proc.ACM MIR, Oct. 2006, pp. 249–258.
P. Heymann, G. Koutrika, and H. Garcia-Molina, ―Fighting spam on social Web sites: A survey of approaches and future
challenges,‖ IEEE Internet Comput., vol. 11, no. 6, pp. 36–45, Nov. 2007.
L. von Ahn, M. Blum, N. J. Hopper, and J. Langford, ―CAPTCHA: Using hard AI problems for security,‖ in Proc. Eurocrypt, May
2003, pp. 294–311.
L. von Ahn, B. Maurer, C. Mcmillen, D. Abraham, and M. Blum, ―reCAPTCHA: Human-based character recognition via Web
security measures,‖ Science, vol. 321,no. 5895, pp. 1465–1468, Aug. 2008.
Yahoo, Inc. (2011, Dec.). Flickr—Tags. [Online]. Available: http://www.flickr.com/help/tags.
G. Mori and J. Malik, ―Recognizing objects in adversarial clutter: Breaking a visual CAPTCHA,‖ in Proc. IEEE CVPR, June 2003,
pp. I-134–I-141.
M. Sahami, S. Dumais, D. Heckerman, and E. Horvitz, ―A Bayesian approach to filtering junk e-mail,‖ AAAI Workshop on
Learning for Text Categorization,Madison: WI, Tech. Rep. WS-98-05, July 1998.
D. Fetterly, M. Manasse, and M. Najork, ―Spam, damn spam, and statistics:Using statistical analysis to locate spam Web pages,‖ in
Proc. ACM WebDB, June 2004, pp. 1–6.
S. Marti and H. Garcia-Molina, ―Taxonomy of trust: Categorizing P2P reputation systems,‖ Comput. Netw., vol. 50, no. 4, pp.
472–484, Mar. 2006.
A. Thomason, ―Blog spam: A review,‖ in Proc. CEAS, Aug. 2007.

www.ijmer.com

2923 | Page

Contenu connexe

Tendances

762019109
762019109762019109
762019109IJRAT
 
INFO4990_Hossain
INFO4990_HossainINFO4990_Hossain
INFO4990_Hossainwebuploader
 
IJSRED-V2I2P09
IJSRED-V2I2P09IJSRED-V2I2P09
IJSRED-V2I2P09IJSRED
 
An iac approach for detecting profile cloning
An iac approach for detecting profile cloningAn iac approach for detecting profile cloning
An iac approach for detecting profile cloningIJNSA Journal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Predicting tie strength with ego network structures
Predicting tie strength with ego network structuresPredicting tie strength with ego network structures
Predicting tie strength with ego network structuresChristian Schlereth
 
An Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNSAn Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNSIJMER
 
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...IRJET Journal
 
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksMy Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksIRJET Journal
 
IRJET- Fake Profile Identification using Machine Learning
IRJET-  	  Fake Profile Identification using Machine LearningIRJET-  	  Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine LearningIRJET Journal
 
IRJET- Tweet Segmentation and its Application to Named Entity Recognition
IRJET- Tweet Segmentation and its Application to Named Entity RecognitionIRJET- Tweet Segmentation and its Application to Named Entity Recognition
IRJET- Tweet Segmentation and its Application to Named Entity RecognitionIRJET Journal
 

Tendances (18)

762019109
762019109762019109
762019109
 
INFO4990_Hossain
INFO4990_HossainINFO4990_Hossain
INFO4990_Hossain
 
IJSRED-V2I2P09
IJSRED-V2I2P09IJSRED-V2I2P09
IJSRED-V2I2P09
 
An iac approach for detecting profile cloning
An iac approach for detecting profile cloningAn iac approach for detecting profile cloning
An iac approach for detecting profile cloning
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Ijnsa050203
Ijnsa050203Ijnsa050203
Ijnsa050203
 
549 458-465
549 458-465549 458-465
549 458-465
 
Predicting tie strength with ego network structures
Predicting tie strength with ego network structuresPredicting tie strength with ego network structures
Predicting tie strength with ego network structures
 
An Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNSAn Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNS
 
Blogosphere
BlogosphereBlogosphere
Blogosphere
 
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
 
presentation29
presentation29presentation29
presentation29
 
June Documentation
June DocumentationJune Documentation
June Documentation
 
Learning to detect phishing ur ls
Learning to detect phishing ur lsLearning to detect phishing ur ls
Learning to detect phishing ur ls
 
Next generation web
Next generation webNext generation web
Next generation web
 
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksMy Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
 
IRJET- Fake Profile Identification using Machine Learning
IRJET-  	  Fake Profile Identification using Machine LearningIRJET-  	  Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
 
IRJET- Tweet Segmentation and its Application to Named Entity Recognition
IRJET- Tweet Segmentation and its Application to Named Entity RecognitionIRJET- Tweet Segmentation and its Application to Named Entity Recognition
IRJET- Tweet Segmentation and its Application to Named Entity Recognition
 

En vedette

Chosen mane task images
Chosen mane task imagesChosen mane task images
Chosen mane task imagesRana Karim
 
Av2419341939
Av2419341939Av2419341939
Av2419341939IJMER
 
Cr2424582463
Cr2424582463Cr2424582463
Cr2424582463IJMER
 
Ai2418281871
Ai2418281871Ai2418281871
Ai2418281871IJMER
 
Ab02417411746
Ab02417411746Ab02417411746
Ab02417411746IJMER
 
Methodology used for improving overall equipment effectiveness by Implementi...
Methodology used for improving overall equipment effectiveness  by Implementi...Methodology used for improving overall equipment effectiveness  by Implementi...
Methodology used for improving overall equipment effectiveness by Implementi...IJMER
 
A Special Type Of Differential Polynomial And Its Comparative Growth Properties
A Special Type Of Differential Polynomial And Its Comparative Growth PropertiesA Special Type Of Differential Polynomial And Its Comparative Growth Properties
A Special Type Of Differential Polynomial And Its Comparative Growth PropertiesIJMER
 
Cy3210661070
Cy3210661070Cy3210661070
Cy3210661070IJMER
 
Prospect of bioenergy substitution in tea industries of North East India
Prospect of bioenergy substitution in tea industries of North East IndiaProspect of bioenergy substitution in tea industries of North East India
Prospect of bioenergy substitution in tea industries of North East IndiaIJMER
 
Groundwater Quality Evaluation in Thal Doab of Indus Basin of Pakistan
Groundwater Quality Evaluation in Thal Doab of Indus Basin of  Pakistan Groundwater Quality Evaluation in Thal Doab of Indus Basin of  Pakistan
Groundwater Quality Evaluation in Thal Doab of Indus Basin of Pakistan IJMER
 
Measurement Of Rn222 Concentrations In The Air Of Peshraw & Darbandikhan Tu...
Measurement Of Rn222  Concentrations In The Air Of Peshraw &  Darbandikhan Tu...Measurement Of Rn222  Concentrations In The Air Of Peshraw &  Darbandikhan Tu...
Measurement Of Rn222 Concentrations In The Air Of Peshraw & Darbandikhan Tu...IJMER
 
Personalization of the Web Search
Personalization of the Web SearchPersonalization of the Web Search
Personalization of the Web SearchIJMER
 
Dh31504508
Dh31504508Dh31504508
Dh31504508IJMER
 
Dr31564567
Dr31564567Dr31564567
Dr31564567IJMER
 
I0503 01 6670
I0503 01 6670I0503 01 6670
I0503 01 6670IJMER
 
Influence of Skidded Distance on the Initial Velocity of Vehicle in Chain Acc...
Influence of Skidded Distance on the Initial Velocity of Vehicle in Chain Acc...Influence of Skidded Distance on the Initial Velocity of Vehicle in Chain Acc...
Influence of Skidded Distance on the Initial Velocity of Vehicle in Chain Acc...IJMER
 
A Review of FDM Based Parts to Act as Rapid Tooling
A Review of FDM Based Parts to Act as Rapid ToolingA Review of FDM Based Parts to Act as Rapid Tooling
A Review of FDM Based Parts to Act as Rapid ToolingIJMER
 
Impact of Mechanical System in Machining Of AISI 1018 Using Taguchi Design o...
Impact of Mechanical System in Machining Of AISI 1018 Using  Taguchi Design o...Impact of Mechanical System in Machining Of AISI 1018 Using  Taguchi Design o...
Impact of Mechanical System in Machining Of AISI 1018 Using Taguchi Design o...IJMER
 

En vedette (20)

Chosen mane task images
Chosen mane task imagesChosen mane task images
Chosen mane task images
 
Reality tv
Reality tvReality tv
Reality tv
 
Av2419341939
Av2419341939Av2419341939
Av2419341939
 
Cr2424582463
Cr2424582463Cr2424582463
Cr2424582463
 
Ai2418281871
Ai2418281871Ai2418281871
Ai2418281871
 
Ab02417411746
Ab02417411746Ab02417411746
Ab02417411746
 
Samecniero akademia
Samecniero akademiaSamecniero akademia
Samecniero akademia
 
Methodology used for improving overall equipment effectiveness by Implementi...
Methodology used for improving overall equipment effectiveness  by Implementi...Methodology used for improving overall equipment effectiveness  by Implementi...
Methodology used for improving overall equipment effectiveness by Implementi...
 
A Special Type Of Differential Polynomial And Its Comparative Growth Properties
A Special Type Of Differential Polynomial And Its Comparative Growth PropertiesA Special Type Of Differential Polynomial And Its Comparative Growth Properties
A Special Type Of Differential Polynomial And Its Comparative Growth Properties
 
Cy3210661070
Cy3210661070Cy3210661070
Cy3210661070
 
Prospect of bioenergy substitution in tea industries of North East India
Prospect of bioenergy substitution in tea industries of North East IndiaProspect of bioenergy substitution in tea industries of North East India
Prospect of bioenergy substitution in tea industries of North East India
 
Groundwater Quality Evaluation in Thal Doab of Indus Basin of Pakistan
Groundwater Quality Evaluation in Thal Doab of Indus Basin of  Pakistan Groundwater Quality Evaluation in Thal Doab of Indus Basin of  Pakistan
Groundwater Quality Evaluation in Thal Doab of Indus Basin of Pakistan
 
Measurement Of Rn222 Concentrations In The Air Of Peshraw & Darbandikhan Tu...
Measurement Of Rn222  Concentrations In The Air Of Peshraw &  Darbandikhan Tu...Measurement Of Rn222  Concentrations In The Air Of Peshraw &  Darbandikhan Tu...
Measurement Of Rn222 Concentrations In The Air Of Peshraw & Darbandikhan Tu...
 
Personalization of the Web Search
Personalization of the Web SearchPersonalization of the Web Search
Personalization of the Web Search
 
Dh31504508
Dh31504508Dh31504508
Dh31504508
 
Dr31564567
Dr31564567Dr31564567
Dr31564567
 
I0503 01 6670
I0503 01 6670I0503 01 6670
I0503 01 6670
 
Influence of Skidded Distance on the Initial Velocity of Vehicle in Chain Acc...
Influence of Skidded Distance on the Initial Velocity of Vehicle in Chain Acc...Influence of Skidded Distance on the Initial Velocity of Vehicle in Chain Acc...
Influence of Skidded Distance on the Initial Velocity of Vehicle in Chain Acc...
 
A Review of FDM Based Parts to Act as Rapid Tooling
A Review of FDM Based Parts to Act as Rapid ToolingA Review of FDM Based Parts to Act as Rapid Tooling
A Review of FDM Based Parts to Act as Rapid Tooling
 
Impact of Mechanical System in Machining Of AISI 1018 Using Taguchi Design o...
Impact of Mechanical System in Machining Of AISI 1018 Using  Taguchi Design o...Impact of Mechanical System in Machining Of AISI 1018 Using  Taguchi Design o...
Impact of Mechanical System in Machining Of AISI 1018 Using Taguchi Design o...
 

Similaire à Social Tagging Of Multimedia Content A Model

A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesIRJET Journal
 
An Efficient Trust Evaluation using Fact-Finder Technique
An Efficient Trust Evaluation using Fact-Finder TechniqueAn Efficient Trust Evaluation using Fact-Finder Technique
An Efficient Trust Evaluation using Fact-Finder TechniqueIJCSIS Research Publications
 
Automatic Recommendation of Trustworthy Users in Online Product Rating Sites
Automatic Recommendation of Trustworthy Users in Online Product Rating SitesAutomatic Recommendation of Trustworthy Users in Online Product Rating Sites
Automatic Recommendation of Trustworthy Users in Online Product Rating SitesIRJET Journal
 
Spammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social NetworksSpammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social NetworksIRJET Journal
 
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET Journal
 
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data RatingA Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data RatingIRJET Journal
 
IRJET-A Novel Technic to Notice Spam Reviews on e-Shopping
IRJET-A Novel Technic to Notice Spam Reviews on e-ShoppingIRJET-A Novel Technic to Notice Spam Reviews on e-Shopping
IRJET-A Novel Technic to Notice Spam Reviews on e-ShoppingIRJET Journal
 
IRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence TheoryIRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence TheoryIRJET Journal
 
Predicting the Brand Popularity from the Brand Metadata
Predicting the Brand Popularity from the Brand MetadataPredicting the Brand Popularity from the Brand Metadata
Predicting the Brand Popularity from the Brand MetadataIJECEIAES
 
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text MiningIRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text MiningIRJET Journal
 
IRJET - YouTube Spam Comments Detection
IRJET - YouTube Spam Comments DetectionIRJET - YouTube Spam Comments Detection
IRJET - YouTube Spam Comments DetectionIRJET Journal
 
USER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCHUSER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCHijmpict
 
IRJET - Fake News Detection: A Survey
IRJET -  	  Fake News Detection: A SurveyIRJET -  	  Fake News Detection: A Survey
IRJET - Fake News Detection: A SurveyIRJET Journal
 
IRJET- Analysis on Existing Methodologies of User Service Rating Prediction S...
IRJET- Analysis on Existing Methodologies of User Service Rating Prediction S...IRJET- Analysis on Existing Methodologies of User Service Rating Prediction S...
IRJET- Analysis on Existing Methodologies of User Service Rating Prediction S...IRJET Journal
 
VTU final year project report Main
VTU final year project report MainVTU final year project report Main
VTU final year project report Mainathiathi3
 
IRJET - Socirank Identifying and Ranking Prevalent News Topics using Social M...
IRJET - Socirank Identifying and Ranking Prevalent News Topics using Social M...IRJET - Socirank Identifying and Ranking Prevalent News Topics using Social M...
IRJET - Socirank Identifying and Ranking Prevalent News Topics using Social M...IRJET Journal
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...IRJET Journal
 
AGGRESSION DETECTION USING MACHINE LEARNING MODEL
AGGRESSION DETECTION USING MACHINE LEARNING MODELAGGRESSION DETECTION USING MACHINE LEARNING MODEL
AGGRESSION DETECTION USING MACHINE LEARNING MODELIRJET Journal
 
IRJET- Improving Performance of Fake Reviews Detection in Online Review’s usi...
IRJET- Improving Performance of Fake Reviews Detection in Online Review’s usi...IRJET- Improving Performance of Fake Reviews Detection in Online Review’s usi...
IRJET- Improving Performance of Fake Reviews Detection in Online Review’s usi...IRJET Journal
 

Similaire à Social Tagging Of Multimedia Content A Model (20)

A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
 
An Efficient Trust Evaluation using Fact-Finder Technique
An Efficient Trust Evaluation using Fact-Finder TechniqueAn Efficient Trust Evaluation using Fact-Finder Technique
An Efficient Trust Evaluation using Fact-Finder Technique
 
Automatic Recommendation of Trustworthy Users in Online Product Rating Sites
Automatic Recommendation of Trustworthy Users in Online Product Rating SitesAutomatic Recommendation of Trustworthy Users in Online Product Rating Sites
Automatic Recommendation of Trustworthy Users in Online Product Rating Sites
 
Spammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social NetworksSpammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social Networks
 
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
 
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data RatingA Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
 
trust1
trust1trust1
trust1
 
IRJET-A Novel Technic to Notice Spam Reviews on e-Shopping
IRJET-A Novel Technic to Notice Spam Reviews on e-ShoppingIRJET-A Novel Technic to Notice Spam Reviews on e-Shopping
IRJET-A Novel Technic to Notice Spam Reviews on e-Shopping
 
IRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence TheoryIRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence Theory
 
Predicting the Brand Popularity from the Brand Metadata
Predicting the Brand Popularity from the Brand MetadataPredicting the Brand Popularity from the Brand Metadata
Predicting the Brand Popularity from the Brand Metadata
 
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text MiningIRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text Mining
 
IRJET - YouTube Spam Comments Detection
IRJET - YouTube Spam Comments DetectionIRJET - YouTube Spam Comments Detection
IRJET - YouTube Spam Comments Detection
 
USER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCHUSER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCH
 
IRJET - Fake News Detection: A Survey
IRJET -  	  Fake News Detection: A SurveyIRJET -  	  Fake News Detection: A Survey
IRJET - Fake News Detection: A Survey
 
IRJET- Analysis on Existing Methodologies of User Service Rating Prediction S...
IRJET- Analysis on Existing Methodologies of User Service Rating Prediction S...IRJET- Analysis on Existing Methodologies of User Service Rating Prediction S...
IRJET- Analysis on Existing Methodologies of User Service Rating Prediction S...
 
VTU final year project report Main
VTU final year project report MainVTU final year project report Main
VTU final year project report Main
 
IRJET - Socirank Identifying and Ranking Prevalent News Topics using Social M...
IRJET - Socirank Identifying and Ranking Prevalent News Topics using Social M...IRJET - Socirank Identifying and Ranking Prevalent News Topics using Social M...
IRJET - Socirank Identifying and Ranking Prevalent News Topics using Social M...
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
 
AGGRESSION DETECTION USING MACHINE LEARNING MODEL
AGGRESSION DETECTION USING MACHINE LEARNING MODELAGGRESSION DETECTION USING MACHINE LEARNING MODEL
AGGRESSION DETECTION USING MACHINE LEARNING MODEL
 
IRJET- Improving Performance of Fake Reviews Detection in Online Review’s usi...
IRJET- Improving Performance of Fake Reviews Detection in Online Review’s usi...IRJET- Improving Performance of Fake Reviews Detection in Online Review’s usi...
IRJET- Improving Performance of Fake Reviews Detection in Online Review’s usi...
 

Plus de IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless BicycleIJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningIJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessIJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And AuditIJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLIJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyIJMER
 

Plus de IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Dernier

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Dernier (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

Social Tagging Of Multimedia Content A Model

  • 1. www.ijmer.com International Journal of Modern Engineering Research (IJMER) Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2920-2923 ISSN: 2249-6645 Social Tagging Of Multimedia Content A Model Abdul Rabbani1, P. U.V. Pavan Kumar2, Dr. Md. Ali Hussain3 1 M.Tech, Dept. of ECE, Sri Sunflower College of Engineering & Technology, A.P., India. Asst.Professor, Dept. of ECE, Sri Sunflower College of Engineering & Technology, A.P., India. 3 Professor, Dept. of Electronics and Computer Engineering, KL University, Guntur, A.P., India. 2 ABSTRACT: Social networks are very popular now days, as it facilitates search and retrieval of multimedia features. Anyway, noisy and spam annotations often make it difficult to perform an efficient search. Users may make mistakes in tagging and irrelevant tags and content may be maliciously added for advertisement or self-promotion. This article examine recent advances in techniques for combating such noise and spam in social tagging. The trust relationship among users has a direct impact on the sharing and transmission mode of digital contents. To effectively assess direct or recommended trust between users, this paper proposed a multimedia social networks trust model based on small world theory. Online and Internet databases and early websites deployed them as a way for publishers to help users find content. Keywords: Spam, Multimedia Social Networks, Websites. I. INTRODUCTION When information is exchanged on the Internet, malicious individuals are everywhere, trying to take advantage of the information exchange structure for their own benefit, while bothering and spamming others. Before social tagging became popular, spam content was observed in various domains: first in e-mail, and then in Web search networks have been also influenced by malicious peers, and thus various solutions based on trust and reputation have been proposed, which dealt with collecting information on peer behavior, scoring and ranking peers, and responding based on the scores . Today, even blogs are spammed. Ratings in online reputation systems, such as eBay, Amazon, and Epinions, are very similar to tagging systems and they may face the problem of unfair ratings by artificially inflating or deflating reputations. Several filtering techniques for excluding unfair ratings are proposed in the literature. Unfortunately, the countermeasures developed for email and Web spam do not directly apply to social networks. II. BACKGROUND Social networks and multimedia content sharing Web sites have become increasingly popular in recent years. Their service typically focuses on building online communities of people who share interests and activities, or are interested in exploring the interests and activities of others. At the same time, they have become a popular way to share and disseminate information. For Example, users upload their personal photos and share them through online communities, letting other people comment or rate them. One important challenge in tagging is to identify the most appropriate tags for given content, and at the same time, to eliminate noisy or spam tags. The shared content is sometimes assigned with inappropriate tags for several reasons. First of all, users are human beings and may commit mistakes. Moreover, it is possible to provide wrong tags on purpose for advertisement, self-promotion, or to increase the rank of a particular tag in automatic search engines. Consequently, assigning free-form keywords (tags) to multimedia content has a risk that wrong or irrelevant tags eventually prevent users from the benefits of annotated content. www.ijmer.com 2920 | Page
  • 2. www.ijmer.com International Journal of Modern Engineering Research (IJMER) Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2920-2923 ISSN: 2249-6645 III. TRUST MODELING The social network approach to design large-scale systems has significant benefits including scalability, low cost of ownership, robustness, and ability to provide site autonomy. However, this approach has several drawbacks as well including trust issues and lack of coordination and control among the peers. We present a trust model for a social network structured large-scale network computing system and completely define the trust model and describe the schemes used in it. Central to the model is the idea of maintaining a recommender network that can be used to obtain references about a target domain. Simulation results indicate that the trust model is capable of building and maintaining trust and also identifying the bad domains. In a social tagging system, spam or noise can be injected at three different levels: spam content, spam tag-content association, and spammer. Trust modeling can be performed at each level separately or different levels can be considered jointly to produce trust models, for example, to assess a user’s reliability, one can consider not only the user profile, but also the content that the user uploaded to a social system. In this article, we categorize trust modeling approaches into two classes according to the target of trust, i.e., user and content trust modeling. Presented approaches are sorted based on their complexity from simple to advanced, separately for both content and user trust models. IV. CONTENT TRUST MODELING Approaches for content trust modeling utilize features extracted from content information, users profiles and/or associated tags to detect specific spam content. Trust Rank relies on an important empirical observation called approximate isolation of the good set: good pages seldom point to bad ones. It starts from a set of seeds selected as highly qualified, credible and popular Web pages in the Web graph, and then iteratively propagates trust scores to all nodes in the graph by splitting the trust score of a node among its neighbors according to a weighting scheme. Trust Rank effectively removes most of the spam from the top-scored Web pages however it is unable to effectively separate low-scored good sites from bad ones, due to the lack of distinguishing features. Content trust modeling is used to classify content (e.g., Web pages, images, and videos) as spam or legitimate. In this case, the target of trust is content (resource), and thus a trust score is given to each content based on its content and/or associated tags. Content trust models reduce the prominence of content likely to be spam, usually in query-based retrieval results. They try to provide better ordering of the results to reduce the exposure of the spam to users. The administrator can go a step further and remove all content contributed by the user who posted the incorrect content. V. USER TRUST MODELING The aforementioned studies consider users’ reliability as static at a specific moment. However, a user’s trust in a social tagging system is dynamic, i.e., it changes over time. The tagging history of a user is better to consider, because a consistent good behavior of a user in the past can suddenly change by a few mistakes, which consequently ruins his/her trust in tagging. In user trust modeling, trust is given to each user based on the information extracted from a user’s account, his/her interaction with other participants within the social network, and/or the relationship between the content and tags that the user contributed to the social tagging system. Given a user trust score, the user might be flagged as a legitimate user or spammer 5.1 EVALUATION Data sets used for development and evaluation of trust modeling techniques have a wide range of diversity in terms of content, numbers of resources, tags and users, and type of spam. Some researchers dealing with bookmarks used a public data set released by BibSonomy as a part of the ECML PKDD Discovery Challenge 2008 on Spam Detection in Social Bookmarking Systems. To model trust in other types of tagging systems, where spam is introduced through videos, tweets, or user profiles, data are usually crawled from the corresponding social network, like YouTube, Twitter, or MySpace, respectively. For example, Lee et al. [28] collected around 215,000 users and 4 million tweets from Twitter. Since this raw data are missing ground truth for evaluation, they manually labeled a small portion of users distinguishing between legitimate users, To model trust in other types of tagging systems, where spam is introduced through videos, tweets, or user profiles, data are usually crawled from the corresponding social network, like YouTube, Twitter, or MySpace, respectively Since this raw data are missing ground truth for evaluation, they manually labeled a small portion of users distinguishing between legitimate users, 5.2 ALGORITHM Trust modeling can be formulated as either a classification problem or a ranking problem, depending on the way of treatment. In the classification problem, the results of an algorithm can be summarized by a confusion matrix from groundwww.ijmer.com 2921 | Page
  • 3. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2920-2923 ISSN: 2249-6645 truth data and predicted labels, which contains the number of true positives, true negatives, false positives, and false negatives. From these values, classical measures such as a receiver operating characteristic (ROC), the area under the ROC curve (AUC), precision-recall (PR) curves, and F-measure can be derived. VI. EXPERIMENTAL RESULTS User profile Image upload page Image search page www.ijmer.com 2922 | Page
  • 4. www.ijmer.com International Journal of Modern Engineering Research (IJMER) Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2920-2923 ISSN: 2249-6645 VII. CONCLUSION AND FUTURE RESEARCH In this article, we dealt with one of the key issues in social tagging systems: combating noise and spam. We classified existing studies in the literature into two categories, i.e., content and user trust modeling. Representative techniques in each category were analyzed and compared. In addition, existing databases and evaluation protocols were re viewed. An example system was presented to demonstrate how trust modeling can be particularly employed in a popular application of image sharing and geotagging. Finally, open issues and future research trends were prospected. As online social networks and content sharing services evolve rapidly, we believe that the research on enhancing reliability and trustworthiness of such services will become increasingly important REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] Wikimedia Foundation Inc. (2011, Dec.). Flickr. [Online]. Available: http://en.wikipedia.org/wiki/Flickr. Pingdom Blog. (2011, Jan.). Internet 2010 in numbers. [Online]. Available: http://royal.pingdom.com/2011/01/12/internet-2010-innumbers C. Marlow, M. Naaman, D. Boyd, and M. Davis, ―HT06, tagging paper, taxonomy, Flickr, academic article, to read,‖ in Proc. ACM HT, Aug. 2006, pp. 31–40. K. Liu, B. Fang, and Y. Zhang, ―Detecting tag spam in social tagging systems with collaborative knowledge,‖ in Proc. IEEE FSKD, Aug. 2009, pp. 427–431. L. S. Kennedy, S.-F. Chang, and I. V. Kozintsev, ―To search or to label?: Predicting the performance of search-based automatic image classifiers,‖ in Proc.ACM MIR, Oct. 2006, pp. 249–258. P. Heymann, G. Koutrika, and H. Garcia-Molina, ―Fighting spam on social Web sites: A survey of approaches and future challenges,‖ IEEE Internet Comput., vol. 11, no. 6, pp. 36–45, Nov. 2007. L. von Ahn, M. Blum, N. J. Hopper, and J. Langford, ―CAPTCHA: Using hard AI problems for security,‖ in Proc. Eurocrypt, May 2003, pp. 294–311. L. von Ahn, B. Maurer, C. Mcmillen, D. Abraham, and M. Blum, ―reCAPTCHA: Human-based character recognition via Web security measures,‖ Science, vol. 321,no. 5895, pp. 1465–1468, Aug. 2008. Yahoo, Inc. (2011, Dec.). Flickr—Tags. [Online]. Available: http://www.flickr.com/help/tags. G. Mori and J. Malik, ―Recognizing objects in adversarial clutter: Breaking a visual CAPTCHA,‖ in Proc. IEEE CVPR, June 2003, pp. I-134–I-141. M. Sahami, S. Dumais, D. Heckerman, and E. Horvitz, ―A Bayesian approach to filtering junk e-mail,‖ AAAI Workshop on Learning for Text Categorization,Madison: WI, Tech. Rep. WS-98-05, July 1998. D. Fetterly, M. Manasse, and M. Najork, ―Spam, damn spam, and statistics:Using statistical analysis to locate spam Web pages,‖ in Proc. ACM WebDB, June 2004, pp. 1–6. S. Marti and H. Garcia-Molina, ―Taxonomy of trust: Categorizing P2P reputation systems,‖ Comput. Netw., vol. 50, no. 4, pp. 472–484, Mar. 2006. A. Thomason, ―Blog spam: A review,‖ in Proc. CEAS, Aug. 2007. www.ijmer.com 2923 | Page