SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
Control Theory and Informatics                                                               www.iiste.org
ISSN 2224-5774 (print) ISSN 2225-0492 (online)
Vol 1, No.1, 2011

       Face Location - A Novel Approach to Post the User global
                               Location
                                            Venkata Ramana Adari
                Department of Computer Science & Engineering, Chaitanya Engineering College
                                           Visakhapatnam,AP, India
                            Tel: +919948319984 E-mail: prof_ramana@yahoo.com
                                           Dr.Ch.Diwakar
       Department of Computer Science & Engineering, Visakha Institute of Engineering &Technology
                                           Visakhapatnam,AP, India
                             Tel: +919848105876 E-mail: divakar_c@yahoo.com
                                              Dr.P.Suresh Varma
          Department of Computer Science , Aadikavi Nannayya University, Rajahmundry,AP, India
                              Tel: +919848105876 E-mail: vermaps@yahool.com
Abstract
Today Web users are facing the problems of information overload on the World Wide Web which stores vast
source of data. As a result, how to provide Web users with more exactly needed information is becoming a
critical issue in web based information . People populate more information on Social Network Sites as their
profile data and etc. Now a days most of the users have accounts in social network sites. In this paper we are
discussing the popular document classifiers to find the location of a user in the social networking sites,In this
paper we make use of the profile data and other information to achieve the objective of RRR which is to give
Right information to the Right set of People at Right Time In this paper, we present “Supervised learning” a
method to cascade the decision tree learning methods in classifying locations of the users posted in a social
network site.

Keywords – Supervised Learning, Web mining,Social networks, Decision tree, facebook.


I. Introduction

1.1 Web Mining
          Web mining aims to extract useful knowledge from the web and it is a rapid growing research area. It
consists of Web usage mining, Web structure mining, and Web content mining. Web usage mining refers to the
discovery of user access patterns from Web usage logs. Web structure mining tries to discover useful knowledge
from the structure of hyperlinks. Web content mining aims to mine useful information or knowledge from web
page contents.
          Web content mining is related to data mining because many data mining techniques can be applied in
Web content mining. It is related to text mining because much of the web contents are texts. However, it is also
quite different from data mining because Web data are mainly semi-structured and/or unstructured, while data
mining deals primarily with structured data. Web content mining is also different from text mining because of
the semi-structure nature of the Web, while text mining focuses on unstructured texts. Web content mining thus
requires creative applications of data mining techniques and also its own unique approaches.


1.2 Social Networking and Facebook
Users share a variety of information about themselves on their Facebook profiles, including photos,contact
information, location,interested movies ,books etc. It is very clear to understand that people are using social
network sites such as Facebook,Twitter,,Myspace etc..as there is a broad demographic on these sites. Mainly
social net working sites are used for personal reasons and sharing the information with many people.The other
uses are business,marketing,entertainment etc.
Facebook uses server-side Hypertext Preprocesser (PHP) scripts and applications to host and format the content
available on the service. Content is stored centrally on Facebook servers. Scripts and applications at Facebook


34 | P a g e
www.iiste.org
Control Theory and Informatics                                                                 www.iiste.org
ISSN 2224-5774 (print) ISSN 2225-0492 (online)
Vol 1, No.1, 2011

get, process, and filter information on demand, and deliver it to users in real time, to a Web browser over the
Internet.

.

         II. SECTION

2.1. Survey on Uses of Face Book: Facebook was reported to have more than 21 million registered users
generating billion page views each day by 2007. The site integrated into media daily practices typical user
spends about 20 minutes a day on the site and other users log in at least once a day Capitalizing on its success
among college students and employees, Facebook launched a high school version in past September 2005. In
2008, the company introduced communities for commercial organizations; as of November 2008, almost 32,000
organizations had Facebook [8] directories (Smith, 2008). In 2008, Facebook was used at over 4,000 United
States colleges and was the seventh most popular site on the World Wide Web with respect to total page views

           Most of the existing academic research on Facebook has focused on identity presentation and privacy
concerns looking at the amount of information Facebook participants provide about themselves, the relatively
open nature of the information, and the lack of privacy controls
enacted by the users, Gross and Acquisti (2005) argue that users may be putting themselves at risk both offline
(e.g., stalking) and online (e.g., identify theft).

         In contrast to popular press coverage which has primarily focused on negative outcomes of Facebook
use stemming from users’ misconceptions about the nature of their online audience, we are interested in
situations in which the intended audience for the profile such as well-meaning peers and friends and the actual
audience are aligned. We use Facebook as a research context in order to determine whether offline social capital
can be generated by online tools.

2.2. Related Issues on Social Networks:
          First recognizable social network site launched in 1997 introducing the Orkut.com users to create
profiles, list their Friends and, beginning in 1998, surf the Friends lists. Each of these features existed in some
form before orkut, of course. Profiles existed on most major dating sites and many community sites. AIM and
ICQ buddy lists supported lists of Friends, although those Friends were not visible to others. Classmates.com
allowed people to affiliate with their high school or college and [9] surf the network for others who were also
affiliated, but users could not create profiles or list of Friends until years later. Orkut was the first to combine
these features.
          Orkut promoted itself as a tool to help people connect with and send messages to others. While Orkut
attracted millions of users, it failed to become a sustainable business and, in 2000, the service closed. Looking
back, its founder believes that
          Orkut was simply ahead of its time, personal communication by jul2007. While people were already
flocking to the Internet, most did not have extended networks of friends who were online. Early adopters
complained that there was little to do after accepting Friend requests, and most users were not interested in
meeting strangers. From 1997 to 2001, a number of community tools began supporting various combinations
of profiles and publicly articulated Friends. Many users allowed to create personal, professional, and business
profiles—users could identify Friends on their personal profiles without seeking approval for those connections.
Likewise, shortly [9] after its launch in
           In particular, the people behind Ryze, Tribe.net, LinkedIn, and Friendster were tightly entwined
personally, business and professionally. They believed that they could support each other without competing. In
the end, Ryze never acquired mass popularity, Tribe.net grew to attract a passionate niche user base, LinkedIn
became a powerful business service, and Friendster became the most significant, if only as "one of the biggest
disappointments in Internet history"




35 | P a g e
www.iiste.org
Control Theory and Informatics                                                               www.iiste.org
ISSN 2224-5774 (print) ISSN 2225-0492 (online)
Vol 1, No.1, 2011




         Figure 1 shows the timeline of the social network sites when it was created


         In the Friendster, MySpace, and Facebook, three key SNSs that shaped the business, cultural, and
research landscape. Don't talk to invisible strangers. New York Times. Retrieved




         III. SECTION

3. Problem Definition: People populate a lot more information on social network sites as their profile data and
etc. Now, almost every Internet user has an account in social network sites. and they spend a significant part of
time                  in              browsing                 in                social                networks.
Our thesis is an attempt to take the above facts as benefits and provides correct information to users to reach
their needs at right time.




         Figure 2 Example screen of facebook

   Our proposed solution analysis aims to capture the user profile in facebook and post the data into locations
such as India,UK,US and their hierarchy of states and so on.To implement this solution we consider that a data
mining technique supervised learning.


        IV. SECTION
4. Usage of Mining Algorithms to post the data in facebook:



36 | P a g e
www.iiste.org
Control Theory and Informatics                                                                  www.iiste.org
ISSN 2224-5774 (print) ISSN 2225-0492 (online)
Vol 1, No.1, 2011

 Machine learning is a scientific discipline that is concerned with the design and development of algorithms that
allow computers to learn based on data, such as from sensor data or databases. A major focus of machine
learning research is to automatically learn to recognize complex patterns and make intelligent decisions based
on data. Hence, machine learning is closely related to fields such as statistics, probability theory, data mining,
pattern recognition, artificial intelligence, adaptive control, and theoretical computer science.

4.1.Decision Tree: Decision tree rules provide model transparency so that a business user, marketing analyst,
or business analyst can understand the basis of the model's predictions, and therefore, be comfortable acting on
them and explaining them to others     Decision Tree does not support nested tables. Decision Tree Models can
be converted to XML. Several algorithms in Decision trees are mention below

4.2. ID3 Decision Tree

   Iterative Dichotomiser is an algorithm to generate a decision tree invented by Ross Quinlan, based on
Occam’s razor. It prefers smaller decision trees(simpler theories) over             larger ones. However it does not
always produce smallest tree, and therefore heuristic. The decision tree is used by the concept of Information
Entropy. The ID3 Algorithm steps are:
     1)Take all unused attributes and count their entropy concerning test samples
     2) Choose attribute for which entropy is maximum
     3)Make node containing that attribute
ID3 (Examples, Target _ Attribute, Attributes) Create a root node for the tree
             If all examples are positive, Return the single-node tree Root, with label = +.
          If all examples are negative, Return the single-node tree Root, with label = -.
           If number of predicting attributes is empty, then Return the single node tree Root, with label = most
common value of the target attribute in the examples.
             Otherwise Begin
             A = The Attribute that best classifies examples.
        Decision Tree attribute for Root = A.
             For each possible value, vi, of A,
            Add a new tree branch below Root, corresponding to the test A = vi.
      Let Examples(vi), be the subset of examples that have the value vi for A
      If Examples(vi) is empty common target value in the examples
          Else below this new branch add the sub tree ID3 (Examples(vi), Target_ Attribute, Attributes – {A}
End
Return Root

         V. Conclusion

In this paper a general supervised for classifying user location was described. The specific approaches of the
implementation of location datasets posting system learning are characterized, we developed the ID3 decision
tree method is based on cascading machine learning techniques the ID3 decision trees. The ID3 decision tree
build on each dataset learns the sub classifies within the data and partitions the decision space into classification
regions; there by improving the system classification performance.
  Our future direction is to utilize the geographic location of the user so that we can send useful information to
the users based on their interests so that we can do effective e-business and other advertisements etc. based on
the interest of the user.

References

          S. Ghita, W. Nejdl, and R. Paiu. Semantically rich recommendations in social
         networks for sharing, exchanging and ranking semantic context. In Proc. ISWC05, 2005.
          J. Golbeck and B. Parsia. Trust network-based filtering of aggregated claims. International Journal of
Metadata, Semantics and Ontologies, 2006.
          P. Massa and P. Avesani. Controversial users demand local trust metrics: an experimental study on
epinions.com community. In Proc. AAAI-05, 2005.
          Y. Matsuo, M. Hamasaki, H. Takeda, J. Mori, D. Bollegala, Y. Nakamura
T. Nishimura, K. Hasida, and M. Ishizuka. Spinning multiple social networks for semantic web. In Proc. AAAI-
06, 2006.


37 | P a g e
www.iiste.org
Control Theory and Informatics                                                            www.iiste.org
ISSN 2224-5774 (print) ISSN 2225-0492 (online)
Vol 1, No.1, 2011

         P. Mika. Ontologies are us: A unified model of social networks and semantics. In Proc. ISWC2005,
2005.
         J. Mori, M. Ishizuka, T. Sugiyama, and Y. Matsuo. Real-world oriented information sharing using
social networks. In Proc. ACM GROUP’05, 2005.
          July 21, 2007 from http://www.nytimes.com/2006/03/09/fashion/thursdaystyles/09parents.html
          Barnes, S. (2006). A privacy paradox: Social networking in the United States. First Monday, 11 (9).
Retrieved September 8, 2007 from
         http://www.firstmonday.org/issues/issue11_9/barnes/index.htm
          Romero, C., Ventura, S. Educational Data Mining: a Survey from 1995 to 2005. Expert Systems with
Applications, 2007, 33(1), pp.135-146.
          Yudelson, M.V., Medvedeva, O., Legowski, E., Castine, M., Jukic, D., Rebecca, C. Mining Student
Learning Data to Develop High Level Pedagogic Strategy in a Medical ITS. AAAI Workshop on Educational
Data Mining, 2006. pp.1-8.
         Piatetsky-Shapiro, G. (1991), Discovery, analysis, and presentation of strong rules, in G. Piatetsky-
Shapiro & W. J. Frawley, eds, ‘Knowledge Discovery in Databases’, AAAI/MIT Press, Cambridge, MA.




38 | P a g e
www.iiste.org

Más contenido relacionado

La actualidad más candente

ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYkillersmile1
 
Information and Communication Technology (ICT) - Empowerment Technologies
Information and Communication Technology (ICT) - Empowerment TechnologiesInformation and Communication Technology (ICT) - Empowerment Technologies
Information and Communication Technology (ICT) - Empowerment TechnologiesMark Jhon Oxillo
 
Lesson 1 2 Edited
Lesson 1 2 EditedLesson 1 2 Edited
Lesson 1 2 EditedJuvywen
 
Web 3.0 - Media Theory
Web 3.0 - Media TheoryWeb 3.0 - Media Theory
Web 3.0 - Media TheoryAkshay Iyer
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SJuvywen
 
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyesandregoron
 
Lesson 1: Intoduction to ICT
Lesson 1: Intoduction to ICTLesson 1: Intoduction to ICT
Lesson 1: Intoduction to ICTLyka Larita
 
Web1, web2 and web 3
Web1, web2 and web 3Web1, web2 and web 3
Web1, web2 and web 3mercedeh37
 
Empowerment technologies byShyna Gane Daleon and Galasao
Empowerment technologies byShyna Gane  Daleon and Galasao Empowerment technologies byShyna Gane  Daleon and Galasao
Empowerment technologies byShyna Gane Daleon and Galasao janelle17
 
Impact_of_internet_use_on_young_students
Impact_of_internet_use_on_young_studentsImpact_of_internet_use_on_young_students
Impact_of_internet_use_on_young_studentsmiftah uddin
 
Social Networkingv2008 India
Social Networkingv2008 IndiaSocial Networkingv2008 India
Social Networkingv2008 IndiaJane Macoustra
 
The usage of internet by youngsters of gujrat city (pakistan)
The usage of internet by youngsters of gujrat city (pakistan)The usage of internet by youngsters of gujrat city (pakistan)
The usage of internet by youngsters of gujrat city (pakistan)Alexander Decker
 
Internet usage in Academic Colleges
Internet usage in Academic Colleges Internet usage in Academic Colleges
Internet usage in Academic Colleges Vinita Jain
 
Internet usage by the teachers working in higher secondary
Internet usage by the teachers working in higher secondaryInternet usage by the teachers working in higher secondary
Internet usage by the teachers working in higher secondaryAlexander Decker
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)Ajinkya Dubey
 
Facebook Security Essay - Umut Baris Akkaya
Facebook Security Essay - Umut Baris AkkayaFacebook Security Essay - Umut Baris Akkaya
Facebook Security Essay - Umut Baris AkkayaUmut Baris Akkaya
 
Web 3.0 and english language teaching by dr meenu pandey
Web 3.0 and english language teaching by dr meenu pandeyWeb 3.0 and english language teaching by dr meenu pandey
Web 3.0 and english language teaching by dr meenu pandeymeenu pandey
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Jesus Rances
 

La actualidad más candente (19)

ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
 
Information and Communication Technology (ICT) - Empowerment Technologies
Information and Communication Technology (ICT) - Empowerment TechnologiesInformation and Communication Technology (ICT) - Empowerment Technologies
Information and Communication Technology (ICT) - Empowerment Technologies
 
Lesson 1 2 Edited
Lesson 1 2 EditedLesson 1 2 Edited
Lesson 1 2 Edited
 
Web 3.0 - Media Theory
Web 3.0 - Media TheoryWeb 3.0 - Media Theory
Web 3.0 - Media Theory
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1S
 
Etech activity
Etech activityEtech activity
Etech activity
 
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
 
Lesson 1: Intoduction to ICT
Lesson 1: Intoduction to ICTLesson 1: Intoduction to ICT
Lesson 1: Intoduction to ICT
 
Web1, web2 and web 3
Web1, web2 and web 3Web1, web2 and web 3
Web1, web2 and web 3
 
Empowerment technologies byShyna Gane Daleon and Galasao
Empowerment technologies byShyna Gane  Daleon and Galasao Empowerment technologies byShyna Gane  Daleon and Galasao
Empowerment technologies byShyna Gane Daleon and Galasao
 
Impact_of_internet_use_on_young_students
Impact_of_internet_use_on_young_studentsImpact_of_internet_use_on_young_students
Impact_of_internet_use_on_young_students
 
Social Networkingv2008 India
Social Networkingv2008 IndiaSocial Networkingv2008 India
Social Networkingv2008 India
 
The usage of internet by youngsters of gujrat city (pakistan)
The usage of internet by youngsters of gujrat city (pakistan)The usage of internet by youngsters of gujrat city (pakistan)
The usage of internet by youngsters of gujrat city (pakistan)
 
Internet usage in Academic Colleges
Internet usage in Academic Colleges Internet usage in Academic Colleges
Internet usage in Academic Colleges
 
Internet usage by the teachers working in higher secondary
Internet usage by the teachers working in higher secondaryInternet usage by the teachers working in higher secondary
Internet usage by the teachers working in higher secondary
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Facebook Security Essay - Umut Baris Akkaya
Facebook Security Essay - Umut Baris AkkayaFacebook Security Essay - Umut Baris Akkaya
Facebook Security Essay - Umut Baris Akkaya
 
Web 3.0 and english language teaching by dr meenu pandey
Web 3.0 and english language teaching by dr meenu pandeyWeb 3.0 and english language teaching by dr meenu pandey
Web 3.0 and english language teaching by dr meenu pandey
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1
 

Destacado

Élégant lecteur mp3, YP-S3 par Chehum
Élégant lecteur mp3, YP-S3 par ChehumÉlégant lecteur mp3, YP-S3 par Chehum
Élégant lecteur mp3, YP-S3 par Chehumkorina nariko
 
Papel de trabajo metodologia de la investigacion
Papel de trabajo metodologia de la investigacionPapel de trabajo metodologia de la investigacion
Papel de trabajo metodologia de la investigacionMARIAUXIPG2012
 
Autism Spectrum Disorder
Autism Spectrum DisorderAutism Spectrum Disorder
Autism Spectrum Disordergrona3
 
Cyberpesten Is Geen Spelletje!
Cyberpesten Is Geen Spelletje!Cyberpesten Is Geen Spelletje!
Cyberpesten Is Geen Spelletje!guesta09117c
 
Us Silver2010
Us Silver2010Us Silver2010
Us Silver2010patdunne
 

Destacado (8)

3rd Grade- Alabama
3rd Grade- Alabama3rd Grade- Alabama
3rd Grade- Alabama
 
Élégant lecteur mp3, YP-S3 par Chehum
Élégant lecteur mp3, YP-S3 par ChehumÉlégant lecteur mp3, YP-S3 par Chehum
Élégant lecteur mp3, YP-S3 par Chehum
 
Progreessive Era Chapter07
Progreessive Era Chapter07Progreessive Era Chapter07
Progreessive Era Chapter07
 
Papel de trabajo metodologia de la investigacion
Papel de trabajo metodologia de la investigacionPapel de trabajo metodologia de la investigacion
Papel de trabajo metodologia de la investigacion
 
Tech Info Doc 2008
Tech Info Doc 2008Tech Info Doc 2008
Tech Info Doc 2008
 
Autism Spectrum Disorder
Autism Spectrum DisorderAutism Spectrum Disorder
Autism Spectrum Disorder
 
Cyberpesten Is Geen Spelletje!
Cyberpesten Is Geen Spelletje!Cyberpesten Is Geen Spelletje!
Cyberpesten Is Geen Spelletje!
 
Us Silver2010
Us Silver2010Us Silver2010
Us Silver2010
 

Similar a Face Location - A Novel Approach to Post the User global Location Using Supervised Learning

SEMANTIC WEB APPROACH TOWARDS INTEROPERABILITY AND PRIVACY ISSUES IN SOCIAL N...
SEMANTIC WEB APPROACH TOWARDS INTEROPERABILITY AND PRIVACY ISSUES IN SOCIAL N...SEMANTIC WEB APPROACH TOWARDS INTEROPERABILITY AND PRIVACY ISSUES IN SOCIAL N...
SEMANTIC WEB APPROACH TOWARDS INTEROPERABILITY AND PRIVACY ISSUES IN SOCIAL N...ijwscjournal
 
Apprehension of Youth towards Social Networking Sites: Two Sides of a Coin
Apprehension of Youth towards Social Networking Sites: Two Sides of a CoinApprehension of Youth towards Social Networking Sites: Two Sides of a Coin
Apprehension of Youth towards Social Networking Sites: Two Sides of a CoinIJERA Editor
 
Researching Social Media – Big Data and Social Media Analysis
Researching Social Media – Big Data and Social Media AnalysisResearching Social Media – Big Data and Social Media Analysis
Researching Social Media – Big Data and Social Media AnalysisFarida Vis
 
The Implementation of Social Media for Educational Objectives
The Implementation of Social Media for Educational ObjectivesThe Implementation of Social Media for Educational Objectives
The Implementation of Social Media for Educational Objectivestheijes
 
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBO
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBOA COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBO
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBOijaia
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
The evolution of research on social media
The evolution of research on social mediaThe evolution of research on social media
The evolution of research on social mediaFarida Vis
 
An introduction to the potential of social networking sites in ed
An introduction to the potential of social networking sites in edAn introduction to the potential of social networking sites in ed
An introduction to the potential of social networking sites in edKhairul Nisa
 
Big data privacy issues in public social media
Big data privacy issues in public social mediaBig data privacy issues in public social media
Big data privacy issues in public social mediaSupriya Radhakrishna
 
RIM On The Social Side
RIM On The Social SideRIM On The Social Side
RIM On The Social SideNatalie Alesi
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sitesiosrjce
 
Final social network_analysis
Final social network_analysisFinal social network_analysis
Final social network_analysisTarvinder Singh
 

Similar a Face Location - A Novel Approach to Post the User global Location Using Supervised Learning (20)

SEMANTIC WEB APPROACH TOWARDS INTEROPERABILITY AND PRIVACY ISSUES IN SOCIAL N...
SEMANTIC WEB APPROACH TOWARDS INTEROPERABILITY AND PRIVACY ISSUES IN SOCIAL N...SEMANTIC WEB APPROACH TOWARDS INTEROPERABILITY AND PRIVACY ISSUES IN SOCIAL N...
SEMANTIC WEB APPROACH TOWARDS INTEROPERABILITY AND PRIVACY ISSUES IN SOCIAL N...
 
Proposal.docx
Proposal.docxProposal.docx
Proposal.docx
 
Jx2517481755
Jx2517481755Jx2517481755
Jx2517481755
 
Jx2517481755
Jx2517481755Jx2517481755
Jx2517481755
 
Twist
TwistTwist
Twist
 
Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015
 
Apprehension of Youth towards Social Networking Sites: Two Sides of a Coin
Apprehension of Youth towards Social Networking Sites: Two Sides of a CoinApprehension of Youth towards Social Networking Sites: Two Sides of a Coin
Apprehension of Youth towards Social Networking Sites: Two Sides of a Coin
 
Jf2516311637
Jf2516311637Jf2516311637
Jf2516311637
 
Jf2516311637
Jf2516311637Jf2516311637
Jf2516311637
 
Researching Social Media – Big Data and Social Media Analysis
Researching Social Media – Big Data and Social Media AnalysisResearching Social Media – Big Data and Social Media Analysis
Researching Social Media – Big Data and Social Media Analysis
 
The Implementation of Social Media for Educational Objectives
The Implementation of Social Media for Educational ObjectivesThe Implementation of Social Media for Educational Objectives
The Implementation of Social Media for Educational Objectives
 
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBO
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBOA COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBO
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBO
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
The evolution of research on social media
The evolution of research on social mediaThe evolution of research on social media
The evolution of research on social media
 
An introduction to the potential of social networking sites in ed
An introduction to the potential of social networking sites in edAn introduction to the potential of social networking sites in ed
An introduction to the potential of social networking sites in ed
 
Big data privacy issues in public social media
Big data privacy issues in public social mediaBig data privacy issues in public social media
Big data privacy issues in public social media
 
2_Doc5_2.pdf
2_Doc5_2.pdf2_Doc5_2.pdf
2_Doc5_2.pdf
 
RIM On The Social Side
RIM On The Social SideRIM On The Social Side
RIM On The Social Side
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sites
 
Final social network_analysis
Final social network_analysisFinal social network_analysis
Final social network_analysis
 

Más de Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

Más de Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Último

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 

Último (20)

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 

Face Location - A Novel Approach to Post the User global Location Using Supervised Learning

  • 1. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (print) ISSN 2225-0492 (online) Vol 1, No.1, 2011 Face Location - A Novel Approach to Post the User global Location Venkata Ramana Adari Department of Computer Science & Engineering, Chaitanya Engineering College Visakhapatnam,AP, India Tel: +919948319984 E-mail: prof_ramana@yahoo.com Dr.Ch.Diwakar Department of Computer Science & Engineering, Visakha Institute of Engineering &Technology Visakhapatnam,AP, India Tel: +919848105876 E-mail: divakar_c@yahoo.com Dr.P.Suresh Varma Department of Computer Science , Aadikavi Nannayya University, Rajahmundry,AP, India Tel: +919848105876 E-mail: vermaps@yahool.com Abstract Today Web users are facing the problems of information overload on the World Wide Web which stores vast source of data. As a result, how to provide Web users with more exactly needed information is becoming a critical issue in web based information . People populate more information on Social Network Sites as their profile data and etc. Now a days most of the users have accounts in social network sites. In this paper we are discussing the popular document classifiers to find the location of a user in the social networking sites,In this paper we make use of the profile data and other information to achieve the objective of RRR which is to give Right information to the Right set of People at Right Time In this paper, we present “Supervised learning” a method to cascade the decision tree learning methods in classifying locations of the users posted in a social network site. Keywords – Supervised Learning, Web mining,Social networks, Decision tree, facebook. I. Introduction 1.1 Web Mining Web mining aims to extract useful knowledge from the web and it is a rapid growing research area. It consists of Web usage mining, Web structure mining, and Web content mining. Web usage mining refers to the discovery of user access patterns from Web usage logs. Web structure mining tries to discover useful knowledge from the structure of hyperlinks. Web content mining aims to mine useful information or knowledge from web page contents. Web content mining is related to data mining because many data mining techniques can be applied in Web content mining. It is related to text mining because much of the web contents are texts. However, it is also quite different from data mining because Web data are mainly semi-structured and/or unstructured, while data mining deals primarily with structured data. Web content mining is also different from text mining because of the semi-structure nature of the Web, while text mining focuses on unstructured texts. Web content mining thus requires creative applications of data mining techniques and also its own unique approaches. 1.2 Social Networking and Facebook Users share a variety of information about themselves on their Facebook profiles, including photos,contact information, location,interested movies ,books etc. It is very clear to understand that people are using social network sites such as Facebook,Twitter,,Myspace etc..as there is a broad demographic on these sites. Mainly social net working sites are used for personal reasons and sharing the information with many people.The other uses are business,marketing,entertainment etc. Facebook uses server-side Hypertext Preprocesser (PHP) scripts and applications to host and format the content available on the service. Content is stored centrally on Facebook servers. Scripts and applications at Facebook 34 | P a g e www.iiste.org
  • 2. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (print) ISSN 2225-0492 (online) Vol 1, No.1, 2011 get, process, and filter information on demand, and deliver it to users in real time, to a Web browser over the Internet. . II. SECTION 2.1. Survey on Uses of Face Book: Facebook was reported to have more than 21 million registered users generating billion page views each day by 2007. The site integrated into media daily practices typical user spends about 20 minutes a day on the site and other users log in at least once a day Capitalizing on its success among college students and employees, Facebook launched a high school version in past September 2005. In 2008, the company introduced communities for commercial organizations; as of November 2008, almost 32,000 organizations had Facebook [8] directories (Smith, 2008). In 2008, Facebook was used at over 4,000 United States colleges and was the seventh most popular site on the World Wide Web with respect to total page views Most of the existing academic research on Facebook has focused on identity presentation and privacy concerns looking at the amount of information Facebook participants provide about themselves, the relatively open nature of the information, and the lack of privacy controls enacted by the users, Gross and Acquisti (2005) argue that users may be putting themselves at risk both offline (e.g., stalking) and online (e.g., identify theft). In contrast to popular press coverage which has primarily focused on negative outcomes of Facebook use stemming from users’ misconceptions about the nature of their online audience, we are interested in situations in which the intended audience for the profile such as well-meaning peers and friends and the actual audience are aligned. We use Facebook as a research context in order to determine whether offline social capital can be generated by online tools. 2.2. Related Issues on Social Networks: First recognizable social network site launched in 1997 introducing the Orkut.com users to create profiles, list their Friends and, beginning in 1998, surf the Friends lists. Each of these features existed in some form before orkut, of course. Profiles existed on most major dating sites and many community sites. AIM and ICQ buddy lists supported lists of Friends, although those Friends were not visible to others. Classmates.com allowed people to affiliate with their high school or college and [9] surf the network for others who were also affiliated, but users could not create profiles or list of Friends until years later. Orkut was the first to combine these features. Orkut promoted itself as a tool to help people connect with and send messages to others. While Orkut attracted millions of users, it failed to become a sustainable business and, in 2000, the service closed. Looking back, its founder believes that Orkut was simply ahead of its time, personal communication by jul2007. While people were already flocking to the Internet, most did not have extended networks of friends who were online. Early adopters complained that there was little to do after accepting Friend requests, and most users were not interested in meeting strangers. From 1997 to 2001, a number of community tools began supporting various combinations of profiles and publicly articulated Friends. Many users allowed to create personal, professional, and business profiles—users could identify Friends on their personal profiles without seeking approval for those connections. Likewise, shortly [9] after its launch in In particular, the people behind Ryze, Tribe.net, LinkedIn, and Friendster were tightly entwined personally, business and professionally. They believed that they could support each other without competing. In the end, Ryze never acquired mass popularity, Tribe.net grew to attract a passionate niche user base, LinkedIn became a powerful business service, and Friendster became the most significant, if only as "one of the biggest disappointments in Internet history" 35 | P a g e www.iiste.org
  • 3. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (print) ISSN 2225-0492 (online) Vol 1, No.1, 2011 Figure 1 shows the timeline of the social network sites when it was created In the Friendster, MySpace, and Facebook, three key SNSs that shaped the business, cultural, and research landscape. Don't talk to invisible strangers. New York Times. Retrieved III. SECTION 3. Problem Definition: People populate a lot more information on social network sites as their profile data and etc. Now, almost every Internet user has an account in social network sites. and they spend a significant part of time in browsing in social networks. Our thesis is an attempt to take the above facts as benefits and provides correct information to users to reach their needs at right time. Figure 2 Example screen of facebook Our proposed solution analysis aims to capture the user profile in facebook and post the data into locations such as India,UK,US and their hierarchy of states and so on.To implement this solution we consider that a data mining technique supervised learning. IV. SECTION 4. Usage of Mining Algorithms to post the data in facebook: 36 | P a g e www.iiste.org
  • 4. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (print) ISSN 2225-0492 (online) Vol 1, No.1, 2011 Machine learning is a scientific discipline that is concerned with the design and development of algorithms that allow computers to learn based on data, such as from sensor data or databases. A major focus of machine learning research is to automatically learn to recognize complex patterns and make intelligent decisions based on data. Hence, machine learning is closely related to fields such as statistics, probability theory, data mining, pattern recognition, artificial intelligence, adaptive control, and theoretical computer science. 4.1.Decision Tree: Decision tree rules provide model transparency so that a business user, marketing analyst, or business analyst can understand the basis of the model's predictions, and therefore, be comfortable acting on them and explaining them to others Decision Tree does not support nested tables. Decision Tree Models can be converted to XML. Several algorithms in Decision trees are mention below 4.2. ID3 Decision Tree Iterative Dichotomiser is an algorithm to generate a decision tree invented by Ross Quinlan, based on Occam’s razor. It prefers smaller decision trees(simpler theories) over larger ones. However it does not always produce smallest tree, and therefore heuristic. The decision tree is used by the concept of Information Entropy. The ID3 Algorithm steps are: 1)Take all unused attributes and count their entropy concerning test samples 2) Choose attribute for which entropy is maximum 3)Make node containing that attribute ID3 (Examples, Target _ Attribute, Attributes) Create a root node for the tree If all examples are positive, Return the single-node tree Root, with label = +. If all examples are negative, Return the single-node tree Root, with label = -. If number of predicting attributes is empty, then Return the single node tree Root, with label = most common value of the target attribute in the examples. Otherwise Begin A = The Attribute that best classifies examples. Decision Tree attribute for Root = A. For each possible value, vi, of A, Add a new tree branch below Root, corresponding to the test A = vi. Let Examples(vi), be the subset of examples that have the value vi for A If Examples(vi) is empty common target value in the examples Else below this new branch add the sub tree ID3 (Examples(vi), Target_ Attribute, Attributes – {A} End Return Root V. Conclusion In this paper a general supervised for classifying user location was described. The specific approaches of the implementation of location datasets posting system learning are characterized, we developed the ID3 decision tree method is based on cascading machine learning techniques the ID3 decision trees. The ID3 decision tree build on each dataset learns the sub classifies within the data and partitions the decision space into classification regions; there by improving the system classification performance. Our future direction is to utilize the geographic location of the user so that we can send useful information to the users based on their interests so that we can do effective e-business and other advertisements etc. based on the interest of the user. References S. Ghita, W. Nejdl, and R. Paiu. Semantically rich recommendations in social networks for sharing, exchanging and ranking semantic context. In Proc. ISWC05, 2005. J. Golbeck and B. Parsia. Trust network-based filtering of aggregated claims. International Journal of Metadata, Semantics and Ontologies, 2006. P. Massa and P. Avesani. Controversial users demand local trust metrics: an experimental study on epinions.com community. In Proc. AAAI-05, 2005. Y. Matsuo, M. Hamasaki, H. Takeda, J. Mori, D. Bollegala, Y. Nakamura T. Nishimura, K. Hasida, and M. Ishizuka. Spinning multiple social networks for semantic web. In Proc. AAAI- 06, 2006. 37 | P a g e www.iiste.org
  • 5. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (print) ISSN 2225-0492 (online) Vol 1, No.1, 2011 P. Mika. Ontologies are us: A unified model of social networks and semantics. In Proc. ISWC2005, 2005. J. Mori, M. Ishizuka, T. Sugiyama, and Y. Matsuo. Real-world oriented information sharing using social networks. In Proc. ACM GROUP’05, 2005. July 21, 2007 from http://www.nytimes.com/2006/03/09/fashion/thursdaystyles/09parents.html Barnes, S. (2006). A privacy paradox: Social networking in the United States. First Monday, 11 (9). Retrieved September 8, 2007 from http://www.firstmonday.org/issues/issue11_9/barnes/index.htm Romero, C., Ventura, S. Educational Data Mining: a Survey from 1995 to 2005. Expert Systems with Applications, 2007, 33(1), pp.135-146. Yudelson, M.V., Medvedeva, O., Legowski, E., Castine, M., Jukic, D., Rebecca, C. Mining Student Learning Data to Develop High Level Pedagogic Strategy in a Medical ITS. AAAI Workshop on Educational Data Mining, 2006. pp.1-8. Piatetsky-Shapiro, G. (1991), Discovery, analysis, and presentation of strong rules, in G. Piatetsky- Shapiro & W. J. Frawley, eds, ‘Knowledge Discovery in Databases’, AAAI/MIT Press, Cambridge, MA. 38 | P a g e www.iiste.org