SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 241
Miss. Sushma Sri Enapanuri1, Mrs. Jayashree S Patil2
1M.Tech(cse), G. Narayanamma Institute of Technology and Science, Hyderabad
2Associate Professor, Department of CSE, G. Narayanamma Institute of Technology and Science, Hyderabad
----------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - To distribute the content and information among
the people, mobile Online Social Networks (OSNs) are
emanating as the most popular platform. With the universal
distribution and demandofwirelesscommunication, more and
more users are using online social networking resources in
wireless telephone devices. Hence, to reduce the access delay
and improve quality of experience support to attain mobile
user’s fulfillment in the media content prefetching, a socially-
driven learning based framework called Spice has been
proposed.
The Spice framework is estimated to attain high-performance
with high access delay reduction at the low cost of cellular
data and energy consumption. A speed-up over the local data
training execution on smartphones is also expected by
enabling the users to offload their machine learning
procedures to a cloud server.
Key Words: Mobile computing, online social network,
multimedia applications, quality of experience.
1. INTRODUCTION
The Online Networking stage where every single unique
individual can associate with others through their cell
phones and variouscontraptionsisknownasportableonline
informal organizations (OSN's). The social correspondence
plots, for example, Facebook and Twitter have made
portable applications to give constant access to web from
wherever. So OSN's, for example, facebook andtwitter are
filling in as the stage for social collaboration. They are
emerging as the exceptionally popular terrace so as to share
the substance and data among the individuals. As the
versatile web has step by step created from exclusive
portable advances and systems to Internet versatile access,
the distinction has changed to two kinds: 1. Web – based
social networks: It extended the mobile access through
mobile browsers and smartphone apps. 2. Native mobile
social networks: It focuses on mobile usage such as mobile
communication; location based services and augmented
reality.
It was accounted for that these days 68% of the OSN
administration utilizations happen on cell phones and on a
normal, a client burns through 2hours 25minutes every day
utilizing OSN administrations. Generally, 52% and 47% of
the client's gets news from twitterandfacebook andsoforth,
subsequently, OSN's are showing up as thestandardchannel
for data and substance sharing.
With the expanding notoriety and use of OSN's, there are a
portion of the key components for the breakdown of
versatile customer'ssatisfactionindevouringmedia content.
1. Access delay.
2. High wireless connection establishment latency.
3. Long roundtrip time of data transmission.
Some other factors include,
 Time varying network quality and
 Sporadic network availability, which leads to
fluctuating connection.
To beat this, an emphatically engaging and promising
methodology called Prefetching i.e., to download the media
content sooner than client's utilization at whatever point
there is a likelihood for the greatest bit of leeway. This can
diminish the access delay, saving both energy and
information traffic utilization.
For the intention of improving the forecast exactness of
media content prefetching in OSNs on cell phones, a
structure of EarlyBird was proposed. The real want is to
coordinate tweet preparing properties into a model called
direct relapse for accomplishing expectation by mining the
client's OSN utilization design. The crucial responses of the
earlybird model are that, it has not contributed sufficient
examination for social effect among the clients, which
assumes a basic job in media content utilization in OSNs.
II RELATED WORK
Prefetching-Based Mobile Dictionary:
To explain the prefetching effect, we describe each working
procedure is described in two different cases: In the first
case, the prefetch technique is not used and in the second
case the prefetching technique is used. During the first case
assuming that a user wants to know themeaningofthe word
w1 in the dictionary. If the user inputs w, into the mobile,
then the server will return the result r1 for w1 to themobile.
Next, if the user requests the meaningof w2inthesameway,
the server will return the result r2 for w2 to the mobile.
Likewise, if the prefetching is not used, the mobile device
needs to access the dictionary server for every word, and it
causes frequent roundtrips.
Data Mining and Cluster Based Machine Learning in Mobile Online
Social Networks using Spice
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 242
The rapidly expanding demand for digital mobile
communication services, in conjunction with the recent
advancement in mobile technology, has led to the
development efforts for future mobile systems directed
towards Mobile Computing - a new dimension and
requirements for future communication and computing
networks. The mobile applications can take advantage of
contextual information (such as user location, time of day,
nearby people and devices, and user activity) [1]. There are
many popular value-added applications that specifically
target the mobile client’s location as context information
such as traffic condition, tourist, weather information,
location-dependent advertising and disaster management
systems [2].
III METHODOLOY
Figure 1: Logical workflow of the Spice mobile media
prefetching system
The client follows are gathered from Twidere, an Android
Twitter application which has near 500,000 downloads on
Google Play and more than 17,000 clients consented to
report use information. This aides in leading an information
driven investigation and plan, and a sensible follow driven
execution assessment.
Through huge scale information investigation, it was
uncovered that the social cooperation among clients has
extraordinary effect on client's tweet click conduct.
Contingent upon this, social companionship bunching is
directed to characterize a client's social companions
dependent on significance. Next a group based Latent Bias
Model is created to appraise the probability of media
substance clicking.
Afterward, a versatile planning plan was intended to direct
the media tweet prefetching in energy and cell information
effective way which empowers the Spice clients to dump
their information preparing errands for AI to a cloud server,
in order to battle the high vitality utilization and long
handling inertness.
In Spice, the prefetching errand characterized ought not
exclusively be programmed yet additionally use versatile,
which prompts basic cell information stream and battery
productivity prerequisites on a starter that media
documents stacking postponement can be ensured.
It is critical to choose when to prefetch as indicated by
client's profile, arrange utilization inclination, application
use liveliness, and the manual tuning factors. As Spice is a
socially-determined usage for versatile media content
prefetching. It is critical to deal with the social kinship
impact, setting inclination, and OSN media properties.
Towards thisobjective,a socially-determinedlearning-based
calculation was presented which would be affected by the
social fellowship and setting highlights.
IV EXPERIMENTS
Data Prefetching is theprocessofretrievingandcachingdata
before the user has requested it. It is a technique proposed
to reduce latency to data and ensure data access in case of
disconnection. It can speed up the user's experiencewith his
mobile app.
Modern mobile operating systems such as Android and IoS
enable applications to cache data on the device. On Android
Settings −> Storage, one can easily see the amount of cache
storage used by each application. This section looks at
algorithms that each application can use to determine what
should be cached; the next section looks at how the
operating system should allocate cache spaces among the
applications. Caching is an extensively studied subject in
system research, from models of data access, to universal
algorithms such as LRU or LFU, to specialized algorithmsfor
file systems or databases. Unfortunately, most of the
research results do not apply to caching in mobile
applications for one simple reason: the source of the data
access is not a program, it’s a human!
For example, the locality model, which states that a recently
used item is likely to be used again, rarely applies to caching
on mobile devices. In fact, in the case of entertainment
applications, items consumed (e.g. a video that has been
watched, an article that has been read) are less likely to be
consumed again.
Caching in mobile applications needs non-traditional
algorithms. There are three distinct goals of caching on
mobile devices:
• reduce latency of mobile web access and improve user
experience of mobile applications;
• reduce data cost;
• improve availability of mobile applications during periods
of significant degradation in cellular data services, such as
crowded events.
Each of the above goals needsitsownspecializedalgorithms.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 243
Caching for Latency Reduction:
For mobile web, caching on the mobile device is
implemented by the browser, and using browser cache to
reduce web latency is generally well-understood [8]. All CSS
files and java scripts on the critical rendering path shouldbe
marked cacheable by the websitethroughexplicitExpiresor
Cache-Control headers. Unfortunately, browser
implementations offer no guarantee of caching any file.
HTML5 local storage [12] gives web sites much better
control on what are cached and what are not,thoughthesize
cap on local storage limits its utility. There are commercial
solutions that transform web sites for better browser
caching on mobile [9].
Many mobile applications also use caching to reduce data
fetches and improve user experience, though the impact of
caching on user-interaction latency varies by application.
Caching to Reduce Data Cost:
Traditional algorithms such as LRU can be applicable in
certain types of applications. If the common usagepattern of
the application is such that a user might concentrate on a
small set of objects for some period of time, then LRU can be
used. For example, a document reader application might
want to cache recently opened documents, since the user is
likely to work on them again. However, for entertainment
applications and social applications, LRU is often the wrong
algorithm to use. Instead, a “predicted probability of reuse”
function, similar to the predicted probabilityofconsumption
function, should be used. Many applications have good
models to predict reuse of the data objects; for example,
video applications might know that music videos tend to be
re-watched more often than non-music videos, social
applications might know that pictureswithlotsofcomments
tend to be viewed and commented again, etc. Assuming that
the function exists, the caching algorithm should simply
cache objects in order of descending probability of reuse.
Free diagnostic tools also exist to help mobile application
developers identify what objects should be cached, for
example, the ApplicationResourceOptimizerfromAT&T [7].
Caching to Improve Availability:
When the goal of caching is to improve application ability
under little or no mobile wireless connectivity, the value of
an object isn’t just the likelihood of a user needingit,butalso
the likelihood of the user needing it at a time of low wireless
connectivity. Since low wireless connectivity is typically a
property of the geo area, a mobile application can monitor
the wireless performance of its data fetches as the device
roams, and keep track of the bandwidth experienced at each
geo location. The application cache can then favour objects
that are needed at low-connectivity locations,eitherthrough
semantic connection (e.g. in the case of map application), or
through observations of past user behaviour (e.g. for users
with daily routines, objects needed at a particular geo
location follow a diurnal pattern).
V RESULTS
HOME SCREEN
This is the home page where initially user dataset is
uploaded which contains the informationrelatedtouserand
their friends list.
UPLOAD DATASET
Dataset is uploaded
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 244
AFTER SUCCESSFUL UPLOADING OF DATA SET
Successful uploading of the dataset
GENERATE CLUSTER
Generation of three different clusters
CONTENT PREDICTION
An alert message is displayed.
VIEW PREDICTION RESULT
The results of tweet checking probability, friend type,
number of tweets published.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 245
CLUSTER GRAPH
Generation of cluster graph based on the friend type and
count values.
VI CONCLUSION
Due to fundamental challenges in scaling wireless data
networks, wireless data remains a non-negligible cost item
for many users in the world. Intelligent caching and
preloading of data in mobile applications can significantly
improve user’s mobile experience, and is an area that needs
active research. To facilitate the researchcommunity’swork
in this area, the following data need to be collected, suitably
anonymized, and made available for researcher’s use.
REFERNCES
[1] C. Wu et al., “Spice:Socially-drivenlearning-basedmobile
media prefetching,” in Proc. 35th Annu. IEEE Int. Conf.
Compute. Commun. (IEEE INFOCOM), Apr. 2016, pp. 1–9.
[2] A. Lella, A. Lipsman, and K. Dreyer. U.S. Digital Future in
Focus, accessed on Apr. 2014.
[Online].http://www.comscore.com/Insights/Presentations-
andWhitepapers/2014/2014-US-Digital-Future-in-Focus
[3] S. Kemp. Digital, Social & Mobile Worldwide in 2015,
accessed on Jan. 2015.
[Online].Available:http://wearesocial.net/blog/2015/01/di
gitalsocial-mobile-worldwide-2015
[4] J. Holcomb, J. Gottfried, and A. Mitchell. News Use Across
Social Media Platforms, accessed on Nov. 2013. [Online].
Available: http://www.journalism.org/2013/11/14/news-
use-across-social-mediaplatforms/
[5] D. Chu, A. Kansal, J. Liu, and F. Zhao, “Mobile apps: It’s
time to move up to CondOS,” in Proc. 13th USENIX Conf. Hot
Topics Oper. Syst., 2011, p. 16.
[6] B. D. Higgins et al., “Informed mobile prefetching,” in
Proc. 10th Int. Conf. Mobile Syst., Appl., Services, 2012, pp.
155–168.
[7] Y. Wang, X. Liu, D. Chu, and Y. Liu, “EarlyBird: Mobile
prefetching of social network feeds via content preference
mining and usage pattern analysis,” in Proc. 16th ACM Int.
Symp. Mobile Ad Hoc Netw. Comput., 2015, pp. 67–76.
[8] D. Rout, K. Bontcheva, D. Preo¸tiuc-Pietro, and T. Cohn,
“Where’s@ wally?: A classification approach to geolocating
users based on their social ties,” in Proc. 24th ACM Conf.
Hypertext Social Media, 2013, pp. 11–20.
[9] K. Makice, Twitter API: Up and Running: Learn How to
Build Applications with theTwitterAPI,Sebastopol,CA,USA:
O’Reilly Media, 2009.
[10] R. McCreadie, I. Soboroff, J. Lin, C. Macdonald, I. Ounis,
and D. McCullough, “On building a reusable Twitter corpus,”
in Proc. 35th Int. ACM SIGIR Conf. Res. Develop. Inf. Retr.,
2012, pp. 1113–1114.
[11] M. E. J. Newman, “Modularity and community structure
in networks,” Proc. Nat. Acad. Sci. USA, vol. 103, no. 23, pp.
8577–8582, 2006.
[12] P. H. Wright, “Interpreting research on gender
differences in friendship: A case for moderation and a plea
for caution,” J. Social Pers. Relationships, vol. 5, no. 3, pp.
367–373, 1988.
[13] A. Ahmad and L.Dey, “A k-meanclusteringalgorithmfor
mixed numeric and categorical data,” Data Knowl. Eng., vol.
63, no. 2, pp. 503–527, 2007.
[14] A. J. Nicholson and B. D. Noble, “Bread Crumbs:
Forecasting mobile connectivity,” in Proc. 14th ACM Int.
Conf. Mobile Comput. Netw., 2008, pp. 46–57.
[15] L. Hong, R. Bekkerman, J. Adler, and B. D. Davison,
“Learning to rank social update streams,” in Proc. 35th Int.
ACM SIGIR Conf. Res. Develop. Inf. Retr., 2012, pp. 651–660.
[16] L. Bottou, “Stochastic gradientdescenttricks,”inNeural
Networks: Tricks of the Trade. Berlin, Germany: Springer,
2012, pp. 421–436.
[17] P. Ferreira, M. McGregor, and A. Lampinen, “Caring for
batteries: Maintaining infrastructures and mobile social
contexts,” in Proc. 17th Int. Conf. Human-Comput. Interact.
Mobile Devices Services, 2015, pp. 383–392.
[18]D. Shamma, L. Kennedy, and E. Churchill, “Tweetgeist:
Can the Twitter timeline reveal the structure of broadcast
events,” CSCW Horizons, pp.

Más contenido relacionado

La actualidad más candente

Review on College Event Organizer
Review on College Event OrganizerReview on College Event Organizer
Review on College Event OrganizerIRJET Journal
 
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING IAEME Publication
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...IRJET Journal
 
Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacyvivatechijri
 
I03402059063
I03402059063I03402059063
I03402059063theijes
 
Security risk analysis of bring your own device system in manufacturing compa...
Security risk analysis of bring your own device system in manufacturing compa...Security risk analysis of bring your own device system in manufacturing compa...
Security risk analysis of bring your own device system in manufacturing compa...TELKOMNIKA JOURNAL
 
Application Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise SetupApplication Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise SetupEswar Publications
 
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
IRJET-  	  A Review on Several Vulnerabilities Detection Techniques in Androi...IRJET-  	  A Review on Several Vulnerabilities Detection Techniques in Androi...
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...IRJET Journal
 
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...IJECEIAES
 
A prototype framework_for_high_performance_push_no
A prototype framework_for_high_performance_push_noA prototype framework_for_high_performance_push_no
A prototype framework_for_high_performance_push_noDavidNereekshan
 
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET Journal
 
IRJET- Authentic News Summarization
IRJET-  	  Authentic News SummarizationIRJET-  	  Authentic News Summarization
IRJET- Authentic News SummarizationIRJET Journal
 
IRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost MobileIRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost MobileIRJET Journal
 
Provide security about risk score in mobile application’s
Provide security about risk score in mobile application’sProvide security about risk score in mobile application’s
Provide security about risk score in mobile application’seSAT Journals
 

La actualidad más candente (19)

Review on College Event Organizer
Review on College Event OrganizerReview on College Event Organizer
Review on College Event Organizer
 
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
 
A DISTRIBUTED MACHINE LEARNING BASED IDS FOR CLOUD COMPUTING
A DISTRIBUTED MACHINE LEARNING BASED IDS FOR  CLOUD COMPUTINGA DISTRIBUTED MACHINE LEARNING BASED IDS FOR  CLOUD COMPUTING
A DISTRIBUTED MACHINE LEARNING BASED IDS FOR CLOUD COMPUTING
 
Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacy
 
I03402059063
I03402059063I03402059063
I03402059063
 
Security risk analysis of bring your own device system in manufacturing compa...
Security risk analysis of bring your own device system in manufacturing compa...Security risk analysis of bring your own device system in manufacturing compa...
Security risk analysis of bring your own device system in manufacturing compa...
 
Application Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise SetupApplication Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise Setup
 
Survey mobile app
Survey mobile appSurvey mobile app
Survey mobile app
 
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
IRJET-  	  A Review on Several Vulnerabilities Detection Techniques in Androi...IRJET-  	  A Review on Several Vulnerabilities Detection Techniques in Androi...
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
 
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
 
A prototype framework_for_high_performance_push_no
A prototype framework_for_high_performance_push_noA prototype framework_for_high_performance_push_no
A prototype framework_for_high_performance_push_no
 
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
 
Ijmet 10 01_095
Ijmet 10 01_095Ijmet 10 01_095
Ijmet 10 01_095
 
20120130406025
2012013040602520120130406025
20120130406025
 
IRJET- Authentic News Summarization
IRJET-  	  Authentic News SummarizationIRJET-  	  Authentic News Summarization
IRJET- Authentic News Summarization
 
2014 android ieee
2014 android ieee2014 android ieee
2014 android ieee
 
IRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost MobileIRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost Mobile
 
Provide security about risk score in mobile application’s
Provide security about risk score in mobile application’sProvide security about risk score in mobile application’s
Provide security about risk score in mobile application’s
 

Similar a IRJET- Data Mining and Cluster based Machine Learning in Mobile Online Social Networks using Spice

The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationThe common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationeSAT Publishing House
 
The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationThe common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationeSAT Journals
 
Dynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database forDynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database foreSAT Publishing House
 
Prediction Techniques in Internet of Things (IoT) Environment: A Comparative ...
Prediction Techniques in Internet of Things (IoT) Environment: A Comparative ...Prediction Techniques in Internet of Things (IoT) Environment: A Comparative ...
Prediction Techniques in Internet of Things (IoT) Environment: A Comparative ...rahulmonikasharma
 
A Survey of Cyber foraging systems: Open Issues, Research Challenges
A Survey of Cyber foraging systems: Open Issues, Research ChallengesA Survey of Cyber foraging systems: Open Issues, Research Challenges
A Survey of Cyber foraging systems: Open Issues, Research ChallengesEswar Publications
 
IRJET - PAA: Productivity Android Application
IRJET -  	  PAA: Productivity Android ApplicationIRJET -  	  PAA: Productivity Android Application
IRJET - PAA: Productivity Android ApplicationIRJET Journal
 
IRJET- An Overview on Mobile Cloud Computing
IRJET-  	  An Overview on Mobile Cloud ComputingIRJET-  	  An Overview on Mobile Cloud Computing
IRJET- An Overview on Mobile Cloud ComputingIRJET Journal
 
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONSQUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONSIJCSEA Journal
 
IRJET- Tour and Travels
IRJET- Tour and TravelsIRJET- Tour and Travels
IRJET- Tour and TravelsIRJET Journal
 
IRJET- Medicine Information Retrieval Application- Pharmaguide
IRJET- Medicine Information Retrieval Application- PharmaguideIRJET- Medicine Information Retrieval Application- Pharmaguide
IRJET- Medicine Information Retrieval Application- PharmaguideIRJET Journal
 
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...IRJET Journal
 
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEMAN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEMIRJET Journal
 
IRJET- Android Application for WIFI based Library Book Locator
IRJET-  	  Android Application for WIFI based Library Book LocatorIRJET-  	  Android Application for WIFI based Library Book Locator
IRJET- Android Application for WIFI based Library Book LocatorIRJET Journal
 
IRJET- The Usability of HCI in Smart Home
IRJET- The Usability of HCI in Smart HomeIRJET- The Usability of HCI in Smart Home
IRJET- The Usability of HCI in Smart HomeIRJET Journal
 
IRJET- Voice based Email Application for Blind People
IRJET-  	  Voice based Email Application for Blind PeopleIRJET-  	  Voice based Email Application for Blind People
IRJET- Voice based Email Application for Blind PeopleIRJET Journal
 
Vertex – The All in one Web Application
Vertex – The All in one Web ApplicationVertex – The All in one Web Application
Vertex – The All in one Web ApplicationIRJET Journal
 
IRJET- Trend Analysis on Twitter
IRJET- Trend Analysis on TwitterIRJET- Trend Analysis on Twitter
IRJET- Trend Analysis on TwitterIRJET Journal
 
IRJET- Location based Voice Reminder
IRJET-  	  Location based Voice ReminderIRJET-  	  Location based Voice Reminder
IRJET- Location based Voice ReminderIRJET Journal
 
IRJET - Labtrust-Android Application for Pathology Laboratory
IRJET -  	  Labtrust-Android Application for Pathology LaboratoryIRJET -  	  Labtrust-Android Application for Pathology Laboratory
IRJET - Labtrust-Android Application for Pathology LaboratoryIRJET Journal
 

Similar a IRJET- Data Mining and Cluster based Machine Learning in Mobile Online Social Networks using Spice (20)

The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationThe common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generation
 
The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationThe common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generation
 
Dynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database forDynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database for
 
Prediction Techniques in Internet of Things (IoT) Environment: A Comparative ...
Prediction Techniques in Internet of Things (IoT) Environment: A Comparative ...Prediction Techniques in Internet of Things (IoT) Environment: A Comparative ...
Prediction Techniques in Internet of Things (IoT) Environment: A Comparative ...
 
A Survey of Cyber foraging systems: Open Issues, Research Challenges
A Survey of Cyber foraging systems: Open Issues, Research ChallengesA Survey of Cyber foraging systems: Open Issues, Research Challenges
A Survey of Cyber foraging systems: Open Issues, Research Challenges
 
IRJET - PAA: Productivity Android Application
IRJET -  	  PAA: Productivity Android ApplicationIRJET -  	  PAA: Productivity Android Application
IRJET - PAA: Productivity Android Application
 
IRJET- An Overview on Mobile Cloud Computing
IRJET-  	  An Overview on Mobile Cloud ComputingIRJET-  	  An Overview on Mobile Cloud Computing
IRJET- An Overview on Mobile Cloud Computing
 
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONSQUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
QUALITY ASSURANCE AND INTEGRATION TESTING ASPECTS IN WEB BASED APPLICATIONS
 
IRJET- Tour and Travels
IRJET- Tour and TravelsIRJET- Tour and Travels
IRJET- Tour and Travels
 
IRJET- Medicine Information Retrieval Application- Pharmaguide
IRJET- Medicine Information Retrieval Application- PharmaguideIRJET- Medicine Information Retrieval Application- Pharmaguide
IRJET- Medicine Information Retrieval Application- Pharmaguide
 
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
 
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEMAN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
 
IRJET- Android Application for WIFI based Library Book Locator
IRJET-  	  Android Application for WIFI based Library Book LocatorIRJET-  	  Android Application for WIFI based Library Book Locator
IRJET- Android Application for WIFI based Library Book Locator
 
IRJET- The Usability of HCI in Smart Home
IRJET- The Usability of HCI in Smart HomeIRJET- The Usability of HCI in Smart Home
IRJET- The Usability of HCI in Smart Home
 
A Survey to Augment Energy Efficiency of Mobile Devices in Cloud Environment
A Survey to Augment Energy Efficiency of Mobile Devices in Cloud EnvironmentA Survey to Augment Energy Efficiency of Mobile Devices in Cloud Environment
A Survey to Augment Energy Efficiency of Mobile Devices in Cloud Environment
 
IRJET- Voice based Email Application for Blind People
IRJET-  	  Voice based Email Application for Blind PeopleIRJET-  	  Voice based Email Application for Blind People
IRJET- Voice based Email Application for Blind People
 
Vertex – The All in one Web Application
Vertex – The All in one Web ApplicationVertex – The All in one Web Application
Vertex – The All in one Web Application
 
IRJET- Trend Analysis on Twitter
IRJET- Trend Analysis on TwitterIRJET- Trend Analysis on Twitter
IRJET- Trend Analysis on Twitter
 
IRJET- Location based Voice Reminder
IRJET-  	  Location based Voice ReminderIRJET-  	  Location based Voice Reminder
IRJET- Location based Voice Reminder
 
IRJET - Labtrust-Android Application for Pathology Laboratory
IRJET -  	  Labtrust-Android Application for Pathology LaboratoryIRJET -  	  Labtrust-Android Application for Pathology Laboratory
IRJET - Labtrust-Android Application for Pathology Laboratory
 

Más de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Más de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Último

CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESkarthi keyan
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProRay Yuan Liu
 
AntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptxAntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptxLina Kadam
 
Theory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfTheory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfShreyas Pandit
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labsamber724300
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
Javier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptxJavier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptxJavier Fernández Muñoz
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewsandhya757531
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSsandhya757531
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfBalamuruganV28
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxStephen Sitton
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHSneha Padhiar
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Romil Mishra
 
70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical trainingGladiatorsKasper
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organizationchnrketan
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork
 
Substation Automation SCADA and Gateway Solutions by BRH
Substation Automation SCADA and Gateway Solutions by BRHSubstation Automation SCADA and Gateway Solutions by BRH
Substation Automation SCADA and Gateway Solutions by BRHbirinder2
 

Último (20)

CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision Pro
 
AntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptxAntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptx
 
Theory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfTheory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdf
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labs
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
Javier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptxJavier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptx
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overview
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdf
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptx
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
 
Versatile Engineering Construction Firms
Versatile Engineering Construction FirmsVersatile Engineering Construction Firms
Versatile Engineering Construction Firms
 
70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organization
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
 
Substation Automation SCADA and Gateway Solutions by BRH
Substation Automation SCADA and Gateway Solutions by BRHSubstation Automation SCADA and Gateway Solutions by BRH
Substation Automation SCADA and Gateway Solutions by BRH
 

IRJET- Data Mining and Cluster based Machine Learning in Mobile Online Social Networks using Spice

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 241 Miss. Sushma Sri Enapanuri1, Mrs. Jayashree S Patil2 1M.Tech(cse), G. Narayanamma Institute of Technology and Science, Hyderabad 2Associate Professor, Department of CSE, G. Narayanamma Institute of Technology and Science, Hyderabad ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - To distribute the content and information among the people, mobile Online Social Networks (OSNs) are emanating as the most popular platform. With the universal distribution and demandofwirelesscommunication, more and more users are using online social networking resources in wireless telephone devices. Hence, to reduce the access delay and improve quality of experience support to attain mobile user’s fulfillment in the media content prefetching, a socially- driven learning based framework called Spice has been proposed. The Spice framework is estimated to attain high-performance with high access delay reduction at the low cost of cellular data and energy consumption. A speed-up over the local data training execution on smartphones is also expected by enabling the users to offload their machine learning procedures to a cloud server. Key Words: Mobile computing, online social network, multimedia applications, quality of experience. 1. INTRODUCTION The Online Networking stage where every single unique individual can associate with others through their cell phones and variouscontraptionsisknownasportableonline informal organizations (OSN's). The social correspondence plots, for example, Facebook and Twitter have made portable applications to give constant access to web from wherever. So OSN's, for example, facebook andtwitter are filling in as the stage for social collaboration. They are emerging as the exceptionally popular terrace so as to share the substance and data among the individuals. As the versatile web has step by step created from exclusive portable advances and systems to Internet versatile access, the distinction has changed to two kinds: 1. Web – based social networks: It extended the mobile access through mobile browsers and smartphone apps. 2. Native mobile social networks: It focuses on mobile usage such as mobile communication; location based services and augmented reality. It was accounted for that these days 68% of the OSN administration utilizations happen on cell phones and on a normal, a client burns through 2hours 25minutes every day utilizing OSN administrations. Generally, 52% and 47% of the client's gets news from twitterandfacebook andsoforth, subsequently, OSN's are showing up as thestandardchannel for data and substance sharing. With the expanding notoriety and use of OSN's, there are a portion of the key components for the breakdown of versatile customer'ssatisfactionindevouringmedia content. 1. Access delay. 2. High wireless connection establishment latency. 3. Long roundtrip time of data transmission. Some other factors include,  Time varying network quality and  Sporadic network availability, which leads to fluctuating connection. To beat this, an emphatically engaging and promising methodology called Prefetching i.e., to download the media content sooner than client's utilization at whatever point there is a likelihood for the greatest bit of leeway. This can diminish the access delay, saving both energy and information traffic utilization. For the intention of improving the forecast exactness of media content prefetching in OSNs on cell phones, a structure of EarlyBird was proposed. The real want is to coordinate tweet preparing properties into a model called direct relapse for accomplishing expectation by mining the client's OSN utilization design. The crucial responses of the earlybird model are that, it has not contributed sufficient examination for social effect among the clients, which assumes a basic job in media content utilization in OSNs. II RELATED WORK Prefetching-Based Mobile Dictionary: To explain the prefetching effect, we describe each working procedure is described in two different cases: In the first case, the prefetch technique is not used and in the second case the prefetching technique is used. During the first case assuming that a user wants to know themeaningofthe word w1 in the dictionary. If the user inputs w, into the mobile, then the server will return the result r1 for w1 to themobile. Next, if the user requests the meaningof w2inthesameway, the server will return the result r2 for w2 to the mobile. Likewise, if the prefetching is not used, the mobile device needs to access the dictionary server for every word, and it causes frequent roundtrips. Data Mining and Cluster Based Machine Learning in Mobile Online Social Networks using Spice
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 242 The rapidly expanding demand for digital mobile communication services, in conjunction with the recent advancement in mobile technology, has led to the development efforts for future mobile systems directed towards Mobile Computing - a new dimension and requirements for future communication and computing networks. The mobile applications can take advantage of contextual information (such as user location, time of day, nearby people and devices, and user activity) [1]. There are many popular value-added applications that specifically target the mobile client’s location as context information such as traffic condition, tourist, weather information, location-dependent advertising and disaster management systems [2]. III METHODOLOY Figure 1: Logical workflow of the Spice mobile media prefetching system The client follows are gathered from Twidere, an Android Twitter application which has near 500,000 downloads on Google Play and more than 17,000 clients consented to report use information. This aides in leading an information driven investigation and plan, and a sensible follow driven execution assessment. Through huge scale information investigation, it was uncovered that the social cooperation among clients has extraordinary effect on client's tweet click conduct. Contingent upon this, social companionship bunching is directed to characterize a client's social companions dependent on significance. Next a group based Latent Bias Model is created to appraise the probability of media substance clicking. Afterward, a versatile planning plan was intended to direct the media tweet prefetching in energy and cell information effective way which empowers the Spice clients to dump their information preparing errands for AI to a cloud server, in order to battle the high vitality utilization and long handling inertness. In Spice, the prefetching errand characterized ought not exclusively be programmed yet additionally use versatile, which prompts basic cell information stream and battery productivity prerequisites on a starter that media documents stacking postponement can be ensured. It is critical to choose when to prefetch as indicated by client's profile, arrange utilization inclination, application use liveliness, and the manual tuning factors. As Spice is a socially-determined usage for versatile media content prefetching. It is critical to deal with the social kinship impact, setting inclination, and OSN media properties. Towards thisobjective,a socially-determinedlearning-based calculation was presented which would be affected by the social fellowship and setting highlights. IV EXPERIMENTS Data Prefetching is theprocessofretrievingandcachingdata before the user has requested it. It is a technique proposed to reduce latency to data and ensure data access in case of disconnection. It can speed up the user's experiencewith his mobile app. Modern mobile operating systems such as Android and IoS enable applications to cache data on the device. On Android Settings −> Storage, one can easily see the amount of cache storage used by each application. This section looks at algorithms that each application can use to determine what should be cached; the next section looks at how the operating system should allocate cache spaces among the applications. Caching is an extensively studied subject in system research, from models of data access, to universal algorithms such as LRU or LFU, to specialized algorithmsfor file systems or databases. Unfortunately, most of the research results do not apply to caching in mobile applications for one simple reason: the source of the data access is not a program, it’s a human! For example, the locality model, which states that a recently used item is likely to be used again, rarely applies to caching on mobile devices. In fact, in the case of entertainment applications, items consumed (e.g. a video that has been watched, an article that has been read) are less likely to be consumed again. Caching in mobile applications needs non-traditional algorithms. There are three distinct goals of caching on mobile devices: • reduce latency of mobile web access and improve user experience of mobile applications; • reduce data cost; • improve availability of mobile applications during periods of significant degradation in cellular data services, such as crowded events. Each of the above goals needsitsownspecializedalgorithms.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 243 Caching for Latency Reduction: For mobile web, caching on the mobile device is implemented by the browser, and using browser cache to reduce web latency is generally well-understood [8]. All CSS files and java scripts on the critical rendering path shouldbe marked cacheable by the websitethroughexplicitExpiresor Cache-Control headers. Unfortunately, browser implementations offer no guarantee of caching any file. HTML5 local storage [12] gives web sites much better control on what are cached and what are not,thoughthesize cap on local storage limits its utility. There are commercial solutions that transform web sites for better browser caching on mobile [9]. Many mobile applications also use caching to reduce data fetches and improve user experience, though the impact of caching on user-interaction latency varies by application. Caching to Reduce Data Cost: Traditional algorithms such as LRU can be applicable in certain types of applications. If the common usagepattern of the application is such that a user might concentrate on a small set of objects for some period of time, then LRU can be used. For example, a document reader application might want to cache recently opened documents, since the user is likely to work on them again. However, for entertainment applications and social applications, LRU is often the wrong algorithm to use. Instead, a “predicted probability of reuse” function, similar to the predicted probabilityofconsumption function, should be used. Many applications have good models to predict reuse of the data objects; for example, video applications might know that music videos tend to be re-watched more often than non-music videos, social applications might know that pictureswithlotsofcomments tend to be viewed and commented again, etc. Assuming that the function exists, the caching algorithm should simply cache objects in order of descending probability of reuse. Free diagnostic tools also exist to help mobile application developers identify what objects should be cached, for example, the ApplicationResourceOptimizerfromAT&T [7]. Caching to Improve Availability: When the goal of caching is to improve application ability under little or no mobile wireless connectivity, the value of an object isn’t just the likelihood of a user needingit,butalso the likelihood of the user needing it at a time of low wireless connectivity. Since low wireless connectivity is typically a property of the geo area, a mobile application can monitor the wireless performance of its data fetches as the device roams, and keep track of the bandwidth experienced at each geo location. The application cache can then favour objects that are needed at low-connectivity locations,eitherthrough semantic connection (e.g. in the case of map application), or through observations of past user behaviour (e.g. for users with daily routines, objects needed at a particular geo location follow a diurnal pattern). V RESULTS HOME SCREEN This is the home page where initially user dataset is uploaded which contains the informationrelatedtouserand their friends list. UPLOAD DATASET Dataset is uploaded
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 244 AFTER SUCCESSFUL UPLOADING OF DATA SET Successful uploading of the dataset GENERATE CLUSTER Generation of three different clusters CONTENT PREDICTION An alert message is displayed. VIEW PREDICTION RESULT The results of tweet checking probability, friend type, number of tweets published.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 245 CLUSTER GRAPH Generation of cluster graph based on the friend type and count values. VI CONCLUSION Due to fundamental challenges in scaling wireless data networks, wireless data remains a non-negligible cost item for many users in the world. Intelligent caching and preloading of data in mobile applications can significantly improve user’s mobile experience, and is an area that needs active research. To facilitate the researchcommunity’swork in this area, the following data need to be collected, suitably anonymized, and made available for researcher’s use. REFERNCES [1] C. Wu et al., “Spice:Socially-drivenlearning-basedmobile media prefetching,” in Proc. 35th Annu. IEEE Int. Conf. Compute. Commun. (IEEE INFOCOM), Apr. 2016, pp. 1–9. [2] A. Lella, A. Lipsman, and K. Dreyer. U.S. Digital Future in Focus, accessed on Apr. 2014. [Online].http://www.comscore.com/Insights/Presentations- andWhitepapers/2014/2014-US-Digital-Future-in-Focus [3] S. Kemp. Digital, Social & Mobile Worldwide in 2015, accessed on Jan. 2015. [Online].Available:http://wearesocial.net/blog/2015/01/di gitalsocial-mobile-worldwide-2015 [4] J. Holcomb, J. Gottfried, and A. Mitchell. News Use Across Social Media Platforms, accessed on Nov. 2013. [Online]. Available: http://www.journalism.org/2013/11/14/news- use-across-social-mediaplatforms/ [5] D. Chu, A. Kansal, J. Liu, and F. Zhao, “Mobile apps: It’s time to move up to CondOS,” in Proc. 13th USENIX Conf. Hot Topics Oper. Syst., 2011, p. 16. [6] B. D. Higgins et al., “Informed mobile prefetching,” in Proc. 10th Int. Conf. Mobile Syst., Appl., Services, 2012, pp. 155–168. [7] Y. Wang, X. Liu, D. Chu, and Y. Liu, “EarlyBird: Mobile prefetching of social network feeds via content preference mining and usage pattern analysis,” in Proc. 16th ACM Int. Symp. Mobile Ad Hoc Netw. Comput., 2015, pp. 67–76. [8] D. Rout, K. Bontcheva, D. Preo¸tiuc-Pietro, and T. Cohn, “Where’s@ wally?: A classification approach to geolocating users based on their social ties,” in Proc. 24th ACM Conf. Hypertext Social Media, 2013, pp. 11–20. [9] K. Makice, Twitter API: Up and Running: Learn How to Build Applications with theTwitterAPI,Sebastopol,CA,USA: O’Reilly Media, 2009. [10] R. McCreadie, I. Soboroff, J. Lin, C. Macdonald, I. Ounis, and D. McCullough, “On building a reusable Twitter corpus,” in Proc. 35th Int. ACM SIGIR Conf. Res. Develop. Inf. Retr., 2012, pp. 1113–1114. [11] M. E. J. Newman, “Modularity and community structure in networks,” Proc. Nat. Acad. Sci. USA, vol. 103, no. 23, pp. 8577–8582, 2006. [12] P. H. Wright, “Interpreting research on gender differences in friendship: A case for moderation and a plea for caution,” J. Social Pers. Relationships, vol. 5, no. 3, pp. 367–373, 1988. [13] A. Ahmad and L.Dey, “A k-meanclusteringalgorithmfor mixed numeric and categorical data,” Data Knowl. Eng., vol. 63, no. 2, pp. 503–527, 2007. [14] A. J. Nicholson and B. D. Noble, “Bread Crumbs: Forecasting mobile connectivity,” in Proc. 14th ACM Int. Conf. Mobile Comput. Netw., 2008, pp. 46–57. [15] L. Hong, R. Bekkerman, J. Adler, and B. D. Davison, “Learning to rank social update streams,” in Proc. 35th Int. ACM SIGIR Conf. Res. Develop. Inf. Retr., 2012, pp. 651–660. [16] L. Bottou, “Stochastic gradientdescenttricks,”inNeural Networks: Tricks of the Trade. Berlin, Germany: Springer, 2012, pp. 421–436. [17] P. Ferreira, M. McGregor, and A. Lampinen, “Caring for batteries: Maintaining infrastructures and mobile social contexts,” in Proc. 17th Int. Conf. Human-Comput. Interact. Mobile Devices Services, 2015, pp. 383–392. [18]D. Shamma, L. Kennedy, and E. Churchill, “Tweetgeist: Can the Twitter timeline reveal the structure of broadcast events,” CSCW Horizons, pp.