A reliable friendship mechanism for online social network exploiting pre and post-filtering approach
Online social networks are becoming increasingly popular, and their uses are growing day by day. It is an integral part of our daily lives and an incomparable medium to communicate with family, friends, and professionals in the interest of personal and professional purposes. Because of these feature...
| Main Author: | S M Nazmus, Sadat |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2022
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/37677/ http://umpir.ump.edu.my/id/eprint/37677/1/ir..A%20reliable%20friendship%20mechanism%20for%20online%20social%20network%20exploiting%20pre%20and%20post-filtering%20approach.pdf |
Similar Items
SPY-BOT: Machine learning-enabled post filtering for social network-integrated industrial internet of things
by: Rahman, Md. Arafatur, et al.
Published: (2021)
by: Rahman, Md. Arafatur, et al.
Published: (2021)
A secure and sustainable framework to mitigate hazardous activities in online social networks
by: Rahman, Md. Arafatur, et al.
Published: (2020)
by: Rahman, Md. Arafatur, et al.
Published: (2020)
A cyber-enabled mission-critical system for post-flood response: Exploiting TV white space as network backhaul links
by: Rahman, Md. Arafatur, et al.
Published: (2019)
by: Rahman, Md. Arafatur, et al.
Published: (2019)
A collaborative model for post flood activities exploiting an enhanced expanding neighborhood search algorithm
by: Hasan, Md Munirul
Published: (2019)
by: Hasan, Md Munirul
Published: (2019)
Exploiting the power of multiplicity: a holistic survey of network-layer multipath
by: Qadir, Junaid, et al.
Published: (2015)
by: Qadir, Junaid, et al.
Published: (2015)
Crowd Associated Network: Exploiting over a Smart Garbage Management System
by: Azad, Saiful, et al.
Published: (2017)
by: Azad, Saiful, et al.
Published: (2017)
Simplified link reliability enhancement schemes for wireless networks
by: Boon, Hoi Lim, et al.
Published: (2009)
by: Boon, Hoi Lim, et al.
Published: (2009)
Conceptualizing a Model for Adoption of Online Social Networks as a Learning Tool
by: Mufadhal, Mokhtar Esmail, et al.
Published: (2018)
by: Mufadhal, Mokhtar Esmail, et al.
Published: (2018)
10 c’s of social networking, interconnections and
the impact on social networking
by: Shah, Asadullah, et al.
Published: (2013)
by: Shah, Asadullah, et al.
Published: (2013)
Collab-SAR: A collaborative avalanche search-and-rescue missions exploiting hostile alpine networks
by: Rahman, Md. Arafatur, et al.
Published: (2018)
by: Rahman, Md. Arafatur, et al.
Published: (2018)
Digital Forensic Automation Model For Online Social Networks
by: Arshad, Humaira
Published: (2019)
by: Arshad, Humaira
Published: (2019)
Source camera identification for online social network images using texture feature / Nordiana Rahim
by: Nordiana , Rahim
Published: (2018)
by: Nordiana , Rahim
Published: (2018)
Smart Routing Management Framework Exploiting Dynamic Data Resources of Cross-Layer Design and Machine Learning Approaches for Mobile Cognitive Radio Networks: A Survey
by: Salih, Qusay Medhat, et al.
Published: (2020)
by: Salih, Qusay Medhat, et al.
Published: (2020)
Exploiting Privacy-Policy and -Management Features on Social Networks: A User's Perspective
by: Mohd Ishak, Ismail, et al.
Published: (2016)
by: Mohd Ishak, Ismail, et al.
Published: (2016)
The acceptance of online social networks as a technology-based education tools among higher institutes students: A structural equation modeling approach
by: Al-Sharafi, Mohammed A., et al.
Published: (2019)
by: Al-Sharafi, Mohammed A., et al.
Published: (2019)
Effective methods to detect cyberbullying and influential spreaders in an online social network / Mohammed Ali Derhem Al Garadi
by: Mohammed Ali Derhem , Al Garadi
Published: (2017)
by: Mohammed Ali Derhem , Al Garadi
Published: (2017)
Social Information Retrieval for Online Community Question Answering Services
by: Lee, Jun Choi, et al.
Published: (2016)
by: Lee, Jun Choi, et al.
Published: (2016)
The intention to share and re-shared among the young adults towards a posting at social networking sites
by: Teh, Phoey Lee *, et al.
Published: (2014)
by: Teh, Phoey Lee *, et al.
Published: (2014)
A concept to measure social capital in social network sites
by: Sander, Tom, et al.
Published: (2014)
by: Sander, Tom, et al.
Published: (2014)
Online Programming Group Network (OPGN) / Kok Chun Jye
by: Kok , Chun Jye
Published: (2005)
by: Kok , Chun Jye
Published: (2005)
Causal mechanism in social network sites under consideration of the social capital theory
by: Sander, Tom, et al.
Published: (2014)
by: Sander, Tom, et al.
Published: (2014)
Advanced online battery states coestimation using Kalman filter for electric vehicle Applications / Prashant Shrivastava
by: Prashant , Shrivastava
Published: (2021)
by: Prashant , Shrivastava
Published: (2021)
The relevance of bibliometric analysis to discover the area's research efforts: Root exploit evolution
by: Che Akmal, Che Yahaya, et al.
Published: (2022)
by: Che Akmal, Che Yahaya, et al.
Published: (2022)
Exploitation of ICT for strategic education marketing in
Malaysian Public Institutions of Higher Learning (MPIHL)
by: Khayon, Mohaiminah, et al.
Published: (2006)
by: Khayon, Mohaiminah, et al.
Published: (2006)
Image filtering
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Modelling, Detection And Exploitation Of Lexical Functions For Analysis.
by: Schwab, Didier, et al.
Published: (2007)
by: Schwab, Didier, et al.
Published: (2007)
The dimensioning of non-token-bucket parameters for efficient and reliable QoS routing decisions in bluetooth ad hoc network
by: Hasbullah, Halabi, et al.
Published: (2008)
by: Hasbullah, Halabi, et al.
Published: (2008)
The use of social networking sites for the employment seeking process
by: Sander, Tom, et al.
Published: (2014)
by: Sander, Tom, et al.
Published: (2014)
A social network of crime : A review of the use of social networks for crime and the detection of crime
by: Drury, Brett, et al.
Published: (2022)
by: Drury, Brett, et al.
Published: (2022)
Midrange exploration exploitation searching particle swarm optimization in dynamic environment
by: Nurul Izzatie Husna, Fauzi, et al.
Published: (2021)
by: Nurul Izzatie Husna, Fauzi, et al.
Published: (2021)
A semantic taxonomy for weighting assumptions to reduce feature selection from social media and forum posts
by: Ali Muttaleb, Hasan, et al.
Published: (2020)
by: Ali Muttaleb, Hasan, et al.
Published: (2020)
Cloud of Word vs DroidKungfu: Performance evaluation in detecting root exploit malware with deep learning approach
by: Che Akmal, Che Yahaya, et al.
Published: (2023)
by: Che Akmal, Che Yahaya, et al.
Published: (2023)
Development of actors and artefacts taxonomy for social research network sites
by: Ruzainisuhanaliza, Abdul Muni
Published: (2018)
by: Ruzainisuhanaliza, Abdul Muni
Published: (2018)
Reliable Decision Making of Accepting Friend Request on Online Social Networks
by: Rahman, Md. Arafatur, et al.
Published: (2018)
by: Rahman, Md. Arafatur, et al.
Published: (2018)
A Kalman Filter Approach for Solving Unimodal Optimization Problems
by: Zuwairie, Ibrahim, et al.
Published: (2015)
by: Zuwairie, Ibrahim, et al.
Published: (2015)
Mobile application for concrete strength measurement tools by exploiting heat imaging information
by: Nur Farhana Nabila, Zulkifli
Published: (2019)
by: Nur Farhana Nabila, Zulkifli
Published: (2019)
Data filtering of 5-axis inertial measurement unit using kalman filter
by: Nur Syazwani, Samsudin
Published: (2013)
by: Nur Syazwani, Samsudin
Published: (2013)
The perception of Muslim users on reliability of Islamic
websites
by: Mohammad Nassr, Rasheed, et al.
Published: (2014)
by: Mohammad Nassr, Rasheed, et al.
Published: (2014)
Midrange exploration exploitation searching particle swarm optimization with HSV-template matching for crowded environment object tracking
by: Nurul Izzatie Husna, Muhamad Fauzi
Published: (2023)
by: Nurul Izzatie Husna, Muhamad Fauzi
Published: (2023)
Disaster recovery with minimum replica plan for reliability
checking in multi-cloud
by: Alshammari, Mohammad Matar, et al.
Published: (2018)
by: Alshammari, Mohammad Matar, et al.
Published: (2018)
Similar Items
-
SPY-BOT: Machine learning-enabled post filtering for social network-integrated industrial internet of things
by: Rahman, Md. Arafatur, et al.
Published: (2021) -
A secure and sustainable framework to mitigate hazardous activities in online social networks
by: Rahman, Md. Arafatur, et al.
Published: (2020) -
A cyber-enabled mission-critical system for post-flood response: Exploiting TV white space as network backhaul links
by: Rahman, Md. Arafatur, et al.
Published: (2019) -
A collaborative model for post flood activities exploiting an enhanced expanding neighborhood search algorithm
by: Hasan, Md Munirul
Published: (2019) -
Exploiting the power of multiplicity: a holistic survey of network-layer multipath
by: Qadir, Junaid, et al.
Published: (2015)