International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 102

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 2, February 2015

Trust Checking in Social Networks Using Data Mining

Archa.S

Now social network analysis gained many interest because of the large popularity of social media, social networking applications, blogs, or customer review sites. It mainly checks trust (and distrust) between people who belongs to communities in social networks. In social networks, trust is an essential quality between the user interactions and the recommendation for trustful content and users. This particular system is based on a reputation mechanism that rates the participants using previous experiences, observations, and other members opinion. In this paper, a collaborative reputation mechanism is used that collects and checks the users connections and capitalizes on trust propagation. Here it point out that this system can be applied to any type of social network.

Keywords: Personalization, Reputation, Recommendation, Social networks, Trust

Edition: Volume 4 Issue 2, February 2015

Pages: 1127 - 1129

Share this Article

How to Cite this Article?

Archa.S, "Trust Checking in Social Networks Using Data Mining", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB151360, Volume 4 Issue 2, February 2015, 1127 - 1129

Enter Your Email Address


Similar Articles with Keyword 'Personalization'

Downloads: 106

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 2077 - 2082

Supporting Privacy Protection in Personalized Web Search with Secured User Profile

Archana R. Ukande, Nitin Shivale

Share this Article

Downloads: 107

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1098 - 1103

Unwanted Message Filtering in OSN User Walls

Ashwini Swami, Jayashri Chaudhari

Share this Article

Similar Articles with Keyword 'Reputation'

Downloads: 100

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1058 - 1060

Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving

Rushikesh P. Dhanokar

Share this Article

Downloads: 105

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2095 - 2097

Trust Evaluation by Mining of E-commerce Feedback Comments

Priyanka Kumbhar, Manjushri Mahajan

Share this Article

Similar Articles with Keyword 'Recommendation'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1068 - 1070

Predicting the Course Knowledge Level of Students using Data Mining Techniques

Thapaswini P S

Share this Article

Downloads: 3

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 1118 - 1123

Music Recommendation System

Nipun Prakash Gupta, Durgesh Kumar

Share this Article

Similar Articles with Keyword 'Social networks'

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Downloads: 82

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1384 - 1390

Sherpa - Experts Social Network

Sangramsingh M Ghatage, Siddharth K Gaikwad

Share this Article

Similar Articles with Keyword 'Trust'

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article
Top