SlideShare a Scribd company logo
1 of 11
Download to read offline
International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 5, October 2017
DOI:10.5121/ijcsit.2017.9504 39
DEVELOPMENT OF SECURITY DETECTION MODEL
FOR THE SECURITY OF SOCIAL BLOGS AND
CHATTING FROM HOSTILE USERS
Shubhankar Gupta1
and Nitin2
1
Jaypee Institute of Information Technology, Noida, India
2
Professor, CEAS, University of Cincinnati, Cincinnati, USA
ABSTRACT
Worldwide, a large number of people interact with each other by means of online chatting. There has been
a significant rise in the number of platforms, both social and professional, such as WhatsApp, Facebook,
and Twitter, which allow people to share their experiences, views and knowledge with others. Sadly
enough, with online communication getting embedded into our daily communication, incivility and
misbehaviour has taken on many nuances from professional misbehaviour to professional decay. Generally
flaming starts with the exchange of rude messages and comments, which in turn triggers to higher scale of
flaming. To prevent online communication from getting downgraded, it is essential to keep away the hostile
users from communication platforms. This paper presents a Security Detection Model and a tool which
checks and prevents online flaming. It detects the presence of flaming while chatting or posting blogs, and
censors swear words as well as blocks the users from flaming.
KEYWORDS
Information Technology (IT), Flame Detector Tool, Censor Words, Flaming, Flame Intensity, Notification,
Social Platform, Security Detection Model
1. INTRODUCTION
In the last few years, online communication has increased manifold with millions of people
discovering the power of Information Technology (IT) each month. Throughout the world, a large
number of people interact with each other through the means of online chatting which has now
overtaken other forms of communication. Recently, there has been a significant rise in the
number of platforms, both social and professional, such as WhatsApp, Facebook, Twitter, Quora,
which allow people to share their experiences, views, knowledge, and business communications
with others [1]. Nowadays, online forums and social networking sites are becoming a platform for
business and socially active people to engage with each other for business networking, discussing
issues and promoting businesses by sharing online description of products, tools or solutions to
different kinds of problems.
Undoubtedly, there are several advantages of the mode of online communication, but there are
some disadvantages attached to it in the form of online aggressive behaviour, known as flaming in
IT industry. The term flaming originated from the Hacker's Dictionary [2], which defines it as to
speak rapidly or incessantly on an uninteresting topic or with a patently ridiculous attitude. The
meaning of the word has diverged from this definition since then. In fact, flaming is a hostile and
insulting interaction between persons, often involving the use of profanity. It can also be the
swapping of insults back and forth or with many people in a group or on a single person. It can be
deliberately provoked by seemingly trivial differences. Deliberate flaming, as opposed to flaming
as a result of emotional discussions, is carried out by individuals known as flamers or troller or
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2017
40
bullies, who are specifically motivated to incite flaming. According to [3], distinct messages that
are precipitative, often personally derogatory, ad hominem attacks directed toward someone due
to a position taken in a message distributed to the group. Further, flaming is generally classified
into numerous categories such as direct flaming, indirect flaming, straight flaming and satirical
flaming. However, for this research work, we have predefined flaming only in four sub-classes as
hostile, aggressive, offensive and uninhibited. For the purpose of measuring the resulting
intensity, the ten increments on the scale are assigned scores of one to ten, with one indicating the
lowest intensity and ten indicating the highest flaming intensity.
Hence it has become very important to keep hostile users or antagonistic criticism away from the
online platform to promote healthy and topic centric communication. In this paper, in section 2
we have discussed flaming in chatting applications and what is flame detector tool. Section 3
briefly discusses our research methodology. Section 4 describe in detail, how we have
implemented a Security Detection Model and developed a tool that will prevent the exchange of
censored words between users, track the flaming level of a user and block users who indulge in
flaming during online communications. It also discuss the experimental results and limitations of
our Security Detection Model. The paper demonstrates that our model is working and achieving
the intended goals.
2. FLAMING IN CHATTING APPLICATIONS AND FLAME DETECTOR TOOL
Social networking sites are also used to contact colleagues, friends and relatives. However, with
the advances in social and technological platforms, people have also started interacting with
strangers through social networking sites [4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14]. Out of these,
strangers’ research has also shown that males have a greater tendency to flame than female
participants [4]. Even in the male population, it is the young, immature minds, who would
account for higher flaming.
As mentioned above, chatting applications are in greater use because of excellent user interface as
well as due to their user-friendly nature. Almost each and every user is registered on at least one
or more chatting applications. According to the survey conducted by the theverge.com [15], 80%
of the users use 1 to 5 chatting applications, 17% of the users use 6 to 10 applications and only
1% use 11 or more applications simultaneously. Two forms of chatting take place, one-to-one and
one-to-many (group chats). Whichever may be the form, there are certain conventions or
guidelines that have been created to avoid misunderstandings and to simplify communication
between the users which is often called as chatiquette. Most of the users have not adhered to the
convention which leads to uncivilized communication. Users tend to send text messages which
are interpreted to be rude or sometimes abusive in nature and hence they might end up in conflict.
Sometimes, people knowingly misspell a censor word by adding additional character or deleting
one or more character to avoid flame detection. Such kind of behaviour has been reported from
Arabic-language tweets [16, 17]. Eventually such forms of communication degrade the sense of
camaraderie among friends, business people and others.
It is essential that some kind of integrity is maintained among the individuals. This kind of
communication is more common among the youth who seem to be very aggressive in nature. In
the professional world, such exchange of messages is not admissible. The diplomatic infringe of
chatiquette engrosses the use of flames. Moreover, the more the users indulge in the use of
rigorous language, the higher the flaming level tends to get.
We have developed a tool that mainly detects the presence of flaming while chatting or while
posting blogs, and censors the swear words as well as blocks the users whose flaming levels are
high (on a scale of 1-10). When a client sends a message, first the message is filtered of censored
words at the server and flaming level assigned to the user and thereafter the filtered message is
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2017
41
broadcasted to the other clients. This tool can be used for professional interactions where integrity
needs to be maintained among the users and can be widely used in future.
A Flame Detector Tool has been proposed to detect the occurrence of flaming in online
communication. This tool is installed on the local system and it gets plugged into any of the social
networking sites such as Facebook, Twitter, Quora and chatting applications such as WhatsApp,
Telegram and others. This tool consists of three components as shown in Figure 1. It consists of
Social Networking Sites and Chatting Applications, Web Services and Flame Detector.
Figure 1. Flame Detector Schematic
As shown in figure 1, the flame detector tool has three components. The first component is social
networking sites where formal as well as informal discussion takes place and the chatting
applications from where the model gets its input. The second component is the Web Service
which is used to fetch the data from social networking sites i.e. Facebook, Twitter which is then
analysed by the Flame Detector to assign flame intensity to the user. We have developed a
predefined thesaurus (censor.txt file), which contains words that are considered as flames. In
addition to this, to avoid hostile users from flaming, there should be some security detection
model that defends the networking sites and applications from flaming activities.
3. RESEARCH METHODOLOGY
Our research is centered upon the following research questions:
1. Is the Security Detection Model successful in blocking the users who indulge in flaming during
chatting with others or while posting blogs using the Flame Detector Tool?
2. Is the Security Detection Model using the Flame Detector Tool successful in detecting the
flames in the communications that takes place between the clients?
A research has been conducted to answer the above questions. In the next section, we have
provided the architectural details of the tool based on Security Detection Model that we have
described in this paper.
4. SECURITY DETECTION MODEL
The default flame value assigned to a user is zero if the latter is posting blog or sending message
for the first time. Subsequently, if the user logs in ever again, the associated flaming level is
retrieved. Over a period of time as the user exchanges data either in the form of text messages to
others or in the form of blogs, the flaming level increases in the step unit of one, whenever certain
amount of censored words are shared by the user. As long as the flaming level is below five, the
user is not included in the category of hostile users and is given a warning. Flaming level above
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2017
42
or equal to seven automatically blocks the user from sharing any kind of data for a specific period
of time. The categories of flame earlier have been predefined here as hostile, aggressive,
offensive and uninhibited. Hence this tool has been developed based on a Security Detection
Model. The process of sending messages from client-to-client or to-many-clients using the
Security Detection Model has been shown in figure 2
As shown in figure 2, when a client sends a text message, it is first passed to the server. The
server then performs some operations by sending the received text message for scanning of
censor words, if any present. The list of censor words is stored in a text file which is managed by
the administrator. If any of the words mentioned in the message is present in the list, then it is
replaced by an asterisk (*) and flaming intensity assigned to the user is incremented. In some
cases, if the administrator finds any words in the message which are inappropriate, it can
dynamically be added to the list of censor words for future convenience.
Figure 2. Message Processing Using Tool
After the filtering stage of the message, it is then returned back to the server. The filtered message
is then broadcasted to one or more clients. This model can be applied on social conversation
where users communicate with each other, create groups and freely involve with each other. This
model can be applied for Business Communication as well. To understand this better, the code of
the algorithm at the client side has been provided below. The tool, based on this model has been
tested on Windows Operating System and developed in Java, which is platform independent,
hence it would execute successfully on the other platforms.
As soon as the client hits the “Send” button, an Action event is generated which calls the function
“actionPerformed (ActionEvent a)” mentioned in the code (Figure 3). A variable, “flag” is set to
one to indicate that no flaming has taken place. If the message is “stop”, then the connection is
automatically terminated and the client is logged off. Otherwise using the “list.iterator()”
function, each word in the list of censored words stored in the text file(censor.txt) is scanned in
the whole message. For each client, a “count” variable is maintained to indicate the flaming level.
As soon as the flame word is encountered, the value of “count” variable is incremented and the
“flag” variable is set to zero. After the list is scanned, if the value of “flag” is zero, then a warning
message is generated as well as the value of “count” variable is also checked.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2017
43
Figure 3. Algorithm of the code
If the value of “count” is greater than or equal to seven, then a warning message is displayed and
the user is blocked from further communication. If the value of “count” is smaller than or equal to
six, then the message is broadcasted to other clients.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2017
44
4.1. WORKING OF THE ALGORITHM
In this section using figure (4-11) we have provided the screenshots of the actual algorithm
working in the background of Security Detection Model. There are three people involved in this
testing process i.e. Server Administrator, Client 1, Client 2.
Figure 4. Client 1
Figure 5. Client 2
Figure 6. Server Administrator
The first and second windows ask the respective clients their Username, while the third window
which belongs to the server confirms the connection between the clients. Both the clients have
been authenticated and can exchange messages.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2017
45
Figure 7. Chat Window 1
After a successful connection, the above window appears for both the clients where they can enter
their message in the text area adjacent to the “Send” button.
Figure 8. Chat Window 2
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2017
46
Figure 9. Flame Word Sent
In figure 9, the client i.e. MARY tries to send a flame word,“asshole” but a warning window
appears which notifies the client that the word cannot be sent and is instead replaced by an
asterisk(*).
Figure 10. Word Added by Administrator
In figure 10, in the last message sent by Client i.e. John, the word “filthy” has not been censored
which is then appended to the list by the administrator and a confirmation message is received.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2017
47
Figure 11. Blocking of User
In figure 11, as soon as the flaming level of a client reaches above the threshold value, the above
warning message is received and the client is blocked by automatically logging them out.
4.2. EXPERIMENTAL RESULTS
The above tested client-to-client communication shows how the user is notified beforehand of
censor words being sent to the other user. It also shows that the server administrator has the rights
to be able to append more words in the censor list, if they are not included. Further, it has also
been depicted that a user is blocked from an ongoing conversation when the flaming level reaches
beyond the threshold value.
4.3. LIMITATIONS OF SECURITY DETECTION MODEL
There are many censor words which need to be regularly updated in the thesaurus (censor.txt) and
this cannot be done manually by an administrator since it is a cumbersome job. Therefore, some
kind of mechanism like an administrator bot needs to be devised which is able to detect new
censor words and accommodate them in the database.
5. CONCLUSION
The convenience and advantages of online communication is evident to one and all. The
extensive rights granted allows a user to share information by posting blogs and exchanging
messages through the medium of chatting. However, these rights have eventually led to the
hostile and aggressive exchange of words. To keep the immense utility of online communication
intact, it is essential to prevent it from getting adulterated with aggressive and abusive form of
behaviour. This paper presents the working of a Security Detection tool based on security
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2017
48
detection model devised to mark the presence of flaming via a flame detector tool and prohibit the
user from further social and business conversation. The paper demonstrated that our system is
working and is achieving the intended goals.
REFERENCES
[1] Gupta, S. (2017). Detection and Elimination of Censor Words on Online Social Media, International
Journal of Computer Science and Information Technologies (IJCSIT), Vol. 8(5), pp 545 – 547.
[2] Steele, G., Woods, D., Finkel, R., Crispin, M., Stallman, R., and Goodfellow, G. (1983). The Hacker's
Dictionary, 1983.
[3] Siegel, J., Dubrovsky, V., Kiesler, S. and McGuire T.W. (1986). Group processes in computer-
mediated communication, Organizational Behavior and Human Decision Processes, 37, 157-187,
1986.
[4] Zuckerberg, M. (2010). 500 million stories, South Atlantic Quarterly, vol. 92, pp. 559-568, 2010.
[5] Verma, R. and Nitin (2015). On security negotiation model developed for the security of the social
networking sites from the hostile user, Issues in Information Systems, vol. 16, Issue II, pp. 1-15.
[6] Friedman, R.A. and Currall, S.C. (2003). Conflict escalation: Dispute exacerbating elements of e-mail
communication conflict, Human Relations, vol. 56(11), pp. 1325-1347, 2003.
[7] Harrison, T.M. and Falvey L. (2002). Democracy and new communication technologies,
Communication Yearbook, vol. 25, pp. 1-33.
[8] Landry, E.M. (2000). Scrolling around the new organization: The potential for conflict in the on-line
environment, Negotiation Journal, vol. 16(2), pp. 133-142.
[9] Markus, M.L. (1994). Finding a happy medium: Explaining the negative effects of electronic
communication on social life at work, ACM Transactions on Information Systems, vol. 12(2), pp.
119-149.
[10] Moore D.A., Kurtzberg T.R., Thompson, L.L. and Morris, M.W. (1999). Long and short routes to
success in electronically mediated negotiations: Group affiliations and good vibrations,
Organizational Behavior and Human Decision Processes, vol. 77(1), pp. 22-43.
[11] O'Sullivan P.B. and Flanagin, A.J. (2003). Reconceptualizing "flaming" and other problematic
messages, New Media & Society, vol. 5 (1), pp. 69-94, 2003.
[12] Boyd D.M. and Ellison N.B. (2007). Social network sites: Definition, history, and scholarship,
Journal of Computer Mediated Communication, vol. 13(1), article 11.
[13] Zhang, H., Lu, Y., Gupta, S., & Zhao, L. (2014). What motivates customers to participate in social
commerce? The impact of technological environments and virtual customer experiences, Information
and Management, 51(8), 1017–103.
[14] Alghaith, W. (2015). Applying the Technology Acceptance Model to understand Social Networking
Sites (SNS) usage: Impact of perceived Social Capital, International Journal of Computer Science &
Information Technology (IJCSIT), Vol 7, No. 4.
[15] Poll (2017). How many chat apps do you use? ,
https://www.theverge.com/2017/4/14/15298732/messaging-apps-poll, April 14, 2017.
[16] Abozinadah, E. A., and Jone, J.H. J. (2016). Improved micro-blog classification for detecting abusive
Arabic Twitter accounts, International Journal of Data Mining & Knowledge Management Process
(IJDKP) Vol.6, No.6, DOI: 10.5121/ijdkp.2016.6602, pp. 17-27.
[17] Abozinadah, E. A., Mbaziira, A. V., and Jones, J. H. J. (2015). Detection of Abusive Accounts with
Arabic Tweets, Int. J. Knowl. Eng.-IACSIT, vol. 1, no. 2, pp. 113–119.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2017
49
Authors
Shubhankar Gupta: Currently, a student of B. Tech., 4th
Year (Final) Computer
Science and Engineering, JIIT, Noida, India. His areas of research interest includes
Social Networks especially Cyber Security and Flaming, Database Management using
NoSQL technologies, and ERP on the Salesforce.com platform .
Nitin: Professor Nitin is an IBM certified engineer and Senior Member-IEEE and
IACSIT, Life Member of IAENG, and Member-SIAM and ACIS. He has more than
155 research papers in peer reviewed International Journals and Transactions, Book
Chapters, Symposium, Conferences and Position. His research interest includes Social
Networks especially Computer Mediated Communications and Flaming,
Interconnection Networks and Architecture, Fault-tolerance and Reliability, Networks-
on-Chip, Systems-on-Chip, and Networks-in-Packages, Wireless Sensor Networks.
Till now he has guided 08 PhDs, 18 M.Tech. Theses and 60 B.Tech. Major Projects.
Recently, he has moved to College of Engineering and Applied Sciences, University of Cincinnati,
Cincinnati, USA from Jaypee of Institute of Information Technology, Noida, India. He is Associate Editor
of Journal of Parallel, Emergent and Distributed Systems, Taylor and Francis, UK. He is referee for the
Journal of Parallel and Distributed Computing, Computer Communications, Computers and Electrical
Engineering, Mathematical and Computer Modelling, Elsevier Sciences.

More Related Content

What's hot

Phishing detection in ims using domain ontology and cba an innovative rule ...
Phishing detection in ims using domain ontology and cba   an innovative rule ...Phishing detection in ims using domain ontology and cba   an innovative rule ...
Phishing detection in ims using domain ontology and cba an innovative rule ...ijistjournal
 
IRJET- Tweet Segmentation and its Application to Named Entity Recognition
IRJET- Tweet Segmentation and its Application to Named Entity RecognitionIRJET- Tweet Segmentation and its Application to Named Entity Recognition
IRJET- Tweet Segmentation and its Application to Named Entity RecognitionIRJET Journal
 
Mobile Instant Messaging
Mobile Instant MessagingMobile Instant Messaging
Mobile Instant Messagingroute79
 
WhatsUp With WhatsApp? Comparing Mobile Instant Messaging Behaviors with Trad...
WhatsUp With WhatsApp? Comparing Mobile Instant Messaging Behaviors with Trad...WhatsUp With WhatsApp? Comparing Mobile Instant Messaging Behaviors with Trad...
WhatsUp With WhatsApp? Comparing Mobile Instant Messaging Behaviors with Trad...Karen Church
 
Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World Thamalsha Wijayarathna
 
IRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat ApplicationIRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat ApplicationIRJET Journal
 
How do people use Twitter and why do we need to know?
How do people use Twitter and why do we need to know?How do people use Twitter and why do we need to know?
How do people use Twitter and why do we need to know?andyramsden
 
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYkillersmile1
 
Twitter for Red Foundation Fresh Thinking
Twitter for Red Foundation Fresh ThinkingTwitter for Red Foundation Fresh Thinking
Twitter for Red Foundation Fresh ThinkingLasa UK
 
[Enterprise Social Platform] Socialware 'Tigris' introduction_EN
[Enterprise Social Platform] Socialware 'Tigris' introduction_EN[Enterprise Social Platform] Socialware 'Tigris' introduction_EN
[Enterprise Social Platform] Socialware 'Tigris' introduction_ENHwangHyejin
 
CMC and English Language Teaching and Learning, Abderrahmane BABNI
CMC and English Language Teaching and Learning,  Abderrahmane BABNICMC and English Language Teaching and Learning,  Abderrahmane BABNI
CMC and English Language Teaching and Learning, Abderrahmane BABNISaadia Morcenet secretary
 

What's hot (18)

Phishing detection in ims using domain ontology and cba an innovative rule ...
Phishing detection in ims using domain ontology and cba   an innovative rule ...Phishing detection in ims using domain ontology and cba   an innovative rule ...
Phishing detection in ims using domain ontology and cba an innovative rule ...
 
IRJET- Tweet Segmentation and its Application to Named Entity Recognition
IRJET- Tweet Segmentation and its Application to Named Entity RecognitionIRJET- Tweet Segmentation and its Application to Named Entity Recognition
IRJET- Tweet Segmentation and its Application to Named Entity Recognition
 
Mobile Instant Messaging
Mobile Instant MessagingMobile Instant Messaging
Mobile Instant Messaging
 
Instant messaging
Instant messaging Instant messaging
Instant messaging
 
WhatsUp With WhatsApp? Comparing Mobile Instant Messaging Behaviors with Trad...
WhatsUp With WhatsApp? Comparing Mobile Instant Messaging Behaviors with Trad...WhatsUp With WhatsApp? Comparing Mobile Instant Messaging Behaviors with Trad...
WhatsUp With WhatsApp? Comparing Mobile Instant Messaging Behaviors with Trad...
 
Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World
 
IRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat ApplicationIRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat Application
 
June Documentation
June DocumentationJune Documentation
June Documentation
 
How do people use Twitter and why do we need to know?
How do people use Twitter and why do we need to know?How do people use Twitter and why do we need to know?
How do people use Twitter and why do we need to know?
 
Instant Messaging
Instant MessagingInstant Messaging
Instant Messaging
 
Maximize Demosphere XVIX - Interacting On The Go
Maximize Demosphere XVIX - Interacting On The GoMaximize Demosphere XVIX - Interacting On The Go
Maximize Demosphere XVIX - Interacting On The Go
 
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGYELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
ELECTRONIC QUIZ IN EMPOWERMENT TECHNOLOGY
 
Project work
Project workProject work
Project work
 
Twitter for Red Foundation Fresh Thinking
Twitter for Red Foundation Fresh ThinkingTwitter for Red Foundation Fresh Thinking
Twitter for Red Foundation Fresh Thinking
 
Instant Messaging Apps
Instant Messaging AppsInstant Messaging Apps
Instant Messaging Apps
 
Chapter3case2
Chapter3case2Chapter3case2
Chapter3case2
 
[Enterprise Social Platform] Socialware 'Tigris' introduction_EN
[Enterprise Social Platform] Socialware 'Tigris' introduction_EN[Enterprise Social Platform] Socialware 'Tigris' introduction_EN
[Enterprise Social Platform] Socialware 'Tigris' introduction_EN
 
CMC and English Language Teaching and Learning, Abderrahmane BABNI
CMC and English Language Teaching and Learning,  Abderrahmane BABNICMC and English Language Teaching and Learning,  Abderrahmane BABNI
CMC and English Language Teaching and Learning, Abderrahmane BABNI
 

Similar to Development of Security Detection Model for the Security of Social Blogs and Chatting from Hostile Users

Psychoanalysis of Online Behavior and Cyber Conduct of Chatters in Chat Rooms...
Psychoanalysis of Online Behavior and Cyber Conduct of Chatters in Chat Rooms...Psychoanalysis of Online Behavior and Cyber Conduct of Chatters in Chat Rooms...
Psychoanalysis of Online Behavior and Cyber Conduct of Chatters in Chat Rooms...Eswar Publications
 
An Analytical Survey on Hate Speech Recognition through NLP and Deep Learning
An Analytical Survey on Hate Speech Recognition through NLP and Deep LearningAn Analytical Survey on Hate Speech Recognition through NLP and Deep Learning
An Analytical Survey on Hate Speech Recognition through NLP and Deep LearningIRJET Journal
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethetecnologico de tuxtepec
 
PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...
PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...
PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...ijistjournal
 
Technology and Romantic Relation_CHships
Technology and Romantic Relation_CHshipsTechnology and Romantic Relation_CHships
Technology and Romantic Relation_CHshipsbn8mkwmtwj
 
Collaborative filtering content for parental control in mobile application ch...
Collaborative filtering content for parental control in mobile application ch...Collaborative filtering content for parental control in mobile application ch...
Collaborative filtering content for parental control in mobile application ch...journalBEEI
 
PUBLIC RELATIONS — THE TOOLS FOR UNILATERAL COMMUNICATION AND DIALOGUE ON THE...
PUBLIC RELATIONS — THE TOOLS FOR UNILATERAL COMMUNICATION AND DIALOGUE ON THE...PUBLIC RELATIONS — THE TOOLS FOR UNILATERAL COMMUNICATION AND DIALOGUE ON THE...
PUBLIC RELATIONS — THE TOOLS FOR UNILATERAL COMMUNICATION AND DIALOGUE ON THE...Dariusz Tworzydło
 
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYINGA MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYINGijaia
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullyinggerogepatton
 
By Sandeep Rotte(545081).Praveen Komma( 544549).Management I.docx
By Sandeep Rotte(545081).Praveen Komma( 544549).Management I.docxBy Sandeep Rotte(545081).Praveen Komma( 544549).Management I.docx
By Sandeep Rotte(545081).Praveen Komma( 544549).Management I.docxRAHUL126667
 
Hate Speech Recognition System through NLP and Deep Learning
Hate Speech Recognition System through NLP and Deep LearningHate Speech Recognition System through NLP and Deep Learning
Hate Speech Recognition System through NLP and Deep LearningIRJET Journal
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologiesRufa Laguit
 
Auto Response System for Legal Consultation
Auto Response System for Legal ConsultationAuto Response System for Legal Consultation
Auto Response System for Legal Consultationijtsrd
 
Detection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social NetworkDetection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social NetworkIRJET Journal
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullyinggerogepatton
 

Similar to Development of Security Detection Model for the Security of Social Blogs and Chatting from Hostile Users (20)

Psychoanalysis of Online Behavior and Cyber Conduct of Chatters in Chat Rooms...
Psychoanalysis of Online Behavior and Cyber Conduct of Chatters in Chat Rooms...Psychoanalysis of Online Behavior and Cyber Conduct of Chatters in Chat Rooms...
Psychoanalysis of Online Behavior and Cyber Conduct of Chatters in Chat Rooms...
 
An Analytical Survey on Hate Speech Recognition through NLP and Deep Learning
An Analytical Survey on Hate Speech Recognition through NLP and Deep LearningAn Analytical Survey on Hate Speech Recognition through NLP and Deep Learning
An Analytical Survey on Hate Speech Recognition through NLP and Deep Learning
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethe
 
L017146571
L017146571L017146571
L017146571
 
PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...
PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...
PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...
 
Technology and Romantic Relation_CHships
Technology and Romantic Relation_CHshipsTechnology and Romantic Relation_CHships
Technology and Romantic Relation_CHships
 
tcss.2021.3049232.pdf
tcss.2021.3049232.pdftcss.2021.3049232.pdf
tcss.2021.3049232.pdf
 
Collaborative filtering content for parental control in mobile application ch...
Collaborative filtering content for parental control in mobile application ch...Collaborative filtering content for parental control in mobile application ch...
Collaborative filtering content for parental control in mobile application ch...
 
PUBLIC RELATIONS — THE TOOLS FOR UNILATERAL COMMUNICATION AND DIALOGUE ON THE...
PUBLIC RELATIONS — THE TOOLS FOR UNILATERAL COMMUNICATION AND DIALOGUE ON THE...PUBLIC RELATIONS — THE TOOLS FOR UNILATERAL COMMUNICATION AND DIALOGUE ON THE...
PUBLIC RELATIONS — THE TOOLS FOR UNILATERAL COMMUNICATION AND DIALOGUE ON THE...
 
Essay About The Internet
Essay About The InternetEssay About The Internet
Essay About The Internet
 
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYINGA MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
 
SAMUEL FULL MSC PROJECT
SAMUEL FULL MSC PROJECTSAMUEL FULL MSC PROJECT
SAMUEL FULL MSC PROJECT
 
By Sandeep Rotte(545081).Praveen Komma( 544549).Management I.docx
By Sandeep Rotte(545081).Praveen Komma( 544549).Management I.docxBy Sandeep Rotte(545081).Praveen Komma( 544549).Management I.docx
By Sandeep Rotte(545081).Praveen Komma( 544549).Management I.docx
 
Hate Speech Recognition System through NLP and Deep Learning
Hate Speech Recognition System through NLP and Deep LearningHate Speech Recognition System through NLP and Deep Learning
Hate Speech Recognition System through NLP and Deep Learning
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologies
 
Auto Response System for Legal Consultation
Auto Response System for Legal ConsultationAuto Response System for Legal Consultation
Auto Response System for Legal Consultation
 
Detection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social NetworkDetection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social Network
 
Anti-Phishing Phil
Anti-Phishing PhilAnti-Phishing Phil
Anti-Phishing Phil
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
 

More from AIRCC Publishing Corporation

Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...AIRCC Publishing Corporation
 
Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!AIRCC Publishing Corporation
 
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarConstraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarAIRCC Publishing Corporation
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...AIRCC Publishing Corporation
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...AIRCC Publishing Corporation
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkAIRCC Publishing Corporation
 
International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)AIRCC Publishing Corporation
 
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...AIRCC Publishing Corporation
 
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3AIRCC Publishing Corporation
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...AIRCC Publishing Corporation
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkAIRCC Publishing Corporation
 
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesUse of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesAIRCC Publishing Corporation
 
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...AIRCC Publishing Corporation
 
Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...AIRCC Publishing Corporation
 
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
Current Issue - February 2024, Volume 16, Number 1  - International Journal o...Current Issue - February 2024, Volume 16, Number 1  - International Journal o...
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...AIRCC Publishing Corporation
 
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...AIRCC Publishing Corporation
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...AIRCC Publishing Corporation
 
February 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information TechnologyFebruary 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information TechnologyAIRCC Publishing Corporation
 
Call for Articles- International Journal of Computer Science & Information T...
Call for Articles-  International Journal of Computer Science & Information T...Call for Articles-  International Journal of Computer Science & Information T...
Call for Articles- International Journal of Computer Science & Information T...AIRCC Publishing Corporation
 

More from AIRCC Publishing Corporation (20)

Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...
 
The Smart Parking Management System - IJCSIT
The Smart Parking Management System  - IJCSITThe Smart Parking Management System  - IJCSIT
The Smart Parking Management System - IJCSIT
 
Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!
 
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarConstraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural Network
 
International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)
 
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
 
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural Network
 
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesUse of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
 
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
 
Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...
 
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
Current Issue - February 2024, Volume 16, Number 1  - International Journal o...Current Issue - February 2024, Volume 16, Number 1  - International Journal o...
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
 
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...
 
February 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information TechnologyFebruary 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information Technology
 
Call for Articles- International Journal of Computer Science & Information T...
Call for Articles-  International Journal of Computer Science & Information T...Call for Articles-  International Journal of Computer Science & Information T...
Call for Articles- International Journal of Computer Science & Information T...
 

Recently uploaded

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 

Recently uploaded (20)

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 

Development of Security Detection Model for the Security of Social Blogs and Chatting from Hostile Users

  • 1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 5, October 2017 DOI:10.5121/ijcsit.2017.9504 39 DEVELOPMENT OF SECURITY DETECTION MODEL FOR THE SECURITY OF SOCIAL BLOGS AND CHATTING FROM HOSTILE USERS Shubhankar Gupta1 and Nitin2 1 Jaypee Institute of Information Technology, Noida, India 2 Professor, CEAS, University of Cincinnati, Cincinnati, USA ABSTRACT Worldwide, a large number of people interact with each other by means of online chatting. There has been a significant rise in the number of platforms, both social and professional, such as WhatsApp, Facebook, and Twitter, which allow people to share their experiences, views and knowledge with others. Sadly enough, with online communication getting embedded into our daily communication, incivility and misbehaviour has taken on many nuances from professional misbehaviour to professional decay. Generally flaming starts with the exchange of rude messages and comments, which in turn triggers to higher scale of flaming. To prevent online communication from getting downgraded, it is essential to keep away the hostile users from communication platforms. This paper presents a Security Detection Model and a tool which checks and prevents online flaming. It detects the presence of flaming while chatting or posting blogs, and censors swear words as well as blocks the users from flaming. KEYWORDS Information Technology (IT), Flame Detector Tool, Censor Words, Flaming, Flame Intensity, Notification, Social Platform, Security Detection Model 1. INTRODUCTION In the last few years, online communication has increased manifold with millions of people discovering the power of Information Technology (IT) each month. Throughout the world, a large number of people interact with each other through the means of online chatting which has now overtaken other forms of communication. Recently, there has been a significant rise in the number of platforms, both social and professional, such as WhatsApp, Facebook, Twitter, Quora, which allow people to share their experiences, views, knowledge, and business communications with others [1]. Nowadays, online forums and social networking sites are becoming a platform for business and socially active people to engage with each other for business networking, discussing issues and promoting businesses by sharing online description of products, tools or solutions to different kinds of problems. Undoubtedly, there are several advantages of the mode of online communication, but there are some disadvantages attached to it in the form of online aggressive behaviour, known as flaming in IT industry. The term flaming originated from the Hacker's Dictionary [2], which defines it as to speak rapidly or incessantly on an uninteresting topic or with a patently ridiculous attitude. The meaning of the word has diverged from this definition since then. In fact, flaming is a hostile and insulting interaction between persons, often involving the use of profanity. It can also be the swapping of insults back and forth or with many people in a group or on a single person. It can be deliberately provoked by seemingly trivial differences. Deliberate flaming, as opposed to flaming as a result of emotional discussions, is carried out by individuals known as flamers or troller or
  • 2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2017 40 bullies, who are specifically motivated to incite flaming. According to [3], distinct messages that are precipitative, often personally derogatory, ad hominem attacks directed toward someone due to a position taken in a message distributed to the group. Further, flaming is generally classified into numerous categories such as direct flaming, indirect flaming, straight flaming and satirical flaming. However, for this research work, we have predefined flaming only in four sub-classes as hostile, aggressive, offensive and uninhibited. For the purpose of measuring the resulting intensity, the ten increments on the scale are assigned scores of one to ten, with one indicating the lowest intensity and ten indicating the highest flaming intensity. Hence it has become very important to keep hostile users or antagonistic criticism away from the online platform to promote healthy and topic centric communication. In this paper, in section 2 we have discussed flaming in chatting applications and what is flame detector tool. Section 3 briefly discusses our research methodology. Section 4 describe in detail, how we have implemented a Security Detection Model and developed a tool that will prevent the exchange of censored words between users, track the flaming level of a user and block users who indulge in flaming during online communications. It also discuss the experimental results and limitations of our Security Detection Model. The paper demonstrates that our model is working and achieving the intended goals. 2. FLAMING IN CHATTING APPLICATIONS AND FLAME DETECTOR TOOL Social networking sites are also used to contact colleagues, friends and relatives. However, with the advances in social and technological platforms, people have also started interacting with strangers through social networking sites [4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14]. Out of these, strangers’ research has also shown that males have a greater tendency to flame than female participants [4]. Even in the male population, it is the young, immature minds, who would account for higher flaming. As mentioned above, chatting applications are in greater use because of excellent user interface as well as due to their user-friendly nature. Almost each and every user is registered on at least one or more chatting applications. According to the survey conducted by the theverge.com [15], 80% of the users use 1 to 5 chatting applications, 17% of the users use 6 to 10 applications and only 1% use 11 or more applications simultaneously. Two forms of chatting take place, one-to-one and one-to-many (group chats). Whichever may be the form, there are certain conventions or guidelines that have been created to avoid misunderstandings and to simplify communication between the users which is often called as chatiquette. Most of the users have not adhered to the convention which leads to uncivilized communication. Users tend to send text messages which are interpreted to be rude or sometimes abusive in nature and hence they might end up in conflict. Sometimes, people knowingly misspell a censor word by adding additional character or deleting one or more character to avoid flame detection. Such kind of behaviour has been reported from Arabic-language tweets [16, 17]. Eventually such forms of communication degrade the sense of camaraderie among friends, business people and others. It is essential that some kind of integrity is maintained among the individuals. This kind of communication is more common among the youth who seem to be very aggressive in nature. In the professional world, such exchange of messages is not admissible. The diplomatic infringe of chatiquette engrosses the use of flames. Moreover, the more the users indulge in the use of rigorous language, the higher the flaming level tends to get. We have developed a tool that mainly detects the presence of flaming while chatting or while posting blogs, and censors the swear words as well as blocks the users whose flaming levels are high (on a scale of 1-10). When a client sends a message, first the message is filtered of censored words at the server and flaming level assigned to the user and thereafter the filtered message is
  • 3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2017 41 broadcasted to the other clients. This tool can be used for professional interactions where integrity needs to be maintained among the users and can be widely used in future. A Flame Detector Tool has been proposed to detect the occurrence of flaming in online communication. This tool is installed on the local system and it gets plugged into any of the social networking sites such as Facebook, Twitter, Quora and chatting applications such as WhatsApp, Telegram and others. This tool consists of three components as shown in Figure 1. It consists of Social Networking Sites and Chatting Applications, Web Services and Flame Detector. Figure 1. Flame Detector Schematic As shown in figure 1, the flame detector tool has three components. The first component is social networking sites where formal as well as informal discussion takes place and the chatting applications from where the model gets its input. The second component is the Web Service which is used to fetch the data from social networking sites i.e. Facebook, Twitter which is then analysed by the Flame Detector to assign flame intensity to the user. We have developed a predefined thesaurus (censor.txt file), which contains words that are considered as flames. In addition to this, to avoid hostile users from flaming, there should be some security detection model that defends the networking sites and applications from flaming activities. 3. RESEARCH METHODOLOGY Our research is centered upon the following research questions: 1. Is the Security Detection Model successful in blocking the users who indulge in flaming during chatting with others or while posting blogs using the Flame Detector Tool? 2. Is the Security Detection Model using the Flame Detector Tool successful in detecting the flames in the communications that takes place between the clients? A research has been conducted to answer the above questions. In the next section, we have provided the architectural details of the tool based on Security Detection Model that we have described in this paper. 4. SECURITY DETECTION MODEL The default flame value assigned to a user is zero if the latter is posting blog or sending message for the first time. Subsequently, if the user logs in ever again, the associated flaming level is retrieved. Over a period of time as the user exchanges data either in the form of text messages to others or in the form of blogs, the flaming level increases in the step unit of one, whenever certain amount of censored words are shared by the user. As long as the flaming level is below five, the user is not included in the category of hostile users and is given a warning. Flaming level above
  • 4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2017 42 or equal to seven automatically blocks the user from sharing any kind of data for a specific period of time. The categories of flame earlier have been predefined here as hostile, aggressive, offensive and uninhibited. Hence this tool has been developed based on a Security Detection Model. The process of sending messages from client-to-client or to-many-clients using the Security Detection Model has been shown in figure 2 As shown in figure 2, when a client sends a text message, it is first passed to the server. The server then performs some operations by sending the received text message for scanning of censor words, if any present. The list of censor words is stored in a text file which is managed by the administrator. If any of the words mentioned in the message is present in the list, then it is replaced by an asterisk (*) and flaming intensity assigned to the user is incremented. In some cases, if the administrator finds any words in the message which are inappropriate, it can dynamically be added to the list of censor words for future convenience. Figure 2. Message Processing Using Tool After the filtering stage of the message, it is then returned back to the server. The filtered message is then broadcasted to one or more clients. This model can be applied on social conversation where users communicate with each other, create groups and freely involve with each other. This model can be applied for Business Communication as well. To understand this better, the code of the algorithm at the client side has been provided below. The tool, based on this model has been tested on Windows Operating System and developed in Java, which is platform independent, hence it would execute successfully on the other platforms. As soon as the client hits the “Send” button, an Action event is generated which calls the function “actionPerformed (ActionEvent a)” mentioned in the code (Figure 3). A variable, “flag” is set to one to indicate that no flaming has taken place. If the message is “stop”, then the connection is automatically terminated and the client is logged off. Otherwise using the “list.iterator()” function, each word in the list of censored words stored in the text file(censor.txt) is scanned in the whole message. For each client, a “count” variable is maintained to indicate the flaming level. As soon as the flame word is encountered, the value of “count” variable is incremented and the “flag” variable is set to zero. After the list is scanned, if the value of “flag” is zero, then a warning message is generated as well as the value of “count” variable is also checked.
  • 5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2017 43 Figure 3. Algorithm of the code If the value of “count” is greater than or equal to seven, then a warning message is displayed and the user is blocked from further communication. If the value of “count” is smaller than or equal to six, then the message is broadcasted to other clients.
  • 6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2017 44 4.1. WORKING OF THE ALGORITHM In this section using figure (4-11) we have provided the screenshots of the actual algorithm working in the background of Security Detection Model. There are three people involved in this testing process i.e. Server Administrator, Client 1, Client 2. Figure 4. Client 1 Figure 5. Client 2 Figure 6. Server Administrator The first and second windows ask the respective clients their Username, while the third window which belongs to the server confirms the connection between the clients. Both the clients have been authenticated and can exchange messages.
  • 7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2017 45 Figure 7. Chat Window 1 After a successful connection, the above window appears for both the clients where they can enter their message in the text area adjacent to the “Send” button. Figure 8. Chat Window 2
  • 8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2017 46 Figure 9. Flame Word Sent In figure 9, the client i.e. MARY tries to send a flame word,“asshole” but a warning window appears which notifies the client that the word cannot be sent and is instead replaced by an asterisk(*). Figure 10. Word Added by Administrator In figure 10, in the last message sent by Client i.e. John, the word “filthy” has not been censored which is then appended to the list by the administrator and a confirmation message is received.
  • 9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2017 47 Figure 11. Blocking of User In figure 11, as soon as the flaming level of a client reaches above the threshold value, the above warning message is received and the client is blocked by automatically logging them out. 4.2. EXPERIMENTAL RESULTS The above tested client-to-client communication shows how the user is notified beforehand of censor words being sent to the other user. It also shows that the server administrator has the rights to be able to append more words in the censor list, if they are not included. Further, it has also been depicted that a user is blocked from an ongoing conversation when the flaming level reaches beyond the threshold value. 4.3. LIMITATIONS OF SECURITY DETECTION MODEL There are many censor words which need to be regularly updated in the thesaurus (censor.txt) and this cannot be done manually by an administrator since it is a cumbersome job. Therefore, some kind of mechanism like an administrator bot needs to be devised which is able to detect new censor words and accommodate them in the database. 5. CONCLUSION The convenience and advantages of online communication is evident to one and all. The extensive rights granted allows a user to share information by posting blogs and exchanging messages through the medium of chatting. However, these rights have eventually led to the hostile and aggressive exchange of words. To keep the immense utility of online communication intact, it is essential to prevent it from getting adulterated with aggressive and abusive form of behaviour. This paper presents the working of a Security Detection tool based on security
  • 10. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2017 48 detection model devised to mark the presence of flaming via a flame detector tool and prohibit the user from further social and business conversation. The paper demonstrated that our system is working and is achieving the intended goals. REFERENCES [1] Gupta, S. (2017). Detection and Elimination of Censor Words on Online Social Media, International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 8(5), pp 545 – 547. [2] Steele, G., Woods, D., Finkel, R., Crispin, M., Stallman, R., and Goodfellow, G. (1983). The Hacker's Dictionary, 1983. [3] Siegel, J., Dubrovsky, V., Kiesler, S. and McGuire T.W. (1986). Group processes in computer- mediated communication, Organizational Behavior and Human Decision Processes, 37, 157-187, 1986. [4] Zuckerberg, M. (2010). 500 million stories, South Atlantic Quarterly, vol. 92, pp. 559-568, 2010. [5] Verma, R. and Nitin (2015). On security negotiation model developed for the security of the social networking sites from the hostile user, Issues in Information Systems, vol. 16, Issue II, pp. 1-15. [6] Friedman, R.A. and Currall, S.C. (2003). Conflict escalation: Dispute exacerbating elements of e-mail communication conflict, Human Relations, vol. 56(11), pp. 1325-1347, 2003. [7] Harrison, T.M. and Falvey L. (2002). Democracy and new communication technologies, Communication Yearbook, vol. 25, pp. 1-33. [8] Landry, E.M. (2000). Scrolling around the new organization: The potential for conflict in the on-line environment, Negotiation Journal, vol. 16(2), pp. 133-142. [9] Markus, M.L. (1994). Finding a happy medium: Explaining the negative effects of electronic communication on social life at work, ACM Transactions on Information Systems, vol. 12(2), pp. 119-149. [10] Moore D.A., Kurtzberg T.R., Thompson, L.L. and Morris, M.W. (1999). Long and short routes to success in electronically mediated negotiations: Group affiliations and good vibrations, Organizational Behavior and Human Decision Processes, vol. 77(1), pp. 22-43. [11] O'Sullivan P.B. and Flanagin, A.J. (2003). Reconceptualizing "flaming" and other problematic messages, New Media & Society, vol. 5 (1), pp. 69-94, 2003. [12] Boyd D.M. and Ellison N.B. (2007). Social network sites: Definition, history, and scholarship, Journal of Computer Mediated Communication, vol. 13(1), article 11. [13] Zhang, H., Lu, Y., Gupta, S., & Zhao, L. (2014). What motivates customers to participate in social commerce? The impact of technological environments and virtual customer experiences, Information and Management, 51(8), 1017–103. [14] Alghaith, W. (2015). Applying the Technology Acceptance Model to understand Social Networking Sites (SNS) usage: Impact of perceived Social Capital, International Journal of Computer Science & Information Technology (IJCSIT), Vol 7, No. 4. [15] Poll (2017). How many chat apps do you use? , https://www.theverge.com/2017/4/14/15298732/messaging-apps-poll, April 14, 2017. [16] Abozinadah, E. A., and Jone, J.H. J. (2016). Improved micro-blog classification for detecting abusive Arabic Twitter accounts, International Journal of Data Mining & Knowledge Management Process (IJDKP) Vol.6, No.6, DOI: 10.5121/ijdkp.2016.6602, pp. 17-27. [17] Abozinadah, E. A., Mbaziira, A. V., and Jones, J. H. J. (2015). Detection of Abusive Accounts with Arabic Tweets, Int. J. Knowl. Eng.-IACSIT, vol. 1, no. 2, pp. 113–119.
  • 11. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 5, October 2017 49 Authors Shubhankar Gupta: Currently, a student of B. Tech., 4th Year (Final) Computer Science and Engineering, JIIT, Noida, India. His areas of research interest includes Social Networks especially Cyber Security and Flaming, Database Management using NoSQL technologies, and ERP on the Salesforce.com platform . Nitin: Professor Nitin is an IBM certified engineer and Senior Member-IEEE and IACSIT, Life Member of IAENG, and Member-SIAM and ACIS. He has more than 155 research papers in peer reviewed International Journals and Transactions, Book Chapters, Symposium, Conferences and Position. His research interest includes Social Networks especially Computer Mediated Communications and Flaming, Interconnection Networks and Architecture, Fault-tolerance and Reliability, Networks- on-Chip, Systems-on-Chip, and Networks-in-Packages, Wireless Sensor Networks. Till now he has guided 08 PhDs, 18 M.Tech. Theses and 60 B.Tech. Major Projects. Recently, he has moved to College of Engineering and Applied Sciences, University of Cincinnati, Cincinnati, USA from Jaypee of Institute of Information Technology, Noida, India. He is Associate Editor of Journal of Parallel, Emergent and Distributed Systems, Taylor and Francis, UK. He is referee for the Journal of Parallel and Distributed Computing, Computer Communications, Computers and Electrical Engineering, Mathematical and Computer Modelling, Elsevier Sciences.