Detecting Vulnerable User in Twitter Using Tweet Description Logic Rule Generation

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2018, Vol 20, Issue 5

Abstract

In today’s modern era, Social media have become a mandatory, exciting and mundane apparatus in our lives and diverse informal organizations have distinctive focused set of people. Among these networks, twitter standout in the top list that has nearly 313 million dynamic clients on a monthly basis with a whopping 500 million of tweets each day. The commonly shared information on Twitter varies from current affairs, occasions, superstars in every field to government or political issues. Therefore, there is a need to conduct targeted research on identifying approaches for vulnerable user identification in twitter. The proposed system is used in identifying the maximum set of profile data that are necessary for identifying vulnerable user in twitter and identify the appropriate data mining approach for such task. The proposed system is used in identifying the maximum set of profile data that are necessary for identifying vulnerable user in twitter and identify the appropriate data mining approach for such task. This research has been proposed with data mining techniques of Tweet Description Logic Rule Generation algorithm for finding and analysis to the vulnerable user and attackers. Such profiles are distinguished by implementing the above algorithm which considers the targeted user followers and the sharing Threshold Limit as its parameters. Trial results assures of following: The suggested technique beats different models in regard of accuracy, efficiency and least time. Also, the assessment reveals that the identification rate of current method is significantly more compared to other methods.

Authors and Affiliations

S. Revathi, Dr. M. Suriakala

Keywords

Related Articles

 VRIT: An Innovative Approach of Industrial Training through Virtual Reality

 The emerging global competition and increasing costs are a great challenge to industries. New cost effective training methods are explored to cope with this demand. In-depth knowledge of the functions in a fact...

A Study on Proposed Distributed Attack Detection Algorithm Using Experimental and Simulation Analysis

Abstract: The attack detection rates are higher for large node deployment densities, as compared to the low density counterparts. This is because the attack detection scheme relies on both the individual traffic observat...

 A Statistical Approach to perform Web Based Summarization

Over the past decade more and more users of the Internet rely on the search engines to help them find the information they need. However the information they find depends to a large extent, on the ranking mechanism o...

Artificially Intelligent Investment Risk Calculation system based on Distributed Data Mining

Abstract:- In the present days of e-commerce and social engineering the use of artificial intelligent system and data mining is one of the most relevant issue. Several investment sector giants use highly developed data m...

 Next Generation Genetic Algorithm for Maximum Clique Problem

 Abstract: Given a graph, in the maximum clique problem, one desires to find the largest number of vertices, any two of which are adjacent. A branch-and-bound algorithm for the maximum clique problem—which is comput...

Download PDF file
  • EP ID EP402115
  • DOI 10.9790/0661-2005022735.
  • Views 120
  • Downloads 0

How To Cite

S. Revathi, Dr. M. Suriakala (2018). Detecting Vulnerable User in Twitter Using Tweet Description Logic Rule Generation. IOSR Journals (IOSR Journal of Computer Engineering), 20(5), 27-35. https://europub.co.uk/articles/-A-402115