Detecting Vulnerable User in Twitter Using Tweet Description Logic Rule Generation
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2018, Vol 20, Issue 5
Abstract
In today’s modern era, Social media have become a mandatory, exciting and mundane apparatus in our lives and diverse informal organizations have distinctive focused set of people. Among these networks, twitter standout in the top list that has nearly 313 million dynamic clients on a monthly basis with a whopping 500 million of tweets each day. The commonly shared information on Twitter varies from current affairs, occasions, superstars in every field to government or political issues. Therefore, there is a need to conduct targeted research on identifying approaches for vulnerable user identification in twitter. The proposed system is used in identifying the maximum set of profile data that are necessary for identifying vulnerable user in twitter and identify the appropriate data mining approach for such task. The proposed system is used in identifying the maximum set of profile data that are necessary for identifying vulnerable user in twitter and identify the appropriate data mining approach for such task. This research has been proposed with data mining techniques of Tweet Description Logic Rule Generation algorithm for finding and analysis to the vulnerable user and attackers. Such profiles are distinguished by implementing the above algorithm which considers the targeted user followers and the sharing Threshold Limit as its parameters. Trial results assures of following: The suggested technique beats different models in regard of accuracy, efficiency and least time. Also, the assessment reveals that the identification rate of current method is significantly more compared to other methods.
Authors and Affiliations
S. Revathi, Dr. M. Suriakala
A Review of FPGA-based design methodologies for efficient hardware Area estimation
In recent years, FPGA’s have become increasingly important and have found their way into system design. So, the desire emerges for a means that allows early area and performance estimation Understanding how a...
Content Based Image Retrieval for Unlabelled Images
Recently, content-based image retrieval has become hot topic and the techniques of content-based image retrieval have been achieved good development. Content-based image retrieval systems were introduced to...
A framework for an Operating System-based Mobile Agent Interoperability
Mobile agent technology has grown in acceptance over the years for distributed applications, but it is yet to be adopted as ubiquitous solution technique. This is due to its complexity and lack of interoperabilit...
Production of Clean Fuel from Waste Biomass using Combined Dark and Photofermentation
Sequential dark and photo- fermentation is a rather new approach in biological hydrogen gas production. In the present work, two-stage fermentation process consisting of dark and photo-fermentation periods was ca...
Handwritten Bangla Character Recognition Using Normalized Cross Correlation
Abstract: This paper presents a system for recognizing Bangla handwritten characters using template matching algorithm based on normalized cross-correlation. The Bangla alphabets Sorborno and Banjonborno have been...