Detecting Vulnerable User in Twitter Using Tweet Description Logic Rule Generation

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2018, Vol 20, Issue 5

Abstract

In today’s modern era, Social media have become a mandatory, exciting and mundane apparatus in our lives and diverse informal organizations have distinctive focused set of people. Among these networks, twitter standout in the top list that has nearly 313 million dynamic clients on a monthly basis with a whopping 500 million of tweets each day. The commonly shared information on Twitter varies from current affairs, occasions, superstars in every field to government or political issues. Therefore, there is a need to conduct targeted research on identifying approaches for vulnerable user identification in twitter. The proposed system is used in identifying the maximum set of profile data that are necessary for identifying vulnerable user in twitter and identify the appropriate data mining approach for such task. The proposed system is used in identifying the maximum set of profile data that are necessary for identifying vulnerable user in twitter and identify the appropriate data mining approach for such task. This research has been proposed with data mining techniques of Tweet Description Logic Rule Generation algorithm for finding and analysis to the vulnerable user and attackers. Such profiles are distinguished by implementing the above algorithm which considers the targeted user followers and the sharing Threshold Limit as its parameters. Trial results assures of following: The suggested technique beats different models in regard of accuracy, efficiency and least time. Also, the assessment reveals that the identification rate of current method is significantly more compared to other methods.

Authors and Affiliations

S. Revathi, Dr. M. Suriakala

Keywords

Related Articles

 A Review of FPGA-based design methodologies for efficient hardware Area estimation

 In recent years, FPGA’s have become increasingly important and have found their way into system design. So, the desire emerges for a means that allows early area and performance estimation Understanding how a...

 Content Based Image Retrieval for Unlabelled Images

 Recently, content-based image retrieval has become hot topic and the techniques of content-based image retrieval have been achieved good development. Content-based image retrieval systems were introduced  to...

 A framework for an Operating System-based Mobile Agent Interoperability

 Mobile agent technology has grown in acceptance over the years for distributed applications, but it is yet to be adopted as ubiquitous solution technique. This is due to its complexity and lack of interoperabilit...

 Production of Clean Fuel from Waste Biomass using Combined Dark and Photofermentation

 Sequential dark and photo- fermentation is a rather new approach in biological hydrogen gas production. In the present work, two-stage fermentation process consisting of dark and photo-fermentation periods was ca...

 Handwritten Bangla Character Recognition Using Normalized Cross Correlation

 Abstract: This paper presents a system for recognizing Bangla handwritten characters using template matching algorithm based on normalized cross-correlation. The Bangla alphabets Sorborno and Banjonborno have been...

Download PDF file
  • EP ID EP402115
  • DOI 10.9790/0661-2005022735.
  • Views 82
  • Downloads 0

How To Cite

S. Revathi, Dr. M. Suriakala (2018). Detecting Vulnerable User in Twitter Using Tweet Description Logic Rule Generation. IOSR Journals (IOSR Journal of Computer Engineering), 20(5), 27-35. https://europub.co.uk/articles/-A-402115