Detecting Vulnerable User in Twitter Using Tweet Description Logic Rule Generation
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2018, Vol 20, Issue 5
Abstract
In today’s modern era, Social media have become a mandatory, exciting and mundane apparatus in our lives and diverse informal organizations have distinctive focused set of people. Among these networks, twitter standout in the top list that has nearly 313 million dynamic clients on a monthly basis with a whopping 500 million of tweets each day. The commonly shared information on Twitter varies from current affairs, occasions, superstars in every field to government or political issues. Therefore, there is a need to conduct targeted research on identifying approaches for vulnerable user identification in twitter. The proposed system is used in identifying the maximum set of profile data that are necessary for identifying vulnerable user in twitter and identify the appropriate data mining approach for such task. The proposed system is used in identifying the maximum set of profile data that are necessary for identifying vulnerable user in twitter and identify the appropriate data mining approach for such task. This research has been proposed with data mining techniques of Tweet Description Logic Rule Generation algorithm for finding and analysis to the vulnerable user and attackers. Such profiles are distinguished by implementing the above algorithm which considers the targeted user followers and the sharing Threshold Limit as its parameters. Trial results assures of following: The suggested technique beats different models in regard of accuracy, efficiency and least time. Also, the assessment reveals that the identification rate of current method is significantly more compared to other methods.
Authors and Affiliations
S. Revathi, Dr. M. Suriakala
A Novel Learning Formulation in a unified Min-Max Framework for Computer Aided Diagnosis
Design and implementation of massive MYSQL data intelligent export system to excel by using Apache –POI libraries
Abstract: To export nearly 1,0000 attribute from database to excel of 10-20 column information of students and papers of database format into the target Excel sheet, we developed the intelligent export system which...
PARS: Position based Anonymous Routing Scheme in MANETs
Abstract: Mobile Ad hoc Networks (MANET) comprises of self-organizing autonomous mobile nodes. MANETs are open and decentralized. Therefore they are vulnerable to malicious entities. MANETs are multi-hop wireless n...
Estimation of Word Net-Based Lexical Semantic Similarity Measure for Telugu Documents
The estimation of lexical semantic relatedness has numerous applications in NLP. Several measures are available for the evaluation of lexical semantic relatedness. This paper presents two approaches for measuring...
Real Time Hand Gesture Recognition for Human Machine Communication Using ARM Cortex A-8
Abstract: A novel method proposes for human machine communication using ARM Cortex A-8 processor. Gesture is a form of non-verbal communication in which visible bodily actions communicate particular messages. A nov...