Effects of Social Networking by Influencers [Beware and Stay Safe]
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: A short time agone, social spam and on-line abuse were much non-existent. As email spam filters became simpler, catching over ninety fifth of those messages, spammers have moved to a replacement target – the social net. Over ninetieth of social network users have knowledgeable about social spam in some kind.Those doing the “spamming” is automatic spam-bots, fault accounts, or real individuals.. during this paper we have a tendency to investigate strategies for exploiting such community feedback to mechanically determine prime quality content. As a action at law, we have a tendency to specialise in Yahoo! Answers, an oversized community question/answering portal that's significantly made within the quantity and kinds of content and social interactions accessible in it. we have a custom to introduce a general classification framework for merging the proof from totally differential sources of knowledge, which will be tuned automatically for a given social media sort and quality definition. above all, for the community question/answering domain, we have a custom to show that our system is in a position to separate high-quality things from the remainder with accuracy near that of humans.
Authors and Affiliations
P. Adarsha , Dr. N. Chandra Sekhar Reddy , S. Srinivas
An Enhanced ILD Diagnosis Method using DWT
Interstitial Lung Disease (ILD) is a group of lung diseases affecting lung parenchyma. Since the lesions can be clearly identified in the CT scan of the lung, CT analysis is best among the ways for the identifi...
Sentiment Features based Analysis of Online Reviews
Abstract : Sentiment Analysis (SA) and Summarization is a new and emerging field of research which dealswith information extraction and knowledge discovery from text using Natural Language Processing and DataMining techn...
Roulette Wheel Selection Model based on Virtual Machine Weight for Load Balancing in Cloud Computing
Abstract: The increasing use of cloud computing resources have placed a large workload on the data centers. Solving the load balancing problem among all virtual machines (VMs) increases performance, throughput and...
A Survey on Different Levels of Risks during Different Phases in Data Warehouse
Abstract: The term Data Warehouse represents huge collection of historical data which are subject-oriented, non-volatile, integrated, and time-variant and such data is required for the business needs [1]. Data warehouses...
Selfish Node Detection in Replica Allocation over MANETs
: MOBILE ad hoc networks (MANETs) have attracted a lot of attention due to the popularity of mobile devices and the advances in wireless communication technologies. A MANET is a peer-to-peer multi hop mobile wire...