Mining Of Influential Users in a Blog Network
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 4
Abstract
Abstract: Blogging sites are very popular in today’s world; users interact with each other and create socialrelationships between them. Data mining methods can be used to extract the blogging sites. Users can be active or dormant in a blog environment, they could be directly influenced by the motivators or not. Direct DCP and Indirect DCP both can be calculated. Some influential user’s motivates the other normal users on the basis of some features through which rating could be high and it could be increase the business in terms of monetary.Determining the Content Power Users (CPU) is very essential now a day. It represents the blogging atmosphere which is used to calculate the influential users.
Authors and Affiliations
Azaim Khan
Face Recognition Using Convolution Based Dwt and CLBP Feature Vectors
Abstract: The face recognition is an essential criteria to identify a person in recent advanced security systems. In this paper, we propose efficient Face Recognition using Convolution based DWT and CLBP Feature Vectors....
An Approach to Single Documnent Text Summarization & Simplification
Abstract: The amount of information available on the internet is increasing day by day which is leading to information overload. For more information than can realistically be digested is available on the World-Wid...
Competent Tracking of Moving Object Using Affine & Illumination Insensitive Template Matching
Abstract : Moving object detection & tracking in real world scene is becoming significant problem in today’s era. The extensive study in this area is motivated by potential number of applications of object tracking....
CEET: A Compressed Encrypted & Embedded Technique for Digital Image Steganography
Abstract: In this information era, digital information sharing and transfer plays a vital role and their use has increased exponentially with the development of technology. Thus providing security of data is a topi...
Artificial Neural Network To Detect Know And Unknown DDOS Attack
The key objective of Disturbed Denial of Service (DdoS) attack is to compile multiple systems across the internet with the infected zombies/agents and form the botnets of network. The infected systems are remotely contro...