Mining Of Influential Users in a Blog Network
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 4
Abstract
Abstract: Blogging sites are very popular in today’s world; users interact with each other and create socialrelationships between them. Data mining methods can be used to extract the blogging sites. Users can be active or dormant in a blog environment, they could be directly influenced by the motivators or not. Direct DCP and Indirect DCP both can be calculated. Some influential user’s motivates the other normal users on the basis of some features through which rating could be high and it could be increase the business in terms of monetary.Determining the Content Power Users (CPU) is very essential now a day. It represents the blogging atmosphere which is used to calculate the influential users.
Authors and Affiliations
Azaim Khan
Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Example
Internet banking has gained wide acceptance internationally and seems to be fast catching up in India with more and more banks entering the fray. online banking is defined as the use of Internet as a remote  ...
Design and Development of Secure Electronic Voting System Using Radio Frequency Identification and Enhanced Least Significant Bit Audio Steganographic Technique
Abstract: Electronic decision making process has been adjudged as an alternative measure to address the flaws of ballot voting system for the delivery of free, fair, confident, credible and transparent elections. Electro...
IMPLEMENTATION OF WINDOW LISTING OPTIMIZATION AND KOREAN SMART SPELLER FOR IN-VEHICLE INFOTAINMENT
Abstract:The project deals with the implementation of two important features in HMI (Human Machine Interface) for MAN/SCANIA infotainment. The two feature implementations are Window Listing Optimization and Korean Smart...
Path Estimation and Motion Detection of Moving Object in Videos
This paper discusses an efficient and effective approach for identifying and tracking of moving object from a video. A video is captured by stationary camera. Moving object tracking and detection from video seque...
Intrusion Detection Techniques In Mobile Networks
The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. The recent denial of service attacks on major Internet sites have shown us, no o...