Performance Evaluation of Different Data Mining Techniques for Social Media News Credibility Assessment
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 9
Abstract
Social media has recently become a basic source for news consumption and sharing among millions of users. Social media platforms enable users to publish and share their own generated content with little or no restrictions. However, this gives an opportunity for the spread of inaccurate or misleading content, which can badly affect users’ beliefs and decisions. This is why credibility assessment of social media content has recently received tremendous attention. The majority of the studies in the literature focused on identifying features that provide a high predictive power when fed to data mining models and select the model with the highest predictive performance given those features. Results of these studies are conflicting regarding the best model. Additionally, they disregarded the fact that real-time credibility assessment is needed and thus time and resources consumption is crucial for model selection. This study tries to fill this gap by investigating the performance of different data mining techniques for credibility assessments in terms of both functional and operational characteristics for a balanced evaluation that considers both model performance and interoperability.
Authors and Affiliations
Sahar F. Sabbeh
LIMIT CYCLE GENERATION FOR MULTI-MODAL AND 2-DIMENSIONAL PIECEWISE AFFINE CONTROL SYSTEMS
This paper considers a limit cycle control problem of a multi-modal and 2-dimensional piecewise affine control system. Limit cycle control means a controller design method to generate a limit cycle for given piecewise af...
A Parallel Community Detection Algorithm for Big Social Networks
Mining social networks has become an important task in data mining field, which describes users and their roles and relationships in social networks. Processing social networks with graph algorithms is the source for dis...
Secure Medical Images Sharing over Cloud Computing environment
Nowadays, many applications have been appeared due to the rapid development in the term of telecommunication. One of these applications is the telemedicine where the patients' digital data can transfer between the doctor...
How to Model a Likely Behavior of a Pedagogical Agent from a Real Situation
The aim of this work is to model the behavior verbal and nonverbal behavior of a Pedagogical Agent (PA) can be integrated into an Intelligent Tutoring System. The following research questions were posed: what is the nonv...
LSSCW: A Lightweight Security Scheme for Cluster based Wireless Sensor Network
In last two decades, Wireless Sensor Network (WSN) is used for large number of Internet of Things (IoT) applications, such as military surveillance, forest fire detection, healthcare, precision agriculture and smart home...