SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
Chandan M G Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -6) April 2015, pp.10-12
www.ijera.com 10 | P a g e
Detection and Analysis of Twitter Trending Topics via Link-
Anomaly Detection
Chandan M G*, Chandra Naik**
*(PG Scholar, Department of Computer Science Engineering, NMAMIT, Nitte, Udupi-574 110, India)
** (Department of Computer Science Engineering, NMAMIT, Nitte, Udupi-574 110, India)
ABSTRACT
This paper involves two approaches for finding the trending topics in social networks that is key-based approach
and link-based approach. In conventional key-based approach for topics detection have mainly focus on
frequencies of (textual) words. We propose a link-based approach which focuses on posts reflected in the
mentioning behavior of hundreds users. The anomaly detection in the twitter data set is carried out by retrieving
the trend topics from the twitter in a sequential manner by using some API and corresponding user for training,
then computed anomaly score is aggregated from different users. Further the aggregated anomaly score will be
feed into change-point analysis or burst detection at the pinpoint, in order to detect the emerging topics. We
have used the real time twitter account, so results are vary according to the tweet trends made. The experiment
shows that proposed link-based approach performs even better than the keyword-based approach.
Keywords - anomaly-detection, social network, change-point analysis, burst detection.
I. INTRODUCTION
A. Introduction to Social network and Twitter:
Nowadays Social network has become one of the
most important aspects in our daily life. Social
network is a network of social interactions and
personal relationships. And also dedicated website or
application which enables users to create and
information exchanged over social networks is not
only texts but also URLs, images, and videos. Some
of the biggest social networks used today like Face
book, Twitter, Google+, LinkedIn etc.[1] …
Another type of information (i.e., intentionally or
unintentionally) exchanged through social networks:
mentions. Mentions means links to other users of the
same social network stream in the form of message-
to, reply-to, retweets-of.
Twitter: Twitter is an online social networking
service that enables users to create application, it
sends and read 140-character messages called
"tweets". Only the registered users can read tweets
and post tweets, but the unregistered users can only
read tweets. Users may subscribe to other users
known as following and subscribers are known as
followers. In twitter, Replies and Mentions are two
ways for twitter user to exchange ideas [2].
B. Anomaly-detection:
Anomaly Detection is a pattern in the data that
does not conform to the expected normal behaviour.
And also referred to as outliers, exceptions,
peculiarities, surprise etc. some applications of
anomaly detection [3].
– Cyber intrusions
– Credit card fraud
Cyber intrusion is the unauthorized act of spying,
snooping, and stealing information through cyber
space. Credit card fraud means purpose may be to
obtain goods without paying, or to obtain
unauthorized funds from an account.
II. RELATED WORK AND ITS
LIMITATIONS
A new (trending) topics is something people feel
like discussing, commenting the information further
to their friends. Conventional key-based approaches
for topic detection have mainly focus on frequencies
of (textual) words [4].
A key-based approach could suffer from the
ambiguity caused by synonyms. It may also require
complicated pre-processing (e.g., segmentation). It
cannot be applied when the contents of the messages
are mostly no textual information. Another way,
words formed by mentions are unique, require little
pre-processing to obtain.
III. PROPOSED SYSTEM AND ITS
ADVANTAGES
The anomaly detection in the twitter data set is
carried out by retrieving the trend topics from the
twitter in a sequential manner by using some API and
corresponding user for training. Then computed
anomaly score is aggregated from different users.
Further the anomaly score will be feed into change-
point analysis or burst detection at the pinpoint, in
order to detect the emerging topics [5]. System
architecture for detecting emerging topics in twitter is
RESEARCH ARTICLE OPEN ACCESS
Chandan M G Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -6) April 2015, pp.10-12
www.ijera.com 11 | P a g e
as shown in Fig.1. In this architecture the detecting
topics involves five modules.
Twitter trends: In this module use Twitter REST
(Representational State Transfer) API, this API is to
collect the top 10 trending topics for specific WOEID
(Where on Earth ID), if trending information is
available for twitter. Then trending topics are in the
form of JSON format. The twitter API calls
Trends=https://api.twitter.com/1.1/trends/place.json?i
d=23424848
Fig.1 Detecting System Architecture.
Perform training: In this module use Twitter Search
API is the part of Twitter’s v1.1 REST
(Representational State Transfer) API. It allows
queries against the recent or most popular Tweets and
behaves similarly. It’s important note that the Search
API is focused on relevance and not completeness.
This means that some Tweets and users may be
missing from search results. The twitter search API
call.
search=https://api.twitter.com/1.1/search/tweets.json?
q
Parameters:
q (Required) The search query to run against
people search.
Example Values: q=Bangalore Blast.
Aggregation: In this module, to combine the
anomaly scores from different of hundreds users.
From the previous data, the anomaly score is
computed for each user depending on the current post
of user u and his/her past behaviour. We propose a
aggregated anomaly scores obtained for posts X1,X2,
X3.....XN using window size ƛ>0 [5].
In aggregation of key-based approach to find
out time in and time out, whereas link-based
approach to find out time in and time out.
Change-Point analysis: In this module, using
previous aggregated anomaly score is applied to
change-point detection. It detects change point from
the aggregated anomaly scores [6].
Burst detection: The burst-detection method is
based on a probabilistic automaton model. The
algorithm aims to analyze documents to find features
that have high intensity over finite/limited durations
of time periods [7].
Advantages: The proposed approach does not
confidence on the textual contents of social streams
posts, it is a strong to rephrasing and it can be applied
where topics are focused with information other than
texts, such as images, videos, URLs audio, and so on.
The proposed link-based approach performs even
better than the keyword-based approach.
IV. RESULTS
To detect the emerging topics in twitter. We have
used the real time twitter account, so results are vary
according to the tweet trends made. Our experiment
compare that the proposed link-based detection
approach against a key-based detection approach. We
have considered real twitter trends topics for compare
the results which one best performance. Fig 2 the
result of #MSD2011 trend topics, proposed link-
based approach detect much earlier than keyword-
based approach. So proposed link-based approach is
best. Fig 3 the result of 14th
Indian trend topics,
proposed link-based approach detect much earlier
than keyword-based approach. So proposed link-
based approach is best. Fig 4 the result of 8th
ODI
trend topics, proposed link-based approach detect
much earlier than keyword-based approach. So
proposed link-based approach is best. To observe the
above three possible results proposed link-based
approach performs even better than the keyword-
based approach. And the proposed approach is highly
scalable.
Fig 2: #MSD2011 trend topics
Chandan M G Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -6) April 2015, pp.10-12
www.ijera.com 12 | P a g e
V. CONCLUSIONS
In this paper, we have proposed link-based
approach to detect the trending of topics in twitter
social network. The basic idea of link-based approach
is to focus on the post reflected in the mentioning
behaviour of hundreds user instead of the textual
contents. The anomaly detection in the twitter data
set is carried out by retrieving the trend topics from
the twitter in a sequential manner by using some API
and corresponding user for training. Then computed
anomaly score is aggregated from different users.
Further the anomaly score will be feed into change-
point analysis or burst detection at the pinpoint, in
order to detect the emerging topics. We have collect
data from real time twitter account, so results vary
according to the tweet trends made. Finally, to gives
the better performance results when compared with
the existing system.
Fig 3: 14th Indian trend topics
Fig 4: 8th
ODI trends topics
REFERENCES
[1] D. Boyd and N. B. Ellison, “Social Network
Sites: Definition, History, and Scholarship,”
Journal Computer-Mediated Communication
, vol.13, no. 1-2, Nov. 2007.
[2] Gabriel Weimann, “Terror on Facebook,
Twitter, and Youtube,” The Brown Journal
of World Affairs, volume 16, issue 2, 2010.
[3] Yang Li, Bin-Xing Fang, “A Lightweight
Online Network Anomaly Detection Scheme
Based on Data Mining Methods,”
International Conference on Network
Protocols, pp.340-341, 16-19 Oct. 2007.
[4] J. Allan et al., “Topic Detection and
Tracking Pilot Study: Final Report,” Proc.
DARPA Broadcast News Transcription and
Understanding Workshop, 1998.
[5] T. Takahashi, R. Tomioka, and K.
Yamanishi, “Discovering emerging topics in
social streams via link anomaly detection,”
arXiv: 1110.2899v1 [stat.ML], Tech. Rep.,
2011.
[6] J. Takeuchi and K. Yamanishi, “A Unifying
Framework for Detecting Outliers and
Change Points from Time Series,” IEEE
Trans. Knowledge Data Eng., vol. 18, no. 4,
pp. 482-492, Apr. 2006.
[7] J. Kleinberg, “Bursty and Hierarchical
Structure in Streams,” Data Mining
Knowledge Discovery, vol. 7, no. 4, pp.
373-397, 2003.

Contenu connexe

Tendances

IRJET - Implementation of Twitter Sentimental Analysis According to Hash Tag
 IRJET - Implementation of Twitter Sentimental Analysis According to Hash Tag IRJET - Implementation of Twitter Sentimental Analysis According to Hash Tag
IRJET - Implementation of Twitter Sentimental Analysis According to Hash TagIRJET Journal
 
Twitter sentiment analysis project report
Twitter sentiment analysis project reportTwitter sentiment analysis project report
Twitter sentiment analysis project reportBharat Khanna
 
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITY
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITYFRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITY
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITYcscpconf
 
Twitter Sentiment Analysis
Twitter Sentiment AnalysisTwitter Sentiment Analysis
Twitter Sentiment Analysisijtsrd
 
IRJET- Sentiment Analysis of Twitter Data using Python
IRJET-  	  Sentiment Analysis of Twitter Data using PythonIRJET-  	  Sentiment Analysis of Twitter Data using Python
IRJET- Sentiment Analysis of Twitter Data using PythonIRJET Journal
 
IRJET- Fake Profile Identification using Machine Learning
IRJET-  	  Fake Profile Identification using Machine LearningIRJET-  	  Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine LearningIRJET Journal
 
Measuring information credibility in social media using combination of user p...
Measuring information credibility in social media using combination of user p...Measuring information credibility in social media using combination of user p...
Measuring information credibility in social media using combination of user p...IJECEIAES
 
Sentiment analysis on demonetisation
Sentiment analysis on demonetisationSentiment analysis on demonetisation
Sentiment analysis on demonetisationAbrarMohamed5
 
IRJET - Suicidal Text Detection using Machine Learning
IRJET -  	  Suicidal Text Detection using Machine LearningIRJET -  	  Suicidal Text Detection using Machine Learning
IRJET - Suicidal Text Detection using Machine LearningIRJET Journal
 
IRJET - Detection of Drug Abuse using Social Media Mining
IRJET - Detection of Drug Abuse using Social Media MiningIRJET - Detection of Drug Abuse using Social Media Mining
IRJET - Detection of Drug Abuse using Social Media MiningIRJET Journal
 
Analyzing-Threat-Levels-of-Extremists-using-Tweets
Analyzing-Threat-Levels-of-Extremists-using-TweetsAnalyzing-Threat-Levels-of-Extremists-using-Tweets
Analyzing-Threat-Levels-of-Extremists-using-TweetsRESHAN FARAZ
 
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGDETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGijcsit
 
IRJET - Twitter Sentimental Analysis
IRJET -  	  Twitter Sentimental AnalysisIRJET -  	  Twitter Sentimental Analysis
IRJET - Twitter Sentimental AnalysisIRJET Journal
 
Social networks protection against fake profiles and social bots attacks
Social networks protection against  fake profiles and social bots attacksSocial networks protection against  fake profiles and social bots attacks
Social networks protection against fake profiles and social bots attacksAboul Ella Hassanien
 
Integrated approach to detect spam in social media networks using hybrid feat...
Integrated approach to detect spam in social media networks using hybrid feat...Integrated approach to detect spam in social media networks using hybrid feat...
Integrated approach to detect spam in social media networks using hybrid feat...IJECEIAES
 
IRJET- College Enquiry Chatbot System(DMCE)
IRJET-  	  College Enquiry Chatbot System(DMCE)IRJET-  	  College Enquiry Chatbot System(DMCE)
IRJET- College Enquiry Chatbot System(DMCE)IRJET Journal
 
IRJET - Sentiment Analysis of Posts and Comments of OSN
IRJET -  	  Sentiment Analysis of Posts and Comments of OSNIRJET -  	  Sentiment Analysis of Posts and Comments of OSN
IRJET - Sentiment Analysis of Posts and Comments of OSNIRJET Journal
 

Tendances (20)

IRJET - Implementation of Twitter Sentimental Analysis According to Hash Tag
 IRJET - Implementation of Twitter Sentimental Analysis According to Hash Tag IRJET - Implementation of Twitter Sentimental Analysis According to Hash Tag
IRJET - Implementation of Twitter Sentimental Analysis According to Hash Tag
 
32 99-1-pb
32 99-1-pb32 99-1-pb
32 99-1-pb
 
Twitter sentiment analysis project report
Twitter sentiment analysis project reportTwitter sentiment analysis project report
Twitter sentiment analysis project report
 
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITY
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITYFRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITY
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITY
 
Twitter Sentiment Analysis
Twitter Sentiment AnalysisTwitter Sentiment Analysis
Twitter Sentiment Analysis
 
IRJET- Sentiment Analysis of Twitter Data using Python
IRJET-  	  Sentiment Analysis of Twitter Data using PythonIRJET-  	  Sentiment Analysis of Twitter Data using Python
IRJET- Sentiment Analysis of Twitter Data using Python
 
IRJET- Fake Profile Identification using Machine Learning
IRJET-  	  Fake Profile Identification using Machine LearningIRJET-  	  Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
 
Measuring information credibility in social media using combination of user p...
Measuring information credibility in social media using combination of user p...Measuring information credibility in social media using combination of user p...
Measuring information credibility in social media using combination of user p...
 
Sentiment analysis on demonetisation
Sentiment analysis on demonetisationSentiment analysis on demonetisation
Sentiment analysis on demonetisation
 
E017433538
E017433538E017433538
E017433538
 
IRJET - Suicidal Text Detection using Machine Learning
IRJET -  	  Suicidal Text Detection using Machine LearningIRJET -  	  Suicidal Text Detection using Machine Learning
IRJET - Suicidal Text Detection using Machine Learning
 
IRJET - Detection of Drug Abuse using Social Media Mining
IRJET - Detection of Drug Abuse using Social Media MiningIRJET - Detection of Drug Abuse using Social Media Mining
IRJET - Detection of Drug Abuse using Social Media Mining
 
Analyzing-Threat-Levels-of-Extremists-using-Tweets
Analyzing-Threat-Levels-of-Extremists-using-TweetsAnalyzing-Threat-Levels-of-Extremists-using-Tweets
Analyzing-Threat-Levels-of-Extremists-using-Tweets
 
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGDETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
 
IRJET - Twitter Sentimental Analysis
IRJET -  	  Twitter Sentimental AnalysisIRJET -  	  Twitter Sentimental Analysis
IRJET - Twitter Sentimental Analysis
 
Social networks protection against fake profiles and social bots attacks
Social networks protection against  fake profiles and social bots attacksSocial networks protection against  fake profiles and social bots attacks
Social networks protection against fake profiles and social bots attacks
 
Integrated approach to detect spam in social media networks using hybrid feat...
Integrated approach to detect spam in social media networks using hybrid feat...Integrated approach to detect spam in social media networks using hybrid feat...
Integrated approach to detect spam in social media networks using hybrid feat...
 
[IJET V2I4P9] Authors: Praveen Jayasankar , Prashanth Jayaraman ,Rachel Hannah
[IJET V2I4P9] Authors: Praveen Jayasankar , Prashanth Jayaraman ,Rachel Hannah[IJET V2I4P9] Authors: Praveen Jayasankar , Prashanth Jayaraman ,Rachel Hannah
[IJET V2I4P9] Authors: Praveen Jayasankar , Prashanth Jayaraman ,Rachel Hannah
 
IRJET- College Enquiry Chatbot System(DMCE)
IRJET-  	  College Enquiry Chatbot System(DMCE)IRJET-  	  College Enquiry Chatbot System(DMCE)
IRJET- College Enquiry Chatbot System(DMCE)
 
IRJET - Sentiment Analysis of Posts and Comments of OSN
IRJET -  	  Sentiment Analysis of Posts and Comments of OSNIRJET -  	  Sentiment Analysis of Posts and Comments of OSN
IRJET - Sentiment Analysis of Posts and Comments of OSN
 

Similaire à Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection

IRJET- Twitter Sentimental Analysis for Predicting Election Result using ...
IRJET-  	  Twitter Sentimental Analysis for Predicting Election Result using ...IRJET-  	  Twitter Sentimental Analysis for Predicting Election Result using ...
IRJET- Twitter Sentimental Analysis for Predicting Election Result using ...IRJET Journal
 
IRJET- A Survey on Trend Analysis on Twitter for Predicting Public Opinion on...
IRJET- A Survey on Trend Analysis on Twitter for Predicting Public Opinion on...IRJET- A Survey on Trend Analysis on Twitter for Predicting Public Opinion on...
IRJET- A Survey on Trend Analysis on Twitter for Predicting Public Opinion on...IRJET Journal
 
IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...
IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...
IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...IRJET Journal
 
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNINGSENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNINGIRJET Journal
 
Sentiment Analysis on Twitter data using Machine Learning
Sentiment Analysis on Twitter data using Machine LearningSentiment Analysis on Twitter data using Machine Learning
Sentiment Analysis on Twitter data using Machine LearningIRJET Journal
 
AGGRESSION DETECTION USING MACHINE LEARNING MODEL
AGGRESSION DETECTION USING MACHINE LEARNING MODELAGGRESSION DETECTION USING MACHINE LEARNING MODEL
AGGRESSION DETECTION USING MACHINE LEARNING MODELIRJET Journal
 
Sentiment Analysis of Twitter tweets using supervised classification technique
Sentiment Analysis of Twitter tweets using supervised classification technique Sentiment Analysis of Twitter tweets using supervised classification technique
Sentiment Analysis of Twitter tweets using supervised classification technique IJERA Editor
 
IRJET- Categorization of Geo-Located Tweets for Data Analysis
IRJET- Categorization of Geo-Located Tweets for Data AnalysisIRJET- Categorization of Geo-Located Tweets for Data Analysis
IRJET- Categorization of Geo-Located Tweets for Data AnalysisIRJET Journal
 
Detailed Investigation of Text Classification and Clustering of Twitter Data ...
Detailed Investigation of Text Classification and Clustering of Twitter Data ...Detailed Investigation of Text Classification and Clustering of Twitter Data ...
Detailed Investigation of Text Classification and Clustering of Twitter Data ...ijtsrd
 
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...IRJET Journal
 
DP1_160430723010_Divya.pptx
DP1_160430723010_Divya.pptxDP1_160430723010_Divya.pptx
DP1_160430723010_Divya.pptxDivyaPatel729457
 
A Survey on Analysis of Twitter Opinion Mining using Sentiment Analysis
A Survey on Analysis of Twitter Opinion Mining using Sentiment AnalysisA Survey on Analysis of Twitter Opinion Mining using Sentiment Analysis
A Survey on Analysis of Twitter Opinion Mining using Sentiment AnalysisIRJET Journal
 
IRJET - Election Result Prediction using Sentiment Analysis
IRJET - Election Result Prediction using Sentiment AnalysisIRJET - Election Result Prediction using Sentiment Analysis
IRJET - Election Result Prediction using Sentiment AnalysisIRJET Journal
 
Applying Clustering Techniques for Efficient Text Mining in Twitter Data
Applying Clustering Techniques for Efficient Text Mining in Twitter DataApplying Clustering Techniques for Efficient Text Mining in Twitter Data
Applying Clustering Techniques for Efficient Text Mining in Twitter Dataijbuiiir1
 
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53IRJET Journal
 
Categorize balanced dataset for troll detection
Categorize balanced dataset for troll detectionCategorize balanced dataset for troll detection
Categorize balanced dataset for troll detectionvivatechijri
 
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORK
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORKINFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORK
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORKIAEME Publication
 
Dynamic feature selection for spam detection (1).pptx
Dynamic feature selection for spam detection (1).pptxDynamic feature selection for spam detection (1).pptx
Dynamic feature selection for spam detection (1).pptxRivikaJain
 
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORKDETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORKIRJET Journal
 

Similaire à Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection (20)

IRJET- Twitter Sentimental Analysis for Predicting Election Result using ...
IRJET-  	  Twitter Sentimental Analysis for Predicting Election Result using ...IRJET-  	  Twitter Sentimental Analysis for Predicting Election Result using ...
IRJET- Twitter Sentimental Analysis for Predicting Election Result using ...
 
IRJET- A Survey on Trend Analysis on Twitter for Predicting Public Opinion on...
IRJET- A Survey on Trend Analysis on Twitter for Predicting Public Opinion on...IRJET- A Survey on Trend Analysis on Twitter for Predicting Public Opinion on...
IRJET- A Survey on Trend Analysis on Twitter for Predicting Public Opinion on...
 
IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...
IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...
IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...
 
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNINGSENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
 
Sentiment Analysis on Twitter data using Machine Learning
Sentiment Analysis on Twitter data using Machine LearningSentiment Analysis on Twitter data using Machine Learning
Sentiment Analysis on Twitter data using Machine Learning
 
AGGRESSION DETECTION USING MACHINE LEARNING MODEL
AGGRESSION DETECTION USING MACHINE LEARNING MODELAGGRESSION DETECTION USING MACHINE LEARNING MODEL
AGGRESSION DETECTION USING MACHINE LEARNING MODEL
 
Sentiment Analysis of Twitter tweets using supervised classification technique
Sentiment Analysis of Twitter tweets using supervised classification technique Sentiment Analysis of Twitter tweets using supervised classification technique
Sentiment Analysis of Twitter tweets using supervised classification technique
 
IRJET- Categorization of Geo-Located Tweets for Data Analysis
IRJET- Categorization of Geo-Located Tweets for Data AnalysisIRJET- Categorization of Geo-Located Tweets for Data Analysis
IRJET- Categorization of Geo-Located Tweets for Data Analysis
 
Detailed Investigation of Text Classification and Clustering of Twitter Data ...
Detailed Investigation of Text Classification and Clustering of Twitter Data ...Detailed Investigation of Text Classification and Clustering of Twitter Data ...
Detailed Investigation of Text Classification and Clustering of Twitter Data ...
 
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...
 
DP1_160430723010_Divya.pptx
DP1_160430723010_Divya.pptxDP1_160430723010_Divya.pptx
DP1_160430723010_Divya.pptx
 
[IJET-V2I1P14] Authors:Aditi Verma, Rachana Agarwal, Sameer Bardia, Simran Sh...
[IJET-V2I1P14] Authors:Aditi Verma, Rachana Agarwal, Sameer Bardia, Simran Sh...[IJET-V2I1P14] Authors:Aditi Verma, Rachana Agarwal, Sameer Bardia, Simran Sh...
[IJET-V2I1P14] Authors:Aditi Verma, Rachana Agarwal, Sameer Bardia, Simran Sh...
 
A Survey on Analysis of Twitter Opinion Mining using Sentiment Analysis
A Survey on Analysis of Twitter Opinion Mining using Sentiment AnalysisA Survey on Analysis of Twitter Opinion Mining using Sentiment Analysis
A Survey on Analysis of Twitter Opinion Mining using Sentiment Analysis
 
IRJET - Election Result Prediction using Sentiment Analysis
IRJET - Election Result Prediction using Sentiment AnalysisIRJET - Election Result Prediction using Sentiment Analysis
IRJET - Election Result Prediction using Sentiment Analysis
 
Applying Clustering Techniques for Efficient Text Mining in Twitter Data
Applying Clustering Techniques for Efficient Text Mining in Twitter DataApplying Clustering Techniques for Efficient Text Mining in Twitter Data
Applying Clustering Techniques for Efficient Text Mining in Twitter Data
 
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53
 
Categorize balanced dataset for troll detection
Categorize balanced dataset for troll detectionCategorize balanced dataset for troll detection
Categorize balanced dataset for troll detection
 
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORK
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORKINFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORK
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORK
 
Dynamic feature selection for spam detection (1).pptx
Dynamic feature selection for spam detection (1).pptxDynamic feature selection for spam detection (1).pptx
Dynamic feature selection for spam detection (1).pptx
 
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORKDETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
 

Dernier

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 

Dernier (20)

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 

Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection

  • 1. Chandan M G Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -6) April 2015, pp.10-12 www.ijera.com 10 | P a g e Detection and Analysis of Twitter Trending Topics via Link- Anomaly Detection Chandan M G*, Chandra Naik** *(PG Scholar, Department of Computer Science Engineering, NMAMIT, Nitte, Udupi-574 110, India) ** (Department of Computer Science Engineering, NMAMIT, Nitte, Udupi-574 110, India) ABSTRACT This paper involves two approaches for finding the trending topics in social networks that is key-based approach and link-based approach. In conventional key-based approach for topics detection have mainly focus on frequencies of (textual) words. We propose a link-based approach which focuses on posts reflected in the mentioning behavior of hundreds users. The anomaly detection in the twitter data set is carried out by retrieving the trend topics from the twitter in a sequential manner by using some API and corresponding user for training, then computed anomaly score is aggregated from different users. Further the aggregated anomaly score will be feed into change-point analysis or burst detection at the pinpoint, in order to detect the emerging topics. We have used the real time twitter account, so results are vary according to the tweet trends made. The experiment shows that proposed link-based approach performs even better than the keyword-based approach. Keywords - anomaly-detection, social network, change-point analysis, burst detection. I. INTRODUCTION A. Introduction to Social network and Twitter: Nowadays Social network has become one of the most important aspects in our daily life. Social network is a network of social interactions and personal relationships. And also dedicated website or application which enables users to create and information exchanged over social networks is not only texts but also URLs, images, and videos. Some of the biggest social networks used today like Face book, Twitter, Google+, LinkedIn etc.[1] … Another type of information (i.e., intentionally or unintentionally) exchanged through social networks: mentions. Mentions means links to other users of the same social network stream in the form of message- to, reply-to, retweets-of. Twitter: Twitter is an online social networking service that enables users to create application, it sends and read 140-character messages called "tweets". Only the registered users can read tweets and post tweets, but the unregistered users can only read tweets. Users may subscribe to other users known as following and subscribers are known as followers. In twitter, Replies and Mentions are two ways for twitter user to exchange ideas [2]. B. Anomaly-detection: Anomaly Detection is a pattern in the data that does not conform to the expected normal behaviour. And also referred to as outliers, exceptions, peculiarities, surprise etc. some applications of anomaly detection [3]. – Cyber intrusions – Credit card fraud Cyber intrusion is the unauthorized act of spying, snooping, and stealing information through cyber space. Credit card fraud means purpose may be to obtain goods without paying, or to obtain unauthorized funds from an account. II. RELATED WORK AND ITS LIMITATIONS A new (trending) topics is something people feel like discussing, commenting the information further to their friends. Conventional key-based approaches for topic detection have mainly focus on frequencies of (textual) words [4]. A key-based approach could suffer from the ambiguity caused by synonyms. It may also require complicated pre-processing (e.g., segmentation). It cannot be applied when the contents of the messages are mostly no textual information. Another way, words formed by mentions are unique, require little pre-processing to obtain. III. PROPOSED SYSTEM AND ITS ADVANTAGES The anomaly detection in the twitter data set is carried out by retrieving the trend topics from the twitter in a sequential manner by using some API and corresponding user for training. Then computed anomaly score is aggregated from different users. Further the anomaly score will be feed into change- point analysis or burst detection at the pinpoint, in order to detect the emerging topics [5]. System architecture for detecting emerging topics in twitter is RESEARCH ARTICLE OPEN ACCESS
  • 2. Chandan M G Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -6) April 2015, pp.10-12 www.ijera.com 11 | P a g e as shown in Fig.1. In this architecture the detecting topics involves five modules. Twitter trends: In this module use Twitter REST (Representational State Transfer) API, this API is to collect the top 10 trending topics for specific WOEID (Where on Earth ID), if trending information is available for twitter. Then trending topics are in the form of JSON format. The twitter API calls Trends=https://api.twitter.com/1.1/trends/place.json?i d=23424848 Fig.1 Detecting System Architecture. Perform training: In this module use Twitter Search API is the part of Twitter’s v1.1 REST (Representational State Transfer) API. It allows queries against the recent or most popular Tweets and behaves similarly. It’s important note that the Search API is focused on relevance and not completeness. This means that some Tweets and users may be missing from search results. The twitter search API call. search=https://api.twitter.com/1.1/search/tweets.json? q Parameters: q (Required) The search query to run against people search. Example Values: q=Bangalore Blast. Aggregation: In this module, to combine the anomaly scores from different of hundreds users. From the previous data, the anomaly score is computed for each user depending on the current post of user u and his/her past behaviour. We propose a aggregated anomaly scores obtained for posts X1,X2, X3.....XN using window size ƛ>0 [5]. In aggregation of key-based approach to find out time in and time out, whereas link-based approach to find out time in and time out. Change-Point analysis: In this module, using previous aggregated anomaly score is applied to change-point detection. It detects change point from the aggregated anomaly scores [6]. Burst detection: The burst-detection method is based on a probabilistic automaton model. The algorithm aims to analyze documents to find features that have high intensity over finite/limited durations of time periods [7]. Advantages: The proposed approach does not confidence on the textual contents of social streams posts, it is a strong to rephrasing and it can be applied where topics are focused with information other than texts, such as images, videos, URLs audio, and so on. The proposed link-based approach performs even better than the keyword-based approach. IV. RESULTS To detect the emerging topics in twitter. We have used the real time twitter account, so results are vary according to the tweet trends made. Our experiment compare that the proposed link-based detection approach against a key-based detection approach. We have considered real twitter trends topics for compare the results which one best performance. Fig 2 the result of #MSD2011 trend topics, proposed link- based approach detect much earlier than keyword- based approach. So proposed link-based approach is best. Fig 3 the result of 14th Indian trend topics, proposed link-based approach detect much earlier than keyword-based approach. So proposed link- based approach is best. Fig 4 the result of 8th ODI trend topics, proposed link-based approach detect much earlier than keyword-based approach. So proposed link-based approach is best. To observe the above three possible results proposed link-based approach performs even better than the keyword- based approach. And the proposed approach is highly scalable. Fig 2: #MSD2011 trend topics
  • 3. Chandan M G Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -6) April 2015, pp.10-12 www.ijera.com 12 | P a g e V. CONCLUSIONS In this paper, we have proposed link-based approach to detect the trending of topics in twitter social network. The basic idea of link-based approach is to focus on the post reflected in the mentioning behaviour of hundreds user instead of the textual contents. The anomaly detection in the twitter data set is carried out by retrieving the trend topics from the twitter in a sequential manner by using some API and corresponding user for training. Then computed anomaly score is aggregated from different users. Further the anomaly score will be feed into change- point analysis or burst detection at the pinpoint, in order to detect the emerging topics. We have collect data from real time twitter account, so results vary according to the tweet trends made. Finally, to gives the better performance results when compared with the existing system. Fig 3: 14th Indian trend topics Fig 4: 8th ODI trends topics REFERENCES [1] D. Boyd and N. B. Ellison, “Social Network Sites: Definition, History, and Scholarship,” Journal Computer-Mediated Communication , vol.13, no. 1-2, Nov. 2007. [2] Gabriel Weimann, “Terror on Facebook, Twitter, and Youtube,” The Brown Journal of World Affairs, volume 16, issue 2, 2010. [3] Yang Li, Bin-Xing Fang, “A Lightweight Online Network Anomaly Detection Scheme Based on Data Mining Methods,” International Conference on Network Protocols, pp.340-341, 16-19 Oct. 2007. [4] J. Allan et al., “Topic Detection and Tracking Pilot Study: Final Report,” Proc. DARPA Broadcast News Transcription and Understanding Workshop, 1998. [5] T. Takahashi, R. Tomioka, and K. Yamanishi, “Discovering emerging topics in social streams via link anomaly detection,” arXiv: 1110.2899v1 [stat.ML], Tech. Rep., 2011. [6] J. Takeuchi and K. Yamanishi, “A Unifying Framework for Detecting Outliers and Change Points from Time Series,” IEEE Trans. Knowledge Data Eng., vol. 18, no. 4, pp. 482-492, Apr. 2006. [7] J. Kleinberg, “Bursty and Hierarchical Structure in Streams,” Data Mining Knowledge Discovery, vol. 7, no. 4, pp. 373-397, 2003.