SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1922
Big Data Driven Information Diffusion Analytics and Control on
Social Network
Prof. Mahvash Khan1, Miss. Kalyani Balapure2, Miss. Shweta Kalambe3,
Miss. Nikita Shembekar4, Miss. Ankita Tiple5
1Professor, Dept. of Computer Science and Engineering, Nagpur Institute of Technology, Nagpur,
Maharashtra, India
2,3,4,5Student, Dept. of Computer Science and Engineering, Nagpur Institute of Technology, Nagpur,
Maharashtra, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - In this paper, we are dealing with information
diffusion on social media and control over it. Now a day’s
social media becomes most popular way to express the
thoughts so that social media becomes important part of
people’s daily routine. They invest most of time on social
media. Usually people post their news whichgetsreplicatedby
their followers and friends on social media. Such postcontains
blogs, images, text messages and so these information gets
diffused day by day however they don’t know about the news
truth which they are reposting. If the news is fake, then also it
gets reposted by people such scenario can cause
misunderstanding on people’s mind they follow that news.
News may be in support of something or may be in against of
something or it may be related to the political parties’
promotions. In such cases they misuse the people views and
reaction on that news to make in favor of them. So it may lead
to create big fight in opposition parties. Also this can create a
difference between hearts of the people belonging to different
religions. To abolish such things, we have implemented this
paper. In this paper we have given solution implemented by
applying some techniques and methods.
Key Words: Information Diffusion, sentiment analysis,
naïve Bayes, Deep Learning, Linear Regression, GBTs,
SVM, Diffusion Control
1. INTRODUCTION
This paper presents the work related to the control on
diffused information. The proposed approach includes
extraction of data then find out the diffused then perform
sentiment-analysis on the diffused information then control
the over the fake information which is spreading as fast as
over the social media. The proposed system consists two
parts which are explained as below:
In first part, a web application, publicly are accessible
through any modern browser. It will contain links to
each of the dynamic real-time sentiment visualizations, as
well as a search page where the user can enter a custom
topic, and fresh tweets will be fetched, analyzed and
rendered. In Second part, a series of open source package do
specific tasks (including the sentiment-analysis module, a
fetch-tweets module, Geo-lookup etc.) Each of these will be
tested, documented and then publicly published for other
developers to make use of. For the second part, among all
data some of the diffused data will be detected and we will
control on diffused data by using some techniques. So that
this diffused fake data will not get propagated. Different
experimentations are carried out. A database is extracted,
diffused data is identified and also we will get control on
diffused unwanted information by using some techniques
and methodology.
1.1 Information Diffusion:
Every Information diffusion begins from specific source
nodes. Let, suppose that Sara Ali Khan isa Bollywoodactress
promotes her movie on social media such as twitter. It may
lead to take place great conversation among her fan
following, and thus she is the source to startthisinformation
diffusion. Every propagator able to retrieve the data fromits
alongside. In previous instance Rima is a fan of Sara AliKhan
then she can only read Sara’s posts and her follower’s posts
on her post [4]. Opine of fans on social media may be
dependent on piloted situation, and social media gives a
platform for people to convey their thoughts. The
propagation of informatics that affects some contents can
cause large consequences on our society [2]. It is
accentuation to abolished the real world hypothesize since
we wanted to measure information diffusion of genuine and
not genuine news, which consists each diffusion beginner
that accumulate data would available for us. Thus, it
idealistic to remove from consideration exterior personal
belonging of information diffusion through terminologies
[3].
1.2 Diffusion Control:
The increasing vogue of the online social media doesn’t
mean that it is secure and reliable. On the conflict, the virus
diverse and theconfidential informationdiffusionhavemade
it being an enormous headache for IT adminsandpeople[4].
For example, “KooFace” is a Trojan Worm on Facebook,
which diverse by leaving a comment on profile pages of the
victim’s colleague to catch a click on the maliciouslink .Most
of system admins tensed that their workers will repost very
much confidential informationonline.Soastimepassesby,it
being more and more accentuate and urgent to control the
virus diverse and the confidential information diffusion in
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1923
online social media. In social media there is huge amount of
information are getting propagated. In this information it
contains fake information as well as truthful information. In
this chapter we are controlling diffused fake information by
using parameters as source of the information i.e. by whom
this information is spreading or who has posted this
information. According to this we will decide the news is
trustworthy or not. So, we will discardthatinformationfrom
the database. Then we will get the truthful or normal
information.
2. Literature Review:
 “Weak Ties: Subtle RoleintheInformationDiffusion
in Online Social Networks”:Thispaperpresentsthat
weak ties play a fine role in the information
diffusion in online social media. On one hand, they
play a role of aqueduct,whichlink scheduledgroups
and snap through the catching of information in
local areas. On the other hand, selecting weak ties
advantageous to release cannot make the
information diffuse speedy in the network. For
possible applications, they believe that the weak
ties might be of use in the domination of the virus
diverse and the confidential information diffusion.
 “Information Diffusion in Online Social Networks:A
Survey”: In this paper they provide programs for
collecting twitter data and analysis on data. They
observed that real news is diverse faster than fake
news on an average as well overall.
 “A Survey on Information Diffusion in Online Social
Networks: Models and Methods”: The paper
presents the evaluation of leader of the topic and
from where the news id spreading.
 “Real-time Analysis of Information Diffusion in
Social Media”: This paper presents that how the
information gatesdiffusedonsocial media andgives
real-time analysis of information.
3. PROPOSED SYSTEM:
Figure shows the schematic overview of the proposed
approach. The working of the proposed approach is divided
into three main steps, extraction of database from social
media, identifying diffused data andnormal data andcontrol
on diffused data.
Fig: data flow diagram of data driven information diffusion
analytics and control in social network
4. METHODOLOGY
There are many algorithms and methods used in practice to
progress sentiment analysis systems: Hybrid, Rule-Based
and Automatic. Rule-based systems incorporate a set of
manually crafted rules to Perform sentiment analysis.These
rules generally use a variation of inputs, classic Natural
Language Processing techniques and terminologies. An
example of how to develop Rule-based system is to first
define a list of separated words, second is to count the
number of positive words and negative words from input,
final is to check if the amount of positive word appearances
is greater than negative word appearances, if true, then
return positive sentiment else return negative. Automatic
systems use a Machine Learning thinker, exist on it text as
input and return the similar classification: positive,negative
or neutral (if polarity analysis is performed). The Machine
Learning Classifier is implemented in typically two phases:
 The first phase involves training our model to
associate input (text) to corresponding output
(label or tag), which are based on test samples used
for training. The connection for this process
includes sending the input through a feature
extraction that moves text input into a feature
vector. The feature vectors go through a queue and
pairs of both feature vectors and labels (positive,
negative or neutral sentiment) are fed into the
machine learning algorithm to create the model.
 The final phase involves prediction of sentiment
score for random input. The data pipeline consists
of sending raw input data through a feature
extractor to be transformed into a feature vector,
which is then fed to the model togeneratepredicted
labels, such as positive, negative or neutral.
Common Machine Learning Algorithms that can be
used in text classificationincludeLinearRegression,
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1924
Naive Bayes, Deep Learning, Support Vector
Machines and Gradient Boosted Trees (GBTs).
 Gradient Boosted Trees(GBTs):trainsa sequenceof
decision trees to build the classificationmodel,uses
the current group of feature vectors to predict the
polarity of the label, as like negative, neutral or
positive of each training instance and finally
compares the prediction against the true label.
 Deep Learning: tries to imitate how the human
brain functions by using artificial neural networks
to process data. Sentiment analysis can be
implemented to classify text in two ways, the first
way is to use supervised learning if there is enough
training data, else use unsupervised training
followed by a supervised classifier to train a deep
neural network model. Deep learning neural
networks used for building sentiment classification
models include recurrent neural networks,
paragraph vectors, word2vec, recursive neural
networks, etc.
 Support Vector Machines: are non-probabilistic
models that shows text examples as points in a
multidimensional space. These text examples are
categorizing in different ways, such as sentiments:
happy or sad, angry or pleased, etc. These
categories belong to distinct regions of that
multidimensional space. New texts are mapped to
the same space and predicted to belong to a certain
category.
 Linear Regression: is an algorithm used in statistics
and machine learning to predict some value (Y)
given the set of features (X).
 Naive Bayes: are set of supervisedmachinelearning
algorithms that use Bayes’ theorem to predict
category of text.
5. FUTURE SCOPE
In this accentuate future scope is that we can provide a
service to various social networking sites as we are sorting
only truthful information on social media.So,wecanprovide
this system to company owner and they will makeuseofitto
make their user free from fake news.
6. SCREENSHOTS
1. In this screenshot we have written querry byusing querry
editor in Hive.
2. fig. shows result of above query which analyses positive
and negative ratings of tweets.
3. The below graph is plotted against dictionary. Word and
dictionary. Rating which shows positive rating and negative
rating of tweet words.
7. APPLICATION
This system is used in online social media such as Twitter,
Facebook, YouTube etc. The system will provide us the data
which consists only truthful data because some operations
are performed on data to obtain truthful data on social
media. So, users will not get fake information on social
media. This system is very important to implement in
various social media.
8. CONCLUSIONS
Over recent years, a variety of social networks have seen for
individuals to keepincontactwithothersconveniently.Huge
amounts of data can therefore bebuildsinthesesocial media
that can tell us who the very accentuate person is, who a
topic leader will be, why an eventuality will spread in a
specific way, and other accentuate things. To solve these
matter requires multifaceted research that draws on the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1925
fields of not only computer science, but also sociology,
psychology, economics, and others.
We experimented with a set of tweets and a set of news
media articles. For example, we detectedinfluencefunctions
of many websites and identify that they very based on the
type of the website and the topic of the information.
Moreover, we also perceived that the emulation and
newness have a robust `force on the transformation of short
document phrases in online news media. As the adoption of
short, news-related document phrases become visible to be
highly ruled by the influence of the few of media websites,
the transformation of Twitter hashtags is ruled by a much
larger set of live people, every one of which has relationally
less impact. Furthermore, we alsoperceivedthatpeople with
the massive fan followers are not the most effective in
generated.
A specific exciting field for real-time survey is information
diffusion, scrutinizing and predicting how information
spreads. Research to understand and used information
diffusion follows commonly two major directions with little
interchange: On the one hand, there are knowledgeable
schemas that describe and relatively information flow in
social media. In this we have controlled the diffused
information from social media and the users will get the
truthful information so that it does not cause confusion on
people’s mind and their mind will not be distracted on fake
things.
REFERENCES
1) Divyakant Agrawal,Basssam Bamiech,Ceren
Budak,Amr EI Andrew Flanagin, and
Patterson“Data-Driven Modelling and Analsis of
Online Social Network”for international journal, 17
March 2011
2) Xiang Wang Kai Gao and Shashan Zhang, “A Survey
on Information Diffusion in Online Social Network
Model and Method” proceeding on the Hebei
University of Science and Technology 050018, 25
September 2017.
3) Roman Reinche,.“Comparison of Diffusion of Real
and Fake News in Social Network”, Technische
Universitat Kaiserlutern, 02 January 2018.
4) Biao Chang, Tong Xu, Qi Liu and En-Hong Chen,
“Study of Information Diffusion analysis on social
network and its Applications”,International journal
on Automation and Computing, August 2018,
volume 15, 15 August 2018.
5) Mohammad Salehan and Dan J, Kim, “The effect of
sentiment on information diffusion on social
media”, Twenty-first Americas Conference on
Information Systems, Puerto Rico, 2015.
6) Io Taxidou, “Real time Analysis of Information
Diffusion in Social media”, for international journal,
2014.
7) Reza Zafarani, Mohammad Ali Abbasi, Huan Liu,
“Information Diffusion in Social Media”, Cambridge
University press, 20 April 2014.
8) Jaewon Yang, Jure Leskovec, “ModelingInformation
Diffusion in implicit network”, Stenford University,
2017.
9) Valerio Arnaboldi, Marco Conti, Andrea Passarella,
Robin LM, “Online Social network and Information
Diffusion” universiry of oxford, 15 feb 2017.
10) Chunxaio Jiang, Yan Chen, K.J. Ray Lue,
“Evolutionary Dynamics of Information Diffusion
Over Social Network”, IEEE transactions on signal
processing, vol. 64, No.17, 1 September 2014.

Contenu connexe

Tendances

IRJET - Fake News Detection: A Survey
IRJET -  	  Fake News Detection: A SurveyIRJET -  	  Fake News Detection: A Survey
IRJET - Fake News Detection: A SurveyIRJET Journal
 
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017Rohit Desai
 
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...IRJET- Identification of Prevalent News from Twitter and Traditional Media us...
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...IRJET Journal
 
IRJET- Detecting Fake News
IRJET- Detecting Fake NewsIRJET- Detecting Fake News
IRJET- Detecting Fake NewsIRJET Journal
 
IRJET - Fake News Detection using Machine Learning
IRJET -  	  Fake News Detection using Machine LearningIRJET -  	  Fake News Detection using Machine Learning
IRJET - Fake News Detection using Machine LearningIRJET Journal
 
IRJET- Fake Profile Identification using Machine Learning
IRJET-  	  Fake Profile Identification using Machine LearningIRJET-  	  Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine LearningIRJET Journal
 
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...IRJET Journal
 
IRJET - Election Result Prediction using Sentiment Analysis
IRJET - Election Result Prediction using Sentiment AnalysisIRJET - Election Result Prediction using Sentiment Analysis
IRJET - Election Result Prediction using Sentiment AnalysisIRJET Journal
 
IRJET- Fake News Detection
IRJET- Fake News DetectionIRJET- Fake News Detection
IRJET- Fake News DetectionIRJET Journal
 
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...IRJET Journal
 
IRJET - Detection of Drug Abuse using Social Media Mining
IRJET - Detection of Drug Abuse using Social Media MiningIRJET - Detection of Drug Abuse using Social Media Mining
IRJET - Detection of Drug Abuse using Social Media MiningIRJET Journal
 
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster WarningIRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster WarningIRJET Journal
 
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET Journal
 
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITY
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITYFRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITY
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITYcscpconf
 
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET Journal
 
Final Poster for Engineering Showcase
Final Poster for Engineering ShowcaseFinal Poster for Engineering Showcase
Final Poster for Engineering ShowcaseTucker Truesdale
 
Data mining on Social Media
Data mining on Social MediaData mining on Social Media
Data mining on Social Mediahome
 
Analyzing-Threat-Levels-of-Extremists-using-Tweets
Analyzing-Threat-Levels-of-Extremists-using-TweetsAnalyzing-Threat-Levels-of-Extremists-using-Tweets
Analyzing-Threat-Levels-of-Extremists-using-TweetsRESHAN FARAZ
 
Twitter Based Election Prediction and Analysis
Twitter Based Election Prediction and AnalysisTwitter Based Election Prediction and Analysis
Twitter Based Election Prediction and AnalysisIRJET Journal
 

Tendances (20)

IRJET - Fake News Detection: A Survey
IRJET -  	  Fake News Detection: A SurveyIRJET -  	  Fake News Detection: A Survey
IRJET - Fake News Detection: A Survey
 
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017
 
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...IRJET- Identification of Prevalent News from Twitter and Traditional Media us...
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...
 
IRJET- Detecting Fake News
IRJET- Detecting Fake NewsIRJET- Detecting Fake News
IRJET- Detecting Fake News
 
IRJET - Fake News Detection using Machine Learning
IRJET -  	  Fake News Detection using Machine LearningIRJET -  	  Fake News Detection using Machine Learning
IRJET - Fake News Detection using Machine Learning
 
IRJET- Fake Profile Identification using Machine Learning
IRJET-  	  Fake Profile Identification using Machine LearningIRJET-  	  Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
 
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...
 
IRJET - Election Result Prediction using Sentiment Analysis
IRJET - Election Result Prediction using Sentiment AnalysisIRJET - Election Result Prediction using Sentiment Analysis
IRJET - Election Result Prediction using Sentiment Analysis
 
IRJET- Fake News Detection
IRJET- Fake News DetectionIRJET- Fake News Detection
IRJET- Fake News Detection
 
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
 
IRJET - Detection of Drug Abuse using Social Media Mining
IRJET - Detection of Drug Abuse using Social Media MiningIRJET - Detection of Drug Abuse using Social Media Mining
IRJET - Detection of Drug Abuse using Social Media Mining
 
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster WarningIRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster Warning
 
nm
nmnm
nm
 
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
 
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITY
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITYFRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITY
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITY
 
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
 
Final Poster for Engineering Showcase
Final Poster for Engineering ShowcaseFinal Poster for Engineering Showcase
Final Poster for Engineering Showcase
 
Data mining on Social Media
Data mining on Social MediaData mining on Social Media
Data mining on Social Media
 
Analyzing-Threat-Levels-of-Extremists-using-Tweets
Analyzing-Threat-Levels-of-Extremists-using-TweetsAnalyzing-Threat-Levels-of-Extremists-using-Tweets
Analyzing-Threat-Levels-of-Extremists-using-Tweets
 
Twitter Based Election Prediction and Analysis
Twitter Based Election Prediction and AnalysisTwitter Based Election Prediction and Analysis
Twitter Based Election Prediction and Analysis
 

Similaire à IRJET- Big Data Driven Information Diffusion Analytics and Control on Social Network

Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningIRJET Journal
 
Detection of Fake News Using Machine Learning
Detection of Fake News Using Machine LearningDetection of Fake News Using Machine Learning
Detection of Fake News Using Machine LearningIRJET Journal
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...ijtsrd
 
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...IRJET Journal
 
IRJET- Fake Message Deduction using Machine Learining
IRJET- Fake Message Deduction using Machine LeariningIRJET- Fake Message Deduction using Machine Learining
IRJET- Fake Message Deduction using Machine LeariningIRJET Journal
 
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)paperpublications3
 
Fake News Detection Using Machine Learning
Fake News Detection Using Machine LearningFake News Detection Using Machine Learning
Fake News Detection Using Machine LearningIRJET Journal
 
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNINGSENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNINGIRJET Journal
 
Detection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social NetworkDetection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social NetworkIRJET Journal
 
IRJET- A Survey on Mining of Tweeter Data for Predicting User Behavior
IRJET- A Survey on Mining of Tweeter Data for Predicting User BehaviorIRJET- A Survey on Mining of Tweeter Data for Predicting User Behavior
IRJET- A Survey on Mining of Tweeter Data for Predicting User BehaviorIRJET Journal
 
IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET-  	  Improved Real-Time Twitter Sentiment Analysis using ML & Word2VecIRJET-  	  Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2VecIRJET Journal
 
IRJET- Analytic System Based on Prediction Analysis of Social Emotions from U...
IRJET- Analytic System Based on Prediction Analysis of Social Emotions from U...IRJET- Analytic System Based on Prediction Analysis of Social Emotions from U...
IRJET- Analytic System Based on Prediction Analysis of Social Emotions from U...IRJET Journal
 
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET Journal
 
Spammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social NetworksSpammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social NetworksIRJET Journal
 
Fake News and Message Detection
Fake News and Message DetectionFake News and Message Detection
Fake News and Message DetectionIRJET Journal
 
IRJET- Trend Analysis on Twitter
IRJET- Trend Analysis on TwitterIRJET- Trend Analysis on Twitter
IRJET- Trend Analysis on TwitterIRJET Journal
 
Trustworthy Sensing for Public Safety in Cloud Centric Things of Internet wit...
Trustworthy Sensing for Public Safety in Cloud Centric Things of Internet wit...Trustworthy Sensing for Public Safety in Cloud Centric Things of Internet wit...
Trustworthy Sensing for Public Safety in Cloud Centric Things of Internet wit...RSIS International
 
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Editor IJAIEM
 
Knime social media_white_paper
Knime social media_white_paperKnime social media_white_paper
Knime social media_white_paperFiras Husseini
 
IRJET - Suicidal Text Detection using Machine Learning
IRJET -  	  Suicidal Text Detection using Machine LearningIRJET -  	  Suicidal Text Detection using Machine Learning
IRJET - Suicidal Text Detection using Machine LearningIRJET Journal
 

Similaire à IRJET- Big Data Driven Information Diffusion Analytics and Control on Social Network (20)

Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
 
Detection of Fake News Using Machine Learning
Detection of Fake News Using Machine LearningDetection of Fake News Using Machine Learning
Detection of Fake News Using Machine Learning
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
 
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
 
IRJET- Fake Message Deduction using Machine Learining
IRJET- Fake Message Deduction using Machine LeariningIRJET- Fake Message Deduction using Machine Learining
IRJET- Fake Message Deduction using Machine Learining
 
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
 
Fake News Detection Using Machine Learning
Fake News Detection Using Machine LearningFake News Detection Using Machine Learning
Fake News Detection Using Machine Learning
 
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNINGSENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
 
Detection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social NetworkDetection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social Network
 
IRJET- A Survey on Mining of Tweeter Data for Predicting User Behavior
IRJET- A Survey on Mining of Tweeter Data for Predicting User BehaviorIRJET- A Survey on Mining of Tweeter Data for Predicting User Behavior
IRJET- A Survey on Mining of Tweeter Data for Predicting User Behavior
 
IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET-  	  Improved Real-Time Twitter Sentiment Analysis using ML & Word2VecIRJET-  	  Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
 
IRJET- Analytic System Based on Prediction Analysis of Social Emotions from U...
IRJET- Analytic System Based on Prediction Analysis of Social Emotions from U...IRJET- Analytic System Based on Prediction Analysis of Social Emotions from U...
IRJET- Analytic System Based on Prediction Analysis of Social Emotions from U...
 
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
 
Spammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social NetworksSpammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social Networks
 
Fake News and Message Detection
Fake News and Message DetectionFake News and Message Detection
Fake News and Message Detection
 
IRJET- Trend Analysis on Twitter
IRJET- Trend Analysis on TwitterIRJET- Trend Analysis on Twitter
IRJET- Trend Analysis on Twitter
 
Trustworthy Sensing for Public Safety in Cloud Centric Things of Internet wit...
Trustworthy Sensing for Public Safety in Cloud Centric Things of Internet wit...Trustworthy Sensing for Public Safety in Cloud Centric Things of Internet wit...
Trustworthy Sensing for Public Safety in Cloud Centric Things of Internet wit...
 
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
 
Knime social media_white_paper
Knime social media_white_paperKnime social media_white_paper
Knime social media_white_paper
 
IRJET - Suicidal Text Detection using Machine Learning
IRJET -  	  Suicidal Text Detection using Machine LearningIRJET -  	  Suicidal Text Detection using Machine Learning
IRJET - Suicidal Text Detection using Machine Learning
 

Plus de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Plus de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Dernier

Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 

Dernier (20)

Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 

IRJET- Big Data Driven Information Diffusion Analytics and Control on Social Network

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1922 Big Data Driven Information Diffusion Analytics and Control on Social Network Prof. Mahvash Khan1, Miss. Kalyani Balapure2, Miss. Shweta Kalambe3, Miss. Nikita Shembekar4, Miss. Ankita Tiple5 1Professor, Dept. of Computer Science and Engineering, Nagpur Institute of Technology, Nagpur, Maharashtra, India 2,3,4,5Student, Dept. of Computer Science and Engineering, Nagpur Institute of Technology, Nagpur, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - In this paper, we are dealing with information diffusion on social media and control over it. Now a day’s social media becomes most popular way to express the thoughts so that social media becomes important part of people’s daily routine. They invest most of time on social media. Usually people post their news whichgetsreplicatedby their followers and friends on social media. Such postcontains blogs, images, text messages and so these information gets diffused day by day however they don’t know about the news truth which they are reposting. If the news is fake, then also it gets reposted by people such scenario can cause misunderstanding on people’s mind they follow that news. News may be in support of something or may be in against of something or it may be related to the political parties’ promotions. In such cases they misuse the people views and reaction on that news to make in favor of them. So it may lead to create big fight in opposition parties. Also this can create a difference between hearts of the people belonging to different religions. To abolish such things, we have implemented this paper. In this paper we have given solution implemented by applying some techniques and methods. Key Words: Information Diffusion, sentiment analysis, naïve Bayes, Deep Learning, Linear Regression, GBTs, SVM, Diffusion Control 1. INTRODUCTION This paper presents the work related to the control on diffused information. The proposed approach includes extraction of data then find out the diffused then perform sentiment-analysis on the diffused information then control the over the fake information which is spreading as fast as over the social media. The proposed system consists two parts which are explained as below: In first part, a web application, publicly are accessible through any modern browser. It will contain links to each of the dynamic real-time sentiment visualizations, as well as a search page where the user can enter a custom topic, and fresh tweets will be fetched, analyzed and rendered. In Second part, a series of open source package do specific tasks (including the sentiment-analysis module, a fetch-tweets module, Geo-lookup etc.) Each of these will be tested, documented and then publicly published for other developers to make use of. For the second part, among all data some of the diffused data will be detected and we will control on diffused data by using some techniques. So that this diffused fake data will not get propagated. Different experimentations are carried out. A database is extracted, diffused data is identified and also we will get control on diffused unwanted information by using some techniques and methodology. 1.1 Information Diffusion: Every Information diffusion begins from specific source nodes. Let, suppose that Sara Ali Khan isa Bollywoodactress promotes her movie on social media such as twitter. It may lead to take place great conversation among her fan following, and thus she is the source to startthisinformation diffusion. Every propagator able to retrieve the data fromits alongside. In previous instance Rima is a fan of Sara AliKhan then she can only read Sara’s posts and her follower’s posts on her post [4]. Opine of fans on social media may be dependent on piloted situation, and social media gives a platform for people to convey their thoughts. The propagation of informatics that affects some contents can cause large consequences on our society [2]. It is accentuation to abolished the real world hypothesize since we wanted to measure information diffusion of genuine and not genuine news, which consists each diffusion beginner that accumulate data would available for us. Thus, it idealistic to remove from consideration exterior personal belonging of information diffusion through terminologies [3]. 1.2 Diffusion Control: The increasing vogue of the online social media doesn’t mean that it is secure and reliable. On the conflict, the virus diverse and theconfidential informationdiffusionhavemade it being an enormous headache for IT adminsandpeople[4]. For example, “KooFace” is a Trojan Worm on Facebook, which diverse by leaving a comment on profile pages of the victim’s colleague to catch a click on the maliciouslink .Most of system admins tensed that their workers will repost very much confidential informationonline.Soastimepassesby,it being more and more accentuate and urgent to control the virus diverse and the confidential information diffusion in
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1923 online social media. In social media there is huge amount of information are getting propagated. In this information it contains fake information as well as truthful information. In this chapter we are controlling diffused fake information by using parameters as source of the information i.e. by whom this information is spreading or who has posted this information. According to this we will decide the news is trustworthy or not. So, we will discardthatinformationfrom the database. Then we will get the truthful or normal information. 2. Literature Review:  “Weak Ties: Subtle RoleintheInformationDiffusion in Online Social Networks”:Thispaperpresentsthat weak ties play a fine role in the information diffusion in online social media. On one hand, they play a role of aqueduct,whichlink scheduledgroups and snap through the catching of information in local areas. On the other hand, selecting weak ties advantageous to release cannot make the information diffuse speedy in the network. For possible applications, they believe that the weak ties might be of use in the domination of the virus diverse and the confidential information diffusion.  “Information Diffusion in Online Social Networks:A Survey”: In this paper they provide programs for collecting twitter data and analysis on data. They observed that real news is diverse faster than fake news on an average as well overall.  “A Survey on Information Diffusion in Online Social Networks: Models and Methods”: The paper presents the evaluation of leader of the topic and from where the news id spreading.  “Real-time Analysis of Information Diffusion in Social Media”: This paper presents that how the information gatesdiffusedonsocial media andgives real-time analysis of information. 3. PROPOSED SYSTEM: Figure shows the schematic overview of the proposed approach. The working of the proposed approach is divided into three main steps, extraction of database from social media, identifying diffused data andnormal data andcontrol on diffused data. Fig: data flow diagram of data driven information diffusion analytics and control in social network 4. METHODOLOGY There are many algorithms and methods used in practice to progress sentiment analysis systems: Hybrid, Rule-Based and Automatic. Rule-based systems incorporate a set of manually crafted rules to Perform sentiment analysis.These rules generally use a variation of inputs, classic Natural Language Processing techniques and terminologies. An example of how to develop Rule-based system is to first define a list of separated words, second is to count the number of positive words and negative words from input, final is to check if the amount of positive word appearances is greater than negative word appearances, if true, then return positive sentiment else return negative. Automatic systems use a Machine Learning thinker, exist on it text as input and return the similar classification: positive,negative or neutral (if polarity analysis is performed). The Machine Learning Classifier is implemented in typically two phases:  The first phase involves training our model to associate input (text) to corresponding output (label or tag), which are based on test samples used for training. The connection for this process includes sending the input through a feature extraction that moves text input into a feature vector. The feature vectors go through a queue and pairs of both feature vectors and labels (positive, negative or neutral sentiment) are fed into the machine learning algorithm to create the model.  The final phase involves prediction of sentiment score for random input. The data pipeline consists of sending raw input data through a feature extractor to be transformed into a feature vector, which is then fed to the model togeneratepredicted labels, such as positive, negative or neutral. Common Machine Learning Algorithms that can be used in text classificationincludeLinearRegression,
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1924 Naive Bayes, Deep Learning, Support Vector Machines and Gradient Boosted Trees (GBTs).  Gradient Boosted Trees(GBTs):trainsa sequenceof decision trees to build the classificationmodel,uses the current group of feature vectors to predict the polarity of the label, as like negative, neutral or positive of each training instance and finally compares the prediction against the true label.  Deep Learning: tries to imitate how the human brain functions by using artificial neural networks to process data. Sentiment analysis can be implemented to classify text in two ways, the first way is to use supervised learning if there is enough training data, else use unsupervised training followed by a supervised classifier to train a deep neural network model. Deep learning neural networks used for building sentiment classification models include recurrent neural networks, paragraph vectors, word2vec, recursive neural networks, etc.  Support Vector Machines: are non-probabilistic models that shows text examples as points in a multidimensional space. These text examples are categorizing in different ways, such as sentiments: happy or sad, angry or pleased, etc. These categories belong to distinct regions of that multidimensional space. New texts are mapped to the same space and predicted to belong to a certain category.  Linear Regression: is an algorithm used in statistics and machine learning to predict some value (Y) given the set of features (X).  Naive Bayes: are set of supervisedmachinelearning algorithms that use Bayes’ theorem to predict category of text. 5. FUTURE SCOPE In this accentuate future scope is that we can provide a service to various social networking sites as we are sorting only truthful information on social media.So,wecanprovide this system to company owner and they will makeuseofitto make their user free from fake news. 6. SCREENSHOTS 1. In this screenshot we have written querry byusing querry editor in Hive. 2. fig. shows result of above query which analyses positive and negative ratings of tweets. 3. The below graph is plotted against dictionary. Word and dictionary. Rating which shows positive rating and negative rating of tweet words. 7. APPLICATION This system is used in online social media such as Twitter, Facebook, YouTube etc. The system will provide us the data which consists only truthful data because some operations are performed on data to obtain truthful data on social media. So, users will not get fake information on social media. This system is very important to implement in various social media. 8. CONCLUSIONS Over recent years, a variety of social networks have seen for individuals to keepincontactwithothersconveniently.Huge amounts of data can therefore bebuildsinthesesocial media that can tell us who the very accentuate person is, who a topic leader will be, why an eventuality will spread in a specific way, and other accentuate things. To solve these matter requires multifaceted research that draws on the
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1925 fields of not only computer science, but also sociology, psychology, economics, and others. We experimented with a set of tweets and a set of news media articles. For example, we detectedinfluencefunctions of many websites and identify that they very based on the type of the website and the topic of the information. Moreover, we also perceived that the emulation and newness have a robust `force on the transformation of short document phrases in online news media. As the adoption of short, news-related document phrases become visible to be highly ruled by the influence of the few of media websites, the transformation of Twitter hashtags is ruled by a much larger set of live people, every one of which has relationally less impact. Furthermore, we alsoperceivedthatpeople with the massive fan followers are not the most effective in generated. A specific exciting field for real-time survey is information diffusion, scrutinizing and predicting how information spreads. Research to understand and used information diffusion follows commonly two major directions with little interchange: On the one hand, there are knowledgeable schemas that describe and relatively information flow in social media. In this we have controlled the diffused information from social media and the users will get the truthful information so that it does not cause confusion on people’s mind and their mind will not be distracted on fake things. REFERENCES 1) Divyakant Agrawal,Basssam Bamiech,Ceren Budak,Amr EI Andrew Flanagin, and Patterson“Data-Driven Modelling and Analsis of Online Social Network”for international journal, 17 March 2011 2) Xiang Wang Kai Gao and Shashan Zhang, “A Survey on Information Diffusion in Online Social Network Model and Method” proceeding on the Hebei University of Science and Technology 050018, 25 September 2017. 3) Roman Reinche,.“Comparison of Diffusion of Real and Fake News in Social Network”, Technische Universitat Kaiserlutern, 02 January 2018. 4) Biao Chang, Tong Xu, Qi Liu and En-Hong Chen, “Study of Information Diffusion analysis on social network and its Applications”,International journal on Automation and Computing, August 2018, volume 15, 15 August 2018. 5) Mohammad Salehan and Dan J, Kim, “The effect of sentiment on information diffusion on social media”, Twenty-first Americas Conference on Information Systems, Puerto Rico, 2015. 6) Io Taxidou, “Real time Analysis of Information Diffusion in Social media”, for international journal, 2014. 7) Reza Zafarani, Mohammad Ali Abbasi, Huan Liu, “Information Diffusion in Social Media”, Cambridge University press, 20 April 2014. 8) Jaewon Yang, Jure Leskovec, “ModelingInformation Diffusion in implicit network”, Stenford University, 2017. 9) Valerio Arnaboldi, Marco Conti, Andrea Passarella, Robin LM, “Online Social network and Information Diffusion” universiry of oxford, 15 feb 2017. 10) Chunxaio Jiang, Yan Chen, K.J. Ray Lue, “Evolutionary Dynamics of Information Diffusion Over Social Network”, IEEE transactions on signal processing, vol. 64, No.17, 1 September 2014.