Soumettre la recherche
Mettre en ligne
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social Network
•
0 j'aime
•
41 vues
IRJET Journal
Suivre
https://www.irjet.net/archives/V6/i3/IRJET-V6I3367.pdf
Lire moins
Lire la suite
Ingénierie
Signaler
Partager
Signaler
Partager
1 sur 4
Télécharger maintenant
Télécharger pour lire hors ligne
Recommandé
IRJET- Authentic News Summarization
IRJET- Authentic News Summarization
IRJET Journal
IRJET- Twitter Spammer Detection
IRJET- Twitter Spammer Detection
IRJET Journal
FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT
VaishaliSrigadhi
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
ijcsit
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET Journal
Usability Review of Mashup Tools
Usability Review of Mashup Tools
Tanya Ahmed
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORK
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORK
IAEME Publication
Seminar Report Mine
Seminar Report Mine
sachin narang
Recommandé
IRJET- Authentic News Summarization
IRJET- Authentic News Summarization
IRJET Journal
IRJET- Twitter Spammer Detection
IRJET- Twitter Spammer Detection
IRJET Journal
FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT
VaishaliSrigadhi
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
ijcsit
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET Journal
Usability Review of Mashup Tools
Usability Review of Mashup Tools
Tanya Ahmed
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORK
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORK
IAEME Publication
Seminar Report Mine
Seminar Report Mine
sachin narang
IRJET - Fake News Detection: A Survey
IRJET - Fake News Detection: A Survey
IRJET Journal
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017
Rohit Desai
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...
IRJET Journal
IRJET- Detecting Fake News
IRJET- Detecting Fake News
IRJET Journal
IRJET - Fake News Detection using Machine Learning
IRJET - Fake News Detection using Machine Learning
IRJET Journal
IRJET- Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
IRJET Journal
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET Journal
IRJET - Election Result Prediction using Sentiment Analysis
IRJET - Election Result Prediction using Sentiment Analysis
IRJET Journal
IRJET- Fake News Detection
IRJET- Fake News Detection
IRJET Journal
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
IRJET Journal
IRJET - Detection of Drug Abuse using Social Media Mining
IRJET - Detection of Drug Abuse using Social Media Mining
IRJET Journal
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET Journal
nm
nm
Zainab Nayyar
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET Journal
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITY
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITY
cscpconf
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET Journal
Final Poster for Engineering Showcase
Final Poster for Engineering Showcase
Tucker Truesdale
Data mining on Social Media
Data mining on Social Media
home
Analyzing-Threat-Levels-of-Extremists-using-Tweets
Analyzing-Threat-Levels-of-Extremists-using-Tweets
RESHAN FARAZ
Twitter Based Election Prediction and Analysis
Twitter Based Election Prediction and Analysis
IRJET Journal
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
IRJET Journal
Detection of Fake News Using Machine Learning
Detection of Fake News Using Machine Learning
IRJET Journal
Contenu connexe
Tendances
IRJET - Fake News Detection: A Survey
IRJET - Fake News Detection: A Survey
IRJET Journal
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017
Rohit Desai
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...
IRJET Journal
IRJET- Detecting Fake News
IRJET- Detecting Fake News
IRJET Journal
IRJET - Fake News Detection using Machine Learning
IRJET - Fake News Detection using Machine Learning
IRJET Journal
IRJET- Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
IRJET Journal
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET Journal
IRJET - Election Result Prediction using Sentiment Analysis
IRJET - Election Result Prediction using Sentiment Analysis
IRJET Journal
IRJET- Fake News Detection
IRJET- Fake News Detection
IRJET Journal
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
IRJET Journal
IRJET - Detection of Drug Abuse using Social Media Mining
IRJET - Detection of Drug Abuse using Social Media Mining
IRJET Journal
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET Journal
nm
nm
Zainab Nayyar
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET Journal
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITY
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITY
cscpconf
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET Journal
Final Poster for Engineering Showcase
Final Poster for Engineering Showcase
Tucker Truesdale
Data mining on Social Media
Data mining on Social Media
home
Analyzing-Threat-Levels-of-Extremists-using-Tweets
Analyzing-Threat-Levels-of-Extremists-using-Tweets
RESHAN FARAZ
Twitter Based Election Prediction and Analysis
Twitter Based Election Prediction and Analysis
IRJET Journal
Tendances
(20)
IRJET - Fake News Detection: A Survey
IRJET - Fake News Detection: A Survey
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...
IRJET- Detecting Fake News
IRJET- Detecting Fake News
IRJET - Fake News Detection using Machine Learning
IRJET - Fake News Detection using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET - Election Result Prediction using Sentiment Analysis
IRJET - Election Result Prediction using Sentiment Analysis
IRJET- Fake News Detection
IRJET- Fake News Detection
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
IRJET - Detection of Drug Abuse using Social Media Mining
IRJET - Detection of Drug Abuse using Social Media Mining
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster Warning
nm
nm
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITY
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITY
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
Final Poster for Engineering Showcase
Final Poster for Engineering Showcase
Data mining on Social Media
Data mining on Social Media
Analyzing-Threat-Levels-of-Extremists-using-Tweets
Analyzing-Threat-Levels-of-Extremists-using-Tweets
Twitter Based Election Prediction and Analysis
Twitter Based Election Prediction and Analysis
Similaire à IRJET- Big Data Driven Information Diffusion Analytics and Control on Social Network
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
IRJET Journal
Detection of Fake News Using Machine Learning
Detection of Fake News Using Machine Learning
IRJET Journal
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
ijtsrd
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET Journal
IRJET- Fake Message Deduction using Machine Learining
IRJET- Fake Message Deduction using Machine Learining
IRJET Journal
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
paperpublications3
Fake News Detection Using Machine Learning
Fake News Detection Using Machine Learning
IRJET Journal
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
IRJET Journal
Detection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social Network
IRJET Journal
IRJET- A Survey on Mining of Tweeter Data for Predicting User Behavior
IRJET- A Survey on Mining of Tweeter Data for Predicting User Behavior
IRJET Journal
IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET Journal
IRJET- Analytic System Based on Prediction Analysis of Social Emotions from U...
IRJET- Analytic System Based on Prediction Analysis of Social Emotions from U...
IRJET Journal
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET Journal
Spammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social Networks
IRJET Journal
Fake News and Message Detection
Fake News and Message Detection
IRJET Journal
IRJET- Trend Analysis on Twitter
IRJET- Trend Analysis on Twitter
IRJET Journal
Trustworthy Sensing for Public Safety in Cloud Centric Things of Internet wit...
Trustworthy Sensing for Public Safety in Cloud Centric Things of Internet wit...
RSIS International
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Editor IJAIEM
Knime social media_white_paper
Knime social media_white_paper
Firas Husseini
IRJET - Suicidal Text Detection using Machine Learning
IRJET - Suicidal Text Detection using Machine Learning
IRJET Journal
Similaire à IRJET- Big Data Driven Information Diffusion Analytics and Control on Social Network
(20)
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
Detection of Fake News Using Machine Learning
Detection of Fake News Using Machine Learning
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Fake Message Deduction using Machine Learining
IRJET- Fake Message Deduction using Machine Learining
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Fake News Detection Using Machine Learning
Fake News Detection Using Machine Learning
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
Detection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social Network
IRJET- A Survey on Mining of Tweeter Data for Predicting User Behavior
IRJET- A Survey on Mining of Tweeter Data for Predicting User Behavior
IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET- Analytic System Based on Prediction Analysis of Social Emotions from U...
IRJET- Analytic System Based on Prediction Analysis of Social Emotions from U...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
Spammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social Networks
Fake News and Message Detection
Fake News and Message Detection
IRJET- Trend Analysis on Twitter
IRJET- Trend Analysis on Twitter
Trustworthy Sensing for Public Safety in Cloud Centric Things of Internet wit...
Trustworthy Sensing for Public Safety in Cloud Centric Things of Internet wit...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Knime social media_white_paper
Knime social media_white_paper
IRJET - Suicidal Text Detection using Machine Learning
IRJET - Suicidal Text Detection using Machine Learning
Plus de IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Plus de IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Dernier
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
ranjana rawat
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
pranjaldaimarysona
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
ssuser5c9d4b1
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
sanyuktamishra911
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
RajkumarAkumalla
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Call Girls in Nagpur High Profile
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Suman Mia
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
roncy bisnoi
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
Dernier
(20)
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social Network
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1922 Big Data Driven Information Diffusion Analytics and Control on Social Network Prof. Mahvash Khan1, Miss. Kalyani Balapure2, Miss. Shweta Kalambe3, Miss. Nikita Shembekar4, Miss. Ankita Tiple5 1Professor, Dept. of Computer Science and Engineering, Nagpur Institute of Technology, Nagpur, Maharashtra, India 2,3,4,5Student, Dept. of Computer Science and Engineering, Nagpur Institute of Technology, Nagpur, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - In this paper, we are dealing with information diffusion on social media and control over it. Now a day’s social media becomes most popular way to express the thoughts so that social media becomes important part of people’s daily routine. They invest most of time on social media. Usually people post their news whichgetsreplicatedby their followers and friends on social media. Such postcontains blogs, images, text messages and so these information gets diffused day by day however they don’t know about the news truth which they are reposting. If the news is fake, then also it gets reposted by people such scenario can cause misunderstanding on people’s mind they follow that news. News may be in support of something or may be in against of something or it may be related to the political parties’ promotions. In such cases they misuse the people views and reaction on that news to make in favor of them. So it may lead to create big fight in opposition parties. Also this can create a difference between hearts of the people belonging to different religions. To abolish such things, we have implemented this paper. In this paper we have given solution implemented by applying some techniques and methods. Key Words: Information Diffusion, sentiment analysis, naïve Bayes, Deep Learning, Linear Regression, GBTs, SVM, Diffusion Control 1. INTRODUCTION This paper presents the work related to the control on diffused information. The proposed approach includes extraction of data then find out the diffused then perform sentiment-analysis on the diffused information then control the over the fake information which is spreading as fast as over the social media. The proposed system consists two parts which are explained as below: In first part, a web application, publicly are accessible through any modern browser. It will contain links to each of the dynamic real-time sentiment visualizations, as well as a search page where the user can enter a custom topic, and fresh tweets will be fetched, analyzed and rendered. In Second part, a series of open source package do specific tasks (including the sentiment-analysis module, a fetch-tweets module, Geo-lookup etc.) Each of these will be tested, documented and then publicly published for other developers to make use of. For the second part, among all data some of the diffused data will be detected and we will control on diffused data by using some techniques. So that this diffused fake data will not get propagated. Different experimentations are carried out. A database is extracted, diffused data is identified and also we will get control on diffused unwanted information by using some techniques and methodology. 1.1 Information Diffusion: Every Information diffusion begins from specific source nodes. Let, suppose that Sara Ali Khan isa Bollywoodactress promotes her movie on social media such as twitter. It may lead to take place great conversation among her fan following, and thus she is the source to startthisinformation diffusion. Every propagator able to retrieve the data fromits alongside. In previous instance Rima is a fan of Sara AliKhan then she can only read Sara’s posts and her follower’s posts on her post [4]. Opine of fans on social media may be dependent on piloted situation, and social media gives a platform for people to convey their thoughts. The propagation of informatics that affects some contents can cause large consequences on our society [2]. It is accentuation to abolished the real world hypothesize since we wanted to measure information diffusion of genuine and not genuine news, which consists each diffusion beginner that accumulate data would available for us. Thus, it idealistic to remove from consideration exterior personal belonging of information diffusion through terminologies [3]. 1.2 Diffusion Control: The increasing vogue of the online social media doesn’t mean that it is secure and reliable. On the conflict, the virus diverse and theconfidential informationdiffusionhavemade it being an enormous headache for IT adminsandpeople[4]. For example, “KooFace” is a Trojan Worm on Facebook, which diverse by leaving a comment on profile pages of the victim’s colleague to catch a click on the maliciouslink .Most of system admins tensed that their workers will repost very much confidential informationonline.Soastimepassesby,it being more and more accentuate and urgent to control the virus diverse and the confidential information diffusion in
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1923 online social media. In social media there is huge amount of information are getting propagated. In this information it contains fake information as well as truthful information. In this chapter we are controlling diffused fake information by using parameters as source of the information i.e. by whom this information is spreading or who has posted this information. According to this we will decide the news is trustworthy or not. So, we will discardthatinformationfrom the database. Then we will get the truthful or normal information. 2. Literature Review: “Weak Ties: Subtle RoleintheInformationDiffusion in Online Social Networks”:Thispaperpresentsthat weak ties play a fine role in the information diffusion in online social media. On one hand, they play a role of aqueduct,whichlink scheduledgroups and snap through the catching of information in local areas. On the other hand, selecting weak ties advantageous to release cannot make the information diffuse speedy in the network. For possible applications, they believe that the weak ties might be of use in the domination of the virus diverse and the confidential information diffusion. “Information Diffusion in Online Social Networks:A Survey”: In this paper they provide programs for collecting twitter data and analysis on data. They observed that real news is diverse faster than fake news on an average as well overall. “A Survey on Information Diffusion in Online Social Networks: Models and Methods”: The paper presents the evaluation of leader of the topic and from where the news id spreading. “Real-time Analysis of Information Diffusion in Social Media”: This paper presents that how the information gatesdiffusedonsocial media andgives real-time analysis of information. 3. PROPOSED SYSTEM: Figure shows the schematic overview of the proposed approach. The working of the proposed approach is divided into three main steps, extraction of database from social media, identifying diffused data andnormal data andcontrol on diffused data. Fig: data flow diagram of data driven information diffusion analytics and control in social network 4. METHODOLOGY There are many algorithms and methods used in practice to progress sentiment analysis systems: Hybrid, Rule-Based and Automatic. Rule-based systems incorporate a set of manually crafted rules to Perform sentiment analysis.These rules generally use a variation of inputs, classic Natural Language Processing techniques and terminologies. An example of how to develop Rule-based system is to first define a list of separated words, second is to count the number of positive words and negative words from input, final is to check if the amount of positive word appearances is greater than negative word appearances, if true, then return positive sentiment else return negative. Automatic systems use a Machine Learning thinker, exist on it text as input and return the similar classification: positive,negative or neutral (if polarity analysis is performed). The Machine Learning Classifier is implemented in typically two phases: The first phase involves training our model to associate input (text) to corresponding output (label or tag), which are based on test samples used for training. The connection for this process includes sending the input through a feature extraction that moves text input into a feature vector. The feature vectors go through a queue and pairs of both feature vectors and labels (positive, negative or neutral sentiment) are fed into the machine learning algorithm to create the model. The final phase involves prediction of sentiment score for random input. The data pipeline consists of sending raw input data through a feature extractor to be transformed into a feature vector, which is then fed to the model togeneratepredicted labels, such as positive, negative or neutral. Common Machine Learning Algorithms that can be used in text classificationincludeLinearRegression,
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1924 Naive Bayes, Deep Learning, Support Vector Machines and Gradient Boosted Trees (GBTs). Gradient Boosted Trees(GBTs):trainsa sequenceof decision trees to build the classificationmodel,uses the current group of feature vectors to predict the polarity of the label, as like negative, neutral or positive of each training instance and finally compares the prediction against the true label. Deep Learning: tries to imitate how the human brain functions by using artificial neural networks to process data. Sentiment analysis can be implemented to classify text in two ways, the first way is to use supervised learning if there is enough training data, else use unsupervised training followed by a supervised classifier to train a deep neural network model. Deep learning neural networks used for building sentiment classification models include recurrent neural networks, paragraph vectors, word2vec, recursive neural networks, etc. Support Vector Machines: are non-probabilistic models that shows text examples as points in a multidimensional space. These text examples are categorizing in different ways, such as sentiments: happy or sad, angry or pleased, etc. These categories belong to distinct regions of that multidimensional space. New texts are mapped to the same space and predicted to belong to a certain category. Linear Regression: is an algorithm used in statistics and machine learning to predict some value (Y) given the set of features (X). Naive Bayes: are set of supervisedmachinelearning algorithms that use Bayes’ theorem to predict category of text. 5. FUTURE SCOPE In this accentuate future scope is that we can provide a service to various social networking sites as we are sorting only truthful information on social media.So,wecanprovide this system to company owner and they will makeuseofitto make their user free from fake news. 6. SCREENSHOTS 1. In this screenshot we have written querry byusing querry editor in Hive. 2. fig. shows result of above query which analyses positive and negative ratings of tweets. 3. The below graph is plotted against dictionary. Word and dictionary. Rating which shows positive rating and negative rating of tweet words. 7. APPLICATION This system is used in online social media such as Twitter, Facebook, YouTube etc. The system will provide us the data which consists only truthful data because some operations are performed on data to obtain truthful data on social media. So, users will not get fake information on social media. This system is very important to implement in various social media. 8. CONCLUSIONS Over recent years, a variety of social networks have seen for individuals to keepincontactwithothersconveniently.Huge amounts of data can therefore bebuildsinthesesocial media that can tell us who the very accentuate person is, who a topic leader will be, why an eventuality will spread in a specific way, and other accentuate things. To solve these matter requires multifaceted research that draws on the
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1925 fields of not only computer science, but also sociology, psychology, economics, and others. We experimented with a set of tweets and a set of news media articles. For example, we detectedinfluencefunctions of many websites and identify that they very based on the type of the website and the topic of the information. Moreover, we also perceived that the emulation and newness have a robust `force on the transformation of short document phrases in online news media. As the adoption of short, news-related document phrases become visible to be highly ruled by the influence of the few of media websites, the transformation of Twitter hashtags is ruled by a much larger set of live people, every one of which has relationally less impact. Furthermore, we alsoperceivedthatpeople with the massive fan followers are not the most effective in generated. A specific exciting field for real-time survey is information diffusion, scrutinizing and predicting how information spreads. Research to understand and used information diffusion follows commonly two major directions with little interchange: On the one hand, there are knowledgeable schemas that describe and relatively information flow in social media. In this we have controlled the diffused information from social media and the users will get the truthful information so that it does not cause confusion on people’s mind and their mind will not be distracted on fake things. REFERENCES 1) Divyakant Agrawal,Basssam Bamiech,Ceren Budak,Amr EI Andrew Flanagin, and Patterson“Data-Driven Modelling and Analsis of Online Social Network”for international journal, 17 March 2011 2) Xiang Wang Kai Gao and Shashan Zhang, “A Survey on Information Diffusion in Online Social Network Model and Method” proceeding on the Hebei University of Science and Technology 050018, 25 September 2017. 3) Roman Reinche,.“Comparison of Diffusion of Real and Fake News in Social Network”, Technische Universitat Kaiserlutern, 02 January 2018. 4) Biao Chang, Tong Xu, Qi Liu and En-Hong Chen, “Study of Information Diffusion analysis on social network and its Applications”,International journal on Automation and Computing, August 2018, volume 15, 15 August 2018. 5) Mohammad Salehan and Dan J, Kim, “The effect of sentiment on information diffusion on social media”, Twenty-first Americas Conference on Information Systems, Puerto Rico, 2015. 6) Io Taxidou, “Real time Analysis of Information Diffusion in Social media”, for international journal, 2014. 7) Reza Zafarani, Mohammad Ali Abbasi, Huan Liu, “Information Diffusion in Social Media”, Cambridge University press, 20 April 2014. 8) Jaewon Yang, Jure Leskovec, “ModelingInformation Diffusion in implicit network”, Stenford University, 2017. 9) Valerio Arnaboldi, Marco Conti, Andrea Passarella, Robin LM, “Online Social network and Information Diffusion” universiry of oxford, 15 feb 2017. 10) Chunxaio Jiang, Yan Chen, K.J. Ray Lue, “Evolutionary Dynamics of Information Diffusion Over Social Network”, IEEE transactions on signal processing, vol. 64, No.17, 1 September 2014.
Télécharger maintenant