Soumettre la recherche
Mettre en ligne
Trend Analysis on Twitter Using LDA Algorithm
•
0 j'aime
•
16 vues
Titre amélioré par l'IA
IRJET Journal
Suivre
https://www.irjet.net/archives/V6/i4/IRJET-V6I4509.pdf
Lire moins
Lire la suite
Ingénierie
Signaler
Partager
Signaler
Partager
1 sur 4
Télécharger maintenant
Télécharger pour lire hors ligne
Recommandé
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
IJNSA Journal
IRJET- Authentic News Summarization
IRJET- Authentic News Summarization
IRJET Journal
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014
Kim Jensen
Review on College Event Organizer
Review on College Event Organizer
IRJET Journal
Factors influncing quality of mobile apps role of mobile app development life...
Factors influncing quality of mobile apps role of mobile app development life...
IJCSEA Journal
Android Application for Updation
Android Application for Updation
IRJET Journal
2013 Mobile Application Security Survey
2013 Mobile Application Security Survey
Bee_Ware
Survey mobile app
Survey mobile app
eSAT Publishing House
Recommandé
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
IJNSA Journal
IRJET- Authentic News Summarization
IRJET- Authentic News Summarization
IRJET Journal
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014
Kim Jensen
Review on College Event Organizer
Review on College Event Organizer
IRJET Journal
Factors influncing quality of mobile apps role of mobile app development life...
Factors influncing quality of mobile apps role of mobile app development life...
IJCSEA Journal
Android Application for Updation
Android Application for Updation
IRJET Journal
2013 Mobile Application Security Survey
2013 Mobile Application Security Survey
Bee_Ware
Survey mobile app
Survey mobile app
eSAT Publishing House
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET Journal
Research Article On Web Application Security
Research Article On Web Application Security
SaadSaif6
Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo.
Luis Noguera
Covert communication in mobile applications
Covert communication in mobile applications
Andrey Apuhtin
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
Lumension
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
ijseajournal
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
Symantec
20120140503012
20120140503012
IAEME Publication
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
IJNSA Journal
Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.
Veracode
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET Journal
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Black Duck by Synopsys
White Paper - Android Security
White Paper - Android Security
ryanfarmer
IRJET- Approaching Highlights and Security issues in Software Engineering...
IRJET- Approaching Highlights and Security issues in Software Engineering...
IRJET Journal
Nolong.in: an android based incident notification application with push notif...
Nolong.in: an android based incident notification application with push notif...
IJECEIAES
Ponemon Institute Research Report
Ponemon Institute Research Report
Peter Tutty
Insightful Research: The State of Mobile Application Insecurity
Insightful Research: The State of Mobile Application Insecurity
Casey Lucas
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
IJCSEIT Journal
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
Eswar Publications
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013
- Mark - Fullbright
IRJET- City Complaint Management System
IRJET- City Complaint Management System
IRJET Journal
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
IJNSA Journal
Contenu connexe
Tendances
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET Journal
Research Article On Web Application Security
Research Article On Web Application Security
SaadSaif6
Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo.
Luis Noguera
Covert communication in mobile applications
Covert communication in mobile applications
Andrey Apuhtin
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
Lumension
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
ijseajournal
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
Symantec
20120140503012
20120140503012
IAEME Publication
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
IJNSA Journal
Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.
Veracode
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET Journal
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Black Duck by Synopsys
White Paper - Android Security
White Paper - Android Security
ryanfarmer
IRJET- Approaching Highlights and Security issues in Software Engineering...
IRJET- Approaching Highlights and Security issues in Software Engineering...
IRJET Journal
Nolong.in: an android based incident notification application with push notif...
Nolong.in: an android based incident notification application with push notif...
IJECEIAES
Ponemon Institute Research Report
Ponemon Institute Research Report
Peter Tutty
Insightful Research: The State of Mobile Application Insecurity
Insightful Research: The State of Mobile Application Insecurity
Casey Lucas
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
IJCSEIT Journal
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
Eswar Publications
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013
- Mark - Fullbright
Tendances
(20)
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
Research Article On Web Application Security
Research Article On Web Application Security
Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo.
Covert communication in mobile applications
Covert communication in mobile applications
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
20120140503012
20120140503012
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
White Paper - Android Security
White Paper - Android Security
IRJET- Approaching Highlights and Security issues in Software Engineering...
IRJET- Approaching Highlights and Security issues in Software Engineering...
Nolong.in: an android based incident notification application with push notif...
Nolong.in: an android based incident notification application with push notif...
Ponemon Institute Research Report
Ponemon Institute Research Report
Insightful Research: The State of Mobile Application Insecurity
Insightful Research: The State of Mobile Application Insecurity
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013
Similaire à Trend Analysis on Twitter Using LDA Algorithm
IRJET- City Complaint Management System
IRJET- City Complaint Management System
IRJET Journal
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
IJNSA Journal
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET Journal
Smart Traffic Monitoring System Report
Smart Traffic Monitoring System Report
ALi Baker
IRJET- Speech and Hearing
IRJET- Speech and Hearing
IRJET Journal
IRJET - Application for Public Issues
IRJET - Application for Public Issues
IRJET Journal
Controlling Anti Ragging System using Android
Controlling Anti Ragging System using Android
IRJET Journal
IRJET- A Social Webbing Service Vivified on Design Patterns
IRJET- A Social Webbing Service Vivified on Design Patterns
IRJET Journal
IRJET - Municipal Corporation Complaint Management System
IRJET - Municipal Corporation Complaint Management System
IRJET Journal
Fake News and Message Detection
Fake News and Message Detection
IRJET Journal
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...
IRJET Journal
IRJET - Analysis of Fake Ranking on Social Media: Twitter
IRJET - Analysis of Fake Ranking on Social Media: Twitter
IRJET Journal
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECAST
IRJET Journal
social networking site
social networking site
Abhishek Ranjan
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET Journal
TWITTER SENTIMENT ANALYSIS
TWITTER SENTIMENT ANALYSIS
IRJET Journal
TWITTER SENTIMENT ANALYSIS
TWITTER SENTIMENT ANALYSIS
IRJET Journal
IRJET- Data Mining and Cluster based Machine Learning in Mobile Online Social...
IRJET- Data Mining and Cluster based Machine Learning in Mobile Online Social...
IRJET Journal
IRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based Approach
IRJET Journal
IRJET - Social Network Message Credibility: An Agent-based Approach
IRJET - Social Network Message Credibility: An Agent-based Approach
IRJET Journal
Similaire à Trend Analysis on Twitter Using LDA Algorithm
(20)
IRJET- City Complaint Management System
IRJET- City Complaint Management System
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster Warning
Smart Traffic Monitoring System Report
Smart Traffic Monitoring System Report
IRJET- Speech and Hearing
IRJET- Speech and Hearing
IRJET - Application for Public Issues
IRJET - Application for Public Issues
Controlling Anti Ragging System using Android
Controlling Anti Ragging System using Android
IRJET- A Social Webbing Service Vivified on Design Patterns
IRJET- A Social Webbing Service Vivified on Design Patterns
IRJET - Municipal Corporation Complaint Management System
IRJET - Municipal Corporation Complaint Management System
Fake News and Message Detection
Fake News and Message Detection
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...
IRJET - Analysis of Fake Ranking on Social Media: Twitter
IRJET - Analysis of Fake Ranking on Social Media: Twitter
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECAST
social networking site
social networking site
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
TWITTER SENTIMENT ANALYSIS
TWITTER SENTIMENT ANALYSIS
TWITTER SENTIMENT ANALYSIS
TWITTER SENTIMENT ANALYSIS
IRJET- Data Mining and Cluster based Machine Learning in Mobile Online Social...
IRJET- Data Mining and Cluster based Machine Learning in Mobile Online Social...
IRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based Approach
IRJET - Social Network Message Credibility: An Agent-based Approach
IRJET - Social Network Message Credibility: An Agent-based Approach
Plus de IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Plus de IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Dernier
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
ssuser5c9d4b1
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
rknatarajan
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
ranjana rawat
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Call Girls in Nagpur High Profile
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Call Girls in Nagpur High Profile
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
M Maged Hegazy, LLM, MBA, CCP, P3O
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
RajaP95
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
sanyuktamishra911
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
pranjaldaimarysona
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
Dernier
(20)
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
Trend Analysis on Twitter Using LDA Algorithm
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2366 TREND ANALYSIS ON TWITTER Mr. Rahul Neve1, Abhishek Singh2, Sundaresh Narayanan3 1Mr. Rahul Neve, Dept of IT, Thakur College of Engineering and Technology, Maharashtra, India 2Abhishek Singh, Dept of IT, Thakur College of Engineering and Technology, Maharashtra, India 3Sundaresh Narayanan, Dept of IT, Thakur College of Engineering and Technology, Maharashtra, India ---------------------------------------------------------------------------***--------------------------------------------------------------------------- ABSTRACT- In social media forums, it is important for public’s perception that an organization is well notify and able to provide services that truly meet their needs and interests. Social media activity by citizens is growing exponentially and there is some evidence that certain government agencies are embracing these engagement, and communication tools, albeit at a far slower pace than other societal sectors. The on-going provocation is that the government generally lacks behind when it comes to adaption of technology tools. Social media tools and social media analytics are no anomaly. While this paper focuses on government organizations, it’s fair to say all federal organization are playing catch up with commonly employed social media communication platforms. The government is even further behind in the area of social media analytics, the cluster of data from online communication tools and the interpretation of this data to form actionable and relevant information. Solutions to the provocation of this knowledge discovery from the magnitude of social media data must be automated and sophisticated enough to detect sentiment, trends, influencers, and real time issues as they arise. The basis of any social media analytics solution will be the power of its search and discovery knowledge engine. Keywords: LDA algorithm, Clustering, Trend Analysis, Social Media Analytics 1. INTRODUCTION Despite the talks in the market place regarding what social media is, or how it should, impact government operations, the use of information technology to change the way government works and engages with citizens is not new. President Bill Clinton, with the assistance of Vice President Al Gore, initiated what was then called The National Performance Review, which has evolved over time into The National Partnership for generating Government. That endeavor focused on generating greater operational efficiencies, as well as identifying how government could grasp the technology to work more effectively. The overall goal was to cut government costs. This undermines efforts to increase efficiency, effectiveness, and responsiveness. The proliferation of social media throughout American society has put the spotlight on a long standing troubling perception of government – that it is often slow to react and hesitant to move to new solutions and technologies that the general public has already adopted, vetted, and use in a ubiquitous manner. This slow adaptation is often a result of common issues, investigation of potential risks and security concerns, and/or compatibility analysis. Many argue this scrutiny and delay is overbearing and slows the services government agencies provide to the public; others argue it is simply a result of years of entrenched bureaucracy and regulations that lead to slow adaptation to a changing world and dynamic operating environment There are, of course, those who argue that this late-adopter role is one that is necessary to mitigate the risks to the mission of any given agency. In any case, it is clear that while a major part of society has made social media a permanent and complete aspect of their communication strategy, the government, with only a few exceptions, has not yet fully adopted by social media and analytics, and integrated them into how the government conducts its business. What is even unclear is just how government can grasp the myriad of social media tools and channels in order to provide superior service to a better informed and more engaged citizenry. 1.1 MATERIALS AND MANAGEMENT Requirements Web browser Windows Operating System Windows XP, Windows 7,8 MySQL Server Methodology Used:
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 For developing a project or software it is important to know the flow or which type of software development lifecycle model the system is going to use. Out of various SDLC models there is a need to choose the model which will be perfect for the project and therefore Iterative model has been selected. As the name suggest Iterative model is basically an iterative process where the input is processed through various phases and if it doesn’t satisfy it is repeated until it becomes satisfactory. The model consists of five phases namely: PHASE I: 1. Planning: Applying agile methodology for event system event planning for better usage of resources and time with great performance. 2. Analysis: Prepare a detailed analysis on present event system and overcome its limitation in our upcoming system. 3. Design: Integration of data and designing of system event app. 4. Coding: Writing the whole system app code and taking help of an open source. PHASE II: 1. Testing: Doing various tests on system like unit testing, smoke testing, stress testing, integration testing, regression testing, system testing etc. to check whether the integrated system works as the client desires. 2. Deployment: Conduct beta testing for identifying bugs and errors left out and improvements that can be made. After the testing and approval, deploy the proposed system. Chart 1: Iterative model Feasibility Study: Prior developing the product or software it is necessary to know all the factors important for developing a good product. It is important to know the resource requirements, strengths and weakness of the project, etc. All these factors ultimately revolve around two major criteria cost and value, in order to know how much feasible, it is to create a project and how much profit will it return. The feasibility of a particular software product can be determined from the following factors:- © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2377
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 1. Technical Feasibility. 2. Operational Feasibility. 3. Economic Feasibility. 4. Legal Feasibility. Chart 2: Flowchart of Model. 1.2 Result Users can look for social events happening around them through our web application. They can get acknowledged of recent trending events just by entering the keywords. Tweets from all around the world can be accessed with the click of a button. Users can view the result graphically which will be segregated on the basis of time, location and legitimacy. a) Output Figure 1: Query Output b) Outcomes The client should be able to connect to the server properly without any problems. The connection establishment between the mobile device and the server should take minimal time. The mobile device should be able receive data from the server uninterruptedly. Information provided by the application should be correct and as per the user’s need. © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2378
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 c) Discussion of the results Connection can be established easily provided that the server is on. The connection with the server takes time as it uses Internet connection. Receiving data from the server takes time. Information coming from the database is correct 1.3 Discussion Before the introduction of our web application users had to have an access of Television or Newspapers to get aware about the trending events happening around us. To overcome this problem, we introduced a web application that could present you with trending tweets from around the world with the click of a button. It becomes convenient for users to acknowledge themselves about the events around them through a non-complex application. Latent Dirichlet Allocation Algorithm has been used to cluster the tweets into different categories. Providing security to authorized user using Two Factor authentication was a one of the major problem. 2. Conclusion In this project we develop a real-time non parametric model to know about the recent trends. It successfully detects the recent trends and it also shows the trends according to the location of a user. 3. References 1. Hsinchun Chen “Exploring extremism and terrorism on the web: The dark web project” 2007 2. Amit Pratap Singh, Dr, R. C. Jain “A survey on different phases of web usage for Anomaly user Behavior Investigation” 2007 3. Floras Tsai, KapLuk Chan “Detecting cyber security threats in weblogs using probabilistic model” 2007 4. Yulei Zhang, Shuo Zeng, Li Fan, Yan Dang, Catherine A. Larson and Hsinchun Chen “Dark web forums portal: Searching and analyzing Jihadist forums” 2009. 5. The application responds quickly while making a decent decision. The application uses LDA algorithm which is efficient for clustering. Irrespective of users location he can access trending tweets around the world. Positive and negative tweets are being clustered to perform sentimental analysis. © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2379
Télécharger maintenant