SlideShare ist ein Scribd-Unternehmen logo
1 von 10
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
Discovering Emerging Topics in Social Streams 
via Link Anomaly Detection 
Abstract: 
Detection of emerging topics is now receiving renewed interest motivated by the 
rapid growth of social networks. Conventional term-frequency-based approaches 
may not be appropriate in this context, because the information exchanged in social 
network posts include not only text but also images, URLs, and videos. We focus 
on emergence of topics signaled by social aspects of these networks. Specifically, 
we focus on mentions of users – links between users that are generated 
dynamically (intentionally or unintentionally) through replies, mentions, and 
retweets. We propose a probability model of the mentioning behaviour of a social 
network user, and propose to detect the emergence of a new topic from the 
anomalies measured through the model. Aggregating anomaly scores from 
hundreds of users, we show that we can detect emerging topics only based on the
reply/mention relationships in social network posts. We demonstrate our technique 
in several real data sets we gathered from Twitter. The experiments show that 
the proposed mention-anomaly-based approaches can detect new topics at least as 
early as text-anomaly-based approaches, and in some cases much earlier when the 
topic is poorly identified by the textual contents in posts. 
Architecture Diagram:
Existing System: 
Communication over social networks, such as Facebook and Twitter, is increasing 
its importance in our daily life. Since the information exchanged over social 
networks are not only texts but also URLs, images, and videos, they are 
challenging test beds for the study of data mining. In particular, we are interested 
in the problem of detecting emerging topics from social streams, which can be 
used to create automated “breaking news”, or discover hidden market needs or 
underground political movements. Compared to conventional media, social media
are able to capture the earliest, unedited voice of ordinary people. Therefore, the 
challenge is to detect the emergence of a topic as early as possible at a moderate 
number of false positives. 
Disadvantages: 
It makes social media social is the existence of mentions. Here we mean by 
mentions links to other users of the same social network in the form of message-to, 
reply-to, retweet-of, or explicitly in the text. One post may contain a number of 
mentions. Some users may include mentions in their posts rarely; other users may 
be mentioning their friends all the time. Some users (like celebrities) may receive 
mentions every minute; for others, being mentioned might be a rare occasion. In 
this sense, mention is like a language with the number of words equal to the 
number of users in a social network. 
Proposed System: 
We are interested in detecting emerging topics from social network streams based 
on monitoring the mentioning behavior of users. Our basic assumption is that a 
new (emerging) topic is something people feel like discussing, commenting, or 
forwarding the information further to their friends. Conventional approaches for 
topic detection have mainly been concerned with the frequencies of (textual) 
words. A term frequency based approach could suffer from the ambiguity caused
by synonyms or homonyms. It may also require complicated preprocessing (e.g., 
segmentation) depending on the target language. Moreover, it cannot be applied 
when the contents of the messages are mostly non-textual information. On the 
other hand, the “words” formed by mentions are unique, requires little 
preprocessing to obtain (the information is often separated from the 
contents), and are available regardless of the nature of the contents. 
Advantages: 
1.Then this model is used to measure the anomaly of future user behaviour. 
2.Using the proposed probability model, we can quantitatively measure the novelty 
or possible impact of a post reflected in the mention in behavior of the user. We 
aggregate the anomaly scores obtained in this way over hundreds of users and 
apply a recently proposed change-point detection technique based on the 
Sequentially Discounting Normalized Maximum Likelihood (SDNML) coding. 
3.This technique can detect a change in the statistical dependence structure in the 
time series of aggregated anomaly scores, and pin-point where the topic emergence 
is occurred. 
Implementation Modules: 
Main modules: 
1.Probability Model 
2.Computing the link-anomaly score 
3.Combining Anomaly Scores from Different Users
4.burst detection method 
5.Scalability of the proposed algorithm 
Probability Model: 
we describe the probability model that we use to capture the normal mentioning 
behaviour of a user and how to train the model. We characterize a post in a social 
network stream by the number of mentions k it contains, and the set V of names 
(IDs) of the mentionees (users who are mentioned in the post). There are two types 
of infinity we have to take into account here. The first is the number k of users 
mentioned in a post. Although, in practice a user cannot mention hundreds of other 
users in a post, we would like to avoid putting an artificial limit on the number of 
users mentioned in a post. Instead, we will assume a geometric distribution and 
integrate out the parameter to avoid even an implicit limitation through the 
parameter. The second type of infinity is the number of users one can possibly 
mention. 
Computing the link-anomaly score:
In this subsection, we describe how to compute the deviation of a user’s behaviour 
from the normal mentioning behaviour modeled In order to compute the anomaly 
score of a new post x = (t, u, k, V ) by user u at time t containing k mentions 
to users V , we compute the probability with the training set T (t) 
u , which is the collection of posts by user u in the time period [t−T, t] (we use T = 
30 days in this paper). Accordingly the link-anomaly score is defined as 
The two terms in the above equation can be computed via the predictive 
distribution of the number of mentions, and the predictive distribution of the 
mentionee. 
Combining Anomaly Scores from Different Users: 
we describe how to combine the anomaly scores from different users; 
The anomaly score in is computed for each user depending on the current post of 
user u and his/her past behaviour T (t) u . In order to measure the general trend of 
user behaviour, we propose to aggregate the anomaly scores obtained for posts x1, 
. . . , xn using a discretization of window size τ > 0 as follows:
where xi = (ti, ui, ki, Vi) is the post at time ti by user ui including ki mentions to 
users Vi. 
Burst detection method: 
In addition to the change-point detection based on SDNML followed by DTO 
described in previous sections, we also test the combination of our method with 
Kleinberg’s burst detection method . More specifically, we implemented a two-state 
version of Kleinberg’s burst detection model. The reason we chose the two-state 
version was because in this experiment we expect no hierarchical structure. 
The burst detection method is based on a probabilistic automaton model with two 
states, burst state and non-burst state. Some events (e.g., arrival of posts) are 
assumed to happen according to a time varying Poisson processes whose rate 
parameter depends on the current state. 
Scalability of the proposed algorithm: 
The proposed link-anomaly based change-point detection is highly scalable. Every 
step described in the previous subsections requires only linear time against the 
length of the analyzed time period. Computation of the predictive distribution for 
the number of mentions can be computed in linear time against the number of 
mentions. Computation of the predictive distribution for the mention probability 
in and can be efficiently performed using a hash table. Aggregation of the 
anomaly scores from different users takes linear time against the number of users, 
which could be a computational bottle neck but can be easily parallelized. 
SDNML-based change-point detection requires two swipes over the analyzed time 
period. Kleinberg’s burst detection method can be efficiently implemented with 
dynamic programming.
System Configuration: 
HARDWARE REQUIREMENTS: 
Hardware - Pentium 
Speed - 1.1 GHz 
RAM - 1GB 
Hard Disk - 20 GB 
Floppy Drive - 1.44 MB 
Key Board - Standard Windows Keyboard 
Mouse - Two or Three Button Mouse 
Monitor - SVGA 
SOFTWARE REQUIREMENTS: 
Operating System : Windows 
Technology : Java and J2EE 
Web Technologies : Html, JavaScript, CSS 
IDE : My Eclipse 
Web Server : Tomcat 
Tool kit : Android Phone 
Database : My SQL 
Java Version : J2SDK1.5
IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social streams via link anomaly detection

Weitere ähnliche Inhalte

Was ist angesagt?

Who to follow and why: link prediction with explanations
Who to follow and why: link prediction with explanationsWho to follow and why: link prediction with explanations
Who to follow and why: link prediction with explanationsNicola Barbieri
 
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MININGFAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MININGijnlc
 
IRJET- Fake News Detection and Rumour Source Identification
IRJET- Fake News Detection and Rumour Source IdentificationIRJET- Fake News Detection and Rumour Source Identification
IRJET- Fake News Detection and Rumour Source IdentificationIRJET Journal
 
Mining social data
Mining social dataMining social data
Mining social dataMalk Zameth
 
Groundhog day: near duplicate detection on twitter
Groundhog day: near duplicate detection on twitterGroundhog day: near duplicate detection on twitter
Groundhog day: near duplicate detection on twitterDan Nguyen
 
Link prediction with the linkpred tool
Link prediction with the linkpred toolLink prediction with the linkpred tool
Link prediction with the linkpred toolRaf Guns
 
Social Tagging Of Multimedia Content A Model
Social Tagging Of Multimedia Content A ModelSocial Tagging Of Multimedia Content A Model
Social Tagging Of Multimedia Content A ModelIJMER
 
Survey in Online Social Media Skelton by Network based Spam
Survey in Online Social Media Skelton by Network based SpamSurvey in Online Social Media Skelton by Network based Spam
Survey in Online Social Media Skelton by Network based SpamIRJET Journal
 
Multiple Regression to Analyse Social Graph of Brand Awareness
Multiple Regression to Analyse Social Graph of Brand AwarenessMultiple Regression to Analyse Social Graph of Brand Awareness
Multiple Regression to Analyse Social Graph of Brand AwarenessTELKOMNIKA JOURNAL
 
Fake News Detection using Machine Learning
Fake News Detection using Machine LearningFake News Detection using Machine Learning
Fake News Detection using Machine Learningijtsrd
 
Text mining on Twitter information based on R platform
Text mining on Twitter information based on R platformText mining on Twitter information based on R platform
Text mining on Twitter information based on R platformFayan TAO
 
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatramanOdsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatramanvenkatramanJ4
 
Evolving social data mining and affective analysis
Evolving social data mining and affective analysis  Evolving social data mining and affective analysis
Evolving social data mining and affective analysis Athena Vakali
 
Using hash tag graph based topic model to connect semantically-related words ...
Using hash tag graph based topic model to connect semantically-related words ...Using hash tag graph based topic model to connect semantically-related words ...
Using hash tag graph based topic model to connect semantically-related words ...Shakas Technologies
 

Was ist angesagt? (15)

Who to follow and why: link prediction with explanations
Who to follow and why: link prediction with explanationsWho to follow and why: link prediction with explanations
Who to follow and why: link prediction with explanations
 
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MININGFAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
 
IRJET- Fake News Detection and Rumour Source Identification
IRJET- Fake News Detection and Rumour Source IdentificationIRJET- Fake News Detection and Rumour Source Identification
IRJET- Fake News Detection and Rumour Source Identification
 
Mining social data
Mining social dataMining social data
Mining social data
 
Groundhog day: near duplicate detection on twitter
Groundhog day: near duplicate detection on twitterGroundhog day: near duplicate detection on twitter
Groundhog day: near duplicate detection on twitter
 
hwk1
hwk1hwk1
hwk1
 
Link prediction with the linkpred tool
Link prediction with the linkpred toolLink prediction with the linkpred tool
Link prediction with the linkpred tool
 
Social Tagging Of Multimedia Content A Model
Social Tagging Of Multimedia Content A ModelSocial Tagging Of Multimedia Content A Model
Social Tagging Of Multimedia Content A Model
 
Survey in Online Social Media Skelton by Network based Spam
Survey in Online Social Media Skelton by Network based SpamSurvey in Online Social Media Skelton by Network based Spam
Survey in Online Social Media Skelton by Network based Spam
 
Multiple Regression to Analyse Social Graph of Brand Awareness
Multiple Regression to Analyse Social Graph of Brand AwarenessMultiple Regression to Analyse Social Graph of Brand Awareness
Multiple Regression to Analyse Social Graph of Brand Awareness
 
Fake News Detection using Machine Learning
Fake News Detection using Machine LearningFake News Detection using Machine Learning
Fake News Detection using Machine Learning
 
Text mining on Twitter information based on R platform
Text mining on Twitter information based on R platformText mining on Twitter information based on R platform
Text mining on Twitter information based on R platform
 
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatramanOdsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
 
Evolving social data mining and affective analysis
Evolving social data mining and affective analysis  Evolving social data mining and affective analysis
Evolving social data mining and affective analysis
 
Using hash tag graph based topic model to connect semantically-related words ...
Using hash tag graph based topic model to connect semantically-related words ...Using hash tag graph based topic model to connect semantically-related words ...
Using hash tag graph based topic model to connect semantically-related words ...
 

Andere mochten auch

Ieee projects 2011 2012
Ieee projects 2011 2012Ieee projects 2011 2012
Ieee projects 2011 2012SBGC
 
Audio Fingerprinting Introduction
Audio Fingerprinting IntroductionAudio Fingerprinting Introduction
Audio Fingerprinting IntroductionVikesh Khanna
 
MASK: Robust Local Features for Audio Fingerprinting
MASK: Robust Local Features for Audio FingerprintingMASK: Robust Local Features for Audio Fingerprinting
MASK: Robust Local Features for Audio FingerprintingXavier Anguera
 
seminar topics cse
seminar topics cseseminar topics cse
seminar topics cseNawab Khan
 
Mobi context a context aware cloud-based venue recommendation framework
Mobi context a context aware cloud-based venue recommendation frameworkMobi context a context aware cloud-based venue recommendation framework
Mobi context a context aware cloud-based venue recommendation frameworkNagamalleswararao Tadikonda
 
Friendbook a semantic based friend recommendation system for social networks
Friendbook a semantic based friend recommendation system for social networksFriendbook a semantic based friend recommendation system for social networks
Friendbook a semantic based friend recommendation system for social networksNagamalleswararao Tadikonda
 
Wearable Technology Futures 2020: A New Path for Public Health?
Wearable Technology Futures 2020: A New Path for Public Health?Wearable Technology Futures 2020: A New Path for Public Health?
Wearable Technology Futures 2020: A New Path for Public Health?Ogilvy Health
 
Enabling Next Generation RFID Application
Enabling Next Generation RFID ApplicationEnabling Next Generation RFID Application
Enabling Next Generation RFID ApplicationMahmud M
 
My presentation on Android in my college
My presentation on Android in my collegeMy presentation on Android in my college
My presentation on Android in my collegeSneha Lata
 
Friendbook a semantic based friend recommendation system for social networks
Friendbook a semantic based friend recommendation system for social networksFriendbook a semantic based friend recommendation system for social networks
Friendbook a semantic based friend recommendation system for social networksPapitha Velumani
 
Vehicle Number Plate Recognition System
Vehicle Number Plate Recognition SystemVehicle Number Plate Recognition System
Vehicle Number Plate Recognition Systemprashantdahake
 
wimax Ppt for seminar
wimax Ppt for seminarwimax Ppt for seminar
wimax Ppt for seminarPratik Anand
 

Andere mochten auch (12)

Ieee projects 2011 2012
Ieee projects 2011 2012Ieee projects 2011 2012
Ieee projects 2011 2012
 
Audio Fingerprinting Introduction
Audio Fingerprinting IntroductionAudio Fingerprinting Introduction
Audio Fingerprinting Introduction
 
MASK: Robust Local Features for Audio Fingerprinting
MASK: Robust Local Features for Audio FingerprintingMASK: Robust Local Features for Audio Fingerprinting
MASK: Robust Local Features for Audio Fingerprinting
 
seminar topics cse
seminar topics cseseminar topics cse
seminar topics cse
 
Mobi context a context aware cloud-based venue recommendation framework
Mobi context a context aware cloud-based venue recommendation frameworkMobi context a context aware cloud-based venue recommendation framework
Mobi context a context aware cloud-based venue recommendation framework
 
Friendbook a semantic based friend recommendation system for social networks
Friendbook a semantic based friend recommendation system for social networksFriendbook a semantic based friend recommendation system for social networks
Friendbook a semantic based friend recommendation system for social networks
 
Wearable Technology Futures 2020: A New Path for Public Health?
Wearable Technology Futures 2020: A New Path for Public Health?Wearable Technology Futures 2020: A New Path for Public Health?
Wearable Technology Futures 2020: A New Path for Public Health?
 
Enabling Next Generation RFID Application
Enabling Next Generation RFID ApplicationEnabling Next Generation RFID Application
Enabling Next Generation RFID Application
 
My presentation on Android in my college
My presentation on Android in my collegeMy presentation on Android in my college
My presentation on Android in my college
 
Friendbook a semantic based friend recommendation system for social networks
Friendbook a semantic based friend recommendation system for social networksFriendbook a semantic based friend recommendation system for social networks
Friendbook a semantic based friend recommendation system for social networks
 
Vehicle Number Plate Recognition System
Vehicle Number Plate Recognition SystemVehicle Number Plate Recognition System
Vehicle Number Plate Recognition System
 
wimax Ppt for seminar
wimax Ppt for seminarwimax Ppt for seminar
wimax Ppt for seminar
 

Ähnlich wie IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social streams via link anomaly detection

Discovering Influential User by Coupling Multiplex Heterogeneous OSN’S
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’SDiscovering Influential User by Coupling Multiplex Heterogeneous OSN’S
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’SIRJET Journal
 
Prediction of Reaction towards Textual Posts in Social Networks
Prediction of Reaction towards Textual Posts in Social NetworksPrediction of Reaction towards Textual Posts in Social Networks
Prediction of Reaction towards Textual Posts in Social NetworksMohamed El-Geish
 
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster WarningIRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster WarningIRJET Journal
 
IRJET- Predicting Social Network Communities Structure Changes and Detection ...
IRJET- Predicting Social Network Communities Structure Changes and Detection ...IRJET- Predicting Social Network Communities Structure Changes and Detection ...
IRJET- Predicting Social Network Communities Structure Changes and Detection ...IRJET Journal
 
Insult detection using a partitional CNN-LSTM model
Insult detection using a partitional CNN-LSTM modelInsult detection using a partitional CNN-LSTM model
Insult detection using a partitional CNN-LSTM modelCSITiaesprime
 
Detecting Spam Tags Against Collaborative Unfair Through Trust Modelling
Detecting Spam Tags Against Collaborative Unfair Through Trust ModellingDetecting Spam Tags Against Collaborative Unfair Through Trust Modelling
Detecting Spam Tags Against Collaborative Unfair Through Trust ModellingIOSR Journals
 
Testing Vitality Ranking and Prediction in Social Networking Services With Dy...
Testing Vitality Ranking and Prediction in Social Networking Services With Dy...Testing Vitality Ranking and Prediction in Social Networking Services With Dy...
Testing Vitality Ranking and Prediction in Social Networking Services With Dy...reshma reshu
 
Cyber bullying detection and analysis.ppt.pdf
Cyber bullying detection and analysis.ppt.pdfCyber bullying detection and analysis.ppt.pdf
Cyber bullying detection and analysis.ppt.pdfHunais Abdul Nafi
 
Rule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social networkRule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social networkeSAT Publishing House
 
IRJET - Twitter Spam Detection using Cobweb
IRJET - Twitter Spam Detection using CobwebIRJET - Twitter Spam Detection using Cobweb
IRJET - Twitter Spam Detection using CobwebIRJET Journal
 
Sampling of User Behavior Using Online Social Network
Sampling of User Behavior Using Online Social NetworkSampling of User Behavior Using Online Social Network
Sampling of User Behavior Using Online Social NetworkEditor IJCATR
 
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...IRJET Journal
 
BenMartine.doc
BenMartine.docBenMartine.doc
BenMartine.docbutest
 
BenMartine.doc
BenMartine.docBenMartine.doc
BenMartine.docbutest
 
BenMartine.doc
BenMartine.docBenMartine.doc
BenMartine.docbutest
 
25 ijcse-01238-3 saratha
25 ijcse-01238-3 saratha25 ijcse-01238-3 saratha
25 ijcse-01238-3 sarathaShivlal Mewada
 
Identifying ghost users using social media metadata - University College London
Identifying ghost users using social media metadata - University College LondonIdentifying ghost users using social media metadata - University College London
Identifying ghost users using social media metadata - University College LondonGreg Kawere
 
Prediction of User Rare Sequential Topic Patterns of Internet Users
Prediction of User Rare Sequential Topic Patterns of Internet UsersPrediction of User Rare Sequential Topic Patterns of Internet Users
Prediction of User Rare Sequential Topic Patterns of Internet UsersIRJET Journal
 
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET Journal
 

Ähnlich wie IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social streams via link anomaly detection (20)

Discovering Influential User by Coupling Multiplex Heterogeneous OSN’S
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’SDiscovering Influential User by Coupling Multiplex Heterogeneous OSN’S
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’S
 
Prediction of Reaction towards Textual Posts in Social Networks
Prediction of Reaction towards Textual Posts in Social NetworksPrediction of Reaction towards Textual Posts in Social Networks
Prediction of Reaction towards Textual Posts in Social Networks
 
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster WarningIRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster Warning
 
IRJET- Predicting Social Network Communities Structure Changes and Detection ...
IRJET- Predicting Social Network Communities Structure Changes and Detection ...IRJET- Predicting Social Network Communities Structure Changes and Detection ...
IRJET- Predicting Social Network Communities Structure Changes and Detection ...
 
Insult detection using a partitional CNN-LSTM model
Insult detection using a partitional CNN-LSTM modelInsult detection using a partitional CNN-LSTM model
Insult detection using a partitional CNN-LSTM model
 
Detecting Spam Tags Against Collaborative Unfair Through Trust Modelling
Detecting Spam Tags Against Collaborative Unfair Through Trust ModellingDetecting Spam Tags Against Collaborative Unfair Through Trust Modelling
Detecting Spam Tags Against Collaborative Unfair Through Trust Modelling
 
Testing Vitality Ranking and Prediction in Social Networking Services With Dy...
Testing Vitality Ranking and Prediction in Social Networking Services With Dy...Testing Vitality Ranking and Prediction in Social Networking Services With Dy...
Testing Vitality Ranking and Prediction in Social Networking Services With Dy...
 
Cyber bullying detection and analysis.ppt.pdf
Cyber bullying detection and analysis.ppt.pdfCyber bullying detection and analysis.ppt.pdf
Cyber bullying detection and analysis.ppt.pdf
 
Rule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social networkRule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social network
 
IRJET - Twitter Spam Detection using Cobweb
IRJET - Twitter Spam Detection using CobwebIRJET - Twitter Spam Detection using Cobweb
IRJET - Twitter Spam Detection using Cobweb
 
Sampling of User Behavior Using Online Social Network
Sampling of User Behavior Using Online Social NetworkSampling of User Behavior Using Online Social Network
Sampling of User Behavior Using Online Social Network
 
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
 
BenMartine.doc
BenMartine.docBenMartine.doc
BenMartine.doc
 
BenMartine.doc
BenMartine.docBenMartine.doc
BenMartine.doc
 
BenMartine.doc
BenMartine.docBenMartine.doc
BenMartine.doc
 
25 ijcse-01238-3 saratha
25 ijcse-01238-3 saratha25 ijcse-01238-3 saratha
25 ijcse-01238-3 saratha
 
Identifying ghost users using social media metadata - University College London
Identifying ghost users using social media metadata - University College LondonIdentifying ghost users using social media metadata - University College London
Identifying ghost users using social media metadata - University College London
 
Prediction of User Rare Sequential Topic Patterns of Internet Users
Prediction of User Rare Sequential Topic Patterns of Internet UsersPrediction of User Rare Sequential Topic Patterns of Internet Users
Prediction of User Rare Sequential Topic Patterns of Internet Users
 
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
 
Ists
IstsIsts
Ists
 

Mehr von IEEEFINALYEARSTUDENTPROJECTS

IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Building a scalable system for steal...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Building a scalable system for steal...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Building a scalable system for steal...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Building a scalable system for steal...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Token mac a fair mac protocol for pa...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Token mac a fair mac protocol for pa...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Token mac a fair mac protocol for pa...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Token mac a fair mac protocol for pa...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Tag sense leveraging smartphones for...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Tag sense leveraging smartphones for...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Tag sense leveraging smartphones for...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Tag sense leveraging smartphones for...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Friendbook a semantic based friend r...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Friendbook a semantic based friend r...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Friendbook a semantic based friend r...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Friendbook a semantic based friend r...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS A low complexity algorithm for neigh...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS A low complexity algorithm for neigh...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS A low complexity algorithm for neigh...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS A low complexity algorithm for neigh...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Hierarchical prediction and context ...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Hierarchical prediction and context ...IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Hierarchical prediction and context ...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Hierarchical prediction and context ...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encrypt...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encrypt...IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encrypt...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encrypt...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Click prediction-for-web-image-reran...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Click prediction-for-web-image-reran...IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Click prediction-for-web-image-reran...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Click prediction-for-web-image-reran...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Web service recommendation via expl...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Web service recommendation via expl...IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Web service recommendation via expl...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Web service recommendation via expl...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Scalable and accurate prediction of...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Scalable and accurate prediction of...IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Scalable and accurate prediction of...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Scalable and accurate prediction of...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Privacy enhanced web service compos...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Privacy enhanced web service compos...IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Privacy enhanced web service compos...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Privacy enhanced web service compos...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Decentralized enactment of bpel pro...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Decentralized enactment of bpel pro...IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Decentralized enactment of bpel pro...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Decentralized enactment of bpel pro...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS A novel time obfuscated algorithm ...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS  A novel time obfuscated algorithm ...IEEE 2014 JAVA SERVICE COMPUTING PROJECTS  A novel time obfuscated algorithm ...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS A novel time obfuscated algorithm ...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA SOFTWARE ENGINEER PROJECTS Conservation of information softwar...
IEEE 2014 JAVA SOFTWARE ENGINEER PROJECTS Conservation of information softwar...IEEE 2014 JAVA SOFTWARE ENGINEER PROJECTS Conservation of information softwar...
IEEE 2014 JAVA SOFTWARE ENGINEER PROJECTS Conservation of information softwar...IEEEFINALYEARSTUDENTPROJECTS
 
IEEE 2014 JAVA DATA MINING PROJECTS Xs path navigation on xml schemas made easy
IEEE 2014 JAVA DATA MINING PROJECTS Xs path navigation on xml schemas made easyIEEE 2014 JAVA DATA MINING PROJECTS Xs path navigation on xml schemas made easy
IEEE 2014 JAVA DATA MINING PROJECTS Xs path navigation on xml schemas made easyIEEEFINALYEARSTUDENTPROJECTS
 

Mehr von IEEEFINALYEARSTUDENTPROJECTS (20)

IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Building a scalable system for steal...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Building a scalable system for steal...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Building a scalable system for steal...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Building a scalable system for steal...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Token mac a fair mac protocol for pa...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Token mac a fair mac protocol for pa...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Token mac a fair mac protocol for pa...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Token mac a fair mac protocol for pa...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Tag sense leveraging smartphones for...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Tag sense leveraging smartphones for...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Tag sense leveraging smartphones for...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Tag sense leveraging smartphones for...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Preserving location privacy in geo s...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Friendbook a semantic based friend r...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Friendbook a semantic based friend r...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Friendbook a semantic based friend r...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Friendbook a semantic based friend r...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Efficient and privacy aware data agg...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS A low complexity algorithm for neigh...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS A low complexity algorithm for neigh...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS A low complexity algorithm for neigh...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS A low complexity algorithm for neigh...
 
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Hierarchical prediction and context ...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Hierarchical prediction and context ...IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Hierarchical prediction and context ...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Hierarchical prediction and context ...
 
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encrypt...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encrypt...IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encrypt...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Designing an-efficient-image encrypt...
 
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Click prediction-for-web-image-reran...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Click prediction-for-web-image-reran...IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Click prediction-for-web-image-reran...
IEEE 2014 JAVA IMAGE PROCESSING PROJECTS Click prediction-for-web-image-reran...
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Web service recommendation via expl...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Web service recommendation via expl...IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Web service recommendation via expl...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Web service recommendation via expl...
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Scalable and accurate prediction of...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Scalable and accurate prediction of...IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Scalable and accurate prediction of...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Scalable and accurate prediction of...
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Privacy enhanced web service compos...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Privacy enhanced web service compos...IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Privacy enhanced web service compos...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Privacy enhanced web service compos...
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Decentralized enactment of bpel pro...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Decentralized enactment of bpel pro...IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Decentralized enactment of bpel pro...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS Decentralized enactment of bpel pro...
 
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS A novel time obfuscated algorithm ...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS  A novel time obfuscated algorithm ...IEEE 2014 JAVA SERVICE COMPUTING PROJECTS  A novel time obfuscated algorithm ...
IEEE 2014 JAVA SERVICE COMPUTING PROJECTS A novel time obfuscated algorithm ...
 
IEEE 2014 JAVA SOFTWARE ENGINEER PROJECTS Conservation of information softwar...
IEEE 2014 JAVA SOFTWARE ENGINEER PROJECTS Conservation of information softwar...IEEE 2014 JAVA SOFTWARE ENGINEER PROJECTS Conservation of information softwar...
IEEE 2014 JAVA SOFTWARE ENGINEER PROJECTS Conservation of information softwar...
 
IEEE 2014 JAVA DATA MINING PROJECTS Xs path navigation on xml schemas made easy
IEEE 2014 JAVA DATA MINING PROJECTS Xs path navigation on xml schemas made easyIEEE 2014 JAVA DATA MINING PROJECTS Xs path navigation on xml schemas made easy
IEEE 2014 JAVA DATA MINING PROJECTS Xs path navigation on xml schemas made easy
 

Kürzlich hochgeladen

Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfRagavanV2
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 

Kürzlich hochgeladen (20)

Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 

IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social streams via link anomaly detection

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com Discovering Emerging Topics in Social Streams via Link Anomaly Detection Abstract: Detection of emerging topics is now receiving renewed interest motivated by the rapid growth of social networks. Conventional term-frequency-based approaches may not be appropriate in this context, because the information exchanged in social network posts include not only text but also images, URLs, and videos. We focus on emergence of topics signaled by social aspects of these networks. Specifically, we focus on mentions of users – links between users that are generated dynamically (intentionally or unintentionally) through replies, mentions, and retweets. We propose a probability model of the mentioning behaviour of a social network user, and propose to detect the emergence of a new topic from the anomalies measured through the model. Aggregating anomaly scores from hundreds of users, we show that we can detect emerging topics only based on the
  • 2. reply/mention relationships in social network posts. We demonstrate our technique in several real data sets we gathered from Twitter. The experiments show that the proposed mention-anomaly-based approaches can detect new topics at least as early as text-anomaly-based approaches, and in some cases much earlier when the topic is poorly identified by the textual contents in posts. Architecture Diagram:
  • 3. Existing System: Communication over social networks, such as Facebook and Twitter, is increasing its importance in our daily life. Since the information exchanged over social networks are not only texts but also URLs, images, and videos, they are challenging test beds for the study of data mining. In particular, we are interested in the problem of detecting emerging topics from social streams, which can be used to create automated “breaking news”, or discover hidden market needs or underground political movements. Compared to conventional media, social media
  • 4. are able to capture the earliest, unedited voice of ordinary people. Therefore, the challenge is to detect the emergence of a topic as early as possible at a moderate number of false positives. Disadvantages: It makes social media social is the existence of mentions. Here we mean by mentions links to other users of the same social network in the form of message-to, reply-to, retweet-of, or explicitly in the text. One post may contain a number of mentions. Some users may include mentions in their posts rarely; other users may be mentioning their friends all the time. Some users (like celebrities) may receive mentions every minute; for others, being mentioned might be a rare occasion. In this sense, mention is like a language with the number of words equal to the number of users in a social network. Proposed System: We are interested in detecting emerging topics from social network streams based on monitoring the mentioning behavior of users. Our basic assumption is that a new (emerging) topic is something people feel like discussing, commenting, or forwarding the information further to their friends. Conventional approaches for topic detection have mainly been concerned with the frequencies of (textual) words. A term frequency based approach could suffer from the ambiguity caused
  • 5. by synonyms or homonyms. It may also require complicated preprocessing (e.g., segmentation) depending on the target language. Moreover, it cannot be applied when the contents of the messages are mostly non-textual information. On the other hand, the “words” formed by mentions are unique, requires little preprocessing to obtain (the information is often separated from the contents), and are available regardless of the nature of the contents. Advantages: 1.Then this model is used to measure the anomaly of future user behaviour. 2.Using the proposed probability model, we can quantitatively measure the novelty or possible impact of a post reflected in the mention in behavior of the user. We aggregate the anomaly scores obtained in this way over hundreds of users and apply a recently proposed change-point detection technique based on the Sequentially Discounting Normalized Maximum Likelihood (SDNML) coding. 3.This technique can detect a change in the statistical dependence structure in the time series of aggregated anomaly scores, and pin-point where the topic emergence is occurred. Implementation Modules: Main modules: 1.Probability Model 2.Computing the link-anomaly score 3.Combining Anomaly Scores from Different Users
  • 6. 4.burst detection method 5.Scalability of the proposed algorithm Probability Model: we describe the probability model that we use to capture the normal mentioning behaviour of a user and how to train the model. We characterize a post in a social network stream by the number of mentions k it contains, and the set V of names (IDs) of the mentionees (users who are mentioned in the post). There are two types of infinity we have to take into account here. The first is the number k of users mentioned in a post. Although, in practice a user cannot mention hundreds of other users in a post, we would like to avoid putting an artificial limit on the number of users mentioned in a post. Instead, we will assume a geometric distribution and integrate out the parameter to avoid even an implicit limitation through the parameter. The second type of infinity is the number of users one can possibly mention. Computing the link-anomaly score:
  • 7. In this subsection, we describe how to compute the deviation of a user’s behaviour from the normal mentioning behaviour modeled In order to compute the anomaly score of a new post x = (t, u, k, V ) by user u at time t containing k mentions to users V , we compute the probability with the training set T (t) u , which is the collection of posts by user u in the time period [t−T, t] (we use T = 30 days in this paper). Accordingly the link-anomaly score is defined as The two terms in the above equation can be computed via the predictive distribution of the number of mentions, and the predictive distribution of the mentionee. Combining Anomaly Scores from Different Users: we describe how to combine the anomaly scores from different users; The anomaly score in is computed for each user depending on the current post of user u and his/her past behaviour T (t) u . In order to measure the general trend of user behaviour, we propose to aggregate the anomaly scores obtained for posts x1, . . . , xn using a discretization of window size τ > 0 as follows:
  • 8. where xi = (ti, ui, ki, Vi) is the post at time ti by user ui including ki mentions to users Vi. Burst detection method: In addition to the change-point detection based on SDNML followed by DTO described in previous sections, we also test the combination of our method with Kleinberg’s burst detection method . More specifically, we implemented a two-state version of Kleinberg’s burst detection model. The reason we chose the two-state version was because in this experiment we expect no hierarchical structure. The burst detection method is based on a probabilistic automaton model with two states, burst state and non-burst state. Some events (e.g., arrival of posts) are assumed to happen according to a time varying Poisson processes whose rate parameter depends on the current state. Scalability of the proposed algorithm: The proposed link-anomaly based change-point detection is highly scalable. Every step described in the previous subsections requires only linear time against the length of the analyzed time period. Computation of the predictive distribution for the number of mentions can be computed in linear time against the number of mentions. Computation of the predictive distribution for the mention probability in and can be efficiently performed using a hash table. Aggregation of the anomaly scores from different users takes linear time against the number of users, which could be a computational bottle neck but can be easily parallelized. SDNML-based change-point detection requires two swipes over the analyzed time period. Kleinberg’s burst detection method can be efficiently implemented with dynamic programming.
  • 9. System Configuration: HARDWARE REQUIREMENTS: Hardware - Pentium Speed - 1.1 GHz RAM - 1GB Hard Disk - 20 GB Floppy Drive - 1.44 MB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - SVGA SOFTWARE REQUIREMENTS: Operating System : Windows Technology : Java and J2EE Web Technologies : Html, JavaScript, CSS IDE : My Eclipse Web Server : Tomcat Tool kit : Android Phone Database : My SQL Java Version : J2SDK1.5