SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 6 Issue 3, March-April 2022 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD49695 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1272
Analytic System Based on Prediction Analysis
of Social Emotions from User Prespective
Miss. Ashwini Ghatol1
, Prof. A. A. Chaudhari2
1
PG Scholar, 2
Assistant Professor,
1,2
Computer Science & Engineering,
Prof. Ram Meghe Institute of Technology & Research, Badnera Maharashtra, India
ABSTRACT
Early development of Web, large numbers of documents assigned by
readers’ emotions have been generated through new portals. By
analyzing to the previous studies which focused on author’s
perspective, our research focuses on readers’ emotions invoked by
news articles. Our research paper provides meaningful assistance in
social media application such as sentiment retrieval, opinion
summarization and election prediction. In this paper, we predict the
readers’ emotion of news, social media based on the social opinion
network. Most specifically, we construct the opinion network based
on the semantic distance. The communities in the news network,
opinion network indicate specific events which are related to the
emotions. Therefore, the news network, opinion network serves as
the lexicon between events and corresponding emotions. We
discussed neighbor relationship in network to predict readers’
emotions. At the last our result, our methods obtain better result than
the state-of-the-art methods. Moreover, our research developed a
growing strategy to prune the network for practical application. The
experiment shows the rationality of the reduction for application.
KEYWORD: sensing and analysis, opinion network, text mining,
complex network
How to cite this paper: Miss. Ashwini
Ghatol | Prof. A. A. Chaudhari "Analytic
System Based on Prediction Analysis of
Social Emotions from User Prespective"
Published in
International Journal
of Trend in
Scientific Research
and Development
(ijtsrd), ISSN: 2456-
6470, Volume-6 |
Issue-3, April 2022,
pp.1272-1275, URL:
www.ijtsrd.com/papers/ijtsrd49695.pdf
Copyright © 2022 by author (s) and
International Journal of Trend in
Scientific Research and Development
Journal. This is an
Open Access article
distributed under the
terms of the Creative Commons
Attribution License (CC BY 4.0)
(http://creativecommons.org/licenses/by/4.0)
EXISTING WORK
In existing paper it is proposed that the system can do
the prediction of emotions of the users they are taken
the reference of the news article which help us to
know about the users emotions regarding to such a
article. In this the experiment get proposed on
datasets. Social opinion prediction is a difficult
research endeavor. As the initial research work on
social opinion prediction, “affective text”
SemEval-2007 Tasks. Intend to annotate news
headlines for the evoked emotion of readers. Another
research focus on readers’ emotion evoked by news
sentences. Existing methods of social opinion
prediction can be divided into three categories:
knowledge-based techniques, statistical methods and
hybrid approaches. Because of the deficiency of
information of news text. it is unmanageable to
annotate the emotions consistently. Knowledge-based
techniques utilize existing emotional lexicon to
supplement the prior knowledge for annotating the
emotions. The popular emotional lexicon includes
Affective Lexicon, linguistic annotation scheme,
Word Net-Affect, Senti Word Net, and Sentic Net.
The drawback of knowledge-based techniques is the
reliance on the coverage of the emotional lexicon.
These techniques cannot process terms that do not
appear in the emotional lexicon. Statistical methods
predict social opinion by training a statistical model
based on a large number of well-labeled corpuses.
PRAPOSED WORK
By looking towards the technique given in existing
we are proposed a business intelligence analytic
module based on emotion detection regarding to the
product reviews based on mining with reviews,
feedback, complaints given by users this will help us
the user for giving the instant and fast response and
which also become very proper for business
development. In proposed we can implement the
opinion network and emotion opinion model on the
datasets retrieved from business data. Opinion
IJTSRD49695
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD49695 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1273
prediction system will helps to predict and decision
making in business intelligence.
In this paper, our proposed work is to malicious post
blocking using pattern matching algorithms, ration
calculation based naïve baise classification for the
classification of malicious user, determination of
malicious user using social icon prediction, prediction
analysis for the user post based on review in social
icon, determination of malicious user link based on
web context extraction technique.
Methods Used
1. LDA
2. Social Opinion Mode
Algorithm Used
1. Pattern Matching Algorithm
OBJECTIVE
Development of analytic algorithmic work for the
business analytics
Implementation of network based semantic
distance.
Implementation of Predictive decision making
based on iconic patter matching
Development of business intelligence tools for
predictive analysis
Fig-1: Flow chart of proposed architecture
A. USER SIDE
1. Login Module
In computer security, logging in (or logging on or
signing in or signing on) is the process by which an
individual gains access to a computer system by
identifying and authenticating themselves. The user
credentials are typically some form of "username"
and a matching "password", and these credentials
themselves are sometimes referred to as a login, (or a
logon or a sign-in or a sign-on). In practice, modern
secure systems also often require a second factor for
extra security. When access is no longer needed, the
user can log out. The very first module of our project
is login module. The login page can be used for login
the project in user side. Firstly we need to create the
account on login page after that creating account we
can sign up with that id and password. After
registration of user, user is able to post the comment
it is in the form of textual, link, and image also.
2. Posting of Comment Module
The second module of our project is posting of
comment. It is after the login module. User can post
their comment and another user view this comments
and also they can like or dislike that comment. From
this page we can post images, link and textual data
also. From that page we can go to the third module of
user side and also log out button is available in
second module page. Again this comment we can
view on admin side of view post module.
Input word:
We can give the input from this module. Input is in
the form of comment, link. We give the comment “I
hate India” then it detect it is malicious comment or
non malicious comment.
Ex: I hate India.
3. Detect the Malicious Post Module
The third module of our project is detect the
malicious post. After the second module we can go to
the third module. Third module show us malicious
post, non malicious post, and trust factor and also we
can send friend request to another user. Trust factor is
available their for showing the nature of person. if
trust factor is good then we undesstand the nature of
that person. trust factor is calculated by using the
number of malicious post and number of non
malicious post. Trust factor is available here for
security issue.
Number of non_malicious Post
Trust factor =
Number of malicious post
In this way, trust factor is to be calculated.
For calculating the trust factor we need the malicious
post,
Number of character matches
Malicious post = *100
Number of character in post
Then, for non malicious post,
Non –malicious post = 100 –Malicious post.
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD49695 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1274
Ex: I hate India.
Above comment shows it is malicious comment, and
its malicious factor is
Malicious factor = 33.33
B. ADMIN SIDE
In a admin side total 6 module are present. Admin can
show all data of user post. Admin have authority to
unblock the block user. For access the admin account
we need to register firstly, after that we can accesses
this account.
1. Admin login
2. View post
3. View user
4. User malicious post calculator
5. Add training item sets
6. Blacklist link
1. Admin Login Module
The very first module of our project is login module.
The login page can be used used for login the project
in user side. Firstly we need to create the account on
login page after that creating acoount we can sign up
with that id and password.
2. View Post Module
View post is the second module of the admin side. It
show all the post, post by user. Also we can view the
date and time of the post.
3. View User Module
It is the third model of admin side. we can view all
user with their name and emailid. In this way second
module is to be excuted.
4. User Malicious Post Calculator Module
It is the fourth module of admin side. We can view all
the data of user like malicious post percentage and
non malicious post percentage. Also it show the
blocking and unblocking of user. if the malicious
percentage of user is <= 50% then this person will be
block. And also admin have a authority to unblock
this person. calculation of malicious post is describe
above in user side.
5. Add Training Item sets Module:
It is the fifth module of admin side. we can add the
word in dictionary with the help of this module. And
also on this module three text box is present. one for
the word we have to add second is the word
description and third is the their category description.
In this way in this module we can add the word in our
database.
6. Blacklist Link Module:
It is the last module of admin side. In this module we
can view the all link which is to be block. In this
module also we can view the blacklist percentage.
Same way we can calculate the the percentage of the
blacklist module.
Formula for calculated % of blacklist link
Number of charecter matches in link
Blacklist link = *100
Number of character in link
In this way we can view all module and execute it.
PROPOSED SYSTEM AND ADVANTAGES
1. Auto –blocking:
If someone post her photo, but after posting this photo
some people gives the bad/negative comment
continuously then tis types of people will be block
automatically.
2. Security:
It block the malicious people by using the analysis of
their post. it means it is secure as compared to the
other social side.
3. No need of man power
We can analysis for the milions of post. if we need to
analysis of one thousand post then need man power
for read them but in our project we doesn’t need the
man power.
4. Time saving
If we want the analysis of thousand comment then our
project do this in within some second.
5. The filtration of post data with malicious
determination
6. Helps the social media platform to block the use
with malicious suspects.
7. Manipulation of social media user will do through
malicious score before sending friend request.
8. Link malicious determination done while any link
get shared on timeline
9. The proposed system will help to predict the
uploaded article in various ways of factor.
10. By using the sentimental analysis the prediction
model get applied to manipulate the posts.
11. Proposed system will also help to analyze the post
link data using the web content extraction.
CONCLUSION&FUTURE WORK
CONCLUSION
We analyze the online social opinions and propose
social opinion model for malicious post measuring
similarity among news. Due to word-embedding pre-
trained on Wikipedia, model’s stability and
robustness are guaranteed and can hardly be
influenced by the size of news data. Based on the
similarity, we construct an opinion network to detect
user-generated social emotion by the structures of
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD49695 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1275
opinion network. There is significant correlation
between emotion and structures of news network as
we expected. The performance of the prediction based
on opinion network is more stable and accurate than
existing models. In addition, we propose a threshold-
based net- work growing strategy for pruning the
network. The experiment verifies the rationalityof the
reduction: remaining 80% of the data can get the best
results in interrelated dataset. For less relevant
dataset, more than 95% of the data can guarantee the
best results.
FUTURE SCOPE
The proposed methodology get integrate with the any
social media platform in which the actual
manipulation will done and helps the platform to be
more secured from harm data content data sharing via
post and link.
REFERENCES
[1] XintongLi, QinkePeng, ZhiSun, Ling Chai and
Ying Wang. ”Predicting Social Emotions from
Readers’ Prespective”, DOI 10.
1109/TAFFC2017. 2695607, IEEE Transcation
on Affective computing.
[2] E. Cambria, B. Schuller, Y. Xia, and B. White,
“New avenues in knowledge bases for natural
language processing”, Knowledge- Based Syst.,
vol. 108, pp. 1 4, Sep. 2016.
[3] E. Cambria, “Affective Computing and
Sentiment Analysis”, IEEE Intell. Syst., vol.
31, no. 2, pp. 102–107, March 2016.
[4] Y. Xia, and T. -S. Chua, “Computational
Intelligence for Big Social Data Analysis
[Guest Editorial”, IEEE Comput. Intell. Mag.,
vol. 11, no. 3, pp. 8–9, August. 2016
[5] B. Zhang, X. Guan, M. J. Khan, and Y. Zhou,
“A time-varying propagation model of hot topic
on BBS sites and Blog networks”, Inf. Sci.
(Ny)., vol. 187, pp. 15–32, 2012.
[6] Z. Sun, Q. Peng, J. Lv, and J. Zhang, “A
prediction model of post subjects based on
information lifecycle in forum”, Inf. Sci. (Ny).,
vol. 337, pp. 59–71, 2016.
[7] S. Bao et al., “Joint emotion-topic modeling for
social affective text mining”, in Proceedings -
IEEE International Conference on Data Mining,
ICDM, pp. 699–704, 2009.
[8] S. Bao et al., “Mining Social Emotions from
Affective Text”, IEEE Trans. Knowl. Data
Eng., vol. 24, no. 9, pp. 1658–1670, Sep. 2012.
[9] Q. Wang, O. Wu, W. Hu, J. Yang, and W. Li,
“Ranking social emotions by learning list wise
preference”, in 1st Asian Conference on Pattern
Recognition, ACPR 2011, pp. 164–168, 2011.
[10] K. H. -Y. Lin and H. -H. Chen, “Ranking
reader emotions using pairwise loss
minimization and emotional distribution
regression”, Proc. Conf. Empir. Methods Nat.
Lang. Process. - EMNLP ’08, no. October, pp.
136–144, 2008.
[11] P. Katz, M. Singleton, and R. Wicentowski,
“SWAT-MP: The SemEval-2007 Systems for
Task 5 and Task 14”, in Proceedings of the 4th
International Workshop on Semantic
Evaluations, pp. 308- -313, 2007.
[12] Y. Rao, “Contextual Sentiment Topic Model
for Adaptive Social Emotion Classification”,
IEEE Intell. Syst., vol. 31, no. 1, pp. 41– 47,
Jan. 2016.
[13] Y. Rao, Q. Li, X. Mao, and L. Wenyin,
“Sentiment topic models for social emotion
mining”, Inf. Sci. (Ny)., vol. 266, pp. 90–100,
May 2014.
[14] Y. Rao, Q. Li, L. Wenyin, Q. Wu, and X. Quan,
“Affective topic model for social emotion
detection”, Neural Networks, vol. 58, no. 2012,
pp. 29–37, Oct. 2014.
[15] S. Poria, E. Cambria, D. Hazarika, and P. Vij,
“A Deeper Look into Sarcastic Tweets Using
Deep Convolutional Neural Networks”, Coling
2016, pp. 1601–1612, Oct. 2016.
[16] S. Aral and D. Walker, “Identifying social
influence in networks using randomized
experiments”, IEEE Intell. Syst., vol. 26, no. 5,
pp. 91–96, 2011.
[17] X. Li, J. Ouyang, and X. Zhou, “Supervised
topic models for multi-label classification”,
Neurocomputing, vol. 149, no. PB, pp. 811–
819, 2015.
[18] Y. Kim, “Convolutional Neural Networks for
Sentence Classification”, in EMNLP, vol. 21,
no. 9, pp. 1746–1751, 2014.
[19] S. Poria, E. Cambria, and A. Gelbukh, “Deep
Convolutional Neural Network Textual
Features and Multiple Kernel Learning for
Utterance-level Multimodal Sentiment
Analysis”, in EMNLP, no. September, pp.
2539–2544, 2015.
[20] C. Strapparava and R. Mihalcea, “Semeval-
2007 task 14: Affective text”, Proc. of
SemEval-2007, no. June, pp. 70–74, 2007.

Weitere ähnliche Inhalte

Ähnlich wie Analytic System Based on Prediction Analysis of Social Emotions from User Prespective

A Review Paper on Analytic System Based on Prediction Analysis of Social Emot...
A Review Paper on Analytic System Based on Prediction Analysis of Social Emot...A Review Paper on Analytic System Based on Prediction Analysis of Social Emot...
A Review Paper on Analytic System Based on Prediction Analysis of Social Emot...ijtsrd
 
Structural Balance Theory Based Recommendation for Social Service Portal
Structural Balance Theory Based Recommendation for Social Service PortalStructural Balance Theory Based Recommendation for Social Service Portal
Structural Balance Theory Based Recommendation for Social Service PortalYogeshIJTSRD
 
Detection of Fake News Using Machine Learning
Detection of Fake News Using Machine LearningDetection of Fake News Using Machine Learning
Detection of Fake News Using Machine LearningIRJET Journal
 
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET-  	  An Effective Analysis of Anti Troll System using Artificial Intell...IRJET-  	  An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...IRJET Journal
 
Personality Prediction Using Social Media Platform
Personality Prediction Using Social Media PlatformPersonality Prediction Using Social Media Platform
Personality Prediction Using Social Media PlatformIRJET Journal
 
IRJET - Social Media Intelligence Tools
IRJET -  	  Social Media Intelligence ToolsIRJET -  	  Social Media Intelligence Tools
IRJET - Social Media Intelligence ToolsIRJET Journal
 
IRJET- Post Summarization and Text Classification in Social Networking Sites
IRJET- Post Summarization and Text Classification in Social Networking SitesIRJET- Post Summarization and Text Classification in Social Networking Sites
IRJET- Post Summarization and Text Classification in Social Networking SitesIRJET Journal
 
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET-  	  Identification of Clone Attacks in Social Networking SitesIRJET-  	  Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking SitesIRJET Journal
 
Suspicious Email Detection
Suspicious Email DetectionSuspicious Email Detection
Suspicious Email DetectionSuraj Kumar
 
IRJET - Fake News Detection: A Survey
IRJET -  	  Fake News Detection: A SurveyIRJET -  	  Fake News Detection: A Survey
IRJET - Fake News Detection: A SurveyIRJET Journal
 
Privacy Protection Using Formal Logics in Onlne Social Networks
Privacy Protection Using   Formal Logics in Onlne Social NetworksPrivacy Protection Using   Formal Logics in Onlne Social Networks
Privacy Protection Using Formal Logics in Onlne Social NetworksIRJET Journal
 
IRJET- Personality Prediction System using AI
IRJET- Personality Prediction System using AIIRJET- Personality Prediction System using AI
IRJET- Personality Prediction System using AIIRJET Journal
 
IRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social NetworkIRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social NetworkIRJET Journal
 
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking WebsitesA Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking WebsitesIRJET Journal
 
Detecting Malicious Bots in Social Media Accounts Using Machine Learning Tech...
Detecting Malicious Bots in Social Media Accounts Using Machine Learning Tech...Detecting Malicious Bots in Social Media Accounts Using Machine Learning Tech...
Detecting Malicious Bots in Social Media Accounts Using Machine Learning Tech...IRJET Journal
 
An Approach to Block Negative Posts on Social Media at Server Side
An Approach to Block Negative Posts on Social Media at Server SideAn Approach to Block Negative Posts on Social Media at Server Side
An Approach to Block Negative Posts on Social Media at Server Sideijtsrd
 
Social Media Content Analyser
Social Media Content AnalyserSocial Media Content Analyser
Social Media Content AnalyserIRJET Journal
 

Ähnlich wie Analytic System Based on Prediction Analysis of Social Emotions from User Prespective (20)

A Review Paper on Analytic System Based on Prediction Analysis of Social Emot...
A Review Paper on Analytic System Based on Prediction Analysis of Social Emot...A Review Paper on Analytic System Based on Prediction Analysis of Social Emot...
A Review Paper on Analytic System Based on Prediction Analysis of Social Emot...
 
Structural Balance Theory Based Recommendation for Social Service Portal
Structural Balance Theory Based Recommendation for Social Service PortalStructural Balance Theory Based Recommendation for Social Service Portal
Structural Balance Theory Based Recommendation for Social Service Portal
 
F017433947
F017433947F017433947
F017433947
 
Detection of Fake News Using Machine Learning
Detection of Fake News Using Machine LearningDetection of Fake News Using Machine Learning
Detection of Fake News Using Machine Learning
 
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET-  	  An Effective Analysis of Anti Troll System using Artificial Intell...IRJET-  	  An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
 
Personality Prediction Using Social Media Platform
Personality Prediction Using Social Media PlatformPersonality Prediction Using Social Media Platform
Personality Prediction Using Social Media Platform
 
IRJET - Social Media Intelligence Tools
IRJET -  	  Social Media Intelligence ToolsIRJET -  	  Social Media Intelligence Tools
IRJET - Social Media Intelligence Tools
 
IRJET- Post Summarization and Text Classification in Social Networking Sites
IRJET- Post Summarization and Text Classification in Social Networking SitesIRJET- Post Summarization and Text Classification in Social Networking Sites
IRJET- Post Summarization and Text Classification in Social Networking Sites
 
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET-  	  Identification of Clone Attacks in Social Networking SitesIRJET-  	  Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking Sites
 
Suspicious Email Detection
Suspicious Email DetectionSuspicious Email Detection
Suspicious Email Detection
 
IRJET - Fake News Detection: A Survey
IRJET -  	  Fake News Detection: A SurveyIRJET -  	  Fake News Detection: A Survey
IRJET - Fake News Detection: A Survey
 
Privacy Protection Using Formal Logics in Onlne Social Networks
Privacy Protection Using   Formal Logics in Onlne Social NetworksPrivacy Protection Using   Formal Logics in Onlne Social Networks
Privacy Protection Using Formal Logics in Onlne Social Networks
 
IRJET- Personality Prediction System using AI
IRJET- Personality Prediction System using AIIRJET- Personality Prediction System using AI
IRJET- Personality Prediction System using AI
 
E017433538
E017433538E017433538
E017433538
 
IRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social NetworkIRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social Network
 
[IJET-V2I1P14] Authors:Aditi Verma, Rachana Agarwal, Sameer Bardia, Simran Sh...
[IJET-V2I1P14] Authors:Aditi Verma, Rachana Agarwal, Sameer Bardia, Simran Sh...[IJET-V2I1P14] Authors:Aditi Verma, Rachana Agarwal, Sameer Bardia, Simran Sh...
[IJET-V2I1P14] Authors:Aditi Verma, Rachana Agarwal, Sameer Bardia, Simran Sh...
 
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking WebsitesA Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking Websites
 
Detecting Malicious Bots in Social Media Accounts Using Machine Learning Tech...
Detecting Malicious Bots in Social Media Accounts Using Machine Learning Tech...Detecting Malicious Bots in Social Media Accounts Using Machine Learning Tech...
Detecting Malicious Bots in Social Media Accounts Using Machine Learning Tech...
 
An Approach to Block Negative Posts on Social Media at Server Side
An Approach to Block Negative Posts on Social Media at Server SideAn Approach to Block Negative Posts on Social Media at Server Side
An Approach to Block Negative Posts on Social Media at Server Side
 
Social Media Content Analyser
Social Media Content AnalyserSocial Media Content Analyser
Social Media Content Analyser
 

Mehr von ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

Mehr von ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Kürzlich hochgeladen

Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 

Kürzlich hochgeladen (20)

Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 

Analytic System Based on Prediction Analysis of Social Emotions from User Prespective

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 6 Issue 3, March-April 2022 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD49695 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1272 Analytic System Based on Prediction Analysis of Social Emotions from User Prespective Miss. Ashwini Ghatol1 , Prof. A. A. Chaudhari2 1 PG Scholar, 2 Assistant Professor, 1,2 Computer Science & Engineering, Prof. Ram Meghe Institute of Technology & Research, Badnera Maharashtra, India ABSTRACT Early development of Web, large numbers of documents assigned by readers’ emotions have been generated through new portals. By analyzing to the previous studies which focused on author’s perspective, our research focuses on readers’ emotions invoked by news articles. Our research paper provides meaningful assistance in social media application such as sentiment retrieval, opinion summarization and election prediction. In this paper, we predict the readers’ emotion of news, social media based on the social opinion network. Most specifically, we construct the opinion network based on the semantic distance. The communities in the news network, opinion network indicate specific events which are related to the emotions. Therefore, the news network, opinion network serves as the lexicon between events and corresponding emotions. We discussed neighbor relationship in network to predict readers’ emotions. At the last our result, our methods obtain better result than the state-of-the-art methods. Moreover, our research developed a growing strategy to prune the network for practical application. The experiment shows the rationality of the reduction for application. KEYWORD: sensing and analysis, opinion network, text mining, complex network How to cite this paper: Miss. Ashwini Ghatol | Prof. A. A. Chaudhari "Analytic System Based on Prediction Analysis of Social Emotions from User Prespective" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-6 | Issue-3, April 2022, pp.1272-1275, URL: www.ijtsrd.com/papers/ijtsrd49695.pdf Copyright © 2022 by author (s) and International Journal of Trend in Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0) EXISTING WORK In existing paper it is proposed that the system can do the prediction of emotions of the users they are taken the reference of the news article which help us to know about the users emotions regarding to such a article. In this the experiment get proposed on datasets. Social opinion prediction is a difficult research endeavor. As the initial research work on social opinion prediction, “affective text” SemEval-2007 Tasks. Intend to annotate news headlines for the evoked emotion of readers. Another research focus on readers’ emotion evoked by news sentences. Existing methods of social opinion prediction can be divided into three categories: knowledge-based techniques, statistical methods and hybrid approaches. Because of the deficiency of information of news text. it is unmanageable to annotate the emotions consistently. Knowledge-based techniques utilize existing emotional lexicon to supplement the prior knowledge for annotating the emotions. The popular emotional lexicon includes Affective Lexicon, linguistic annotation scheme, Word Net-Affect, Senti Word Net, and Sentic Net. The drawback of knowledge-based techniques is the reliance on the coverage of the emotional lexicon. These techniques cannot process terms that do not appear in the emotional lexicon. Statistical methods predict social opinion by training a statistical model based on a large number of well-labeled corpuses. PRAPOSED WORK By looking towards the technique given in existing we are proposed a business intelligence analytic module based on emotion detection regarding to the product reviews based on mining with reviews, feedback, complaints given by users this will help us the user for giving the instant and fast response and which also become very proper for business development. In proposed we can implement the opinion network and emotion opinion model on the datasets retrieved from business data. Opinion IJTSRD49695
  • 2. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD49695 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1273 prediction system will helps to predict and decision making in business intelligence. In this paper, our proposed work is to malicious post blocking using pattern matching algorithms, ration calculation based naïve baise classification for the classification of malicious user, determination of malicious user using social icon prediction, prediction analysis for the user post based on review in social icon, determination of malicious user link based on web context extraction technique. Methods Used 1. LDA 2. Social Opinion Mode Algorithm Used 1. Pattern Matching Algorithm OBJECTIVE Development of analytic algorithmic work for the business analytics Implementation of network based semantic distance. Implementation of Predictive decision making based on iconic patter matching Development of business intelligence tools for predictive analysis Fig-1: Flow chart of proposed architecture A. USER SIDE 1. Login Module In computer security, logging in (or logging on or signing in or signing on) is the process by which an individual gains access to a computer system by identifying and authenticating themselves. The user credentials are typically some form of "username" and a matching "password", and these credentials themselves are sometimes referred to as a login, (or a logon or a sign-in or a sign-on). In practice, modern secure systems also often require a second factor for extra security. When access is no longer needed, the user can log out. The very first module of our project is login module. The login page can be used for login the project in user side. Firstly we need to create the account on login page after that creating account we can sign up with that id and password. After registration of user, user is able to post the comment it is in the form of textual, link, and image also. 2. Posting of Comment Module The second module of our project is posting of comment. It is after the login module. User can post their comment and another user view this comments and also they can like or dislike that comment. From this page we can post images, link and textual data also. From that page we can go to the third module of user side and also log out button is available in second module page. Again this comment we can view on admin side of view post module. Input word: We can give the input from this module. Input is in the form of comment, link. We give the comment “I hate India” then it detect it is malicious comment or non malicious comment. Ex: I hate India. 3. Detect the Malicious Post Module The third module of our project is detect the malicious post. After the second module we can go to the third module. Third module show us malicious post, non malicious post, and trust factor and also we can send friend request to another user. Trust factor is available their for showing the nature of person. if trust factor is good then we undesstand the nature of that person. trust factor is calculated by using the number of malicious post and number of non malicious post. Trust factor is available here for security issue. Number of non_malicious Post Trust factor = Number of malicious post In this way, trust factor is to be calculated. For calculating the trust factor we need the malicious post, Number of character matches Malicious post = *100 Number of character in post Then, for non malicious post, Non –malicious post = 100 –Malicious post.
  • 3. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD49695 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1274 Ex: I hate India. Above comment shows it is malicious comment, and its malicious factor is Malicious factor = 33.33 B. ADMIN SIDE In a admin side total 6 module are present. Admin can show all data of user post. Admin have authority to unblock the block user. For access the admin account we need to register firstly, after that we can accesses this account. 1. Admin login 2. View post 3. View user 4. User malicious post calculator 5. Add training item sets 6. Blacklist link 1. Admin Login Module The very first module of our project is login module. The login page can be used used for login the project in user side. Firstly we need to create the account on login page after that creating acoount we can sign up with that id and password. 2. View Post Module View post is the second module of the admin side. It show all the post, post by user. Also we can view the date and time of the post. 3. View User Module It is the third model of admin side. we can view all user with their name and emailid. In this way second module is to be excuted. 4. User Malicious Post Calculator Module It is the fourth module of admin side. We can view all the data of user like malicious post percentage and non malicious post percentage. Also it show the blocking and unblocking of user. if the malicious percentage of user is <= 50% then this person will be block. And also admin have a authority to unblock this person. calculation of malicious post is describe above in user side. 5. Add Training Item sets Module: It is the fifth module of admin side. we can add the word in dictionary with the help of this module. And also on this module three text box is present. one for the word we have to add second is the word description and third is the their category description. In this way in this module we can add the word in our database. 6. Blacklist Link Module: It is the last module of admin side. In this module we can view the all link which is to be block. In this module also we can view the blacklist percentage. Same way we can calculate the the percentage of the blacklist module. Formula for calculated % of blacklist link Number of charecter matches in link Blacklist link = *100 Number of character in link In this way we can view all module and execute it. PROPOSED SYSTEM AND ADVANTAGES 1. Auto –blocking: If someone post her photo, but after posting this photo some people gives the bad/negative comment continuously then tis types of people will be block automatically. 2. Security: It block the malicious people by using the analysis of their post. it means it is secure as compared to the other social side. 3. No need of man power We can analysis for the milions of post. if we need to analysis of one thousand post then need man power for read them but in our project we doesn’t need the man power. 4. Time saving If we want the analysis of thousand comment then our project do this in within some second. 5. The filtration of post data with malicious determination 6. Helps the social media platform to block the use with malicious suspects. 7. Manipulation of social media user will do through malicious score before sending friend request. 8. Link malicious determination done while any link get shared on timeline 9. The proposed system will help to predict the uploaded article in various ways of factor. 10. By using the sentimental analysis the prediction model get applied to manipulate the posts. 11. Proposed system will also help to analyze the post link data using the web content extraction. CONCLUSION&FUTURE WORK CONCLUSION We analyze the online social opinions and propose social opinion model for malicious post measuring similarity among news. Due to word-embedding pre- trained on Wikipedia, model’s stability and robustness are guaranteed and can hardly be influenced by the size of news data. Based on the similarity, we construct an opinion network to detect user-generated social emotion by the structures of
  • 4. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD49695 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1275 opinion network. There is significant correlation between emotion and structures of news network as we expected. The performance of the prediction based on opinion network is more stable and accurate than existing models. In addition, we propose a threshold- based net- work growing strategy for pruning the network. The experiment verifies the rationalityof the reduction: remaining 80% of the data can get the best results in interrelated dataset. For less relevant dataset, more than 95% of the data can guarantee the best results. FUTURE SCOPE The proposed methodology get integrate with the any social media platform in which the actual manipulation will done and helps the platform to be more secured from harm data content data sharing via post and link. REFERENCES [1] XintongLi, QinkePeng, ZhiSun, Ling Chai and Ying Wang. ”Predicting Social Emotions from Readers’ Prespective”, DOI 10. 1109/TAFFC2017. 2695607, IEEE Transcation on Affective computing. [2] E. Cambria, B. Schuller, Y. Xia, and B. White, “New avenues in knowledge bases for natural language processing”, Knowledge- Based Syst., vol. 108, pp. 1 4, Sep. 2016. [3] E. Cambria, “Affective Computing and Sentiment Analysis”, IEEE Intell. Syst., vol. 31, no. 2, pp. 102–107, March 2016. [4] Y. Xia, and T. -S. Chua, “Computational Intelligence for Big Social Data Analysis [Guest Editorial”, IEEE Comput. Intell. Mag., vol. 11, no. 3, pp. 8–9, August. 2016 [5] B. Zhang, X. Guan, M. J. Khan, and Y. Zhou, “A time-varying propagation model of hot topic on BBS sites and Blog networks”, Inf. Sci. (Ny)., vol. 187, pp. 15–32, 2012. [6] Z. Sun, Q. Peng, J. Lv, and J. Zhang, “A prediction model of post subjects based on information lifecycle in forum”, Inf. Sci. (Ny)., vol. 337, pp. 59–71, 2016. [7] S. Bao et al., “Joint emotion-topic modeling for social affective text mining”, in Proceedings - IEEE International Conference on Data Mining, ICDM, pp. 699–704, 2009. [8] S. Bao et al., “Mining Social Emotions from Affective Text”, IEEE Trans. Knowl. Data Eng., vol. 24, no. 9, pp. 1658–1670, Sep. 2012. [9] Q. Wang, O. Wu, W. Hu, J. Yang, and W. Li, “Ranking social emotions by learning list wise preference”, in 1st Asian Conference on Pattern Recognition, ACPR 2011, pp. 164–168, 2011. [10] K. H. -Y. Lin and H. -H. Chen, “Ranking reader emotions using pairwise loss minimization and emotional distribution regression”, Proc. Conf. Empir. Methods Nat. Lang. Process. - EMNLP ’08, no. October, pp. 136–144, 2008. [11] P. Katz, M. Singleton, and R. Wicentowski, “SWAT-MP: The SemEval-2007 Systems for Task 5 and Task 14”, in Proceedings of the 4th International Workshop on Semantic Evaluations, pp. 308- -313, 2007. [12] Y. Rao, “Contextual Sentiment Topic Model for Adaptive Social Emotion Classification”, IEEE Intell. Syst., vol. 31, no. 1, pp. 41– 47, Jan. 2016. [13] Y. Rao, Q. Li, X. Mao, and L. Wenyin, “Sentiment topic models for social emotion mining”, Inf. Sci. (Ny)., vol. 266, pp. 90–100, May 2014. [14] Y. Rao, Q. Li, L. Wenyin, Q. Wu, and X. Quan, “Affective topic model for social emotion detection”, Neural Networks, vol. 58, no. 2012, pp. 29–37, Oct. 2014. [15] S. Poria, E. Cambria, D. Hazarika, and P. Vij, “A Deeper Look into Sarcastic Tweets Using Deep Convolutional Neural Networks”, Coling 2016, pp. 1601–1612, Oct. 2016. [16] S. Aral and D. Walker, “Identifying social influence in networks using randomized experiments”, IEEE Intell. Syst., vol. 26, no. 5, pp. 91–96, 2011. [17] X. Li, J. Ouyang, and X. Zhou, “Supervised topic models for multi-label classification”, Neurocomputing, vol. 149, no. PB, pp. 811– 819, 2015. [18] Y. Kim, “Convolutional Neural Networks for Sentence Classification”, in EMNLP, vol. 21, no. 9, pp. 1746–1751, 2014. [19] S. Poria, E. Cambria, and A. Gelbukh, “Deep Convolutional Neural Network Textual Features and Multiple Kernel Learning for Utterance-level Multimodal Sentiment Analysis”, in EMNLP, no. September, pp. 2539–2544, 2015. [20] C. Strapparava and R. Mihalcea, “Semeval- 2007 task 14: Affective text”, Proc. of SemEval-2007, no. June, pp. 70–74, 2007.