Efficiently Identification of Misrepresentation in Social Media Based on Rake Algorithm
-
https://doi.org/10.14419/ijet.v7i4.36.23919
Received date: December 14, 2018
Accepted date: December 14, 2018
Published date: December 9, 2018
-
UGC, RAKE algorithm, TextRank, Supervised Learning -
Abstract
The social organizations offer an extensive variety of extra data to advance standard learning calculations; the most difficult part is separating the applicable data from arranged information. Fake conduct is indistinctly disguised both in nearby and social information, making it considerably harder to define valuable contribution for expectation models. Beginning from master learning, this paper prevails to efficiently join interpersonal organization impacts to identify misrepresentation for the Belgian legislative standardized savings foundation, and to enhance the execution of conventional non-social extortion expectation undertakings. Finding the semantic reasonable subjects from the colossal measure of rational points from the substantial measure of User Generated Content (UGC) in online networking would encourage numerous downstream uses of shrewd processing. Subject models, as a standout amongst the most effective calculations, have been broadly used to find the inactive semantic examples in content accumulations. In any case, one key shortcoming of point models is that they require archives with certain length to give dependable measurements adversary producing intelligent themes. In Twitter, the clients’ tweets are for the most part short and loud. Perceptions of word events are immeasurable for theme models. The RAKE algorithm shows better performance than TextRank, Supervised Learning.
-
References
- Berry MJA and Linoff GS, “Mastering Data mining: The art and science of customer relationship management” Canada Wiley, 2000.
- New W. , “Pentagon failed to study privacy issues in data mining effort”, IG says 2004.
- Verykios, VS; Bertino, E; Fovino, IN; Provenza, LP; Saygin, and Theodoridis, Y. “State-of -the-art in Privacy Preserving Data Min-ing”, SIGMOD Record. Volume 33, Issue 1:50-57 2004.
- Yuan He, Cheng Wang and Changjun Jiang, “Mining Coherent Topics with Pre-learned Interest Knowledge in Twitter”, DOI 10.1109/ACCESS.2017.2696558, IEEE Access, 2017.
- Aiello, W., Chung, F., Lu, L., “Random evolution of massive graphs”, M.G.C. (eds.) Handbook of Massive DataSets, pp. 97-122. Kluwer, Dordrecht (2002).
- Viaene, R. Derrig, G. Dedene, “A Case Study of Applying Boost-ing Naive Bayes to Claim FraudDiagnosis”, IEEE Transactions on Knowledge and Data Engineering, vol. 16, pp. 612- 620, 2004.
- Hongyu Gao, Jun Hu, Tuo Huang, Jingnan Wang, Yan Chen “In-ternet Computing”, IEEE 15(4), July-Aug. 201,1 56 - 63, (journal article).
- W. Lee, D. Xiang, “Information-theoretic Measures for Anomaly Detection”, In proceedings of 2001 IEEE Symposium on Security and Privacy, pp. 130-143, 2001.
- Wen-jun, S., and Hang-ming, Q, “A Social Network Analysis on Blogspheres”, In Proceedings of the 15th IEEE International Con-ference on Management Science and Engineering, 2008, pp.1769 - 1773, Long Beach, CA, USA.
- Bandar Alghamdi, Jason Watson, Yue Xu. “Toward Detecting Ma-licious Links in Online Social Networks through User Behavior”, IEEE/WIC/ACM International Conference on Web Intelligence Workshops, 2016.
- Anna Leontjeva, Konstantin Tretyakov, Jaak Vilo, Taavi Tamkivi,“Fraud Detection: Methods of Analysis for Hypergraph Data”,Advances in Social Networks Analysis and Mining (ASONAM), 2012 IEEE/ACM International Conference on, 2012.
- Michalis Faloutsos, Thomas Karagiannis, and Seung-Hyun Moon,“Online social networks”, Network, IEEE, 24(5):4-5, 2010.
- Shariati, B., Soraya, S., Seddigh, R., Keshavarz-Akhlaghi, A.-A., Azarnik, S. “Comparison between the personality traits of the par-ents with children addicted to methamphetamines and that of the parents of the healthy children”, (2018) International Journal of Pharmaceutical Research, 10 (3), pp. 122-125.
- Hongyu Gao, Jun Hu, Tuo Huang, Jingnan Wang, and Yan Chen, ”Security issues in online social networks”, Internet Compu-ting, IEEE, volume, 15(4):56-63, 2011.
- Prateek Joshi and CC Jay Kuo, ”Security and privacy in online so-cial networks: A survey”, In Multimedia and Expo (ICME), 2011 IEEE International Conference on, pages 1-6. IEEE, 2011.
-
Downloads
-
How to Cite
Devendra P. Gadekar, P., & Y. P. Singh, D. (2018). Efficiently Identification of Misrepresentation in Social Media Based on Rake Algorithm. International Journal of Engineering and Technology, 7(4.36), 471-474. https://doi.org/10.14419/ijet.v7i4.36.23919
