Efficiently Identification of Misrepresentation in Social Media Based on Rake Algorithm

  • Authors

    • Prof. Devendra P. Gadekar
    • Dr. Y. P. Singh
    2018-12-09
    https://doi.org/10.14419/ijet.v7i4.36.23919
  • UGC, RAKE algorithm, TextRank, Supervised Learning
  • Abstract

    The social organizations offer an extensive variety of extra data to advance standard learning calculations; the most difficult part is separating the applicable data from arranged information. Fake conduct is indistinctly disguised both in nearby and social information, making it considerably harder to define valuable contribution for expectation models. Beginning from master learning, this paper prevails to efficiently join interpersonal organization impacts to identify misrepresentation for the Belgian legislative standardized savings foundation, and to enhance the execution of conventional non-social extortion expectation undertakings. Finding the semantic reasonable subjects from the colossal measure of rational points from the substantial measure of User Generated Content (UGC) in online networking would encourage numerous downstream uses of shrewd processing. Subject models, as a standout amongst the most effective calculations, have been broadly used to find the inactive semantic examples in content accumulations. In any case, one key shortcoming of point models is that they require archives with certain length to give dependable measurements adversary producing intelligent themes. In Twitter, the clients’ tweets are for the most part short and loud. Perceptions of word events are immeasurable for theme models. The RAKE algorithm shows better performance than TextRank, Supervised Learning.

     

     


     
  • References

    1. [1] Berry MJA and Linoff GS, “Mastering Data mining: The art and science of customer relationship management†Canada Wiley, 2000.

      [2] New W. , “Pentagon failed to study privacy issues in data mining effortâ€, IG says 2004.

      [3] Verykios, VS; Bertino, E; Fovino, IN; Provenza, LP; Saygin, and Theodoridis, Y. “State-of -the-art in Privacy Preserving Data Miningâ€, SIGMOD Record. Volume 33, Issue 1:50-57 2004.

      [4] Yuan He, Cheng Wang and Changjun Jiang, “Mining Coherent Topics with Pre-learned Interest Knowledge in Twitterâ€, DOI 10.1109/ACCESS.2017.2696558, IEEE Access, 2017.

      [5] Aiello, W., Chung, F., Lu, L., “Random evolution of massive graphsâ€, M.G.C. (eds.) Handbook of Massive DataSets, pp. 97-122. Kluwer, Dordrecht (2002).

      [6] Viaene, R. Derrig, G. Dedene, “A Case Study of Applying Boosting Naive Bayes to Claim FraudDiagnosisâ€, IEEE Transactions on Knowledge and Data Engineering, vol. 16, pp. 612- 620, 2004.

      [7] Hongyu Gao, Jun Hu, Tuo Huang, Jingnan Wang, Yan Chen “Internet Computingâ€, IEEE 15(4), July-Aug. 201,1 56 - 63, (journal article).

      [8] W. Lee, D. Xiang, “Information-theoretic Measures for Anomaly Detectionâ€, In proceedings of 2001 IEEE Symposium on Security and Privacy, pp. 130-143, 2001.

      [9] Wen-jun, S., and Hang-ming, Q, “A Social Network Analysis on Blogspheresâ€, In Proceedings of the 15th IEEE International Conference on Management Science and Engineering, 2008, pp.1769 - 1773, Long Beach, CA, USA.

      [10] Bandar Alghamdi, Jason Watson, Yue Xu. “Toward Detecting Malicious Links in Online Social Networks through User Behaviorâ€, IEEE/WIC/ACM International Conference on Web Intelligence Workshops, 2016.

      [11] Anna Leontjeva, Konstantin Tretyakov, Jaak Vilo, Taavi Tamkivi,“Fraud Detection: Methods of Analysis for Hypergraph Dataâ€,Advances in Social Networks Analysis and Mining (ASONAM), 2012 IEEE/ACM International Conference on, 2012.

      [12] Michalis Faloutsos, Thomas Karagiannis, and Seung-Hyun Moon,“Online social networksâ€, Network, IEEE, 24(5):4-5, 2010.

      [13] Shariati, B., Soraya, S., Seddigh, R., Keshavarz-Akhlaghi, A.-A., Azarnik, S. “Comparison between the personality traits of the parents with children addicted to methamphetamines and that of the parents of the healthy childrenâ€, (2018) International Journal of Pharmaceutical Research, 10 (3), pp. 122-125.

      [14] Hongyu Gao, Jun Hu, Tuo Huang, Jingnan Wang, and Yan Chen, â€Security issues in online social networksâ€, Internet Computing, IEEE, volume, 15(4):56-63, 2011.

      [15] Prateek Joshi and CC Jay Kuo, â€Security and privacy in online social networks: A surveyâ€, In Multimedia and Expo (ICME), 2011 IEEE International Conference on, pages 1-6. IEEE, 2011.

  • Downloads

  • How to Cite

    Devendra P. Gadekar, P., & Y. P. Singh, D. (2018). Efficiently Identification of Misrepresentation in Social Media Based on Rake Algorithm. International Journal of Engineering & Technology, 7(4.36), 471-474. https://doi.org/10.14419/ijet.v7i4.36.23919

    Received date: 2018-12-14

    Accepted date: 2018-12-14

    Published date: 2018-12-09