SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2366
TREND ANALYSIS ON TWITTER
Mr. Rahul Neve1, Abhishek Singh2, Sundaresh Narayanan3
1Mr. Rahul Neve, Dept of IT, Thakur College of Engineering and Technology, Maharashtra, India
2Abhishek Singh, Dept of IT, Thakur College of Engineering and Technology, Maharashtra, India
3Sundaresh Narayanan, Dept of IT, Thakur College of Engineering and Technology, Maharashtra, India
---------------------------------------------------------------------------***---------------------------------------------------------------------------
ABSTRACT- In social media forums, it is important for public’s perception that an organization is well notify and able to
provide services that truly meet their needs and interests. Social media activity by citizens is growing exponentially and there is
some evidence that certain government agencies are embracing these engagement, and communication tools, albeit at a far
slower pace than other societal sectors. The on-going provocation is that the government generally lacks behind when it comes to
adaption of technology tools. Social media tools and social media analytics are no anomaly. While this paper focuses on
government organizations, it’s fair to say all federal organization are playing catch up with commonly employed social media
communication platforms. The government is even further behind in the area of social media analytics, the cluster of data from
online communication tools and the interpretation of this data to form actionable and relevant information. Solutions to the
provocation of this knowledge discovery from the magnitude of social media data must be automated and sophisticated enough to
detect sentiment, trends, influencers, and real time issues as they arise. The basis of any social media analytics solution will be the
power of its search and discovery knowledge engine.
Keywords: LDA algorithm, Clustering, Trend Analysis, Social Media Analytics
1. INTRODUCTION
Despite the talks in the market place regarding what social media is, or how it should, impact government operations, the use
of information technology to change the way government works and engages with citizens is not new. President Bill Clinton,
with the assistance of Vice President Al Gore, initiated what was then called The National Performance Review, which has
evolved over time into The National Partnership for generating Government. That endeavor focused on generating greater
operational efficiencies, as well as identifying how government could grasp the technology to work more effectively. The
overall goal was to cut government costs. This undermines efforts to increase efficiency, effectiveness, and responsiveness.
The proliferation of social media throughout American society has put the spotlight on a long standing troubling perception of
government – that it is often slow to react and hesitant to move to new solutions and technologies that the general public has
already adopted, vetted, and use in a ubiquitous manner. This slow adaptation is often a result of common issues, investigation
of potential risks and security concerns, and/or compatibility analysis. Many argue this scrutiny and delay is overbearing and
slows the services government agencies provide to the public; others argue it is simply a result of years of entrenched
bureaucracy and regulations that lead to slow adaptation to a changing world and dynamic operating environment There are,
of course, those who argue that this late-adopter role is one that is necessary to mitigate the risks to the mission of any given
agency. In any case, it is clear that while a major part of society has made social media a permanent and complete aspect of
their communication strategy, the government, with only a few exceptions, has not yet fully adopted by social media and
analytics, and integrated them into how the government conducts its business. What is even unclear is just how government
can grasp the myriad of social media tools and channels in order to provide superior service to a better informed and more
engaged citizenry.
1.1 MATERIALS AND MANAGEMENT
Requirements
 Web browser
 Windows Operating System
 Windows XP, Windows 7,8
 MySQL Server
Methodology Used:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
For developing a project or software it is important to know the flow or which type of software development lifecycle model
the system is going to use. Out of various SDLC models there is a need to choose the model which will be perfect for the project
and therefore Iterative model has been selected.
As the name suggest Iterative model is basically an iterative process where the input is processed through various phases and
if it doesn’t satisfy it is repeated until it becomes satisfactory.
The model consists of five phases namely:
PHASE I:
1. Planning: Applying agile methodology for event system event planning for better usage of resources and time with
great performance.
2. Analysis: Prepare a detailed analysis on present event system and overcome its limitation in our upcoming system.
3. Design: Integration of data and designing of system event app.
4. Coding: Writing the whole system app code and taking help of an open source.
PHASE II:
1. Testing: Doing various tests on system like unit testing, smoke testing, stress testing, integration testing, regression
testing, system testing etc. to check whether the integrated system works as the client desires.
2. Deployment: Conduct beta testing for identifying bugs and errors left out and improvements that can be made. After
the testing and approval, deploy the proposed system.
Chart 1: Iterative model
Feasibility Study:
Prior developing the product or software it is necessary to know all the factors important for developing a good product. It is
important to know the resource requirements, strengths and weakness of the project, etc. All these factors ultimately revolve
around two major criteria cost and value, in order to know how much feasible, it is to create a project and how much profit will
it return.
The feasibility of a particular software product can be determined from the following factors:-
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2377
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
1. Technical Feasibility.
2. Operational Feasibility.
3. Economic Feasibility.
4. Legal Feasibility.
Chart 2: Flowchart of Model.
1.2 Result
Users can look for social events happening around them through our web application. They can get acknowledged of recent
trending events just by entering the keywords. Tweets from all around the world can be accessed with the click of a button.
Users can view the result graphically which will be segregated on the basis of time, location and legitimacy.
a) Output
Figure 1: Query Output
b) Outcomes
The client should be able to connect to the server properly without any problems. The connection establishment between
the mobile device and the server should take minimal time. The mobile device should be able receive data from the server
uninterruptedly. Information provided by the application should be correct and as per the user’s need.
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2378
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
c) Discussion of the results
Connection can be established easily provided that the server is on. The connection with the server takes time as it uses
Internet connection. Receiving data from the server takes time. Information coming from the database is correct
1.3 Discussion
Before the introduction of our web application users had to have an access of Television or Newspapers to get aware about the
trending events happening around us. To overcome this problem, we introduced a web application that could present you with
trending tweets from around the world with the click of a button. It becomes convenient for users to acknowledge themselves
about the events around them through a non-complex application.
Latent Dirichlet Allocation Algorithm has been used to cluster the tweets into different categories. Providing security to
authorized user using Two Factor authentication was a one of the major problem.
2. Conclusion
In this project we develop a real-time non parametric model to know about the recent trends. It successfully detects the recent
trends and it also shows the trends according to the location of a user.
3. References
1. Hsinchun Chen “Exploring extremism and terrorism on the web: The dark web project” 2007
2. Amit Pratap Singh, Dr, R. C. Jain “A survey on different phases of web usage for Anomaly user Behavior Investigation”
2007
3. Floras Tsai, KapLuk Chan “Detecting cyber security threats in weblogs using probabilistic model” 2007
4. Yulei Zhang, Shuo Zeng, Li Fan, Yan Dang, Catherine A. Larson and Hsinchun Chen “Dark web forums portal: Searching
and analyzing Jihadist forums” 2009.
5. The application responds quickly while making a decent decision. The application uses LDA algorithm which is
efficient for clustering. Irrespective of users location he can access trending tweets around the world. Positive and
negative tweets are being clustered to perform sentimental analysis.
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2379

More Related Content

What's hot

IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET Journal
 
Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application SecuritySaadSaif6
 
Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo. Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo. Luis Noguera
 
Covert communication in mobile applications
Covert communication in mobile applicationsCovert communication in mobile applications
Covert communication in mobile applicationsAndrey Apuhtin
 
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011Lumension
 
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTSSECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTSijseajournal
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportSymantec
 
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMSA MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMSIJNSA Journal
 
Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.Veracode
 
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using FirebaseIRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using FirebaseIRJET Journal
 
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...Black Duck by Synopsys
 
White Paper - Android Security
White Paper - Android SecurityWhite Paper - Android Security
White Paper - Android Securityryanfarmer
 
IRJET- Approaching Highlights and Security issues in Software Engineering...
IRJET-  	  Approaching Highlights and Security issues in Software Engineering...IRJET-  	  Approaching Highlights and Security issues in Software Engineering...
IRJET- Approaching Highlights and Security issues in Software Engineering...IRJET Journal
 
Nolong.in: an android based incident notification application with push notif...
Nolong.in: an android based incident notification application with push notif...Nolong.in: an android based incident notification application with push notif...
Nolong.in: an android based incident notification application with push notif...IJECEIAES
 
Ponemon Institute Research Report
Ponemon Institute Research ReportPonemon Institute Research Report
Ponemon Institute Research ReportPeter Tutty
 
Insightful Research: The State of Mobile Application Insecurity
Insightful Research: The State of Mobile Application Insecurity Insightful Research: The State of Mobile Application Insecurity
Insightful Research: The State of Mobile Application Insecurity Casey Lucas
 
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODELSECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODELIJCSEIT Journal
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickEswar Publications
 
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 - Mark - Fullbright
 

What's hot (20)

IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
 
Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application Security
 
Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo. Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo.
 
Covert communication in mobile applications
Covert communication in mobile applicationsCovert communication in mobile applications
Covert communication in mobile applications
 
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
 
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTSSECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
 
20120140503012
2012014050301220120140503012
20120140503012
 
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMSA MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
 
Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.
 
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using FirebaseIRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
 
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
 
White Paper - Android Security
White Paper - Android SecurityWhite Paper - Android Security
White Paper - Android Security
 
IRJET- Approaching Highlights and Security issues in Software Engineering...
IRJET-  	  Approaching Highlights and Security issues in Software Engineering...IRJET-  	  Approaching Highlights and Security issues in Software Engineering...
IRJET- Approaching Highlights and Security issues in Software Engineering...
 
Nolong.in: an android based incident notification application with push notif...
Nolong.in: an android based incident notification application with push notif...Nolong.in: an android based incident notification application with push notif...
Nolong.in: an android based incident notification application with push notif...
 
Ponemon Institute Research Report
Ponemon Institute Research ReportPonemon Institute Research Report
Ponemon Institute Research Report
 
Insightful Research: The State of Mobile Application Insecurity
Insightful Research: The State of Mobile Application Insecurity Insightful Research: The State of Mobile Application Insecurity
Insightful Research: The State of Mobile Application Insecurity
 
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODELSECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013
 

Similar to Trend Analysis on Twitter Using LDA Algorithm

IRJET- City Complaint Management System
IRJET-  	  City Complaint Management SystemIRJET-  	  City Complaint Management System
IRJET- City Complaint Management SystemIRJET Journal
 
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...IJNSA Journal
 
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster WarningIRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster WarningIRJET Journal
 
Smart Traffic Monitoring System Report
Smart Traffic Monitoring System ReportSmart Traffic Monitoring System Report
Smart Traffic Monitoring System ReportALi Baker
 
IRJET- Speech and Hearing
IRJET- Speech and HearingIRJET- Speech and Hearing
IRJET- Speech and HearingIRJET Journal
 
IRJET - Application for Public Issues
IRJET -  	  Application for Public IssuesIRJET -  	  Application for Public Issues
IRJET - Application for Public IssuesIRJET Journal
 
Controlling Anti Ragging System using Android
Controlling Anti Ragging System using AndroidControlling Anti Ragging System using Android
Controlling Anti Ragging System using AndroidIRJET Journal
 
IRJET- A Social Webbing Service Vivified on Design Patterns
IRJET-  	  A Social Webbing Service Vivified on Design PatternsIRJET-  	  A Social Webbing Service Vivified on Design Patterns
IRJET- A Social Webbing Service Vivified on Design PatternsIRJET Journal
 
IRJET - Municipal Corporation Complaint Management System
IRJET -  	  Municipal Corporation Complaint Management SystemIRJET -  	  Municipal Corporation Complaint Management System
IRJET - Municipal Corporation Complaint Management SystemIRJET Journal
 
Fake News and Message Detection
Fake News and Message DetectionFake News and Message Detection
Fake News and Message DetectionIRJET Journal
 
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...IRJET Journal
 
IRJET - Analysis of Fake Ranking on Social Media: Twitter
IRJET - Analysis of Fake Ranking on Social Media: TwitterIRJET - Analysis of Fake Ranking on Social Media: Twitter
IRJET - Analysis of Fake Ranking on Social Media: TwitterIRJET Journal
 
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTCRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTIRJET Journal
 
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data MiningIRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data MiningIRJET Journal
 
TWITTER SENTIMENT ANALYSIS
TWITTER SENTIMENT ANALYSISTWITTER SENTIMENT ANALYSIS
TWITTER SENTIMENT ANALYSISIRJET Journal
 
TWITTER SENTIMENT ANALYSIS
TWITTER SENTIMENT ANALYSISTWITTER SENTIMENT ANALYSIS
TWITTER SENTIMENT ANALYSISIRJET Journal
 
IRJET- Data Mining and Cluster based Machine Learning in Mobile Online Social...
IRJET- Data Mining and Cluster based Machine Learning in Mobile Online Social...IRJET- Data Mining and Cluster based Machine Learning in Mobile Online Social...
IRJET- Data Mining and Cluster based Machine Learning in Mobile Online Social...IRJET Journal
 
IRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based ApproachIRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based ApproachIRJET Journal
 
IRJET - Social Network Message Credibility: An Agent-based Approach
IRJET -  	  Social Network Message Credibility: An Agent-based ApproachIRJET -  	  Social Network Message Credibility: An Agent-based Approach
IRJET - Social Network Message Credibility: An Agent-based ApproachIRJET Journal
 

Similar to Trend Analysis on Twitter Using LDA Algorithm (20)

IRJET- City Complaint Management System
IRJET-  	  City Complaint Management SystemIRJET-  	  City Complaint Management System
IRJET- City Complaint Management System
 
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
 
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster WarningIRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster Warning
 
Smart Traffic Monitoring System Report
Smart Traffic Monitoring System ReportSmart Traffic Monitoring System Report
Smart Traffic Monitoring System Report
 
IRJET- Speech and Hearing
IRJET- Speech and HearingIRJET- Speech and Hearing
IRJET- Speech and Hearing
 
IRJET - Application for Public Issues
IRJET -  	  Application for Public IssuesIRJET -  	  Application for Public Issues
IRJET - Application for Public Issues
 
Controlling Anti Ragging System using Android
Controlling Anti Ragging System using AndroidControlling Anti Ragging System using Android
Controlling Anti Ragging System using Android
 
IRJET- A Social Webbing Service Vivified on Design Patterns
IRJET-  	  A Social Webbing Service Vivified on Design PatternsIRJET-  	  A Social Webbing Service Vivified on Design Patterns
IRJET- A Social Webbing Service Vivified on Design Patterns
 
IRJET - Municipal Corporation Complaint Management System
IRJET -  	  Municipal Corporation Complaint Management SystemIRJET -  	  Municipal Corporation Complaint Management System
IRJET - Municipal Corporation Complaint Management System
 
Fake News and Message Detection
Fake News and Message DetectionFake News and Message Detection
Fake News and Message Detection
 
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...
 
IRJET - Analysis of Fake Ranking on Social Media: Twitter
IRJET - Analysis of Fake Ranking on Social Media: TwitterIRJET - Analysis of Fake Ranking on Social Media: Twitter
IRJET - Analysis of Fake Ranking on Social Media: Twitter
 
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTCRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECAST
 
social networking site
social networking sitesocial networking site
social networking site
 
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data MiningIRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
 
TWITTER SENTIMENT ANALYSIS
TWITTER SENTIMENT ANALYSISTWITTER SENTIMENT ANALYSIS
TWITTER SENTIMENT ANALYSIS
 
TWITTER SENTIMENT ANALYSIS
TWITTER SENTIMENT ANALYSISTWITTER SENTIMENT ANALYSIS
TWITTER SENTIMENT ANALYSIS
 
IRJET- Data Mining and Cluster based Machine Learning in Mobile Online Social...
IRJET- Data Mining and Cluster based Machine Learning in Mobile Online Social...IRJET- Data Mining and Cluster based Machine Learning in Mobile Online Social...
IRJET- Data Mining and Cluster based Machine Learning in Mobile Online Social...
 
IRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based ApproachIRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based Approach
 
IRJET - Social Network Message Credibility: An Agent-based Approach
IRJET -  	  Social Network Message Credibility: An Agent-based ApproachIRJET -  	  Social Network Message Credibility: An Agent-based Approach
IRJET - Social Network Message Credibility: An Agent-based Approach
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 

Recently uploaded (20)

Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 

Trend Analysis on Twitter Using LDA Algorithm

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2366 TREND ANALYSIS ON TWITTER Mr. Rahul Neve1, Abhishek Singh2, Sundaresh Narayanan3 1Mr. Rahul Neve, Dept of IT, Thakur College of Engineering and Technology, Maharashtra, India 2Abhishek Singh, Dept of IT, Thakur College of Engineering and Technology, Maharashtra, India 3Sundaresh Narayanan, Dept of IT, Thakur College of Engineering and Technology, Maharashtra, India ---------------------------------------------------------------------------***--------------------------------------------------------------------------- ABSTRACT- In social media forums, it is important for public’s perception that an organization is well notify and able to provide services that truly meet their needs and interests. Social media activity by citizens is growing exponentially and there is some evidence that certain government agencies are embracing these engagement, and communication tools, albeit at a far slower pace than other societal sectors. The on-going provocation is that the government generally lacks behind when it comes to adaption of technology tools. Social media tools and social media analytics are no anomaly. While this paper focuses on government organizations, it’s fair to say all federal organization are playing catch up with commonly employed social media communication platforms. The government is even further behind in the area of social media analytics, the cluster of data from online communication tools and the interpretation of this data to form actionable and relevant information. Solutions to the provocation of this knowledge discovery from the magnitude of social media data must be automated and sophisticated enough to detect sentiment, trends, influencers, and real time issues as they arise. The basis of any social media analytics solution will be the power of its search and discovery knowledge engine. Keywords: LDA algorithm, Clustering, Trend Analysis, Social Media Analytics 1. INTRODUCTION Despite the talks in the market place regarding what social media is, or how it should, impact government operations, the use of information technology to change the way government works and engages with citizens is not new. President Bill Clinton, with the assistance of Vice President Al Gore, initiated what was then called The National Performance Review, which has evolved over time into The National Partnership for generating Government. That endeavor focused on generating greater operational efficiencies, as well as identifying how government could grasp the technology to work more effectively. The overall goal was to cut government costs. This undermines efforts to increase efficiency, effectiveness, and responsiveness. The proliferation of social media throughout American society has put the spotlight on a long standing troubling perception of government – that it is often slow to react and hesitant to move to new solutions and technologies that the general public has already adopted, vetted, and use in a ubiquitous manner. This slow adaptation is often a result of common issues, investigation of potential risks and security concerns, and/or compatibility analysis. Many argue this scrutiny and delay is overbearing and slows the services government agencies provide to the public; others argue it is simply a result of years of entrenched bureaucracy and regulations that lead to slow adaptation to a changing world and dynamic operating environment There are, of course, those who argue that this late-adopter role is one that is necessary to mitigate the risks to the mission of any given agency. In any case, it is clear that while a major part of society has made social media a permanent and complete aspect of their communication strategy, the government, with only a few exceptions, has not yet fully adopted by social media and analytics, and integrated them into how the government conducts its business. What is even unclear is just how government can grasp the myriad of social media tools and channels in order to provide superior service to a better informed and more engaged citizenry. 1.1 MATERIALS AND MANAGEMENT Requirements  Web browser  Windows Operating System  Windows XP, Windows 7,8  MySQL Server Methodology Used:
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 For developing a project or software it is important to know the flow or which type of software development lifecycle model the system is going to use. Out of various SDLC models there is a need to choose the model which will be perfect for the project and therefore Iterative model has been selected. As the name suggest Iterative model is basically an iterative process where the input is processed through various phases and if it doesn’t satisfy it is repeated until it becomes satisfactory. The model consists of five phases namely: PHASE I: 1. Planning: Applying agile methodology for event system event planning for better usage of resources and time with great performance. 2. Analysis: Prepare a detailed analysis on present event system and overcome its limitation in our upcoming system. 3. Design: Integration of data and designing of system event app. 4. Coding: Writing the whole system app code and taking help of an open source. PHASE II: 1. Testing: Doing various tests on system like unit testing, smoke testing, stress testing, integration testing, regression testing, system testing etc. to check whether the integrated system works as the client desires. 2. Deployment: Conduct beta testing for identifying bugs and errors left out and improvements that can be made. After the testing and approval, deploy the proposed system. Chart 1: Iterative model Feasibility Study: Prior developing the product or software it is necessary to know all the factors important for developing a good product. It is important to know the resource requirements, strengths and weakness of the project, etc. All these factors ultimately revolve around two major criteria cost and value, in order to know how much feasible, it is to create a project and how much profit will it return. The feasibility of a particular software product can be determined from the following factors:- © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2377
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 1. Technical Feasibility. 2. Operational Feasibility. 3. Economic Feasibility. 4. Legal Feasibility. Chart 2: Flowchart of Model. 1.2 Result Users can look for social events happening around them through our web application. They can get acknowledged of recent trending events just by entering the keywords. Tweets from all around the world can be accessed with the click of a button. Users can view the result graphically which will be segregated on the basis of time, location and legitimacy. a) Output Figure 1: Query Output b) Outcomes The client should be able to connect to the server properly without any problems. The connection establishment between the mobile device and the server should take minimal time. The mobile device should be able receive data from the server uninterruptedly. Information provided by the application should be correct and as per the user’s need. © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2378
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 c) Discussion of the results Connection can be established easily provided that the server is on. The connection with the server takes time as it uses Internet connection. Receiving data from the server takes time. Information coming from the database is correct 1.3 Discussion Before the introduction of our web application users had to have an access of Television or Newspapers to get aware about the trending events happening around us. To overcome this problem, we introduced a web application that could present you with trending tweets from around the world with the click of a button. It becomes convenient for users to acknowledge themselves about the events around them through a non-complex application. Latent Dirichlet Allocation Algorithm has been used to cluster the tweets into different categories. Providing security to authorized user using Two Factor authentication was a one of the major problem. 2. Conclusion In this project we develop a real-time non parametric model to know about the recent trends. It successfully detects the recent trends and it also shows the trends according to the location of a user. 3. References 1. Hsinchun Chen “Exploring extremism and terrorism on the web: The dark web project” 2007 2. Amit Pratap Singh, Dr, R. C. Jain “A survey on different phases of web usage for Anomaly user Behavior Investigation” 2007 3. Floras Tsai, KapLuk Chan “Detecting cyber security threats in weblogs using probabilistic model” 2007 4. Yulei Zhang, Shuo Zeng, Li Fan, Yan Dang, Catherine A. Larson and Hsinchun Chen “Dark web forums portal: Searching and analyzing Jihadist forums” 2009. 5. The application responds quickly while making a decent decision. The application uses LDA algorithm which is efficient for clustering. Irrespective of users location he can access trending tweets around the world. Positive and negative tweets are being clustered to perform sentimental analysis. © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2379