Submit Search
Upload
Trend Analysis on Twitter Using LDA Algorithm
•
0 likes
•
16 views
AI-enhanced title
IRJET Journal
Follow
https://www.irjet.net/archives/V6/i4/IRJET-V6I4509.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
IJNSA Journal
IRJET- Authentic News Summarization
IRJET- Authentic News Summarization
IRJET Journal
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014
Kim Jensen
Review on College Event Organizer
Review on College Event Organizer
IRJET Journal
Factors influncing quality of mobile apps role of mobile app development life...
Factors influncing quality of mobile apps role of mobile app development life...
IJCSEA Journal
Android Application for Updation
Android Application for Updation
IRJET Journal
2013 Mobile Application Security Survey
2013 Mobile Application Security Survey
Bee_Ware
Survey mobile app
Survey mobile app
eSAT Publishing House
Recommended
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
IJNSA Journal
IRJET- Authentic News Summarization
IRJET- Authentic News Summarization
IRJET Journal
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014
Kim Jensen
Review on College Event Organizer
Review on College Event Organizer
IRJET Journal
Factors influncing quality of mobile apps role of mobile app development life...
Factors influncing quality of mobile apps role of mobile app development life...
IJCSEA Journal
Android Application for Updation
Android Application for Updation
IRJET Journal
2013 Mobile Application Security Survey
2013 Mobile Application Security Survey
Bee_Ware
Survey mobile app
Survey mobile app
eSAT Publishing House
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET Journal
Research Article On Web Application Security
Research Article On Web Application Security
SaadSaif6
Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo.
Luis Noguera
Covert communication in mobile applications
Covert communication in mobile applications
Andrey Apuhtin
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
Lumension
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
ijseajournal
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
Symantec
20120140503012
20120140503012
IAEME Publication
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
IJNSA Journal
Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.
Veracode
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET Journal
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Black Duck by Synopsys
White Paper - Android Security
White Paper - Android Security
ryanfarmer
IRJET- Approaching Highlights and Security issues in Software Engineering...
IRJET- Approaching Highlights and Security issues in Software Engineering...
IRJET Journal
Nolong.in: an android based incident notification application with push notif...
Nolong.in: an android based incident notification application with push notif...
IJECEIAES
Ponemon Institute Research Report
Ponemon Institute Research Report
Peter Tutty
Insightful Research: The State of Mobile Application Insecurity
Insightful Research: The State of Mobile Application Insecurity
Casey Lucas
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
IJCSEIT Journal
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
Eswar Publications
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013
- Mark - Fullbright
IRJET- City Complaint Management System
IRJET- City Complaint Management System
IRJET Journal
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
IJNSA Journal
More Related Content
What's hot
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET Journal
Research Article On Web Application Security
Research Article On Web Application Security
SaadSaif6
Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo.
Luis Noguera
Covert communication in mobile applications
Covert communication in mobile applications
Andrey Apuhtin
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
Lumension
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
ijseajournal
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
Symantec
20120140503012
20120140503012
IAEME Publication
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
IJNSA Journal
Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.
Veracode
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET Journal
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Black Duck by Synopsys
White Paper - Android Security
White Paper - Android Security
ryanfarmer
IRJET- Approaching Highlights and Security issues in Software Engineering...
IRJET- Approaching Highlights and Security issues in Software Engineering...
IRJET Journal
Nolong.in: an android based incident notification application with push notif...
Nolong.in: an android based incident notification application with push notif...
IJECEIAES
Ponemon Institute Research Report
Ponemon Institute Research Report
Peter Tutty
Insightful Research: The State of Mobile Application Insecurity
Insightful Research: The State of Mobile Application Insecurity
Casey Lucas
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
IJCSEIT Journal
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
Eswar Publications
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013
- Mark - Fullbright
What's hot
(20)
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
Research Article On Web Application Security
Research Article On Web Application Security
Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo.
Covert communication in mobile applications
Covert communication in mobile applications
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
20120140503012
20120140503012
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
White Paper - Android Security
White Paper - Android Security
IRJET- Approaching Highlights and Security issues in Software Engineering...
IRJET- Approaching Highlights and Security issues in Software Engineering...
Nolong.in: an android based incident notification application with push notif...
Nolong.in: an android based incident notification application with push notif...
Ponemon Institute Research Report
Ponemon Institute Research Report
Insightful Research: The State of Mobile Application Insecurity
Insightful Research: The State of Mobile Application Insecurity
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
SECURITY VIGILANCE SYSTEM THROUGH LEVEL DRIVEN SECURITY MATURITY MODEL
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013
Similar to Trend Analysis on Twitter Using LDA Algorithm
IRJET- City Complaint Management System
IRJET- City Complaint Management System
IRJET Journal
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
IJNSA Journal
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET Journal
Smart Traffic Monitoring System Report
Smart Traffic Monitoring System Report
ALi Baker
IRJET- Speech and Hearing
IRJET- Speech and Hearing
IRJET Journal
IRJET - Application for Public Issues
IRJET - Application for Public Issues
IRJET Journal
Controlling Anti Ragging System using Android
Controlling Anti Ragging System using Android
IRJET Journal
IRJET- A Social Webbing Service Vivified on Design Patterns
IRJET- A Social Webbing Service Vivified on Design Patterns
IRJET Journal
IRJET - Municipal Corporation Complaint Management System
IRJET - Municipal Corporation Complaint Management System
IRJET Journal
Fake News and Message Detection
Fake News and Message Detection
IRJET Journal
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...
IRJET Journal
IRJET - Analysis of Fake Ranking on Social Media: Twitter
IRJET - Analysis of Fake Ranking on Social Media: Twitter
IRJET Journal
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECAST
IRJET Journal
social networking site
social networking site
Abhishek Ranjan
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET Journal
TWITTER SENTIMENT ANALYSIS
TWITTER SENTIMENT ANALYSIS
IRJET Journal
TWITTER SENTIMENT ANALYSIS
TWITTER SENTIMENT ANALYSIS
IRJET Journal
IRJET- Data Mining and Cluster based Machine Learning in Mobile Online Social...
IRJET- Data Mining and Cluster based Machine Learning in Mobile Online Social...
IRJET Journal
IRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based Approach
IRJET Journal
IRJET - Social Network Message Credibility: An Agent-based Approach
IRJET - Social Network Message Credibility: An Agent-based Approach
IRJET Journal
Similar to Trend Analysis on Twitter Using LDA Algorithm
(20)
IRJET- City Complaint Management System
IRJET- City Complaint Management System
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster Warning
Smart Traffic Monitoring System Report
Smart Traffic Monitoring System Report
IRJET- Speech and Hearing
IRJET- Speech and Hearing
IRJET - Application for Public Issues
IRJET - Application for Public Issues
Controlling Anti Ragging System using Android
Controlling Anti Ragging System using Android
IRJET- A Social Webbing Service Vivified on Design Patterns
IRJET- A Social Webbing Service Vivified on Design Patterns
IRJET - Municipal Corporation Complaint Management System
IRJET - Municipal Corporation Complaint Management System
Fake News and Message Detection
Fake News and Message Detection
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...
IRJET - Analysis of Fake Ranking on Social Media: Twitter
IRJET - Analysis of Fake Ranking on Social Media: Twitter
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECAST
social networking site
social networking site
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
TWITTER SENTIMENT ANALYSIS
TWITTER SENTIMENT ANALYSIS
TWITTER SENTIMENT ANALYSIS
TWITTER SENTIMENT ANALYSIS
IRJET- Data Mining and Cluster based Machine Learning in Mobile Online Social...
IRJET- Data Mining and Cluster based Machine Learning in Mobile Online Social...
IRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based Approach
IRJET - Social Network Message Credibility: An Agent-based Approach
IRJET - Social Network Message Credibility: An Agent-based Approach
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
vipinkmenon1
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Mark Billinghurst
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
me23b1001
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
roselinkalist12
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
power system scada applications and uses
power system scada applications and uses
DevarapalliHaritha
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
dollysharma2066
Recently uploaded
(20)
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Internship report on mechanical engineering
Internship report on mechanical engineering
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
power system scada applications and uses
power system scada applications and uses
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Trend Analysis on Twitter Using LDA Algorithm
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2366 TREND ANALYSIS ON TWITTER Mr. Rahul Neve1, Abhishek Singh2, Sundaresh Narayanan3 1Mr. Rahul Neve, Dept of IT, Thakur College of Engineering and Technology, Maharashtra, India 2Abhishek Singh, Dept of IT, Thakur College of Engineering and Technology, Maharashtra, India 3Sundaresh Narayanan, Dept of IT, Thakur College of Engineering and Technology, Maharashtra, India ---------------------------------------------------------------------------***--------------------------------------------------------------------------- ABSTRACT- In social media forums, it is important for public’s perception that an organization is well notify and able to provide services that truly meet their needs and interests. Social media activity by citizens is growing exponentially and there is some evidence that certain government agencies are embracing these engagement, and communication tools, albeit at a far slower pace than other societal sectors. The on-going provocation is that the government generally lacks behind when it comes to adaption of technology tools. Social media tools and social media analytics are no anomaly. While this paper focuses on government organizations, it’s fair to say all federal organization are playing catch up with commonly employed social media communication platforms. The government is even further behind in the area of social media analytics, the cluster of data from online communication tools and the interpretation of this data to form actionable and relevant information. Solutions to the provocation of this knowledge discovery from the magnitude of social media data must be automated and sophisticated enough to detect sentiment, trends, influencers, and real time issues as they arise. The basis of any social media analytics solution will be the power of its search and discovery knowledge engine. Keywords: LDA algorithm, Clustering, Trend Analysis, Social Media Analytics 1. INTRODUCTION Despite the talks in the market place regarding what social media is, or how it should, impact government operations, the use of information technology to change the way government works and engages with citizens is not new. President Bill Clinton, with the assistance of Vice President Al Gore, initiated what was then called The National Performance Review, which has evolved over time into The National Partnership for generating Government. That endeavor focused on generating greater operational efficiencies, as well as identifying how government could grasp the technology to work more effectively. The overall goal was to cut government costs. This undermines efforts to increase efficiency, effectiveness, and responsiveness. The proliferation of social media throughout American society has put the spotlight on a long standing troubling perception of government – that it is often slow to react and hesitant to move to new solutions and technologies that the general public has already adopted, vetted, and use in a ubiquitous manner. This slow adaptation is often a result of common issues, investigation of potential risks and security concerns, and/or compatibility analysis. Many argue this scrutiny and delay is overbearing and slows the services government agencies provide to the public; others argue it is simply a result of years of entrenched bureaucracy and regulations that lead to slow adaptation to a changing world and dynamic operating environment There are, of course, those who argue that this late-adopter role is one that is necessary to mitigate the risks to the mission of any given agency. In any case, it is clear that while a major part of society has made social media a permanent and complete aspect of their communication strategy, the government, with only a few exceptions, has not yet fully adopted by social media and analytics, and integrated them into how the government conducts its business. What is even unclear is just how government can grasp the myriad of social media tools and channels in order to provide superior service to a better informed and more engaged citizenry. 1.1 MATERIALS AND MANAGEMENT Requirements Web browser Windows Operating System Windows XP, Windows 7,8 MySQL Server Methodology Used:
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 For developing a project or software it is important to know the flow or which type of software development lifecycle model the system is going to use. Out of various SDLC models there is a need to choose the model which will be perfect for the project and therefore Iterative model has been selected. As the name suggest Iterative model is basically an iterative process where the input is processed through various phases and if it doesn’t satisfy it is repeated until it becomes satisfactory. The model consists of five phases namely: PHASE I: 1. Planning: Applying agile methodology for event system event planning for better usage of resources and time with great performance. 2. Analysis: Prepare a detailed analysis on present event system and overcome its limitation in our upcoming system. 3. Design: Integration of data and designing of system event app. 4. Coding: Writing the whole system app code and taking help of an open source. PHASE II: 1. Testing: Doing various tests on system like unit testing, smoke testing, stress testing, integration testing, regression testing, system testing etc. to check whether the integrated system works as the client desires. 2. Deployment: Conduct beta testing for identifying bugs and errors left out and improvements that can be made. After the testing and approval, deploy the proposed system. Chart 1: Iterative model Feasibility Study: Prior developing the product or software it is necessary to know all the factors important for developing a good product. It is important to know the resource requirements, strengths and weakness of the project, etc. All these factors ultimately revolve around two major criteria cost and value, in order to know how much feasible, it is to create a project and how much profit will it return. The feasibility of a particular software product can be determined from the following factors:- © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2377
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 1. Technical Feasibility. 2. Operational Feasibility. 3. Economic Feasibility. 4. Legal Feasibility. Chart 2: Flowchart of Model. 1.2 Result Users can look for social events happening around them through our web application. They can get acknowledged of recent trending events just by entering the keywords. Tweets from all around the world can be accessed with the click of a button. Users can view the result graphically which will be segregated on the basis of time, location and legitimacy. a) Output Figure 1: Query Output b) Outcomes The client should be able to connect to the server properly without any problems. The connection establishment between the mobile device and the server should take minimal time. The mobile device should be able receive data from the server uninterruptedly. Information provided by the application should be correct and as per the user’s need. © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2378
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 c) Discussion of the results Connection can be established easily provided that the server is on. The connection with the server takes time as it uses Internet connection. Receiving data from the server takes time. Information coming from the database is correct 1.3 Discussion Before the introduction of our web application users had to have an access of Television or Newspapers to get aware about the trending events happening around us. To overcome this problem, we introduced a web application that could present you with trending tweets from around the world with the click of a button. It becomes convenient for users to acknowledge themselves about the events around them through a non-complex application. Latent Dirichlet Allocation Algorithm has been used to cluster the tweets into different categories. Providing security to authorized user using Two Factor authentication was a one of the major problem. 2. Conclusion In this project we develop a real-time non parametric model to know about the recent trends. It successfully detects the recent trends and it also shows the trends according to the location of a user. 3. References 1. Hsinchun Chen “Exploring extremism and terrorism on the web: The dark web project” 2007 2. Amit Pratap Singh, Dr, R. C. Jain “A survey on different phases of web usage for Anomaly user Behavior Investigation” 2007 3. Floras Tsai, KapLuk Chan “Detecting cyber security threats in weblogs using probabilistic model” 2007 4. Yulei Zhang, Shuo Zeng, Li Fan, Yan Dang, Catherine A. Larson and Hsinchun Chen “Dark web forums portal: Searching and analyzing Jihadist forums” 2009. 5. The application responds quickly while making a decent decision. The application uses LDA algorithm which is efficient for clustering. Irrespective of users location he can access trending tweets around the world. Positive and negative tweets are being clustered to perform sentimental analysis. © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2379
Download now