This document proposes a framework to detect fake news on social media platforms like Twitter. It involves collecting Twitter data using APIs and preprocessing the data by removing URLs, usernames, punctuation etc. and applying techniques like tokenization, stemming and lemmatization. Features are then extracted from the preprocessed data using TF-IDF. Various machine learning classifiers like KNN, SVM, Decision Trees etc. are trained on the labeled data to classify tweets as real or fake. An ensemble of AdaBoost and a combined SVM-KNN model is also proposed and expected to achieve higher accuracy than individual models. The proposed framework aims to automatically detect and stop the spread of fake news on Twitter in real-time.
Fake News Detection Using Machine LearningIRJET Journal
This document proposes a machine learning approach for detecting fake news using support vector machines. It discusses preprocessing news data using techniques like TF-IDF, extracting features related to text, date, source and author, and training a support vector machine classifier on the preprocessed data. The proposed system architecture involves preprocessing, training a model on the training data, validating it on test data, adjusting parameters to improve accuracy, and then using the model to classify new unlabeled news. Prior research that used techniques like n-gram analysis, naive Bayes classifiers and linear support vector machines for fake news detection are also reviewed. The conclusion is that the proposed approach using support vector machines can help identify fake news effectively.
A DATA MINING APPROACH FOR FILTERING OUT SOCIAL SPAMMERS IN LARGE-SCALE TWITT...ijaia
This document discusses using data mining and machine learning techniques to detect social media spammers on Twitter. It begins with an introduction to the problem of spam on Twitter and prior related work using classification algorithms. The proposed method has four main parts: 1) Using bio-inspired optimization algorithms like PSO, Cuckoo Search, and Bat Algorithm to reduce features and select optimal subsets for classification. 2) Comparing classifiers like BayesNet, C4.5, Random Forest, kNN, and MLP on Twitter data. 3) Evaluating classifiers using cross-validation and metrics on real imbalanced datasets. 4) Identifying important features that improve classifier performance for spam detection. The document outlines the dataset and features used, which include user
The document describes a proposed system for authenticating and summarizing news articles. The system prioritizes authenticating the news over summarization. If the news is determined to be at least 55% authentic based on analysis of keywords and content from authorized news sites, then it will generate a summary by breaking the news down into shorter, meaningful snippets. The system uses machine learning and artificial intelligence algorithms like Syntaxnet to extract phrases and analyze the news. It is implemented as a user-friendly web application using technologies like Python, Django, HTML, CSS and Bootstrap.
This document describes a project to detect fake news and messages using machine learning techniques. The goal is to classify news stories and messages as real or fake, and check the validity of websites publishing the news. The project will use concepts from artificial intelligence, natural language processing, and machine learning, including logistic regression, decision trees, gradient boosting, and random forests. The system is intended as a web application that provides guidance to users on identifying fake news and messages spread on social media platforms. It will analyze data from online sources to identify main keywords and topics associated with fake content. Tips will also be provided on how to prevent the spread of misinformation.
Detecting Malicious Bots in Social Media Accounts Using Machine Learning Tech...IRJET Journal
The document describes a proposed system to detect malicious bots on Twitter using machine learning techniques. It involves collecting Twitter data, extracting features, and using classification algorithms like random forest and decision tree. The random forest model combines the predictions of multiple decision trees trained on different feature subsets to improve accuracy. Features like account age, tweet frequency, and sentiment are used. The system is evaluated using cross-validation, performance metrics from a confusion matrix like accuracy, and comparisons to other algorithms. The goal is to improve security on social media by identifying bot accounts.
This paper proposes a system to detect spammer tweets on Twitter. It extracts features from tweets such as the number of unique mentions, unsolicited mentions, and duplicate domain names. It also uses the Google Safe Browsing API to analyze URLs. The system fetches tweets for a particular hashtag using the Twitter4J API. It then performs preprocessing like removing hashtags and quotes. The features are then used to classify tweets as spam or not spam using machine learning algorithms. The system aims to investigate linguistic features for detecting spam accounts and tweets in a supervised manner by leveraging existing hashtags for training data.
COVID Sentiment Analysis of Social Media Data Using Enhanced Stacked EnsembleIRJET Journal
The document presents a study that analyzes sentiment in tweets related to COVID-19 using an enhanced stacked ensemble model. It first reviews previous research on sentiment analysis of social media data during the pandemic. It then describes collecting a dataset of over 40,000 COVID-19 tweets from March-April 2020. Various classification algorithms are tested to predict sentiment, including naive bayes, random forest, XGBoost, and an enhanced stacked ensemble. The enhanced stacked ensemble achieved the highest test accuracy of 86% according to the experimental results presented.
Terrorism Analysis through Social Media using Data MiningIRJET Journal
This document presents a study that uses deep learning models like Deep Neural Networks (DNN) and Convolutional Neural Networks (CNN) to analyze terrorism through detecting toxicity in social media text data. The study aims to classify text data into categories like toxicity, severe toxicity, obscenity, threat, insult or identity hate. It provides an overview of DNN and CNN models for text classification and compares their methodology, architecture and performance. The models are trained on preprocessed social media data related to terrorist activities and aim to accurately predict the toxicity level and classify tweets for concerned authorities to make informed decisions.
Fake News Detection Using Machine LearningIRJET Journal
This document proposes a machine learning approach for detecting fake news using support vector machines. It discusses preprocessing news data using techniques like TF-IDF, extracting features related to text, date, source and author, and training a support vector machine classifier on the preprocessed data. The proposed system architecture involves preprocessing, training a model on the training data, validating it on test data, adjusting parameters to improve accuracy, and then using the model to classify new unlabeled news. Prior research that used techniques like n-gram analysis, naive Bayes classifiers and linear support vector machines for fake news detection are also reviewed. The conclusion is that the proposed approach using support vector machines can help identify fake news effectively.
A DATA MINING APPROACH FOR FILTERING OUT SOCIAL SPAMMERS IN LARGE-SCALE TWITT...ijaia
This document discusses using data mining and machine learning techniques to detect social media spammers on Twitter. It begins with an introduction to the problem of spam on Twitter and prior related work using classification algorithms. The proposed method has four main parts: 1) Using bio-inspired optimization algorithms like PSO, Cuckoo Search, and Bat Algorithm to reduce features and select optimal subsets for classification. 2) Comparing classifiers like BayesNet, C4.5, Random Forest, kNN, and MLP on Twitter data. 3) Evaluating classifiers using cross-validation and metrics on real imbalanced datasets. 4) Identifying important features that improve classifier performance for spam detection. The document outlines the dataset and features used, which include user
The document describes a proposed system for authenticating and summarizing news articles. The system prioritizes authenticating the news over summarization. If the news is determined to be at least 55% authentic based on analysis of keywords and content from authorized news sites, then it will generate a summary by breaking the news down into shorter, meaningful snippets. The system uses machine learning and artificial intelligence algorithms like Syntaxnet to extract phrases and analyze the news. It is implemented as a user-friendly web application using technologies like Python, Django, HTML, CSS and Bootstrap.
This document describes a project to detect fake news and messages using machine learning techniques. The goal is to classify news stories and messages as real or fake, and check the validity of websites publishing the news. The project will use concepts from artificial intelligence, natural language processing, and machine learning, including logistic regression, decision trees, gradient boosting, and random forests. The system is intended as a web application that provides guidance to users on identifying fake news and messages spread on social media platforms. It will analyze data from online sources to identify main keywords and topics associated with fake content. Tips will also be provided on how to prevent the spread of misinformation.
Detecting Malicious Bots in Social Media Accounts Using Machine Learning Tech...IRJET Journal
The document describes a proposed system to detect malicious bots on Twitter using machine learning techniques. It involves collecting Twitter data, extracting features, and using classification algorithms like random forest and decision tree. The random forest model combines the predictions of multiple decision trees trained on different feature subsets to improve accuracy. Features like account age, tweet frequency, and sentiment are used. The system is evaluated using cross-validation, performance metrics from a confusion matrix like accuracy, and comparisons to other algorithms. The goal is to improve security on social media by identifying bot accounts.
This paper proposes a system to detect spammer tweets on Twitter. It extracts features from tweets such as the number of unique mentions, unsolicited mentions, and duplicate domain names. It also uses the Google Safe Browsing API to analyze URLs. The system fetches tweets for a particular hashtag using the Twitter4J API. It then performs preprocessing like removing hashtags and quotes. The features are then used to classify tweets as spam or not spam using machine learning algorithms. The system aims to investigate linguistic features for detecting spam accounts and tweets in a supervised manner by leveraging existing hashtags for training data.
COVID Sentiment Analysis of Social Media Data Using Enhanced Stacked EnsembleIRJET Journal
The document presents a study that analyzes sentiment in tweets related to COVID-19 using an enhanced stacked ensemble model. It first reviews previous research on sentiment analysis of social media data during the pandemic. It then describes collecting a dataset of over 40,000 COVID-19 tweets from March-April 2020. Various classification algorithms are tested to predict sentiment, including naive bayes, random forest, XGBoost, and an enhanced stacked ensemble. The enhanced stacked ensemble achieved the highest test accuracy of 86% according to the experimental results presented.
Terrorism Analysis through Social Media using Data MiningIRJET Journal
This document presents a study that uses deep learning models like Deep Neural Networks (DNN) and Convolutional Neural Networks (CNN) to analyze terrorism through detecting toxicity in social media text data. The study aims to classify text data into categories like toxicity, severe toxicity, obscenity, threat, insult or identity hate. It provides an overview of DNN and CNN models for text classification and compares their methodology, architecture and performance. The models are trained on preprocessed social media data related to terrorist activities and aim to accurately predict the toxicity level and classify tweets for concerned authorities to make informed decisions.
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...IRJET Journal
This paper proposes a system to detect web pages and tweets that may promote terrorism using data mining and machine learning techniques. It involves extracting text data from web pages using DOM trees, segmenting tweets and web data using named entity recognition, clustering segmented data using k-means, and applying techniques like SIFT and pattern matching to detect potentially terrorist content. The aim is to automatically flag such web pages and tweets for human review to help curb the spread of terrorism online.
IRJET- A Survey on Mining of Tweeter Data for Predicting User BehaviorIRJET Journal
This document discusses mining and analyzing social media data using big data techniques to predict user behavior. It proposes using tools like Hadoop and HDFS to capture trends in areas like drug abuse from large amounts of Twitter data. A framework is presented that involves gathering Twitter data using APIs, applying big data mining techniques, and using the results for more sophisticated analysis applications to help address issues like monitoring public health. Challenges around managing large social media datasets are also discussed.
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...CSEIJJournal
In machine learning, the intelligence of a developed model is greatly influenced by the dataset used for the
target domain on which the developed model will be deployed. Social media platform has experienced
more of hackers’ attacks on the platform in recent time. To identify a hacker on the platform, there are two
possible ways. The first is to use the activities of the user while the second is to use the supplied details the
user registered the account with. To adequately identify a social media user as hacker proactively, there
are relevant user details called features that can be used to determine whether a social media user is a
hacker or not. In this paper, an exploratory data analysis was carried out to determine the best features
that can be used by a predictive model to proactively identify hackers on the social media platform. A web
crawler was developed to mine the user dataset on which exploratory data analysis was carried out to
select the best features for the dataset which could be used to correctly identify a hacker on a social media
platform.
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...CSEIJJournal
In machine learning, the intelligence of a developed model is greatly influenced by the dataset used for the
target domain on which the developed model will be deployed. Social media platform has experienced
more of hackers’ attacks on the platform in recent time. To identify a hacker on the platform, there are two
possible ways. The first is to use the activities of the user while the second is to use the supplied details the
user registered the account with. To adequately identify a social media user as hacker proactively, there
are relevant user details called features that can be used to determine whether a social media user is a
hacker or not. In this paper, an exploratory data analysis was carried out to determine the best features
that can be used by a predictive model to proactively identify hackers on the social media platform. A web
crawler was developed to mine the user dataset on which exploratory data analysis was carried out to
select the best features for the dataset which could be used to correctly identify a hacker on a social media
platform.
Spammer Detection and Fake User Identification on Social NetworksIRJET Journal
This document discusses methods for detecting spammers and fake users on social networks like Twitter. It provides a literature review of past research on spam detection techniques on Twitter. The techniques are categorized based on their ability to detect: (1) fake content, (2) spam based on URLs, (3) spam in popular topics, and (4) fake users. The techniques are also analyzed based on attributes like user attributes, content attributes, graph attributes, structural attributes, and time attributes. An implementation approach is proposed that involves collecting user data, employing machine learning algorithms like random forest for pattern recognition, using feature engineering, and integrating social media APIs for real-time monitoring. It also discusses integrating a user reporting mechanism to improve accuracy
Development of a Web Application for Fake News Classification using Machine l...IRJET Journal
This document summarizes a research paper that proposes a machine learning model to classify news articles as real or fake. It discusses developing a web application using logistic regression for fake news classification. The paper reviews previous research on fake news detection methods and feature extraction techniques. It then outlines the proposed system's workflow, including data collection and preprocessing, model training, and classification. The system aims to predict if new articles are real or fake by comparing text to an existing dataset. If the accuracy is over 90%, the news is labeled real; otherwise it is labeled fake. The results suggest the model can accurately classify news at a 95% rate.
Estimating the Efficacy of Efficient Machine Learning Classifiers for Twitter...IRJET Journal
This document summarizes research estimating the efficacy of machine learning classifiers for Twitter sentiment analysis. It explores using decision trees, random forest, support vector machine, Naive Bayes, logistic regression, and XGBoost classifiers on a dataset of 1.6 million tweets. The classifiers are evaluated based on accuracy to determine the most appropriate model for Twitter sentiment analysis classification.
Implementation of Sentimental Analysis of Social Media for Stock Prediction ...IRJET Journal
This document describes a framework for predicting future stock prices based on sentiment analysis of social media data from Twitter. The framework collects tweets related to Apple Inc. over 3 months, performs sentiment analysis to classify tweets as positive or negative, and uses an ARIMA model to predict stock prices based on the sentiment values and past stock price data. The results show that predictions using tweets containing the stock symbol were more accurate than those using just the company name. Factors like the training data, preprocessing techniques, and number of tweets per time period can impact prediction accuracy. While limitations remain, the analysis demonstrates a relationship between social media sentiment and stock market movements.
Fake accounts detection system based on bidirectional gated recurrent unit n...IJECEIAES
Online social networks have become the most widely used medium to interact with friends and family, share news and important events or publish daily activities. However, this growing popularity has made social networks a target for suspicious exploitation such as the spreading of misleading or malicious information, making them less reliable and less trustworthy. In this paper, a fake account detection system based on the bidirectional gated recurrent unit (BiGRU) model is proposed. The focus has been on the content of users’ tweets to classify twitter user profile as legitimate or fake. Tweets are gathered in a single file and are transformed into a vector space using the global vectors (GloVe) word embedding technique in order to preserve the semantic and syntax context. Compared with the baseline models such as long short-term memory (LSTM) and convolutional neural networks (CNN), the results are promising and confirm that using GloVe with BiGRU classifier outperforms with 99.44% for accuracy and 99.25% for precision. To prove the efficiency of our approach the results obtained with GloVe were compared to Word2vec under the same conditions. Results confirm that GloVe with BiGRU classifier performs the best results for detection of fake Twitter accounts using only tweets content feature.
Cyberbullying Detection on Social Networks Using Machine Learning ApproachesIRJET Journal
This document discusses using machine learning approaches to detect cyberbullying on social networks. It begins with an abstract that introduces the problem of cyberbullying and its negative impacts. It then discusses related work on using natural language processing and machine learning like SVM, neural networks, and co-training models to identify cyberbullying. The document aims to compare different machine learning algorithms (Naive Bayes, Decision Tree, Random Forest, SVM, DNN) to determine the most effective technique for detecting cyberbullying. It discusses preprocessing data and extracting features before applying the algorithms. The results will show which algorithm has the highest accuracy on a Twitter comment dataset.
This document discusses techniques for detecting fake news. It begins with an introduction to the problem of fake news and how it spreads on social media. It then reviews different machine learning techniques that have been used for fake news detection, including naïve bayes, decision trees, random forests, K-nearest neighbors, and LSTM. The document also categorizes different types of fake news and surveys related literature applying machine learning to fake news detection. It concludes that detecting fake news is still an ongoing challenge and more work is needed with improved datasets and models.
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...IRJET Journal
This document discusses using machine learning algorithms to identify human or bot accounts on Twitter. It describes collecting a dataset from various social media platforms and cleaning the data. Machine learning algorithms like linear regression and Naive Bayes are then applied to classify accounts as human or bot. The proposed system achieves over 90% accuracy compared to existing systems that achieve around 68% accuracy. It provides a real-time method for detecting fake identities on social media platforms.
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...IRJET Journal
This document discusses privacy and security issues related to social media. It begins by introducing how social media has become integral to modern life but also presents privacy risks if users share personal information publicly. Some key privacy threats on social media mentioned include data breaches, passive attacks like unauthorized data collection, and active attacks trying to access other user accounts. The document then reviews literature around social media security and privacy concerns. It outlines common security risks like unmonitored accounts, human error, and vulnerabilities in third-party apps linked to social media profiles. Potential threats to social networks are categorized as data breaches, passive attacks, and active attacks. The document concludes that social networks pose significant security and privacy risks and all users should take steps to protect
IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...IRJET Journal
This document discusses tweet segmentation and its application to named entity recognition. It proposes a novel framework called Hybrid Segmentation that segments tweets into meaningful phrases by maximizing the stickiness score of candidate segments based on global context from external sources like Wikipedia and local context from linguistic features within a batch of tweets. Two methods are developed - one using local linguistic features and the other using local term dependency. Experimental results on two tweet datasets show improved segmentation quality when using both global and local contexts compared to global context alone. The segmented tweets achieve higher accuracy for named entity recognition compared to word-based methods, demonstrating the benefit of tweet segmentation for downstream natural language processing applications.
IRJET- Tweet Segmentation and its Application to Named Entity RecognitionIRJET Journal
This document summarizes a research paper on tweet segmentation and its application to named entity recognition. It proposes a novel framework called Hybrid Segmentation that splits tweets into meaningful segments to preserve semantic context for downstream natural language processing applications like named entity recognition. HybridSeg finds optimal tweet segmentations by maximizing the stickiness score of segments, which considers global context based on English phrases and local context based on linguistic features or term dependencies within a batch of tweets. Experiments show significantly improved segmentation quality when learning both global and local contexts compared to global context alone. The segmented tweets can then be used for high accuracy named entity recognition through part-of-speech tagging.
IRJET- Sentiment Analysis of Twitter Data using PythonIRJET Journal
1. The document discusses sentiment analysis of tweets using Python. It involves collecting tweet data using Twitter API and classifying the tweets as positive or negative using machine learning algorithms in Python.
2. It proposes using Anaconda Python to analyze tweets collected from Twitter and extract features from tweets like unigrams and bigrams to represent the tweet text. Various machine learning algorithms will then be used to conduct sentiment analysis and classify tweets as positive or negative.
3. The accuracy of individual models is limited, so the approach is to use the predictions from the top models to generate an ensemble model for improved accuracy of sentiment classification of tweets.
IRJET - Twitter Spam Detection using CobwebIRJET Journal
This document discusses using Cobweb clustering and Gradient Boosting techniques to detect spam on Twitter. Cobweb clustering creates a classification tree to predict attributes of new objects by summarizing the attribute distributions of existing nodes. Gradient Boosting is an ensemble method that uses multiple weak learners (decision trees) to create a stronger predictive model. The paper aims to combine these techniques to create an enhanced spam detection system. It also reviews several existing approaches for Twitter spam detection using techniques like Hidden Markov Models, Random Forests, and asynchronous link-based algorithms.
A study of cyberbullying detection using Deep Learning and Machine Learning T...IRJET Journal
This document discusses a study on detecting cyberbullying using machine learning and deep learning techniques. Specifically, it examines using a hybrid model combining K-Nearest Neighbors, Support Vector Machine, and Random Forest algorithms, as well as a Convolutional Neural Network. The study uses a Twitter dataset to classify tweets as not bullying, racism, or sexism. It finds that the CNN model produces more accurate predictions than the hybrid stacking algorithm. The document provides background on related work applying machine and deep learning to cyberbullying detection, particularly using content-based and user-based approaches.
A study of cyberbullying detection using Deep Learning and Machine Learning T...IRJET Journal
This document summarizes a research paper that studied the detection of cyberbullying using machine learning and deep learning techniques. Specifically, it used a hybrid model combining KNN, SVM and Random Forest algorithms (stacking algorithm) and a Convolutional Neural Network (CNN) on a Twitter dataset. The stacking algorithm achieved an accuracy of X% while the CNN achieved a higher accuracy of Y%. A comparison of the two models found that CNN produced a more precise prediction of cyberbullying. The document also reviewed related work on cyberbullying detection using content-based, user-based and network-based approaches with machine learning algorithms like SVM, Naive Bayes and deep learning methods like CNN.
IRJET- Competitive Analysis of Attacks on Social MediaIRJET Journal
The document discusses deceptions on social media and proposes a machine learning model to detect fake accounts. It first introduces that social media brings both benefits and disadvantages, with deceptions causing problems. It then describes a machine learning pipeline with three parts: (1) a Cluster Builder that groups accounts into real and fake clusters, (2) a Profile Featurizer that extracts features from account profiles to represent clusters, and (3) an Account Scorer that trains models on cluster features and scores new clusters to detect fake accounts. The goal is to use machine learning to help address challenges of deceptions on social media.
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
More Related Content
Similar to Analyzing Social media’s real data detection through Web content mining using Natural Language Processing and Machine learning techniques
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...IRJET Journal
This paper proposes a system to detect web pages and tweets that may promote terrorism using data mining and machine learning techniques. It involves extracting text data from web pages using DOM trees, segmenting tweets and web data using named entity recognition, clustering segmented data using k-means, and applying techniques like SIFT and pattern matching to detect potentially terrorist content. The aim is to automatically flag such web pages and tweets for human review to help curb the spread of terrorism online.
IRJET- A Survey on Mining of Tweeter Data for Predicting User BehaviorIRJET Journal
This document discusses mining and analyzing social media data using big data techniques to predict user behavior. It proposes using tools like Hadoop and HDFS to capture trends in areas like drug abuse from large amounts of Twitter data. A framework is presented that involves gathering Twitter data using APIs, applying big data mining techniques, and using the results for more sophisticated analysis applications to help address issues like monitoring public health. Challenges around managing large social media datasets are also discussed.
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...CSEIJJournal
In machine learning, the intelligence of a developed model is greatly influenced by the dataset used for the
target domain on which the developed model will be deployed. Social media platform has experienced
more of hackers’ attacks on the platform in recent time. To identify a hacker on the platform, there are two
possible ways. The first is to use the activities of the user while the second is to use the supplied details the
user registered the account with. To adequately identify a social media user as hacker proactively, there
are relevant user details called features that can be used to determine whether a social media user is a
hacker or not. In this paper, an exploratory data analysis was carried out to determine the best features
that can be used by a predictive model to proactively identify hackers on the social media platform. A web
crawler was developed to mine the user dataset on which exploratory data analysis was carried out to
select the best features for the dataset which could be used to correctly identify a hacker on a social media
platform.
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...CSEIJJournal
In machine learning, the intelligence of a developed model is greatly influenced by the dataset used for the
target domain on which the developed model will be deployed. Social media platform has experienced
more of hackers’ attacks on the platform in recent time. To identify a hacker on the platform, there are two
possible ways. The first is to use the activities of the user while the second is to use the supplied details the
user registered the account with. To adequately identify a social media user as hacker proactively, there
are relevant user details called features that can be used to determine whether a social media user is a
hacker or not. In this paper, an exploratory data analysis was carried out to determine the best features
that can be used by a predictive model to proactively identify hackers on the social media platform. A web
crawler was developed to mine the user dataset on which exploratory data analysis was carried out to
select the best features for the dataset which could be used to correctly identify a hacker on a social media
platform.
Spammer Detection and Fake User Identification on Social NetworksIRJET Journal
This document discusses methods for detecting spammers and fake users on social networks like Twitter. It provides a literature review of past research on spam detection techniques on Twitter. The techniques are categorized based on their ability to detect: (1) fake content, (2) spam based on URLs, (3) spam in popular topics, and (4) fake users. The techniques are also analyzed based on attributes like user attributes, content attributes, graph attributes, structural attributes, and time attributes. An implementation approach is proposed that involves collecting user data, employing machine learning algorithms like random forest for pattern recognition, using feature engineering, and integrating social media APIs for real-time monitoring. It also discusses integrating a user reporting mechanism to improve accuracy
Development of a Web Application for Fake News Classification using Machine l...IRJET Journal
This document summarizes a research paper that proposes a machine learning model to classify news articles as real or fake. It discusses developing a web application using logistic regression for fake news classification. The paper reviews previous research on fake news detection methods and feature extraction techniques. It then outlines the proposed system's workflow, including data collection and preprocessing, model training, and classification. The system aims to predict if new articles are real or fake by comparing text to an existing dataset. If the accuracy is over 90%, the news is labeled real; otherwise it is labeled fake. The results suggest the model can accurately classify news at a 95% rate.
Estimating the Efficacy of Efficient Machine Learning Classifiers for Twitter...IRJET Journal
This document summarizes research estimating the efficacy of machine learning classifiers for Twitter sentiment analysis. It explores using decision trees, random forest, support vector machine, Naive Bayes, logistic regression, and XGBoost classifiers on a dataset of 1.6 million tweets. The classifiers are evaluated based on accuracy to determine the most appropriate model for Twitter sentiment analysis classification.
Implementation of Sentimental Analysis of Social Media for Stock Prediction ...IRJET Journal
This document describes a framework for predicting future stock prices based on sentiment analysis of social media data from Twitter. The framework collects tweets related to Apple Inc. over 3 months, performs sentiment analysis to classify tweets as positive or negative, and uses an ARIMA model to predict stock prices based on the sentiment values and past stock price data. The results show that predictions using tweets containing the stock symbol were more accurate than those using just the company name. Factors like the training data, preprocessing techniques, and number of tweets per time period can impact prediction accuracy. While limitations remain, the analysis demonstrates a relationship between social media sentiment and stock market movements.
Fake accounts detection system based on bidirectional gated recurrent unit n...IJECEIAES
Online social networks have become the most widely used medium to interact with friends and family, share news and important events or publish daily activities. However, this growing popularity has made social networks a target for suspicious exploitation such as the spreading of misleading or malicious information, making them less reliable and less trustworthy. In this paper, a fake account detection system based on the bidirectional gated recurrent unit (BiGRU) model is proposed. The focus has been on the content of users’ tweets to classify twitter user profile as legitimate or fake. Tweets are gathered in a single file and are transformed into a vector space using the global vectors (GloVe) word embedding technique in order to preserve the semantic and syntax context. Compared with the baseline models such as long short-term memory (LSTM) and convolutional neural networks (CNN), the results are promising and confirm that using GloVe with BiGRU classifier outperforms with 99.44% for accuracy and 99.25% for precision. To prove the efficiency of our approach the results obtained with GloVe were compared to Word2vec under the same conditions. Results confirm that GloVe with BiGRU classifier performs the best results for detection of fake Twitter accounts using only tweets content feature.
Cyberbullying Detection on Social Networks Using Machine Learning ApproachesIRJET Journal
This document discusses using machine learning approaches to detect cyberbullying on social networks. It begins with an abstract that introduces the problem of cyberbullying and its negative impacts. It then discusses related work on using natural language processing and machine learning like SVM, neural networks, and co-training models to identify cyberbullying. The document aims to compare different machine learning algorithms (Naive Bayes, Decision Tree, Random Forest, SVM, DNN) to determine the most effective technique for detecting cyberbullying. It discusses preprocessing data and extracting features before applying the algorithms. The results will show which algorithm has the highest accuracy on a Twitter comment dataset.
This document discusses techniques for detecting fake news. It begins with an introduction to the problem of fake news and how it spreads on social media. It then reviews different machine learning techniques that have been used for fake news detection, including naïve bayes, decision trees, random forests, K-nearest neighbors, and LSTM. The document also categorizes different types of fake news and surveys related literature applying machine learning to fake news detection. It concludes that detecting fake news is still an ongoing challenge and more work is needed with improved datasets and models.
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...IRJET Journal
This document discusses using machine learning algorithms to identify human or bot accounts on Twitter. It describes collecting a dataset from various social media platforms and cleaning the data. Machine learning algorithms like linear regression and Naive Bayes are then applied to classify accounts as human or bot. The proposed system achieves over 90% accuracy compared to existing systems that achieve around 68% accuracy. It provides a real-time method for detecting fake identities on social media platforms.
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...IRJET Journal
This document discusses privacy and security issues related to social media. It begins by introducing how social media has become integral to modern life but also presents privacy risks if users share personal information publicly. Some key privacy threats on social media mentioned include data breaches, passive attacks like unauthorized data collection, and active attacks trying to access other user accounts. The document then reviews literature around social media security and privacy concerns. It outlines common security risks like unmonitored accounts, human error, and vulnerabilities in third-party apps linked to social media profiles. Potential threats to social networks are categorized as data breaches, passive attacks, and active attacks. The document concludes that social networks pose significant security and privacy risks and all users should take steps to protect
IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...IRJET Journal
This document discusses tweet segmentation and its application to named entity recognition. It proposes a novel framework called Hybrid Segmentation that segments tweets into meaningful phrases by maximizing the stickiness score of candidate segments based on global context from external sources like Wikipedia and local context from linguistic features within a batch of tweets. Two methods are developed - one using local linguistic features and the other using local term dependency. Experimental results on two tweet datasets show improved segmentation quality when using both global and local contexts compared to global context alone. The segmented tweets achieve higher accuracy for named entity recognition compared to word-based methods, demonstrating the benefit of tweet segmentation for downstream natural language processing applications.
IRJET- Tweet Segmentation and its Application to Named Entity RecognitionIRJET Journal
This document summarizes a research paper on tweet segmentation and its application to named entity recognition. It proposes a novel framework called Hybrid Segmentation that splits tweets into meaningful segments to preserve semantic context for downstream natural language processing applications like named entity recognition. HybridSeg finds optimal tweet segmentations by maximizing the stickiness score of segments, which considers global context based on English phrases and local context based on linguistic features or term dependencies within a batch of tweets. Experiments show significantly improved segmentation quality when learning both global and local contexts compared to global context alone. The segmented tweets can then be used for high accuracy named entity recognition through part-of-speech tagging.
IRJET- Sentiment Analysis of Twitter Data using PythonIRJET Journal
1. The document discusses sentiment analysis of tweets using Python. It involves collecting tweet data using Twitter API and classifying the tweets as positive or negative using machine learning algorithms in Python.
2. It proposes using Anaconda Python to analyze tweets collected from Twitter and extract features from tweets like unigrams and bigrams to represent the tweet text. Various machine learning algorithms will then be used to conduct sentiment analysis and classify tweets as positive or negative.
3. The accuracy of individual models is limited, so the approach is to use the predictions from the top models to generate an ensemble model for improved accuracy of sentiment classification of tweets.
IRJET - Twitter Spam Detection using CobwebIRJET Journal
This document discusses using Cobweb clustering and Gradient Boosting techniques to detect spam on Twitter. Cobweb clustering creates a classification tree to predict attributes of new objects by summarizing the attribute distributions of existing nodes. Gradient Boosting is an ensemble method that uses multiple weak learners (decision trees) to create a stronger predictive model. The paper aims to combine these techniques to create an enhanced spam detection system. It also reviews several existing approaches for Twitter spam detection using techniques like Hidden Markov Models, Random Forests, and asynchronous link-based algorithms.
A study of cyberbullying detection using Deep Learning and Machine Learning T...IRJET Journal
This document discusses a study on detecting cyberbullying using machine learning and deep learning techniques. Specifically, it examines using a hybrid model combining K-Nearest Neighbors, Support Vector Machine, and Random Forest algorithms, as well as a Convolutional Neural Network. The study uses a Twitter dataset to classify tweets as not bullying, racism, or sexism. It finds that the CNN model produces more accurate predictions than the hybrid stacking algorithm. The document provides background on related work applying machine and deep learning to cyberbullying detection, particularly using content-based and user-based approaches.
A study of cyberbullying detection using Deep Learning and Machine Learning T...IRJET Journal
This document summarizes a research paper that studied the detection of cyberbullying using machine learning and deep learning techniques. Specifically, it used a hybrid model combining KNN, SVM and Random Forest algorithms (stacking algorithm) and a Convolutional Neural Network (CNN) on a Twitter dataset. The stacking algorithm achieved an accuracy of X% while the CNN achieved a higher accuracy of Y%. A comparison of the two models found that CNN produced a more precise prediction of cyberbullying. The document also reviewed related work on cyberbullying detection using content-based, user-based and network-based approaches with machine learning algorithms like SVM, Naive Bayes and deep learning methods like CNN.
IRJET- Competitive Analysis of Attacks on Social MediaIRJET Journal
The document discusses deceptions on social media and proposes a machine learning model to detect fake accounts. It first introduces that social media brings both benefits and disadvantages, with deceptions causing problems. It then describes a machine learning pipeline with three parts: (1) a Cluster Builder that groups accounts into real and fake clusters, (2) a Profile Featurizer that extracts features from account profiles to represent clusters, and (3) an Account Scorer that trains models on cluster features and scores new clusters to detect fake accounts. The goal is to use machine learning to help address challenges of deceptions on social media.
Similar to Analyzing Social media’s real data detection through Web content mining using Natural Language Processing and Machine learning techniques (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
The CBC machine is a common diagnostic tool used by doctors to measure a patient's red blood cell count, white blood cell count and platelet count. The machine uses a small sample of the patient's blood, which is then placed into special tubes and analyzed. The results of the analysis are then displayed on a screen for the doctor to review. The CBC machine is an important tool for diagnosing various conditions, such as anemia, infection and leukemia. It can also help to monitor a patient's response to treatment.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network