SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1253
DETECTING ROOT OF THE RUMOR IN SOCIAL NETWORK USING GSSS
S.NIVETHA1,R.PRIYADHARSHINI2,P.BALAKUMAR3,R.K.KAPILAVANI4
1B.E,Department of Computer Science and Engineering, Prince Shri Venkateshwara Padmavathy Engineering
College,Tamilnadu,India.
2B.E,Department of Computer Science and Engineering, Prince Shri Venkateshwara Padmavathy Engineering
College,Tamilnadu,India.
3 Professor ,Department of Computer Science and Engineering, Prince Dr.K.Vasudevan College of Engineering and
Technology,Tamilnadu,India.
4 Assistant Professor ,Department of Computer Science and Engineering, Prince Dr.K.Vasudevan College of
Engineering and Technology,Tamilnadu,India.
------------------------------------------------------------------***---------------------------------------------------------------
ABSTRACT
Detecting source of the rumor in social network plays a role in limiting the damage caused by them. However rumor spreading in
social network to a shorter distance only can be identified by using some of the methodologies. In this paper, we introduce a
concept to detect root of the rumor that spread in the social network in wider range by using two concepts. First, we make use of
monitor nodes in order to record the data and report it to the server. Second, Greedy Source Set Size (GSSS) Algorithm to find the
exact solution and also improve the efficiency for the problem. The root of the rumour is identified by three methodologies and
they are Identification method, Reverse dissemination method and microscopic rumor spreading model. The identification method
reduces time varying network into series of static network and reverse dissemination method resolve the set of suspect and finally
microscopic method establish the real root of rumor by calculating maximum likelihood(ML) value for each suspect. The
experiment result shows that it can reduce 80-95% of the root of the rumor in social networks in dynamic time varying network
topology.
Keyword:- Monitor nodes, rumor spreading, GSSS, source identification, and maximum likelihood .
1.INTRODUCTION
In today’s world, internet has become the most important
medium to circulate information. Social networks are an
interesting class of graphs likely to become an increasing
importance in the future times [1]. Rumor spreading in
social networks plays a critical role in our society and is
one of the basic mechanisms for the information
dissemination in the networks [2].For instance, in October
2011, a rumor message in social network that "Apple CEO
had heart attack". When the word hit the internet, in first
hour of trading the stock lost 10% of its values, spurred by
panicked investor who believe that entire job is done by
Steve Jobs. The ubiquity and speed access not only
improve efficiency of social media but also main reason for
rapid spreading of rumor about different communities
[3].The solution to this problem are applied in many
applications such as identifying the source of infectious
disease and finding the source of leaked confidential
information.2
1.1 PREDICTION OF RUMOR
The identification of rumor message in social
network is the most preliminary basis to detect the root of
rumor. Existing works mainly detected rumor by analyzing
only shallow features of messages. In many scenarios, it is
not satisfactory in differentiating rumor message from
normal message. But then several methods used a
combination of shallow features and implicit features of
messages in order to identify the rumor message with
efficiency[9].Three methods are mainly consider in
detecting the rumor that comprise of profile based,
information based and traverse based.
1.2 RELATED WORKS
Nowadays, social networks has been incorporated with
several communities in sharing malicious information such
as computer virus and rumors cause damage to our
society[4],[5]. Development of mobile devices had created
a great effect in spreading of dynamic information in social
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1254
network [6]. Several methods are based on identifying
spanning tree in network. The rumor source is considered
to be root of the spanning tree [7], [8] .The main issues are
involved in identifying the root of the rumor and
emergence of diffusion [5].
2. SIR MODEL:
Besides the SI or SIS model, information source
detection under SIR model is more efficient SIR model
refer to susceptible infected recovered. Initially, all nodes
are in susceptible stages once it accepts the rumor it is in
infected stage but if the node decline or reject the rumor it
is in recovered stage. We adopt SIR model because it can
represent the state transition of user when they hear a
rumor, from being susceptible to being recovered.
Generally, people will not believe the rumor again after
they know the truth. Therefore, recovered user will not
transit their states any more. In order to identify the
source we implement three methodologies and are given
as novel identification method, reverse dissemination
method, novel microscopic method.
2.1: IDENTIFICATION METHOD:
This method will convert the time varying social
network, we reduce it as a sequence of static network by
introducing a time integrating window. Each integrating
window aggregates all edges and nodes present in the
specified time period. For example the user may move
from one place to another and also interaction between
the individual appears and disappear in online social
networks (i.e., online /offline).
2.2: REVERSE DISSEMINATION METHOD:
This method is mainly to identify the set of suspects
by sending the copies of rumor from observed nodes in
reverse manner. This method is similar to that of Jordan’s
method whereas Jordan method deals with static network
but our method deals with time varying networks. The
user which receives the copies simultaneously is
considered to be the real root of the rumor. The traditional
method is only used for static networks whereas this
method is used in time varying networks. This method
starts disseminating from the observed nodes with respect
to the infection time of the nodes until it reaches the
sensor that is infected first.
Algorithm 1: Reverse dissemination
Input: A set of observed nodes O= {o1, o2, on}, a set of
infection times of the observed nodes {t1, t2,…tn}, a
threshold α, and a threshold tmax.
Initialize: A set of suspect U=ϕ, and t1=..=tn=T if O is a
snapshot/wavefront, otherwise T=max{t1,t2,///tn}.
for(t starts from 1to a tmax)do
for(oi:I starts from 1 to n)do
if(oi has not started to disseminate the rumor)then
start to propagate the rumor from use
end2
end
for(u:any node in whole network)do
if(user u received n separate rumor from o)then
compute the maximum likelihood
add user u into set u.
end
end
if(u≥αN)then
keep the first α suspects with large maximum likelihood
stop
end
end
Output: A set of suspect.
2.3: MICROSCOPIC RUMOR SPREADING MODEL:
This method is mainly to identify the real root of
the rumor. This model analytically estimates the
probability of each suspect. Maximum likelihood (ML) is
calculated for each suspect and the suspect that has
maximum ML is considered to be the real root of the
rumor. This method is mainly to expose the real source
from the set of suspects. Traditional methods used BFS
trees instead of original networks and mainly based on
node centralization. But this method is mainly based on
complex networks.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1255
3. PROPOSED SYSTEM
In this paper, we implement two methods to
overcome the challenges. First, a number of monitor nodes
is injected into the network whose job is to report data
they receive. The algorithm identifies rumors and their
sources by observing monitor nodes that receives the
given piece of information and which do not. We show
that, with a sufficient number of monitor nodes, it is
possible to recognize most rumors and their sources with
high accuracy. Second, Greedy Source Set Size algorithm is
mainly used to optimize the output result that is produced.
Fig-1: System architecture
3.1GREEDY SOURCE SET SIZE:
Greedy is an algorithmic paradigm that produce a
solution of bit by bit, always choosing the next content
that offers the most obvious and immediate benefits.
Greedy algorithms are used for optimization problems. At
every step, we can make a choice that looks best as a best
choice, and can get the optimal solution of the complete
problem. Many types of algorithm are under greedy are
1. kruskal’s Minimum spanning Tree :
In this algorithm, create a MST by picking edges
next to next. The greedy choice is to pick the smallest
weight edges that doesn’t cause cycle in the MST
constructed so far.
2.Prim’s Minimum spanning tree:
In this algorithm create a MST by picking edges one
by one. we maintain two sets: a set of the vertices already
included in MST and the set of the vertices that are not
included. The greedy choice is to pick the lowest weight
edge that connects the two sets.
3.Dijkstra’s shortest path:
In this, shortest path is build up, edge by edge. we
should maintain two sets: set of vertices already included
in tree and the set of the vertices not yet included.
3.1.1Dijkstra's algorithm:
Dijkstra's algorithm is an algorithm for finding the
shortest path between nodes in a graph, for example,
traffic networks. It was given by computer scientist
Edsger W. Dijkstra in 1956 and published. For a given
source node in the graph, the algorithm identifies the
shortest distance path between that node and every other.
ALGORITHM:
Let the node that are starting be called as initial node. Let
the respective distance of node Y be the distance from
initial node to y.
1. Assign value to every node a tentative distance value: set
it to zero for our initial node and to infinity for all other
nodes.
2. Set the starting node as current node. Mark all other
nodes unvisited nodes. Create a set of all unvisited nodes
called as the unvisited set.
3. For the current node, consider all of its unvisited set of
neighbor and calculate their respective distances. Compare
the newly calculated distance to current assigned value
and select the smaller one.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1256
4. When we are considering all of the neighbors of the
current node, mark the current node as visited node and
remove them from the unvisited set.
5. If the destination node has been marked visited or if the
smallest tentative distance among the nodes in the visited
node and set it is as the new current node and go back to
step 3.
PSEUDOCODE:
Function DijkstraAlgm(G,S)
Create vertex set A
For each vertex V in a G;
Dist[V]<-INFINITY
Prev[V]<-UNDEFINED
ADD V to A
Dist[s]<-0
While A is not empty:u<-vertex in?A with min dist[u]
Remove u from A
For each neighbor v of u:
Alt<-dist[u]+length(u,v)
If alt<dist[v]
Dist[v]<-alt
Prev[v]<-u
Return prev[],dist[]
This algorithm is used to find the shortest path and is
used to identify the nearby source that are available in the
network. This algorithm gives the optimal solution for the
given problem.
EFFICIENCY:
The complexity/efficiency can be expressed in terms of
Big-O Notation. This gives another way of talking about the
way input affects the algorithm’s running time. And it gives
an upper bound of the running time.
In this algorithm, the efficiency varies depending on V=n
DeleteMins and E updates for priority queues that were
used.
If a fibonacci heap was used then the complexity is O(E+V
logV),which is the best bound. The DeleteMins operation
takes O(logV).
4.CONCLUSION
In this paper, we explore the problem of rumor source
identification in time-varying social networks that can be
reduced to a series of static networks by introducing a
time integrating window. In order to address the
challenges posted by time-varying social Networks, we
adopted two innovative methods. Based on this model, the
number of monitor nodes are injected into the network
whose job is to report data they receive. Our algorithm
GSSS is used to identifies the sources by which of the
monitors received the given piece of information.Further
types of observations can be considered in future, such as
multiple observations explored in static networks may
investigate identifying the sources of rumors spreading
across various network platforms.
REFERENCE:
[1] A.Agaskar and Y. M. Lu, “A fast monte carlo algorithm
for source localization on graphs,” in SPIE Optical
Engineering and Applications. International Society for
Optics and Photonics, 2013.
[2] Jiaojiao Jiang , Sheng Wen, Shui Yu,Yang Xiang and
Wanlei Zhou,”Rumor Source Identification in Social
Networks with Time-varying Topology” ,2016.
[3] M.P.Viana, D.R.Amancio,and L.d.F.
Costa,”Ontimevaryingcollaborationnetworks,”Journal of
Infometrics, vol.7,no.2 ,pp.371-378,2013.
[4] W.Zang ,P.Zang, C.Zhou,and L.Guou ,”Discovering
multiple diffusion source nodes in social
networks,”Procedia Computer Science,vol.29,pp.443-
452,2014.
[5] J.Jiang, S.Wen, S.Yu, Y.Xiang and W.Zhou “k-center :An
Approach on the multi-source identification of information
diffusion”,2015.
[6] B.Ribeiro, N.Perra , and A.Baronchelli , ”Quantifying the
temporal resolution on time varying networks,” scientific
reports,vol.3,2013.
[7] K.Zhu and L.Yiang,”information source detection in SIR
model::A sample path based approach,”in Information
Theory and Applications Workshop(ITA),2013,pp.1-9.
[8] P.C. Pinto,P.Thiran, and M.Vetterli,”Locating the source
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1257
of diffusion in large-scale
networks,”phys.Rev.Lett.,vol.109,Aug 2012.
[9] Qiao Zhang,Shuiyuan Zhang,Jian Dong,Jinhua Xiong and
Xueqi Cheng,”Automatic Detection of Rumor on Social
Network,”2015.
BIOGRAPHIES
Nivetha.S is currently pursuing her B.E
degree in Prince shri venkateshwara
padmavathy engineering
college,Tamilnadu.
She is interested in Cryptography and
network security.
She has authored or coauthored.
Priyadharshini .R is currently pursuing
her B.E degree in Prince shri
venkateshwara padmavathy engineering
college,Tamilnadu.
She is interested in Computer graphics.
She has authored or coauthored.
Balakumar.P received the B.Sc, M.Sc,
M.Tech and Ph.D. in Ponnaiyah
Ramajayam College, St.Joseph’s college
and Bharath University in 2003, 2005,
2007, 2011 respectively. He has
authored or coauthored 19 papers in
journals and conferences. He is
interested in Computer networks
He is a professor from 2014 till now in
Prince Dr.K.vasudevan college of
Engineering and Technology. He
received several paper awards from
prestigious multimedia journals and
conferences
Kapila Vani R.K received the B.E degree
in Computer Science and Engineering
and M.E degree in Computer Science and
Engineering from Dhanalakshmi college
of Engineering and alpha college of
Engineering, India in 2006 and 2014
respectively. Her interests include Data
Mining Algorithms and Software
Engineering. She is an assistant
professor from 2014 till now in Prince
Dr.K.vasudevan college of Engineering
and Technology.

More Related Content

What's hot

IRJET- The Hidden Virus Propagation Search Engine Attack
IRJET- The  Hidden Virus  Propagation Search Engine AttackIRJET- The  Hidden Virus  Propagation Search Engine Attack
IRJET- The Hidden Virus Propagation Search Engine AttackIRJET Journal
 
Secure and Reliable Data Transmission in Generalized E-Mail
Secure and Reliable Data Transmission in Generalized E-MailSecure and Reliable Data Transmission in Generalized E-Mail
Secure and Reliable Data Transmission in Generalized E-MailIJERA Editor
 
Twitter in Disaster Mode - Extremecom 2011
Twitter in Disaster Mode - Extremecom 2011Twitter in Disaster Mode - Extremecom 2011
Twitter in Disaster Mode - Extremecom 2011Theus Hossmann
 
Spreading processes on temporal networks
Spreading processes on temporal networksSpreading processes on temporal networks
Spreading processes on temporal networksPetter Holme
 
IRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality DataIRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality DataIRJET Journal
 
A Heuristic Approach for Network Data Clustering
A Heuristic Approach for Network Data ClusteringA Heuristic Approach for Network Data Clustering
A Heuristic Approach for Network Data Clusteringidescitation
 
IIT+Research+Report+(1).compressed
IIT+Research+Report+(1).compressedIIT+Research+Report+(1).compressed
IIT+Research+Report+(1).compressedVikramank Singh
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksijdpsjournal
 
IRJET- Attack Detection Strategies in Wireless Sensor Network
IRJET- Attack Detection Strategies in Wireless Sensor NetworkIRJET- Attack Detection Strategies in Wireless Sensor Network
IRJET- Attack Detection Strategies in Wireless Sensor NetworkIRJET Journal
 
Modelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless NetworksModelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless Networksijeei-iaes
 
A comparative study of social network analysis tools
A comparative study of social network analysis toolsA comparative study of social network analysis tools
A comparative study of social network analysis toolsDavid Combe
 
LCF: A Temporal Approach to Link Prediction in Dynamic Social Networks
 LCF: A Temporal Approach to Link Prediction in Dynamic Social Networks LCF: A Temporal Approach to Link Prediction in Dynamic Social Networks
LCF: A Temporal Approach to Link Prediction in Dynamic Social NetworksIJCSIS Research Publications
 
A computational model of computer virus propagation
A computational model of computer virus propagationA computational model of computer virus propagation
A computational model of computer virus propagationUltraUploader
 
Integration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesIntegration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesiaemedu
 
Social Network Analysis and Visualization
Social Network Analysis and VisualizationSocial Network Analysis and Visualization
Social Network Analysis and VisualizationAlberto Ramirez
 
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...IRJET Journal
 
Disease spreading & control in temporal networks
Disease spreading & control in temporal networksDisease spreading & control in temporal networks
Disease spreading & control in temporal networksPetter Holme
 

What's hot (20)

05 Whole Network Descriptive Stats
05 Whole Network Descriptive Stats05 Whole Network Descriptive Stats
05 Whole Network Descriptive Stats
 
IRJET- The Hidden Virus Propagation Search Engine Attack
IRJET- The  Hidden Virus  Propagation Search Engine AttackIRJET- The  Hidden Virus  Propagation Search Engine Attack
IRJET- The Hidden Virus Propagation Search Engine Attack
 
Secure and Reliable Data Transmission in Generalized E-Mail
Secure and Reliable Data Transmission in Generalized E-MailSecure and Reliable Data Transmission in Generalized E-Mail
Secure and Reliable Data Transmission in Generalized E-Mail
 
Twitter in Disaster Mode - Extremecom 2011
Twitter in Disaster Mode - Extremecom 2011Twitter in Disaster Mode - Extremecom 2011
Twitter in Disaster Mode - Extremecom 2011
 
Spreading processes on temporal networks
Spreading processes on temporal networksSpreading processes on temporal networks
Spreading processes on temporal networks
 
IRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality DataIRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
 
C0363012014
C0363012014C0363012014
C0363012014
 
12 SN&H Keynote: Thomas Valente, USC
12 SN&H Keynote: Thomas Valente, USC12 SN&H Keynote: Thomas Valente, USC
12 SN&H Keynote: Thomas Valente, USC
 
A Heuristic Approach for Network Data Clustering
A Heuristic Approach for Network Data ClusteringA Heuristic Approach for Network Data Clustering
A Heuristic Approach for Network Data Clustering
 
IIT+Research+Report+(1).compressed
IIT+Research+Report+(1).compressedIIT+Research+Report+(1).compressed
IIT+Research+Report+(1).compressed
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networks
 
IRJET- Attack Detection Strategies in Wireless Sensor Network
IRJET- Attack Detection Strategies in Wireless Sensor NetworkIRJET- Attack Detection Strategies in Wireless Sensor Network
IRJET- Attack Detection Strategies in Wireless Sensor Network
 
Modelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless NetworksModelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless Networks
 
A comparative study of social network analysis tools
A comparative study of social network analysis toolsA comparative study of social network analysis tools
A comparative study of social network analysis tools
 
LCF: A Temporal Approach to Link Prediction in Dynamic Social Networks
 LCF: A Temporal Approach to Link Prediction in Dynamic Social Networks LCF: A Temporal Approach to Link Prediction in Dynamic Social Networks
LCF: A Temporal Approach to Link Prediction in Dynamic Social Networks
 
A computational model of computer virus propagation
A computational model of computer virus propagationA computational model of computer virus propagation
A computational model of computer virus propagation
 
Integration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesIntegration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniques
 
Social Network Analysis and Visualization
Social Network Analysis and VisualizationSocial Network Analysis and Visualization
Social Network Analysis and Visualization
 
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
 
Disease spreading & control in temporal networks
Disease spreading & control in temporal networksDisease spreading & control in temporal networks
Disease spreading & control in temporal networks
 

Similar to Detecting root of the rumor in social network using GSSS

Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningIRJET Journal
 
An Efficient Secured And Inspection of Malicious Node Using Double Encryption...
An Efficient Secured And Inspection of Malicious Node Using Double Encryption...An Efficient Secured And Inspection of Malicious Node Using Double Encryption...
An Efficient Secured And Inspection of Malicious Node Using Double Encryption...IRJET Journal
 
journal for research
journal for researchjournal for research
journal for researchrikaseorika
 
IRJET - Fake News Detection: A Survey
IRJET -  	  Fake News Detection: A SurveyIRJET -  	  Fake News Detection: A Survey
IRJET - Fake News Detection: A SurveyIRJET Journal
 
IRJET - Twitter Spam Detection using Cobweb
IRJET - Twitter Spam Detection using CobwebIRJET - Twitter Spam Detection using Cobweb
IRJET - Twitter Spam Detection using CobwebIRJET Journal
 
Detection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social NetworkDetection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social NetworkIRJET Journal
 
Formulation of modularity factor for community detection applying
Formulation of modularity factor for community detection applyingFormulation of modularity factor for community detection applying
Formulation of modularity factor for community detection applyingIAEME Publication
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET Journal
 
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET Journal
 
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET Journal
 
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkDetecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkIRJET Journal
 
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...IRJET Journal
 
Privacy Preserving Aggregate Statistics for Mobile Crowdsensing
Privacy Preserving Aggregate Statistics for Mobile CrowdsensingPrivacy Preserving Aggregate Statistics for Mobile Crowdsensing
Privacy Preserving Aggregate Statistics for Mobile CrowdsensingIJSRED
 
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSA SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSIJCI JOURNAL
 
Identifying Selfish Nodes Using Contact Based Watchman
Identifying Selfish Nodes Using Contact Based WatchmanIdentifying Selfish Nodes Using Contact Based Watchman
Identifying Selfish Nodes Using Contact Based WatchmanAM Publications,India
 
Securing voip communications in an open network
Securing voip communications in an open networkSecuring voip communications in an open network
Securing voip communications in an open networkeSAT Publishing House
 
A comprehensive study of distributed Denial-of-Service attack with the detect...
A comprehensive study of distributed Denial-of-Service attack with the detect...A comprehensive study of distributed Denial-of-Service attack with the detect...
A comprehensive study of distributed Denial-of-Service attack with the detect...IJECEIAES
 
A Survey on Privacy-Preserving Data Aggregation Without Secure Channel
A Survey on Privacy-Preserving Data Aggregation Without Secure ChannelA Survey on Privacy-Preserving Data Aggregation Without Secure Channel
A Survey on Privacy-Preserving Data Aggregation Without Secure ChannelIRJET Journal
 
STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTION
STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTIONSTATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTION
STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTIONIJNSA Journal
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...eSAT Publishing House
 

Similar to Detecting root of the rumor in social network using GSSS (20)

Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
 
An Efficient Secured And Inspection of Malicious Node Using Double Encryption...
An Efficient Secured And Inspection of Malicious Node Using Double Encryption...An Efficient Secured And Inspection of Malicious Node Using Double Encryption...
An Efficient Secured And Inspection of Malicious Node Using Double Encryption...
 
journal for research
journal for researchjournal for research
journal for research
 
IRJET - Fake News Detection: A Survey
IRJET -  	  Fake News Detection: A SurveyIRJET -  	  Fake News Detection: A Survey
IRJET - Fake News Detection: A Survey
 
IRJET - Twitter Spam Detection using Cobweb
IRJET - Twitter Spam Detection using CobwebIRJET - Twitter Spam Detection using Cobweb
IRJET - Twitter Spam Detection using Cobweb
 
Detection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social NetworkDetection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social Network
 
Formulation of modularity factor for community detection applying
Formulation of modularity factor for community detection applyingFormulation of modularity factor for community detection applying
Formulation of modularity factor for community detection applying
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
 
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
 
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
 
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkDetecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
 
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
 
Privacy Preserving Aggregate Statistics for Mobile Crowdsensing
Privacy Preserving Aggregate Statistics for Mobile CrowdsensingPrivacy Preserving Aggregate Statistics for Mobile Crowdsensing
Privacy Preserving Aggregate Statistics for Mobile Crowdsensing
 
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSA SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
 
Identifying Selfish Nodes Using Contact Based Watchman
Identifying Selfish Nodes Using Contact Based WatchmanIdentifying Selfish Nodes Using Contact Based Watchman
Identifying Selfish Nodes Using Contact Based Watchman
 
Securing voip communications in an open network
Securing voip communications in an open networkSecuring voip communications in an open network
Securing voip communications in an open network
 
A comprehensive study of distributed Denial-of-Service attack with the detect...
A comprehensive study of distributed Denial-of-Service attack with the detect...A comprehensive study of distributed Denial-of-Service attack with the detect...
A comprehensive study of distributed Denial-of-Service attack with the detect...
 
A Survey on Privacy-Preserving Data Aggregation Without Secure Channel
A Survey on Privacy-Preserving Data Aggregation Without Secure ChannelA Survey on Privacy-Preserving Data Aggregation Without Secure Channel
A Survey on Privacy-Preserving Data Aggregation Without Secure Channel
 
STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTION
STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTIONSTATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTION
STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTION
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 

Recently uploaded (20)

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 

Detecting root of the rumor in social network using GSSS

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1253 DETECTING ROOT OF THE RUMOR IN SOCIAL NETWORK USING GSSS S.NIVETHA1,R.PRIYADHARSHINI2,P.BALAKUMAR3,R.K.KAPILAVANI4 1B.E,Department of Computer Science and Engineering, Prince Shri Venkateshwara Padmavathy Engineering College,Tamilnadu,India. 2B.E,Department of Computer Science and Engineering, Prince Shri Venkateshwara Padmavathy Engineering College,Tamilnadu,India. 3 Professor ,Department of Computer Science and Engineering, Prince Dr.K.Vasudevan College of Engineering and Technology,Tamilnadu,India. 4 Assistant Professor ,Department of Computer Science and Engineering, Prince Dr.K.Vasudevan College of Engineering and Technology,Tamilnadu,India. ------------------------------------------------------------------***--------------------------------------------------------------- ABSTRACT Detecting source of the rumor in social network plays a role in limiting the damage caused by them. However rumor spreading in social network to a shorter distance only can be identified by using some of the methodologies. In this paper, we introduce a concept to detect root of the rumor that spread in the social network in wider range by using two concepts. First, we make use of monitor nodes in order to record the data and report it to the server. Second, Greedy Source Set Size (GSSS) Algorithm to find the exact solution and also improve the efficiency for the problem. The root of the rumour is identified by three methodologies and they are Identification method, Reverse dissemination method and microscopic rumor spreading model. The identification method reduces time varying network into series of static network and reverse dissemination method resolve the set of suspect and finally microscopic method establish the real root of rumor by calculating maximum likelihood(ML) value for each suspect. The experiment result shows that it can reduce 80-95% of the root of the rumor in social networks in dynamic time varying network topology. Keyword:- Monitor nodes, rumor spreading, GSSS, source identification, and maximum likelihood . 1.INTRODUCTION In today’s world, internet has become the most important medium to circulate information. Social networks are an interesting class of graphs likely to become an increasing importance in the future times [1]. Rumor spreading in social networks plays a critical role in our society and is one of the basic mechanisms for the information dissemination in the networks [2].For instance, in October 2011, a rumor message in social network that "Apple CEO had heart attack". When the word hit the internet, in first hour of trading the stock lost 10% of its values, spurred by panicked investor who believe that entire job is done by Steve Jobs. The ubiquity and speed access not only improve efficiency of social media but also main reason for rapid spreading of rumor about different communities [3].The solution to this problem are applied in many applications such as identifying the source of infectious disease and finding the source of leaked confidential information.2 1.1 PREDICTION OF RUMOR The identification of rumor message in social network is the most preliminary basis to detect the root of rumor. Existing works mainly detected rumor by analyzing only shallow features of messages. In many scenarios, it is not satisfactory in differentiating rumor message from normal message. But then several methods used a combination of shallow features and implicit features of messages in order to identify the rumor message with efficiency[9].Three methods are mainly consider in detecting the rumor that comprise of profile based, information based and traverse based. 1.2 RELATED WORKS Nowadays, social networks has been incorporated with several communities in sharing malicious information such as computer virus and rumors cause damage to our society[4],[5]. Development of mobile devices had created a great effect in spreading of dynamic information in social
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1254 network [6]. Several methods are based on identifying spanning tree in network. The rumor source is considered to be root of the spanning tree [7], [8] .The main issues are involved in identifying the root of the rumor and emergence of diffusion [5]. 2. SIR MODEL: Besides the SI or SIS model, information source detection under SIR model is more efficient SIR model refer to susceptible infected recovered. Initially, all nodes are in susceptible stages once it accepts the rumor it is in infected stage but if the node decline or reject the rumor it is in recovered stage. We adopt SIR model because it can represent the state transition of user when they hear a rumor, from being susceptible to being recovered. Generally, people will not believe the rumor again after they know the truth. Therefore, recovered user will not transit their states any more. In order to identify the source we implement three methodologies and are given as novel identification method, reverse dissemination method, novel microscopic method. 2.1: IDENTIFICATION METHOD: This method will convert the time varying social network, we reduce it as a sequence of static network by introducing a time integrating window. Each integrating window aggregates all edges and nodes present in the specified time period. For example the user may move from one place to another and also interaction between the individual appears and disappear in online social networks (i.e., online /offline). 2.2: REVERSE DISSEMINATION METHOD: This method is mainly to identify the set of suspects by sending the copies of rumor from observed nodes in reverse manner. This method is similar to that of Jordan’s method whereas Jordan method deals with static network but our method deals with time varying networks. The user which receives the copies simultaneously is considered to be the real root of the rumor. The traditional method is only used for static networks whereas this method is used in time varying networks. This method starts disseminating from the observed nodes with respect to the infection time of the nodes until it reaches the sensor that is infected first. Algorithm 1: Reverse dissemination Input: A set of observed nodes O= {o1, o2, on}, a set of infection times of the observed nodes {t1, t2,…tn}, a threshold α, and a threshold tmax. Initialize: A set of suspect U=ϕ, and t1=..=tn=T if O is a snapshot/wavefront, otherwise T=max{t1,t2,///tn}. for(t starts from 1to a tmax)do for(oi:I starts from 1 to n)do if(oi has not started to disseminate the rumor)then start to propagate the rumor from use end2 end for(u:any node in whole network)do if(user u received n separate rumor from o)then compute the maximum likelihood add user u into set u. end end if(u≥αN)then keep the first α suspects with large maximum likelihood stop end end Output: A set of suspect. 2.3: MICROSCOPIC RUMOR SPREADING MODEL: This method is mainly to identify the real root of the rumor. This model analytically estimates the probability of each suspect. Maximum likelihood (ML) is calculated for each suspect and the suspect that has maximum ML is considered to be the real root of the rumor. This method is mainly to expose the real source from the set of suspects. Traditional methods used BFS trees instead of original networks and mainly based on node centralization. But this method is mainly based on complex networks.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1255 3. PROPOSED SYSTEM In this paper, we implement two methods to overcome the challenges. First, a number of monitor nodes is injected into the network whose job is to report data they receive. The algorithm identifies rumors and their sources by observing monitor nodes that receives the given piece of information and which do not. We show that, with a sufficient number of monitor nodes, it is possible to recognize most rumors and their sources with high accuracy. Second, Greedy Source Set Size algorithm is mainly used to optimize the output result that is produced. Fig-1: System architecture 3.1GREEDY SOURCE SET SIZE: Greedy is an algorithmic paradigm that produce a solution of bit by bit, always choosing the next content that offers the most obvious and immediate benefits. Greedy algorithms are used for optimization problems. At every step, we can make a choice that looks best as a best choice, and can get the optimal solution of the complete problem. Many types of algorithm are under greedy are 1. kruskal’s Minimum spanning Tree : In this algorithm, create a MST by picking edges next to next. The greedy choice is to pick the smallest weight edges that doesn’t cause cycle in the MST constructed so far. 2.Prim’s Minimum spanning tree: In this algorithm create a MST by picking edges one by one. we maintain two sets: a set of the vertices already included in MST and the set of the vertices that are not included. The greedy choice is to pick the lowest weight edge that connects the two sets. 3.Dijkstra’s shortest path: In this, shortest path is build up, edge by edge. we should maintain two sets: set of vertices already included in tree and the set of the vertices not yet included. 3.1.1Dijkstra's algorithm: Dijkstra's algorithm is an algorithm for finding the shortest path between nodes in a graph, for example, traffic networks. It was given by computer scientist Edsger W. Dijkstra in 1956 and published. For a given source node in the graph, the algorithm identifies the shortest distance path between that node and every other. ALGORITHM: Let the node that are starting be called as initial node. Let the respective distance of node Y be the distance from initial node to y. 1. Assign value to every node a tentative distance value: set it to zero for our initial node and to infinity for all other nodes. 2. Set the starting node as current node. Mark all other nodes unvisited nodes. Create a set of all unvisited nodes called as the unvisited set. 3. For the current node, consider all of its unvisited set of neighbor and calculate their respective distances. Compare the newly calculated distance to current assigned value and select the smaller one.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1256 4. When we are considering all of the neighbors of the current node, mark the current node as visited node and remove them from the unvisited set. 5. If the destination node has been marked visited or if the smallest tentative distance among the nodes in the visited node and set it is as the new current node and go back to step 3. PSEUDOCODE: Function DijkstraAlgm(G,S) Create vertex set A For each vertex V in a G; Dist[V]<-INFINITY Prev[V]<-UNDEFINED ADD V to A Dist[s]<-0 While A is not empty:u<-vertex in?A with min dist[u] Remove u from A For each neighbor v of u: Alt<-dist[u]+length(u,v) If alt<dist[v] Dist[v]<-alt Prev[v]<-u Return prev[],dist[] This algorithm is used to find the shortest path and is used to identify the nearby source that are available in the network. This algorithm gives the optimal solution for the given problem. EFFICIENCY: The complexity/efficiency can be expressed in terms of Big-O Notation. This gives another way of talking about the way input affects the algorithm’s running time. And it gives an upper bound of the running time. In this algorithm, the efficiency varies depending on V=n DeleteMins and E updates for priority queues that were used. If a fibonacci heap was used then the complexity is O(E+V logV),which is the best bound. The DeleteMins operation takes O(logV). 4.CONCLUSION In this paper, we explore the problem of rumor source identification in time-varying social networks that can be reduced to a series of static networks by introducing a time integrating window. In order to address the challenges posted by time-varying social Networks, we adopted two innovative methods. Based on this model, the number of monitor nodes are injected into the network whose job is to report data they receive. Our algorithm GSSS is used to identifies the sources by which of the monitors received the given piece of information.Further types of observations can be considered in future, such as multiple observations explored in static networks may investigate identifying the sources of rumors spreading across various network platforms. REFERENCE: [1] A.Agaskar and Y. M. Lu, “A fast monte carlo algorithm for source localization on graphs,” in SPIE Optical Engineering and Applications. International Society for Optics and Photonics, 2013. [2] Jiaojiao Jiang , Sheng Wen, Shui Yu,Yang Xiang and Wanlei Zhou,”Rumor Source Identification in Social Networks with Time-varying Topology” ,2016. [3] M.P.Viana, D.R.Amancio,and L.d.F. Costa,”Ontimevaryingcollaborationnetworks,”Journal of Infometrics, vol.7,no.2 ,pp.371-378,2013. [4] W.Zang ,P.Zang, C.Zhou,and L.Guou ,”Discovering multiple diffusion source nodes in social networks,”Procedia Computer Science,vol.29,pp.443- 452,2014. [5] J.Jiang, S.Wen, S.Yu, Y.Xiang and W.Zhou “k-center :An Approach on the multi-source identification of information diffusion”,2015. [6] B.Ribeiro, N.Perra , and A.Baronchelli , ”Quantifying the temporal resolution on time varying networks,” scientific reports,vol.3,2013. [7] K.Zhu and L.Yiang,”information source detection in SIR model::A sample path based approach,”in Information Theory and Applications Workshop(ITA),2013,pp.1-9. [8] P.C. Pinto,P.Thiran, and M.Vetterli,”Locating the source
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1257 of diffusion in large-scale networks,”phys.Rev.Lett.,vol.109,Aug 2012. [9] Qiao Zhang,Shuiyuan Zhang,Jian Dong,Jinhua Xiong and Xueqi Cheng,”Automatic Detection of Rumor on Social Network,”2015. BIOGRAPHIES Nivetha.S is currently pursuing her B.E degree in Prince shri venkateshwara padmavathy engineering college,Tamilnadu. She is interested in Cryptography and network security. She has authored or coauthored. Priyadharshini .R is currently pursuing her B.E degree in Prince shri venkateshwara padmavathy engineering college,Tamilnadu. She is interested in Computer graphics. She has authored or coauthored. Balakumar.P received the B.Sc, M.Sc, M.Tech and Ph.D. in Ponnaiyah Ramajayam College, St.Joseph’s college and Bharath University in 2003, 2005, 2007, 2011 respectively. He has authored or coauthored 19 papers in journals and conferences. He is interested in Computer networks He is a professor from 2014 till now in Prince Dr.K.vasudevan college of Engineering and Technology. He received several paper awards from prestigious multimedia journals and conferences Kapila Vani R.K received the B.E degree in Computer Science and Engineering and M.E degree in Computer Science and Engineering from Dhanalakshmi college of Engineering and alpha college of Engineering, India in 2006 and 2014 respectively. Her interests include Data Mining Algorithms and Software Engineering. She is an assistant professor from 2014 till now in Prince Dr.K.vasudevan college of Engineering and Technology.