SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 757
Detection and Minimization Influence of Rumor in Social Network
Surekha Rawale1, Sapana Birkure2, Kajal Hiray3 , Prof. Deepti Deshmukh4
1,2,3 B.E. Students, Dept. of Computer Engineering, D. Y. Patil Institute of Engineering and Technology, Ambi,
Pune University, Maharashtra, India
4 Assistant Professor, Dept. of Computer Engineering, D. Y. Patil Institute of Engineering and Technology, Ambi,
Pune University, Maharashtra, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - With the fast development of big scale on-line
social networks, on-line datasharingisbecomingomnipresent
daily. Numerous info is propagating through on-line social
networks similarly as every the positive and negative.
Throughout this paper, we tend to tend to focus on the
negative data problems just like the on-line rumours. Rumor
block may well be a significant drawback in large-scale social
networks. Malicious rumours might causechaosinsocietyand
sought to be blocked as soon as potential once being detected.
during this paper, we tend to propose a model of dynamic
rumor influence reduction with user expertise (DRIMUX).Our
goal is to cut back the influence of the rumor (i.e., the number
of users that have accepted and sent the rumor) by block an
exact set of nodes. A dynamic Ising propagation model
considering every the worldwide quality and individual
attraction of the rumor is given supported realistic state of
affairs. To boot, altogether completely different from existing
problems with influence reduction, we tend to tend to require
into thought the constraint of user experience utility.
Specifically, each node is assigned a tolerance time threshold.
If the block time of each user exceeds that threshold, theutility
of the network will decrease. Underneath this constraint, we
tend to tend to then formulate draw back as a network
abstract thought drawback with survival theory, and propose
solutions supported most probability principle. Experiments
area unit implemented supported large-scale world networks
and validate the effectiveness of our methodology.
Key Words: Social network, Rumor Influence
Minimization, rumor blocking strategies, survival
theory.
With the speedy development and rising quality of large-
scale social networks like Twitter, Facebook etc., many in
numerable individualsarea unitreadytobecomefriends[10]
and share every kind of knowledgewithoneanother.On-line
social network analysis has additionally attracted growing
interest among researchers.[11],[12] On onehand,theseon-
line social platforms offer nice convenience to the diffusion
of positive info like new ideas, innovations, and hot topics.
On the opposite hand, however, they will become a channel
for the spreading of malicious rumours or information [1],
[15], and [16]. As an example,someindividualscouldposton
social networks a rumor concerning associate degree
approaching earthquake, which can cause chaos among the
group and thus could hinder the conventional public order.
During this case, it's necessary to discover the rumor Source
and delete connected messages, whichcanbeenoughtostop
the rumor from any spreading. However, in bound extreme
circumstances like terrorist on-line attack, it might be
necessary to disable or block connected Social Network (SN)
accounts to avoid serious negative influences. For instance,
in 2016, the families of 3 out of the forty 9 victims from the
metropolis cabaret shooting incident filed a causa against
Twitter, Facebook and Google for providing “material
support” to the coercion organization of the Islamic State of
Republic of Iraq and Asian nation (ISIS)[17].These
companies then took measures to dam connected accounts,
delete relevant posts and fan pages on their social network
platforms to stop the ISIS from spreading malicious info. to
boot, Facebook etv. even have issued relevant security
policies and standards to assert the authority to dam
accounts of users once they square measure against rules or
in danger [18]. without doubt, malicious rumors ought to be
stopped as presently as potential once detectedinorderthat
their negative influence will be reduced. Mostoftheprevious
works studied the matter of increasing the influence of
positive info through social networks. quick approximation
ways were additionally planned to influence maximization
drawback. In distinction, the negative influence attention,
however still there are consistent efforts on minimization
Problem has gained a lot of less planning effective ways for
obstruction malicious rumours and minimizing the negative
influence.
2. LITERATURE SURVE
PAPER(1): DRIMUX: Dynamic Rumor Influence
Minimization with User Experience in Social
Networks(2016)
In this paper, we have a tendency to specialize in the
negative info issues like the web rumors. Rumorobstruction
could be a significant issue in large-scale social networks.
Malicious rumors may cause chaos in society and therefore
got to be blocked as shortly as attainable once being
detected. during this paper, we have a tendencytoproposea
model of dynamic rumor influence reduction with user
expertise (DRIMUX). Our goal is to attenuate theinfluenceof
the rumor (i.e., the amount of users that have accepted and
sent the rumor) by obstruction a precise set of nodes
1. INTRODUCTION
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 758
PAPER (2): Maximizing Acceptance Probability for Active
Friending in Online Social Networks (2013)
In this paper, we have a tendency to advocate a
recommendation support for active friending, wherever a
user actively specifies a friending target. To the most
effective of our data, a recommendation designed to supply
steerage for a user to consistently approach his friending
target has not been explored for existing on-line social
networking services. to maximise the likelihood that the
friending target would settle for a call for participation from
the user, we have a tendency to formulate a replacement
optimisation downside, namely, Acceptance likelihood
Maximization (APM), and develop a polynomial time rule,
known as SelectiveinvitewithTreeandIn-NodeAggregation
(SITINA), to seek out the best resolution.wehavea tendency
to implement a full of life friending service with SITINA on
Facebook to validate our plan. Our user study and
experimental resultsreveal thatSITINAoutperformsmanual
choice and therefore the baseline approach in resolution
quality with efficiency.
PAPER (3): Limiting the Spread of Misinformation in Social
Networks (2011)
In paper developed four malicious applications, and
evaluated Andromaly ability to detect new malware
based on samples of known malware. They evaluated
several combinations of anomaly detection algorithms,
feature selection method and the number of top features in
order to find the combination that yields the best
performance in detecting new malware on Android.
Empirical results suggest that the proposed framework is
effective in detecting malware on mobile devices in general
and on Android in particular.
PAPER(4): Efficient Influence Maximization in Social
Networks (2009)
In this paper, we have a tendency to study the economical
influence maximization from 2 complementary directions.
One is to enhance the first greedy formula and its
improvement to more scale back its period of time, and also
the second is to propose new degree discountheuristicsthat
improves influence unfold. we have a tendency to measure
Our algorithms by experiments on 2 giant educational
collaboration graphs obtained from the net deposit
information arXiv.org.
PAPER (5): A Fast Approximation for Influence
Maximization in Large Social Networks (2014)
This paper deals with a completely unique analysis work a
couple of new economical approximation algorithmic
program for influence maximization, that was introduced to
maximise the good thing about infectious agent promoting.
For potency, we tend to devise 2 of exploiting the 2-hop
influence unfold which is that the influence unfold on nodes
inside 2-hops removed from nodes in a very seedset.Firstly,
we tend to propose a brand new greedy methodologyforthe
influence maximization drawback exploitation the 2-hop
influence unfold. Secondly, to hurry up the new greedy
methodology, we tend to devise a good manner of removing
uncalled-for nodes for influence maximization Based on
optimum seed’s native influence heuristics.
3. EXISTING SYSTEM
Most of the previous works studied the matter of
maximizing the influence of positive data through social
networks..In distinction, the negative influence diminution
drawback has gained a lot of less attention, however still
there are consistent efforts oncomingupwith effectiveways
for block malicious rumors and minimizing the negative
influence. Kimura et al. Studied the matter of minimizingthe
propagation of malicious rumors by block a restricted range
of links in a very social network. They provided2completely
different definitions of contamination degree and planned
corresponding optimisation algorithms. Fan et al.
investigated the smallest amount price rumor block
drawback in social networks. They introduced the
conception of “protectors” and check outtopick a borderline
range of them to limit the dangerous influence of rumors by
triggering a protection cascade against the rumor cascade.
However, there square measure some limitations in those
works.
Algorithm:1 Greedy Algorithm
Different from the greedy blockingalgorithm,whichisa type
of static blocking algorithm, we propose a dynamic rumor
blocking algorithm aiming to incrementally block the
selected nodes instead of blocking them at once. Inthatcase,
the blocking strategy is split into several rounds and each
round can be regarded as a greedy algorithm. Thus, how to
choose the number of rounds is also very important for the
algorithm. In the following part, we will elaborate on the
algorithm design and how we choose the specific
parameters. From the probabilistic perspective, we seek to
formulate the likelihood of inactive nodes becoming
activated in every round of rumor blocking.
Correspondingly, the likelihood
function is given by
Correspondingly, the objective function is
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 759
Then, the greedy algorithm is presented as below:
Input: Initial Edge matrix A0
Initialization: VB = 0;
for i = 1 to K do
u = arg max [f (t1|s (t0); Ai-1) - f (t1 | s (t0); Ai-1 ʋ)]
Ai: = Ai-1u,
VB = VB U {u}
end for
Output: VB.
Mathematical Model of Existing System
System S as a whole can be defined with the following main
components.
S= {I, O, P, s, e, U, Uf, Ad};
S=System
s=Initial State
e=Final State
U= user
Uf=Set of user friends
Ad=admin
Input {I} = {Input1, Input2}
Where,
Input1=Text
Input2=Images
Procedures {P}= {Up,Sp,Ubloack,Rdetect}
Where,
Up=upload post.
Sp=Share Post.
Ubloack= Block user who sent or shared rumor text and
images.
Rdetect=Detect rumor text and images.
Output {O} = {Output1, Output2}
Where,
Output1=detecting rumor texts & images
Output2=block user who sent or shared rumor text and
images
s= {initially system will be in a state where user are not
enrolled, Only admin of system.}
e= {users are enrolled and successfully post or share text or
images & admin detect and rumor text and images and also
block user who sent or shared rumor text and images }
Result of Existing System:
Existing system Detect rumor post and text and block user
who sent rumor test or image for long time so they may quit
social network. And not delete rumor post.
4. PROPOSE SYSTEM
We propose a rumor propagation model taking under
consideration the subsequent 3 elements: initial, the
worldwide quality of the rumor over the whole social
network, i.e., the final topic dynamics. Second, the attraction
dynamics of the rumor to a possible spreader, i.e., the
individual tendency to forward the rumor to its neighbours.
Third, the acceptance chance of the rumor recipients. In our
model, galvanized by the Ising model, we have a tendency to
mix all 3 factors along to propose a cooperative rumor
propagation chance. In our rumor interference ways, we
have a tendency to think about the influence of interference
time to user expertise in universe social networks.therefore
we have a tendency to propose a interference time
constraint into the standard rumor influence diminution
objective perform. in this case, our technique optimizes the
rumor interference strategy while not sacrificing the web
user expertise.
we have a tendency to use survival theory to investigate the
chance of nodes turning into activated or infected by the
rumor before a time threshold that is setbytheuserexpertise
constraint. Then we have a tendency to propose each greedy
and dynamic interference algorithms mistreatment the most
chance principle.
Advantages of Proposed System
1) Efficacy of our system is better than existing
System.
2) Our system block user who shares rumor posts for
particular period of time
Result of Proposed System:
Proposed system Detect rumor post and text and block user
who sent rumor test or image for short period of time so
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 760
they not quit social network. And delete rumor post to avoid
chaos among the crowd.
Algorithm:2 Dynamic Blocking Algorithm
Different from the greedy blockingalgorithm,whichisa type
of static blocking algorithm, we propose a dynamic rumor
blocking algorithm aiming to incrementally block the
selected nodes instead of blocking them at once. Inthatcase,
the blocking strategy is split into several rounds and each
round can be regarded as a greedy algorithm. Thus, how to
choose the number of rounds is also very important for the
algorithm.
Input: Initial Edge matrix A0
Initialization: VB(t) = 0.
for j = 1 to n do
for i = 1 to kj do
Δf = f (tj |s (tj-1); Ai-1) – f (tj |s (tj-1); Ai-1ʋ),
u = arg max {Δf},
Ai: = Ai-1u,
VB(tj) = VB(tj) U {u}.
end for
end for
Output: VB(t).
Algorithm:3 K-means Algorithm
k-means is one of the simplest unsupervised learning
algorithms that solve the well known clustering problem.
The procedure follows a simple and easy way to classify a
given data set through a certain numberof clusters(assume
k clusters) fixed apriori. The main idea is to define k
centers, one for each cluster. These centers should be
placed in a cunning way because of different location
causes different result. So, the better choice is to place
them as much as possible far away from each other. The
next step is to take each point belonging to a given data set
and associate it to the nearest center. When no point is
pending, the first step is completed and an early group age
is done. At this point we need to re-calculatek newcentroids
as barycenter of the clusters resulting from the previous
step. After we have these k new centroids, a new binding has
to be done between the same data set points and the
nearest new center. A loop has been generated. As a resultof
this loop we may notice that the k centers change their
location step by step until no more changes are done or in
other words centers do not move any more.
Mathematical Model of Existing System
System S as a whole can be defined with the following main
components.
S= {I, O, P, s, e, U, Uf, Ad};
S=System
s=Initial State
e=Final State
U= user
Uf=Set of user friends
Ad=admin
Input {I} = {Input1, Input2}
Where,
Input1=Text
Input2=Images
Procedures {P}= {Up,Sp,Ubloack,Rdetect, Rdelete }
Where,
Up=upload post.
Sp=Share Post.
Ubloack= Block user who sent or shared rumor text and
images.
Rdetect=Detect rumor text and images.
Rdelete= Delete rumor text and images
Output {O} = {Output1, Output2, Output3}
Where,
Output1=detecting rumor texts & images
Output2=delete rumor texts & images
Output3=block user who sent or shared rumor text and
images
s= {initially system will be in a state where user are not
enrolled, Only admin of system.}
e= {users are enrolled and successfully post or share text
or images & admin detect and delete rumor text and
images and also block user who sent or shared rumor text
and images }
5. CONCLUSION
In this paper, we tend to investigate the rumor obstruction
downside in social networks. we tend to propose the
dynamic rumor influence reduction with user expertise
model to formulate the matter. A dynamic rumor diffusion
model incorporating each world rumor quality and
individual tendency is conferred supported the Ising model.
Then we tend to introduce the thought of user expertise
utility and propose a changed version of utility perform to
live the connection between the utility and obstructiontime.
After that, we tend to use the survival theory to investigate
the probability of nodes obtaining activated beneath the
constraint of user expertise utility.Greedy algorithmic rule
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 761
and a dynamic obstruction algorithmic rule area unit
projected to unravel the optimization downside supported
totally different nodes choice methods. Experiments
enforced on planet social networks show the efficaciousness
of our methodology.
6. ACKNOWLEDGEMENT
This work is supported by Prof. Deepti Deshmukh (D Y
Patil Institute of Engineering & Technology, Ambi)
7. REFERENCES
[1] B. Wang, G. Chen, L. Fu, L. Song, and X. Wang,
“Drimux: Dynamic rumor influence minimization
with user experience in social networks,” in Proc.
30th AAAI Int. Conf. Artif. Intell., Feb. 2016.
[2] C. Budak, D. Agrawal, and A. E. Abbadi, “Limitingthe
spread of misinformation in social networks,” in
Proc. 20th Int. Conf. World Wide Web, 2011, pp.
665–674.
[3] M. Kimura, K. Saito, and H. Motoda, “Blocking links
to minimize contamination spread in a social
network,” ACM Trans. Knowl.Discov.Data,vol.3,no.
2, pp. 9:1–9:23, Apr. 2009.
[4] L. Fan, Z. Lu, W. Wu, B. Thuraisingham, H. Ma, and Y.
Bi, “Least cost rumor blocking in social networks,”
in Proc. IEEE ICDCS’13,Philadelphia, PA, Jul. 2013,
pp. 540–549.
[5] J. Yang and J. Leskovec, “Patterns of temporal
variation in online media,” in Proc. ACM Int. Conf.
Web Search Data Minig, 2011, pp. 177–186.
[6] R. Crane and D. Sornette, “Robust dynamic classes
revealed by measuring the response function of a
social system,” in Proc. of the Natl. Acad. Sci. USA,
vol. 105, no. 41, Apr. 2008, pp. 15 649–15 653.
[7] S. Han, F. Zhuang, Q. He, Z. Shi, and X. Ao, “Energy
model for rumor propagation on social networks,”
Physica A: Statistical Mechanics and its
Applications, vol. 394, pp. 99–109, Jan. 2014.
[8] D. Chelkak and S. Smirnov, “Universality in the 2d
ising model and conformal invariance of fermionic
observables,”InventionesMathmaticae,vol.189,pp.
515–580, Sep. 2012.
[9] W. Chen, C.Wang, and Y.Wang, “Scalable influence
maximization for prevalentviral marketinginlarge-
scale social networks,” in Proc. 16th ACM SIGKDD
Int. Conf. Knowl. Discovery Data Mining, 2010, pp.
1029–1038.
[10] S. Shirazipourazad, B. Bogard, H. Vachhani,
and A. Sen, “Influence propagation in adversarial
setting: How to defeat competition with least
amount of investment,” in Proc. 21st ACM Int. Conf.
Inf. Knowl. Manag., 2012, pp. 585–594.
[11] D. N. Yang, H. J. Hung, W. C. Lee, and W.
Chen, “Maximizing acceptanceprobabilityforactive
friending in online social networks,” in Proc. 19th
ACM SIGKDD Int. Conf. Knowl. Discovery Data
Mining, 2013, pp. 713–721.
[12] J. Leskovec, L. A. Adamic, and B. A.
Huberman, “The dynamics of viral marketing,” in
Proc. 7th ACM Conf. Electronic Commerce,2006,pp.
228–237.
[13] A.McCallum, A. Corrada-Emmanuel, and X.
Wang, “Topic and role discovery in social
networks,” in Proc. 19th Int. Joint Conf.Artif. Intell.,
2005, pp. 786–791.
M. E. J. Newman, “The structure of scientific
collaboration networks,”in Proceedings of National
Academy of Science, 2001, pp.404–409.
[14] L. Fu, W. Huang, X. Gan, F. Yang, and X.
Wang, “Capacity of wireless networks with social
characteristics,” IEEETrans. WirelessCommun.,vol.
15, pp. 1505–1516, Feb. 2016.
[15] A.Bessi, F. Petroni, M. Del Vicario, F. Zollo,
A. Anagnostopoulos,A. Scala, G. Caldarelli, and W.
Quattrociocchi, “Viral misinformation:The role of
homophily and polarization,” in Proc. 24th Int.Conf.
World Wide Web, 2015, pp. 355–356.
[16] E. Serrano, C. A. Iglesias, and M. Garijo, “A
novel agent-based rumor spreading model in
twitter,” in Proc. 24th Int. Conf. World Wide Web,
2015, pp. 811–814.
[17] S. Fiegerman, “Facebook, google, twitter
accused of enabling isis,”
http://money.cnn.com/2016/12/20/technology/t
witterfacebook-google-lawsuit-isis, 2016.
[18] Facebook, “Facebook community
standards,” https://
www.facebook.com/communitystandards.

More Related Content

What's hot

The Role of Social Influence In Security Feature Adoption, at CSCW 2015
The Role of Social Influence In Security Feature Adoption, at CSCW 2015The Role of Social Influence In Security Feature Adoption, at CSCW 2015
The Role of Social Influence In Security Feature Adoption, at CSCW 2015
Jason Hong
 
07 Whole Network Descriptive Statistics
07 Whole Network Descriptive Statistics07 Whole Network Descriptive Statistics
07 Whole Network Descriptive Statistics
Duke Network Analysis Center
 
People Pattern: "The Science of Sharing"
People Pattern: "The Science of Sharing"People Pattern: "The Science of Sharing"
People Pattern: "The Science of Sharing"
People Pattern
 
05 Whole Network Descriptive Stats
05 Whole Network Descriptive Stats05 Whole Network Descriptive Stats
05 Whole Network Descriptive Stats
Duke Network Analysis Center
 
18 Diffusion Models and Peer Influence
18 Diffusion Models and Peer Influence18 Diffusion Models and Peer Influence
18 Diffusion Models and Peer Influence
Duke Network Analysis Center
 
Social Network Analysis: applications for education research
Social Network Analysis: applications for education researchSocial Network Analysis: applications for education research
Social Network Analysis: applications for education research
Christian Bokhove
 
AP42: Social Media and Healthcare Marketing
AP42: Social Media and Healthcare MarketingAP42: Social Media and Healthcare Marketing
AP42: Social Media and Healthcare Marketing
AP42
 
204
204204
00 Automatic Mental Health Classification in Online Settings and Language Emb...
00 Automatic Mental Health Classification in Online Settings and Language Emb...00 Automatic Mental Health Classification in Online Settings and Language Emb...
00 Automatic Mental Health Classification in Online Settings and Language Emb...
Duke Network Analysis Center
 
09 Ego Network Analysis
09 Ego Network Analysis09 Ego Network Analysis
09 Ego Network Analysis
Duke Network Analysis Center
 
Social network analysis for modeling & tuning social media website
Social network analysis for modeling & tuning social media websiteSocial network analysis for modeling & tuning social media website
Social network analysis for modeling & tuning social media website
Edward B. Rockower
 
Selas Turkiye Influence And Passivity In Social Media Excerpted
Selas Turkiye Influence And Passivity In Social Media ExcerptedSelas Turkiye Influence And Passivity In Social Media Excerpted
Selas Turkiye Influence And Passivity In Social Media ExcerptedZiya NISANOGLU
 
1999 ACM SIGCHI - Counting on Community in Cyberspace
1999   ACM SIGCHI - Counting on Community in Cyberspace1999   ACM SIGCHI - Counting on Community in Cyberspace
1999 ACM SIGCHI - Counting on Community in CyberspaceMarc Smith
 
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Jason Hong
 
Link Prediction Survey
Link Prediction SurveyLink Prediction Survey
Link Prediction Survey
Patrick Walter
 
00 Differentiating Between Network Structure and Network Function
00 Differentiating Between Network Structure and Network Function00 Differentiating Between Network Structure and Network Function
00 Differentiating Between Network Structure and Network Function
Duke Network Analysis Center
 
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...
Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...
Jason Hong
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis
Marc Smith
 
Researching Social Media – Big Data and Social Media Analysis
Researching Social Media – Big Data and Social Media AnalysisResearching Social Media – Big Data and Social Media Analysis
Researching Social Media – Big Data and Social Media Analysis
Farida Vis
 
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Jason Hong
 

What's hot (20)

The Role of Social Influence In Security Feature Adoption, at CSCW 2015
The Role of Social Influence In Security Feature Adoption, at CSCW 2015The Role of Social Influence In Security Feature Adoption, at CSCW 2015
The Role of Social Influence In Security Feature Adoption, at CSCW 2015
 
07 Whole Network Descriptive Statistics
07 Whole Network Descriptive Statistics07 Whole Network Descriptive Statistics
07 Whole Network Descriptive Statistics
 
People Pattern: "The Science of Sharing"
People Pattern: "The Science of Sharing"People Pattern: "The Science of Sharing"
People Pattern: "The Science of Sharing"
 
05 Whole Network Descriptive Stats
05 Whole Network Descriptive Stats05 Whole Network Descriptive Stats
05 Whole Network Descriptive Stats
 
18 Diffusion Models and Peer Influence
18 Diffusion Models and Peer Influence18 Diffusion Models and Peer Influence
18 Diffusion Models and Peer Influence
 
Social Network Analysis: applications for education research
Social Network Analysis: applications for education researchSocial Network Analysis: applications for education research
Social Network Analysis: applications for education research
 
AP42: Social Media and Healthcare Marketing
AP42: Social Media and Healthcare MarketingAP42: Social Media and Healthcare Marketing
AP42: Social Media and Healthcare Marketing
 
204
204204
204
 
00 Automatic Mental Health Classification in Online Settings and Language Emb...
00 Automatic Mental Health Classification in Online Settings and Language Emb...00 Automatic Mental Health Classification in Online Settings and Language Emb...
00 Automatic Mental Health Classification in Online Settings and Language Emb...
 
09 Ego Network Analysis
09 Ego Network Analysis09 Ego Network Analysis
09 Ego Network Analysis
 
Social network analysis for modeling & tuning social media website
Social network analysis for modeling & tuning social media websiteSocial network analysis for modeling & tuning social media website
Social network analysis for modeling & tuning social media website
 
Selas Turkiye Influence And Passivity In Social Media Excerpted
Selas Turkiye Influence And Passivity In Social Media ExcerptedSelas Turkiye Influence And Passivity In Social Media Excerpted
Selas Turkiye Influence And Passivity In Social Media Excerpted
 
1999 ACM SIGCHI - Counting on Community in Cyberspace
1999   ACM SIGCHI - Counting on Community in Cyberspace1999   ACM SIGCHI - Counting on Community in Cyberspace
1999 ACM SIGCHI - Counting on Community in Cyberspace
 
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
 
Link Prediction Survey
Link Prediction SurveyLink Prediction Survey
Link Prediction Survey
 
00 Differentiating Between Network Structure and Network Function
00 Differentiating Between Network Structure and Network Function00 Differentiating Between Network Structure and Network Function
00 Differentiating Between Network Structure and Network Function
 
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...
Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis
 
Researching Social Media – Big Data and Social Media Analysis
Researching Social Media – Big Data and Social Media AnalysisResearching Social Media – Big Data and Social Media Analysis
Researching Social Media – Big Data and Social Media Analysis
 
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
 

Similar to Detection and Minimization Influence of Rumor in Social Network

A1060104
A1060104A1060104
A1060104
IJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’S
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’SDiscovering Influential User by Coupling Multiplex Heterogeneous OSN’S
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’S
IRJET Journal
 
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNINGBINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
IRJET Journal
 
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET Journal
 
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYINGA MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
ijaia
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
gerogepatton
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
gerogepatton
 
An improvised model for identifying influential nodes in multi parameter soci...
An improvised model for identifying influential nodes in multi parameter soci...An improvised model for identifying influential nodes in multi parameter soci...
An improvised model for identifying influential nodes in multi parameter soci...
csandit
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
ijtsrd
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
IRJET Journal
 
IRJET- Social Network Mental Disorders Detection Via Online Social Media Mining
IRJET- Social Network Mental Disorders Detection Via Online Social Media MiningIRJET- Social Network Mental Disorders Detection Via Online Social Media Mining
IRJET- Social Network Mental Disorders Detection Via Online Social Media Mining
IRJET Journal
 
Towards Decision Support and Goal AchievementIdentifying Ac.docx
Towards Decision Support and Goal AchievementIdentifying Ac.docxTowards Decision Support and Goal AchievementIdentifying Ac.docx
Towards Decision Support and Goal AchievementIdentifying Ac.docx
turveycharlyn
 
IRJET - Social Network Message Credibility: An Agent-based Approach
IRJET -  	  Social Network Message Credibility: An Agent-based ApproachIRJET -  	  Social Network Message Credibility: An Agent-based Approach
IRJET - Social Network Message Credibility: An Agent-based Approach
IRJET Journal
 
IRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based ApproachIRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based Approach
IRJET Journal
 
Social Media Datasets for Analysis and Modeling Drug Usage
Social Media Datasets for Analysis and Modeling Drug UsageSocial Media Datasets for Analysis and Modeling Drug Usage
Social Media Datasets for Analysis and Modeling Drug Usage
ijtsrd
 
Collusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networksCollusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networks
IJECEIAES
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
Zac Darcy
 
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
ijaia
 

Similar to Detection and Minimization Influence of Rumor in Social Network (20)

A1060104
A1060104A1060104
A1060104
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
A1060104
A1060104A1060104
A1060104
 
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’S
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’SDiscovering Influential User by Coupling Multiplex Heterogeneous OSN’S
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’S
 
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNINGBINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
 
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
 
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYINGA MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
 
An improvised model for identifying influential nodes in multi parameter soci...
An improvised model for identifying influential nodes in multi parameter soci...An improvised model for identifying influential nodes in multi parameter soci...
An improvised model for identifying influential nodes in multi parameter soci...
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
 
IRJET- Social Network Mental Disorders Detection Via Online Social Media Mining
IRJET- Social Network Mental Disorders Detection Via Online Social Media MiningIRJET- Social Network Mental Disorders Detection Via Online Social Media Mining
IRJET- Social Network Mental Disorders Detection Via Online Social Media Mining
 
Towards Decision Support and Goal AchievementIdentifying Ac.docx
Towards Decision Support and Goal AchievementIdentifying Ac.docxTowards Decision Support and Goal AchievementIdentifying Ac.docx
Towards Decision Support and Goal AchievementIdentifying Ac.docx
 
IRJET - Social Network Message Credibility: An Agent-based Approach
IRJET -  	  Social Network Message Credibility: An Agent-based ApproachIRJET -  	  Social Network Message Credibility: An Agent-based Approach
IRJET - Social Network Message Credibility: An Agent-based Approach
 
IRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based ApproachIRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based Approach
 
Social Media Datasets for Analysis and Modeling Drug Usage
Social Media Datasets for Analysis and Modeling Drug UsageSocial Media Datasets for Analysis and Modeling Drug Usage
Social Media Datasets for Analysis and Modeling Drug Usage
 
Collusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networksCollusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networks
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
 
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 

Recently uploaded (20)

AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 

Detection and Minimization Influence of Rumor in Social Network

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 757 Detection and Minimization Influence of Rumor in Social Network Surekha Rawale1, Sapana Birkure2, Kajal Hiray3 , Prof. Deepti Deshmukh4 1,2,3 B.E. Students, Dept. of Computer Engineering, D. Y. Patil Institute of Engineering and Technology, Ambi, Pune University, Maharashtra, India 4 Assistant Professor, Dept. of Computer Engineering, D. Y. Patil Institute of Engineering and Technology, Ambi, Pune University, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - With the fast development of big scale on-line social networks, on-line datasharingisbecomingomnipresent daily. Numerous info is propagating through on-line social networks similarly as every the positive and negative. Throughout this paper, we tend to tend to focus on the negative data problems just like the on-line rumours. Rumor block may well be a significant drawback in large-scale social networks. Malicious rumours might causechaosinsocietyand sought to be blocked as soon as potential once being detected. during this paper, we tend to propose a model of dynamic rumor influence reduction with user expertise (DRIMUX).Our goal is to cut back the influence of the rumor (i.e., the number of users that have accepted and sent the rumor) by block an exact set of nodes. A dynamic Ising propagation model considering every the worldwide quality and individual attraction of the rumor is given supported realistic state of affairs. To boot, altogether completely different from existing problems with influence reduction, we tend to tend to require into thought the constraint of user experience utility. Specifically, each node is assigned a tolerance time threshold. If the block time of each user exceeds that threshold, theutility of the network will decrease. Underneath this constraint, we tend to tend to then formulate draw back as a network abstract thought drawback with survival theory, and propose solutions supported most probability principle. Experiments area unit implemented supported large-scale world networks and validate the effectiveness of our methodology. Key Words: Social network, Rumor Influence Minimization, rumor blocking strategies, survival theory. With the speedy development and rising quality of large- scale social networks like Twitter, Facebook etc., many in numerable individualsarea unitreadytobecomefriends[10] and share every kind of knowledgewithoneanother.On-line social network analysis has additionally attracted growing interest among researchers.[11],[12] On onehand,theseon- line social platforms offer nice convenience to the diffusion of positive info like new ideas, innovations, and hot topics. On the opposite hand, however, they will become a channel for the spreading of malicious rumours or information [1], [15], and [16]. As an example,someindividualscouldposton social networks a rumor concerning associate degree approaching earthquake, which can cause chaos among the group and thus could hinder the conventional public order. During this case, it's necessary to discover the rumor Source and delete connected messages, whichcanbeenoughtostop the rumor from any spreading. However, in bound extreme circumstances like terrorist on-line attack, it might be necessary to disable or block connected Social Network (SN) accounts to avoid serious negative influences. For instance, in 2016, the families of 3 out of the forty 9 victims from the metropolis cabaret shooting incident filed a causa against Twitter, Facebook and Google for providing “material support” to the coercion organization of the Islamic State of Republic of Iraq and Asian nation (ISIS)[17].These companies then took measures to dam connected accounts, delete relevant posts and fan pages on their social network platforms to stop the ISIS from spreading malicious info. to boot, Facebook etv. even have issued relevant security policies and standards to assert the authority to dam accounts of users once they square measure against rules or in danger [18]. without doubt, malicious rumors ought to be stopped as presently as potential once detectedinorderthat their negative influence will be reduced. Mostoftheprevious works studied the matter of increasing the influence of positive info through social networks. quick approximation ways were additionally planned to influence maximization drawback. In distinction, the negative influence attention, however still there are consistent efforts on minimization Problem has gained a lot of less planning effective ways for obstruction malicious rumours and minimizing the negative influence. 2. LITERATURE SURVE PAPER(1): DRIMUX: Dynamic Rumor Influence Minimization with User Experience in Social Networks(2016) In this paper, we have a tendency to specialize in the negative info issues like the web rumors. Rumorobstruction could be a significant issue in large-scale social networks. Malicious rumors may cause chaos in society and therefore got to be blocked as shortly as attainable once being detected. during this paper, we have a tendencytoproposea model of dynamic rumor influence reduction with user expertise (DRIMUX). Our goal is to attenuate theinfluenceof the rumor (i.e., the amount of users that have accepted and sent the rumor) by obstruction a precise set of nodes 1. INTRODUCTION
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 758 PAPER (2): Maximizing Acceptance Probability for Active Friending in Online Social Networks (2013) In this paper, we have a tendency to advocate a recommendation support for active friending, wherever a user actively specifies a friending target. To the most effective of our data, a recommendation designed to supply steerage for a user to consistently approach his friending target has not been explored for existing on-line social networking services. to maximise the likelihood that the friending target would settle for a call for participation from the user, we have a tendency to formulate a replacement optimisation downside, namely, Acceptance likelihood Maximization (APM), and develop a polynomial time rule, known as SelectiveinvitewithTreeandIn-NodeAggregation (SITINA), to seek out the best resolution.wehavea tendency to implement a full of life friending service with SITINA on Facebook to validate our plan. Our user study and experimental resultsreveal thatSITINAoutperformsmanual choice and therefore the baseline approach in resolution quality with efficiency. PAPER (3): Limiting the Spread of Misinformation in Social Networks (2011) In paper developed four malicious applications, and evaluated Andromaly ability to detect new malware based on samples of known malware. They evaluated several combinations of anomaly detection algorithms, feature selection method and the number of top features in order to find the combination that yields the best performance in detecting new malware on Android. Empirical results suggest that the proposed framework is effective in detecting malware on mobile devices in general and on Android in particular. PAPER(4): Efficient Influence Maximization in Social Networks (2009) In this paper, we have a tendency to study the economical influence maximization from 2 complementary directions. One is to enhance the first greedy formula and its improvement to more scale back its period of time, and also the second is to propose new degree discountheuristicsthat improves influence unfold. we have a tendency to measure Our algorithms by experiments on 2 giant educational collaboration graphs obtained from the net deposit information arXiv.org. PAPER (5): A Fast Approximation for Influence Maximization in Large Social Networks (2014) This paper deals with a completely unique analysis work a couple of new economical approximation algorithmic program for influence maximization, that was introduced to maximise the good thing about infectious agent promoting. For potency, we tend to devise 2 of exploiting the 2-hop influence unfold which is that the influence unfold on nodes inside 2-hops removed from nodes in a very seedset.Firstly, we tend to propose a brand new greedy methodologyforthe influence maximization drawback exploitation the 2-hop influence unfold. Secondly, to hurry up the new greedy methodology, we tend to devise a good manner of removing uncalled-for nodes for influence maximization Based on optimum seed’s native influence heuristics. 3. EXISTING SYSTEM Most of the previous works studied the matter of maximizing the influence of positive data through social networks..In distinction, the negative influence diminution drawback has gained a lot of less attention, however still there are consistent efforts oncomingupwith effectiveways for block malicious rumors and minimizing the negative influence. Kimura et al. Studied the matter of minimizingthe propagation of malicious rumors by block a restricted range of links in a very social network. They provided2completely different definitions of contamination degree and planned corresponding optimisation algorithms. Fan et al. investigated the smallest amount price rumor block drawback in social networks. They introduced the conception of “protectors” and check outtopick a borderline range of them to limit the dangerous influence of rumors by triggering a protection cascade against the rumor cascade. However, there square measure some limitations in those works. Algorithm:1 Greedy Algorithm Different from the greedy blockingalgorithm,whichisa type of static blocking algorithm, we propose a dynamic rumor blocking algorithm aiming to incrementally block the selected nodes instead of blocking them at once. Inthatcase, the blocking strategy is split into several rounds and each round can be regarded as a greedy algorithm. Thus, how to choose the number of rounds is also very important for the algorithm. In the following part, we will elaborate on the algorithm design and how we choose the specific parameters. From the probabilistic perspective, we seek to formulate the likelihood of inactive nodes becoming activated in every round of rumor blocking. Correspondingly, the likelihood function is given by Correspondingly, the objective function is
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 759 Then, the greedy algorithm is presented as below: Input: Initial Edge matrix A0 Initialization: VB = 0; for i = 1 to K do u = arg max [f (t1|s (t0); Ai-1) - f (t1 | s (t0); Ai-1 ʋ)] Ai: = Ai-1u, VB = VB U {u} end for Output: VB. Mathematical Model of Existing System System S as a whole can be defined with the following main components. S= {I, O, P, s, e, U, Uf, Ad}; S=System s=Initial State e=Final State U= user Uf=Set of user friends Ad=admin Input {I} = {Input1, Input2} Where, Input1=Text Input2=Images Procedures {P}= {Up,Sp,Ubloack,Rdetect} Where, Up=upload post. Sp=Share Post. Ubloack= Block user who sent or shared rumor text and images. Rdetect=Detect rumor text and images. Output {O} = {Output1, Output2} Where, Output1=detecting rumor texts & images Output2=block user who sent or shared rumor text and images s= {initially system will be in a state where user are not enrolled, Only admin of system.} e= {users are enrolled and successfully post or share text or images & admin detect and rumor text and images and also block user who sent or shared rumor text and images } Result of Existing System: Existing system Detect rumor post and text and block user who sent rumor test or image for long time so they may quit social network. And not delete rumor post. 4. PROPOSE SYSTEM We propose a rumor propagation model taking under consideration the subsequent 3 elements: initial, the worldwide quality of the rumor over the whole social network, i.e., the final topic dynamics. Second, the attraction dynamics of the rumor to a possible spreader, i.e., the individual tendency to forward the rumor to its neighbours. Third, the acceptance chance of the rumor recipients. In our model, galvanized by the Ising model, we have a tendency to mix all 3 factors along to propose a cooperative rumor propagation chance. In our rumor interference ways, we have a tendency to think about the influence of interference time to user expertise in universe social networks.therefore we have a tendency to propose a interference time constraint into the standard rumor influence diminution objective perform. in this case, our technique optimizes the rumor interference strategy while not sacrificing the web user expertise. we have a tendency to use survival theory to investigate the chance of nodes turning into activated or infected by the rumor before a time threshold that is setbytheuserexpertise constraint. Then we have a tendency to propose each greedy and dynamic interference algorithms mistreatment the most chance principle. Advantages of Proposed System 1) Efficacy of our system is better than existing System. 2) Our system block user who shares rumor posts for particular period of time Result of Proposed System: Proposed system Detect rumor post and text and block user who sent rumor test or image for short period of time so
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 760 they not quit social network. And delete rumor post to avoid chaos among the crowd. Algorithm:2 Dynamic Blocking Algorithm Different from the greedy blockingalgorithm,whichisa type of static blocking algorithm, we propose a dynamic rumor blocking algorithm aiming to incrementally block the selected nodes instead of blocking them at once. Inthatcase, the blocking strategy is split into several rounds and each round can be regarded as a greedy algorithm. Thus, how to choose the number of rounds is also very important for the algorithm. Input: Initial Edge matrix A0 Initialization: VB(t) = 0. for j = 1 to n do for i = 1 to kj do Δf = f (tj |s (tj-1); Ai-1) – f (tj |s (tj-1); Ai-1ʋ), u = arg max {Δf}, Ai: = Ai-1u, VB(tj) = VB(tj) U {u}. end for end for Output: VB(t). Algorithm:3 K-means Algorithm k-means is one of the simplest unsupervised learning algorithms that solve the well known clustering problem. The procedure follows a simple and easy way to classify a given data set through a certain numberof clusters(assume k clusters) fixed apriori. The main idea is to define k centers, one for each cluster. These centers should be placed in a cunning way because of different location causes different result. So, the better choice is to place them as much as possible far away from each other. The next step is to take each point belonging to a given data set and associate it to the nearest center. When no point is pending, the first step is completed and an early group age is done. At this point we need to re-calculatek newcentroids as barycenter of the clusters resulting from the previous step. After we have these k new centroids, a new binding has to be done between the same data set points and the nearest new center. A loop has been generated. As a resultof this loop we may notice that the k centers change their location step by step until no more changes are done or in other words centers do not move any more. Mathematical Model of Existing System System S as a whole can be defined with the following main components. S= {I, O, P, s, e, U, Uf, Ad}; S=System s=Initial State e=Final State U= user Uf=Set of user friends Ad=admin Input {I} = {Input1, Input2} Where, Input1=Text Input2=Images Procedures {P}= {Up,Sp,Ubloack,Rdetect, Rdelete } Where, Up=upload post. Sp=Share Post. Ubloack= Block user who sent or shared rumor text and images. Rdetect=Detect rumor text and images. Rdelete= Delete rumor text and images Output {O} = {Output1, Output2, Output3} Where, Output1=detecting rumor texts & images Output2=delete rumor texts & images Output3=block user who sent or shared rumor text and images s= {initially system will be in a state where user are not enrolled, Only admin of system.} e= {users are enrolled and successfully post or share text or images & admin detect and delete rumor text and images and also block user who sent or shared rumor text and images } 5. CONCLUSION In this paper, we tend to investigate the rumor obstruction downside in social networks. we tend to propose the dynamic rumor influence reduction with user expertise model to formulate the matter. A dynamic rumor diffusion model incorporating each world rumor quality and individual tendency is conferred supported the Ising model. Then we tend to introduce the thought of user expertise utility and propose a changed version of utility perform to live the connection between the utility and obstructiontime. After that, we tend to use the survival theory to investigate the probability of nodes obtaining activated beneath the constraint of user expertise utility.Greedy algorithmic rule
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 761 and a dynamic obstruction algorithmic rule area unit projected to unravel the optimization downside supported totally different nodes choice methods. Experiments enforced on planet social networks show the efficaciousness of our methodology. 6. ACKNOWLEDGEMENT This work is supported by Prof. Deepti Deshmukh (D Y Patil Institute of Engineering & Technology, Ambi) 7. REFERENCES [1] B. Wang, G. Chen, L. Fu, L. Song, and X. Wang, “Drimux: Dynamic rumor influence minimization with user experience in social networks,” in Proc. 30th AAAI Int. Conf. Artif. Intell., Feb. 2016. [2] C. Budak, D. Agrawal, and A. E. Abbadi, “Limitingthe spread of misinformation in social networks,” in Proc. 20th Int. Conf. World Wide Web, 2011, pp. 665–674. [3] M. Kimura, K. Saito, and H. Motoda, “Blocking links to minimize contamination spread in a social network,” ACM Trans. Knowl.Discov.Data,vol.3,no. 2, pp. 9:1–9:23, Apr. 2009. [4] L. Fan, Z. Lu, W. Wu, B. Thuraisingham, H. Ma, and Y. Bi, “Least cost rumor blocking in social networks,” in Proc. IEEE ICDCS’13,Philadelphia, PA, Jul. 2013, pp. 540–549. [5] J. Yang and J. Leskovec, “Patterns of temporal variation in online media,” in Proc. ACM Int. Conf. Web Search Data Minig, 2011, pp. 177–186. [6] R. Crane and D. Sornette, “Robust dynamic classes revealed by measuring the response function of a social system,” in Proc. of the Natl. Acad. Sci. USA, vol. 105, no. 41, Apr. 2008, pp. 15 649–15 653. [7] S. Han, F. Zhuang, Q. He, Z. Shi, and X. Ao, “Energy model for rumor propagation on social networks,” Physica A: Statistical Mechanics and its Applications, vol. 394, pp. 99–109, Jan. 2014. [8] D. Chelkak and S. Smirnov, “Universality in the 2d ising model and conformal invariance of fermionic observables,”InventionesMathmaticae,vol.189,pp. 515–580, Sep. 2012. [9] W. Chen, C.Wang, and Y.Wang, “Scalable influence maximization for prevalentviral marketinginlarge- scale social networks,” in Proc. 16th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2010, pp. 1029–1038. [10] S. Shirazipourazad, B. Bogard, H. Vachhani, and A. Sen, “Influence propagation in adversarial setting: How to defeat competition with least amount of investment,” in Proc. 21st ACM Int. Conf. Inf. Knowl. Manag., 2012, pp. 585–594. [11] D. N. Yang, H. J. Hung, W. C. Lee, and W. Chen, “Maximizing acceptanceprobabilityforactive friending in online social networks,” in Proc. 19th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2013, pp. 713–721. [12] J. Leskovec, L. A. Adamic, and B. A. Huberman, “The dynamics of viral marketing,” in Proc. 7th ACM Conf. Electronic Commerce,2006,pp. 228–237. [13] A.McCallum, A. Corrada-Emmanuel, and X. Wang, “Topic and role discovery in social networks,” in Proc. 19th Int. Joint Conf.Artif. Intell., 2005, pp. 786–791. M. E. J. Newman, “The structure of scientific collaboration networks,”in Proceedings of National Academy of Science, 2001, pp.404–409. [14] L. Fu, W. Huang, X. Gan, F. Yang, and X. Wang, “Capacity of wireless networks with social characteristics,” IEEETrans. WirelessCommun.,vol. 15, pp. 1505–1516, Feb. 2016. [15] A.Bessi, F. Petroni, M. Del Vicario, F. Zollo, A. Anagnostopoulos,A. Scala, G. Caldarelli, and W. Quattrociocchi, “Viral misinformation:The role of homophily and polarization,” in Proc. 24th Int.Conf. World Wide Web, 2015, pp. 355–356. [16] E. Serrano, C. A. Iglesias, and M. Garijo, “A novel agent-based rumor spreading model in twitter,” in Proc. 24th Int. Conf. World Wide Web, 2015, pp. 811–814. [17] S. Fiegerman, “Facebook, google, twitter accused of enabling isis,” http://money.cnn.com/2016/12/20/technology/t witterfacebook-google-lawsuit-isis, 2016. [18] Facebook, “Facebook community standards,” https:// www.facebook.com/communitystandards.