Submit Search
Upload
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
•
0 likes
•
240 views
IRJET Journal
Follow
https://www.irjet.net/archives/V6/i5/IRJET-V6I5264.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET Journal
IRJET- Authentic News Summarization
IRJET- Authentic News Summarization
IRJET Journal
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET Journal
IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET Journal
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET Journal
Social networks protection against fake profiles and social bots attacks
Social networks protection against fake profiles and social bots attacks
Aboul Ella Hassanien
IRJET- Sentiment Analysis of Twitter Data using Python
IRJET- Sentiment Analysis of Twitter Data using Python
IRJET Journal
IRJET- Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
IRJET Journal
Recommended
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET Journal
IRJET- Authentic News Summarization
IRJET- Authentic News Summarization
IRJET Journal
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET Journal
IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET Journal
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET Journal
Social networks protection against fake profiles and social bots attacks
Social networks protection against fake profiles and social bots attacks
Aboul Ella Hassanien
IRJET- Sentiment Analysis of Twitter Data using Python
IRJET- Sentiment Analysis of Twitter Data using Python
IRJET Journal
IRJET- Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
IRJET Journal
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET Journal
nm
nm
Zainab Nayyar
An overview of internet of things
An overview of internet of things
TELKOMNIKA JOURNAL
IRJET - Sentiment Analysis of Posts and Comments of OSN
IRJET - Sentiment Analysis of Posts and Comments of OSN
IRJET Journal
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET Journal
IRJET - Election Result Prediction using Sentiment Analysis
IRJET - Election Result Prediction using Sentiment Analysis
IRJET Journal
State regulation of the IoT in the Russian Federation: Fundamentals and chall...
State regulation of the IoT in the Russian Federation: Fundamentals and chall...
IJECEIAES
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
IRJET Journal
IRJET- Twitter Spammer Detection
IRJET- Twitter Spammer Detection
IRJET Journal
Big Data Social Network Analysis
Big Data Social Network Analysis
Chamin Nalinda Loku Gam Hewage
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
ijtsrd
2010.080 1226
2010.080 1226
swaipnew
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET Journal
IRJET- An Improved Machine Learning for Twitter Breaking News Extraction ...
IRJET- An Improved Machine Learning for Twitter Breaking News Extraction ...
IRJET Journal
Data mining based social network
Data mining based social network
Firas Husseini
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
IRJET Journal
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
IJASRD Journal
Measuring privacy in online social
Measuring privacy in online social
ijsptm
IRJET- Analytic System Based on Prediction Analysis of Social Emotions from U...
IRJET- Analytic System Based on Prediction Analysis of Social Emotions from U...
IRJET Journal
IRJET - Data Mining and Machine Learning for Cyber Security
IRJET - Data Mining and Machine Learning for Cyber Security
IRJET Journal
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
IRJET Journal
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET Journal
More Related Content
What's hot
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET Journal
nm
nm
Zainab Nayyar
An overview of internet of things
An overview of internet of things
TELKOMNIKA JOURNAL
IRJET - Sentiment Analysis of Posts and Comments of OSN
IRJET - Sentiment Analysis of Posts and Comments of OSN
IRJET Journal
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET Journal
IRJET - Election Result Prediction using Sentiment Analysis
IRJET - Election Result Prediction using Sentiment Analysis
IRJET Journal
State regulation of the IoT in the Russian Federation: Fundamentals and chall...
State regulation of the IoT in the Russian Federation: Fundamentals and chall...
IJECEIAES
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
IRJET Journal
IRJET- Twitter Spammer Detection
IRJET- Twitter Spammer Detection
IRJET Journal
Big Data Social Network Analysis
Big Data Social Network Analysis
Chamin Nalinda Loku Gam Hewage
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
ijtsrd
2010.080 1226
2010.080 1226
swaipnew
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET Journal
IRJET- An Improved Machine Learning for Twitter Breaking News Extraction ...
IRJET- An Improved Machine Learning for Twitter Breaking News Extraction ...
IRJET Journal
Data mining based social network
Data mining based social network
Firas Husseini
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
IRJET Journal
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
IJASRD Journal
Measuring privacy in online social
Measuring privacy in online social
ijsptm
IRJET- Analytic System Based on Prediction Analysis of Social Emotions from U...
IRJET- Analytic System Based on Prediction Analysis of Social Emotions from U...
IRJET Journal
IRJET - Data Mining and Machine Learning for Cyber Security
IRJET - Data Mining and Machine Learning for Cyber Security
IRJET Journal
What's hot
(20)
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
nm
nm
An overview of internet of things
An overview of internet of things
IRJET - Sentiment Analysis of Posts and Comments of OSN
IRJET - Sentiment Analysis of Posts and Comments of OSN
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET - Election Result Prediction using Sentiment Analysis
IRJET - Election Result Prediction using Sentiment Analysis
State regulation of the IoT in the Russian Federation: Fundamentals and chall...
State regulation of the IoT in the Russian Federation: Fundamentals and chall...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
IRJET- Twitter Spammer Detection
IRJET- Twitter Spammer Detection
Big Data Social Network Analysis
Big Data Social Network Analysis
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
2010.080 1226
2010.080 1226
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- An Improved Machine Learning for Twitter Breaking News Extraction ...
IRJET- An Improved Machine Learning for Twitter Breaking News Extraction ...
Data mining based social network
Data mining based social network
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
Measuring privacy in online social
Measuring privacy in online social
IRJET- Analytic System Based on Prediction Analysis of Social Emotions from U...
IRJET- Analytic System Based on Prediction Analysis of Social Emotions from U...
IRJET - Data Mining and Machine Learning for Cyber Security
IRJET - Data Mining and Machine Learning for Cyber Security
Similar to IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
IRJET Journal
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET Journal
IRJET- Road Accident Prediction using Machine Learning Algorithm
IRJET- Road Accident Prediction using Machine Learning Algorithm
IRJET Journal
Mining Social Media Data for Understanding Drugs Usage
Mining Social Media Data for Understanding Drugs Usage
IRJET Journal
Detecting Malicious Bots in Social Media Accounts Using Machine Learning Tech...
Detecting Malicious Bots in Social Media Accounts Using Machine Learning Tech...
IRJET Journal
Online Poverty Alleviation System in Bangladesh Context
Online Poverty Alleviation System in Bangladesh Context
IRJET Journal
IRJET- Trend Analysis on Twitter
IRJET- Trend Analysis on Twitter
IRJET Journal
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET Journal
Time-Ordered Collaborative Filtering for News Recommendation
Time-Ordered Collaborative Filtering for News Recommendation
IRJET Journal
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET Journal
WR Based Opinion Mining on Traffic Sentiment Analysis on Social Media
WR Based Opinion Mining on Traffic Sentiment Analysis on Social Media
IRJET Journal
IRJET - Analysis of Fake Ranking on Social Media: Twitter
IRJET - Analysis of Fake Ranking on Social Media: Twitter
IRJET Journal
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text Mining
IRJET Journal
A Survey on Analysis of Twitter Opinion Mining using Sentiment Analysis
A Survey on Analysis of Twitter Opinion Mining using Sentiment Analysis
IRJET Journal
IRJET- Sentiment Analysis using Twitter Data
IRJET- Sentiment Analysis using Twitter Data
IRJET Journal
IRJET- Web Traffic Analysis through Data Analysis and Machine Learning
IRJET- Web Traffic Analysis through Data Analysis and Machine Learning
IRJET Journal
IRJET- Twitter Sentimental Analysis for Predicting Election Result using ...
IRJET- Twitter Sentimental Analysis for Predicting Election Result using ...
IRJET Journal
IRJET - Digital Advertisement using Artificial Intelligence for Data Anal...
IRJET - Digital Advertisement using Artificial Intelligence for Data Anal...
IRJET Journal
Survey on Peer to Peer Car Sharing System Using Blockchain
Survey on Peer to Peer Car Sharing System Using Blockchain
IRJET Journal
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
IRJET Journal
Similar to IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
(20)
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET- Road Accident Prediction using Machine Learning Algorithm
IRJET- Road Accident Prediction using Machine Learning Algorithm
Mining Social Media Data for Understanding Drugs Usage
Mining Social Media Data for Understanding Drugs Usage
Detecting Malicious Bots in Social Media Accounts Using Machine Learning Tech...
Detecting Malicious Bots in Social Media Accounts Using Machine Learning Tech...
Online Poverty Alleviation System in Bangladesh Context
Online Poverty Alleviation System in Bangladesh Context
IRJET- Trend Analysis on Twitter
IRJET- Trend Analysis on Twitter
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
Time-Ordered Collaborative Filtering for News Recommendation
Time-Ordered Collaborative Filtering for News Recommendation
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
WR Based Opinion Mining on Traffic Sentiment Analysis on Social Media
WR Based Opinion Mining on Traffic Sentiment Analysis on Social Media
IRJET - Analysis of Fake Ranking on Social Media: Twitter
IRJET - Analysis of Fake Ranking on Social Media: Twitter
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text Mining
A Survey on Analysis of Twitter Opinion Mining using Sentiment Analysis
A Survey on Analysis of Twitter Opinion Mining using Sentiment Analysis
IRJET- Sentiment Analysis using Twitter Data
IRJET- Sentiment Analysis using Twitter Data
IRJET- Web Traffic Analysis through Data Analysis and Machine Learning
IRJET- Web Traffic Analysis through Data Analysis and Machine Learning
IRJET- Twitter Sentimental Analysis for Predicting Election Result using ...
IRJET- Twitter Sentimental Analysis for Predicting Election Result using ...
IRJET - Digital Advertisement using Artificial Intelligence for Data Anal...
IRJET - Digital Advertisement using Artificial Intelligence for Data Anal...
Survey on Peer to Peer Car Sharing System Using Blockchain
Survey on Peer to Peer Car Sharing System Using Blockchain
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ranjana rawat
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
soniya singh
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
upamatechverse
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
humanexperienceaaa
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Suman Mia
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Recently uploaded
(20)
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1309 MONITORING SUSPICIOUS DISCUSSIONS ON ONLINE FORUMS USING DATA MINING Shet Nitish Nagesh1, Yashaswini2, Rahul Anil Prabhu3, Rajatha J Shetty4 1,2,3Canara Engineering College, Benjanapadavu 4Under the guidance of, Sushma M D (Assistant Professor) ---------------------------------------------------------------------***---------------------------------------------------------------------- Key Words: Illegal Activities, Discussion forums, Sentimental Analysis. 1. INTRODUCTION In recent days people are addicted to the social media like anything, it has become the part & parcel of our life. And we have started using it as a live platform to express our feelings, opinions, promotions of the current events on any topic. Fraud or misguided people don’t leave any space to spread criminal activities & social media is one of the popular medium of them. Data mining & Data analysis is the technique by which we can keep eyes on social media. Inthis paper the suspicious word will be detected and get converted to *. 1.1 OBJECTIVES To Reduce the suspicious Activity on Online forums To notify the Admin about the malicious user To identify and convert negative words into * 2. Literature Survey The paperelaboratesaboutStop-wordSelection,Stemming algorithm, Brute-force algorithm,LearningBasedalgorithm and Matching algorithm. Matching algorithms use two constraints Stemmer Strength and Index Compression. Using these two constraints, stem words in database are compared and their value is calculated. Learning based algorithms include machine learning theories like SVM and conditional random field. This system also focuses on plan execution time, automated classification to identify more significant suspicious discussions. [1] In this paper author describes about detection of emotion on online media. EmoTxt finds the emotions and categorize based on the input data provided in a comma separated value (CSV) file format. The output is in the form of CSV file. The file contains text id and predicted label for each input data set. The model classifies the emotions as, joy, sad, and anger etc. According to researchers [2], the model follows a tree structured hierarchical classification of emotions, where latter layers provides an understanding of emotions of the previous layers. The model includes six basic emotions, namely love, happy, anger,sad,fear,andsurprise. The data is tested and trained on gold standard dataset using linear Support Vector Machine (SVM). [2] The paper describes, the system will analyse data from few discussion forums and will classify the data into different groups i.e. legal and illegal data using Levenshtein algorithm. Levenshtein is used to measure similarity between two words. [3] In this paper work, they have used Social Graph generation based approach for the identification of suspicious users and chat logs. Overall process of graph based suspicious activity detection is performed in seven steps. These steps are Generation of instant chat application, Storage of user chat logs, Data extractionfrom chat logs, Data pre-processing & normalization, Key Information Extraction, Social Graph Generation, Suspicious Group Identification. By using these steps, suspicious activity can be identified. Here, Concept of SVM approach is used for the extraction of key information like key users, key terms and key sessions. Apriority algorithm is used for the social graphgeneration and final declaration of suspicious users is performedwith decision tree approach. For the evaluation of this concept, user scores and normalized scores have been evaluated and compared for the different suspicious terms like terrorist, fraud, wrong and hack etc. From the evaluated user score and normalized score, we can saythatproposed concept of SGTM is efficient for the suspicious session Abstract - People now-a-days are using forums as discussion medium. With the increasing years, the internet has changed the lives of many people for better or worse. As internet technology is progressing, many illegal activities have also increased exponentially. The Internet is an unacknowledged path for illegal activities such as hacking, trafficking, betting, fraud and scams etc. The cyber-crime branchesarelooking for provisions to detect these forums for illegal feedbacks, comments or reviews for their investigation. Our proposed system will monitor for suspicious postings, collect it from few discussion forums, implement technique of data mining and notify administrator about malicious user. In this concern, we focus on Data Mining and Sentimental Analysis to bring a awareness about such discussion and make user not to use them again.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1310 identification. For future aspects, this concept can be compared based on the further evaluation parameterslike accuracy, precision, recall etc. Also the considered concept can be integrated with other methods of classification like n-grams, naive Bayes etc. [4] The author proposes research is being carried out using web mining. Using Web mining, the data set is collected by crawling large number of web pages. It requires a user interactive query interface intended for predicting crime hotspots from various web pages. The main techniques used are classification, sequential pattern mining, association analysis, outlier analysis and cluster analysis. Clustering and classificationtechniquesidentifythesimilar items and group them in classes. The association rules mining and sequential pattern mining techniques are similar. They both identify frequently occurring sets and extract a pattern. Using all these techniques in web mining make it more complex. Along with the techniques, a conceptual network i.e. a dynamic structure of nodes connecting in a functional way is required for better visualization of criminal networks and to reveal the vulnerabilities inside the network. The biggest challenge faced by the researchers was collecting the data from the web pages which consist of hyperlinks, navigation links, advertisements, privacy policies etc. Theses noises should be removed from the data before processing. Another challenge was that on web the information is never constant. The model intends to concentrate on efficiency by using multiple processes, threads and asynchronous resources. [5] 3. Proposed Method Data mining can be used to monitor social media as well as discussion forums for suspicious feedbacks or comments. Discussion forums can be used to spread any message to a large population almost instantly. Millions of people share their views and ideas on politics,religionandtherearealso people who intentionally hurt religious or racial sentiments through malicious posts. Hence it becomes important to monitor the posts on these forums. In this paper we make use of collection of data from different online forums. This data is then passed into csv file. On the other part of this method user will be given by his own account and credentials of a website, where he need to logged in and can start a discussion with any topic. But whenever he /she make use of such words will be notified to admin of the particular site. And even user will be warned on his activity. The technique we make use of data mining algorithm Naïve-Bayes theorem which is implemented in python library textblob. As Django is our frontend frame work helps the task in simple way. The algorithm used here will analyse the words into positive and negative classification based on polarity and subjectivity parameters. Fig 3.1 explains about Architectural design to monitor suspicious discussion. Fig 3.1 Negative opinion converting into * Fig 1.1 Architectural Design to monitor suspicious discussions
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1311 4. CONCLUSION The main objective was to monitor the suspicious activity that occurs in various online forums. This application satisfies with our objectives. From the time of user loginand his discussion on any topic available in online forum are monitored. Once the suspicious word is found it is replaced by the * and is notified to website administrator. REFERENCES [1] Murugesan, M. Sururthi, R. Pavitha Devi, S. Deepthi, V. Shri Lavanya, and Annie Princy. Automated Monitoring Suspicious Discussions on Online Formus Using Data Mining Statistical Corpus Based Approach. Imperial Journal of Interdisiplinary Research (IJIR) Vol2,Issue-5, 2016 [2] Javad Hosseinkhani, Mohammad Koochakazei, Solmaaz Keikhaee and Yahaya HamediAmin.DetectingSuspicion Information on Web Crime Using Crime Data Mining Techniques. International Journal of Advanced Computer Science and Information Technology (IJACSIT) Vol.-3, No. 1, 2014, Page 32-41 [3] Harika Upgaganlawar, Nilesh Sambhe. Surveillance of Suspicious Discussions on Online Forums Using Text Mining. International Journal of Advances inElectronics and Computer Science, Volume4, Issue-4, April-2017 [4] Social Graph Based Suspicious Chat Log Identification Using Apriori Algorithm and Support Vector Machine Amit Verma1, Sonali Gupta2, Rahul Butail 3, 1Head of the Computer Science Department, 2Assistant Professor, 3Rahul Butail 1, 2, 3 Chandigarh Engineering College,Landran,Punjab,India. [5] G.Vinodhini,R.MChandrasekran.SentimentAnalysisand Opinion Mining: A Survey. International Journal of Advanced Research in Computer Science and Software Engineering. Volume 2, Issue 6, June-2012 BIOGRAPHIES Shet Nitish Nagesh Department of Computer Science and Engg, Canara Engineering College, Benjanapadavu Yashaswini Department of Computer Science and Enggg, Canara Engineering College,Benjanapadavu Rahul Anil Prabhu Department of Computer Science and Engg, Canara Engineering College,Benjanapadavu Science and Engg,Canara Engineering College,Benjanapadavu Rajatha J Shetty Department of Computer
Download now