Prediction of Online Spread of Terrorism on Twitter Using Naïve Bayes And SVM Classification
A.L. Munani1 , B.A. Tanawala2 , P.B. Swadas3
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-6 , Page no. 926-929, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.926929
Online published on Jun 30, 2018
Copyright © A.L. Munani, B.A. Tanawala, P.B. Swadas . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: A.L. Munani, B.A. Tanawala, P.B. Swadas, “Prediction of Online Spread of Terrorism on Twitter Using Naïve Bayes And SVM Classification,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.926-929, 2018.
MLA Style Citation: A.L. Munani, B.A. Tanawala, P.B. Swadas "Prediction of Online Spread of Terrorism on Twitter Using Naïve Bayes And SVM Classification." International Journal of Computer Sciences and Engineering 6.6 (2018): 926-929.
APA Style Citation: A.L. Munani, B.A. Tanawala, P.B. Swadas, (2018). Prediction of Online Spread of Terrorism on Twitter Using Naïve Bayes And SVM Classification. International Journal of Computer Sciences and Engineering, 6(6), 926-929.
BibTex Style Citation:
@article{Munani_2018,
author = {A.L. Munani, B.A. Tanawala, P.B. Swadas},
title = {Prediction of Online Spread of Terrorism on Twitter Using Naïve Bayes And SVM Classification},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2018},
volume = {6},
Issue = {6},
month = {6},
year = {2018},
issn = {2347-2693},
pages = {926-929},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2275},
doi = {https://doi.org/10.26438/ijcse/v6i6.926929}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i6.926929}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2275
TI - Prediction of Online Spread of Terrorism on Twitter Using Naïve Bayes And SVM Classification
T2 - International Journal of Computer Sciences and Engineering
AU - A.L. Munani, B.A. Tanawala, P.B. Swadas
PY - 2018
DA - 2018/06/30
PB - IJCSE, Indore, INDIA
SP - 926-929
IS - 6
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
529 | 332 downloads | 125 downloads |
Abstract
Online networking is quickly getting to be one of the mediums of decision for understanding the social beat of an area. To survey this social beat it is basic to have an exact appraisal of who is saying what in web-based social networking. Fear monger bunches like al-quida, Indian mujahedeen, ISIS and other psychological oppressor bunches are spreading their purposeful publicity utilizing web or distinctive web-based social networking sites like Facebook, Twitter and Google+. Essential plan to stop or diminish spreading of psychological oppression is to expel these records. To execute this thought needs bunches of human endeavors which incorporate perusing part of data and dissecting contain. So to lessen human endeavors we will make a framework which recognize message given by fear based oppressor amass on twitter. Our framework will arrange tweets and discovers tweets are supporting ISIS gathering or not. We need to fabricate a framework which will give better outcome for analyzers.
Key-Words / Index Term
Terrorism, ISIS, social media radical content, text mining, natural language processing, user cluster
References
[1] Ms. Pooja S. Kade1, Prof. N.M. Dhande, “ A Paper on Web Data Segmentation for Terrorism Detection using Named Entity Recognition Technique” presented at International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 – 0056, p-ISSN: 2395 – 0072,Volume: 04 Issue: 01 | Jan -2017,
[2] Budak Arpinar & Ugur Kursuncu and Dilshod Achilov, “Social Media Analytics to Identify and Counter Islamist Extremism: Systematic Detection, Evaluation, and Challenging of Extremist Narratives Online” presented at International Conference on Collaboration Technologies and Systems. 978 – 1 – 5090 – 2300 – 4 /16 2016 IEEE.
[3] Surajit Dasgupta, Chandan Prakash, “Intelligent Detection of Influential Nodes in Networks” presented at International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) , 978 – 1 – 4673 – 9939 – 5 /16, 2016-IEEE,
[4] Michael Ashcroft, Ali Fisher, Lisa Kaati, Enghin Omer, Nico Prucha, “Detecting Jihadist Messages on Twitter” presented at European Intelligence and Security Informatics Conference 978 – 1 – 4799 – 8657 – 6 /15, 2015 IEEE.
[5] Sonali Vighne, Priyanka Trimbake, Anjali Musmade, Ashwini Merukar, Sandip Pandit, “An Approach to Detect Terror Related Activities on Net” presented at IJARIIE-ISSN(O)-2395 – 4396, Vol-2 Issue-1 2016.
[6] Wei Wei Carnegie, Kenneth Joseph, Huan Liu, Kathleen M. Carley,” The Fragility of Twitter Social Networks Against Suspended Users” International Conference on Advances in Social Networks Analysis and Mining, 2015 ISBN: 978 – 1 – 4503 – 3854, 2015 IEEE/ACM.
[7] Sharath Kumar A and Sanjay Singh, ” Detection of User Cluster with Suspicious Activity in Online Social Networking Sites” Second International Conference on Advanced Computing, Networking and Security, 978 – 0 – 7695 – 5127 - 2/13,2013 IEEE
[8] Ala Berzinji, Frzand Sherko Abdullah, Ali Hayder kakei, “Analysis of Terrorist Groups on Facebook”, 978 – 0 – 7695 – 5062 – 6 /13, IEEE.