Open Access   Article Go Back

Discovering Emerging Topics in Social Streams Using NADS And VFDT

S.Saratha 1 , V. Geetha2

Section:Review Paper, Product Type: Journal Paper
Volume-3 , Issue-8 , Page no. 136-139, Aug-2015

Online published on Aug 31, 2015

Copyright © S.Saratha , V. Geetha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S.Saratha , V. Geetha, “Discovering Emerging Topics in Social Streams Using NADS And VFDT,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.136-139, 2015.

MLA Style Citation: S.Saratha , V. Geetha "Discovering Emerging Topics in Social Streams Using NADS And VFDT." International Journal of Computer Sciences and Engineering 3.8 (2015): 136-139.

APA Style Citation: S.Saratha , V. Geetha, (2015). Discovering Emerging Topics in Social Streams Using NADS And VFDT. International Journal of Computer Sciences and Engineering, 3(8), 136-139.

BibTex Style Citation:
@article{Geetha_2015,
author = {S.Saratha , V. Geetha},
title = {Discovering Emerging Topics in Social Streams Using NADS And VFDT},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2015},
volume = {3},
Issue = {8},
month = {8},
year = {2015},
issn = {2347-2693},
pages = {136-139},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=623},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=623
TI - Discovering Emerging Topics in Social Streams Using NADS And VFDT
T2 - International Journal of Computer Sciences and Engineering
AU - S.Saratha , V. Geetha
PY - 2015
DA - 2015/08/31
PB - IJCSE, Indore, INDIA
SP - 136-139
IS - 8
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2402 2228 downloads 2389 downloads
  
  
           

Abstract

The paper gives the outline of key analyses and methods, accommodating at that point again enterprise structural planning change and based on social system approach. Social system is a place where individuals exchange and share data related to the current events all over the world .This behavior that point again of clients made us focus on this logic that handling these substance might commercial us to the extraction the current subject of interest between the users. Applying data clustering system like post Text-Frequency-based approach over these content might leads us up to the mark be that as it may there will be some shot of false positives. We propose a likelihood model that can catch both normal saying behavior that point again of a customer and too the recurrence of clients happening in their mentions. It too lives up to expectations great indeed the substance of the messages are non-literary data like pictures and so forth .The proposed mention-abnormality based approaches can distinguish new points at slightest as early as text-abnormality based approaches, and in some cases much previous at the point when the subject is poorly identified by the literary substance in the posts.

Key-Words / Index Term

Change Point Detection, Abnormality Scores, Notice

References

[1] I. F. Akyildiz, X. Wang, and W. Wang, “Wireless Mesh Networks: A Survey”, Computer Networks and ISDN Systems, Vol.47, Issue-2, 2005, pp.445-487.
[2] I. F. Akyildiz, and X. Wang, “A Survey on Wireless Mesh Networks”, IEEE Radio Communications, Vol.43, Issue-3, 2005, pp.23-30.
[3] M. Lee et al., “Emerging Standards for Wireless Mesh Technology”, IEEE Wireless Communications, Vol.13, Issue-4, 2006, pp.56-63.
[4] N.B. Salem, and J-P Hubaux, “Securing Wireless Mesh Networks”, IEEE Wireless Communications, Vol.13, Issue-2, 2006, pp.50-55.
[5] S. Han, E. Chang, L. Gao, T. Dillon, T., Taxonomy of Attacks on Wireless Sensor Networks, in the Proceedings of the 1st European Conference on Computer Network Defence (EC2ND), University of Glamorgan, UK, Springer Press, SpringerLink Date: December 2007.
[6] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks 1, 2003, pp. 293-315.
[7] Y. Yang, Y. Gu, X. Tan and L. Ma, “A New Wireless Mesh Networks Authentication Scheme Based on Threshold Method,” 9th International Conference for Young Computer Scientists (ICYCS-2008), 2008, pp. 2260-2265; Tvarožek, M.
[8] Bielikova, M.,” Semantic History Map: Graphs Aiding Web Revisitation Support” Published in: database and Expert Systems Applications (DEXA), 2010 Workshop onDate of Conference:Aug. 30 2010-Sept. 3 2010Page(s):206 – 210.
[9] Jurnecka, P. ; Kajan, R. ; Omelina, E. more authors,” Adaptive Educational Gameplay within Smart Multipurpose Interactive Learning Environment”. Published in:Semantic Media Adaptation and Personalization, Second International Workshop onDate of Conference:17-18 Dec. 2007Page(s):165 – 170.
[10] Barla, M. ; Bielikova, M” From Ambiguous Words Key-Concept Extraction”, Published in:Database and Expert Systems Applications (DEXA), 2013 24th InternationalWorkshop onDate of Conference:26-30 Aug. 2013Page(s):63 – 67.