Restricting Unsolicited Approaches and Counterfeit Users: Batch No: 28 Guided by Done by
Restricting Unsolicited Approaches and Counterfeit Users: Batch No: 28 Guided by Done by
BATCH NO: 28
GUIDED BY:
DONE BY:
Mrs. S. MAHESHWARI., M.E VIGNESH. V - 311416104079
VISHAL. P - 311416104083
ASSISTANT PROFESSOR - 311416104087
YOGESH KUMAR.S
Mrs. V.VIDHYA, M.E Dr. C H.PRAMEELA DEVI, M.E.,Ph.D Mrs. D. SUDHA, M.E,(Ph.D)
SUPERVISOR INTERNAL EXAMINER PROJECT COORDINATOR
OUTLINE
• OBJECTIVE
• ABSTRACT
• LITERATUTRE SURVEY
• EXISTING SYSTEM
• PROPOSED SYSTEM
• MODULES
• SYSTEM REQUIREMENTS
• REFERENCES
OBJECTIVE
Requests for
Data Web Crawler
Initiates
Data
Request
Social
Serves
Media Data
Server Fetches
Data
Applies
Database
Data
for storing Data
Results on
Spam content
Classifier Model
ADVANTAGES:
DISADVANTAGES:
• The Support Vector Machine(SVM) will detect the content, URL , Hash Tags,
Words in the Raw data. Then those words are stored.
• The Geolocation of User is found and the content in their tweets are found.
• With the processed results, the counterfeit account will be familiarized to the user
for blocking or to take any other actions to take.
ARCHITECTURE DIAGRAM - PROPOSED SYSTEM
Deployment platform
Request
Data
Hash-tag
Lexical Ranking
OSN Fetches
Data analysis
Server
Geolocation Hoax
Machine Learning
Models
ADVANTAGES
:
• Familiarization with hoax and counterfeit contents.
• TWEET ANALYSIS
• The OSN consists of all data which is fetched from server using API.
• We omit the unwanted data. tweet.fields used for training the model.
• Processing those data in the Support Vector Machine and several Machine Learning
algorithms, we get an result of each tweet
The Data through Twitter API reach us in CSV Format with pre-defined parameters as in below
TWEET ANALYSIS
• The user analyse the tweet’s nature like positive negative or neutral by analyzing
the containing words in the tweet.
• Then each word, we use in a regular basis comprises of words of positive and
negative as well as neutral words are carefully reviewed.
• These words are then stored into the database for analysis.
• The most important features in senti-features are involved and analytics provide
details on your tweets.
Using Support Vector Algorithm, The large amount of data in the dataset were
analyzed and processed, then plotted with the trained model.
• Initial plotting of SVM with • SVM plot with larger data after more
lesser trails on data. trails.
• An precise location of a real time and country-level tweets are being tracked by
geolocation system.
• It will give an scope for revealing an best approaches for an accurate country-level
location classifier.
• It was used to identify, extract, quantify and study affective sates and
subjective information.
• The Polarity of the Expressions from the Data Sets was recognized by this
processing method.
• In this module, the data to be analyzed for analysis is gets the score by calling the
senti-word file.
• The senti-word file is defined as scoring file according to the uniqueness of the
content.
• The generation of score for individual words and this score is used for
generation of analysis result
FLOWCHART
Trained Twee
Start
data t
Post
TWEETS Sentiment
analysis
Processing Display
Data Sets result
End
USER FAMILIARIZATION
• The final score is generated by the result from the comparison process with
sentiword file.
• This is useful in comparison of scores and this comparison results are kept some
threshold to state the tweet as negative, positive or neutral one.
• After results, positive content and neutral content will be forwarded and negative
content will be measured from the server-side.
SOFTWARE REQUIREMENTS:
• Operating System - Windows95/98/2000/XP
• Front End - HTML, Java, JSP
• Scripts - JavaScript
• Server side Script - Java Server Pages
• Database - MySQL
• Database Connectivity - JDBC
REFERENCES
[1]. C. Chen et al., “A performance evaluation of machine learning-based
streaming spam tweets detection,” IEEE Trans. Comput. Social Syst., vol. 2, no.
3, pp. 65–76, Sep. 2015.
[2]. C. Yang, R. Harkreader, and G. Gu, “Empirical evaluation and new design
for fighting evolving Twitter spammers,” IEEE Trans. Inf. Forensics Security, vol.
8, no. 8, pp. 1280–1293, Aug. 2013.
[3]. O. Kurasova, V. Marcinkevicius, V. Medvedev, A. Rapecka, and P.
Stefanovic, “Strategies for big data clustering,” in Proc. IEEE 26th Int. Conf.
Tools Artif. Intell., Nov. 2014, pp. 740–747.
[4]. S. Sedhai and A. Sun, “Semi-supervised spam detection in Twitter stream,”
IEEE Trans. Comput. Social Syst., vol. 5, no. 1, pp. 169–175, Mar. 2018.
[5]. F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida, “Detecting
spammers on Twitter,” in Proc. 7th Annu. Collaboration, Electron. Messaging,
Anti Abuse Spam Conf., Redmond, WA, USA, Jul. 2010
API-REFERENCE:
TWITTER: https://developer.twitter.com/en/docs/tweets/search/api-
reference/get-search-tweets
GOOGLE MAPS : https://maps.googleapis.com/maps/api/js?key=AIzaSyBOU-
GKNx-YL5o-b8cvlqgyn0rso6iQtUk&callback=showlocation
THANK
YOU