Discovering Emerging Topics in Social Streams Using NADS and VFDT
Keywords:
Change Point Detection, Abnormality Scores, NoticeAbstract
The paper gives the outline of key analyses and methods, accommodating at that point again enterprise structural planning change and based on social system approach. Social system is a place where individuals exchange and share data related to the current events all over the world .This behavior that point again of clients made us focus on this logic that handling these substance might commercial us to the extraction the current subject of interest between the users. Applying data clustering system like post Text-Frequency-based approach over these content might leads us up to the mark be that as it may there will be some shot of false positives. We propose a likelihood model that can catch both normal saying behavior that point again of a customer and too the recurrence of clients happening in their mentions. It too lives up to expectations great indeed the substance of the messages are non-literary data like pictures and so forth .The proposed mention-abnormality based approaches can distinguish new points at slightest as early as text-abnormality based approaches, and in some cases much previous at the point when the subject is poorly identified by the literary substance in the posts.
References
I. F. Akyildiz, X. Wang, and W. Wang, “Wireless Mesh Networks: A Survey”, Computer Networks and ISDN Systems, Vol.47, Issue-2, 2005, pp.445-487.
I. F. Akyildiz, and X. Wang, “A Survey on Wireless Mesh Networks”, IEEE Radio Communications, Vol.43, Issue-3, 2005, pp.23-30.
M. Lee et al., “Emerging Standards for Wireless Mesh Technology”, IEEE Wireless Communications, Vol.13, Issue-4, 2006, pp.56-63.
N.B. Salem, and J-P Hubaux, “Securing Wireless Mesh Networks”, IEEE Wireless Communications, Vol.13, Issue-2, 2006, pp.50-55.
S. Han, E. Chang, L. Gao, T. Dillon, T., Taxonomy of Attacks on Wireless Sensor Networks, in the Proceedings of the 1st European Conference on Computer Network Defence (EC2ND), University of Glamorgan, UK, Springer Press, SpringerLink Date: December 2007.
C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks 1, 2003, pp. 293-315.
Y. Yang, Y. Gu, X. Tan and L. Ma, “A New Wireless Mesh Networks Authentication Scheme Based on Threshold Method,” 9th International Conference for Young Computer Scientists (ICYCS-2008), 2008, pp. 2260-2265; Tvarožek, M.
Bielikova, M.,” Semantic History Map: Graphs Aiding Web Revisitation Support” Published in: database and Expert Systems Applications (DEXA), 2010 Workshop onDate of Conference:Aug. 30 2010-Sept. 3 2010Page(s):206 – 210.
Jurnecka, P. ; Kajan, R. ; Omelina, E. more authors,” Adaptive Educational Gameplay within Smart Multipurpose Interactive Learning Environment”. Published in:Semantic Media Adaptation and Personalization, Second International Workshop onDate of Conference:17-18 Dec. 2007Page(s):165 – 170.
Barla, M. ; Bielikova, M” From Ambiguous Words Key-Concept Extraction”, Published in:Database and Expert Systems Applications (DEXA), 2013 24th InternationalWorkshop onDate of Conference:26-30 Aug. 2013Page(s):63 – 67.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
