Discovering Emerging Topics in Social Streams Using NADS and VFDT

Authors

  • S Saratha Department of Computer Science, STET Women’s College, Mannargudi
  • V Geetha Department of Computer Science, STET Women’s College, Mannargudi

Keywords:

Change Point Detection, Abnormality Scores, Notice

Abstract

The paper gives the outline of key analyses and methods, accommodating at that point again enterprise structural planning change and based on social system approach. Social system is a place where individuals exchange and share data related to the current events all over the world .This behavior that point again of clients made us focus on this logic that handling these substance might commercial us to the extraction the current subject of interest between the users. Applying data clustering system like post Text-Frequency-based approach over these content might leads us up to the mark be that as it may there will be some shot of false positives. We propose a likelihood model that can catch both normal saying behavior that point again of a customer and too the recurrence of clients happening in their mentions. It too lives up to expectations great indeed the substance of the messages are non-literary data like pictures and so forth .The proposed mention-abnormality based approaches can distinguish new points at slightest as early as text-abnormality based approaches, and in some cases much previous at the point when the subject is poorly identified by the literary substance in the posts.

References

I. F. Akyildiz, X. Wang, and W. Wang, “Wireless Mesh Networks: A Survey”, Computer Networks and ISDN Systems, Vol.47, Issue-2, 2005, pp.445-487.

I. F. Akyildiz, and X. Wang, “A Survey on Wireless Mesh Networks”, IEEE Radio Communications, Vol.43, Issue-3, 2005, pp.23-30.

M. Lee et al., “Emerging Standards for Wireless Mesh Technology”, IEEE Wireless Communications, Vol.13, Issue-4, 2006, pp.56-63.

N.B. Salem, and J-P Hubaux, “Securing Wireless Mesh Networks”, IEEE Wireless Communications, Vol.13, Issue-2, 2006, pp.50-55.

S. Han, E. Chang, L. Gao, T. Dillon, T., Taxonomy of Attacks on Wireless Sensor Networks, in the Proceedings of the 1st European Conference on Computer Network Defence (EC2ND), University of Glamorgan, UK, Springer Press, SpringerLink Date: December 2007.

C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks 1, 2003, pp. 293-315.

Y. Yang, Y. Gu, X. Tan and L. Ma, “A New Wireless Mesh Networks Authentication Scheme Based on Threshold Method,” 9th International Conference for Young Computer Scientists (ICYCS-2008), 2008, pp. 2260-2265; Tvarožek, M.

Bielikova, M.,” Semantic History Map: Graphs Aiding Web Revisitation Support” Published in: database and Expert Systems Applications (DEXA), 2010 Workshop onDate of Conference:Aug. 30 2010-Sept. 3 2010Page(s):206 – 210.

Jurnecka, P. ; Kajan, R. ; Omelina, E. more authors,” Adaptive Educational Gameplay within Smart Multipurpose Interactive Learning Environment”. Published in:Semantic Media Adaptation and Personalization, Second International Workshop onDate of Conference:17-18 Dec. 2007Page(s):165 – 170.

Barla, M. ; Bielikova, M” From Ambiguous Words Key-Concept Extraction”, Published in:Database and Expert Systems Applications (DEXA), 2013 24th InternationalWorkshop onDate of Conference:26-30 Aug. 2013Page(s):63 – 67.

Downloads

Published

2025-11-10

How to Cite

[1]
S. Saratha and V. Geetha, “Discovering Emerging Topics in Social Streams Using NADS and VFDT”, Int. J. Comp. Sci. Eng., vol. 3, no. 8, pp. 136–139, Nov. 2025.

Issue

Section

Review Article