A Survey: SMS Spam Filtering IJTSRD
Now a days Short Message Service(SMS) is most popular way to communication for mobile user because it is cheapest mode or version for communication than other mode.SMS is used for transmitting short length msg of around 160 character to different devices such as smart phones, cellular phones, PDAs using standardized communication protocols. The amount of […]
A Survey of Methodaology of Fraud Detection Using Data Mining IJTSRD
While many financiers use the Internet and social media to help them with investment decisions, these online tools can provide many benefits for investors and at the same time, same tools can make smart objectives for lawbreakers. These offenders are quick to adapt to new technologies ‘“ and Social media is no exception. Social media, […]
Seismic: A Self-Exciting Point Process Model for Predicting Tweet Popularity using Hashtags IJTSRD
In existing paper they had used a full month of Twitter data to evaluate SEISMIC .In which the original data set contains over 3.2 billion tweets and retweets on Twitter from Octobor 7 to November 7, 2011.Also they only kept tweets such that it has at least 50 retweets, the text of the tweet does […]
Educational Data Analysis By Applied SPSS IJTSRD
SPSS is powerful to analyze Educational data. This paper intends to support educational leaders the benefits of data analyzing with applied SPSS. It showed the data analysis of qualified rates such as bad, neutral, good and very good on the subjects. As SPSSs background algorithms, it showed the cross tabulation algorithm for cross tabulation tables. […]
Identification of User Aware Rare Sequential Pattern in Document Stream-An overview IJTSRD
Documents created and distributed on the Internet are ever changing in various forms. Most of existing works are devoted to topic modeling and the evolution of individual topics, while sequential relations of topics in successive documents published by a specific user are ignored. In order to characterize and detect personalized and abnormal behaviours of Internet […]