Documente Academic
Documente Profesional
Documente Cultură
Twitter
ABSTRACT:
EXISTING SYSTEM:
the effect of the name value and user connectedness, influence users ’
context.
Malicious activities can evade existing spam filters through various means.
For example, in Twitter, malicious users can purchase followers or use tools
to automatically generate fake ac-counts and post tweets with the same
meaning but different words.
The process of evaluating solutions has also been a problem in terms of
resources, given that most researchers are limited in terms of the extent to
which they can test their work.
PROPOSED SYSTEM:
that produces a priority vector that ranks the instance’s features ac-cording to
their relative importance with respect to the user need as well as the topic.
We validated our system by applying tenfold cross validation and on
different datasets of Twitter content. Our results show that the system that
employed a reputation-based filter approach provide a significant and
accurate credibility assessment.
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
SOFTWARE REQUIREMENTS:
Operating system : Windows 7.
Coding Language : JAVA/J2EE
Tool : Netbeans 7.2.1
Database : MYSQL