Enhancing Trust Accuracy among Online Social Network Users Utilizing Data Text Mining Techniques in Apache Spark

被引:0
作者
Adib, Pezhman [1 ]
Alirezazadeh, Saeid [3 ]
Nezarat, Amin [2 ]
机构
[1] Islamic Azad Univ, Yazd Branch, Dept Comp Sci, Yazd, Iran
[2] Payame Noor Univ, Yazd Branch, Dept Comp Sci, Yazd, Iran
[3] Univ East, Manila Branch, Dept Comp Studies & Syst, Manila, Philippines
来源
PROCEEDINGS OF THE 2017 7TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE) | 2017年
关键词
online social networks; text mining; trust accuracy; Twitter; Apache Spark;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The number of users and amount of data transfer are increasing per each minute with the rapid growth of social network platforms on the web while the users have no certain knowledge of each other. Thus, with the overwhelming spread of the internet and such bulk of data, people find it arduous to identify valid comments. Establishing a genuine and more accurate trust becomes harder if classical processing is used especially with the presence of profitable, oriented, devious and narrow-minded comments. Various methods have been employed so far to evaluate reliable users most of which combine trust algorithms, subject classification, and comment mining methods. Researches reveal that the majority of social network users firstly take into account an overall number of public trust standards such as the number of friends, followers, followings, and likes of individuals in order to trust them. However, a malicious user could manipulate this trust by building virtual qualities. Accordingly, this study supplies a dictionary of malicious words and weighs them by combining trust standards and text mining users' tweets. It is intended to identify malicious users and analyze their behavior to proceed a more accurate trust within distributed execution in Spark environment for providing a quicker call. The results of this study show that the suggested method benefits from a high diagnostic accuracy.
引用
收藏
页码:283 / 288
页数:6
相关论文
共 22 条
[1]  
Abbasi Mohammad-Ali, 2013, Social Computing, Behavioral-Cultural Modeling and Prediction. 6th International Conference, SBP 2013. Proceedings, P441, DOI 10.1007/978-3-642-37210-0_48
[2]  
Ahmadi P, 2016, IRAN CONF ELECTR ENG, P86, DOI 10.1109/IranianCEE.2016.7585495
[3]  
Aladhadh S., 2014, P 2014 AUSTR DOC COM, P73
[4]  
[Anonymous], 2015, P 8 ACM WORKSH ART I, DOI DOI 10.1145/2808769.2808779
[5]  
[Anonymous], 2010, P 3 ACM INT C WEB SE, DOI DOI 10.1145/1718487.1718520
[6]  
[Anonymous], 2017, P ACL
[7]  
Caverlee James, 2008, Joint Conference on Digital Libraries (JCDL 2008), P104, DOI 10.1145/1378889.1378908
[8]  
Chakraborty Subrata., 2012, proceedings of International Conference on Statistics in Science, Business, and Engineering, ICSSBE' 12, P1
[9]  
Elahimanesh MH, 2012, LREC 2012 - EIGHTH INTERNATIONAL CONFERENCE ON LANGUAGE RESOURCES AND EVALUATION, P1618
[10]  
Golbeck Jennifer., 2005, Semantic Network Anal- ysis Workshop at the 4th International Semantic Web Conference, V16, P30