SlideShare a Scribd company logo
Discovering Emerging Topics in Social Streams via Link-Anomaly Detection 
Discovering Emerging Topics in Social Streams via Link- 
Anomaly Detection 
Detection of emerging topics is now receiving renewed interest motivated by the rapid growth of 
social networks. Conventional-term- frequency-based approaches may not be appropriate in this 
context, because the information exchanged in social-network posts include not only text but also 
images, URLs, and videos. We focus on emergence of topics signaled by social aspects of theses 
networks. Specifically, we focus on mentions of user links between users that are generated 
dynamically (intentionally or unintentionally) through replies, mentions, and retweets. We 
propose a probability model of the mentioning behavior of a social network user, and propose to 
detect the emergence of a new topic from the anomalies measured through the model. 
Aggregating anomaly scores from hundreds of users, we show that we can detect emerging 
topics only based on the reply/mention relationships in social-network posts. We demonstrate 
our technique in several real data sets we gathered from Twitter. The experiments show that the 
proposed mention-anomaly-based approaches can detect new topics at least as early as text-anomaly- 
based approaches, and in some cases much earlier when the topic is poorly identified 
by the textual contents in posts. 
 A new (emerging) topic is something people feel like discussing, commenting, or 
forwarding the information further to their friends. Conventional approaches for topic 
detection have mainly been concerned with the frequencies of (textual) words. 
DISADVANTAGES OF EXISTING SYSTEM: 
A term- frequency-based approach could suffer from the ambiguity caused by synonyms or 
homonyms. It may also require complicated preprocessing (e.g., segmentation) depending on the 
target language. Moreover, it cannot be applied when the contents of the messages are mostly 
nontextual information. O n the other hand, the “words” formed by mentions are unique, require 
Contact: 9703109334, 9533694296 
ABSTRACT: 
EXISTING SYSTEM: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Discovering Emerging Topics in Social Streams via Link-Anomaly Detection 
little preprocessing to obtain (the information is often separated from the contents), and are 
available regardless of the nature of the contents. 
 In this paper, we have proposed a new approach to detect the emergence of topics in a 
 The basic idea of our approach is to focus on the social aspect of the posts reflected in the 
mentioning behavior of users instead of the textual contents. 
 We have proposed a probability model that captures both the number of mentions per 
post and the frequency of mentionee. 
ADVANTAGES OF PROPOSED SYSTEM: 
 The proposed method does not rely on the textual contents of social network posts, it is 
robust to rephrasing and it can be applied to the case where topics are concerned with 
information other than texts, such as images, video, audio, and so on. 
 The proposed link-anomaly-based methods performed even better than the keyword-based 
methods on “NASA” and “BBC” data sets. 
Contact: 9703109334, 9533694296 
PROPOSED SYSTEM: 
social network stream. 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Discovering Emerging Topics in Social Streams via Link-Anomaly Detection 
SYSTEM ARCHITECTURE: 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Discovering Emerging Topics in Social Streams via Link-Anomaly Detection 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : JAVA/J2EE 
 IDE : Netbeans 7.4 
 Database : MYSQL 
Toshimitsu Takahashi, Ryota Tomioka, and Kenji Yamanishi, Member, IEEE,“Discovering 
Emerging Topics in Social Streams via Link-Anomaly Detection”, IEEE TRANSACTIONS 
ON KNOWLEDGE AND DATA ENGINEERING, VOL. 26, NO. 1, JANUARY 2014. 
Contact: 9703109334, 9533694296 
REFERENCE: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in

More Related Content

DOCX
JPJ1419 Discovering Emerging Topics in Social Streams via Link-Anomaly Detec...
DOCX
Spammer taxonomy using scientific approach
PDF
Network Structure For Social Network
PPTX
Social Network Analysis power point presentation
PPTX
NodeXL Research
PDF
A system to filter unwanted messages
PPTX
Aahb workshop
PPTX
A system to filter unwanted messages from the
JPJ1419 Discovering Emerging Topics in Social Streams via Link-Anomaly Detec...
Spammer taxonomy using scientific approach
Network Structure For Social Network
Social Network Analysis power point presentation
NodeXL Research
A system to filter unwanted messages
Aahb workshop
A system to filter unwanted messages from the

What's hot (20)

PDF
Categorize balanced dataset for troll detection
PPTX
Information propagation in a social network site
PDF
Malware Propagation in Large-Scale Networks
PDF
IIT+Research+Report+(1).compressed
PPTX
A systematic literature review of academic cyberbullying 2021
PDF
Why rumors spread fast in social networks
PPTX
CISummit 2013: Luke Matthews, Tracking the Electronic Metadata Trail of the S...
PDF
8108-37744-1-PB.pdf
PPT
Research Paper On Correlation
PDF
Malware propagation in large scale networks
DOCX
Malware propagation in large scale networks
PDF
Secure and Reliable Data Transmission in Generalized E-Mail
PPTX
seminar on To block unwanted messages _from osn
PDF
Filter unwanted messages from walls and blocking non legitimate users in osn
PDF
Disease spreading & control in temporal networks
PPT
2010 june - personal democracy forum - marc smith - mapping political socia...
PDF
Distributed Link Prediction in Large Scale Graphs using Apache Spark
PPTX
Enhancing C-Span Video Archive with Practice Capital Metadata and data journa...
DOCX
Jacque lewis - Senior Project -w/o script
PPT
Reimagining the interview: Adapting qualitative methods to the digital realm ...
Categorize balanced dataset for troll detection
Information propagation in a social network site
Malware Propagation in Large-Scale Networks
IIT+Research+Report+(1).compressed
A systematic literature review of academic cyberbullying 2021
Why rumors spread fast in social networks
CISummit 2013: Luke Matthews, Tracking the Electronic Metadata Trail of the S...
8108-37744-1-PB.pdf
Research Paper On Correlation
Malware propagation in large scale networks
Malware propagation in large scale networks
Secure and Reliable Data Transmission in Generalized E-Mail
seminar on To block unwanted messages _from osn
Filter unwanted messages from walls and blocking non legitimate users in osn
Disease spreading & control in temporal networks
2010 june - personal democracy forum - marc smith - mapping political socia...
Distributed Link Prediction in Large Scale Graphs using Apache Spark
Enhancing C-Span Video Archive with Practice Capital Metadata and data journa...
Jacque lewis - Senior Project -w/o script
Reimagining the interview: Adapting qualitative methods to the digital realm ...
Ad

Similar to discovering emerging topics in social (20)

DOCX
Discovering emerging topics in social streams via link anomaly detection
PPT
Tags, Networks, Narrative
DOCX
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
DOCX
IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social str...
DOCX
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
PDF
S180304116124
PPTX
toxic commnets classification using python
PPTX
2009 - Connected Action - Marc Smith - Social Media Network Analysis
PPT
Notes on mining social media updated
DOCX
A Review on Deep-Learning-Based Cyberbullying Detection
PPTX
Initial PPT1.ppt for cyber bullying detection
PDF
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
PPTX
Social_Analytics_and_SNA_Presentation.pptx
PDF
Alone Together: Patterns of collaboration in free and open source software de...
PDF
Cb4301449454
PDF
Searching for patterns in crowdsourced information
PPT
01 Introduction to Networks Methods and Measures
PPT
01 Introduction to Networks Methods and Measures (2016)
PPTX
final review ppt of engineering hypothetic arm
PPTX
CYBER BULLYING DETECTION UPDATED USING social
Discovering emerging topics in social streams via link anomaly detection
Tags, Networks, Narrative
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social str...
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
S180304116124
toxic commnets classification using python
2009 - Connected Action - Marc Smith - Social Media Network Analysis
Notes on mining social media updated
A Review on Deep-Learning-Based Cyberbullying Detection
Initial PPT1.ppt for cyber bullying detection
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
Social_Analytics_and_SNA_Presentation.pptx
Alone Together: Patterns of collaboration in free and open source software de...
Cb4301449454
Searching for patterns in crowdsourced information
01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measures (2016)
final review ppt of engineering hypothetic arm
CYBER BULLYING DETECTION UPDATED USING social
Ad

More from swathi78 (20)

DOC
secure mining of association rules in horizontally distributed databases
DOCX
a system for denial-of-service attack detection based on multivariate correla...
DOCX
web service recommendation via exploiting location and qo s information
DOCX
privacy-enhanced web service composition
DOCX
optimal distributed malware defense in mobile networks with heterogeneous dev...
DOCX
friend book a semantic-based friend recommendation system for social networks
DOCX
efficient authentication for mobile and pervasive computing
DOCX
cooperative caching for efficient data access in disruption tolerant networks
DOCX
an incentive framework for cellular traffic offloading
DOCX
secure outsourced attribute-based signatures
DOCX
traffic pattern-based content leakage detection for trusted content delivery ...
DOCX
the design and evaluation of an information sharing system for human networks
DOCX
the client assignment problem for continuous distributed interactive applicat...
DOCX
sos a distributed mobile q&a system based on social networks
DOCX
securing broker-less publish subscribe systems using identity-based encryption
DOCX
rre a game-theoretic intrusion response and recovery engine
DOCX
on false data-injection attacks against power system state estimation modelin...
DOCX
loca ward a security and privacy aware location-based rewarding system
DOCX
exploiting service similarity for privacy in location-based search queries
DOCX
enabling trustworthy service evaluation in service-oriented mobile social net...
secure mining of association rules in horizontally distributed databases
a system for denial-of-service attack detection based on multivariate correla...
web service recommendation via exploiting location and qo s information
privacy-enhanced web service composition
optimal distributed malware defense in mobile networks with heterogeneous dev...
friend book a semantic-based friend recommendation system for social networks
efficient authentication for mobile and pervasive computing
cooperative caching for efficient data access in disruption tolerant networks
an incentive framework for cellular traffic offloading
secure outsourced attribute-based signatures
traffic pattern-based content leakage detection for trusted content delivery ...
the design and evaluation of an information sharing system for human networks
the client assignment problem for continuous distributed interactive applicat...
sos a distributed mobile q&a system based on social networks
securing broker-less publish subscribe systems using identity-based encryption
rre a game-theoretic intrusion response and recovery engine
on false data-injection attacks against power system state estimation modelin...
loca ward a security and privacy aware location-based rewarding system
exploiting service similarity for privacy in location-based search queries
enabling trustworthy service evaluation in service-oriented mobile social net...

Recently uploaded (20)

PPTX
Safety Seminar civil to be ensured for safe working.
PPTX
introduction to high performance computing
PDF
Visual Aids for Exploratory Data Analysis.pdf
PDF
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
PPTX
Current and future trends in Computer Vision.pptx
PDF
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPT
Occupational Health and Safety Management System
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PDF
Analyzing Impact of Pakistan Economic Corridor on Import and Export in Pakist...
PPT
A5_DistSysCh1.ppt_INTRODUCTION TO DISTRIBUTED SYSTEMS
PPTX
UNIT - 3 Total quality Management .pptx
PDF
Soil Improvement Techniques Note - Rabbi
PPTX
Fundamentals of Mechanical Engineering.pptx
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PDF
737-MAX_SRG.pdf student reference guides
PPT
Total quality management ppt for engineering students
Safety Seminar civil to be ensured for safe working.
introduction to high performance computing
Visual Aids for Exploratory Data Analysis.pdf
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
Current and future trends in Computer Vision.pptx
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
Automation-in-Manufacturing-Chapter-Introduction.pdf
Occupational Health and Safety Management System
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
Analyzing Impact of Pakistan Economic Corridor on Import and Export in Pakist...
A5_DistSysCh1.ppt_INTRODUCTION TO DISTRIBUTED SYSTEMS
UNIT - 3 Total quality Management .pptx
Soil Improvement Techniques Note - Rabbi
Fundamentals of Mechanical Engineering.pptx
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
737-MAX_SRG.pdf student reference guides
Total quality management ppt for engineering students

discovering emerging topics in social

  • 1. Discovering Emerging Topics in Social Streams via Link-Anomaly Detection Discovering Emerging Topics in Social Streams via Link- Anomaly Detection Detection of emerging topics is now receiving renewed interest motivated by the rapid growth of social networks. Conventional-term- frequency-based approaches may not be appropriate in this context, because the information exchanged in social-network posts include not only text but also images, URLs, and videos. We focus on emergence of topics signaled by social aspects of theses networks. Specifically, we focus on mentions of user links between users that are generated dynamically (intentionally or unintentionally) through replies, mentions, and retweets. We propose a probability model of the mentioning behavior of a social network user, and propose to detect the emergence of a new topic from the anomalies measured through the model. Aggregating anomaly scores from hundreds of users, we show that we can detect emerging topics only based on the reply/mention relationships in social-network posts. We demonstrate our technique in several real data sets we gathered from Twitter. The experiments show that the proposed mention-anomaly-based approaches can detect new topics at least as early as text-anomaly- based approaches, and in some cases much earlier when the topic is poorly identified by the textual contents in posts.  A new (emerging) topic is something people feel like discussing, commenting, or forwarding the information further to their friends. Conventional approaches for topic detection have mainly been concerned with the frequencies of (textual) words. DISADVANTAGES OF EXISTING SYSTEM: A term- frequency-based approach could suffer from the ambiguity caused by synonyms or homonyms. It may also require complicated preprocessing (e.g., segmentation) depending on the target language. Moreover, it cannot be applied when the contents of the messages are mostly nontextual information. O n the other hand, the “words” formed by mentions are unique, require Contact: 9703109334, 9533694296 ABSTRACT: EXISTING SYSTEM: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 2. Discovering Emerging Topics in Social Streams via Link-Anomaly Detection little preprocessing to obtain (the information is often separated from the contents), and are available regardless of the nature of the contents.  In this paper, we have proposed a new approach to detect the emergence of topics in a  The basic idea of our approach is to focus on the social aspect of the posts reflected in the mentioning behavior of users instead of the textual contents.  We have proposed a probability model that captures both the number of mentions per post and the frequency of mentionee. ADVANTAGES OF PROPOSED SYSTEM:  The proposed method does not rely on the textual contents of social network posts, it is robust to rephrasing and it can be applied to the case where topics are concerned with information other than texts, such as images, video, audio, and so on.  The proposed link-anomaly-based methods performed even better than the keyword-based methods on “NASA” and “BBC” data sets. Contact: 9703109334, 9533694296 PROPOSED SYSTEM: social network stream. Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 3. Discovering Emerging Topics in Social Streams via Link-Anomaly Detection SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. Contact: 9703109334, 9533694296 Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 4. Discovering Emerging Topics in Social Streams via Link-Anomaly Detection SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL Toshimitsu Takahashi, Ryota Tomioka, and Kenji Yamanishi, Member, IEEE,“Discovering Emerging Topics in Social Streams via Link-Anomaly Detection”, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 26, NO. 1, JANUARY 2014. Contact: 9703109334, 9533694296 REFERENCE: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in