{"title":"用户跟踪使用tweet分割和文字","authors":"M. Nimbarte, Mrunali Omprakash Thakare","doi":"10.1109/ICECA.2017.8203622","DOIUrl":null,"url":null,"abstract":"Many organizations have been reported to create and monitoring targeted Twitter streams to collect a bunch of information and understand according to user's view. Targeted Twitter stream is main usually constructed by filtering tweets and that abused words with predefined selection criteria. Due to its invaluable business value of timely information from these tweets, it's a necessary to understand that abused word's language for a large body of downstream applications, such as named entity recognition (NER), event detecting and summarizing that particular word, opinion mining, sentiment analysis, and etc. In these proposed system application is develope which take tweet is a input and search semantic negative or illegal words from database. Generate report of that abusing words and send to cyber crime's site. Then depending on the tweet, track the related information of the person. Track all the tweets of that particular person and track that person through identification databases. Then take a action by cyber crime. And after that prevent the tweet.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"User tracking using tweet segmentation and word\",\"authors\":\"M. Nimbarte, Mrunali Omprakash Thakare\",\"doi\":\"10.1109/ICECA.2017.8203622\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Many organizations have been reported to create and monitoring targeted Twitter streams to collect a bunch of information and understand according to user's view. Targeted Twitter stream is main usually constructed by filtering tweets and that abused words with predefined selection criteria. Due to its invaluable business value of timely information from these tweets, it's a necessary to understand that abused word's language for a large body of downstream applications, such as named entity recognition (NER), event detecting and summarizing that particular word, opinion mining, sentiment analysis, and etc. In these proposed system application is develope which take tweet is a input and search semantic negative or illegal words from database. Generate report of that abusing words and send to cyber crime's site. Then depending on the tweet, track the related information of the person. Track all the tweets of that particular person and track that person through identification databases. Then take a action by cyber crime. And after that prevent the tweet.\",\"PeriodicalId\":222768,\"journal\":{\"name\":\"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)\",\"volume\":\"56 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECA.2017.8203622\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECA.2017.8203622","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Many organizations have been reported to create and monitoring targeted Twitter streams to collect a bunch of information and understand according to user's view. Targeted Twitter stream is main usually constructed by filtering tweets and that abused words with predefined selection criteria. Due to its invaluable business value of timely information from these tweets, it's a necessary to understand that abused word's language for a large body of downstream applications, such as named entity recognition (NER), event detecting and summarizing that particular word, opinion mining, sentiment analysis, and etc. In these proposed system application is develope which take tweet is a input and search semantic negative or illegal words from database. Generate report of that abusing words and send to cyber crime's site. Then depending on the tweet, track the related information of the person. Track all the tweets of that particular person and track that person through identification databases. Then take a action by cyber crime. And after that prevent the tweet.