用户跟踪使用tweet分割和文字

M. Nimbarte, Mrunali Omprakash Thakare
{"title":"用户跟踪使用tweet分割和文字","authors":"M. Nimbarte, Mrunali Omprakash Thakare","doi":"10.1109/ICECA.2017.8203622","DOIUrl":null,"url":null,"abstract":"Many organizations have been reported to create and monitoring targeted Twitter streams to collect a bunch of information and understand according to user's view. Targeted Twitter stream is main usually constructed by filtering tweets and that abused words with predefined selection criteria. Due to its invaluable business value of timely information from these tweets, it's a necessary to understand that abused word's language for a large body of downstream applications, such as named entity recognition (NER), event detecting and summarizing that particular word, opinion mining, sentiment analysis, and etc. In these proposed system application is develope which take tweet is a input and search semantic negative or illegal words from database. Generate report of that abusing words and send to cyber crime's site. Then depending on the tweet, track the related information of the person. Track all the tweets of that particular person and track that person through identification databases. Then take a action by cyber crime. And after that prevent the tweet.","PeriodicalId":222768,"journal":{"name":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"User tracking using tweet segmentation and word\",\"authors\":\"M. Nimbarte, Mrunali Omprakash Thakare\",\"doi\":\"10.1109/ICECA.2017.8203622\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Many organizations have been reported to create and monitoring targeted Twitter streams to collect a bunch of information and understand according to user's view. Targeted Twitter stream is main usually constructed by filtering tweets and that abused words with predefined selection criteria. Due to its invaluable business value of timely information from these tweets, it's a necessary to understand that abused word's language for a large body of downstream applications, such as named entity recognition (NER), event detecting and summarizing that particular word, opinion mining, sentiment analysis, and etc. In these proposed system application is develope which take tweet is a input and search semantic negative or illegal words from database. Generate report of that abusing words and send to cyber crime's site. Then depending on the tweet, track the related information of the person. Track all the tweets of that particular person and track that person through identification databases. Then take a action by cyber crime. And after that prevent the tweet.\",\"PeriodicalId\":222768,\"journal\":{\"name\":\"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)\",\"volume\":\"56 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECA.2017.8203622\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECA.2017.8203622","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

据报道,许多组织创建和监控有针对性的Twitter流,以收集大量信息,并根据用户的观点进行理解。目标推特流通常是通过预定义的选择标准过滤推文和滥用词来构建的。由于这些推文的及时信息具有宝贵的商业价值,因此有必要了解滥用词的语言对于大量下游应用程序,如命名实体识别(NER),事件检测和总结特定词,意见挖掘,情感分析等。在该系统中,开发了以推文为输入,从数据库中搜索语义否定词或非法词的应用程序。生成辱骂词的报告并发送到网络犯罪网站。然后根据推文,追踪此人的相关信息。追踪那个人的所有推文并通过身份数据库追踪那个人。然后通过网络犯罪采取行动。然后阻止推特。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
User tracking using tweet segmentation and word
Many organizations have been reported to create and monitoring targeted Twitter streams to collect a bunch of information and understand according to user's view. Targeted Twitter stream is main usually constructed by filtering tweets and that abused words with predefined selection criteria. Due to its invaluable business value of timely information from these tweets, it's a necessary to understand that abused word's language for a large body of downstream applications, such as named entity recognition (NER), event detecting and summarizing that particular word, opinion mining, sentiment analysis, and etc. In these proposed system application is develope which take tweet is a input and search semantic negative or illegal words from database. Generate report of that abusing words and send to cyber crime's site. Then depending on the tweet, track the related information of the person. Track all the tweets of that particular person and track that person through identification databases. Then take a action by cyber crime. And after that prevent the tweet.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信