{"title":"利用apache spark中的数据文本挖掘技术提高在线社交网络用户之间的信任准确性","authors":"Pezhman Adib, S. Alirezazadeh, A. Nezarat","doi":"10.1109/ICCKE.2017.8167892","DOIUrl":null,"url":null,"abstract":"The number of users and amount of data transfer are increasing per each minute with the rapid growth of social network platforms on the web while the users have no certain knowledge of each other. Thus, with the overwhelming spread of the internet and such bulk of data, people find it arduous to identify valid comments. Establishing a genuine and more accurate trust becomes harder if classical processing is used especially with the presence of profitable, oriented, devious and narrow-minded comments. Various methods have been employed so far to evaluate reliable users most of which combine trust algorithms, subject classification, and comment mining methods. Researches reveal that the majority of social network users firstly take into account an overall number of public trust standards such as the number of friends, followers, followings, and likes of individuals in order to trust them. However, a malicious user could manipulate this trust by building virtual qualities. Accordingly, this study supplies a dictionary of malicious words and weighs them by combining trust standards and text mining users' tweets. It is intended to identify malicious users and analyze their behavior to proceed a more accurate trust within distributed execution in Spark environment for providing a quicker call. The results of this study show that the suggested method benefits from a high diagnostic accuracy.","PeriodicalId":151934,"journal":{"name":"2017 7th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Enhancing trust accuracy among online social network users utilizing data text mining techniques in apache spark\",\"authors\":\"Pezhman Adib, S. Alirezazadeh, A. Nezarat\",\"doi\":\"10.1109/ICCKE.2017.8167892\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The number of users and amount of data transfer are increasing per each minute with the rapid growth of social network platforms on the web while the users have no certain knowledge of each other. Thus, with the overwhelming spread of the internet and such bulk of data, people find it arduous to identify valid comments. Establishing a genuine and more accurate trust becomes harder if classical processing is used especially with the presence of profitable, oriented, devious and narrow-minded comments. Various methods have been employed so far to evaluate reliable users most of which combine trust algorithms, subject classification, and comment mining methods. Researches reveal that the majority of social network users firstly take into account an overall number of public trust standards such as the number of friends, followers, followings, and likes of individuals in order to trust them. However, a malicious user could manipulate this trust by building virtual qualities. Accordingly, this study supplies a dictionary of malicious words and weighs them by combining trust standards and text mining users' tweets. It is intended to identify malicious users and analyze their behavior to proceed a more accurate trust within distributed execution in Spark environment for providing a quicker call. The results of this study show that the suggested method benefits from a high diagnostic accuracy.\",\"PeriodicalId\":151934,\"journal\":{\"name\":\"2017 7th International Conference on Computer and Knowledge Engineering (ICCKE)\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 7th International Conference on Computer and Knowledge Engineering (ICCKE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCKE.2017.8167892\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 7th International Conference on Computer and Knowledge Engineering (ICCKE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCKE.2017.8167892","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Enhancing trust accuracy among online social network users utilizing data text mining techniques in apache spark
The number of users and amount of data transfer are increasing per each minute with the rapid growth of social network platforms on the web while the users have no certain knowledge of each other. Thus, with the overwhelming spread of the internet and such bulk of data, people find it arduous to identify valid comments. Establishing a genuine and more accurate trust becomes harder if classical processing is used especially with the presence of profitable, oriented, devious and narrow-minded comments. Various methods have been employed so far to evaluate reliable users most of which combine trust algorithms, subject classification, and comment mining methods. Researches reveal that the majority of social network users firstly take into account an overall number of public trust standards such as the number of friends, followers, followings, and likes of individuals in order to trust them. However, a malicious user could manipulate this trust by building virtual qualities. Accordingly, this study supplies a dictionary of malicious words and weighs them by combining trust standards and text mining users' tweets. It is intended to identify malicious users and analyze their behavior to proceed a more accurate trust within distributed execution in Spark environment for providing a quicker call. The results of this study show that the suggested method benefits from a high diagnostic accuracy.