Introduction: The internet is a very Convenient and effective way for people and agencies to share knowledge, ideas, opinions and promote their products or even educate each other, by publishing textual data through a Browser interface. Plain textual information is essential for people to uncover th
Automated monitoring suspicious discussion using data mining.
Introduction: The internet is a very Convenient and effective way for people and agencies to share knowledge, ideas, opinions and promote their products or even educate each other, by publishing textual data through a Browser interface. Plain textual information is essential for people to uncover the hidden data. The idea behind selecting this project is to develop software which gives broader scope to express our knowledge. Data mining is used for extract information from the large data sets and converting it into a straightforward format. Internet Technology has been increasing many legal or illegal activities. The first information may discuss in social media and then report in local media. Lots of communication channel provides illicit activities such as copyrighted movies, gambling, threating messages, and Cyber Bullying etc. Chats are the most popular way of communication in this era. It provides a secure and reliable method of communication. Chats messages can be sent to an individual or groups. A single chat can spread among millions of people within a few moments. Nowadays, most individuals even cannot imagine life without conversation. Conversations have become a widely used medium for the communication of terrorists as well. A significant number of researchers focused on the area of counterterrorism after the disastrous events of 9/11 trying to predict terrorist plans from suspicious communication. In the real-world scenario, as electronic devices and texting have increased, the analysing data is getting more significant and substantial. It’s not possible for investigators to perform analysis and dig out the hidden suspicious information from the large volume of unorganized and unstructured data. Forensic department and security agencies are dependent on old techniques and tools such as regularsearching of words in the document and through Google desktop search engine for the web which are not sufficient to work with current situations different types of data as well as inefficient in providing the information which is hidden in depth. We will apply data mining algorithms. Text data mining algos are used to detect illegal activities and suspicious postings. It analyses online plain text from sources. The system will help reduce such illegal activities by analyzing online plain text and classify them in different text groups to determine if a post is malicious or not.
The scope of the project is to detect any illegal activity held in a chat room of social media. We can check any suspicious word in the web page just by entering its URL. We will apply strong algorithms that would detect illegal discussion and give notification to the server side means administrator side. Monitoring suspicious activities is a good way of keeping a track on their conversation or discussion. This system monitors and analysis only plain text. This is done with the support of text mining concept.
The scope of the project is to detect any illegal activity held in a chat room of social media. We can check any suspicious word in the web page just by entering its URL. We will apply strong algorithms that would detect illegal discussion and give notification to the server side means administrator side. Monitoring suspicious activities is a good way of keeping a track on their conversation or discussion. This system monitors and analysis only plain text for security reasons. This is done with the aid of text mining conc
Detect suspicious online activity. ? Detect criminal posts over the internet. ? Detect suspicious activity even in the chat. ? It can be used for security purpose. ? It’ll scan post written in a natural language. ? It will cluster this post into different groups and will identify illegal activity if any
If the internet connection fails, this system won’t work. ? Cannot deal with code words. ? The system can’t detect the nature of the words. ? The product is Server dependent, and so if due to some reason the Server crashes, the whole network will crash ? Although the existing system works fine, there is still scope for improvement.
| Item Name | Type | No. of Units | Per Unit Cost (in Rs) | Total (in Rs) |
|---|---|---|---|---|
| hard disk | Equipment | 1 | 2000 | 2000 |
| Total in (Rs) | 2000 |
The project deals with The engines powering today?s vehicles whether they burn gasoli...
Nowadays rapid globalization is a major issue worldwide, cities are expanding day by day a...
This Application is basically for the students, transport office and drivers. If someone w...
Power cables that are used to deliver electrical power are placed either overhead or under...
A reverse vending machine (RVM) is an automatic device that allows consumers to feed in us...