Adil Khan 9 months ago
AdiKhanOfficial #FYP Ideas

Automated monitoring suspicious discussion using data mining.

Introduction: The internet is a very Convenient and effective way for people and agencies to share knowledge, ideas, opinions and promote their products or even educate each other, by publishing textual data through a Browser interface. Plain textual information is essential for people to uncover th

Project Title

Automated monitoring suspicious discussion using data mining.

Project Area of Specialization

Computer Science

Project Summary

Introduction: The internet is a very Convenient and effective way for people and agencies to share knowledge, ideas, opinions and promote their products or even educate each other, by publishing textual data through a Browser interface. Plain textual information is essential for people to uncover the hidden data. The idea behind selecting this project is to develop software which gives broader scope to express our knowledge. Data mining is used for extract information from the large data sets and converting it into a straightforward format. Internet Technology has been increasing many legal or illegal activities. The first information may discuss in social media and then report in local media. Lots of communication channel provides illicit activities such as copyrighted movies, gambling, threating messages, and Cyber Bullying etc. Chats are the most popular way of communication in this era. It provides a secure and reliable method of communication. Chats messages can be sent to an individual or groups. A single chat can spread among millions of people within a few moments. Nowadays, most individuals even cannot imagine life without conversation. Conversations have become a widely used medium for the communication of terrorists as well. A significant number of researchers focused on the area of counterterrorism after the disastrous events of 9/11 trying to predict terrorist plans from suspicious communication. In the real-world scenario, as electronic devices and texting have increased, the analysing data is getting more significant and substantial. It’s not possible for investigators to perform analysis and dig out the hidden suspicious information from the large volume of unorganized and unstructured data. Forensic department and security agencies are dependent on old techniques and tools such as regularsearching of words in the document and through Google desktop search engine for the web which are not sufficient to work with current situations different types of data as well as inefficient in providing the information which is hidden in depth. We will apply data mining algorithms. Text data mining algos are used to detect illegal activities and suspicious postings. It analyses online plain text from sources. The system will help reduce such illegal activities by analyzing online plain text and classify them in different text groups to determine if a post is malicious or not.

Project Objectives

The scope of the project is to detect any illegal activity held in a chat room of social media. We can check any suspicious word in the web page just by entering its URL. We will apply strong algorithms that would detect illegal discussion and give notification to the server side means administrator side. Monitoring suspicious activities is a good way of keeping a track on their conversation or discussion. This system monitors and analysis only plain text. This is done with the support of text mining concept.

Project Implementation Method

The scope of the project is to detect any illegal activity held in a chat room of social media. We can check any suspicious word in the web page just by entering its URL. We will apply strong algorithms that would detect illegal discussion and give notification to the server side means administrator side. Monitoring suspicious activities is a good way of keeping a track on their  conversation or discussion. This system monitors and analysis only plain text for security reasons. This is done with the aid of text mining conc

Benefits of the Project

Detect suspicious online activity. ? Detect criminal posts over the internet. ? Detect suspicious activity even in the chat. ? It can be used for security purpose. ? It’ll scan post written in a natural language. ? It will cluster this post into different groups and will identify illegal activity if any

Technical Details of Final Deliverable

If the internet connection fails, this system won’t work. ? Cannot deal with code words. ? The system can’t detect the nature of the words. ? The product is Server dependent, and so if due to some reason the Server crashes, the whole network will crash ? Although the existing system works fine, there is still scope for improvement.

Final Deliverable of the Project

Software System

Core Industry

IT

Other Industries

Core Technology

Others

Other Technologies

Sustainable Development Goals

Required Resources

Item Name Type No. of Units Per Unit Cost (in Rs) Total (in Rs)
hard disk Equipment120002000
Total in (Rs) 2000
If you need this project, please contact me on contact@adikhanofficial.com
Camless Engine to Reduced Power Wastage For Improving Engine Performan...

The project deals with The engines powering today?s vehicles whether they burn gasoli...

1675638330.png
Adil Khan
9 months ago
Extraction of built-up areas of Gujranwala District from Landsat-8 OLI...

Nowadays rapid globalization is a major issue worldwide, cities are expanding day by day a...

1675638330.png
Adil Khan
9 months ago
Real-time Transport Tracking System

This Application is basically for the students, transport office and drivers. If someone w...

1675638330.png
Adil Khan
9 months ago
IOT BASED UNDER GROUND AND OVER HEAD CABLE FAULT DETECTION SYSTEM

Power cables that are used to deliver electrical power are placed either overhead or under...

1675638330.png
Adil Khan
9 months ago
Recycling Vending Machine

A reverse vending machine (RVM) is an automatic device that allows consumers to feed in us...

1675638330.png
Adil Khan
9 months ago