Skip to main content

Implementation of Connected Dominating Set in Social Networks Using Mention Anomaly

  • Conference paper
  • First Online:
Artificial Intelligence and Evolutionary Computations in Engineering Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 517))

Abstract

Social network sites (SNS) are open platform that allows users to create an account in public sites. Social network site contains more active users, who share the posts, messages, or valuable information in real time. Even though social network provides timely updating still it is hard, because the current event mentions are overwhelmed by other mentions, which are totally irrelevant with the current affairs. The proposed methods mainly concentrate on text mentions in social networks and avoid the current affairs of the social aspect. Here two main methodologies are proposed that will improve the web content mining in social network sites. GBMAD (Geographically based mention anomaly detection), is a one of the best methods to manage dynamic links (i.e., Mentions: shares, likes, re-tweets, comments, etc.). GBMAD detects current events over the particular geographical location and it determines the importance of mentions over the crowd. The main advantage is it dynamically works in the real-time data rather than defined data. The next method is connected dominating set is used for identifying the closely related structure by using graph theory techniques. In the proposed work, the anomaly users are identified using Mention anomaly detection. In the future work, the implementation of Sybil attacks in the network will be identified and prevent from unsolicited friend requests in social networks using graph-based theory.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Takahashi. T, et al. “Discovering Emerging Topics in Social Streams via Link-Anomaly Detection”, IEEE Transactions on Knowledge and Data Engineering, 2014, 26(1), pp. 120–130.

    Google Scholar 

  2. Yuan Cheng, Jaehong Park and Ravi Sandhu, “An Access Control Model for Online Social Networks Using User-to-User Relationships”, IEEE Transactions on Dependable and Secure Computing, 2015. (in press).

    Google Scholar 

  3. Q. Mei and C. Zhai, “Discovering Evolutionary Theme Patterns from Text: An Exploration of Temporal Text Mining,” Proc. 11th ACM SIGKDD Int’l Conf. Knowledge Discovery in Data Mining, 2005, pp. 198–207.

    Google Scholar 

  4. Zhi Yang, et al. “VoteTrust: Leveraging Friend Invitation Graph to Defend Social Network Sybils”, IEEE Transactions on Dependable and Secure Computing, 2015. (in press).

    Google Scholar 

  5. Kim, Donghyun, et al. “A Dominating Set Based Approach to identify Effective Leader Group of Social Network”, Computing and Combinatorics. Springer Berlin Heidelberg, 2013, pp. 841–848.

    Google Scholar 

  6. V. Ceronmani Sharmila, A. George, “Construction of Strategic Connected Dominating Set for Mobile Ad Hoc Networks,” Journal of Computer Science, Science Publications, 2014, 10(2), pp. 285–295.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Nivetha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Nivetha, S., Ceronmani Sharmila, V. (2017). Implementation of Connected Dominating Set in Social Networks Using Mention Anomaly. In: Dash, S., Vijayakumar, K., Panigrahi, B., Das, S. (eds) Artificial Intelligence and Evolutionary Computations in Engineering Systems. Advances in Intelligent Systems and Computing, vol 517. Springer, Singapore. https://doi.org/10.1007/978-981-10-3174-8_65

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3174-8_65

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3173-1

  • Online ISBN: 978-981-10-3174-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics