Full Paper View Go Back
Methods for Web-Spam Detection on web: Principles and Algorithms
Mrs. Parminder Kaur .1
- Shri Venkateshwara University, Gajraula, India.
Section:Research Paper, Product Type: Isroset-Journal
Vol.6 ,
Issue.2 , pp.119-125, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijsrcse/v6i2.119125
Online published on Apr 30, 2018
Copyright © Mrs. Parminder Kaur . . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Mrs. Parminder Kaur ., âMethods for Web-Spam Detection on web: Principles and Algorithms,â International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.2, pp.119-125, 2018.
MLA Style Citation: Mrs. Parminder Kaur . "Methods for Web-Spam Detection on web: Principles and Algorithms." International Journal of Scientific Research in Computer Science and Engineering 6.2 (2018): 119-125.
APA Style Citation: Mrs. Parminder Kaur ., (2018). Methods for Web-Spam Detection on web: Principles and Algorithms. International Journal of Scientific Research in Computer Science and Engineering, 6(2), 119-125.
BibTex Style Citation:
@article{Kaur ._2018,
author = {Mrs. Parminder Kaur .},
title = {Methods for Web-Spam Detection on web: Principles and Algorithms},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {4 2018},
volume = {6},
Issue = {2},
month = {4},
year = {2018},
issn = {2347-2693},
pages = {119-125},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=619},
doi = {https://doi.org/10.26438/ijcse/v6i2.119125}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i2.119125}
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=619
TI - Methods for Web-Spam Detection on web: Principles and Algorithms
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Mrs. Parminder Kaur .
PY - 2018
DA - 2018/04/30
PB - IJCSE, Indore, INDIA
SP - 119-125
IS - 2
VL - 6
SN - 2347-2693
ER -
Abstract :
A excess of big data applications are emerging which is being researched in the field of information technology which needs recognition of pattern and online classification of large dataset fetched from various forum working on online platform. The present research focuses on systematically analyzing and categorizing models that detect review spam. However, spamming is considered as critical issue in web mining. To handle the difficult queries, research is conducted on algorithm for data mining and knowledge discovery. I started with the introduction of web mining, web spam and process of mining Next, the study proceeds to assess them in terms of accuracy and results. Different detection techniques have different strengths and weaknesses and thus favor different detection contexts. The simulation output of our approach on different queries which shows effectiveness of our proposed framework. As the final part, we provide our conclusion and prospect.
Key-Words / Index Term :
Web, Internet, Server, Spam, Detection Technique
References :
[1]. Abe, T., Miyake, J., Kawashima, M., & Takahashi, K. (2005).âSpam filtering withcryptographic ad-hoc email addressesâ, In IEEE SAINT-W02005, pp. 114â117.
[2]. Agrawal, B., Kumar, N., &Molle, M. (2005). âControlling spam emails at the routersâ. In Proceedings of the IEEE International Conference on Communications, ICC 2005,Vol. 3, pp. 1588â1592.
[3]. Aharon, M., Elad, M. &Bruckstein, A., (2006),âK-SVD: an algorithm for designing overcomplete dictionaries for sparse representationâ, Signal Process IEEE Trans 54(11):4311â4322.
[4]. Ahonen, T., Hadid, A., Pietikainen, M., (2006),âFace description with local binary patterns: application to face recognitionâ,PatternAnalMachIntell IEEE Trans 28(12):2037â2041.
[5]. Algur, S., &Pendari N. (2012), âHybrid spamicity score approach to web spam detectionâ in Pattern Recognition, Informatics and Medical Engineering (PRIME), 2012 International Conference on. IEEE, pp. 36â40.
[6]. Amleshwaram, A., Reddy, N., Yadav, S., Gu, G., & Yang, C. (2013.),âCats:Characterizing automation of twitter spammeâ, Technical report, Department of Electrical and Computer Engineering Texas A&M University, College Station, TX 77843.
[7]. Androutsopoulos, I., Koutsias J., Chandrinos K. V., and Spyropoulos C. D. (2000).ââAnEvaluation of Naive Bayesian Anti-Spam Filtering.ââIn Proceedings of the Workshopon Machine Learning in the New Information Age, 11th European Conferenceon Machine Learning, edited by G. Potamias, V. Moustakis, and M. vanSomeren, 9â17. Barcelona, Spain: ECML.
[8]. Algur, S., &Pendari N. (2012), âHybrid spamicity score approach to web spam detectionâ, in Pattern Recognition, Informatics and Medical Engineering (PRIME), 2012 International Conference on. IEEE, pp. 36â40.
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at support@isroset.org or view contact page for more details.