Identification of the authors of short messages portals on the Internet using the methods of mathematical linguistics. Postgraduate:Sukhoparov M.E. Supervisor:doctor.

Slides:



Advertisements
Similar presentations
Regulation Policy in the Info- Communications Technology Spheres in Russia Vladimir Efimushkin, Ph.D. Director for R&D, ZNIIS, Moscow SOIS Meeting in Riga,
Advertisements

Topic Identification in Forums Evaluation Strategy IA Seminar Discussion Ahmad Ammari School of Computing, University of Leeds.
TU e technische universiteit eindhoven / department of mathematics and computer science Specification of Adaptive Behavior Using a General- purpose Design.
CSE300-1 Profs. Steven A. Demurjian Q. Jin, J. Nam, Z. Qian and C. Phillips Computer Science & Engineering Department 191 Auditorium Road, Box U-155 The.
DESIGN AND IMPLEMENTATION OF SOFTWARE COMPONENTS FOR A REMOTE LABORATORY J. Fernandez, J. Crespo, R. Barber, J. Carretero University Carlos III of Madrid.
Hello Come on in…. What do you bring to your seat… Notebook Academic Organizer Pen, pencil, writing utensil.
RESEARCH METHODOLOGY, AS OFFERED BY THE FACULTY OF AGRICULTURE, Jomo Kenyatta University of Agriculture and Technology Professor F.K. Lenga (PhD), Dean,
SOPS: Stock Prediction using Web Sentiment Presented by Vivek sehgal, Charles Song Department of Computer Science, University of Maryland ICDMW
Title Course opinion mining methodology for knowledge discovery, based on web social media Authors Sotirios Kontogiannis Ioannis Kazanidis Stavros Valsamidis.
University of Birmingham Blogging in a Managed Environment Stephen Clarke, Head of eLearning University of Birmingham.
E-Infrastructures A key component for the European Industry and Services Christian SAGUEZ e-Infrastructures-Roma-Dec 9th-03.
Sydney Knowledge Management Forum Derek Jardine Managing Director Information Solutions Information Solutions Stop searching,
Collaborative Filtering in iCAMP Max Welling Professor of Computer Science & Statistics.
Software Process Improvement in Small Organizations A Case Study.
An Efficient and Scalable Pattern Matching Scheme for Network Security Applications Department of Computer Science and Information Engineering National.
University of Minho School of Engineering Computer Science and Technology Center Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 24.
Projects CE 311K Introduction to Computer Methods.
INTRODUCTION. Concepts HCI, CHI Usability User-centered Design (UCD) An approach to design (software, Web, other) that involves the user Interaction Design.
E-government in Russia For effective interaction of citizens and govermnemt Dmitrij Gurtov, Director of the Department for regional development of project.
Systems Engineer An engineer who specializes in the implementation of production systems This material is based upon work supported by the National Science.
Taking the Web to the Next Level. Current Web Issues  Not reaching target audiences  People can’t find the information they need  Too difficult to.
Cloud Computing Introduction to China-cloud Project and Related Works in JSI Yi Liu Sino-German Joint Software Institute, Beihang Univ. May 2011.
28 August 2015T Kari Laitinen1 T Seminar on Wireless Future 3 ECTS cr Dr. Kari Laitinen Principal Lecturer Oulu University of Applied Sciences.
CONTI’2008, 5-6 June 2008, TIMISOARA 1 Towards a digital content management system Gheorghe Sebestyen-Pal, Tünde Bálint, Bogdan Moscaliuc, Agnes Sebestyen-Pal.
Joel Bapaga on Web Design Strategies Technologies Commercial Value.
Greg Andolshek Alex Koch Michael McCormick Team Lasso.
Monitoring Architecture for Lawful Interception in VoIP Networks Second International Conference on Internet Monitoring and Protection (ICIMP 2007), IEEE.
Engineering Design By Brian Nettleton This material is based upon work supported by the National Science Foundation under Grant No Any opinions,
REPUBLIC OF SERBIA AUTONOMOUS PROVINCE OF VOJVODINA GOVERNMENT OF THE AUTONOMOUS PROVINCE OF VOJVODINA OFFICE FOR JOINT AFFAIRS OF PROVINCIAL BODIES ECDL.
March 2015 Inter-American Network for the Prevention of Violence and Crime.
PUBLIC RELATIONS RESEARCH AND PLANNING
Network of Excellence in Internet Science Network of Excellence in Internet Science (EINS) 1 st REVIEW Brussels, 12th April 2013 FP7-ICT
Communicating a Design Proposal By Brian Nettleton This material is based upon work supported by the National Science Foundation under Grant No
19/10/20151 Semantic WEB Scientific Data Integration Vladimir Serebryakov Computing Centre of the Russian Academy of Science Proposal: SkTech.RC/IT/Madnick.
Assessing the Frequency of Empirical Evaluation in Software Modeling Research Workshop on Experiences and Empirical Studies in Software Modelling (EESSMod)
Lecture 7: Requirements Engineering
Transboundary Trust Space February 16, 2012 Ensuring trust in information exchange – proposal and approaches from Russia and CIS-states (RCC states) National.
Computer Aided Design By Brian Nettleton This material is based upon work supported by the National Science Foundation under Grant No Any opinions,
Security Protection on Trust Delegated Medical Data in Public Mobile Networks Dasun Weerasinghe, Muttukrishnan Rajarajan and Veselin Rakocevic Mobile Networks.
Presented by Teererai Marange. According to Caliskan-Islam et al.(2015), authorship attribution using the Code Stylometry feature set is possible when.
Intelligent Database Systems Lab N.Y.U.S.T. I. M. How valuable is medical social media data? Content analysis of the medical web Presenter :Tsai Tzung.
CSE 102 Introduction to Computer Engineering What is Computer Engineering?
St. Petersburg State University of Information Technologies, Mechanics and optics The date of foundation: 1900 By Malyuchkov M., 11 b form.
National Technical University of Ukraine “Kiev Polytechnic Institute” Heat and energy design faculty Department of automation design of energy processes.
ITCS 6265 Details on Project & Paper Presentation.
Scientific Method Notes Science. Vocabulary Scientific method – A systematic approach to problem solving. Hypothesis – a proposed solution to a scientific.
An Address Management Mechanism for Blocking External Communications in IPv6 Networks 1.
Multiparty Access Control for Online Social Networks : Model and Mechanisms.
Engineering Design Process Created by The North Carolina School of Science and Math.The North Carolina School of Science and Math Copyright North.
MR. KERINS WHAT IS ENGINEERING. ENGINEERING DEFINED Engineering- Is the use of mathematics, science and technology to create products and systems that.
3 STUDENT ASSESSMENT DEPARTMENT
Jia Uddin Embedded System Lab.  MPLS  IMANET  IMANET network model  Proposed model of IMANET with MPLS  Conclusion.
OpenACS and.LRN Conference 2008 Automatic Limited-Choice and Completion Test Creation, Assessment and Feedback in modern Learning Processes Institute for.
A Classification for Access Control List To Speed Up Packet-Filtering Firewall CHEN FAN, LONG TAN, RAWAD FELIMBAN and ABDELSHAKOUR ABUZNEID Department.
Computer Systems Architecture Edited by Original lecture by Ian Sunley Areas: Computer users Basic topics What is a computer?
SWE minor 2007 Minor in Software Engineering Offered by the Departments of Computer Science and Information & Software Engineering New for Fall 2007.
October 26, 2011 AQUA CONNECT Bringing an Innovative Communication Tool to DWR.
Postgraduate stud. Al-Ahnomi Montaser Don State Technical University Department “Computer-aided design" Theme:- "development and research of intelligent.
Sentiment analysis algorithms and applications: A survey
Analysis of Computing Options at ISU
6th Grade Enrichment Choices
Frontiers of Computer Science, 2015, 9(4):608–622
Project Title This is a sample slide layout
ACS Architecture
Department of Computer Science & Engineering, HITEC University, Taxila
ACS Architecture.
Energy-Efficient Storage Systems
Knowledge Sharing Mechanism in Social Networking for Learning
Jiexi Wang Master of Computer Science Program
Nagios with The Decision Engine Implementing Passive Checks
Presentation transcript:

Identification of the authors of short messages portals on the Internet using the methods of mathematical linguistics. Postgraduate:Sukhoparov M.E. Supervisor:doctor of engineering science, Lebedev I.S. "St. Petersburg National Research University of Information Technologies, Mechanics and Optics" Department of "Secure Information Technology" Specialty "Methods and systems of information protection, information security"

Purpose and objectives The goal - a study of methods to identificate users. Objectives:  study and development of scientific-methodical system of identification of authorship of textual information  creation of the program layout, based on the proposed approach  assessment of the performance and efficiency of the developed prototyping implementation

The wording of solving scientific problems

Prospective directions of research  The use of naive Bayes classifier  Analysis based on the N - grams  Analysis based on latent Dirichlet allocation

Architecture of the proposed software Posts 1 * Words * * Words in Posts Users Topic 1 Vocabulary Filters *

Naive Bayes classifier

Results

Conclusions The implementation of the proposed solutions will identify the authors of short message forums and blogs on the Internet at various PR - actions to combat and control the formation and manipulation of public opinion and other manifestations of astroterfing.