Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
ABSTRACT i
LITERATURE SURVEY ii
LIST OF FIGURES iii
LIST OF SCREENS iv
1 INTRODUCTION 1-3
2 SYSTEM ANALYSIS 4-7
2.1 EXISTING SYSTEM 4
2.2 DISADVANTAGES 4
2.3 PROPOSED SYSTEM 5
2.4 ADVANTAGES 5
2.5 MODULES 6-7
3 SYSTEM STUDY 8
3.1 HARDWARE REQUIREMENTS 8
3.2 SOFTWARE REQUIREMENTS 8
4 SYSTEM DESIGN 9-14
4.1 SYSTEM ARCHITECTURE 9
4.2 DATA FLOW DIAGRAM 10
4.3 UML DIAGRAMS 11-14
5 IMPLEMENTATION 15-47
5.1 J2EE SOFTWARE ENVIRONMENT 16
5.2 JVM 19
5.3 JAVA SCRIPT 22
5.4 CODING 23-47
6 TESTING 48-56
6.1 SYSTEM TESTING 50
6.2 TYPES OF TESTS 46
6.3 OTHER TESTINGS 52
7 SCREENSHOTS 57-61
8 CONCLUSION 61-63
9 PUBLISHED PAPER 64-69
10 REFERENCE 70-72
ABSTRACT
(i)
ABSTRACT
Mass media sources, specifically the news media, have traditionally informed us of daily events.
In modern times, social media services such as Twitter provide an enormous amount of user-
generated data, which have great potential to contain informative news-related content. For these
resources to be useful, we must find a way to filter noise and only capture the content that, based
on its similarity to the news media, is considered valuable. However, even after noise is
removed, information overload may still exist in the remaining data—hence, it is convenient to
prioritize it for consumption. To achieve prioritization, information must be ranked in order of
estimated importance considering three factors. First, the temporal prevalence of a Particular
topic in the news media is a factor of importance and can be considered the media focus (MF) of
a topic. Second, the temporal prevalence of the topic in social media indicates its user attention
(UA). Last, the interaction between the social media users who mention this topic indicates the
strength of the community discussing it and can be regarded as the user interaction (UI) toward
the topic. We propose an unsupervised framework—Social Rank—which identifies news topics
prevalent in both social media and the news media, and then ranks them by relevance using their
degrees of MF, UA, and UI. Our experiments show that Soc I Rank improves the quality and
variety of automatically identified news topics.
(ii)
Literature Survey
Topic;Latent Dirichlet allocation.
Authors :D. M. Blei, A. Y. Ng, and M.Jordan.
We describe latent Dirichlet allocation(LDA), a generative probabilistic model for collections of
discrete data such as text corpora. LDA is a three-level hierarchical Bayesian model, in which
each item of a collection is modeled as a finite mixture over an underlying set of topics. Each
topic is, in turn, modeled as an infinite mixture over an underlying set of topic probabilities. In the
context of text modeling, the topic probabilities provide an explicit representation of a document.
We present efficient approximate inference techniques based on variational methods and an EM
algorithm for empirical Bayes parameter estimation. We report results in document modeling, text
classification,and collaborative filtering, comparing to a mixture of unigrams model and the
probabilistic LSI model.
Authors: T. Hofmann
Probabilistic Latent Semantic Analysis is a applied math technique for the analysis of
knowledge, that has applications in info retrieval and filtering, language process, machine
learning from text, and in connected areas. Compared to plain Latent linguistics Analysis that
stems from algebra and performs a Singular price Decomposition of co-occurrence tables, the
projected methodology relies on a mix decomposition derived from a latent category model. This
ends up in a a lot of high-principled approach that encompasses a solid foundation in statistics.
so as to avoid over fitting, we tend to propose a wide applicable generalisation of most
probability model fitting by tempered EM. The approach yields substantial and consistent
enhancements over Latent linguistics Analysis in an exceedingly variety of experiments.
4.3(b) CLASS 13
4.3(C) SEQUENCE 14
LIST OF SCREENS
INTRODUCTION
THE mining of valuable information from online sources has become a prominent research area in
information technology in recent years. Historically, knowledge that apprises the general public of
daily events has been provided by mass media sources, specifically the news media. Many of these
news media sources have either abandoned their hard copy publications and moved to the World
Wide Web, or now produce both hard-copy and Internet versions simultaneously.
These news media sources are considered reliable because they are published by professional
journalists, who are held accountable for their content. On the other hand, the Internet, being a free
and open forum for information exchange, has recently seen a fascinating phenomenon known as
social media. In social media, regular, non-journalist users are able to publish unverified content
and express their interest in certain events.
Micro blogs have become one of the most popular social media outlets. One micro blogging
service in particular, Twitter, is used by millions of people around the world, providing enormous
amounts of user-generated data. One may assume that this source potentially contains information
with equal or greater value than the news media, but one must also assume that because of the
unverified nature of the source, much of this content is useless. For social media data to be of any
use for topic identification, we must find a way to filter uninformative information and capture
only information which, based on its content similarity to the news media, may be considered
useful or valuable.
The news media presents professionally verified occurrences or events, while social media presents
the interests of the audience in these areas and may thus provide insight into their popularity. Social
media services like Twitter can also provide additional or supporting information to a particular
news media topic. In summary, truly valuable information may be thought of as the area in which
these two media sources topically intersect. Unfortunately, even after the removal of unimportant
content, there is still information overload in the remaining news-related data, which must be
prioritized for consumption.
DEPARTMENT OF CSE
1
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
To assist in the prioritization of news information, news must be ranked in order of estimated
importance. The temporal prevalence of a particular topic in the news media indicates that it is
widely covered by news media sources, making it an important factor when estimating topical
relevance. This factor may be referred to as the MF of the topic. The temporal prevalence of the
topic in social media, specifically in Twitter, indicates that users are interested in the topic and can
provide a basis for the estimation of its popularity. This factor is regarded as the UA of the topic.
Likewise, the number of users discussing a topic and the interaction between them also gives
insight into topical importance, referred to as the UI. By combining these three factors, we gain
insight into topical importance and are then able to rank the news topics accordingly.
Consolidated, filtered, and ranked news topics from both professional news providers and
individuals have several benefits. The most evident use is the potential to improve the quality and
coverage of news RECOMMENDER systems or Web feeds, adding user popularity feedback.
Additionally, news topics that perhaps were not perceived as popular by the mass media could be
uncovered from social media and given more coverage and priority. For instance, a Particular story
that has been discontinued by news providers could be given resurgence and continued if it is still a
popular topic among social networks. This information, in turn, can be filtered to discover how
particular topics are discussed in different geographic locations, which serve as feedback for
businesses and governments.
A straightforward approach for identifying topics from different social and news media sources is
the application of topic modeling. Many methods have been proposed in this area, such as latent
Dirichlet allocation (LDA) [1] and probabilistic latent semantic analysis (PLSA) [2], [3]. Topic
modeling is, in essence, the discovery of “topics” in text corpora by clustering together frequently
co-occurring words This approach, however, misses out in the temporal component of prevalent
topic detection, that is, it does not take into account how topics change with time. Furthermore,
topic modeling and other topic detection techniques do not rank topics according to their popularity
by taking into account their prevalence in both news media and social media.
DEPARTMENT OF CSE 2
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
DEPARTMENT OF CSE 3
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
CHAPTER-2
DEPARTMENT OF CSE
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
SYSTEM ANALYSIS
War ten a and BRUSSEE [4] implemented a method to detect topics by clustering keywords.
Their method entails the clustering of keywords—based on different similarity measures—
using the induced k-bisecting clustering algorithm. Although they do not employ the use of
graphs, they do observe that a distance measure based on the Jensen–Shannon divergence (or
information radius) of probability distributions performs well.
More recently, research has been conducted in identifying topics and events from social media
data taking into account temporal information, CATALDIETAL. [7] proposed a topic detection
technique that retrieves real-time emerging topics from Twitter. Their methods use the set of
terms from tweets and model their life cycle according to a novel aging theory.
Additionally, they take into account social relationships-more specifically, the authority of the
users in the network-to determine the importance of the topics. Z h a o e t a l. [8] carried out
similar work by developing a Twitter -LDA model designed to identify topics in tweets. Their
work, however, only considers the personal interests of users, and not prevalent topics at a
global scale.
2.2 DISADVANTAGES
DEPARTMENT OF CSE
4
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
In the proposed system, the method proposed an unsupervised method— Social Rank—
which identifies news topics prevalent in both social media and the news media, and then
ranks them by taking into account their MF, UA, and UI as relevance factors.
The temporal prevalence of a Particular topic in the news media is considered the MF of a
topic, which gives us insight into its mass media popularity. The temporal prevalence of the
topic in social media, specifically Twitter, indicates user interest, and is considered its UA.
Finally, the interaction between the social media users who mention the topic indicates the
strength of the community discussing it and is considered the UI. To the best of our
knowledge, no other work has attempted to employ the use of either the interests of social
media users or their social relationships to aid in the ranking of topics.
2.4 ADVANTAGES
DEPARTMENT OF CSE 5
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
2.5 MODULES
Admin
In this module, the Admin has to login by using valid user name and password. After login
successful he can perform some operations such as Authorizing users, Login ,View all users
and authorize, give click option to view all users locations in G Map using Multiple
Markers ,View all Friend Request and Response ,View all users time line tweet details with
Social rank, rating and give tweet ,View all tweets by clustering based on tweet name and
show tweeted details, Social Rank rating and View all Relevant Term Identification on all
tweets and group together(similar tweeted details for each and every created tweet) ,View
all users out lie detection tweet with its tweeted details, Social Rank rating and View all
term frequency on all tweets count(Display the tweets which is getting tweet regularly )
based on tweet name, View all tweet news Social rank in chart and View all tweet term
frequency count in chart based on date and time, View all tweets tweeted social rank in
chart
In this module, the admin can view all the friend requests and responses. Here all the
requests and responses will be displayed with their tags such as Id, requested user photo,
requested user name, user name request to, status and time & date. If the user accepts the
request then the status will be changed to accepted or else the status will remains as waiting.
User
In this module, there are n numbers of users are present. User should register before
performing any operations. Once user registers, their details will be stored to the database.
After registration successful, he has to login by using authorized user name and password.
Once Login is successful user can perform some operations like Register with Location
with date and login using G Map and Login, View Your Profile with location ,Search
DEPARTMENT OF CSE 6
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
Friend and Find Friend Request, View all Your Friends Details and Location Route path
from Your Location, View all your time line tweets with Social rank, rating and give tweet,
Create tweet for News like Tweet name, tweet uses, Tweet d e s c(enc),tweet image and
View all your tweet with re tweet details, Social rank rating, Search tweet and list all Tweets
and view its details and give re tweet, give rank by hyper link and View all your friends
Tweets and give Tweet
In this module, the user searches for users in Same Site and in the Sites and sends friend
requests to them. The user can search for users in other sites to make friends only if they
have permission.
7
7
DEPARTMENT OF CSE
7
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
CHAPTER-3
DEPARTMENT OF CSE
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
Software Requirements:
DEPARTMENT OF CSE
8
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
CHAPTER-4
DEPARTMENT OF CSE
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
SYSTEM DESIGN
Admi
4.1 SYSTEM ARCHITECTURE
1 Logi
2 View all users and authorize, give click
n n
option to view all user’s locations in G
tweet
Accepting all user Information5 View all tweets by clustering based on
Admin tweet name and show tweeted details,
View user data Social Rank, rating
details
6 View all Relevant Term Identification
DEPARTMENT OF CSE
9
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
Register Response
Search friends
View all Friend Request and Response and with
and request,
users time line tweet details, View all tweets the search video by
by clustering, View all Relevant Term
system content
Identification on all tweets and users out lie
keyword,
detection tweet, View all term frequency on
all tweets count, View all tweet news Social View Their
rank in chart, View all tweets tweeted social Own
rank in chart Request
Details
End
DEPARTMENT OF CSE
10
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
System
Search tweet and list all Tweets and
view its details and give re tweet
DEPARTMENT OF CSE 11
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
DEPARTMENT OF CSE 12
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
CLASS DIAGRAM:
Login, View all users and authorize, give click option to view
all users locations in G Map using Multiple Markers, View all
Friend Request and Response , View all users time line
tweet details with Social rank, rating and give tweet , View
all
Method tweets by clustering based on tweet name and show
tweeted details, Social Rank, rating, View all Relevant Term
Identification on all tweets and group together, View all
users out lie detection tweet with its tweeted details, Social
Rank, rating, View all term frequency on all tweets count,
Members .View all tweet news Social rank in chart ,View all tweet
Members
DEPARTMENT OF CSE 14
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
SEQUENCE DIAGRAM
View all term frequency on all View all tweet news Social rank in
tweets count chart
DEPARTMENT OF CSE 14
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
DEPARTMENT OF CSE 14
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
CHAPTER-5
DEPARTMENT OF CSE
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
IMPLEMENTATION
Client Server
Over view:
With the varied topic in existence in the fields of computers, Client Server is one, which has
generated more heat than light, and also more hype than reality. This technology has acquired a
certain critical mass attention with its dedication conferences and magazines. Major computer
vendors such as IBM and DEC, have declared that Client Servers is their main future market. A
survey of DBMS magazine revealed that 76% of its readers were actively looking at the client
server solution. The growth in the client server development tools from $200 million in 1992 to
more than $1.2 billion in 1996.
Client Server implementations are complex but the underlying concept is simple and powerful. A
client is an application running with local resources but able to request the database and relate
the services from separate remote server. The software mediating this client server interaction is
often referred to as MIDDLEWARE.
The typical client either a PC or a Work Station connected through a network to a more powerful
PC, Workstation, Mid range or Main Frames server usually capable of handling request from
more than one client. However, with some configuration server may also act as client. A server
may need to access other server in order to process the original client request.
The key client server idea is that client as user is essentially insulated from the physical location
and formats of the data needs for their application. With the proper middleware, a client input
from or report can transparently access and manipulate both local database on the client machine
and remote databases on one or more servers. An added bonus is the client server opens the door
to multiple- vendor database access indulging heterogeneous table joins.
15
DEPARTMENT OF CSE
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
The client server offers full relational database services such as SQL - Access, Record
modifying, Insert, Delete with full relational integrity backup/ restore performance for high
volume of transactions, etc. the client server middleware provides a flexible interface between
client and server, who does what, when and to whom.
Time-sharing changed the picture. Remote terminal could view and even change the central data,
subject to access permissions. And, as the central data banks evolved in to sophisticated
relational database with non-programmer query languages, online users could formulate ad ho c
queries and produce local reports without adding to the MIS applications software backlog.
However remote access was through dumb terminals, and the client server remained subordinate
to the Slave\Master.
DEPARTMENT OF CSE 16
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
The entire user interface is planned to be developed in browser specific environment with a
The browser specific components are designed by using the HTML standards, and the dynamism
and Enterprise Java Beans. The database connectivity is established by using the Java Data Base
Connectivity.
The standards of three-tier architecture are given major concentration to keep the standards of
About Java
Initially the language was called as “oak’’ but it was renamed as “Java” in 1995. The primary
motivation of this language was the need for a platform-independent (i.e., architecture neutral)
language that could be used to create software to be embedded in various consumer electronic
devices.
17
DEPARTMENT OF CSE
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
Except for those constraints imposed by the Internet environment, Java gives the
programmer, full control.
Java has had a profound effect on the Internet. This is because; Java expands the Universe of
objects that can move about freely in Cyberspace. In a network, two categories of objects are
transmitted between the Server and the Personal computer. They are: Passive information and
Dynamic active programs. The Dynamic, Self-executing programs cause serious problems in the
areas of Security and probability. But Java addresses those concerns and by doing so, has opened
the door to an exciting new form of program called the Applet.
Java can be used to create two typ es of programs
Applications and Applets: An application is a program that runs on our Computer under the
operating system of that computer. It is more or less like one creating using C or C++. Java’s
ability to create Applets makes it important. An Applet is an application designed to be
transmitted over the Internet and executed by a Java –compatible web browser. An applet is
actually a tiny Java program, dynamically downloaded across the network, just like an image.
But the difference is, it is an intelligent program, not just a media file. It can react to the user
input and dynamically change.
Featur es of Java
Security
Every time you that you download a “normal” program, you are risking a viral infection. Prior to
Java, most users did not download executable programs frequently, and those who did scanned
them for viruses prior to execution. Most users still worried about the possibility of infecting
their systems with a virus. In addition, another type of malicious program exists that must be
guarded against. This type of program can gather private information, such as credit card
numbers, bank account balances, and passwords. Java answers both these concerns by providing
a “firewall” between a network application and your computer.
When you use a Java-compatible Web browser, you can safely download Java applets without
fear of virus infection or malicious intent.
DEPARTMENT OF CSE 18
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
Portability
For programs to be dynamically downloaded to all the various types of platforms connected to
the Internet, some means of generating portable executable code is needed as you will see, the
same mechanism that helps ensure security also helps create portability. Indeed, Java’s solution
to these two problems is both elegant and efficient.
The key that allows the Java to solve the security and portability problems is that the output of
Java compiler is Byte code. Byte code is a highly optimized set of instructions designed to be
executed by the Java run-time system, which is called the Java Virtual Machine (JVM). That is,
in its standard form, the JVM is an interpreter for byte code.
Translating a Java program into byte code helps makes it much easier to run a program in a wide
variety of environments. The reason is, once the run-time package exists for a given system, any
Java program can run on it.
Although Java was designed for interpretation, there is technically nothing about Java that
prevents on-the-fly compilation of byte code into native code. Sun has just completed its Just In
Time (JIT) compiler for byte code. When the JIT compiler is a part of JVM, it compiles byte
code into executable code in real time, on a piece-by-piece, demand basis. It is not possible to
compile an entire Java program into executable code all at once, because Java performs various
run-time checks that can be done only at run time. The JIT compiles code, as it is needed, during
execution.
DEPARTMENT OF CSE 19
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
accurate and correct. So byte code verification is integral to the compiling and executing of Java
code.
Overall Description
Java .Class
Fig 5.1 Picture showing the development process of JAVA Program
Java programming uses to produce byte codes and executes them. The first box indicates that the
Java source code is located in a. Java file that is processed with a Java compiler called java c.
The Java compiler produces a file called a. class file, which contains the byte code. The. Class
file is then loaded across the network or loaded locally on your machine into the execution
environment is the Java virtual machine, which interprets and executes the byte code.
Java Architecture
Java architecture provides a portable, robust, high performing environment for development.
Java provides portability by compiling the byte codes for the Java Virtual Machine, which is then
interpreted on each platform by the run-time environment. Java is a dynamic system, able to load
code when needed from a machine in the same room or across the planet.
Compilation of code
When you compile the code, the Java compiler creates machine code (called byte code) for a
hypothetical machine called Java Virtual Machine (JVM). The JVM is supposed to execute the
byte code. The JVM is created for overcoming the issue of portability. The code is written and
compiled for one machine and interpreted on all machines. This machine is called Java Virtual
Machine.
During run-time the Java interpreter tricks the byte code file into thinking that it is running on a
Java Virtual Machine. In reality this could be a Intel Pentium Windows 95 or Sun SARC station
DEPARTMENT OF CSE 20
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
Java
PC Compiler
Java Interpreter
Source (PC)
running Solar is or Apple Macintosh running system and all could receive code from any
computer through Internet and run the Applets.
Simple
Java was designed to be easy for the Professional programmer to learn and to use effectively. If
you are an experienced C++ programmer, learning Java will be even easier. Because Java
inherits the C/C++ syntax and many of the object oriented features of C++. Most of the
confusing concepts from C++ are either left out of Java or implemented in a cleaner, more
approachable manner. In Java there are a small number of clearly defined ways to accomplish a
given task.
Object-Oriented
Java was not designed to be source-code compatible with any other language. This allowed the
Java team the freedom to design with a blank slate. One outcome of this was a clean usable,
pragmatic approach to objects. The object model in Java is simple and easy to extend, while
simple types, such as integers, are kept as high-performance non-objects.
DEPARTMENT OF CSE 21
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
Robust
The multiple- platform environment of the Web places extraordinary demands on a program,
because the program must execute reliably in a variety of systems. The ability to create robust
programs was given a high priority in the design of Java. Java is strictly typed language; it
checks your code at compile time and run time.
Java virtually eliminates the problems of memory management and d e allocation, which is
completely automatic. In a well-written Java program, all run time errors can –and should –be
managed by your program.
JAVASCRIPT
Even though JavaScript supports both client and server Web programming, we prefer JavaScript
at Client Side Programming since most of the browsers supports it. JavaScript is almost as easy
to learn as HTML, and JavaScript statements can be included in HTML documents by enclosing
the statements between a pair of scripting tags
<SCRIPTS></SCRIPT>.
JavaScript statements
</SCRIPT>
22
DEPARTMENT OF CSE 2223
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
JavaScript Vs Java
JavaScript and Java are entirely different languages. A few of the most glaring differences are:
Java applets are generally displayed in a box within the web document; JavaScript
can affect any part of the Web document itself.
While JavaScript is best suited to simple applications and adding interactive
features to Web pages; Java can be used for incredibly complex applications.
There are many other differences but the important thing to remember is that JavaScript and
Java are separate languages. They are both useful for different things, in fact they can be used
together to combine their advantages.
ADVANTAGES
JavaScript can be used for Sever-side and Client-side scripting.
It is more flexible than VB Script.
JavaScript is the default scripting languages at Client-side since all the browsers
supports it.
Hypertext Markup Language (HTML), the languages of the World Wide Web (WWW), allows
users to produce Web pages that include text, graphics and pointer to other Web pages
(Hyperlinks).
24
DEPARTMENT OF CSE
23
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
HTML is not a programming language, but it is an application of ISO Standard 8879, SGML
(Standard Generalized Markup Language), but specialized to hypertext and adapted to the Web.
The idea behind Hypertext is that instead of reading text in rigid linear structure, we can easily
jump from one point to another point. We can navigate through the information based on our
interest and preference. A markup language is simply a series of elements, each delimited with
special characters that define how text or other items enclosed within the elements should be
displayed. Hyperlinks are underlined or emphasized works that load to other documents or some
portions of the same document.
HTML can be used to display any type of document on the host computer, which can be
geographically at a different location. It is a versatile language and can be used on any platform
or desktop.
HTML provides tags (special codes) to make the document look attractive. HTML tags are not
case-sensitive. Using graphics, fonts, different sizes, color, etc., can enhance the presentation of
the document. Anything that is not a tag is part of the document itself.
Basic HTML Tags:
<! -- --> Specifies comments
<A>………</A> Creates hypertext links
<B>………</B> Formats text as bold
<BIG>………</BIG> Formats text in large font.
<BODY>…</BODY> Contains all tags and text in the HTML document
<CENTER>...</CENTER> Creates text
<DD>…</DD> Definition of a term
<DL>...</DL> Creates definition list
<FONT>…</FONT> Formats text with a particular font
<FORM>...</FORM> Encloses a fill-out form
<FRAME>...</FRAME> Defines a particular frame in a set of frames
<H#>…</H#> Creates headings of different levels
<HEAD>...</HEAD> Contains tags that specify information about a document
<HR>...</HR> Creates a horizontal rule
<HTML>…</HTML> Contains all other HTML tags
<META>...</META> Provides meta-information about a document
DEPARTMENT OF CSE 24
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
ADVANTAGES
A HTML document is small and hence easy to send over the net. It is small
because it does not include formatted information.
HTML is platform independent.
HTML tags are not case-sensitive.
What Is JDBC?
JDBC is a Java API for executing SQL statements. (As a point of interest, JDBC is a
trademarked name and is not an acronym; nevertheless, JDBC is often thought of as standing for
Java Database Connectivity. It consists of a set of classes and interfaces written in the Java
programming language. JDBC provides a standard API for tool/database developers and makes it
possible to write database applications using a pure Java API.
Using JDBC, it is easy to send SQL statements to virtually any relational database. One can write
a single program using the JDBC API, and the program will be able to send SQL statements to
the appropriate database. The combinations of Java and JDBC lets a programmer write it once
and run it anywhere.
What Does JDBC Do?
DEPARTMENT OF CSE 25
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
At this point, Microsoft's ODBC (Open Database Connectivity) API is that probably the most
widely used programming interface for accessing relational databases. It offers the ability to
connect to almost all databases on almost all platforms.
So why not just use ODBC from Java? The answer is that you can use ODBC from Java, but this
is best done with the help of JDBC in the form of the JDBC -ODBC Bridge, which we will cover
shortly. The question now becomes "Why do you need JDBC?" There are several answers to this
question:
1. ODBC is not appropriate for direct use from Java because it uses a C interface. Calls
from Java to native C code have a number of drawbacks in the security, implementation,
robustness, and automatic portability of applications.
2. A literal translation of the ODBC C API into a Java API would not be desirable. For
example, Java has no pointers, and ODBC makes copious use of them, including the
notoriously error-prone generic pointer "void *". You can think of JDBC as ODBC
translated into an object-oriented interface that is natural for Java programmers.
3. ODBC is hard to learn. It mixes simple and advanced features together, and it has
complex options even for simple queries. JDBC, on the other hand, was designed to keep
simple things simple while allowing more advanced capabilities where required.
4. A Java API like JDBC is needed in order to enable a "pure Java" solution. When ODBC
is used, the ODBC driver manager and drivers must be manually installed on every client
machine. When the JDBC driver is written completely in Java, however, JDBC code is
automatically install able, portable, and secure on all Java platforms from network
computers to mainframes.
The JDBC API supports both two-tier and three-tier models for database access.
In the two-tier model, a Java applet or application talks directly to the database. This requires a
JDBC driver that can communicate with the Particular database management system being
accessed. A user's SQL statements are delivered to the database, and the results of those
statements are sent back to the user. The database may be located on another machine to which
the user is connected via a network. This is referred to as a client/server configuration, with the
DEPARTMENT OF CSE 26
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
user's machine as the client, and the machine housing the database as the server. The network can
be an Intranet, which, for example, connects employees within a corporation, or it can be the
Internet.
In the three-tier model, commands are sent to a "middle tier" of services, which then send SQL
statements to the database. The database processes the SQL statements and sends the results back
to the middle tier, which then sends them to the user. MIS directors find the three-tier model very
attractive because the middle tier makes it possible to maintain control over access and the kinds
Java applet or
Client machine (GUI)
HTML browser
Client machine
JAVA
HTTP, RMI, or CORBA calls
Application
JDBC
DBMS-proprietary protocol
Application
Server (Java) SeDrBMrSm
ve -parcohpirniet(abru
yspro
inesto
scLolgic)
JDBC
Database server
DBMS
DBMS Database server
of updates that can be made to corporate data. Another advantage is that when there is a middle
tier, the user can employ an easy-to-use higher-level API which is translated by the middle tier
into the appropriate low-level calls. Finally, in many cases the three-tier architecture can provide
performance advantages.
Until now the middle tier has typically been written in languages such as C or C++, which
offer fast performance. However, with the introduction of optimizing compilers that translate
Java byte code into efficient machine-specific code, it is becoming practical to implement the
middle tier in Java. This is a big plus, making it possible to take advantage of Java's
robustness, Mu l ti threading, and security features. JDBC is important to allow database
access from a Java middle tier.
DEPARTMENT OF CSE
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
The JDBC drivers that we are aware of at this time fit into one of four categories:
JDBC -ODBC bridge plus ODBC driver
27
DEPARTMENT OF CSE
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
If possible, use a Pure Java JDBC driver instead of the Bridge and an ODBC driver. This
completely eliminates the client configuration required by ODBC. It also eliminates the
potential that the Java VM could be corrupted by an error in the native code brought in by the
Bridge (that is, the Bridge native library, the ODBC driver manager library, the ODBC driver
library, and the database client library).
The JDBC - ODBC Bridge is a JDBC driver, which implements JDBC operations by
translating them into ODBC operations. To ODBC it appears as a normal application
program. The Bridge implements JDBC for any database for which an ODBC driver is
available. The Bridge is implemented as the
Sun JDBC ODBC Java package and contains a native library used to access ODBC. The
Bridge is a joint development of Inter sol v and Java Soft.
Java server Pages is a simple, yet powerful technology for creating and maintaining dynamic-
content web pages. Based on the Java programming language, Java Server Pages offers
proven portability, open standards, and a mature re-usable component model. The Java
Server Pages architecture enables the separation of content generation from content
presentation. This separation not eases maintenance headaches, it also allows web team
members to focus on their areas of expertise. Now, web page designer can concentrate on
layout, and web application designers on programming, with minimal concern about
impacting each others work.
DEPARTMENT OF CSE
28
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
Features of JSP
Portability:
Java Server Pages files can be run on any web server or web-enabled application server that
provides support for them. Dubbed the JSP engine, this support involves recognition,
translation, and management of the Java Server Page life cycle and its interaction
components.
Components
It was mentioned earlier that the Java Server Pages architecture can include reusable Java
components. The architecture also allows for the embedding of a scripting language directly into
the Java Server Pages file. The components current supported include Java Beans, and
SERVLETS.
Processing
A Java Server Pages file is essentially an HTML document with JSP scripting or tags. The Java
Server Pages file has a JSP extension to the server as a Java Server Pages file. Before the page is
served, the Java Server Pages syntax is parsed and processed into a SERVLET on the server side.
The SERVLET that is generated outputs real content in straight HTML for responding to the
client.
Access Models:
A Java Server Pages file may be accessed in at least two different ways. A client’s request comes
directly into a Java Server Page. In this scenario, suppose the page accesses reusable Java Bean
components that perform Particular well-defined computations like accessing a database. The
result of the Beans computations, called result sets is stored within the Bean as properties. The
page uses such Beans to generate dynamic content and present it back to the client.
In both of the above cases, the page could also contain any valid Java code. Java Server Pages
architecture encourages separation of content from presentation.
DEPARTMENT OF CSE 29
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
1. The client sends a request to the web server for a JSP file by giving the name of the JSP
file within the form tag of a HTML page.
2. This request is transferred to the Java Web Server. At the server side Java Web Server
receives the request and if it is a request for a JSP file server gives this request to the JSP
engine.
3. JSP engine is program which can understands the tags of the JSP and then it converts
those tags into a SERVLET program and it is stored at the server side. This SERVLET is
loaded in the memory and then it is executed and the result is given back to the Java Web
Server and then it is transferred back to the result is given back to the Java Web Server
and then it is transferred back to the client.
JDBC connectivity
The JDBC provides database-independent connectivity between the J2EE platform and a wide
range of tabular data sources. JDBC technology allows an Application Component Provider to:
Tomcat is an open source web server developed by Apache Group. Apache Tomcat is the
SERVLET container that is used in the official Reference Implementation for the Java SERVLET
and Java Server Pages technologies. The Java SERVLET and Java Server Pages specifications
are developed by Sun under the Java Community Process.
DEPARTMENT OF CSE 30
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
Web Servers like Apache Tomcat support only web components while an application server
supports web components as well as business components (BEA s Web logic, is one of the
popular application server).To develop a web application with JSP/SERVLET install any web
server like J Run, Tomcat etc., to run your application.
DEPARTMENT OF CSE 31
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
Bibliography:
References for the Project Development were taken from the following Books and Web
Sites.
Oracle
JAVA Technologies
HTML
JDBC
DEPARTMENT OF CSE 32
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
<%
int count=0;
String s1="",s2="",s3="";
String d1="",d2="";
int i=0;
try{
%>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Google Map with Multiple Location</title>
<script type="text/javascript" src="http://code.jquery.com/jquery-2.1.0.min.js"></script>
<script type="text/javascript" src="http://maps.googleapis.com/maps/api/js?
sensor=false&key=AIzaSyD0X4v7eqMFcWCR-VZAJwEMfb47id9IZao"></script>
<script type="text/javascript">
var contentstring = [];
var regionlocation = [];
var markers = [];
var iterator = 0;
DEPARTMENT OF CSE
33
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
var areaiterator = 0;
var map;
var infowindow = [];
geocoder = new google.maps.Geocoder();
$(document).ready(function () {
setTimeout(function() { initialize(); }, 600);
});
function initialize() {
infowindow = [];
markers = [];
<%
while(rs.next() )
{
String uname=rs.getString(2);
s1="India";
s2="Karnataka";
s3= rs.getString(9);
d1=rs.getString(10);
d2=rs.getString(11);
%>
<%
i=i+1;
}%>
//GetValues();
iterator = 0;
areaiterator = 0;
region = new google.maps.LatLng(regionlocation[areaiterator].split(',')[0],
regionlocation[areaiterator].split(',')[1]);
map = new google.maps.Map(document.getElementById("Map"), {
zoom: 10,
mapTypeId: google.maps.MapTypeId.ROADMAP,
center: region,
});
drop();
}
DEPARTMENT OF CSE 34
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
function drop() {
for (var i = 0; i < contentstring.length; i++) {
setTimeout(function() {
addMarker();
}, 800);
}
}
function addMarker() {
var address = contentstring[areaiterator];
var icons = 'http://maps.google.com/mapfiles/ms/icons/red-dot.png';
var templat = regionlocation[areaiterator].split(',')[0];
var templong = regionlocation[areaiterator].split(',')[1];
var temp_latLng = new google.maps.LatLng(templat, templong);
markers.push(new google.maps.Marker(
{
position: temp_latLng,
map: map,
icon: icons,
draggable: false
}));
iterator++;
info(iterator);
areaiterator++;
}
function info(i) {
infowindow[i] = new google.maps.InfoWindow({
content: contentstring[i - 1]
});
infowindow[i].content = contentstring[i - 1];
google.maps.event.addListener(markers[i - 1], 'click', function() {
for (var j = 1; j < contentstring.length + 1; j++) {
infowindow[j].close();
}
infowindow[i].open(map, markers[i - 1]);
});
}
</script>
</head>
<body>
<div id="Map" style="width: 921px; height: 629px;">
35
DEPARTMENT OF CSE
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
</div>
</body>
</html>
<%
}
catch(Exception e)
{
e.printStackTrace();
}
%>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Admin Login Page</title>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<link href="style.css" rel="stylesheet" type="text/css" />
<script type="text/javascript" src="js/cufon-yui.js"></script>
<script type="text/javascript" src="js/arial.js"></script>
<script type="text/javascript" src="js/cuf_run.js"></script>
<style type="text/css">
<!--
.style3 {
font-size: 36px;
color: #FF0000;
}
.style4 {
font-weight: bold;
color: #000000;
}
.style5 {font-size: 18px}
.style9 {color: #993300}
.style10 {font-size: 18px; color: #993300; }
-->
</style>
<script language="javascript" type="text/javascript"> <!--Start Reg Validation Jai
Siddalinga-->
function valid()
{
var na3=document.s.adminid.value;
if(na3=="")
{
alert("Please Enter User Name");
document.s.adminid.focus();
DEPARTMENT OF CSE 36
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
return false;
}
else
{
}
var na4=document.s.pass.value;
if(na4=="")
{
alert("Please Enter Password");
document.s.pass.focus();
return false;
}
}
</script>
</head>
<body>
<div class="main">
<div class="header">
<div class="header_resize">
<div class="logo ">
<h2 class="style3">SociRank Identifying and Ranking Prevalent News Topics Using Social
Media Factors </h2>
</div>
<div class="clr"></div>
<div class="menu_nav">
<ul>
<li><a href="index.html">Home</a></li>
<li class="active"><a href="A_Login.jsp">Admin</a></li>
<li><a href="U_Login.jsp">End User</a></li>
</ul>
<div class="search">
<form id="form" name="form" method="post" action="#">
<span>
<input name="q" type="text" class="keywords" id="textfield" maxlength="50"
value="Search..." />
<input name="b" type="image" src="images/search.gif" class="button" />
</span>
</form>
</div>
</div>
<div class="clr"></div>
<div class="header_img"> <img src="images/heder_img.jpg" alt="" width="960"
height="288" /></div>
</div>
DEPARTMENT OF CSE 37
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
</div>
<div class="clr"></div>
<div class="content">
<div class="content_resize">
<div class="mainbar">
<h2><span class="style3">Welcome to Admin Login...</span></h2>
<p><img src="images/ALogin.jpg" width="160" height="138" /></p>
<form name="s" action="Authentication.jsp?value=<%="adminlogin"%>"
method="post" onSubmit="return valid()" ons target="_top">
<table width="452" align="left" bgcolor="#FFFF00">
<tr>
<td width="225" height="35" class="style5"><span class="style2 style9">Admin
Name (required)</span></td>
<td width="215" class="style5"><input name="adminid" class="text "
id="name" /></td>
</tr>
<tr>
<td height="38" class="style5"><span class="style2 style9">Password
(required)</span></td>
<td class="style5"><input name="pass" type="password" class="text "
id="password" /></td>
</tr>
<tr><td class="style10"> </td>
<td class="style10">
<input name="imageField" type="submit" id="imageField" value="Login" />
<input name="Reset" type="reset" value="Reset" /></td>
</tr>
<td class="style5">
</table>
</form>
</div>
<div class="sidebar">
<div class="gadget">
<h2>Sidebar Menu</h2>
<div class="clr"></div>
<ul class="sb_menu style4">
<li><a href="index.html">Home</a></li>
<li><a href="A_Login.jsp">Admin</a></li>
<li><a href="U_Login.jsp">End User </a></li>
</ul>
</div>
</div>
<div class="clr"></div>
DEPARTMENT OF CSE 38
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
</div>
</div>
<div class="fbg">
<div class="fbg_resize">
<div class="col c1">
<h2><span>Image Gallery</span></h2>
<a href="#"><img src="images/gallery_1.jpg" width="58" height="58" alt="" /></a> <a
href="#"><img src="images/gallery_2.jpg" width="58" height="58" alt="" /></a> <a
href="#"><img src="images/gallery_3.jpg" width="58" height="58" alt="" /></a> <a
href="#"><img src="images/gallery_4.jpg" width="58" height="58" alt="" /></a> <a
href="#"><img src="images/gallery_5.jpg" width="58" height="58" alt="" /></a> <a
href="#"><img src="images/gallery_6.jpg" width="58" height="58" alt="" /></a> </div>
<div class="clr"></div>
</div>
<div class="footer">
<div class="clr"></div>
</div>
</div>
</div>
<div align=center></div>
</body>
</html>
39
DEPARTMENT OF CSE
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
}
.style6 {color: #FF00FF}
.style7 {color: #CC00FF}
-->
</style>
<script src="https://maps.googleapis.com/maps/api/js?
v=3.exp&sensor=false&key=AIzaSyD0X4v7eqMFcWCR-VZAJwEMfb47id9IZao"></script>
<script>
var map;
function initialize() {
var mapOptions = {
zoom: 12,
center: new google.maps.LatLng(12.9716, 77.5946),
mapTypeId: google.maps.MapTypeId.ROADMAP
};
map = new google.maps.Map(document.getElementById('map_canvas'),
mapOptions
);
google.maps.event.addListener(map, 'click', function(event) {
document.getElementById('latMap').value = event.latLng.lat();
document.getElementById('lngMap').value = event.latLng.lng();
});
}
function mapDivClicked (event) {
var target = document.getElementById('map_canvas'),
posx = event.pageX - target.offsetLeft,
posy = event.pageY - target.offsetTop,
bounds = map.getBounds(),
neLatlng = bounds.getNorthEast(),
swLatlng = bounds.getSouthWest(),
startLat = neLatlng.lat(),
endLng = neLatlng.lng(),
endLat = swLatlng.lat(),
startLng = swLatlng.lng();
document.getElementById('posX').value = posx;
document.getElementById('posY').value = posy;
document.getElementById('lat').value = startLat + ((posy/350) * (endLat - startLat));
document.getElementById('lng').value = startLng + ((posx/500) * (endLng -
startLng));
}
google.maps.event.addDomListener(window, 'load', initialize);
</script>
DEPARTMENT OF CSE 40
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
{
alert("Please Enter User Name");
document.s.name.focus();
return false;
}
else
{
}
var na4=document.s.pwd.value;
if(na4=="")
{
alert("Please Enter Password");
document.s.pwd.focus();
return false;
}
var na6=document.s.email.value;
if(na6=="")
{
alert("Please Enter the Email");
document.s.email.focus();
return false;
}
var na7=document.s.mob.value;
if(na7=="")
{
alert("Please Enter the Mobile");
document.s.mob.focus();
return false;
}
var na5=document.s.dob.value;
if(na5=="")
DEPARTMENT OF CSE
41
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
{
alert("Please Enter the DOB");
document.s.dob.focus();
return false;
}
var na11=document.s.gen.value;
if(na11=="--Select--")
{
alert("please choose Gender");
document.s.gen.focus();
return false;
}
var na8=document.s.add.value;
if(na8=="")
{
alert("Please Enter the Address ");
document.s.add.focus();
return false;
}
var na9=document.s.loc.value;
if(na9=="")
{
alert("Please Enter the Location");
document.s.loc.focus();
return false;
}
var na121=document.s.lat.value;
if(na121=="")
{
alert("Please Enter the Latitued");
document.s.lat.focus();
return false;
}
var na13=document.s.lon.value;
if(na13=="")
DEPARTMENT OF CSE 42
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
var na10=document.s.photo.value;
if(na10=="")
{
alert("please choose image");
document.s.photo.focus();
return false;
}
}
</script>
</head>
<body>
<div class="main">
<div class="header">
<div class="header_resize">
<div class="logo ">
<h2 class="style3">SociRank Identifying and Ranking Prevalent News Topics Using Social
Media Factors </h2>
</div>
<div class="clr"></div>
<div class="menu_nav">
<ul>
<li><a href="index.html">Home</a></li>
<li><a href="A_Login.jsp">Admin</a></li>
<li class="active"><a href="U_Login.jsp">End User</a></li>
</ul>
<div class="search">
<form id="form" name="form" method="post" action="#">
<span>
<input name="q" type="text" class="keywords" id="textfield" maxlength="50"
value="Search..." />
<input name="b" type="image" src="images/search.gif" class="button" />
</span>
</form>
</div>
</div>
<div class="clr"></div>
DEPARTMENT OF CSE
13
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
DEPARTMENT OF CSE 44
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
</label>
</p>
</span></td>
</tr>
<tr>
<td>
<div align="right" class="style4 style2 style7"><span class="style13"><font
size="+1">DOB :</font></span></div></td>
<td><span class="style7">
<label>
<input type="text" id="dob" name="dob" style="width:100%"
placeholder="DD/MM/YYYY">
</label>
</span></td>
</tr>
<tr>
<td>
<div align="right" class="style4 style2 style7"><span class="style13"><font
size="+1">Gender :</font></span></div></td>
<td><span class="style7">
<label>
<select id="gen" name="gen">
<option>--Select--</option>
<option>Male</option>
<option>Female</option>
</select>
</label>
</span></td>
</tr>
<tr>
<td><div align="right" class="style4 style2 style7"><span class="style13"><font
size="+1">Address :</font> </span></div></td>
<td>
<span class="style7">
<label>
<textarea name="add" id="add" style="width:100%"></textarea>
</label>
</p>
</span></td>
</tr>
<tr>
<td><div align="right" class="style4 style2 style7"><span class="style13"><font
size="+1">Current Location :</font> </span></div></td>
<td>
<input name="loc" type="text" id="loc" style="width:100%"
placeholder="LOCATION"> </td>
45
DEPARTMENT OF CSE
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
</tr>
<tr>
<td> </td>
<td>
<span class="style7">
<input type="text" id="lat" name="lat" style="width:40%" placeholder="LATTITUDE">
<input type="text" id="lon" name="lon" style="width:40%" placeholder="LONGITUDE
">
</span></td>
</tr>
<tr>
<td>
<div align="right" class="style4 style2 style7"><span class="style13"><font
size="+1">Choose Photo :</font> </span></div></td>
<td>
<input name="photo" type="file" id="photo" style="width:100%" > </td>
</tr>
<td><span class="style7"></span></td>
<td><span class="style7"></span></td>
</tr>
<tr>
<td><span class="style7"></span></td>
<td><span class="style7">
<input type="submit" value="Register" id="button1">
<input type="reset" value="clear">
</span></td>
</tr>
</table> </td>
</tr>
</table>
</form>
<p> </p>
<div id="map_canvas" onClick="mapDivClicked(event);" style="height: 550px; width:
550px;"></div>
<div />
<div class="clr"></div>
<br>
<span class="style4 style6">VIEW LATTITUDE AND LONGITUDE FROM MOUSE
POSITION </br>
DEPARTMENT OF CSE 46
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
<br>
DEPARTMENT OF CSE 47
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
CHAPTER-6
DEPARTMENT OF CSE
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
SYSTEM TESTING
The purpose of testing is to discover errors. Testing is the process of trying to discover every
conceivable fault or weakness in a work product. It provides a way to check the functionality of
components, sub assemblies, assemblies and/or a finished product It is the process of exercising
software with the intent of ensuring that the
Software system meets its requirements and user expectations and does not fail in an
unacceptable manner. There are various types of test. Each test type addresses a specific testing
requirement.
TYPES OF TESTS
Unit testing
Unit testing involves the design of test cases that validate that the internal program logic is
functioning properly, and that program inputs produce valid outputs. All decision branches and
internal code flow should be validated. It is the testing of individual software units of the
application .it is done after the completion of an individual unit before integration. This is a
structural testing, that relies on knowledge of its construction and is invasive. Unit tests perform
basic tests at component level and test a specific business process, application, and/or system
configuration. Unit tests ensure that each unique path of a business process performs accurately
to the documented specifications and contains clearly defined inputs and expected results.
Integration testing
DEPARTMENT OF CSE 48
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
Integration tests are designed to test integrated software components to determine if they
actually run as one program. Testing is event driven and is more concerned with the basic
outcome of screens or fields. Integration tests demonstrate that although the components were
individually satisfaction, as shown by successfully unit testing, the combination of components is
correct and consistent. Integration testing is specifically aimed at exposing the problems that
arise from the combination of components.
Functional test
Functional tests provide systematic demonstrations that functions tested are available as
specified by the business and technical requirements, system documentation, and user manuals.
Functional testing is centered on the following items:
Valid Input: identified classes of valid input must be accepted.
Invalid Input: identified classes of invalid input must be rejected.
Functions: identified functions must be exercised.
Output: identified classes of application outputs must be exercised.
Systems/Procedures: interfacing systems or procedures must be invoked.
System Test
System testing ensures that the entire integrated software system meets requirements. It tests a
configuration to ensure known and predictable results. An example of system testing is the
configuration oriented system integration test. System testing is based on process descriptions
and flows, emphasizing p re -driven process links and integration points.
DEPARTMENT OF CSE 49
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
White Box Testing is a testing in which in which the software tester has knowledge of the inner
workings, structure and language of the software, or at least its purpose. It is purpose. It is used
to test areas that cannot be reached from a black box level.
Unit Testing:
Unit testing is usually conducted as part of a combined code and unit test phase of the
software life cycle, although it is not uncommon for coding and unit testing to be conducted as
two distinct phases.
Test objectives
All field entries must work properly.
Pages must be activated from the identified link.
The entry screen, messages and responses must not be delayed.
DEPARTMENT OF CSE 50
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
Features to be tested
Verify that the entries are of the correct format
No duplicate entries should be allowed
All links should take the user to the correct page.
Integration Testing
Test Results: All the test cases mentioned above passed successfully. No defects encountered.
Acceptance Testing
User Acceptance Testing is a critical phase of any project and requires significant
participation by the end user. It also ensures that the system meets the functional requirements.
Test Results: All the test cases mentioned above passed successfully. No defects encountered.
SYSTEM TESTING
TESTING METHODOLOGIES
The following are the Testing Methodologies:
o Unit Testing.
DEPARTMENT OF CSE 51
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
o Integration Testing.
o User Acceptance Testing.
o Output Testing.
o Validation Testing.
Unit Testing
Unit testing focuses verification effort on the smallest unit of Software design that is the
module. Unit testing exercises specific paths in a module’s control structure to ensure complete
coverage and maximum error detection. This test focuses on each module individually, ensuring
that it functions properly as a unit. Hence, the naming is Unit Testing.
During this testing, each module is tested individually and the module interfaces are
verified for the consistency with design specification. All important processing path are tested for
the expected results. All error handling paths are also tested.
Integration Testing
Integration testing addresses the issues associated with the dual problems of verification
and program construction. After the software has been integrated a set of high order tests are
conducted. The main objective in this testing process is to take unit tested modules and builds a
program structure that has been dictated by design.
2. Bottom-up Integration
DEPARTMENT OF CSE 52
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
This method begins the construction and testing with the modules at the lowest level in
the program structure. Since the modules are integrated from the bottom up, processing required
for modules subordinate to a given level is always available and the need for stubs is eliminated.
The bottom up integration strategy may be implemented with the following steps:
The low-level modules are combined into clusters into clusters that perform a
specific Software sub-function.
A driver (i.e.) the control program for testing is written to coordinate test case input and
output.
The cluster is tested.
Drivers are removed and clusters are combined moving upward in the program
structure
The bottom up approach tests each module individually and then each module is module is
integrated with a main module and tested for functionality.
DEPARTMENT OF CSE 53
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
DEPARTMENT OF CSE 54
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
does not provide a true system test and in fact ignores the cases most likely to cause system
failure.
Using Artificial Test Data:
Artificial test data are created solely for test purposes, since they can be generated to test all
combinations of formats and values. In other words, the artificial data, which can quickly be
prepared by a data generating utility program in the information systems department, make
possible the testing of all login and control paths through the program.
The most effective test programs use artificial test data generated by persons other than those
who wrote the programs. Often, an independent team of testers formulates a testing plan, using
the systems specifications.
The package “Virtual Private Network” has satisfied all the requirements specified as per
software requirement specification and was accepted.
USER TRAINING
Whenever a new system is developed, user training is required to educate them about the
working of the system so that it can be put to efficient use by those for whom the system has
been primarily designed. For, this purpose the normal working of the project was demonstrated
to the prospective users. Its working is easily understandable and since the expected users are
people who have good knowledge of computers, the use of this system is very easy.
MAINTAINENCE
This covers a wide range of activities including correcting code and design errors. To reduce the
need for maintenance in the long run, we have more accurately defined the user’s requirements
during the process of system development. Depending on the requirements, this system has been
developed to satisfy the needs to the largest possible extent. With development in technology, it
may be possible to add many more features based on the requirements in future. The coding and
designing are simple and easy to understand which will make maintenance easier.
TESTING STRATEGY:
A strategy for system testing integrates system test cases and design techniques into a well-
planned series of steps that results in the successful construction of software. The testing strategy
must co-operate test planning, test case design, test execution, and the resultant data collection
and evaluation .A strategy for software testing must accommodate low-level tests that are
DEPARTMENT OF CSE 55
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
necessary to verify that a small source code segment has been correctly implemented as well
as high level tests that validate major system functions against user requirements.
Software testing is a critical element of software quality assurance and represents the ultimate
review of specification design and coding. Testing represents an interesting anomaly for the
software. Thus, a series of testing are performed for the proposed system before the system is
ready for user acceptance testing.
SYSTEM TESTING:
Software once validated must be combined with other system elements (e.g. Hardware, people,
database). System testing verifies that all the elements are proper and that overall system
function performance is achieved. It also tests to finddiscrepancies between the system and its
original objective, current specifications and system documentation.
UNIT TESTING:
In unit testing different are modules are tested against the specifications produced during the
design for the modules. Unit testing is essential for verification of the code produced during the
coding phase, and hence the goals to test the internal logic of the modules. Using the detailed
design description as a guide, important Conrail paths are tested to uncover errors within the
boundary of the modules. This testing is carried out during the programming stage itself. In this
type of testing step, each module was found to be working satisfactorily as regards to the
expected output from the module.
In Due Course, latest technology advancements will be taken into consideration. As part
of technical build-up many components of the networking system will be generic in nature so
that future projects can either use or interact with this. The future holds a lot to offer to the
development and refinement of this project.
DEPARTMENT OF CSE 56
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
CHAPTER-7
DEPARTMENT OF CSE
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
SCREENSHOTS
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
DEPARTMENT OF CSE 58
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
DEPARTMENT OF CSE 59
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
DEPARTMENT OF CSE 60
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
DEPARTMENT OF CSE 61
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
CHAPTER-8
DEPARTMENT OF CSE
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
CONCLUSION
In this paper, we proposed an unsupervised method— Social Rank—which identifies news topics
prevalent in both social media and the news media, and then ranks them by taking into accounts
their MF, UA, and UI as relevance factors. The temporal prevalence of a Particular topic in the
news media is considered the MF of a topic, which gives us insight into its mass media
popularity. The temporal prevalence of the topic in social media, specifically Twitter, indicates
user interest, and is considered its UA. Finally, the interaction between the social media users
who mention the topic indicates the strength of the community discussing it and is considered the
UI. To the best of our knowledge, no other work has attempted to employ the use of either the
interests of social media users or their social relationships to aid in the ranking of topics.
Consolidated, filtered, and ranked news topics from both professional news providers and
individuals have several benefits. One of its main uses is increasing the quality and variety of
news RECOMMENDER systems, as well as discovering hidden, popular topics. Our system can
aid news providers by providing feedback of topics that have been discontinued by the mass
media but are still being discussed by the general population. Social Rank can also be extended
and adapted to other topics besides news, such as science, technology, sports, and other trends.
We have performed extensive experiments to test the performance of Social Rank, including
controlled experiments for its different components. Social Rank has been compared to media
focus-only ranking by utilizing results obtained from a manual voting method as the ground
truth. In the voting method, 20 individuals were asked to rank topics from specified time periods
based on their perceived importance. The evaluation provides evidence that our method is
capable of effectively selecting prevalent news topics and ranking them based on the three
previously mentioned measures of importance. Our results present a clear distinction between
ranking topics by MF only and ranking them by including UA and UI. This distinction provides a
basis for the importance of this paper, and clearly demonstrates the shortcomings of relying
solely on the mass media for topic ranking.
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
As future work, we intend to perform experiments and expand Social Rank on different areas and
data sets. Furthermore, we plan to include other forms of UA, such as search engine click-
through rates, which can also be integrated into our method to provide even more insight into the
true interest of users. Additional experiments will also be performed in different stages of the
methodology. For example, a fuzzy clustering approach could be employed in order to obtain
overlapping TC s (Section III-C). Lastly, we intend to develop a personalized version of Social
Rank, where topics are presented differently to each individual user.
DEPARTMENT OF CSE 63
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
CHAPTER-9
DEPARTMENT OF CSE
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
Socirank - Identifying And Ranking Prevent News Topics Using Social Media
V.Sravya 1 K.Koteswara Rao 2
1
M.Tech Student, Dept of CSE, RK college of Engineering & Technology, Krishna-521456, A.P., India
2
Associate Professor,Dept of CSE,Rk college of Engineering & Technology, Krishna-521456, A.P., India
Abstract:
Broad communications sources, specifically the news media, have generally educated us of
every day occasions. In present day times, online networking administrations, for example,
twitter give a gigantic measure of client produced information, which can possibly contain
educational news- related substance. For these assets to be helpful, we should find an
approach to filter clamor and just catch the substance that, in light of its comparability to
the news media, is viewed as important. In any case, even after clamor is evacuated,
information over-burden may at present exist in the rest of the information—thus, it is
advantageous to organize it for utilization. To accomplish prioritization, data must be
positioned arranged by evaluated significance considering three variables. To begin with,
the transient prevalence of a specific point in the news media is a factor of significance, and
can be viewed as the media center (MF) of a subject. Second, the worldly pervasiveness of
the point in online networking demonstrates its client consideration (UA). Last, the
collaboration between the online networking clients who specify this theme indicates the
quality of the group talking about it, and can be viewed as the client connection (UI) around
the subject. We propose an unsupervised structure SociRank—which identifies news
subjects predominant in both web-based social networking and the news media, and
afterward positions them by pertinence utilizing their degrees of MF, UA, and UI. Our trials
demonstrate that SociRank enhances the quality and assortment of consequently identified
news themes.
INTRODUCTION
THE mining of valuable information from online sources has become a prominent research
area in information technology in recent years. Historically, knowledge that apprises the
general public of daily events has been provided by mass media sources, specifically the news
media. Many of these news media sources have either abandoned their hardcopy publications
and moved to the World Wide Web, or now produce both hard-copy and Internet versions
simultaneously.
These news media sources are considered reliable because they are published by professional
journalists, who are held accountable for their content. On the other hand, the Internet, being
a free and open forum for information exchange, has recently seen a fascinating phenomenon
known as social media. In social media, regular, nonjournalist users are able to publish
unverified content and express their interest in certain events.
The news media presents professionally verified occurrences or events, while social media
presents the interests of the audience in these areas, and may thus provide insight into their
popularity. Social media services like Twitter can also provide additional or supporting
information to a particular news media topic. In summary, truly valuable information may be
thought of as the area in which these two media sources topically intersect. Unfortunately, even
after the removal of unimportant content, there is still information overload in the remaining
64 6
DEPARTMENT OF CSE
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
EXISTING SYSTEM
In this segment, a diagram G is developed, whose grouped hubs speak to the most
predominant news subjects in both news and online networking. The vertices in G are
extraordinary terms chose from N and T, and the edges are spoken to by a connection
between these terms. In the accompanying segments, we define a technique for choosing
the terms and set up a connection between them. After the terms and connections are
identified, the chart is pruned by filtering out irrelevant vertices and edges.
PROPOSED SYSTEM
When diagram G has been built and its most significant terms (vertices) and term-combine
co-event esteems (edges) have been chosen, the following objective is to distinguish and
isolate all around defined TCs (sub graphs) in the chart. Before clarifying the chart
grouping calculation, the ideas of betweenness and transitivity must first be comprehended?
BASIC METHODOLOGY
To a particular data set. The value of τ is based on where the largest increase in the summed
weights occurs when making node combinations. Node combinations are made only
between nodes that share an edge between them. Thus, if there is an all valid combinations
are found for a given TC and tweets that contain terms from combinations whose summed
weights are greater than τ are selected from the data sets. The number of unique users who
created these tweets is then counted, which directly represents the UA of TC. Because our
main objective is ranking, the number of unique users related to TC must be compared to
all other TCs discovered.
DEPARTMENT OF CSE 65
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
RESULTS
DEPARTMENT OF CSE 66
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
CONCLUSION
Consolidated, filtered, and ranked news topics from both professional news providers and
individuals have several benefits. One of its main uses is increasing the quality and variety of
news recommender systems, as well as discovering hidden, popular topics. Our system can aid
news providers by providing feedback of topics that have been discontinued by the mass media,
but are still being discussed by the general population. SocialRank can also be extended and
adapted to other topics besides news, such as science, technology, sports, and other trends. We
have performed extensive experiments to test the performance of SocialRank, including
controlled experiments for its different components. SocialRank has been compared to media
focus-only ranking by utilizing results obtained from a manual voting method as the ground
truth. In the voting method, 20 individuals were asked to rank topics from specified time
periods based on their perceived importance. The evaluation provides evidence that our method
is capable of effectively selecting prevalent news topics and ranking them based on the three
previously mentioned measures of importance. Our results present a clear distinction between
ranking topics by MF only and ranking them by including UA and UI. This distinction provides
a basis for the importance of this paper, and clearly demonstrates the shortcomings of relying
solely on the mass media for topic ranking.
As future work, we intend to perform experiments and expand SocialRank on different areas and
datasets. Furthermore, we plan to include other forms of UA, such as search engine click-through
rates, which can also be integrated into our method to provide even more insight into the true
interest of users. Additional experiments will also be performed in different stages of the
methodology. For example, a fuzzy clustering approach could be employed in order to obtain
overlapping TCs (Section III-C). Lastly, we intend to develop a personalized version of
SocialRank, where topics are presented differently to each individual user.
DEPARTMENT OF CSE 67
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
REFERENCES
[1] D. M. Blei, A. Y. Ng, and M. I. Jordan, “Latent Dirichlet allocation,” J. Mach. Learn.
Res., vol. 3, pp. 993–1022, Jan. 2003.
[2] T. Hofmann, “Probabilistic latent semantic analysis,” in Proc. 15th Conf. Uncertainty Artif.
Intell., 1999, pp. 289–296.
[3] T. Hofmann, “Probabilistic latent semantic indexing,” in Proc. 22nd Annu. Int. ACM
SIGIR Conf. Res. Develop. Inf. Retrieval, Berkeley, CA, USA, 1999, pp. 50–57.
[4] C. Wartena and R. Brussee, “Topic detection by clustering keywords,” in Proc. 19th Int.
Workshop Database Expert Syst. Appl. (DEXA), Turin, Italy, 2008, pp. 54–58.
[5] F. Archetti, P. Campanelli, E. Fersini, and E. Messina, “A hierarchical document
clustering environment based on the induced bisecting k-means,” in Proc. 7th Int.
Conf. Flexible Query Answering Syst., Milan, Italy, 2006, pp. 257–269. [Online].
Available:http://dx.doi.org/10.1007/11766254_22.
[6] C. D. Manning and H. Schütze, Foundations of Statistical Natural Language
Processing. Cambridge, MA, USA: MIT Press, 1999.
[7] M. Cataldi, L. Di Caro, and C. Schifanella, “Emerging topic detection on Twitter
based on temporal and social terms evaluation,” in Proc. 10th Int. Workshop
Multimedia Data Min.
(MDMKDD), Washington, DC, USA, 2010, Art. no. 4. [Online]. Available:
http://doi.acm.org/10.1145/1814245.1814249.
[8] W. X. Zhao et al., “Comparing Twitter and traditional media using topic models,” in
Advances in Information Retrieval. Heidelberg, Germany: Springer Berlin Heidelberg, 2011, pp.
338–349.
[9] Q. Diao, J. Jiang, F. Zhu, and E.-P. Lim, “Finding bursty topics from microblogs,” in Proc.
50th Annu. Meeting Assoc. Comput. Linguist. Long Papers, vol. 1. 2012, pp. 536–544.
[10] H. Yin, B. Cui, H. Lu, Y. Huang, and J. Yao, “A unified model for stable and
temporal topic detection from social media data,” in Proc IEEE 29th Int. Conf. Data Eng.
(ICDE), Brisbane, QLD, Australia, 2013, pp. 661–672.
[11] C. Wang, M. Zhang, L. Ru, and S. Ma, “Automatic online news topic ranking
using media focus and user attention based on aging theory,” in Proc. 17th Conf. Inf.
Knowl. Manag., Napa County, CA, USA, 2008, pp. 1033–1042.
[12] C. C. Chen, Y.-T. Chen, Y. Sun, and M. C. Chen, “Life cycle modeling of news
events using aging theory,” in Machine Learning: ECML 2003. Heidelberg, Germany:
Springer Berlin
Heidelberg, 2003, pp. 47–59.
[13] J. Sankaranarayanan, H. Samet, B. E. Teitler, M. D. Lieberman, and J. Sperling,
“TwitterStand: News in tweets,” in Proc. 17th ACM SIGSPATIAL Int. Conf. Adv. Geograph.
Inf. Syst., Seattle, WA, USA, 2009, pp. 42–51.
[14] O. Phelan, K. McCarthy, and B. Smyth, “Using Twitter to recommend real-
time topical news,” in Proc. 3rd Conf. Recommender Syst., New York, NY, USA,
2009, pp. 385–388.
DEPARTMENT OF CSE
68
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
[15] K. Shubhankar, A. P. Singh, and V. Pudi, “An efficient algorithm for topic
ranking and modeling topic evolution,” in Database Expert Syst. Appl., Toulouse,
France, 2011, pp. 320–
330.
DEPARTMENT OF CSE
69
SOCI RANK- IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
CHAPTER-10
DEPARTMENT OF CSE
SOCIRANK - IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
REFERENCES
[8] W. X. ZHAO ET AL., “Comparing Twitter and traditional media using topic
models,” in Advances in Information Retrieval. Heidelberg, Germany: SPRINGER
Berlin Heidelberg, 2011, pp. 338–349.
[9] Q. DIAO, J. JIANG, F. ZHU, and E.-P. LIM, “Finding BURSTY topics from
micro blogs,” in PROC. 50th ANNU. Meeting Assoc. COMPUT. Linguist. Long
Papers, vol. 1. 2012, pp. 536–544.
DEPARTMENT OF CSE 70
SOCIRANK - IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
[10] H. Yin, B. CUI, H. Lu, Y. Huang, and J. YAO, “A unified model for stable and
temporal topic detection from social media data,” in PROC IEEE 29th Int. CONF.
Data Eng. (ICDE), Brisbane, QLD, Australia, 2013, pp. 661–672.
[11] C. Wang, M. ZHANG, L. Ru, and S. Ma, “Automatic online news topic ranking
using media focus and user attention based on aging theory,” in PROC. 17th CONF.
Inf. KNOWL. MANAG., Napa County, CA, USA, 2008, pp. 1033–1042.
[12] C. C. Chen, Y.-T. Chen, Y. Sun, and M. C. Chen, “Life cycle modeling of news
events using aging theory,” in Machine Learning: ECML 2003. Heidelberg, Germany:
SPRINGER Berlin Heidelberg, 2003, pp. 47–59.
[15] K. SHUBANKAR, A. P. Singh, and V. PUDI, “An efficient algorithm for topic
ranking and modeling topic evolution,” in Database Expert SYST. APPL., Toulouse,
France, 2011, pp. 320–330.
[16] S. BRIN and L. Page, “Reprint of: The anatomy of a large-scale hyper textual
web search engine,” COMPUT. NETW., vol. 56, no. 18, pp. 3825–3833, 2012.
[17] E. Kwan, P.-L. HSU, J.-H. LIANG, and Y.-S. Chen, “Event identification for
social streams using keyword-based evolving graph sequences,” in PROC.
IEEE/ACM Int. CONF. Adv. Soc. NETW. Anal. Min., Niagara Falls, ON, Canada,
2013, pp. 450–457.
DEPARTMENT OF CSE 71
SOCIRANK - IDENTIFYING AND RANKING PREVALENT NEWS TOPICS USING SOCIAL MEDIA FACTORS
[19] G. Salton, C.-S. Yang, and C. T. YU, “A theory of term importance in automatic text
analysis,” J. Amer. Soc. Inf. Sci., vol. 26, no. 1, pp. 33–44, 1975.
DEPARTMENT OF CSE
72