Computer Science And Technology - Research Publications
Permanent URI for this collectionhttps://kr.cup.edu.in/handle/32116/82
Browse
2 results
Search Results
Item Semi-supervised labeling: a proposed methodology for labeling the twitter datasets(Springer, 2022-01-28T00:00:00) Jan, Tabassum Gull; Khurana, Surinder Singh; Kumar, MunishTwitter has nowadays become a trending microblogging and social media platform for news and discussions. Since the dramatic increase in its platform has additionally set off a dramatic increase in spam utilization in this platform. For Supervised machine learning, one always finds a need to have a labeled dataset of Twitter. It is desirable to design a semi-supervised labeling technique for labeling newly prepared recent datasets. To prepare the labeled dataset lot of human affords are required. This issue has motivated us to propose an efficient approach for preparing labeled datasets so that time can be saved and human errors can be avoided. Our proposed approach relies on readily available features in real-time for better performance and wider applicability. This work aims at collecting the most recent tweets of a user using Twitter streaming and prepare a recent dataset of Twitter. Finally, a semi-supervised machine learning algorithm based on the self-training technique was designed for labeling the tweets. Semi-supervised support vector machine and semi-supervised decision tree classifiers were used as base classifiers in the self-training technique. Further, the authors have applied K means clustering algorithm to the tweets based on the tweet content. The principled novel approach is an ensemble of semi-supervised and unsupervised learning wherein it was found that semi-supervised algorithms are more accurate in prediction than unsupervised ones. To effectively assign the labels to the tweets, authors have implemented the concept of voting in this novel approach and the label pre-directed by the majority voting classifier is the actual label assigned to the tweet dataset. Maximum accuracy of 99.0% has been reported in this paper using a majority voting classifier for spam labeling. � 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.Item GRAY HOLE ATTACK ON HYBRID 5G NETWORK(International Journal of Advanced Research in Computer Science, 2017) Bhan, Anshu; Khurana, Surinder Singh5G device to device communication is such a product of progressive thinking, a network that uses both LTE communication scenario in conjugation with Wi-Fi low band communication. The main idea for conjunction of two different types of network is based on the fact that base stations suffer large amount of traffic and tend to drop data and information in such cases. Apart from these facts another main stream goal is to provide security for such a communication technology. The network is based on the transitioning nodes, a set of cluster head communicates with another cluster head using base stations and nodes in between transfer from one cluster head to another. Gray hole attack is a situation in which the attacker inserts a malicious node into cluster head and steals information. This paper is based on the performance of 5G networks and effects of gray hole attacks on 5G networks.