Analysis Of Machine Learning Techniques By Using Blogger

Blogs are the recent fast progressing media which depends on information system and technological advancement. The mass media is not much developed for the developing countries are in government terms and their schemes are developed based on governmental concepts, so blogs are provided for knowledge and ideas sharing. This article has highlighted and performed simulations from obtained information, 100 instances of Bloggers by using Weka 3. 6 Tool, and by applying many machine learning algorithms and analyzed with the values of accuracy, precision, recall and F-measure for getting future tendency anticipation of users to blogging and using in strategical areas.

[1]  Bradley M. Okdie,et al.  Personal Blogging; Individual Differences and Motivations , 2010 .

[2]  Ali A. Ghorbani,et al.  A Novel Approach for Social Behavior Analysis of the Blogosphere , 2008, Canadian Conference on AI.

[3]  Boleslaw K. Szymanski,et al.  NETWORK-BASED INTRUSION DETECTION USING NEURAL NETWORKS , 2002 .

[4]  G. Guyatt,et al.  The independent contribution of driver, crash, and vehicle characteristics to driver fatalities. , 2002, Accident; analysis and prevention.

[5]  P J Ossenbruggen,et al.  Roadway safety in rural and small urbanized areas. , 2001, Accident; analysis and prevention.

[6]  Jian-Jun Li,et al.  Intrusion detection based on clustering genetic algorithm , 2005, 2005 International Conference on Machine Learning and Cybernetics.

[7]  Mohammad Reza Norouzian,et al.  Classifying attacks in a network intrusion detection system based on artificial neural networks , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).

[8]  D. Lavanya,et al.  Performance Evaluation of Decision Tree Classifiers on Medical Datasets , 2011 .

[9]  Ian H. Witten,et al.  Generating Accurate Rule Sets Without Global Optimization , 1998, ICML.

[10]  Pedro M. Domingos,et al.  On the Optimality of the Simple Bayesian Classifier under Zero-One Loss , 1997, Machine Learning.

[11]  A. El-Semary,et al.  Applying Data Mining of Fuzzy Association Rules to Network Intrusion Detection , 2006, 2006 IEEE Information Assurance Workshop.

[12]  Young-Jun Kweon,et al.  Overall injury risk to different drivers: combining exposure, frequency, and severity models. , 2003, Accident; analysis and prevention.

[13]  Wolfgang Nejdl,et al.  Analyzing Political Trends in the Blogosphere , 2011, ICWSM.

[14]  Sri Hartati Kusrini IMPLEMENTATION OF C4.5 ALGORITHM TO EVALUATE THE CANCELLATION POSSIBILITY OF NEW STUDENT APPLICANTS AT STMIK AMIKOM YOGYAKARTA , 2009 .

[15]  Risto Miikkulainen,et al.  Intrusion Detection with Neural Networks , 1997, NIPS.

[16]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[17]  Dewan Md. Farid,et al.  Anomaly Network Intrusion Detection Based on Improved Self Adaptive Bayesian Algorithm , 2010, J. Comput..

[18]  J. Ross Quinlan,et al.  Induction of Decision Trees , 1986, Machine Learning.

[19]  W M Evanco,et al.  The potential impact of rural mayday systems on vehicular crash fatalities. , 1999, Accident Analysis and Prevention.

[20]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[21]  Václav Snásel,et al.  Survey: Using Genetic Algorithm Approach in Intrusion Detection Systems Techniques , 2008, 2008 7th Computer Information Systems and Industrial Management Applications.

[22]  Mohamed Abdel-Aty,et al.  Analysis and prediction of traffic fatalities resulting from angle collisions including the effect of vehicles' configuration and compatibility. , 2004, Accident; analysis and prevention.

[23]  Elisabeth Lex,et al.  Crosslanguage blog mining and trend visualisation , 2009, WWW '09.

[24]  Marcos M. Campos,et al.  Creation and deployment of data mining-based intrusion detection systems in Oracle Database l0g , 2005, Fourth International Conference on Machine Learning and Applications (ICMLA'05).