Published Fast: - If it's accepted, We aim to get your article published online in 48 hours.

Home / Articles

No Article found
Data Mining to Track Suspicious Discussions on Online Forums
Author Name

Sheikh Md Zubair Md Zahoor Former Research Scholar, Computer Science, OPJS University, Churu, Rajasthan, India


Since we all aware, people use the internet to access a variety of social media platforms and other platforms for various purposes. Over networks, massive amounts of data are transmitted. The internet has made online communication and business exceedingly simple and quick. People use the internet for a variety of reasons all across the world. Whereas the internet is utilized for positive purposes, it is sometimes used for harmful or unlawful objectives. These sites are also utilized for a variety of criminal acts such as terrorism, threads, copyright violations, phishing scams, frauds, and spams, among others. Various strategies are being used by law enforcement agencies and departments to address these issues.


Key Words:  Stop word • Stemming algorithm • Suffix & Affix Stemmers • Levenshtein algorithm • Classification • Brute Force Algorithms • SNS • OSMS

Published On :

Article Download :
Publish your academic thesis as a book with ISBN Contact –
Visiters Count :