|HELPING CYBER FORENSICS FOR WRITER IDENTIFICATION BY IDENTIFYING IMPORTANT FEATURES|
|Akmal Ziyad Gyasoddin, Vishal Pushkarnath Marhatta, Manoj Vasudev Baviskar|
|Cite This Article:|
HELPING CYBER FORENSICS FOR WRITER IDENTIFICATION BY IDENTIFYING IMPORTANT FEATURES, International Journal of Innovative Research in Technology(www.ijirt.org) ,ISSN: 2349-6002 ,Volume 6 ,Issue 1 ,Page(s):95-99 ,May 2019 ,Available :IJIRT148260_PAPER.pdf
|The cover of mystery gave by mobile phones paid early SIM cards, open Wi-Fi hotspots, and flowed frameworks like Tor has profoundly tangled the task of recognizing customers of online life in the midst of logical examinations. From time to time, the substance of a singular posted message will be the principle snippet of data to a maker's character. By what strategy would we have the option to exactly envision who that maker might be the time when the message may never outperform 140 characters on an organization like Twitter? For up to 50 years, language masters, PC specialists, and analysts of the humanities have been as one making automated methodologies to perceive essayists in light of the style of their composed work. All journalists have characteristics of inclination that effect the casing and substance of their created works. These traits can routinely be assessed and evaluated by using AI computations.We will try to analyze the result after classification and find out which word-n-gram and char-n-gram plays most important role.For this evaluation we will use an application developed by us named TweetiFi.|
|Unique Paper ID: 148260|
Publication Volume & Issue: Volume 6, Issue 1
Page(s): 95 - 99
|Article Preview & Download|
Function Overloading Implementation in C++...
Paper ID : IJIRT148851
EXPERIMENTAL INVESTIGATION OF AIR SWIRL TECHNIQUE ...
Paper ID : IJIRT148850
ANALYSIS OF NEWTON RAPHSON METHOD...
Paper ID : IJIRT148847
DESIGN OF A MONITORING SYSTEM FOR WASTE MANAGEMENT...
Paper ID : IJIRT148846
Secant numerical method...
Paper ID : IJIRT148845