0% found this document useful (0 votes)
149 views12 pages

SYNOPSIS

The project aims to develop a system to analyze websites and detect the prominence of certain keywords that could indicate websites inspiring terrorism. The system would analyze websites and check the frequency of keywords commonly used in terrorist propaganda to identify websites with high prominence of such words. A group of 5 students proposed the project as their final year undergraduate study and provided details on the objectives, requirements and analysis of related work in the given document.

Uploaded by

Hitesh sumarwal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
149 views12 pages

SYNOPSIS

The project aims to develop a system to analyze websites and detect the prominence of certain keywords that could indicate websites inspiring terrorism. The system would analyze websites and check the frequency of keywords commonly used in terrorist propaganda to identify websites with high prominence of such words. A group of 5 students proposed the project as their final year undergraduate study and provided details on the objectives, requirements and analysis of related work in the given document.

Uploaded by

Hitesh sumarwal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

WEB MINING FOR SUSPICIOUS KEYWORD PROMINENCE

PROJECT SYNOPSIS
(JANURARY – APIRL 2023)

SUBMITTED IN PARTIAL FULFILLMENT OF THE

REQUIREMENT FOR OF THE DEGREE OF

BACHELOR OF TECHNOLOGY

( Computer Science and Engineering )

Submitted by :- Submitted to:- Mr. Manish Mukhija (HOD)

Names University Roll no


Gitesh Singh 19EAICS058
Hitesh Sumarwal 19EAICS069
Praveen 19EAICS128
Ujjal Kumar Sharma 19EAICS172
Vijay Singh 19EAICS177

Department of Computer Science and Engineering

Arya Institute of Engineering and Technology, Jaipur

1
TABLE OF CONTENT

1. ABSTRACT.

2. INTRODUCTION

3. HARDWARE & SOFTWARE REQUIREMENTS

4. PROBLEN ANALYSIS

5. BRIEF OF EACH PAPER STUDIED

6. ADVANTAGES & DISADVANTAGES

7. CONCLUSION

2
ABSTRACT
Social network analysis dates back to the early 20th century, with
initial studies focusing on small group behavior from a sociological
perspective. The emergence of the Internet and subsequent increase in
the use of online social networking applications has caused a shift in
the approach to this field.
Faced with complex, large datasets,
researchers need new methods and tools for collecting, processing,
and mining social network data. Social Network Mining, Analysis and
Research Trends: Techniques and Applications covers current
research trends in the area of social networks analysis and mining.
Containing research from experts in the social network analysis and
mining communities, as well as practitioners from social science,
business, and computer science

3
INTRODUCTION
Web mining can be termed as an information mining method to naturally
search, collect and organize data from indexed online records which might be
in various organized, unstructured or semi-organized structure. We usually use
web mining techniques in order to assess the viability of a specific web
page/entity in order to figure out various factors related to it. This project
consolidates the best researched mechanisms from the semantic web and
synaptic web at low entropy in order to build structural engineering of
Semantic-Synaptic web mining. Our proposed projects aims at web mining for
finding out density of selected keywords in order to check its keyword
prominence on those web pages. This is an important factor in various fields in
order to check the prominence of specific keywords and flag websites having
over prominence of those keywords. For example this can also be used to
detect websites inspiring terrorism. The system can be used to check
prominence of a particular keyword commonly used in terrorist convincing
strategies on various websites. So this system can be used to point out websites
having more prominence of such keywords. Thus this system can also be used
in several different domains for a variety of important purposes using smart
web mining approach.
In recent years the increasing tendency of people to use
Online Social Networks (OSNs) such as Facebook, Twitter, and LinkedIn,
have resulted in making different kinds of interactions and relationships
which, in turn, have lead to the generation and availability of a huge amount of
valuable data that has never been available before. Such huge valuable data can
be used in some new, varied, eye-catching, and useful research areas to
researchers. Although this research area has received a great deal of attention
in the last few years, yet many problems related to mining OSNs is still in its
infancy and needs more techniques to be developed in the future for further
improvement.

However, since data generated from OSN is vast, noisy, distributed and
dynamic, this requires appropriate data mining techniques to analyze such
large, complex, and frequently changing social media data. Research is
4
being carried out related to various issues in OSN mining such as,
influence propagation, expert finding, recommender systems, link
prediction, community detection, opinion mining, mood analysis, prediction
of trust and distrust among individuals, etc.

REQUIRMENTS
Software Requirements:
 Windows 7
 Sql 2008
 Visual studio 2010

Hardware Components:
 Processor – Dual Core
 Hard Disk – 50 GB
 Memory – 1GB RAM
 Internet COnnection

5
6
when the angle of the sprawl low while the velocity increases over
smooth surfaces The tasks of path planning for easy navigation for
mobile robot was also addressed in [10], in the study, a path planning
approach using genetic algorithm (GA) was presented. They employed
genetic algorithm (GA) to predict the optimized path in terms of length
and cost by reading the map of the environment and plans the optimized
path.

7
The robot hardware construction was built around an Arduino board,
which act as the heart of the robot to control all its activities. The
Arduino board is responsible for receiving commands via Bluetooth
communication protocol to put the robot in different modes. It is also
responsible for activating the ultrasonic sensors to measure how far or
close obstacles are to the robot, and then to control the servo motors in
the direction to move when it‟s closer to any obstacle.

The ultrasonic sensors were interfaced to the Arduino microcontroller


board whose primary purpose is to measure distance of any object
within its range. Although, the ultrasonic sensor is capable of measuring
object distance of 400cm, this study only applies it to detect any object
in a close range of 30cm to aid its sensitivity. The microcontroller is
triggered at all intervals by the Arduino and upon triggering, the
ultrasonic sensor sends a 40kHz pulse to hit any obstacle. When an
obstacle is reached, the pulse is reflected back and the time of travel is
read by the Arduino board to calculate how far the obstacle is to the
robot. The distance is given in equation (6) as:

Where „d‟ is the distance between the robot and the obstacle, „v‟ is the
velocity of sound in air whose value is 330m/s, and „t‟ is the time of
travel of the pulse to hit the obstacle and the time at which the reflected
wave gets back to the robot. A Bluetooth module is interfaced to the
Arduino board to receive command from the smartphone (transmitter)
and sent to the Arduino (receiver). The commands are stated below:

 Receives an „a‟ to put the robot in an autonomous (self-controlled) mode.


 Receives an „e‟ to activate the robot in user-controlled mode.
 Receives an „F‟ to move the robot forward in user-controlled mode.
 Receives a „B‟ to move the robot backwards in user-controlled mode.
 Receives an „R‟ to move the robot to the right in user-controlled mode
 Receives an „L‟ to move the robot to the left in user-controlled mode.

8
WORKING PRINCIPLE
The step-by-step working principle of the robot is describe as follow:

 Start the robot;


 Initialise the ultrasonic sensor ;
 Wait for command which sets the robot into a mode of operation
 Initialise the ultrasonic sensor ;

 If AUTONOMOUS (SELF CONTROLLED) Mode is enabled:


o Measure obstacle distance;
o If obstacle distance is greater than 30cm, ROBOT MOVES FORWARD;
o If obstacle distance is less than 30cm, ROBOT TURNS NECK
(Servo motor) TO THE RIGHT;
o If obstacle distance at the right is greater than 30cm, ROBOT MOVES TO
THE RIGHT AND THEN FORWARD;
NEED OF PROPOSED SYSTEM

 If USER CONTROLLED Mode enabled:


o Measure obstacle distance; o Wait to receive direction for motion
command from the control app;
o If FORWARD command, „U‟ is received;
o If obstacle distance is greater than 30cm, ROBOT MOVES FORWARD;
o If obstacle distance is less than 30cm, ROBOT STOPS, and gives
a feedback to on the status of the system.
o If LEFT command, „L‟ is received;
o Servo motor (ROBOT‟S NECK) turns to the left;
o Measure obstacle distance, then ROBOT MOVES LEFT if distance
is greater than 30cm;
o If obstacle distance is less that 30cm, ROBOT STOPS and gives
feedback to its status.
9
o If RIGHT command, „R‟ is received;
o Servo motor (ROBOT‟S NECK) turns to the right
o Measure obstacle distance, then ROBOT MOVES RIGHT if distance
is greater than 30cm.

Figure 4: Block Diagram showing various parts

Figure 5: Flow Chart showing the Robot working principle

1
RESULTS & DISCUSSIONS
During the development process, testing was done in stages. The first set of
testing was done during the components soldering, and another after the
complete coupling. The final testing was done after the whole prototype
fabricated. The stages of testing involved are:
 Pre-implementation testing
 Post-implementation testing.
The pre-implementation testing was carried out on the components before
they were soldered. This was done to ensure each component conform to the
expected results from the simulation.

Figure 6: The Hardware Component Circuit Diagram &


Simulation output

1
CONCLUSION
From this research, a working robot (a prototype) that achieved the stated
objectives had been designed and implemented. The robot was able to
produce the basic walking movements using DC motors with a very good
intelligence, capable of sensing obstacle, and perfectly avoid obstacles on its
path at a distance range of 30cm. The robot uses the left, right, forward and
backward movement to avoid the obstacle, either autonomously or using the
control application. The accuracy recorded from several testing trials, showed
that the robot performed excellently scoring 87.5%, considering the scope
under which it was examined. An area of note for further research is the used
of camera, GPS and path planning algorithm to effectively control the robot
movement.

REFRENCES:
[1] Shimura, K., Ando, Y., Yoshimi, T., & Mizukawa, M. (2014). Research
on person following system based on RGB-D features by autonomous robot
with multi-kinect sensor. In System Integration (SII), 2014 IEEE/SICE
International Symposium on. IEEE, pp. 304-309 .

[2] Hossain, M. A., & Ferdous, I. (2015). Autonomous robot path planning
in dynamic environment using a new optimization technique inspired by
bacterial foraging technique. Robotics and Autonomous Systems, 64, 137-
141.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy