Research Journal of Information Technology1815-74322151-7959Science International10.3923/rjit.2014.406.412GovindarajanPriya RavichandranK.S. 4201464As recent practice while accessing the popular Web sites indicates, the electronic
communication assisted by many malicious sites may provide direction to perceive
and thwart vicious intrigue. Posting content which are online and which assist
the act of terrorism, such as redeployment on how to formulate grenades etc.,
are considered as illicit and methods to sense those acts have been survived.
The words of similar frequencies are being replaced which is projected as the
outline of this study. The current working model doesnt
predict the original sentences where as it detects the sentences that differs
from the normal perspective. Using the left context of the word (current) and
by calculating its co-occurrence statistics the work of analyzing the original
sentence is being carried off. The word to be substituted based on the frequency
is detected using left-to-right processing technique.]]>Chen, H.,2014k frequent patterns over data streams sliding window.]]>42111131De Maio, C., G. Fenza, M. Gallo, V. Loia and S. Senatore,201440154177Deshmukh, S.N., R.R. Deshmukh and S.N. Deshmukh,20132013pp: 15551559Donnelly, N., K. Cornes and T. Menneer,20127414751487Liu, C.Y., W. Sun, W. Chao and W. Che,20132013pp: 231242Liu, V. and J.R. Curran,20062006pp: 233240Mehta, S., U. Eranna and K. Soundararajan,20102010pp: 480484Pickering, M.J. and R.P.G.V. van Gompel,20062006pp: 455-503pp: 455-503Fong, S.W., D. Roussinov and D.B. Skillicorn,20082010671076Traxler, M.J., D.P. Corina, J.P. Morford, S. Hafer and L.J. Hoversten,20144297111Wang, F., L. Huang, Z. Chen, W. Yang and H. Miao,20132013pp: 16Zhou, G.D. and Q.M. Zhu,2010264546