SlideShare a Scribd company logo
CYBERBULLIYING
DETECTION
Presented by
ADARSH.N.SURESH
INTRODUCTION
Cyberbullying is the use of electronic communication to
bully a person, typically by sending messages of an
intimidating or threatening nature.
Cyberbullying Detection implements our coded, machine
learning algorithms, in finding a negative comment from
the messages it receives by a user. The algorithm first
gives the message a value and then based on our pre
trained data, it decides if the comment is harsh enough to
WHAT IS CYBERBULLIYING ?
The use of electronic media or communication channel
to bully a person, typically by sending messages
intimidating or threatening is known as cyberbullying.
The technology is used to intentionally hurt or
embarrass another person.
Cyberbullying includes sending, posting, or sharing
negative, false, harmful or mean content about someone
else.
ISSUE RELATED TO CYBERBULLYING
Classifying the conversation into normal chat/text or
under bullying attributes.
Cyberbullying is the one of the most mentally damaging
problems on internet.
The data needs to be categorized properly before using
any approach to stop the cyberbullying activity.
It result in catastrophic impact on self and personal lives
especially of students.
COMMENTS INVOLVING PROFANITY
AND NEGETIVITY
Profanity Negativity
Cyberbullying
Sexuality Race/Culture Intelligence Physical
attributes
SUITABLE SOLUTION
1. MACHINE LEARNING ONLINE PATROL CRAWLER
2. SENTIMENT ANALYSIS
3. SOFTWARE TO DETECT CYBERBULLYING
CONTENT
MACHINE LEARNING METHOD
 This method uses a machine learning method known as
Support Vector Method(SVM) to detect any inappropriate
entry.
 This method is designed to find the issue of online
malicious entries especially on informal school websites.
 The software is designed for automatically detecting the
cyberbullying cases.
 This informal school websites contains information
about teachers and students.
MACHINE LEARNING APPROACH
Machine
Learning Module
Training Phase Test Phase
TRAINING PHASE
Checking school website.
Manually detecting cyberbullying entries.
Extraction of negative words and adding them to
lexicon.
Estimating word similarity with Levenshtein distance.
(It is a string metric for measuring the difference between two sequences.)
Training with training Vector Machine Algorithm.
TEST PHASE
Checking school websites.
Detecting cyberbullying entries by SVM model.
(SVM is a method of supervised machine learning which is used for classify data.)
Part of speech analysis detect the harmful entry.
Estimating similarity with Levenshtein distance.
Marking and visualizing harmful entries.
SENTIMENT ANALYSIS
 Sentiment classifier is used to classify negative and
positive categories by using Machine Learning
Algorithm.
 The aims is to determine the bullying instances in social
media networks.
 Twitter is used as the source of data.
TECHNOLOGY USED
 Ling Pipe : A toolkit for processing text using
computational linguistics.
 Tweet Extractor : To extract tweets from twitter
continuously.
 Gephi : Open source Graph Visualization and
manipulation software.
 Amazon’s Mechanical Turk Service : It is a crowdsourcing
marketplace that makes it easier for individuals and
DATA COLLECTION AND PRE-
PROCESSING
 Tweets where collected from different
sources, around 5000 tweets.
 Use of Bag-of-Words model. It takes
every word in a sentence as features ,
the whole sentence is represented by an
unordered collection of words.
RESULT
Amazon’s Mechanical Turk classified unlabelled data
which was used to verify and validate newly labelled data
provided by Machine learning algorithm.
Training 500 Tweets
Positive Negative Accuracy
Amazon’s Mturk 65.2% 74.0% 67.1%
SENTIMENT ANALYSIS CONCLUSION
This approach leverages the power of Sentiment
analysis.
The classifier is close to 70% accurate.
It is not the best result as expected due to restrictions
from accessing unlimited content from twitter.
SOFTWARE TO DETECT
CYBERBULLYING CONTENT
 New types of devices connected to internet such as
smartphones and tablets further exacerbated the
problem of cyberbullying.
 Android application which automatically detects a
possible harmful content in a text.
 This application use machine learning method to spot
any undesirable content.
APPLICATION
 Application is built for devices supporting Android OS.
 Java8 and Android studio is used.
 Gives users interface for detection of harmful contents.
HARMFUL CONTENT DETECTION
PROCESS
 The application contains one activity responsible for
interacting with user.
 For the process of checking harmful content the
application starts a background thread.
 The user can still use the device even if checking process
takes a while.
METHOD
 The method classifies messages as harmful or not by
using a classifier trained with language modelling
method based on Brute Force algorithm.
 Brute Force : Algorithm using combinatorial approach
usually generate a massive number of combinations-
potential answers to a given problem.
 Algorithm applied for automatic extraction of sentence
patterns.
 All patterns used in classification was stored on mobile
device.
METHOD CONTINUES
RESULT
Precision = 79%
Recall = 79%
 PRECISION is the ratio of the number of relevant records
retrieved to the total number of irrelevant and relevant
records retrieved.
 RECALL is the ratio of the number of relevant records
retrieved to the total number of relevant records in the
database.
 Requires minimal human effort.
OTHER SOFTWARES FOR DETECTING
CYBERBULLYING
1. FearNot!
2. Smartians Radar
3. ReThink
4. PocketGuardian
5. Cyber Buddy
CHALLENGES FACED
 Preventing the removal of valuable messages when
attempting to filter data.
 Privacy concerns.
 Incidents should be reported as earlier as possible.
 False reporting.
CONCLUSION
• The use of internet and social media has clear
advantages for societies, but their frequent use may also
have significant adverse consequences.
• This involves unwanted sexual exposure, cybercrime
and cyberbullying.
• We developed a model for detecting cyberbullying
behavior and its severity in Twitter.
THANK YOU
QUESTIONS ?

More Related Content

What's hot

Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their preventionTejasvi Bhatia
 
Cybercrime online presentation
Cybercrime online presentationCybercrime online presentation
Cybercrime online presentationsarahj6
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security introAbhilash Ak
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virussumitra22
 
Cyberstalking
CyberstalkingCyberstalking
CyberstalkingTrevschic
 
Automated attendance system using Face recognition
Automated attendance system using Face recognitionAutomated attendance system using Face recognition
Automated attendance system using Face recognitionIRJET Journal
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.Hussain777
 
CyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityCyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityHome
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpointgalaxy201
 

What's hot (20)

Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Cybercrime online presentation
Cybercrime online presentationCybercrime online presentation
Cybercrime online presentation
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security intro
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Automated attendance system using Face recognition
Automated attendance system using Face recognitionAutomated attendance system using Face recognition
Automated attendance system using Face recognition
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
CyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityCyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurity
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 

Similar to CYBERBULLIYING DETECTION

Categorize balanced dataset for troll detection
Categorize balanced dataset for troll detectionCategorize balanced dataset for troll detection
Categorize balanced dataset for troll detectionvivatechijri
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...IRJET Journal
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...IRJET Journal
 
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYINGA MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYINGijaia
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullyinggerogepatton
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullyinggerogepatton
 
machine learning.pptx
machine learning.pptxmachine learning.pptx
machine learning.pptxSowjanya49
 
Detecting cyberbullying text using the approaches with machine learning model...
Detecting cyberbullying text using the approaches with machine learning model...Detecting cyberbullying text using the approaches with machine learning model...
Detecting cyberbullying text using the approaches with machine learning model...IAESIJAI
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detectionMohamed Elfadly
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detectionMohamed Elfadly
 
Cyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine LearningCyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine LearningIRJET Journal
 
Cyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine LearningCyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine LearningIRJET Journal
 
NEW EMERGING TECHNOLOGIES_AARUSHIJATIAN.pptx
NEW EMERGING TECHNOLOGIES_AARUSHIJATIAN.pptxNEW EMERGING TECHNOLOGIES_AARUSHIJATIAN.pptx
NEW EMERGING TECHNOLOGIES_AARUSHIJATIAN.pptxAarushiJatian
 
A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.vivatechijri
 
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...IJCI JOURNAL
 
DETECTING SPAM BY USING NAÏVE BAYES IN MACHINE LEARNING
DETECTING SPAM BY USING NAÏVE BAYES IN MACHINE LEARNINGDETECTING SPAM BY USING NAÏVE BAYES IN MACHINE LEARNING
DETECTING SPAM BY USING NAÏVE BAYES IN MACHINE LEARNINGazziefaazahar
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET-  	  An Effective Analysis of Anti Troll System using Artificial Intell...IRJET-  	  An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...IRJET Journal
 

Similar to CYBERBULLIYING DETECTION (20)

Categorize balanced dataset for troll detection
Categorize balanced dataset for troll detectionCategorize balanced dataset for troll detection
Categorize balanced dataset for troll detection
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
 
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYINGA MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
 
machine learning.pptx
machine learning.pptxmachine learning.pptx
machine learning.pptx
 
Detecting cyberbullying text using the approaches with machine learning model...
Detecting cyberbullying text using the approaches with machine learning model...Detecting cyberbullying text using the approaches with machine learning model...
Detecting cyberbullying text using the approaches with machine learning model...
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detection
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detection
 
Cyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine LearningCyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine Learning
 
Cyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine LearningCyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine Learning
 
NEW EMERGING TECHNOLOGIES_AARUSHIJATIAN.pptx
NEW EMERGING TECHNOLOGIES_AARUSHIJATIAN.pptxNEW EMERGING TECHNOLOGIES_AARUSHIJATIAN.pptx
NEW EMERGING TECHNOLOGIES_AARUSHIJATIAN.pptx
 
A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.
 
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
 
Eckovation Machine Learning
Eckovation Machine LearningEckovation Machine Learning
Eckovation Machine Learning
 
DETECTING SPAM BY USING NAÏVE BAYES IN MACHINE LEARNING
DETECTING SPAM BY USING NAÏVE BAYES IN MACHINE LEARNINGDETECTING SPAM BY USING NAÏVE BAYES IN MACHINE LEARNING
DETECTING SPAM BY USING NAÏVE BAYES IN MACHINE LEARNING
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET-  	  An Effective Analysis of Anti Troll System using Artificial Intell...IRJET-  	  An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
 

Recently uploaded

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Alison B. Lowndes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»QADay
 
UiPath New York Community Day in-person event
UiPath New York Community Day in-person eventUiPath New York Community Day in-person event
UiPath New York Community Day in-person eventDianaGray10
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
 
КАТЕРИНА АБЗЯТОВА «Ефективне планування тестування ключові аспекти та практ...
КАТЕРИНА АБЗЯТОВА  «Ефективне планування тестування  ключові аспекти та практ...КАТЕРИНА АБЗЯТОВА  «Ефективне планування тестування  ключові аспекти та практ...
КАТЕРИНА АБЗЯТОВА «Ефективне планування тестування ключові аспекти та практ...QADay
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
 

Recently uploaded (20)

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
 
UiPath New York Community Day in-person event
UiPath New York Community Day in-person eventUiPath New York Community Day in-person event
UiPath New York Community Day in-person event
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
КАТЕРИНА АБЗЯТОВА «Ефективне планування тестування ключові аспекти та практ...
КАТЕРИНА АБЗЯТОВА  «Ефективне планування тестування  ключові аспекти та практ...КАТЕРИНА АБЗЯТОВА  «Ефективне планування тестування  ключові аспекти та практ...
КАТЕРИНА АБЗЯТОВА «Ефективне планування тестування ключові аспекти та практ...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 

CYBERBULLIYING DETECTION

  • 2. INTRODUCTION Cyberbullying is the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature. Cyberbullying Detection implements our coded, machine learning algorithms, in finding a negative comment from the messages it receives by a user. The algorithm first gives the message a value and then based on our pre trained data, it decides if the comment is harsh enough to
  • 3. WHAT IS CYBERBULLIYING ? The use of electronic media or communication channel to bully a person, typically by sending messages intimidating or threatening is known as cyberbullying. The technology is used to intentionally hurt or embarrass another person. Cyberbullying includes sending, posting, or sharing negative, false, harmful or mean content about someone else.
  • 4. ISSUE RELATED TO CYBERBULLYING Classifying the conversation into normal chat/text or under bullying attributes. Cyberbullying is the one of the most mentally damaging problems on internet. The data needs to be categorized properly before using any approach to stop the cyberbullying activity. It result in catastrophic impact on self and personal lives especially of students.
  • 5. COMMENTS INVOLVING PROFANITY AND NEGETIVITY Profanity Negativity Cyberbullying Sexuality Race/Culture Intelligence Physical attributes
  • 6. SUITABLE SOLUTION 1. MACHINE LEARNING ONLINE PATROL CRAWLER 2. SENTIMENT ANALYSIS 3. SOFTWARE TO DETECT CYBERBULLYING CONTENT
  • 7. MACHINE LEARNING METHOD  This method uses a machine learning method known as Support Vector Method(SVM) to detect any inappropriate entry.  This method is designed to find the issue of online malicious entries especially on informal school websites.  The software is designed for automatically detecting the cyberbullying cases.  This informal school websites contains information about teachers and students.
  • 8. MACHINE LEARNING APPROACH Machine Learning Module Training Phase Test Phase
  • 9. TRAINING PHASE Checking school website. Manually detecting cyberbullying entries. Extraction of negative words and adding them to lexicon. Estimating word similarity with Levenshtein distance. (It is a string metric for measuring the difference between two sequences.) Training with training Vector Machine Algorithm.
  • 10. TEST PHASE Checking school websites. Detecting cyberbullying entries by SVM model. (SVM is a method of supervised machine learning which is used for classify data.) Part of speech analysis detect the harmful entry. Estimating similarity with Levenshtein distance. Marking and visualizing harmful entries.
  • 11. SENTIMENT ANALYSIS  Sentiment classifier is used to classify negative and positive categories by using Machine Learning Algorithm.  The aims is to determine the bullying instances in social media networks.  Twitter is used as the source of data.
  • 12. TECHNOLOGY USED  Ling Pipe : A toolkit for processing text using computational linguistics.  Tweet Extractor : To extract tweets from twitter continuously.  Gephi : Open source Graph Visualization and manipulation software.  Amazon’s Mechanical Turk Service : It is a crowdsourcing marketplace that makes it easier for individuals and
  • 13. DATA COLLECTION AND PRE- PROCESSING  Tweets where collected from different sources, around 5000 tweets.  Use of Bag-of-Words model. It takes every word in a sentence as features , the whole sentence is represented by an unordered collection of words.
  • 14. RESULT Amazon’s Mechanical Turk classified unlabelled data which was used to verify and validate newly labelled data provided by Machine learning algorithm. Training 500 Tweets Positive Negative Accuracy Amazon’s Mturk 65.2% 74.0% 67.1%
  • 15. SENTIMENT ANALYSIS CONCLUSION This approach leverages the power of Sentiment analysis. The classifier is close to 70% accurate. It is not the best result as expected due to restrictions from accessing unlimited content from twitter.
  • 16. SOFTWARE TO DETECT CYBERBULLYING CONTENT  New types of devices connected to internet such as smartphones and tablets further exacerbated the problem of cyberbullying.  Android application which automatically detects a possible harmful content in a text.  This application use machine learning method to spot any undesirable content.
  • 17. APPLICATION  Application is built for devices supporting Android OS.  Java8 and Android studio is used.  Gives users interface for detection of harmful contents.
  • 18. HARMFUL CONTENT DETECTION PROCESS  The application contains one activity responsible for interacting with user.  For the process of checking harmful content the application starts a background thread.  The user can still use the device even if checking process takes a while.
  • 19. METHOD  The method classifies messages as harmful or not by using a classifier trained with language modelling method based on Brute Force algorithm.  Brute Force : Algorithm using combinatorial approach usually generate a massive number of combinations- potential answers to a given problem.  Algorithm applied for automatic extraction of sentence patterns.  All patterns used in classification was stored on mobile device.
  • 21. RESULT Precision = 79% Recall = 79%  PRECISION is the ratio of the number of relevant records retrieved to the total number of irrelevant and relevant records retrieved.  RECALL is the ratio of the number of relevant records retrieved to the total number of relevant records in the database.  Requires minimal human effort.
  • 22. OTHER SOFTWARES FOR DETECTING CYBERBULLYING 1. FearNot! 2. Smartians Radar 3. ReThink 4. PocketGuardian 5. Cyber Buddy
  • 23. CHALLENGES FACED  Preventing the removal of valuable messages when attempting to filter data.  Privacy concerns.  Incidents should be reported as earlier as possible.  False reporting.
  • 24. CONCLUSION • The use of internet and social media has clear advantages for societies, but their frequent use may also have significant adverse consequences. • This involves unwanted sexual exposure, cybercrime and cyberbullying. • We developed a model for detecting cyberbullying behavior and its severity in Twitter.