SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2115
Fake news Detection using Machine Learning
1Akash Dixit, 2Ishaan Kalbhor
1,2Student, Department of Computer Science, MIT-ADT University, Pune, India
------------------------------------------------------------------------***-------------------------------------------------------------------------
ABSTRACT –
We are in the period of data, each time we read a snippet
of data or watch the news on TV, we search for a solid
source. There is so much phony news spread all over the
web and web-based entertainment. Counterfeit News is
deception or controlled word that is gotten out across
social media to harm an individual, office, or association.
The spread of deception in basic circumstances can cause
catastrophes. Because of the spread of phony news, there
is a need for computational strategies to identify them.
Thus, to forestall the mischief that should possibly use
innovation, we have executed Machine Learning
calculations and strategies like NLTK, and LSTM. Our
commitment is bifold. In the first place, we should present
the datasets which contain both phony and genuine news
and direct different analyses to coordinate phony news
finder. We came by improved results contrasted with the
existing frameworks.
Keywords: Embedding, LSTM, NLTK.
1. INTRODUCTION
Counterfeit News will be news, stories, or lies made to
purposely mislead or bamboozle perusers. Typically, these
accounts are made to impact individuals s sees, push a
political plan or create turmoil, what's more, can
frequently be a productive business for the web
distributers. The motivation behind picking this subject is
that it is turning into a serious social test. It is prompting a
toxic air on the web also, causing mobs and lynchings out
and about. Models: political phony news, news concerning
touchy themes like religion, Coronavirus news like salt
Furthermore, garlic can fix crown and all such messages
we overcome virtual entertainment. We as a whole can see
the harm that can be caused on account of phony news
which is why there is a critical requirement for an
instrument that can approve specific news whether it is
phony or genuine and give individuals a feeling of
validness given that they can choose whether or not to
make a move, among so much commotion of phony news
and phony information if individuals lose confidence in
data, they will presently not be capable to get to even the
most essential data that can indeed, even once in a while
be groundbreaking or lifesaving. Our the methodology is to
foster a model wherein it will recognize whether the given
news is bogus or genuine by utilizing
LSTM (long transient memory) and another machine
learning ideas, for example, NLP, word implanting one-hot
portrayal, and so on. The model will give us the results for
the dataset given. It surrenders precision to 99.4%
2 RELATED ACTIVITIES
All top goliaths are endeavoring to cover their selves from
the pieces of tattle, and the spotlight should be on
apparent data and approved articles. Essentially, the
procedure that goes on in the extraction relies upon AI and
Natural language taking care of. The classifiers, models,
and clever estimations are expected to turn out indivisibly
for the approval of the information
Facebook in an article referred to they are endeavoring to
fight the spread of false news in two key locales. First is
upsetting financial inspiration because most counterfeit
news is fiscally awakened. The subsequent one is, Building
new things to take a look at the spread of false news
To stop the spread of deception, WhatsApp has executed
some safety efforts and further felt news acknowledgment,
in any case, these are under the alpha stage and are yet to
be done to the beta clients. WhatsApp testing, Dubious
Link Detection‟ feature: This part will alert users by
putting a red name on joins that it knows to provoke a fake
or elective site/news. Besides, accepting that a message
has been sent from a device past what on numerous
occasions, the message could be hindered.
A couple of philosophies have been taken to recognize the
fake news after tremendous extensive fake news of late.
There are three kinds of fake news providers: social bots,
savages, and cyborg clients. According to social Bots, in
case an online media account is being obliged by a PC
computation, then, it is suggested as a social bot. The social
bot can subsequently make content. Besides, the savages
are authentic individuals who "hope to upset web-based
networks" to actuate online media clients into an excited
response. Another is, Cyborg. Cyborg clients are a blend of
"robotized practices with human info. People create
records and use tasks to perform practices in web-based
media. For the false information area, there are two
arrangements: Linguistic Cue and Network Analysis moves
close. The strategies, overall, used to do such sorts of
works
Term Frequency (TF):
Term Frequency is the inclusion of words present in the
dreport or a figure out the disparity between the
document[5][13]. Each record is portrayed in a the vector
that contains the word count. This term is determined by
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2116
the times the term shows up in a the archive is separated
by the absolute number of terms in the Document[3].
Inverse Document Frequency (IDF):
Backward Document Frequency is the number of normal
or uncommon words that are in the entire report or
dataset. This term is determined by an all-out number of
records, partitioning it by the number of reports that
contain a word[5][3]. Assuming the word is extremely
normal and shows up in countless reports, then this will
result as
0. Otherwise1.
Gullible Bayes:
Gullible Bayes utilizes probabilistic methodologies and
depends on the Bayes theorem[8]. They manage the
likelihood conveyance of factors in the dataset and
anticipate the reaction variable of significant worth. They
have generally been utilized for text characterization.
Bayes hypothesis is
P(a|b) =p(b|a)p(b)/p(a)
There are primarily 3 kinds of gullible base models -
Gaussian Naïve Bayes, Multinomial innocent Bayes and
Bernoulli Naïve Bayes. We have utilized Multinomial Naïve
Bayes model for our venture to distinguish counterfeit
news[5][13].
A benefit of guileless Bayes classifiers is just as they
required less preparation information for the order.
LSTM:
Long Short Term Memory is a sort of repetitive brain
network. In RNN yield from the last advance is taken care
of as a contribution to the ongoing advance. It handled the
issue of long haul conditions of iron in which the RNN can
not anticipate the word put away in the drawn-out
memory however can give additional exact forecasts from
the new information[5]. LSTM can naturally hold the data
for an extensive period. It is utilized for processing,
anticipating, and ordering based on time-series
information.
Word Embedding:
Word implanting is a bunch of languages demonstrating
and highlighting extraction strategies in Natural Language
Processing (NLP). In word implanting, words from vocab
early are changed over into vectors of genuine numbers.
Word inserting is a kind of word portrayal that permits
words with comparable implications to have a
comparative portrayal.
3. EXISTING SYSTEM
Distinguishing counterfeit news is accepted to be a mind-
boggling task what's more, a lot harder than identifying
counterfeit item surveys. With the open idea of the web
and virtual entertainment, not with standing the new high-
level pay advancements improve on the method involved
with making and getting out the counterfeit words. While
it's more obvious also, follow the aim and the effect of
phony surveys, the goal and the effect of making
promulgation by getting out counterfeit words can not be
estimated or seen without any problem.
For example, counterfeit survey influences the item
proprietor, clients, and online stores; on the another hand,
it isn't difficult to recognize the elements that impacted by
the phony news.
This is because recognizing these substances requires
estimating the news spread, which has demonstrated to be
complex and asset escalated.
Working of existing System:
Each is a portrayal of off-base or misleading
announcements. Besides, the creators gauge the unique
sorts of phony news and the advantages and disadvantages
of utilizing different text investigation and prescient mod‐
el ling strategies in identifying them. In their paper, the y
isolated the phony news types into 3 gatherings:-
1. Serious creations are news not distributed in m
standard or member media, yellow press, or ta blood,
which, thusly, will be more earnestly to gather [3].
2. Large‐Scale scams are imaginative and remarkable and
frequently show up at various stages. The creators
contended that it may require strategies past text
investigation to identify this sort of phony news.
3. Hilarious phony news is expected by their essayists to
be engaging, deriding, and, surprisingly, ludicrous. As per
the creators, the idea of the style of this sort of phony the
news could antagonistically affect the adequacy of text
characterization procedures.
It begins with preprocessing the dataset by eliminating
pointless characters and words from the information. The
n‐ gram highlights are separated, and a framework of
elements is shaped to address the records in question. The
last step in the characterization cycle is to prepare the
classifier.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2117
We examined various classifiers to foresee the class of the
reports. We explicitly researched 6 unique AI calculations,
in particular, stochastic angle descent(SGD), SVM, straight
help vector machines (LS
VM), K‐nearest neighbor (KNN), LR, and choice trees (DT).
Term Frequency is a strategy that utilizations word count
from texts to track down likenesses between texts[5]. Each
record is addressed by a vector of equivalent le the length
that contains word counts. Then, every vector made so that
the amount of its component s will be added to the next.
Each number of words changed over into open doors for
such a word that is present in the archives. For instance, if
the word is something report, will be addressed as 1,
furthermore, if any are not in the archive, it will be set to 0.
Thus, each the archive is addressed by bunch s of names.
The average TF of the word w in wording record d is
characterized as follows: Standard Time = An incentive for
Documentary/Total Number record narrative Opposition
(IDF) term w about record corpus D, characterized as
IDF(w) D[5], by the the the the logarithm of the complete
number of archives in the corpus isolated by the number of
letters in which t
His specific name shows up and is determined as follows:
Altered archive TF = 1+log (absolute reports
/no of archives with the specific thing)
TF‐IDF is a weighting metric frequently utilized to
illuminate activity recovery and NLP[3]. It is a measurable
measurement used to quantify how significant a term is to
a record in a dataset. Around 80% of the dataset is used for
preparing and 20% for testing. After extractiong the
elements utilizing either TF or IDF, we train a AI classifier
to conclude whether the example's substance is honest or
counterfeit.
Guileless Bayes Model:
Among the fields, that are available in the dataset, a couple
of them were utilized. They are connected to the Facebook
posts with the message of the news story and the mark of
the message.
The message of the news stories was recovered utilizing
Facebook API [8]. News stories with the names
"combination of valid and bogus" and "no verifiable
substance" were not considered. Several of the articles in
the dataset are broken they contain no text by any stretch
of the imagination (or on the other hand contain "invalid"
as a text). These articles were overlooked also. After such
sifting informational index with 1771 news stories were
gotten.
The dataset was arbitrarily rearranged, and after that
partitioned into three subsets: preparing dataset, approval
dataset, and test information The preparation of nine
datasets was utilized for preparing the gullible Bayes
classifier[8]. An approval dataset was utilized for tuning
some worldwide parameters of the classifier. Test dataset
was utilized to get a fair assessment of how well the
classifier performs on new information.
If all of the words in the news story are obscure to the
classifier (never happened in the preparation dataset), the
classifier reports, that it cannot order the given news
article.
On the off chance that a word happened in the news story
a few times, it added to the complete likelihood of the
reality, that a the news story is a phony a similar number
of times.
Condition (4) is computationally unsteady if ascertained
straightforwardly. This is brought about by the reality, that
loads of probabilities get increased, and the aftereffect of
such augmentation turns out to be near zero quick. Most
programming dialects don't give the required level of
accuracy, and that is the reason they decipher the after
effect of augmentation as precisely zero [8]. Allow p to be
the likelihood of the reality, that a given news story is
phony.
One can ascertain the worth 1/p‐1 all things considered,
and after that get the worth without any problem. The
accompanying condition holds
4. PROPOSED SYSTEM
LSTM Model:
Long short-term memory (LSTM) units are building blocks
for the layers of a recurrent neural network (RNN). A
LSTM unit is made out of a cell, an information door a
result entryway, and a neglected door [12]. The phone is
liable for" recollecting" values throughout a huge time
span so the connection of the word at the beginning of the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2118
message can impact the result of the word later in the
sentence. Conventional brain networks can't recollect or
keep the record of what all is passed before they are
executed this stops the ideal impact of words that come in
the sentence prior to having any effect on the closure
words, and it appears to be a significant weakness.
Overview of dataset:
Dataset is taken from the Kaggle stage. It has the
accompanying credits: id: extraordinary id for a news
story, title: the title of a news story, writer: writer of the
news story, text: the data of the news story. The dataset
comprises of a sum of 18285 news stories for preparing
and testing the model. Dataset has framed with c blend of
genuine and counterfeit news. Execution subtleties:
PREPROCESSING: To change information into the
applicable arrangement the informational collection needs
preprocess. Right off the bat, we eliminated all the NAN
values from the dataset. Jargon sizes of 5000 words are
chosen. Then NLTK (Natural Language Processing) Tool
Kit is utilized to eliminate all the prevent words from the
dataset. Stop words is a rundown of accentuations +
prevent words from nltk toolbox for example Words, for
example, 'and' ' the' and 'I' that doesn't pass a lot of data
changing over them on to lowercase and eliminating
accentuation. For each word in records, it's anything but a
stop word then that word tag is taken from postage. Then,
at that point, this assortment of words is annexed to the
report. WORD INDEX OF TOKENIZE DATASET: Word
tokenizing, adds text to a rundown and the rundown is
named as records. The result for this stage is the rundown
of the relative multitude of words in the portrayal.
WORD EMBEDDING: We can't give input in that frame of
mind of message configuration to the calculation so we
need to change over them into the numeric structure, for
which we are utilizing one-hot portrayal. In one hot
portrayal, each word in the dataset will be given its record
from the characterized jargon size, and these lists are
supplanted in sentences. While giving contribution to the
word implanting, we need to furnish it with a decent
length. To change over each sentence into a proper length
cushioning groupings are utilized. We have thought about
the maximum length of 20 words while cushioning the
title. Possibly we can give cushioning before the sentence
(pre) or after the sentence (post), and afterward these
sentences pass as contribution to the word installing.
Word installing applies include extraction on the gave
input vector. In absolute 40 vector highlights are thought
of.
MODEL:
Output from the word installing is given to the model. The
AI model executed here is a successive model comprising
implanting as the principal layer which comprises values
jargon size, number of elements, and length of sentence.
The following is LSTM with 128 neurons for each layer,
trailed by the Dense layer with sigmoid enactment work as
we treat one last result. We have utilized parallel cross-
entropy to work out misfortune, Adam enhancer for
versatile assessment, and lastly added a drop-out in the
middle between so that over fitting is kept away. Then
preparation and testing of the model are done.
CLASSIFICATION:
For both preprocessed testing information the outcome is
anticipated. In the event that the anticipated value>0.5
Classified as 1 is genuine and 0 is phony. Precision = (TP +
TN)/Total. The accompanying terms were utilized: True
Negative (TN), I. e., the forecast was negative and
experiments, as well, were really regrettable; True Positive
(TP) i.e., the expectation was positive and experiments, as
well, were truly sure; False Negative (FN) i.e., the
expectation was negative, yet the experiments were truly
certain; False Positive (FP), i.e., the forecast was positive,
yet the experiments were truly negat
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2119
5. RESULTS
Get more data and use it for preparation. In AI issues it is
many times the situation when getting more information
essentially works on the execution of a learning
calculation. The information set, that was portrayed in this
article contains something like 18285 all-out news. From
which 80% is taken for preparing for example 14628 and
20% is taken for testing for example 3657. Precision can
be expanded by preparing the model with additional
information.
Utilize the dataset with a lot more prominent length of the
news stories. The news stories, that were introduced in
the current dataset, generally were not so lengthy.
Preparing a classifier in a dataset with bigger news stories
ought to further develop its exhibition essentially.
Eliminate prevent words from the news stories. Stop
words are the words, that are normal to all kinds of texts
(like articles in English).
These words are normal to such an extent that they don't
influence the accuracy of the data in the news story, so it's
a good idea to get freed of them [14].
Use stemming. In semantic morphology and data recovery,
stemming is the cycle of lessening arched (or at times
determined) words to their promise stem, base, or root
structure - by and large a composed word form[15]. Such
procedure assists with treating comparable words (like
"state" furthermore "composing") as similar words and
may I improve the classifier's presentation too.
6. EXISTING SYSTEM VS PROPOSED SYSTEM
7. LIMITATIONS
While the outcomes examined thus propose for the model
a few outside highlights like a wellspring of the news,
creator of the news, spot of beginning of the news, time
stamp of information were not viewed as in our model
which can impact the result of the model. Accessibility of
datasets and writing papers are restricted to counterfeit
news discovery. The length of the news that is heading or
entire news is less which influences the outcome as far as
precision In Fake News with expanding in a layer of
module preparing time increments.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2120
8. APPLICATION
The main application of fake news predictions is to
identify the correctness of facts and to provide trust in the
news they are reading and considering.
Much fake news is intentionally spread to create the
instability in certain groups or worldwide for their self
benefits which somehow leads to major destruction in
society and increases crime We aims to control the crimes
and riots caused due to the false information and to
provide the result whether the news is correct or
manipulated
9. CONCLUSION
In this advanced age, where scam news is available
wherever on computerized stages, there is an extreme
requirement for counterfeit news identification and this
model fills its need by being the need of their device.
Counterfeit News concerning delicate points prompts a
harmful climate on the web. Counterfeit News Detection is
the examination of socially applicable information to
recognize whether it is genuine or counterfeit. Here in this
paper, we looked at different techniques like Bag Of
Words(BoW), N-grams, TF‐IDF, Naïve Bayes, and so on.
LSTM to be best of all we utilized different methods like
stop word expulsion, one hot r portrayal, word inserting,
and how STMM can be utilized to obtain improved results.
The model referenced in this paper is extremely
successful, Also consents to the current thing framework
the model proposed here gives improved results with a
precision ofi91.05% which is extremely encouraging, we
can additionally increment results by expanding preparing
information.
10. REFERENCES
[1.][IEEE 2018 15th IEEE International Conference on
Advanced Video and Signal Based Surveillance (A VSS) -
Auckland, New Zealand (2018.11.27- 2018.11.30)]2018
15th IEEE International Conference on Advanced Video
and Signal Based Surveillance (AVSS) Fake Information
and News Detection using Deep Learning.
[2.]International Institute of Information TecInternational
Institute information Technology [2018], Bangalore, India.
3HAN A Deep Neural Network foriFake News
Detectionhnology [2018], Bangalore, India. 3HAN -A Deep
Neural Network for Fake News Detection.
[3.]ECE-Department University of victoria, CanadaSchool
of computer science, University of Windsor r, Canada -
Detecting Opinion spams and Fake News using Text
Classification.
[4.]Fabula AI(UK), USI Lugano (Switzerland), Imperial
college of London-Fake News Detection on Social Media
using Geometric deep learning.
[5.][IEEE 2018 4th International Conference on
Computing Communication and Automation(ICCCA) -
GreateriNoida, India (2018.12.14-2018.12.15)] 2018
4thInternational Conference on Computing
Communication and Automation (ICCCA) Fake News
Detection Using A Deep Neural Network.
[6.]Conroy, N. J., Rubin, V. L., & Chen, Y. (2015). Au
automatic deception detection: Methods for finding fake
news. Proceedings of the Association for Information
Science and Technology.
[7.]Wu, Liang, and Huan Liu. "Tracing Fake- News
Footprints: Characterizing Social MediaMessages by How
They Propagate."
[8.]Granik, Mykhailo, andVolodymyr Mesyura. "Fake news
detection using naive Bayes classifier." Electrical and
Computer Engineering (UKRCON), 2017 IEEE First Ukraine
Conference on. IEEE, 2017.
[9.]Buntain, Cody, and Jennifer Golbeck. "Automatically
Identifying Fake News in Popular Twitter Threads." Smart
Cloud 2017 IEEE International Conference on. IEEE, 2017
[10.]Shu, Kai,"Fake news detection on social media: A data
mining perspective." ACM SIGKDD Ex plorations
Newsletter 19.1 (2017).
[11.]Bhatt, Gaurav "Combining Neural, Statistical an nd
External Features for Fake News Stance Identification."
Companion of the Web Conference 2018 on the Web
Conference 2018. International World Wide Web
Conferences Steering Committee, 2018.
[12.] S.Ananth, Dr.K.Radha, Dr.S.Prema, K.Nirajan
International Journal of Innovative Research in Computer
and Communication Engineering “Fake News Detection
using Convolution Neural Network in Deep Learning”.
[13.]Supervised Learning for Fake News Detection.
[14.] Stop words. (n.d.) Wikipedia. [Online]. Available:
https://en.wikipedia.org/wiki/S top_words. Accessed Feb.
6, 2017. Available: https://en.wikipedia.org/wiki/
Stemming. Accessed Feb. 6, 2017 ifier” [14.] Stemming.
(n.d.) Wikipedia. [Online].
[15.] Mykhailo Granik, Volodymyr Mesyura-2017 IEEE
First Ukraine Conference on Electrical and Computer
Engineering (UKRCON) – “Fake News Detection”2017

More Related Content

Similar to Fake news Detection using Machine Learning

IRJET- Fake News Detection
IRJET- Fake News DetectionIRJET- Fake News Detection
IRJET- Fake News DetectionIRJET Journal
 
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET Journal
 
IRJET- Fake News Detection and Rumour Source Identification
IRJET- Fake News Detection and Rumour Source IdentificationIRJET- Fake News Detection and Rumour Source Identification
IRJET- Fake News Detection and Rumour Source IdentificationIRJET Journal
 
IRJET- Honeywords: A New Approach for Enhancing Security
IRJET- Honeywords: A New Approach for Enhancing SecurityIRJET- Honeywords: A New Approach for Enhancing Security
IRJET- Honeywords: A New Approach for Enhancing SecurityIRJET Journal
 
IRJET- Fake News Detection using Logistic Regression
IRJET- Fake News Detection using Logistic RegressionIRJET- Fake News Detection using Logistic Regression
IRJET- Fake News Detection using Logistic RegressionIRJET Journal
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...ijtsrd
 
ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCE
ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCEANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCE
ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCEIAEME Publication
 
Knime social media_white_paper
Knime social media_white_paperKnime social media_white_paper
Knime social media_white_paperFiras Husseini
 
Development of a Web Application for Fake News Classification using Machine l...
Development of a Web Application for Fake News Classification using Machine l...Development of a Web Application for Fake News Classification using Machine l...
Development of a Web Application for Fake News Classification using Machine l...IRJET Journal
 
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNING
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNINGSENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNING
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNINGIRJET Journal
 
Fakebuster fake news detection system using logistic regression technique i...
Fakebuster   fake news detection system using logistic regression technique i...Fakebuster   fake news detection system using logistic regression technique i...
Fakebuster fake news detection system using logistic regression technique i...Conference Papers
 
Detection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social NetworkDetection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social NetworkIRJET Journal
 
IRJET - YouTube Spam Comments Detection
IRJET - YouTube Spam Comments DetectionIRJET - YouTube Spam Comments Detection
IRJET - YouTube Spam Comments DetectionIRJET Journal
 
IRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based ApproachIRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based ApproachIRJET Journal
 
IRJET - Social Network Message Credibility: An Agent-based Approach
IRJET -  	  Social Network Message Credibility: An Agent-based ApproachIRJET -  	  Social Network Message Credibility: An Agent-based Approach
IRJET - Social Network Message Credibility: An Agent-based ApproachIRJET Journal
 
Secure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and SharingSecure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and SharingIRJET Journal
 
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’S
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’SDiscovering Influential User by Coupling Multiplex Heterogeneous OSN’S
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’SIRJET Journal
 
Fake News Detection on Social Media using Machine Learning
Fake News Detection on Social Media using Machine LearningFake News Detection on Social Media using Machine Learning
Fake News Detection on Social Media using Machine Learningclassic tpr
 

Similar to Fake news Detection using Machine Learning (20)

IRJET- Fake News Detection
IRJET- Fake News DetectionIRJET- Fake News Detection
IRJET- Fake News Detection
 
Irjet v7 i4693
Irjet v7 i4693Irjet v7 i4693
Irjet v7 i4693
 
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
 
IRJET- Fake News Detection and Rumour Source Identification
IRJET- Fake News Detection and Rumour Source IdentificationIRJET- Fake News Detection and Rumour Source Identification
IRJET- Fake News Detection and Rumour Source Identification
 
FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT
 
IRJET- Honeywords: A New Approach for Enhancing Security
IRJET- Honeywords: A New Approach for Enhancing SecurityIRJET- Honeywords: A New Approach for Enhancing Security
IRJET- Honeywords: A New Approach for Enhancing Security
 
IRJET- Fake News Detection using Logistic Regression
IRJET- Fake News Detection using Logistic RegressionIRJET- Fake News Detection using Logistic Regression
IRJET- Fake News Detection using Logistic Regression
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
 
ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCE
ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCEANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCE
ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCE
 
Knime social media_white_paper
Knime social media_white_paperKnime social media_white_paper
Knime social media_white_paper
 
Development of a Web Application for Fake News Classification using Machine l...
Development of a Web Application for Fake News Classification using Machine l...Development of a Web Application for Fake News Classification using Machine l...
Development of a Web Application for Fake News Classification using Machine l...
 
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNING
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNINGSENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNING
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNING
 
Fakebuster fake news detection system using logistic regression technique i...
Fakebuster   fake news detection system using logistic regression technique i...Fakebuster   fake news detection system using logistic regression technique i...
Fakebuster fake news detection system using logistic regression technique i...
 
Detection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social NetworkDetection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social Network
 
IRJET - YouTube Spam Comments Detection
IRJET - YouTube Spam Comments DetectionIRJET - YouTube Spam Comments Detection
IRJET - YouTube Spam Comments Detection
 
IRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based ApproachIRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based Approach
 
IRJET - Social Network Message Credibility: An Agent-based Approach
IRJET -  	  Social Network Message Credibility: An Agent-based ApproachIRJET -  	  Social Network Message Credibility: An Agent-based Approach
IRJET - Social Network Message Credibility: An Agent-based Approach
 
Secure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and SharingSecure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and Sharing
 
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’S
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’SDiscovering Influential User by Coupling Multiplex Heterogeneous OSN’S
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’S
 
Fake News Detection on Social Media using Machine Learning
Fake News Detection on Social Media using Machine LearningFake News Detection on Social Media using Machine Learning
Fake News Detection on Social Media using Machine Learning
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 

Fake news Detection using Machine Learning

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2115 Fake news Detection using Machine Learning 1Akash Dixit, 2Ishaan Kalbhor 1,2Student, Department of Computer Science, MIT-ADT University, Pune, India ------------------------------------------------------------------------***------------------------------------------------------------------------- ABSTRACT – We are in the period of data, each time we read a snippet of data or watch the news on TV, we search for a solid source. There is so much phony news spread all over the web and web-based entertainment. Counterfeit News is deception or controlled word that is gotten out across social media to harm an individual, office, or association. The spread of deception in basic circumstances can cause catastrophes. Because of the spread of phony news, there is a need for computational strategies to identify them. Thus, to forestall the mischief that should possibly use innovation, we have executed Machine Learning calculations and strategies like NLTK, and LSTM. Our commitment is bifold. In the first place, we should present the datasets which contain both phony and genuine news and direct different analyses to coordinate phony news finder. We came by improved results contrasted with the existing frameworks. Keywords: Embedding, LSTM, NLTK. 1. INTRODUCTION Counterfeit News will be news, stories, or lies made to purposely mislead or bamboozle perusers. Typically, these accounts are made to impact individuals s sees, push a political plan or create turmoil, what's more, can frequently be a productive business for the web distributers. The motivation behind picking this subject is that it is turning into a serious social test. It is prompting a toxic air on the web also, causing mobs and lynchings out and about. Models: political phony news, news concerning touchy themes like religion, Coronavirus news like salt Furthermore, garlic can fix crown and all such messages we overcome virtual entertainment. We as a whole can see the harm that can be caused on account of phony news which is why there is a critical requirement for an instrument that can approve specific news whether it is phony or genuine and give individuals a feeling of validness given that they can choose whether or not to make a move, among so much commotion of phony news and phony information if individuals lose confidence in data, they will presently not be capable to get to even the most essential data that can indeed, even once in a while be groundbreaking or lifesaving. Our the methodology is to foster a model wherein it will recognize whether the given news is bogus or genuine by utilizing LSTM (long transient memory) and another machine learning ideas, for example, NLP, word implanting one-hot portrayal, and so on. The model will give us the results for the dataset given. It surrenders precision to 99.4% 2 RELATED ACTIVITIES All top goliaths are endeavoring to cover their selves from the pieces of tattle, and the spotlight should be on apparent data and approved articles. Essentially, the procedure that goes on in the extraction relies upon AI and Natural language taking care of. The classifiers, models, and clever estimations are expected to turn out indivisibly for the approval of the information Facebook in an article referred to they are endeavoring to fight the spread of false news in two key locales. First is upsetting financial inspiration because most counterfeit news is fiscally awakened. The subsequent one is, Building new things to take a look at the spread of false news To stop the spread of deception, WhatsApp has executed some safety efforts and further felt news acknowledgment, in any case, these are under the alpha stage and are yet to be done to the beta clients. WhatsApp testing, Dubious Link Detection‟ feature: This part will alert users by putting a red name on joins that it knows to provoke a fake or elective site/news. Besides, accepting that a message has been sent from a device past what on numerous occasions, the message could be hindered. A couple of philosophies have been taken to recognize the fake news after tremendous extensive fake news of late. There are three kinds of fake news providers: social bots, savages, and cyborg clients. According to social Bots, in case an online media account is being obliged by a PC computation, then, it is suggested as a social bot. The social bot can subsequently make content. Besides, the savages are authentic individuals who "hope to upset web-based networks" to actuate online media clients into an excited response. Another is, Cyborg. Cyborg clients are a blend of "robotized practices with human info. People create records and use tasks to perform practices in web-based media. For the false information area, there are two arrangements: Linguistic Cue and Network Analysis moves close. The strategies, overall, used to do such sorts of works Term Frequency (TF): Term Frequency is the inclusion of words present in the dreport or a figure out the disparity between the document[5][13]. Each record is portrayed in a the vector that contains the word count. This term is determined by
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2116 the times the term shows up in a the archive is separated by the absolute number of terms in the Document[3]. Inverse Document Frequency (IDF): Backward Document Frequency is the number of normal or uncommon words that are in the entire report or dataset. This term is determined by an all-out number of records, partitioning it by the number of reports that contain a word[5][3]. Assuming the word is extremely normal and shows up in countless reports, then this will result as 0. Otherwise1. Gullible Bayes: Gullible Bayes utilizes probabilistic methodologies and depends on the Bayes theorem[8]. They manage the likelihood conveyance of factors in the dataset and anticipate the reaction variable of significant worth. They have generally been utilized for text characterization. Bayes hypothesis is P(a|b) =p(b|a)p(b)/p(a) There are primarily 3 kinds of gullible base models - Gaussian Naïve Bayes, Multinomial innocent Bayes and Bernoulli Naïve Bayes. We have utilized Multinomial Naïve Bayes model for our venture to distinguish counterfeit news[5][13]. A benefit of guileless Bayes classifiers is just as they required less preparation information for the order. LSTM: Long Short Term Memory is a sort of repetitive brain network. In RNN yield from the last advance is taken care of as a contribution to the ongoing advance. It handled the issue of long haul conditions of iron in which the RNN can not anticipate the word put away in the drawn-out memory however can give additional exact forecasts from the new information[5]. LSTM can naturally hold the data for an extensive period. It is utilized for processing, anticipating, and ordering based on time-series information. Word Embedding: Word implanting is a bunch of languages demonstrating and highlighting extraction strategies in Natural Language Processing (NLP). In word implanting, words from vocab early are changed over into vectors of genuine numbers. Word inserting is a kind of word portrayal that permits words with comparable implications to have a comparative portrayal. 3. EXISTING SYSTEM Distinguishing counterfeit news is accepted to be a mind- boggling task what's more, a lot harder than identifying counterfeit item surveys. With the open idea of the web and virtual entertainment, not with standing the new high- level pay advancements improve on the method involved with making and getting out the counterfeit words. While it's more obvious also, follow the aim and the effect of phony surveys, the goal and the effect of making promulgation by getting out counterfeit words can not be estimated or seen without any problem. For example, counterfeit survey influences the item proprietor, clients, and online stores; on the another hand, it isn't difficult to recognize the elements that impacted by the phony news. This is because recognizing these substances requires estimating the news spread, which has demonstrated to be complex and asset escalated. Working of existing System: Each is a portrayal of off-base or misleading announcements. Besides, the creators gauge the unique sorts of phony news and the advantages and disadvantages of utilizing different text investigation and prescient mod‐ el ling strategies in identifying them. In their paper, the y isolated the phony news types into 3 gatherings:- 1. Serious creations are news not distributed in m standard or member media, yellow press, or ta blood, which, thusly, will be more earnestly to gather [3]. 2. Large‐Scale scams are imaginative and remarkable and frequently show up at various stages. The creators contended that it may require strategies past text investigation to identify this sort of phony news. 3. Hilarious phony news is expected by their essayists to be engaging, deriding, and, surprisingly, ludicrous. As per the creators, the idea of the style of this sort of phony the news could antagonistically affect the adequacy of text characterization procedures. It begins with preprocessing the dataset by eliminating pointless characters and words from the information. The n‐ gram highlights are separated, and a framework of elements is shaped to address the records in question. The last step in the characterization cycle is to prepare the classifier.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2117 We examined various classifiers to foresee the class of the reports. We explicitly researched 6 unique AI calculations, in particular, stochastic angle descent(SGD), SVM, straight help vector machines (LS VM), K‐nearest neighbor (KNN), LR, and choice trees (DT). Term Frequency is a strategy that utilizations word count from texts to track down likenesses between texts[5]. Each record is addressed by a vector of equivalent le the length that contains word counts. Then, every vector made so that the amount of its component s will be added to the next. Each number of words changed over into open doors for such a word that is present in the archives. For instance, if the word is something report, will be addressed as 1, furthermore, if any are not in the archive, it will be set to 0. Thus, each the archive is addressed by bunch s of names. The average TF of the word w in wording record d is characterized as follows: Standard Time = An incentive for Documentary/Total Number record narrative Opposition (IDF) term w about record corpus D, characterized as IDF(w) D[5], by the the the the logarithm of the complete number of archives in the corpus isolated by the number of letters in which t His specific name shows up and is determined as follows: Altered archive TF = 1+log (absolute reports /no of archives with the specific thing) TF‐IDF is a weighting metric frequently utilized to illuminate activity recovery and NLP[3]. It is a measurable measurement used to quantify how significant a term is to a record in a dataset. Around 80% of the dataset is used for preparing and 20% for testing. After extractiong the elements utilizing either TF or IDF, we train a AI classifier to conclude whether the example's substance is honest or counterfeit. Guileless Bayes Model: Among the fields, that are available in the dataset, a couple of them were utilized. They are connected to the Facebook posts with the message of the news story and the mark of the message. The message of the news stories was recovered utilizing Facebook API [8]. News stories with the names "combination of valid and bogus" and "no verifiable substance" were not considered. Several of the articles in the dataset are broken they contain no text by any stretch of the imagination (or on the other hand contain "invalid" as a text). These articles were overlooked also. After such sifting informational index with 1771 news stories were gotten. The dataset was arbitrarily rearranged, and after that partitioned into three subsets: preparing dataset, approval dataset, and test information The preparation of nine datasets was utilized for preparing the gullible Bayes classifier[8]. An approval dataset was utilized for tuning some worldwide parameters of the classifier. Test dataset was utilized to get a fair assessment of how well the classifier performs on new information. If all of the words in the news story are obscure to the classifier (never happened in the preparation dataset), the classifier reports, that it cannot order the given news article. On the off chance that a word happened in the news story a few times, it added to the complete likelihood of the reality, that a the news story is a phony a similar number of times. Condition (4) is computationally unsteady if ascertained straightforwardly. This is brought about by the reality, that loads of probabilities get increased, and the aftereffect of such augmentation turns out to be near zero quick. Most programming dialects don't give the required level of accuracy, and that is the reason they decipher the after effect of augmentation as precisely zero [8]. Allow p to be the likelihood of the reality, that a given news story is phony. One can ascertain the worth 1/p‐1 all things considered, and after that get the worth without any problem. The accompanying condition holds 4. PROPOSED SYSTEM LSTM Model: Long short-term memory (LSTM) units are building blocks for the layers of a recurrent neural network (RNN). A LSTM unit is made out of a cell, an information door a result entryway, and a neglected door [12]. The phone is liable for" recollecting" values throughout a huge time span so the connection of the word at the beginning of the
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2118 message can impact the result of the word later in the sentence. Conventional brain networks can't recollect or keep the record of what all is passed before they are executed this stops the ideal impact of words that come in the sentence prior to having any effect on the closure words, and it appears to be a significant weakness. Overview of dataset: Dataset is taken from the Kaggle stage. It has the accompanying credits: id: extraordinary id for a news story, title: the title of a news story, writer: writer of the news story, text: the data of the news story. The dataset comprises of a sum of 18285 news stories for preparing and testing the model. Dataset has framed with c blend of genuine and counterfeit news. Execution subtleties: PREPROCESSING: To change information into the applicable arrangement the informational collection needs preprocess. Right off the bat, we eliminated all the NAN values from the dataset. Jargon sizes of 5000 words are chosen. Then NLTK (Natural Language Processing) Tool Kit is utilized to eliminate all the prevent words from the dataset. Stop words is a rundown of accentuations + prevent words from nltk toolbox for example Words, for example, 'and' ' the' and 'I' that doesn't pass a lot of data changing over them on to lowercase and eliminating accentuation. For each word in records, it's anything but a stop word then that word tag is taken from postage. Then, at that point, this assortment of words is annexed to the report. WORD INDEX OF TOKENIZE DATASET: Word tokenizing, adds text to a rundown and the rundown is named as records. The result for this stage is the rundown of the relative multitude of words in the portrayal. WORD EMBEDDING: We can't give input in that frame of mind of message configuration to the calculation so we need to change over them into the numeric structure, for which we are utilizing one-hot portrayal. In one hot portrayal, each word in the dataset will be given its record from the characterized jargon size, and these lists are supplanted in sentences. While giving contribution to the word implanting, we need to furnish it with a decent length. To change over each sentence into a proper length cushioning groupings are utilized. We have thought about the maximum length of 20 words while cushioning the title. Possibly we can give cushioning before the sentence (pre) or after the sentence (post), and afterward these sentences pass as contribution to the word installing. Word installing applies include extraction on the gave input vector. In absolute 40 vector highlights are thought of. MODEL: Output from the word installing is given to the model. The AI model executed here is a successive model comprising implanting as the principal layer which comprises values jargon size, number of elements, and length of sentence. The following is LSTM with 128 neurons for each layer, trailed by the Dense layer with sigmoid enactment work as we treat one last result. We have utilized parallel cross- entropy to work out misfortune, Adam enhancer for versatile assessment, and lastly added a drop-out in the middle between so that over fitting is kept away. Then preparation and testing of the model are done. CLASSIFICATION: For both preprocessed testing information the outcome is anticipated. In the event that the anticipated value>0.5 Classified as 1 is genuine and 0 is phony. Precision = (TP + TN)/Total. The accompanying terms were utilized: True Negative (TN), I. e., the forecast was negative and experiments, as well, were really regrettable; True Positive (TP) i.e., the expectation was positive and experiments, as well, were truly sure; False Negative (FN) i.e., the expectation was negative, yet the experiments were truly certain; False Positive (FP), i.e., the forecast was positive, yet the experiments were truly negat
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2119 5. RESULTS Get more data and use it for preparation. In AI issues it is many times the situation when getting more information essentially works on the execution of a learning calculation. The information set, that was portrayed in this article contains something like 18285 all-out news. From which 80% is taken for preparing for example 14628 and 20% is taken for testing for example 3657. Precision can be expanded by preparing the model with additional information. Utilize the dataset with a lot more prominent length of the news stories. The news stories, that were introduced in the current dataset, generally were not so lengthy. Preparing a classifier in a dataset with bigger news stories ought to further develop its exhibition essentially. Eliminate prevent words from the news stories. Stop words are the words, that are normal to all kinds of texts (like articles in English). These words are normal to such an extent that they don't influence the accuracy of the data in the news story, so it's a good idea to get freed of them [14]. Use stemming. In semantic morphology and data recovery, stemming is the cycle of lessening arched (or at times determined) words to their promise stem, base, or root structure - by and large a composed word form[15]. Such procedure assists with treating comparable words (like "state" furthermore "composing") as similar words and may I improve the classifier's presentation too. 6. EXISTING SYSTEM VS PROPOSED SYSTEM 7. LIMITATIONS While the outcomes examined thus propose for the model a few outside highlights like a wellspring of the news, creator of the news, spot of beginning of the news, time stamp of information were not viewed as in our model which can impact the result of the model. Accessibility of datasets and writing papers are restricted to counterfeit news discovery. The length of the news that is heading or entire news is less which influences the outcome as far as precision In Fake News with expanding in a layer of module preparing time increments.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2120 8. APPLICATION The main application of fake news predictions is to identify the correctness of facts and to provide trust in the news they are reading and considering. Much fake news is intentionally spread to create the instability in certain groups or worldwide for their self benefits which somehow leads to major destruction in society and increases crime We aims to control the crimes and riots caused due to the false information and to provide the result whether the news is correct or manipulated 9. CONCLUSION In this advanced age, where scam news is available wherever on computerized stages, there is an extreme requirement for counterfeit news identification and this model fills its need by being the need of their device. Counterfeit News concerning delicate points prompts a harmful climate on the web. Counterfeit News Detection is the examination of socially applicable information to recognize whether it is genuine or counterfeit. Here in this paper, we looked at different techniques like Bag Of Words(BoW), N-grams, TF‐IDF, Naïve Bayes, and so on. LSTM to be best of all we utilized different methods like stop word expulsion, one hot r portrayal, word inserting, and how STMM can be utilized to obtain improved results. The model referenced in this paper is extremely successful, Also consents to the current thing framework the model proposed here gives improved results with a precision ofi91.05% which is extremely encouraging, we can additionally increment results by expanding preparing information. 10. REFERENCES [1.][IEEE 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (A VSS) - Auckland, New Zealand (2018.11.27- 2018.11.30)]2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS) Fake Information and News Detection using Deep Learning. [2.]International Institute of Information TecInternational Institute information Technology [2018], Bangalore, India. 3HAN A Deep Neural Network foriFake News Detectionhnology [2018], Bangalore, India. 3HAN -A Deep Neural Network for Fake News Detection. [3.]ECE-Department University of victoria, CanadaSchool of computer science, University of Windsor r, Canada - Detecting Opinion spams and Fake News using Text Classification. [4.]Fabula AI(UK), USI Lugano (Switzerland), Imperial college of London-Fake News Detection on Social Media using Geometric deep learning. [5.][IEEE 2018 4th International Conference on Computing Communication and Automation(ICCCA) - GreateriNoida, India (2018.12.14-2018.12.15)] 2018 4thInternational Conference on Computing Communication and Automation (ICCCA) Fake News Detection Using A Deep Neural Network. [6.]Conroy, N. J., Rubin, V. L., & Chen, Y. (2015). Au automatic deception detection: Methods for finding fake news. Proceedings of the Association for Information Science and Technology. [7.]Wu, Liang, and Huan Liu. "Tracing Fake- News Footprints: Characterizing Social MediaMessages by How They Propagate." [8.]Granik, Mykhailo, andVolodymyr Mesyura. "Fake news detection using naive Bayes classifier." Electrical and Computer Engineering (UKRCON), 2017 IEEE First Ukraine Conference on. IEEE, 2017. [9.]Buntain, Cody, and Jennifer Golbeck. "Automatically Identifying Fake News in Popular Twitter Threads." Smart Cloud 2017 IEEE International Conference on. IEEE, 2017 [10.]Shu, Kai,"Fake news detection on social media: A data mining perspective." ACM SIGKDD Ex plorations Newsletter 19.1 (2017). [11.]Bhatt, Gaurav "Combining Neural, Statistical an nd External Features for Fake News Stance Identification." Companion of the Web Conference 2018 on the Web Conference 2018. International World Wide Web Conferences Steering Committee, 2018. [12.] S.Ananth, Dr.K.Radha, Dr.S.Prema, K.Nirajan International Journal of Innovative Research in Computer and Communication Engineering “Fake News Detection using Convolution Neural Network in Deep Learning”. [13.]Supervised Learning for Fake News Detection. [14.] Stop words. (n.d.) Wikipedia. [Online]. Available: https://en.wikipedia.org/wiki/S top_words. Accessed Feb. 6, 2017. Available: https://en.wikipedia.org/wiki/ Stemming. Accessed Feb. 6, 2017 ifier” [14.] Stemming. (n.d.) Wikipedia. [Online]. [15.] Mykhailo Granik, Volodymyr Mesyura-2017 IEEE First Ukraine Conference on Electrical and Computer Engineering (UKRCON) – “Fake News Detection”2017