Submit Search
Upload
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT ON TWITTER
•
0 likes
•
2 views
IRJET Journal
Follow
https://www.irjet.net/archives/V9/i5/IRJET-V9I5157.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
IRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based Approach
IRJET Journal
IRJET - Social Network Message Credibility: An Agent-based Approach
IRJET - Social Network Message Credibility: An Agent-based Approach
IRJET Journal
AGGRESSION DETECTION USING MACHINE LEARNING MODEL
AGGRESSION DETECTION USING MACHINE LEARNING MODEL
IRJET Journal
A survey on Machine Learning and Artificial Neural Networks
A survey on Machine Learning and Artificial Neural Networks
IRJET Journal
Detecting Malicious Bots in Social Media Accounts Using Machine Learning Tech...
Detecting Malicious Bots in Social Media Accounts Using Machine Learning Tech...
IRJET Journal
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
IRJET Journal
IRJET- Sentimental Analysis from Tweets to Find Positive, Negative,Neutra...
IRJET- Sentimental Analysis from Tweets to Find Positive, Negative,Neutra...
IRJET Journal
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ijesajournal
Recommended
IRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based Approach
IRJET Journal
IRJET - Social Network Message Credibility: An Agent-based Approach
IRJET - Social Network Message Credibility: An Agent-based Approach
IRJET Journal
AGGRESSION DETECTION USING MACHINE LEARNING MODEL
AGGRESSION DETECTION USING MACHINE LEARNING MODEL
IRJET Journal
A survey on Machine Learning and Artificial Neural Networks
A survey on Machine Learning and Artificial Neural Networks
IRJET Journal
Detecting Malicious Bots in Social Media Accounts Using Machine Learning Tech...
Detecting Malicious Bots in Social Media Accounts Using Machine Learning Tech...
IRJET Journal
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
IRJET Journal
IRJET- Sentimental Analysis from Tweets to Find Positive, Negative,Neutra...
IRJET- Sentimental Analysis from Tweets to Find Positive, Negative,Neutra...
IRJET Journal
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ijesajournal
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ijesajournal
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ijesajournal
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET Journal
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET Journal
Handwritten Text Recognition Using Machine Learning
Handwritten Text Recognition Using Machine Learning
IRJET Journal
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET Journal
BITCOIN HEIST: RANSOMWARE ATTACKS PREDICTION USING DATA SCIENCE
BITCOIN HEIST: RANSOMWARE ATTACKS PREDICTION USING DATA SCIENCE
IRJET Journal
Cyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine Learning
IRJET Journal
Cyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine Learning
IRJET Journal
IRJET- Machine Learning Processing for Intrusion Detection
IRJET- Machine Learning Processing for Intrusion Detection
IRJET Journal
Automated Feature Selection and Churn Prediction using Deep Learning Models
Automated Feature Selection and Churn Prediction using Deep Learning Models
IRJET Journal
Fake News Detection using Deep Learning
Fake News Detection using Deep Learning
NIET Journal of Engineering & Technology (NIETJET)
SMART ATTENDANCE SYSTEM USING QR CODE WITH SMS.pptx
SMART ATTENDANCE SYSTEM USING QR CODE WITH SMS.pptx
DanielGuballo1
Estimating the Efficacy of Efficient Machine Learning Classifiers for Twitter...
Estimating the Efficacy of Efficient Machine Learning Classifiers for Twitter...
IRJET Journal
Combining Lexicon based and Machine Learning based Methods for Twitter Sentim...
Combining Lexicon based and Machine Learning based Methods for Twitter Sentim...
IRJET Journal
Person Acquisition and Identification Tool
Person Acquisition and Identification Tool
IRJET Journal
Emotion Recognition By Textual Tweets Using Machine Learning
Emotion Recognition By Textual Tweets Using Machine Learning
IRJET Journal
IRJET- Trend Analysis on Twitter
IRJET- Trend Analysis on Twitter
IRJET Journal
IRJET - Fake News Detection: A Survey
IRJET - Fake News Detection: A Survey
IRJET Journal
Machine learning
Machine learning
osman ansari
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT ON TWITTER
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ijesajournal
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ijesajournal
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET Journal
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET Journal
Handwritten Text Recognition Using Machine Learning
Handwritten Text Recognition Using Machine Learning
IRJET Journal
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET Journal
BITCOIN HEIST: RANSOMWARE ATTACKS PREDICTION USING DATA SCIENCE
BITCOIN HEIST: RANSOMWARE ATTACKS PREDICTION USING DATA SCIENCE
IRJET Journal
Cyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine Learning
IRJET Journal
Cyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine Learning
IRJET Journal
IRJET- Machine Learning Processing for Intrusion Detection
IRJET- Machine Learning Processing for Intrusion Detection
IRJET Journal
Automated Feature Selection and Churn Prediction using Deep Learning Models
Automated Feature Selection and Churn Prediction using Deep Learning Models
IRJET Journal
Fake News Detection using Deep Learning
Fake News Detection using Deep Learning
NIET Journal of Engineering & Technology (NIETJET)
SMART ATTENDANCE SYSTEM USING QR CODE WITH SMS.pptx
SMART ATTENDANCE SYSTEM USING QR CODE WITH SMS.pptx
DanielGuballo1
Estimating the Efficacy of Efficient Machine Learning Classifiers for Twitter...
Estimating the Efficacy of Efficient Machine Learning Classifiers for Twitter...
IRJET Journal
Combining Lexicon based and Machine Learning based Methods for Twitter Sentim...
Combining Lexicon based and Machine Learning based Methods for Twitter Sentim...
IRJET Journal
Person Acquisition and Identification Tool
Person Acquisition and Identification Tool
IRJET Journal
Emotion Recognition By Textual Tweets Using Machine Learning
Emotion Recognition By Textual Tweets Using Machine Learning
IRJET Journal
IRJET- Trend Analysis on Twitter
IRJET- Trend Analysis on Twitter
IRJET Journal
IRJET - Fake News Detection: A Survey
IRJET - Fake News Detection: A Survey
IRJET Journal
Machine learning
Machine learning
osman ansari
Similar to MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT ON TWITTER
(20)
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
Handwritten Text Recognition Using Machine Learning
Handwritten Text Recognition Using Machine Learning
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
BITCOIN HEIST: RANSOMWARE ATTACKS PREDICTION USING DATA SCIENCE
BITCOIN HEIST: RANSOMWARE ATTACKS PREDICTION USING DATA SCIENCE
Cyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine Learning
IRJET- Machine Learning Processing for Intrusion Detection
IRJET- Machine Learning Processing for Intrusion Detection
Automated Feature Selection and Churn Prediction using Deep Learning Models
Automated Feature Selection and Churn Prediction using Deep Learning Models
Fake News Detection using Deep Learning
Fake News Detection using Deep Learning
SMART ATTENDANCE SYSTEM USING QR CODE WITH SMS.pptx
SMART ATTENDANCE SYSTEM USING QR CODE WITH SMS.pptx
Estimating the Efficacy of Efficient Machine Learning Classifiers for Twitter...
Estimating the Efficacy of Efficient Machine Learning Classifiers for Twitter...
Combining Lexicon based and Machine Learning based Methods for Twitter Sentim...
Combining Lexicon based and Machine Learning based Methods for Twitter Sentim...
Person Acquisition and Identification Tool
Person Acquisition and Identification Tool
Emotion Recognition By Textual Tweets Using Machine Learning
Emotion Recognition By Textual Tweets Using Machine Learning
IRJET- Trend Analysis on Twitter
IRJET- Trend Analysis on Twitter
IRJET - Fake News Detection: A Survey
IRJET - Fake News Detection: A Survey
Machine learning
Machine learning
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Asutosh Ranjan
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
ssuser5c9d4b1
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
SIVASHANKAR N
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
upamatechverse
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZTE
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Suman Mia
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
RajkumarAkumalla
Recently uploaded
(20)
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT ON TWITTER
1.
© 2022, IRJET
| Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 430 MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT ON TWITTER Ajay Choudhari1, Freya Kotak2, Siddhant Zaveri3, Mrs. Jyoti Bansode4 1,2,3Shah and Anchor Kutchhi Engineering College Chembur, Mumbai. 4 Professor, Dept. Of Information Technology, Engineering, Shah and Anchor Kutchhi Engineering College, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cyber Abuse is the use of online systems and virtual devices to inflict harm of either psychological, emotional, sexual, racist, sexist or any negative adjective in nature. Sentiment Analysis is the interpretation and classification of text data by their polarity that is positive, negative, or neutral. This is done with the help of various analysis techniques and the usage of each technique differs from author to author. Sentiment Analysis is being used by major companies in the world so that they can identify what kind of emotions are being passed around the market by the people and thus, use these emotions and make changes to the company's systems in order to grow as a whole. Key Words: Twitter, Hate speech detection, BERT. 1. INTRODUCTION Internet being responsible for 80% communication in the world, it clearly has its own disadvantages. According to statistics presented by “Global social media statistics research summary 2022”, 58.4% of the world's population uses social media. The average daily usage is 2 hours and 27 minutes (January 2022). It has become a part of life which also has an impact on mental health. The harm inflicted maybe physiological or emotional. Efforts has been made by several organizations and government as well as by the companies owning the social media platforms to act upon its negative effects. Improvements are introduced but to recognize a person’s intention behind a certain comment and the way it portrays is an arduous job. Finding a way to stop these abusive attacks and making a person think about the reception of the comment before they post it is idea behind this research. 1.1 LITERATURE REVIEW The paper [6] by W. N. Hamiza Wan Ali, M. Mohd and F. Fauzi, basically provides an overview of the cyber bullying occuring in the social networks. It identifies the data source as text messages, instant messages, social media and online games. It compares the features used for detection such as bag-of-words and clears the latest and better version used. All the commonly used classification algorithms were summarized by considering individual social media platforms. It identifies the following challenges faced while Cyber Bullying detection: Language Challenge Dataset Challenge Data Representation Challenge Zinnar Ghasem1, Ingo Frommholz1 and Carsten Maple2 talk about the urge to prevent and take strict action against cyber-crimes as they have drastically increased with the development in technology. The proposed framework [8] here is referred to as ACTS that stands for Anti Cyberstalking Text- based System. It utilizes text mining, statistical analysis, text categorization, and the use of machine learning algorithms to combat cyber bullying. The use of an attacker identification module determines the status of the attacker and his/her comments containing foul language or bad words. [17] The paper proposed by B. Haidar, M. Chamoun, and A. Serhrouchni has provided a multilingual cyberbullying detection approach for detecting cyberbullying in messages, tweets and newspaper review for two Indian languages. Results of the experiments shows that Logistics Regression outperforms all other algorithms on these datasets. Also, generating synthesized data could help improve performance of the system. Results of our study show that our systems perform well across two languages and different domains and hence, it can be used to detect cyberbullying for other Indian languages as well. 2. METHODOLOGY The research started with a basic machine learning approach. Choosing data, exploration, cleaning/pre- processing, applying the known algorithms and comparing the results. Later it extended to exploring deep learning mode to improve the accuracy. We examined various techniques on our dataset and chose the one for basic implementation on web interface. 2.1 DATA DESCRIPTION AND PRE-PROCESSING The dataset contains over 32k tweets which is then split into train and test datasets. Twitter data is complicated to International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 431 work with as it contains various symbols like at the rates and hashtags along with emoticons, slangs and more. Pre- processing is an essential part of the process to clean the data before using it. The pre-processing methods used are stated as follows: • Html Parser • Remove pattern • Apostrophe removal • Short word removal • Emoticon Removal • Removing brackets, hashtags and at the rates • Tokenization • Stemming The image below clarifies the changes and improvements made by process of cleaning the data. Fig -1: Cleaned Tweets The train test split is standard 70-30. After cleaning the tweets, next we move on to some visualizations to analyse the data trends. 2.2. FEATURE EXTRACTION Vectorization of the tweets was carried out by count vectorizer followed by TF-IDF vectorizer. It recognizes the importance of the word in the document. Formula is given as TF_IDF = TF * IDF Where TF=Number of times word appeared in text/ number of words in text, and IDF=log (Number of documents/ Number of documents with word in it) 2.3. MACHINE LEARNING TECHNIQUE Machine learning is a technique to use computer algorithms which improve over a period of time using the data. There are various pre-defined algorithms developed using the required mathematical calculations. We have chosen 9 famous machine learning techniques to apply on our data. They are as follows: 1. Random Forest Classifier 2. Multinominal NB 3. Linear SVC 4. Logistic Regression 5. SGD Classifier 6. Bagging Classifier 7. Decision Tree Classifier 8. Ada Boost Classifier 9. KNN Code has a pipeline of all these algorithms. Data is passed through it and trained. 2.4. DEEP LEARNING TECHNIQUES Deep learning is a subset of machine learning which teaches the computer what comes to human naturally. Understanding instincts and major characteristics is a core part of deep learning. Long Short-Term Memory (LSTM) is an improvement over recurrent neural network used for sequence prediction. LSTMs make small modifications to the information by multiplications and additions. With LSTMs, the information flows through a mechanism known as cell states. This way, LSTMs can selectively remember or forget things. 3. RESULTS Fig - 2: Results Machine Learning and deep learning give very different results as deep learning works closely on data and uses complicated algorithms and trends. The results for ML algorithms are given as follows. Figure 2. ML Results As shown, our model works best with SGD classifier, that is, Stochastic Gradient Descent. is a simple yet very efficient approach to fitting linear classifiers and regressors under convex loss functions such as (linear) Support Vector Machines and Logistic Regression. Accuracy and F1 score is 94.6% and 72.9% respectively. LSTM gives accuracy of 99.5% and F1 score of 74.8%. 4. CONCLUSIONS Tackling the most important problem with today’s social media is unavoidable. Keep experimenting and applying the measures is the key part. This paper focuses on trying out methods and choosing the best. ML is effective but not enough to implement. False predictions are covered well with LSTM. The main motive of this research is to cut off the abuse at the start instead of removing it after. Making the user think before they post and not let miscommunication create chaos. Implementing a suitable model at user end to stop them form coming out offensive is the aim for future. The authors can acknowledge any person/authorities in this section. This is not mandatory.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 432 REFERENCES [1] International Conference on Advanced Computing Technologies and Applications (ICACTA- 2015). Online Social Network Bullying Detection Using Intelligence Techniques. By- B. Sri Nandhinia, J.I. Sheebab. [2] Optimized Twitter Cyberbullying Detection based on deep Learning. By - Monirah A. Al-Ajlan. Information Systems Department, CCIS, King Saud University, Riyadh, Saudi Arabia, maalajlan@ksu.edu.sa and Mourad Ykhlef, Information Systems Department, CCIS. [3] S. M. Kargutkar and V. Chitre, "A Study of Cyberbullying Detection Using Machine Learning Techniques," 2020 Fourth International Conference.K. Elissa, [4] A. Mody, S. Shah, R. Pimple and N. Shekokar, "Identification of Potential Cyber Bullying Tweets using Hybrid Approach in Sentiment Analysis," 2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT), 2018, pp. 878-881, doi: 10.1109/ICEECCOT43722.2018.9001476. [5] M. Di Capua, E. Di Nardo and A. Petrosino, "Unsupervised cyber bullying detection in social networks," 2016 23rd International Conference on Pattern Recognition (ICPR), 2016, pp. 432- 437, doi: 10.1109/ICPR.2016.7899672. [6] W. N. Hamiza Wan Ali, M. Mohd and F. Fauzi, "Cyberbullying Detection: An Overview," 2018 Cyber Resilience Conference (CRC), 2018, pp. 1-3, doi: 10.1109/CR.2018.8626869 [7] Jezabel Molina-Gil, José A. Concepción-Sánchez and Pino Caballero-Gil, “Harassment Detection Using Machine Learning and Fuzzy Logic Techniques”, Presented at the 13th International Conference on Ubiquitous Computing and Ambient Intelligence UCAmI. Published: 20 November 2019. [8] Zinnar Ghasem1, Ingo Frommholz1 and Carsten Maple2, “A Machine Learning Framework to Detect and Document Text-based Cyberstalking”, 1 University of Bedfordshire, UK, 2 University of Warwick, UK. [9] A. Chaudhari, A. Parseja, and A. Patyal, “CNN based Hate-o-Meter: A Hate Speech Detecting Tool,” 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT), 2020. [10] N. Rai, P. Meena, and C. Agrawal, “Improving the hate speech analysis through dimensionality reduction approach,” 2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS), 2020. [11] D. Kumar, N. Kumar, and S. Mishra, “QUARC: Quaternion Multi-Modal Fusion Architecture for Hate Speech Classification,” 2021 IEEE International Conference on Big Data and Smart Computing (BigComp), 2021 [12] A. Schmidt and M. Wiegand, “A Survey on Hate Speech Detection using Natural Language Processing,” Proceedings of the Fifth International Workshop on Natural Language Processing for Social Media, 2017. [13] S. A. E. Rahman, F. A. Alotaibi, and W. A. Alshehri, “Sentiment Analysis of Twitter Data,” 2019 International Conference on Computer and Information Sciences (ICCIS), 2019. [14] S. Zahoor and R. Rohilla, “Twitter Sentiment Analysis Using Lexical or Rule Based Approach: A Case Study,” 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), 2020. [15] J. Yadav, D. Kumar, and D. Chauhan, “Cyberbullying Detection using Pre-Trained BERT Model,” 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), 2020. [16] O. C. Hang and H. M. Dahlan, “Cyberbullying Lexicon for Social Media,” 2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS), 2019. [17] B. Haidar, M. Chamoun, and A. Serhrouchni, “Multilingual cyberbullying detection system: Detecting cyberbullying in Arabic content,” 2017 1st Cyber Security in Networking Conference (CSNet), 2017. [18] Prabhu, Trisha N. Method to Stop Cyberbullying before It Occurs. [19] Li, Bohan, et al. CYBERBULLYING DETECTION METHOD AND SYSTEM. 22 Apr. 2021.
Download now