SlideShare a Scribd company logo
1 of 3
Download to read offline
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 430
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR
DETECTING ABUSIVE CONTENT ON TWITTER
Ajay Choudhari1, Freya Kotak2, Siddhant Zaveri3, Mrs. Jyoti Bansode4
1,2,3Shah and Anchor Kutchhi Engineering College Chembur, Mumbai.
4 Professor, Dept. Of Information Technology, Engineering, Shah and Anchor Kutchhi Engineering College,
Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Cyber Abuse is the use of online systems and
virtual devices to inflict harm of either psychological,
emotional, sexual, racist, sexist or any negative adjective in
nature. Sentiment Analysis is the interpretation and
classification of text data by their polarity that is positive,
negative, or neutral. This is done with the help of various
analysis techniques and the usage of each technique differs
from author to author. Sentiment Analysis is being used by
major companies in the world so that they can identify what
kind of emotions are being passed around the market by the
people and thus, use these emotions and make changes to
the company's systems in order to grow as a whole.
Key Words: Twitter, Hate speech detection, BERT.
1. INTRODUCTION
Internet being responsible for 80% communication in the
world, it clearly has its own disadvantages. According to
statistics presented by “Global social media statistics
research summary 2022”, 58.4% of the world's
population uses social media. The average daily usage is 2
hours and 27 minutes (January 2022). It has become a
part of life which also has an impact on mental health. The
harm inflicted maybe physiological or emotional.
Efforts has been made by several organizations and
government as well as by the companies owning the social
media platforms to act upon its negative effects.
Improvements are introduced but to recognize a person’s
intention behind a certain comment and the way it
portrays is an arduous job. Finding a way to stop these
abusive attacks and making a person think about the
reception of the comment before they post it is idea
behind this research.
1.1 LITERATURE REVIEW
The paper [6] by W. N. Hamiza Wan Ali, M. Mohd and F.
Fauzi, basically provides an overview of the cyber bullying
occuring in the social networks. It identifies the data
source as text messages, instant messages, social media
and online games. It compares the features used for
detection such as bag-of-words and clears the latest and
better version used. All the commonly used classification
algorithms were summarized by considering individual
social media platforms. It identifies the following
challenges faced while Cyber Bullying detection: Language
Challenge
Dataset Challenge
Data Representation Challenge
Zinnar Ghasem1, Ingo Frommholz1 and Carsten Maple2 talk
about the urge to prevent and take strict action against
cyber-crimes as they have drastically increased with the
development in technology. The proposed framework [8]
here is referred to as ACTS that stands for Anti
Cyberstalking Text- based System. It utilizes text mining,
statistical analysis, text categorization, and the use of
machine learning algorithms to combat cyber bullying.
The use of an attacker identification module determines
the status of the attacker and his/her comments
containing foul language or bad words.
[17] The paper proposed by B. Haidar, M. Chamoun, and A.
Serhrouchni has provided a multilingual cyberbullying
detection approach for detecting cyberbullying in
messages, tweets and newspaper review for two Indian
languages. Results of the experiments shows that Logistics
Regression outperforms all other algorithms on these
datasets. Also, generating synthesized data could help
improve performance of the system. Results of our study
show that our systems perform well across two languages
and different domains and hence, it can be used to detect
cyberbullying for other Indian languages as well.
2. METHODOLOGY
The research started with a basic machine learning
approach. Choosing data, exploration, cleaning/pre-
processing, applying the known algorithms and comparing
the results. Later it extended to exploring deep learning
mode to improve the accuracy. We examined various
techniques on our dataset and chose the one for basic
implementation on web interface.
2.1 DATA DESCRIPTION AND PRE-PROCESSING
The dataset contains over 32k tweets which is then split
into train and test datasets. Twitter data is complicated to
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 431
work with as it contains various symbols like at the rates
and hashtags along with emoticons, slangs and more. Pre-
processing is an essential part of the process to clean the
data before using it. The pre-processing methods used are
stated as follows:
• Html Parser
• Remove pattern
• Apostrophe removal
• Short word removal
• Emoticon Removal
• Removing brackets, hashtags and at the rates
• Tokenization
• Stemming
The image below clarifies the changes and improvements
made by process of cleaning the data.
Fig -1: Cleaned Tweets
The train test split is standard 70-30. After cleaning the
tweets, next we move on to some visualizations to analyse
the data trends.
2.2. FEATURE EXTRACTION
Vectorization of the tweets was carried out by count
vectorizer followed by TF-IDF vectorizer. It recognizes the
importance of the word in the document. Formula is given
as TF_IDF = TF * IDF Where TF=Number of times word
appeared in text/ number of words in text, and IDF=log
(Number of documents/ Number of documents with word
in it)
2.3. MACHINE LEARNING TECHNIQUE
Machine learning is a technique to use computer
algorithms which improve over a period of time using the
data. There are various pre-defined algorithms developed
using the required mathematical calculations. We have
chosen 9 famous machine learning techniques to apply on
our data. They are as follows: 1. Random Forest Classifier 2.
Multinominal NB 3. Linear SVC 4. Logistic Regression 5.
SGD Classifier 6. Bagging Classifier 7. Decision Tree
Classifier 8. Ada Boost Classifier 9. KNN Code has a pipeline
of all these algorithms. Data is passed through it and
trained.
2.4. DEEP LEARNING TECHNIQUES
Deep learning is a subset of machine learning which
teaches the computer what comes to human naturally.
Understanding instincts and major characteristics is a core
part of deep learning. Long Short-Term Memory (LSTM) is
an improvement over recurrent neural network used for
sequence prediction. LSTMs make small modifications to
the information by multiplications and additions. With
LSTMs, the information flows through a mechanism known
as cell states. This way, LSTMs can selectively remember or
forget things.
3. RESULTS
Fig - 2: Results
Machine Learning and deep learning give very different
results as deep learning works closely on data and uses
complicated algorithms and trends. The results for ML
algorithms are given as follows. Figure 2. ML Results As
shown, our model works best with SGD classifier, that is,
Stochastic Gradient Descent. is a simple yet very efficient
approach to fitting linear classifiers and regressors under
convex loss functions such as (linear) Support Vector
Machines and Logistic Regression. Accuracy and F1 score
is 94.6% and 72.9% respectively. LSTM gives accuracy of
99.5% and F1 score of 74.8%.
4. CONCLUSIONS
Tackling the most important problem with today’s social
media is unavoidable. Keep experimenting and applying
the measures is the key part. This paper focuses on trying
out methods and choosing the best. ML is effective but not
enough to implement. False predictions are covered well
with LSTM. The main motive of this research is to cut off
the abuse at the start instead of removing it after. Making
the user think before they post and not let
miscommunication create chaos. Implementing a suitable
model at user end to stop them form coming out offensive
is the aim for future.
The authors can acknowledge any person/authorities in
this section. This is not mandatory.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 432
REFERENCES
[1] International Conference on Advanced Computing
Technologies and Applications (ICACTA- 2015).
Online Social Network Bullying Detection Using
Intelligence Techniques. By- B. Sri Nandhinia, J.I.
Sheebab.
[2] Optimized Twitter Cyberbullying Detection based on
deep Learning. By - Monirah A. Al-Ajlan. Information
Systems Department, CCIS, King Saud University,
Riyadh, Saudi Arabia, maalajlan@ksu.edu.sa and
Mourad Ykhlef, Information Systems Department,
CCIS.
[3] S. M. Kargutkar and V. Chitre, "A Study of
Cyberbullying Detection Using Machine Learning
Techniques," 2020 Fourth International Conference.K.
Elissa,
[4] A. Mody, S. Shah, R. Pimple and N. Shekokar,
"Identification of Potential Cyber Bullying Tweets
using Hybrid Approach in Sentiment Analysis," 2018
International Conference on Electrical, Electronics,
Communication, Computer, and Optimization
Techniques (ICEECCOT), 2018, pp. 878-881, doi:
10.1109/ICEECCOT43722.2018.9001476.
[5] M. Di Capua, E. Di Nardo and A. Petrosino,
"Unsupervised cyber bullying detection in social
networks," 2016 23rd International Conference on
Pattern Recognition (ICPR), 2016, pp. 432- 437, doi:
10.1109/ICPR.2016.7899672.
[6] W. N. Hamiza Wan Ali, M. Mohd and F. Fauzi,
"Cyberbullying Detection: An Overview," 2018 Cyber
Resilience Conference (CRC), 2018, pp. 1-3, doi:
10.1109/CR.2018.8626869
[7] Jezabel Molina-Gil, José A. Concepción-Sánchez and
Pino Caballero-Gil, “Harassment Detection Using
Machine Learning and Fuzzy Logic Techniques”,
Presented at the 13th International Conference on
Ubiquitous Computing and Ambient Intelligence
UCAmI. Published: 20 November 2019.
[8] Zinnar Ghasem1, Ingo Frommholz1 and Carsten
Maple2, “A Machine Learning Framework to Detect
and Document Text-based Cyberstalking”, 1
University of Bedfordshire, UK, 2 University of
Warwick, UK.
[9] A. Chaudhari, A. Parseja, and A. Patyal, “CNN based
Hate-o-Meter: A Hate Speech Detecting Tool,” 2020
Third International Conference on Smart Systems and
Inventive Technology (ICSSIT), 2020.
[10] N. Rai, P. Meena, and C. Agrawal, “Improving the hate
speech analysis through dimensionality reduction
approach,” 2020 6th International Conference on
Advanced Computing and Communication Systems
(ICACCS), 2020.
[11] D. Kumar, N. Kumar, and S. Mishra, “QUARC:
Quaternion Multi-Modal Fusion Architecture for Hate
Speech Classification,” 2021 IEEE International
Conference on Big Data and Smart Computing
(BigComp), 2021
[12] A. Schmidt and M. Wiegand, “A Survey on Hate Speech
Detection using Natural Language Processing,”
Proceedings of the Fifth International Workshop on
Natural Language Processing for Social Media, 2017.
[13] S. A. E. Rahman, F. A. Alotaibi, and W. A. Alshehri,
“Sentiment Analysis of Twitter Data,” 2019
International Conference on Computer and
Information Sciences (ICCIS), 2019.
[14] S. Zahoor and R. Rohilla, “Twitter Sentiment Analysis
Using Lexical or Rule Based Approach: A Case Study,”
2020 8th International Conference on Reliability,
Infocom Technologies and Optimization (Trends and
Future Directions) (ICRITO), 2020.
[15] J. Yadav, D. Kumar, and D. Chauhan, “Cyberbullying
Detection using Pre-Trained BERT Model,” 2020
International Conference on Electronics and
Sustainable Communication Systems (ICESC), 2020.
[16] O. C. Hang and H. M. Dahlan, “Cyberbullying Lexicon
for Social Media,” 2019 6th International Conference
on Research and Innovation in Information Systems
(ICRIIS), 2019.
[17] B. Haidar, M. Chamoun, and A. Serhrouchni,
“Multilingual cyberbullying detection system:
Detecting cyberbullying in Arabic content,” 2017 1st
Cyber Security in Networking Conference (CSNet),
2017.
[18] Prabhu, Trisha N. Method to Stop Cyberbullying
before It Occurs.
[19] Li, Bohan, et al. CYBERBULLYING DETECTION
METHOD AND SYSTEM. 22 Apr. 2021.

More Related Content

Similar to MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT ON TWITTER

ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEijesajournal
 
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEijesajournal
 
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...IRJET Journal
 
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...IRJET Journal
 
Handwritten Text Recognition Using Machine Learning
Handwritten Text Recognition Using Machine LearningHandwritten Text Recognition Using Machine Learning
Handwritten Text Recognition Using Machine LearningIRJET Journal
 
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET Journal
 
BITCOIN HEIST: RANSOMWARE ATTACKS PREDICTION USING DATA SCIENCE
BITCOIN HEIST: RANSOMWARE ATTACKS PREDICTION USING DATA SCIENCEBITCOIN HEIST: RANSOMWARE ATTACKS PREDICTION USING DATA SCIENCE
BITCOIN HEIST: RANSOMWARE ATTACKS PREDICTION USING DATA SCIENCEIRJET Journal
 
Cyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine LearningCyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine LearningIRJET Journal
 
Cyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine LearningCyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine LearningIRJET Journal
 
IRJET- Machine Learning Processing for Intrusion Detection
IRJET- Machine Learning Processing for Intrusion DetectionIRJET- Machine Learning Processing for Intrusion Detection
IRJET- Machine Learning Processing for Intrusion DetectionIRJET Journal
 
Automated Feature Selection and Churn Prediction using Deep Learning Models
Automated Feature Selection and Churn Prediction using Deep Learning ModelsAutomated Feature Selection and Churn Prediction using Deep Learning Models
Automated Feature Selection and Churn Prediction using Deep Learning ModelsIRJET Journal
 
SMART ATTENDANCE SYSTEM USING QR CODE WITH SMS.pptx
SMART ATTENDANCE SYSTEM USING QR CODE WITH SMS.pptxSMART ATTENDANCE SYSTEM USING QR CODE WITH SMS.pptx
SMART ATTENDANCE SYSTEM USING QR CODE WITH SMS.pptxDanielGuballo1
 
Estimating the Efficacy of Efficient Machine Learning Classifiers for Twitter...
Estimating the Efficacy of Efficient Machine Learning Classifiers for Twitter...Estimating the Efficacy of Efficient Machine Learning Classifiers for Twitter...
Estimating the Efficacy of Efficient Machine Learning Classifiers for Twitter...IRJET Journal
 
Combining Lexicon based and Machine Learning based Methods for Twitter Sentim...
Combining Lexicon based and Machine Learning based Methods for Twitter Sentim...Combining Lexicon based and Machine Learning based Methods for Twitter Sentim...
Combining Lexicon based and Machine Learning based Methods for Twitter Sentim...IRJET Journal
 
Person Acquisition and Identification Tool
Person Acquisition and Identification ToolPerson Acquisition and Identification Tool
Person Acquisition and Identification ToolIRJET Journal
 
Emotion Recognition By Textual Tweets Using Machine Learning
Emotion Recognition By Textual Tweets Using Machine LearningEmotion Recognition By Textual Tweets Using Machine Learning
Emotion Recognition By Textual Tweets Using Machine LearningIRJET Journal
 
IRJET- Trend Analysis on Twitter
IRJET- Trend Analysis on TwitterIRJET- Trend Analysis on Twitter
IRJET- Trend Analysis on TwitterIRJET Journal
 
IRJET - Fake News Detection: A Survey
IRJET -  	  Fake News Detection: A SurveyIRJET -  	  Fake News Detection: A Survey
IRJET - Fake News Detection: A SurveyIRJET Journal
 

Similar to MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT ON TWITTER (20)

ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
 
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
 
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...
 
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
 
Handwritten Text Recognition Using Machine Learning
Handwritten Text Recognition Using Machine LearningHandwritten Text Recognition Using Machine Learning
Handwritten Text Recognition Using Machine Learning
 
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
 
BITCOIN HEIST: RANSOMWARE ATTACKS PREDICTION USING DATA SCIENCE
BITCOIN HEIST: RANSOMWARE ATTACKS PREDICTION USING DATA SCIENCEBITCOIN HEIST: RANSOMWARE ATTACKS PREDICTION USING DATA SCIENCE
BITCOIN HEIST: RANSOMWARE ATTACKS PREDICTION USING DATA SCIENCE
 
Cyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine LearningCyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine Learning
 
Cyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine LearningCyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine Learning
 
IRJET- Machine Learning Processing for Intrusion Detection
IRJET- Machine Learning Processing for Intrusion DetectionIRJET- Machine Learning Processing for Intrusion Detection
IRJET- Machine Learning Processing for Intrusion Detection
 
Automated Feature Selection and Churn Prediction using Deep Learning Models
Automated Feature Selection and Churn Prediction using Deep Learning ModelsAutomated Feature Selection and Churn Prediction using Deep Learning Models
Automated Feature Selection and Churn Prediction using Deep Learning Models
 
Fake News Detection using Deep Learning
Fake News Detection using Deep LearningFake News Detection using Deep Learning
Fake News Detection using Deep Learning
 
SMART ATTENDANCE SYSTEM USING QR CODE WITH SMS.pptx
SMART ATTENDANCE SYSTEM USING QR CODE WITH SMS.pptxSMART ATTENDANCE SYSTEM USING QR CODE WITH SMS.pptx
SMART ATTENDANCE SYSTEM USING QR CODE WITH SMS.pptx
 
Estimating the Efficacy of Efficient Machine Learning Classifiers for Twitter...
Estimating the Efficacy of Efficient Machine Learning Classifiers for Twitter...Estimating the Efficacy of Efficient Machine Learning Classifiers for Twitter...
Estimating the Efficacy of Efficient Machine Learning Classifiers for Twitter...
 
Combining Lexicon based and Machine Learning based Methods for Twitter Sentim...
Combining Lexicon based and Machine Learning based Methods for Twitter Sentim...Combining Lexicon based and Machine Learning based Methods for Twitter Sentim...
Combining Lexicon based and Machine Learning based Methods for Twitter Sentim...
 
Person Acquisition and Identification Tool
Person Acquisition and Identification ToolPerson Acquisition and Identification Tool
Person Acquisition and Identification Tool
 
Emotion Recognition By Textual Tweets Using Machine Learning
Emotion Recognition By Textual Tweets Using Machine LearningEmotion Recognition By Textual Tweets Using Machine Learning
Emotion Recognition By Textual Tweets Using Machine Learning
 
IRJET- Trend Analysis on Twitter
IRJET- Trend Analysis on TwitterIRJET- Trend Analysis on Twitter
IRJET- Trend Analysis on Twitter
 
IRJET - Fake News Detection: A Survey
IRJET -  	  Fake News Detection: A SurveyIRJET -  	  Fake News Detection: A Survey
IRJET - Fake News Detection: A Survey
 
Machine learning
Machine learningMachine learning
Machine learning
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 

Recently uploaded (20)

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 

MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT ON TWITTER

  • 1. © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 430 MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT ON TWITTER Ajay Choudhari1, Freya Kotak2, Siddhant Zaveri3, Mrs. Jyoti Bansode4 1,2,3Shah and Anchor Kutchhi Engineering College Chembur, Mumbai. 4 Professor, Dept. Of Information Technology, Engineering, Shah and Anchor Kutchhi Engineering College, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cyber Abuse is the use of online systems and virtual devices to inflict harm of either psychological, emotional, sexual, racist, sexist or any negative adjective in nature. Sentiment Analysis is the interpretation and classification of text data by their polarity that is positive, negative, or neutral. This is done with the help of various analysis techniques and the usage of each technique differs from author to author. Sentiment Analysis is being used by major companies in the world so that they can identify what kind of emotions are being passed around the market by the people and thus, use these emotions and make changes to the company's systems in order to grow as a whole. Key Words: Twitter, Hate speech detection, BERT. 1. INTRODUCTION Internet being responsible for 80% communication in the world, it clearly has its own disadvantages. According to statistics presented by “Global social media statistics research summary 2022”, 58.4% of the world's population uses social media. The average daily usage is 2 hours and 27 minutes (January 2022). It has become a part of life which also has an impact on mental health. The harm inflicted maybe physiological or emotional. Efforts has been made by several organizations and government as well as by the companies owning the social media platforms to act upon its negative effects. Improvements are introduced but to recognize a person’s intention behind a certain comment and the way it portrays is an arduous job. Finding a way to stop these abusive attacks and making a person think about the reception of the comment before they post it is idea behind this research. 1.1 LITERATURE REVIEW The paper [6] by W. N. Hamiza Wan Ali, M. Mohd and F. Fauzi, basically provides an overview of the cyber bullying occuring in the social networks. It identifies the data source as text messages, instant messages, social media and online games. It compares the features used for detection such as bag-of-words and clears the latest and better version used. All the commonly used classification algorithms were summarized by considering individual social media platforms. It identifies the following challenges faced while Cyber Bullying detection: Language Challenge Dataset Challenge Data Representation Challenge Zinnar Ghasem1, Ingo Frommholz1 and Carsten Maple2 talk about the urge to prevent and take strict action against cyber-crimes as they have drastically increased with the development in technology. The proposed framework [8] here is referred to as ACTS that stands for Anti Cyberstalking Text- based System. It utilizes text mining, statistical analysis, text categorization, and the use of machine learning algorithms to combat cyber bullying. The use of an attacker identification module determines the status of the attacker and his/her comments containing foul language or bad words. [17] The paper proposed by B. Haidar, M. Chamoun, and A. Serhrouchni has provided a multilingual cyberbullying detection approach for detecting cyberbullying in messages, tweets and newspaper review for two Indian languages. Results of the experiments shows that Logistics Regression outperforms all other algorithms on these datasets. Also, generating synthesized data could help improve performance of the system. Results of our study show that our systems perform well across two languages and different domains and hence, it can be used to detect cyberbullying for other Indian languages as well. 2. METHODOLOGY The research started with a basic machine learning approach. Choosing data, exploration, cleaning/pre- processing, applying the known algorithms and comparing the results. Later it extended to exploring deep learning mode to improve the accuracy. We examined various techniques on our dataset and chose the one for basic implementation on web interface. 2.1 DATA DESCRIPTION AND PRE-PROCESSING The dataset contains over 32k tweets which is then split into train and test datasets. Twitter data is complicated to International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 431 work with as it contains various symbols like at the rates and hashtags along with emoticons, slangs and more. Pre- processing is an essential part of the process to clean the data before using it. The pre-processing methods used are stated as follows: • Html Parser • Remove pattern • Apostrophe removal • Short word removal • Emoticon Removal • Removing brackets, hashtags and at the rates • Tokenization • Stemming The image below clarifies the changes and improvements made by process of cleaning the data. Fig -1: Cleaned Tweets The train test split is standard 70-30. After cleaning the tweets, next we move on to some visualizations to analyse the data trends. 2.2. FEATURE EXTRACTION Vectorization of the tweets was carried out by count vectorizer followed by TF-IDF vectorizer. It recognizes the importance of the word in the document. Formula is given as TF_IDF = TF * IDF Where TF=Number of times word appeared in text/ number of words in text, and IDF=log (Number of documents/ Number of documents with word in it) 2.3. MACHINE LEARNING TECHNIQUE Machine learning is a technique to use computer algorithms which improve over a period of time using the data. There are various pre-defined algorithms developed using the required mathematical calculations. We have chosen 9 famous machine learning techniques to apply on our data. They are as follows: 1. Random Forest Classifier 2. Multinominal NB 3. Linear SVC 4. Logistic Regression 5. SGD Classifier 6. Bagging Classifier 7. Decision Tree Classifier 8. Ada Boost Classifier 9. KNN Code has a pipeline of all these algorithms. Data is passed through it and trained. 2.4. DEEP LEARNING TECHNIQUES Deep learning is a subset of machine learning which teaches the computer what comes to human naturally. Understanding instincts and major characteristics is a core part of deep learning. Long Short-Term Memory (LSTM) is an improvement over recurrent neural network used for sequence prediction. LSTMs make small modifications to the information by multiplications and additions. With LSTMs, the information flows through a mechanism known as cell states. This way, LSTMs can selectively remember or forget things. 3. RESULTS Fig - 2: Results Machine Learning and deep learning give very different results as deep learning works closely on data and uses complicated algorithms and trends. The results for ML algorithms are given as follows. Figure 2. ML Results As shown, our model works best with SGD classifier, that is, Stochastic Gradient Descent. is a simple yet very efficient approach to fitting linear classifiers and regressors under convex loss functions such as (linear) Support Vector Machines and Logistic Regression. Accuracy and F1 score is 94.6% and 72.9% respectively. LSTM gives accuracy of 99.5% and F1 score of 74.8%. 4. CONCLUSIONS Tackling the most important problem with today’s social media is unavoidable. Keep experimenting and applying the measures is the key part. This paper focuses on trying out methods and choosing the best. ML is effective but not enough to implement. False predictions are covered well with LSTM. The main motive of this research is to cut off the abuse at the start instead of removing it after. Making the user think before they post and not let miscommunication create chaos. Implementing a suitable model at user end to stop them form coming out offensive is the aim for future. The authors can acknowledge any person/authorities in this section. This is not mandatory.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 432 REFERENCES [1] International Conference on Advanced Computing Technologies and Applications (ICACTA- 2015). Online Social Network Bullying Detection Using Intelligence Techniques. By- B. Sri Nandhinia, J.I. Sheebab. [2] Optimized Twitter Cyberbullying Detection based on deep Learning. By - Monirah A. Al-Ajlan. Information Systems Department, CCIS, King Saud University, Riyadh, Saudi Arabia, maalajlan@ksu.edu.sa and Mourad Ykhlef, Information Systems Department, CCIS. [3] S. M. Kargutkar and V. Chitre, "A Study of Cyberbullying Detection Using Machine Learning Techniques," 2020 Fourth International Conference.K. Elissa, [4] A. Mody, S. Shah, R. Pimple and N. Shekokar, "Identification of Potential Cyber Bullying Tweets using Hybrid Approach in Sentiment Analysis," 2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT), 2018, pp. 878-881, doi: 10.1109/ICEECCOT43722.2018.9001476. [5] M. Di Capua, E. Di Nardo and A. Petrosino, "Unsupervised cyber bullying detection in social networks," 2016 23rd International Conference on Pattern Recognition (ICPR), 2016, pp. 432- 437, doi: 10.1109/ICPR.2016.7899672. [6] W. N. Hamiza Wan Ali, M. Mohd and F. Fauzi, "Cyberbullying Detection: An Overview," 2018 Cyber Resilience Conference (CRC), 2018, pp. 1-3, doi: 10.1109/CR.2018.8626869 [7] Jezabel Molina-Gil, José A. Concepción-Sánchez and Pino Caballero-Gil, “Harassment Detection Using Machine Learning and Fuzzy Logic Techniques”, Presented at the 13th International Conference on Ubiquitous Computing and Ambient Intelligence UCAmI. Published: 20 November 2019. [8] Zinnar Ghasem1, Ingo Frommholz1 and Carsten Maple2, “A Machine Learning Framework to Detect and Document Text-based Cyberstalking”, 1 University of Bedfordshire, UK, 2 University of Warwick, UK. [9] A. Chaudhari, A. Parseja, and A. Patyal, “CNN based Hate-o-Meter: A Hate Speech Detecting Tool,” 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT), 2020. [10] N. Rai, P. Meena, and C. Agrawal, “Improving the hate speech analysis through dimensionality reduction approach,” 2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS), 2020. [11] D. Kumar, N. Kumar, and S. Mishra, “QUARC: Quaternion Multi-Modal Fusion Architecture for Hate Speech Classification,” 2021 IEEE International Conference on Big Data and Smart Computing (BigComp), 2021 [12] A. Schmidt and M. Wiegand, “A Survey on Hate Speech Detection using Natural Language Processing,” Proceedings of the Fifth International Workshop on Natural Language Processing for Social Media, 2017. [13] S. A. E. Rahman, F. A. Alotaibi, and W. A. Alshehri, “Sentiment Analysis of Twitter Data,” 2019 International Conference on Computer and Information Sciences (ICCIS), 2019. [14] S. Zahoor and R. Rohilla, “Twitter Sentiment Analysis Using Lexical or Rule Based Approach: A Case Study,” 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), 2020. [15] J. Yadav, D. Kumar, and D. Chauhan, “Cyberbullying Detection using Pre-Trained BERT Model,” 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), 2020. [16] O. C. Hang and H. M. Dahlan, “Cyberbullying Lexicon for Social Media,” 2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS), 2019. [17] B. Haidar, M. Chamoun, and A. Serhrouchni, “Multilingual cyberbullying detection system: Detecting cyberbullying in Arabic content,” 2017 1st Cyber Security in Networking Conference (CSNet), 2017. [18] Prabhu, Trisha N. Method to Stop Cyberbullying before It Occurs. [19] Li, Bohan, et al. CYBERBULLYING DETECTION METHOD AND SYSTEM. 22 Apr. 2021.