SlideShare a Scribd company logo
1 of 26
CYBERBULLIYING
DETECTION
Presented by
ADARSH.N.SURESH
INTRODUCTION
Cyberbullying is the use of electronic communication to
bully a person, typically by sending messages of an
intimidating or threatening nature.
Cyberbullying Detection implements our coded, machine
learning algorithms, in finding a negative comment from
the messages it receives by a user. The algorithm first
gives the message a value and then based on our pre
trained data, it decides if the comment is harsh enough to
WHAT IS CYBERBULLIYING ?
The use of electronic media or communication channel
to bully a person, typically by sending messages
intimidating or threatening is known as cyberbullying.
The technology is used to intentionally hurt or
embarrass another person.
Cyberbullying includes sending, posting, or sharing
negative, false, harmful or mean content about someone
else.
ISSUE RELATED TO CYBERBULLYING
Classifying the conversation into normal chat/text or
under bullying attributes.
Cyberbullying is the one of the most mentally damaging
problems on internet.
The data needs to be categorized properly before using
any approach to stop the cyberbullying activity.
It result in catastrophic impact on self and personal lives
especially of students.
COMMENTS INVOLVING PROFANITY
AND NEGETIVITY
Profanity Negativity
Cyberbullying
Sexuality Race/Culture Intelligence Physical
attributes
SUITABLE SOLUTION
1. MACHINE LEARNING ONLINE PATROL CRAWLER
2. SENTIMENT ANALYSIS
3. SOFTWARE TO DETECT CYBERBULLYING
CONTENT
MACHINE LEARNING METHOD
 This method uses a machine learning method known as
Support Vector Method(SVM) to detect any inappropriate
entry.
 This method is designed to find the issue of online
malicious entries especially on informal school websites.
 The software is designed for automatically detecting the
cyberbullying cases.
 This informal school websites contains information
about teachers and students.
MACHINE LEARNING APPROACH
Machine
Learning Module
Training Phase Test Phase
TRAINING PHASE
Checking school website.
Manually detecting cyberbullying entries.
Extraction of negative words and adding them to
lexicon.
Estimating word similarity with Levenshtein distance.
(It is a string metric for measuring the difference between two sequences.)
Training with training Vector Machine Algorithm.
TEST PHASE
Checking school websites.
Detecting cyberbullying entries by SVM model.
(SVM is a method of supervised machine learning which is used for classify data.)
Part of speech analysis detect the harmful entry.
Estimating similarity with Levenshtein distance.
Marking and visualizing harmful entries.
SENTIMENT ANALYSIS
 Sentiment classifier is used to classify negative and
positive categories by using Machine Learning
Algorithm.
 The aims is to determine the bullying instances in social
media networks.
 Twitter is used as the source of data.
TECHNOLOGY USED
 Ling Pipe : A toolkit for processing text using
computational linguistics.
 Tweet Extractor : To extract tweets from twitter
continuously.
 Gephi : Open source Graph Visualization and
manipulation software.
 Amazon’s Mechanical Turk Service : It is a crowdsourcing
marketplace that makes it easier for individuals and
DATA COLLECTION AND PRE-
PROCESSING
 Tweets where collected from different
sources, around 5000 tweets.
 Use of Bag-of-Words model. It takes
every word in a sentence as features ,
the whole sentence is represented by an
unordered collection of words.
RESULT
Amazon’s Mechanical Turk classified unlabelled data
which was used to verify and validate newly labelled data
provided by Machine learning algorithm.
Training 500 Tweets
Positive Negative Accuracy
Amazon’s Mturk 65.2% 74.0% 67.1%
SENTIMENT ANALYSIS CONCLUSION
This approach leverages the power of Sentiment
analysis.
The classifier is close to 70% accurate.
It is not the best result as expected due to restrictions
from accessing unlimited content from twitter.
SOFTWARE TO DETECT
CYBERBULLYING CONTENT
 New types of devices connected to internet such as
smartphones and tablets further exacerbated the
problem of cyberbullying.
 Android application which automatically detects a
possible harmful content in a text.
 This application use machine learning method to spot
any undesirable content.
APPLICATION
 Application is built for devices supporting Android OS.
 Java8 and Android studio is used.
 Gives users interface for detection of harmful contents.
HARMFUL CONTENT DETECTION
PROCESS
 The application contains one activity responsible for
interacting with user.
 For the process of checking harmful content the
application starts a background thread.
 The user can still use the device even if checking process
takes a while.
METHOD
 The method classifies messages as harmful or not by
using a classifier trained with language modelling
method based on Brute Force algorithm.
 Brute Force : Algorithm using combinatorial approach
usually generate a massive number of combinations-
potential answers to a given problem.
 Algorithm applied for automatic extraction of sentence
patterns.
 All patterns used in classification was stored on mobile
device.
METHOD CONTINUES
RESULT
Precision = 79%
Recall = 79%
 PRECISION is the ratio of the number of relevant records
retrieved to the total number of irrelevant and relevant
records retrieved.
 RECALL is the ratio of the number of relevant records
retrieved to the total number of relevant records in the
database.
 Requires minimal human effort.
OTHER SOFTWARES FOR DETECTING
CYBERBULLYING
1. FearNot!
2. Smartians Radar
3. ReThink
4. PocketGuardian
5. Cyber Buddy
CHALLENGES FACED
 Preventing the removal of valuable messages when
attempting to filter data.
 Privacy concerns.
 Incidents should be reported as earlier as possible.
 False reporting.
CONCLUSION
• The use of internet and social media has clear
advantages for societies, but their frequent use may also
have significant adverse consequences.
• This involves unwanted sexual exposure, cybercrime
and cyberbullying.
• We developed a model for detecting cyberbullying
behavior and its severity in Twitter.
THANK YOU
QUESTIONS ?

More Related Content

What's hot

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityChitra Mudunuru
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
Malware detection-using-machine-learning
Malware detection-using-machine-learningMalware detection-using-machine-learning
Malware detection-using-machine-learningSecurity Bootcamp
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityBalwantBesra
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Using Machine Learning in Networks Intrusion Detection Systems
Using Machine Learning in Networks Intrusion Detection SystemsUsing Machine Learning in Networks Intrusion Detection Systems
Using Machine Learning in Networks Intrusion Detection SystemsOmar Shaya
 
Mind reading computer ppt
Mind reading computer pptMind reading computer ppt
Mind reading computer pptTarun tyagi
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crimeAlisha Korpal
 
Cyber crime against property
Cyber crime against propertyCyber crime against property
Cyber crime against propertyvarunbamba
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 
DDoS Attack PPT by Nitin Bisht
DDoS Attack  PPT by Nitin BishtDDoS Attack  PPT by Nitin Bisht
DDoS Attack PPT by Nitin BishtNitin Bisht
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in IndiaYogesh Lolge
 

What's hot (20)

Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Malware detection-using-machine-learning
Malware detection-using-machine-learningMalware detection-using-machine-learning
Malware detection-using-machine-learning
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Using Machine Learning in Networks Intrusion Detection Systems
Using Machine Learning in Networks Intrusion Detection SystemsUsing Machine Learning in Networks Intrusion Detection Systems
Using Machine Learning in Networks Intrusion Detection Systems
 
Cyber security
Cyber securityCyber security
Cyber security
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
 
FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT
 
Mind reading computer ppt
Mind reading computer pptMind reading computer ppt
Mind reading computer ppt
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
Cyber crime against property
Cyber crime against propertyCyber crime against property
Cyber crime against property
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
DDoS Attack PPT by Nitin Bisht
DDoS Attack  PPT by Nitin BishtDDoS Attack  PPT by Nitin Bisht
DDoS Attack PPT by Nitin Bisht
 
Final year ppt
Final year pptFinal year ppt
Final year ppt
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Similar to Cyberbullying Detection Using ML

Categorize balanced dataset for troll detection
Categorize balanced dataset for troll detectionCategorize balanced dataset for troll detection
Categorize balanced dataset for troll detectionvivatechijri
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...IRJET Journal
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...IRJET Journal
 
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYINGA MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYINGijaia
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullyinggerogepatton
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullyinggerogepatton
 
machine learning.pptx
machine learning.pptxmachine learning.pptx
machine learning.pptxSowjanya49
 
Detecting cyberbullying text using the approaches with machine learning model...
Detecting cyberbullying text using the approaches with machine learning model...Detecting cyberbullying text using the approaches with machine learning model...
Detecting cyberbullying text using the approaches with machine learning model...IAESIJAI
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detectionMohamed Elfadly
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detectionMohamed Elfadly
 
Cyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine LearningCyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine LearningIRJET Journal
 
Cyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine LearningCyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine LearningIRJET Journal
 
NEW EMERGING TECHNOLOGIES_AARUSHIJATIAN.pptx
NEW EMERGING TECHNOLOGIES_AARUSHIJATIAN.pptxNEW EMERGING TECHNOLOGIES_AARUSHIJATIAN.pptx
NEW EMERGING TECHNOLOGIES_AARUSHIJATIAN.pptxAarushiJatian
 
A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.vivatechijri
 
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...IJCI JOURNAL
 
DETECTING SPAM BY USING NAÏVE BAYES IN MACHINE LEARNING
DETECTING SPAM BY USING NAÏVE BAYES IN MACHINE LEARNINGDETECTING SPAM BY USING NAÏVE BAYES IN MACHINE LEARNING
DETECTING SPAM BY USING NAÏVE BAYES IN MACHINE LEARNINGazziefaazahar
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
Predicting cyber bullying on t witter using machine learning
Predicting cyber bullying on t witter using machine learningPredicting cyber bullying on t witter using machine learning
Predicting cyber bullying on t witter using machine learningMirXahid1
 

Similar to Cyberbullying Detection Using ML (20)

Categorize balanced dataset for troll detection
Categorize balanced dataset for troll detectionCategorize balanced dataset for troll detection
Categorize balanced dataset for troll detection
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
 
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYINGA MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
 
machine learning.pptx
machine learning.pptxmachine learning.pptx
machine learning.pptx
 
Detecting cyberbullying text using the approaches with machine learning model...
Detecting cyberbullying text using the approaches with machine learning model...Detecting cyberbullying text using the approaches with machine learning model...
Detecting cyberbullying text using the approaches with machine learning model...
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detection
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detection
 
Cyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine LearningCyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine Learning
 
Cyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine LearningCyberbullying Detection Using Machine Learning
Cyberbullying Detection Using Machine Learning
 
NEW EMERGING TECHNOLOGIES_AARUSHIJATIAN.pptx
NEW EMERGING TECHNOLOGIES_AARUSHIJATIAN.pptxNEW EMERGING TECHNOLOGIES_AARUSHIJATIAN.pptx
NEW EMERGING TECHNOLOGIES_AARUSHIJATIAN.pptx
 
A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.
 
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
 
Eckovation Machine Learning
Eckovation Machine LearningEckovation Machine Learning
Eckovation Machine Learning
 
DETECTING SPAM BY USING NAÏVE BAYES IN MACHINE LEARNING
DETECTING SPAM BY USING NAÏVE BAYES IN MACHINE LEARNINGDETECTING SPAM BY USING NAÏVE BAYES IN MACHINE LEARNING
DETECTING SPAM BY USING NAÏVE BAYES IN MACHINE LEARNING
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
Predicting cyber bullying on t witter using machine learning
Predicting cyber bullying on t witter using machine learningPredicting cyber bullying on t witter using machine learning
Predicting cyber bullying on t witter using machine learning
 

Recently uploaded

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Cyberbullying Detection Using ML

  • 2. INTRODUCTION Cyberbullying is the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature. Cyberbullying Detection implements our coded, machine learning algorithms, in finding a negative comment from the messages it receives by a user. The algorithm first gives the message a value and then based on our pre trained data, it decides if the comment is harsh enough to
  • 3. WHAT IS CYBERBULLIYING ? The use of electronic media or communication channel to bully a person, typically by sending messages intimidating or threatening is known as cyberbullying. The technology is used to intentionally hurt or embarrass another person. Cyberbullying includes sending, posting, or sharing negative, false, harmful or mean content about someone else.
  • 4. ISSUE RELATED TO CYBERBULLYING Classifying the conversation into normal chat/text or under bullying attributes. Cyberbullying is the one of the most mentally damaging problems on internet. The data needs to be categorized properly before using any approach to stop the cyberbullying activity. It result in catastrophic impact on self and personal lives especially of students.
  • 5. COMMENTS INVOLVING PROFANITY AND NEGETIVITY Profanity Negativity Cyberbullying Sexuality Race/Culture Intelligence Physical attributes
  • 6. SUITABLE SOLUTION 1. MACHINE LEARNING ONLINE PATROL CRAWLER 2. SENTIMENT ANALYSIS 3. SOFTWARE TO DETECT CYBERBULLYING CONTENT
  • 7. MACHINE LEARNING METHOD  This method uses a machine learning method known as Support Vector Method(SVM) to detect any inappropriate entry.  This method is designed to find the issue of online malicious entries especially on informal school websites.  The software is designed for automatically detecting the cyberbullying cases.  This informal school websites contains information about teachers and students.
  • 8. MACHINE LEARNING APPROACH Machine Learning Module Training Phase Test Phase
  • 9. TRAINING PHASE Checking school website. Manually detecting cyberbullying entries. Extraction of negative words and adding them to lexicon. Estimating word similarity with Levenshtein distance. (It is a string metric for measuring the difference between two sequences.) Training with training Vector Machine Algorithm.
  • 10. TEST PHASE Checking school websites. Detecting cyberbullying entries by SVM model. (SVM is a method of supervised machine learning which is used for classify data.) Part of speech analysis detect the harmful entry. Estimating similarity with Levenshtein distance. Marking and visualizing harmful entries.
  • 11. SENTIMENT ANALYSIS  Sentiment classifier is used to classify negative and positive categories by using Machine Learning Algorithm.  The aims is to determine the bullying instances in social media networks.  Twitter is used as the source of data.
  • 12. TECHNOLOGY USED  Ling Pipe : A toolkit for processing text using computational linguistics.  Tweet Extractor : To extract tweets from twitter continuously.  Gephi : Open source Graph Visualization and manipulation software.  Amazon’s Mechanical Turk Service : It is a crowdsourcing marketplace that makes it easier for individuals and
  • 13. DATA COLLECTION AND PRE- PROCESSING  Tweets where collected from different sources, around 5000 tweets.  Use of Bag-of-Words model. It takes every word in a sentence as features , the whole sentence is represented by an unordered collection of words.
  • 14. RESULT Amazon’s Mechanical Turk classified unlabelled data which was used to verify and validate newly labelled data provided by Machine learning algorithm. Training 500 Tweets Positive Negative Accuracy Amazon’s Mturk 65.2% 74.0% 67.1%
  • 15. SENTIMENT ANALYSIS CONCLUSION This approach leverages the power of Sentiment analysis. The classifier is close to 70% accurate. It is not the best result as expected due to restrictions from accessing unlimited content from twitter.
  • 16. SOFTWARE TO DETECT CYBERBULLYING CONTENT  New types of devices connected to internet such as smartphones and tablets further exacerbated the problem of cyberbullying.  Android application which automatically detects a possible harmful content in a text.  This application use machine learning method to spot any undesirable content.
  • 17. APPLICATION  Application is built for devices supporting Android OS.  Java8 and Android studio is used.  Gives users interface for detection of harmful contents.
  • 18. HARMFUL CONTENT DETECTION PROCESS  The application contains one activity responsible for interacting with user.  For the process of checking harmful content the application starts a background thread.  The user can still use the device even if checking process takes a while.
  • 19. METHOD  The method classifies messages as harmful or not by using a classifier trained with language modelling method based on Brute Force algorithm.  Brute Force : Algorithm using combinatorial approach usually generate a massive number of combinations- potential answers to a given problem.  Algorithm applied for automatic extraction of sentence patterns.  All patterns used in classification was stored on mobile device.
  • 21. RESULT Precision = 79% Recall = 79%  PRECISION is the ratio of the number of relevant records retrieved to the total number of irrelevant and relevant records retrieved.  RECALL is the ratio of the number of relevant records retrieved to the total number of relevant records in the database.  Requires minimal human effort.
  • 22. OTHER SOFTWARES FOR DETECTING CYBERBULLYING 1. FearNot! 2. Smartians Radar 3. ReThink 4. PocketGuardian 5. Cyber Buddy
  • 23. CHALLENGES FACED  Preventing the removal of valuable messages when attempting to filter data.  Privacy concerns.  Incidents should be reported as earlier as possible.  False reporting.
  • 24. CONCLUSION • The use of internet and social media has clear advantages for societies, but their frequent use may also have significant adverse consequences. • This involves unwanted sexual exposure, cybercrime and cyberbullying. • We developed a model for detecting cyberbullying behavior and its severity in Twitter.