SlideShare a Scribd company logo
1 of 13
Download to read offline
1
CYBERBULLYING DETECTION

Submitted to the Mahatma Gandhi University in partial
Fullfillment of the requirement for the Degree of
BCA
CBCS BCA Degree Programme
Submitted by
ARJUN K VINOD
Reg No: 200021094304
Under the guidance of
Mr. AZHAR BIN SAGAR
Assistant Professor
Department of ComputerApplication Musaliar
College of Arts and Science,Pathanamthitta
(Affiliated to MG University, Kottayam)
2
MUSALIAR COLLEGE OFARTS AND SCIENCE
PATHANAMTHITTA
(Affiliated to MG University, Kottayam)
CERTIFICATE
This is to certify that the seminar entitled “CYBERBULLYING DETECTION” is a
bonafide record of work done by ARJUN K VINOD (Reg.No:200021094304) for the
partial fulfillment of the requirements for the award of the Degree of Bachelor of
Computer Application of Mahatma Gandhi University, Kottayam.
Prof. Dr. Vilzon Koshy Asst.Prof. Anju ElizabethCherian
(Principal) (Vice Principal)
Asst. Prof. Leena Natarajan Asst.Prof. Azhar Bin Sagar
(Head of the Department) (Faculty Guide)
Internal Examiner External Examiner
3
DECLARATION
I hereby declare that this seminar report “CYBERBULLYING DETECTION” is a
bonafide work done at Musaliar College of Arts & Science, Pathanamthitta,
towards the partial fulfillment of the requirements for the award of Degree of Bachelor
of Computer Application from Mahatma Gandhi University, Kottayam during the
academic year 2018-2021.
Place: Pathanamthitta ARJUN K VINOD
Date: Reg No: 200021094304
4
ACKNOWLEDGEMENT
During the course of the present study, I received help and inspiration from
many individuals and sources. I wish to express my deep sense of gratitude to all those
who contributed directly or indirectly to complete my seminar work.
I am greatly indebted to our Principal Prof. Dr.Vilzon Koshy for providing all
the required facilities for completing the seminar work.
I take this opportunity to express my heartfelt thanks and gratitude to our Vice
Principal Mrs. Anju Elizabeth Cherian for the valuable support and guidance.
My sincere thanks to Asst. Prof. Leena Natarajan Head of the Department
whose remarkable ideas and supervision made me to do Completing This Seminar
successful1.
I am thankful to my guide Asst. Prof Azhar Bin Sagar for the keen interest
and continuous encouragement, which had inspired us throughout the study.
I express my sincere thanks to all faculty members, friends, library facilities
provided and well-wishers for their cooperation in completing this seminar.
Above all I thank God “the almighty” for the benevolence he has shown to us
for the successful completion of this project.
Place: Pathanamthitta ARJUN K VINOD
5
ABSTRACT
As a side effect of increasingly popular social media, cyberbullying has
emerged as a serious problem afflicting children, adolescents and young
adults. Machine learning techniques make automatic detection of bullying
messages in social media possible and this could help to construct a healthy
and safe social media environment. In this meaningful research area, one
critical issue is robust and discriminative numerical representation learning
of text messages.
Our method named Semantic-Enhanced Marginalized Denoising Auto
Encoder (smSDA) is developed via semantic extension of the popular deep
learning model stacked denoising auto encoder. The semantic extension
consists of semantic dropout noise and sparsity constraints, where the
semantic dropout noise is designed based on domain knowledge and the
word embedding technique . Our proposed method can exploit the hidden
feature structure of bullying information and learn a robust and
discriminative representation of text.
6
TABLE OF CONTENTS PAGE NO:
1.INTRODUCTION 7
2.BACKGROUND 8
3.FLOW DIAGRAM OF APPLICATION 9
4.CONCLUSION 11
5.REFERENCES 12
7
1. INTRODUCTION
Social media may have some side effects such as cyberbullying, which may
have negative impacts on the life of people, especially children and teenagers.
The objective of this project is to develop a social media network like Facebook
with some functionalities and demonstrate how cyberbullying can be prevented
on social media.
Most of us would agree that any form of bullying is unacceptable. However,
the same ‘us’ again, at some point in our lives, may have been a victim of
bullying or may have bullied others. For the victims, some are able to move on
and live normal lives whilst others are less fortunate. Some of them carry life-
long scars from the trauma, damaging their self-worth, confidence and
happiness, and, in the worst cases, some of them would resort to suicide due to
the weight of the bullying and the foreboding pain. The perpetrators I assume
would carry on with their lives regardless
Due to its anonymous nature also, it is hard to detect this form of bullying
and policing it is almost impossible. Cyberbullying victims are usually told to
simply turn off the computer and ignore the bullies but this rarely works
unless one shuts down all communication in social media. On the part of the
perpetrator, the act of cyberbullying, due to its detached nature, pretty much
encourages a lack of empathy towards the victim. In contrast to traditional
bullying, the cyber bully would not be there in person as the victim is hurt or
damaged by the cyberbullying, leaving less room for feeling sorry for the
victim or acknowledgement that it could have gone too far. Additionally, the
anonymous nature of cyberbullying also encourages the cyberbully to be
brazen and ruthless in their acts as it can be tremendously difficult to identify
the cyberbully, making it very easy for them to cyberbully someone time and
time again while also not seeing any true consequence to their actions.
8
2.BACKGROUND
Using various social media applications, people can experience
convenient communication and enjoy enormous information. However,
social media may have some side effects such as cyberbullying, which may
have negative impacts on the life of people, especially children and
teenagers. Cyberbullying is the use of technology like the internet, email, cell
phones, social media or pictures to harass, threaten, embarrass, or target a
person. Usually, it occurs among young people. But when an adult is
involved, it may mean cyber harassment or cyber stalking, a crime that can
have legal consequences and include imprisonment.
It includes
• Sending inappropriate text messages.
• Posting statements online that are vulgar or unacceptable.
• Sending or posting pictures that are not permitted by you.
• Making negative comments.
• Blackmailing with certain demands.
• Stalking and use of intimidation.
• Threats of violence or death.
• Sexually explicit photos or descriptions, which is considered
pornography.
• Secretly-recorded photos or videos that were taken without the subject’s
knowledge.
9
3.FLOW DIAGRAM OF APPLICATION
1.For a general user
The details of the workflows are as explained above.
1) The user logs on to the web portal.
2) The user selects the menu to view a profile and sends a friend request
3) After friend request is approved, photos and messages can be shared.
4) When sharing private and public message and posting on the wall, check
for bullying words.
10
2.For an admin
The details of the workflows are as explained below.
1) The admin logs on to the web portal.
2) The admin selects the menu and finds abnormal user
3) The admin can block bullying post
11
4.CONCLUSION
The proposed OSN Cyberbullying system is designed to prevent Cyberbullying in
Social media space. By designing semantic dropout noise and enforcing sparsity,
we have developed semantic-enhanced marginalized denoising autoencoder as a
specialized representation learning model for cyberbullying detection. Also, the
design is verified for the functional correctness, code and functional coverage
numbers are used for measuring the verification activity
12
5.REFERENCES
[1] Y. Bengio, A. Courville, and P. Vincent, “Representation
learning: A review and new perspectives,” Pattern Analysis and
Machine Intelligence, IEEE Transactions on, vol. 35, no. 8, pp.
1798–1828, 2013.
[2] A. M. Kaplan and M. Haenlein, “Users of the world, unite!
The challenges and opportunities of social media,” Business
horizons, vol. 53, no. 1, pp. 59–68, 2010.
[3] R. M. Kowalski, G. W. Giumetti, A. N. Schroeder, and M.
R.Lattanner, “Bullying in the digital age: A critical review and
metaanalysis of cyberbullying research among youth.” 2014.
[4] B. K. Biggs, J. M. Nelson, and M. L. Sampilo, “Peer relations
in the anxiety–depression link: Test of a mediation model,”
Anxiety, Stress, & Coping, vol. 23, no. 4, pp. 431–447, 2010.
13

More Related Content

What's hot

Hand Gesture Recognition Using OpenCV Python
Hand Gesture Recognition Using OpenCV Python Hand Gesture Recognition Using OpenCV Python
Hand Gesture Recognition Using OpenCV Python Arijit Mukherjee
 
Sign Language Recognition System.pptx
Sign Language Recognition System.pptxSign Language Recognition System.pptx
Sign Language Recognition System.pptxDhruvMittal81
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging TechnologiesSeminar Links
 
The Rise of Deep Fake Technology: A Comprehensive Guide
The Rise of Deep Fake Technology: A Comprehensive GuideThe Rise of Deep Fake Technology: A Comprehensive Guide
The Rise of Deep Fake Technology: A Comprehensive Guidefindeverything
 
Hand Gesture Recognition Applications
Hand Gesture Recognition ApplicationsHand Gesture Recognition Applications
Hand Gesture Recognition ApplicationsImon_Barua
 
Online Quiz System Project Report ppt
Online Quiz System Project Report pptOnline Quiz System Project Report ppt
Online Quiz System Project Report pptKishan Maurya
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyShubhamLamichane
 
Deepfake detection
Deepfake detectionDeepfake detection
Deepfake detectionWeverify
 
Forged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesForged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesAnca Georgiana Rusu
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionNikyaa7
 
edge computing seminar report.pdf
edge computing seminar report.pdfedge computing seminar report.pdf
edge computing seminar report.pdffirstlast467690
 
DeepFake Seminar.pptx
DeepFake Seminar.pptxDeepFake Seminar.pptx
DeepFake Seminar.pptxspchinchole20
 
Deepfakes: Trick or Treat?
Deepfakes: Trick or Treat?Deepfakes: Trick or Treat?
Deepfakes: Trick or Treat?Ian McCarthy
 
SRS FOR CHAT APPLICATION
SRS FOR CHAT APPLICATIONSRS FOR CHAT APPLICATION
SRS FOR CHAT APPLICATIONAtul Kushwaha
 

What's hot (20)

Virtual mouse
Virtual mouseVirtual mouse
Virtual mouse
 
Hand Gesture Recognition Using OpenCV Python
Hand Gesture Recognition Using OpenCV Python Hand Gesture Recognition Using OpenCV Python
Hand Gesture Recognition Using OpenCV Python
 
Sign Language Recognition System.pptx
Sign Language Recognition System.pptxSign Language Recognition System.pptx
Sign Language Recognition System.pptx
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies
 
The Rise of Deep Fake Technology: A Comprehensive Guide
The Rise of Deep Fake Technology: A Comprehensive GuideThe Rise of Deep Fake Technology: A Comprehensive Guide
The Rise of Deep Fake Technology: A Comprehensive Guide
 
Hand Gesture Recognition Applications
Hand Gesture Recognition ApplicationsHand Gesture Recognition Applications
Hand Gesture Recognition Applications
 
Fog computing
Fog computingFog computing
Fog computing
 
Online Quiz System Project Report ppt
Online Quiz System Project Report pptOnline Quiz System Project Report ppt
Online Quiz System Project Report ppt
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
E ball technology
E ball technologyE ball technology
E ball technology
 
Deep fake
Deep fakeDeep fake
Deep fake
 
Deepfake detection
Deepfake detectionDeepfake detection
Deepfake detection
 
Forged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesForged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakes
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
3D internet
3D internet3D internet
3D internet
 
Face recognition
Face recognitionFace recognition
Face recognition
 
edge computing seminar report.pdf
edge computing seminar report.pdfedge computing seminar report.pdf
edge computing seminar report.pdf
 
DeepFake Seminar.pptx
DeepFake Seminar.pptxDeepFake Seminar.pptx
DeepFake Seminar.pptx
 
Deepfakes: Trick or Treat?
Deepfakes: Trick or Treat?Deepfakes: Trick or Treat?
Deepfakes: Trick or Treat?
 
SRS FOR CHAT APPLICATION
SRS FOR CHAT APPLICATIONSRS FOR CHAT APPLICATION
SRS FOR CHAT APPLICATION
 

Similar to cyberbullying detection seminar.pdf

A Comparative Study Of Cyber Bullying Among Undergraduate Students
A Comparative Study Of Cyber Bullying Among Undergraduate StudentsA Comparative Study Of Cyber Bullying Among Undergraduate Students
A Comparative Study Of Cyber Bullying Among Undergraduate StudentsLori Mitchell
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityITIIIndustries
 
Cyberbullying_GauriDesai_ETRX_TE_V_A.pdf
Cyberbullying_GauriDesai_ETRX_TE_V_A.pdfCyberbullying_GauriDesai_ETRX_TE_V_A.pdf
Cyberbullying_GauriDesai_ETRX_TE_V_A.pdfSaquibhShaikh
 
Bullyspoiler: Detect and Block Cyberbullying Tweet and Bully using Deep Learn...
Bullyspoiler: Detect and Block Cyberbullying Tweet and Bully using Deep Learn...Bullyspoiler: Detect and Block Cyberbullying Tweet and Bully using Deep Learn...
Bullyspoiler: Detect and Block Cyberbullying Tweet and Bully using Deep Learn...Associate Professor in VSB Coimbatore
 
IMPACT OF SOCIAL NETWORKING SITES AMONG STUDENTS
IMPACT OF SOCIAL NETWORKING SITES AMONG STUDENTSIMPACT OF SOCIAL NETWORKING SITES AMONG STUDENTS
IMPACT OF SOCIAL NETWORKING SITES AMONG STUDENTSbhazz
 
Jacque lewis - Senior Project -w/o script
Jacque lewis - Senior Project -w/o scriptJacque lewis - Senior Project -w/o script
Jacque lewis - Senior Project -w/o scriptJacque Lewis
 
O5 - Cyberbullying Guide
O5 - Cyberbullying GuideO5 - Cyberbullying Guide
O5 - Cyberbullying GuideInterMediaKT
 
O5 - Cyberbullying Guide
O5 - Cyberbullying GuideO5 - Cyberbullying Guide
O5 - Cyberbullying GuideInterMediaKT
 
Makalah cyber crime dalam Bahasa Inggris dan Indonesia
Makalah cyber crime dalam Bahasa Inggris dan IndonesiaMakalah cyber crime dalam Bahasa Inggris dan Indonesia
Makalah cyber crime dalam Bahasa Inggris dan Indonesiakorneliszalukhu
 
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNINGBINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNINGIRJET Journal
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...IOSR Journals
 
Healing our online sickness by cyber path
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber pathProfsdetchana Murthy
 
2021 adt imc_u_ba19_t0563_abah_stephany_mbong_680829564_task_9
2021 adt imc_u_ba19_t0563_abah_stephany_mbong_680829564_task_92021 adt imc_u_ba19_t0563_abah_stephany_mbong_680829564_task_9
2021 adt imc_u_ba19_t0563_abah_stephany_mbong_680829564_task_9PuwaCalvin
 
Cyber Bullying on Social Media Sites
Cyber Bullying on Social Media SitesCyber Bullying on Social Media Sites
Cyber Bullying on Social Media SitesSwapnil Shahade
 
SEG AT2 final update
SEG AT2 final updateSEG AT2 final update
SEG AT2 final updateBradyTrotman
 

Similar to cyberbullying detection seminar.pdf (20)

SAMUEL FULL MSC PROJECT
SAMUEL FULL MSC PROJECTSAMUEL FULL MSC PROJECT
SAMUEL FULL MSC PROJECT
 
A Comparative Study Of Cyber Bullying Among Undergraduate Students
A Comparative Study Of Cyber Bullying Among Undergraduate StudentsA Comparative Study Of Cyber Bullying Among Undergraduate Students
A Comparative Study Of Cyber Bullying Among Undergraduate Students
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
 
Cyberbullying_GauriDesai_ETRX_TE_V_A.pdf
Cyberbullying_GauriDesai_ETRX_TE_V_A.pdfCyberbullying_GauriDesai_ETRX_TE_V_A.pdf
Cyberbullying_GauriDesai_ETRX_TE_V_A.pdf
 
Bullyspoiler: Detect and Block Cyberbullying Tweet and Bully using Deep Learn...
Bullyspoiler: Detect and Block Cyberbullying Tweet and Bully using Deep Learn...Bullyspoiler: Detect and Block Cyberbullying Tweet and Bully using Deep Learn...
Bullyspoiler: Detect and Block Cyberbullying Tweet and Bully using Deep Learn...
 
IMPACT OF SOCIAL NETWORKING SITES AMONG STUDENTS
IMPACT OF SOCIAL NETWORKING SITES AMONG STUDENTSIMPACT OF SOCIAL NETWORKING SITES AMONG STUDENTS
IMPACT OF SOCIAL NETWORKING SITES AMONG STUDENTS
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Jacque lewis - Senior Project -w/o script
Jacque lewis - Senior Project -w/o scriptJacque lewis - Senior Project -w/o script
Jacque lewis - Senior Project -w/o script
 
O5 - Cyberbullying Guide
O5 - Cyberbullying GuideO5 - Cyberbullying Guide
O5 - Cyberbullying Guide
 
O5 - Cyberbullying Guide
O5 - Cyberbullying GuideO5 - Cyberbullying Guide
O5 - Cyberbullying Guide
 
Makalah cyber crime dalam Bahasa Inggris dan Indonesia
Makalah cyber crime dalam Bahasa Inggris dan IndonesiaMakalah cyber crime dalam Bahasa Inggris dan Indonesia
Makalah cyber crime dalam Bahasa Inggris dan Indonesia
 
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNINGBINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
 
Watcha Webtrap!
Watcha Webtrap!Watcha Webtrap!
Watcha Webtrap!
 
SEG AT2.pptx
SEG AT2.pptxSEG AT2.pptx
SEG AT2.pptx
 
L017146571
L017146571L017146571
L017146571
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
 
Healing our online sickness by cyber path
Healing our online sickness by cyber pathHealing our online sickness by cyber path
Healing our online sickness by cyber path
 
2021 adt imc_u_ba19_t0563_abah_stephany_mbong_680829564_task_9
2021 adt imc_u_ba19_t0563_abah_stephany_mbong_680829564_task_92021 adt imc_u_ba19_t0563_abah_stephany_mbong_680829564_task_9
2021 adt imc_u_ba19_t0563_abah_stephany_mbong_680829564_task_9
 
Cyber Bullying on Social Media Sites
Cyber Bullying on Social Media SitesCyber Bullying on Social Media Sites
Cyber Bullying on Social Media Sites
 
SEG AT2 final update
SEG AT2 final updateSEG AT2 final update
SEG AT2 final update
 

Recently uploaded

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 

Recently uploaded (20)

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 

cyberbullying detection seminar.pdf

  • 1. 1 CYBERBULLYING DETECTION Submitted to the Mahatma Gandhi University in partial Fullfillment of the requirement for the Degree of BCA CBCS BCA Degree Programme Submitted by ARJUN K VINOD Reg No: 200021094304 Under the guidance of Mr. AZHAR BIN SAGAR Assistant Professor Department of ComputerApplication Musaliar College of Arts and Science,Pathanamthitta (Affiliated to MG University, Kottayam)
  • 2. 2 MUSALIAR COLLEGE OFARTS AND SCIENCE PATHANAMTHITTA (Affiliated to MG University, Kottayam) CERTIFICATE This is to certify that the seminar entitled “CYBERBULLYING DETECTION” is a bonafide record of work done by ARJUN K VINOD (Reg.No:200021094304) for the partial fulfillment of the requirements for the award of the Degree of Bachelor of Computer Application of Mahatma Gandhi University, Kottayam. Prof. Dr. Vilzon Koshy Asst.Prof. Anju ElizabethCherian (Principal) (Vice Principal) Asst. Prof. Leena Natarajan Asst.Prof. Azhar Bin Sagar (Head of the Department) (Faculty Guide) Internal Examiner External Examiner
  • 3. 3 DECLARATION I hereby declare that this seminar report “CYBERBULLYING DETECTION” is a bonafide work done at Musaliar College of Arts & Science, Pathanamthitta, towards the partial fulfillment of the requirements for the award of Degree of Bachelor of Computer Application from Mahatma Gandhi University, Kottayam during the academic year 2018-2021. Place: Pathanamthitta ARJUN K VINOD Date: Reg No: 200021094304
  • 4. 4 ACKNOWLEDGEMENT During the course of the present study, I received help and inspiration from many individuals and sources. I wish to express my deep sense of gratitude to all those who contributed directly or indirectly to complete my seminar work. I am greatly indebted to our Principal Prof. Dr.Vilzon Koshy for providing all the required facilities for completing the seminar work. I take this opportunity to express my heartfelt thanks and gratitude to our Vice Principal Mrs. Anju Elizabeth Cherian for the valuable support and guidance. My sincere thanks to Asst. Prof. Leena Natarajan Head of the Department whose remarkable ideas and supervision made me to do Completing This Seminar successful1. I am thankful to my guide Asst. Prof Azhar Bin Sagar for the keen interest and continuous encouragement, which had inspired us throughout the study. I express my sincere thanks to all faculty members, friends, library facilities provided and well-wishers for their cooperation in completing this seminar. Above all I thank God “the almighty” for the benevolence he has shown to us for the successful completion of this project. Place: Pathanamthitta ARJUN K VINOD
  • 5. 5 ABSTRACT As a side effect of increasingly popular social media, cyberbullying has emerged as a serious problem afflicting children, adolescents and young adults. Machine learning techniques make automatic detection of bullying messages in social media possible and this could help to construct a healthy and safe social media environment. In this meaningful research area, one critical issue is robust and discriminative numerical representation learning of text messages. Our method named Semantic-Enhanced Marginalized Denoising Auto Encoder (smSDA) is developed via semantic extension of the popular deep learning model stacked denoising auto encoder. The semantic extension consists of semantic dropout noise and sparsity constraints, where the semantic dropout noise is designed based on domain knowledge and the word embedding technique . Our proposed method can exploit the hidden feature structure of bullying information and learn a robust and discriminative representation of text.
  • 6. 6 TABLE OF CONTENTS PAGE NO: 1.INTRODUCTION 7 2.BACKGROUND 8 3.FLOW DIAGRAM OF APPLICATION 9 4.CONCLUSION 11 5.REFERENCES 12
  • 7. 7 1. INTRODUCTION Social media may have some side effects such as cyberbullying, which may have negative impacts on the life of people, especially children and teenagers. The objective of this project is to develop a social media network like Facebook with some functionalities and demonstrate how cyberbullying can be prevented on social media. Most of us would agree that any form of bullying is unacceptable. However, the same ‘us’ again, at some point in our lives, may have been a victim of bullying or may have bullied others. For the victims, some are able to move on and live normal lives whilst others are less fortunate. Some of them carry life- long scars from the trauma, damaging their self-worth, confidence and happiness, and, in the worst cases, some of them would resort to suicide due to the weight of the bullying and the foreboding pain. The perpetrators I assume would carry on with their lives regardless Due to its anonymous nature also, it is hard to detect this form of bullying and policing it is almost impossible. Cyberbullying victims are usually told to simply turn off the computer and ignore the bullies but this rarely works unless one shuts down all communication in social media. On the part of the perpetrator, the act of cyberbullying, due to its detached nature, pretty much encourages a lack of empathy towards the victim. In contrast to traditional bullying, the cyber bully would not be there in person as the victim is hurt or damaged by the cyberbullying, leaving less room for feeling sorry for the victim or acknowledgement that it could have gone too far. Additionally, the anonymous nature of cyberbullying also encourages the cyberbully to be brazen and ruthless in their acts as it can be tremendously difficult to identify the cyberbully, making it very easy for them to cyberbully someone time and time again while also not seeing any true consequence to their actions.
  • 8. 8 2.BACKGROUND Using various social media applications, people can experience convenient communication and enjoy enormous information. However, social media may have some side effects such as cyberbullying, which may have negative impacts on the life of people, especially children and teenagers. Cyberbullying is the use of technology like the internet, email, cell phones, social media or pictures to harass, threaten, embarrass, or target a person. Usually, it occurs among young people. But when an adult is involved, it may mean cyber harassment or cyber stalking, a crime that can have legal consequences and include imprisonment. It includes • Sending inappropriate text messages. • Posting statements online that are vulgar or unacceptable. • Sending or posting pictures that are not permitted by you. • Making negative comments. • Blackmailing with certain demands. • Stalking and use of intimidation. • Threats of violence or death. • Sexually explicit photos or descriptions, which is considered pornography. • Secretly-recorded photos or videos that were taken without the subject’s knowledge.
  • 9. 9 3.FLOW DIAGRAM OF APPLICATION 1.For a general user The details of the workflows are as explained above. 1) The user logs on to the web portal. 2) The user selects the menu to view a profile and sends a friend request 3) After friend request is approved, photos and messages can be shared. 4) When sharing private and public message and posting on the wall, check for bullying words.
  • 10. 10 2.For an admin The details of the workflows are as explained below. 1) The admin logs on to the web portal. 2) The admin selects the menu and finds abnormal user 3) The admin can block bullying post
  • 11. 11 4.CONCLUSION The proposed OSN Cyberbullying system is designed to prevent Cyberbullying in Social media space. By designing semantic dropout noise and enforcing sparsity, we have developed semantic-enhanced marginalized denoising autoencoder as a specialized representation learning model for cyberbullying detection. Also, the design is verified for the functional correctness, code and functional coverage numbers are used for measuring the verification activity
  • 12. 12 5.REFERENCES [1] Y. Bengio, A. Courville, and P. Vincent, “Representation learning: A review and new perspectives,” Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 35, no. 8, pp. 1798–1828, 2013. [2] A. M. Kaplan and M. Haenlein, “Users of the world, unite! The challenges and opportunities of social media,” Business horizons, vol. 53, no. 1, pp. 59–68, 2010. [3] R. M. Kowalski, G. W. Giumetti, A. N. Schroeder, and M. R.Lattanner, “Bullying in the digital age: A critical review and metaanalysis of cyberbullying research among youth.” 2014. [4] B. K. Biggs, J. M. Nelson, and M. L. Sampilo, “Peer relations in the anxiety–depression link: Test of a mediation model,” Anxiety, Stress, & Coping, vol. 23, no. 4, pp. 431–447, 2010.
  • 13. 13