SlideShare a Scribd company logo
1 of 37
CYBERBULLYING DETECTION USING
MACHINE LEARNING
Under the Guidance of
Kavyashree J
Presented By:
Thejas C Gowda(1RG20CS064)
ABSTRACT
● With the widespread use of social media in this era,
cyberbullying increased rapidly as a cybercrime.
● Cyberbullying is a willful and repeated harm inflicted
through the use of computer, cell phones, and other electronic devices.
● The proposed system aims at detecting cyberbullying, it detects abusive
comments and messages in social media platform.
● The Machine learning algorithm,Naive bayes is used to classify comments and
messages as bullying and non-bullying.
● The project ‘Cyberbullying Detection Using Machine Learning’ discusses and
implements the approach of machine learning in order to solve the threat of
cyberbullying, and thus makes social media a safe place for the users.
EXISTING SYSTEM
● For several years, the researchers have worked intensively on cyberbullying
detection to find a way to control or reduce cyberbullying in Social Media
platforms.
● In a research work by Massachusetts Institute of Technology, a system to detect
cyberbullying through textual context in YouTube video comments was
developed, but the system showed less precise classification outcome and
increased false positives.
● Generally most existing systems are focused on effects after cyberbullying
incident and there is no accurate system for online cyberbullying detection.
PROPOSED SYSTEM
● The proposed system employs machine learning to avoid human
intervention.
● A dataset containing cyberbullying and non-bullying comments is used to
train the machine learning model using the Sklearn library in Python.
● Naive Bayes algorithm is used for detecting abusive comments and
messages in social media.
● The Naive Bayes algorithm states that:
P(A/B)=(P(B/A) P(A))/P(B)
● In the proposed system automated detection of bullying comments in
social media is implemented.
● The proposed system is platform independent, it can be implemented on
any operating system and it is free to use.
MODULE DESCRIPTION
● User module.
● Admin module.
● Machine learning module.
MODULE FUNCTIONALITIES
❏ USER MODULE
● Users can sign up to the web application by registering themselves by
providing details like user name,password etc..
● Registered users can also sign in to their profile by using user id and password.
● They can post videos,stories and photos in the web application.
● Users can send friend requests to other users and can also chat with their
friends.
● Users can view,like and comment the videos and photos posted by their
friends in the web application.
❏ ADMIN MODULE
● Admin can handle and make changes in the web application.
● They can also view the requests from users .
● They can also view the comments that have been classified as bullying
and non-bullying.
● They can manage the notifications of users.
❏ MACHINE LEARNING MODULE
● The Machine Learning module is responsible for classifying
comments and messages as bullying or non-bullying.
● From a vast set of comments and messages, the Naive Bayes
algorithm is used to predict bullying comments and messages.
● This module includes the following steps :
➢ Data collection
➢ Data preprocessing
➢ Segmentation
➢ Feature extraction
➢ Training
➢ Testing
FLOWCHART OF CYBERBULLYING DETECTION SYSTEM
1. DATA COLLECTION
● Collecting data for training the Machine Learning model is the basic step
in the machine learning pipeline.
● The predictions made by Machine Learning systems can only be as good as
the data on which they have been trained.
● In this system, dataset containing bullying as well as non-bullying
comments and messages.
● The data set is downloaded from KAGGLE website.
● 80% of dataset is used for training and the remaining 20% is used for
testing.
2. DATA PREPROCESSING
● Real-world raw data and images are often incomplete, inconsistent and lacking in
certain behaviors or trends. They are also likely to contain many errors. So, once
collected, they are pre-processed into a format the machine learning algorithm
can use for the model.
● Data preprocessing in Machine Learning is a crucial step that helps enhance the
quality of data to promote the extraction of meaningful insights from the data.
● The proprocessing step also includes the removal of stop words, special characters
and the conversion of uppercase letters to lowercase.
● The Lemmatization step includes converting tense word into root word. For
example, the word running is converted to its root word run.
3. SEGMENTATION
● Segmentation can be defined as the process of separating sentences
into different tokens.
● N-grams are used for grouping tokens.
● N-grams are used for a variety of things. Some examples include auto
completion of sentences.
● In this project, 2-gram is used to group tokens.
4. FEATURE EXTRACTION
● Feature extraction is the process of taking out a list of words from the text data
and then transforming them into a feature set which is usable by a classifier.
● In this system, TF-IDF vectorizer is used for feature extraction.
● TF-IDF stands for term frequency-inverse document frequency and it is a
measure, used to quantify the importance or relevance of string
representations in a document.
● TF-IDF associates each word in a document with a number that represents how
relevant each word is in that document.
5. TRAINING
● Model training is the key step in machine learning that results in a model ready
to be validated, tested, and deployed.
● The performance of the model determines the quality of the applications that
are built using it.
● Quality of training data and the training algorithm are both important assets
during the model training phase.
● Typically, dataset is split for training and testing.
● All these aspects of model training make it both an involved and important
process in the overall machine learning development cycle.
6. TESTING
● In machine learning, model testing is referred to as the process where
the performance of a fully trained model is evaluated on a testing set.
● The testing set consisting of a set of testing samples should be
separated from the both training and validation sets, but it should
follow the same probability distribution as the training set.
● Each testing sample has a known value of the target.
DOMAIN THEORY
➔ Machine learning
● Machine learning (ML) is the study of computer algorithms that improve
automatically through experience.
● Machine learning involves computers discovering how they can perform tasks
without being explicitly programmed to do so.
● The Machine Learning process starts with inputting training data into the
selected algorithm.
● New input data is fed into the machine learning algorithm to test whether the
algorithm works correctly.
➔ NAIVE BAYES
● A Naive Bayes classifier is a probabilistic machine learning model
that’s used for classification task.
● The classifier is based on the Bayes theorem.
Bayes Theorem :
P(A/B)=(P(B/A) P(A))/P(B)
● This system uses Multinomial Naive Bayes Classifier.
● The features/predictors used by the classifier are the frequency of
the words present in the document.
CONFUSION MATRIX
Fig : Confusion Matrix
DATABASE TABLE
ADMIN
USER
POST
MESSAGES
COMMENTS
USER PROFILE
DATA FLOW DIAGRAMS
Fig. : Level 0 DFD
Fig.: Level 1 DFD
ER DIAGRAM
ADMIN LOGIN
ADMIN HOME PAGE
SIGNUP PAGE
LOGIN PAGE
HOME PAGE
WARNING MESSAGE
RESTRICTED ACCOUNT
COMPARISON BETWEEN
MACHINE LEARNING AND TRANSFER LEARNING APPROACH
Machine Learning:
Machine learning is a subset of artificial intelligence that focuses on the development of
algorithms that allow computers to learn from and make predictions or decisions based on data. It involves
training models on labeled data to recognize patterns and make predictions without being explicitly
programmed.
Transfer Learning:
Transfer learning is a machine learning technique where a model trained on one task is reused or
adapted as the starting point for a model on a second related task.
Usage:
Machine Learning:
In traditional machine learning, models are trained from scratch on specific datasets for
particular tasks, such as image classification, text sentiment analysis, or predictive analytics.
Transfer Learning:
Transfer learning is commonly used in scenarios where data for a specific task is limited or
expensive to obtain. By leveraging pre-trained models, transfer learning can adapt those models to new tasks
with less data.
.
Training Process:
Machine Learning:
In machine learning, the training process involves feeding labeled data into an algorithm,
which learns to recognize patterns and make predictions based on that data through iterative adjustments
to its internal parameters.
Transfer Learning:
Transfer learning typically involves taking a pre-trained model, removing the last few layers
(which are task-specific), and then adding new layers tailored to the new task. Data Requirements:
Machine Learning:
Traditional machine learning models require a large amount of labeled data specific to the
task at hand for training.
Transfer Learning:
Transfer learning can be effective with smaller datasets since it leverages knowledge learned
from a different but related task.
Applications:
Machine Learning:
Machine learning techniques are applied in a wide range of applications, including image and
speech recognition, natural language processing, recommendation systems, and more.
Transfer Learning:
Transfer learning is particularly useful in computer vision tasks like object detection and
image classification, as well as in natural language processing tasks such as sentiment analysis and text
CONCLUSION
The overall aim of the project “Cyberbullying Detection Using Machine
Learning” is to develop a system that automatically classifies comments
and messages as bullying or non-bullying and also remove the bullying
comments from the web application.
BIBLIOGRAPHY
Referenced Sites:
1. Cynthia Van Hee, Gilles Jacobs, Chris Emmery, Bart Desmet, Els Lefever, Ben
Verhoeven, Guy De Pauw, Walter Daelemans, Véronique Hoste, Automatic
detection of cyberbullying in social media text, PloS one 13 (10), e0203794,
2018
2. Sweta Agrawal, Amit Awekar, European conference on information retrieval,
Deep learning for detecting cyberbullying across multiple social media
platforms, 141-153, 2018
3. Ong Chee Hang, Halina Mohamed Dahlan 2019 6th International Conference
on Research and Innovation in Information Systems, Cyberbullying lexicon
for social media, (ICRIIS), 1-6, 2019
4. John Hani, Mohamed Nashaat, Mostafa Ahmed, Zeyad Emad, Eslam Amer,
Ammar Mohammed, Social media cyberbullying detection using machine
learning, Int. J. Adv. Comput. Sci. Appl 10 (5), 703-707, 2019

More Related Content

Similar to cyberbullyingdetectionusingmachinelearning-11-220913143556-fec10e26.pptx

Handwritten Text Recognition Using Machine Learning
Handwritten Text Recognition Using Machine LearningHandwritten Text Recognition Using Machine Learning
Handwritten Text Recognition Using Machine LearningIRJET Journal
 
Introduction to Machine Learning.pptx
Introduction to Machine Learning.pptxIntroduction to Machine Learning.pptx
Introduction to Machine Learning.pptxDr. Amanpreet Kaur
 
IRJET - Comparative Analysis of GUI based Prediction of Parkinson Disease usi...
IRJET - Comparative Analysis of GUI based Prediction of Parkinson Disease usi...IRJET - Comparative Analysis of GUI based Prediction of Parkinson Disease usi...
IRJET - Comparative Analysis of GUI based Prediction of Parkinson Disease usi...IRJET Journal
 
Algorithm ExampleFor the following taskUse the random module .docx
Algorithm ExampleFor the following taskUse the random module .docxAlgorithm ExampleFor the following taskUse the random module .docx
Algorithm ExampleFor the following taskUse the random module .docxdaniahendric
 
IRJET- Design and Development of Web Application for Student Placement Tr...
IRJET-  	  Design and Development of Web Application for Student Placement Tr...IRJET-  	  Design and Development of Web Application for Student Placement Tr...
IRJET- Design and Development of Web Application for Student Placement Tr...IRJET Journal
 
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...IRJET Journal
 
online-examination-system.pptx
online-examination-system.pptxonline-examination-system.pptx
online-examination-system.pptxNehal1231
 
Customer relationship management
Customer relationship managementCustomer relationship management
Customer relationship managementRohit Gupta
 
Top Natural Language Processing |aitech.studio
Top Natural Language Processing |aitech.studioTop Natural Language Processing |aitech.studio
Top Natural Language Processing |aitech.studioAITechStudio
 
Hostel managements system
Hostel managements systemHostel managements system
Hostel managements systemFahad Chishti
 
Lab management
Lab managementLab management
Lab managementlogumca
 
e3f55595181f7cad006f26db820fb78ec146e00e-1646623528083 (1).pdf
e3f55595181f7cad006f26db820fb78ec146e00e-1646623528083 (1).pdfe3f55595181f7cad006f26db820fb78ec146e00e-1646623528083 (1).pdf
e3f55595181f7cad006f26db820fb78ec146e00e-1646623528083 (1).pdfSILVIUSyt
 
Training and Placement Portal
Training and Placement PortalTraining and Placement Portal
Training and Placement PortalIRJET Journal
 
College Management System project
College Management System projectCollege Management System project
College Management System projectManish Kushwaha
 
Machine Learning Contents.pptx
Machine Learning Contents.pptxMachine Learning Contents.pptx
Machine Learning Contents.pptxNaveenkushwaha18
 

Similar to cyberbullyingdetectionusingmachinelearning-11-220913143556-fec10e26.pptx (20)

Handwritten Text Recognition Using Machine Learning
Handwritten Text Recognition Using Machine LearningHandwritten Text Recognition Using Machine Learning
Handwritten Text Recognition Using Machine Learning
 
Introduction to Machine Learning.pptx
Introduction to Machine Learning.pptxIntroduction to Machine Learning.pptx
Introduction to Machine Learning.pptx
 
IRJET - Comparative Analysis of GUI based Prediction of Parkinson Disease usi...
IRJET - Comparative Analysis of GUI based Prediction of Parkinson Disease usi...IRJET - Comparative Analysis of GUI based Prediction of Parkinson Disease usi...
IRJET - Comparative Analysis of GUI based Prediction of Parkinson Disease usi...
 
Algorithm ExampleFor the following taskUse the random module .docx
Algorithm ExampleFor the following taskUse the random module .docxAlgorithm ExampleFor the following taskUse the random module .docx
Algorithm ExampleFor the following taskUse the random module .docx
 
Eckovation Machine Learning
Eckovation Machine LearningEckovation Machine Learning
Eckovation Machine Learning
 
Q44098893
Q44098893Q44098893
Q44098893
 
Student report
Student reportStudent report
Student report
 
IRJET- Design and Development of Web Application for Student Placement Tr...
IRJET-  	  Design and Development of Web Application for Student Placement Tr...IRJET-  	  Design and Development of Web Application for Student Placement Tr...
IRJET- Design and Development of Web Application for Student Placement Tr...
 
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
 
Requirement and system analysis
Requirement and system analysisRequirement and system analysis
Requirement and system analysis
 
online-examination-system.pptx
online-examination-system.pptxonline-examination-system.pptx
online-examination-system.pptx
 
Customer relationship management
Customer relationship managementCustomer relationship management
Customer relationship management
 
Machine Learning
Machine LearningMachine Learning
Machine Learning
 
Top Natural Language Processing |aitech.studio
Top Natural Language Processing |aitech.studioTop Natural Language Processing |aitech.studio
Top Natural Language Processing |aitech.studio
 
Hostel managements system
Hostel managements systemHostel managements system
Hostel managements system
 
Lab management
Lab managementLab management
Lab management
 
e3f55595181f7cad006f26db820fb78ec146e00e-1646623528083 (1).pdf
e3f55595181f7cad006f26db820fb78ec146e00e-1646623528083 (1).pdfe3f55595181f7cad006f26db820fb78ec146e00e-1646623528083 (1).pdf
e3f55595181f7cad006f26db820fb78ec146e00e-1646623528083 (1).pdf
 
Training and Placement Portal
Training and Placement PortalTraining and Placement Portal
Training and Placement Portal
 
College Management System project
College Management System projectCollege Management System project
College Management System project
 
Machine Learning Contents.pptx
Machine Learning Contents.pptxMachine Learning Contents.pptx
Machine Learning Contents.pptx
 

Recently uploaded

Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfMilind Agarwal
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 

Recently uploaded (20)

Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 

cyberbullyingdetectionusingmachinelearning-11-220913143556-fec10e26.pptx

  • 1. CYBERBULLYING DETECTION USING MACHINE LEARNING Under the Guidance of Kavyashree J Presented By: Thejas C Gowda(1RG20CS064)
  • 2. ABSTRACT ● With the widespread use of social media in this era, cyberbullying increased rapidly as a cybercrime. ● Cyberbullying is a willful and repeated harm inflicted through the use of computer, cell phones, and other electronic devices. ● The proposed system aims at detecting cyberbullying, it detects abusive comments and messages in social media platform. ● The Machine learning algorithm,Naive bayes is used to classify comments and messages as bullying and non-bullying. ● The project ‘Cyberbullying Detection Using Machine Learning’ discusses and implements the approach of machine learning in order to solve the threat of cyberbullying, and thus makes social media a safe place for the users.
  • 3. EXISTING SYSTEM ● For several years, the researchers have worked intensively on cyberbullying detection to find a way to control or reduce cyberbullying in Social Media platforms. ● In a research work by Massachusetts Institute of Technology, a system to detect cyberbullying through textual context in YouTube video comments was developed, but the system showed less precise classification outcome and increased false positives. ● Generally most existing systems are focused on effects after cyberbullying incident and there is no accurate system for online cyberbullying detection.
  • 4. PROPOSED SYSTEM ● The proposed system employs machine learning to avoid human intervention. ● A dataset containing cyberbullying and non-bullying comments is used to train the machine learning model using the Sklearn library in Python. ● Naive Bayes algorithm is used for detecting abusive comments and messages in social media.
  • 5. ● The Naive Bayes algorithm states that: P(A/B)=(P(B/A) P(A))/P(B) ● In the proposed system automated detection of bullying comments in social media is implemented. ● The proposed system is platform independent, it can be implemented on any operating system and it is free to use.
  • 6. MODULE DESCRIPTION ● User module. ● Admin module. ● Machine learning module.
  • 7. MODULE FUNCTIONALITIES ❏ USER MODULE ● Users can sign up to the web application by registering themselves by providing details like user name,password etc.. ● Registered users can also sign in to their profile by using user id and password. ● They can post videos,stories and photos in the web application. ● Users can send friend requests to other users and can also chat with their friends. ● Users can view,like and comment the videos and photos posted by their friends in the web application.
  • 8. ❏ ADMIN MODULE ● Admin can handle and make changes in the web application. ● They can also view the requests from users . ● They can also view the comments that have been classified as bullying and non-bullying. ● They can manage the notifications of users.
  • 9. ❏ MACHINE LEARNING MODULE ● The Machine Learning module is responsible for classifying comments and messages as bullying or non-bullying. ● From a vast set of comments and messages, the Naive Bayes algorithm is used to predict bullying comments and messages. ● This module includes the following steps : ➢ Data collection ➢ Data preprocessing ➢ Segmentation ➢ Feature extraction ➢ Training ➢ Testing
  • 10. FLOWCHART OF CYBERBULLYING DETECTION SYSTEM
  • 11. 1. DATA COLLECTION ● Collecting data for training the Machine Learning model is the basic step in the machine learning pipeline. ● The predictions made by Machine Learning systems can only be as good as the data on which they have been trained. ● In this system, dataset containing bullying as well as non-bullying comments and messages. ● The data set is downloaded from KAGGLE website. ● 80% of dataset is used for training and the remaining 20% is used for testing.
  • 12. 2. DATA PREPROCESSING ● Real-world raw data and images are often incomplete, inconsistent and lacking in certain behaviors or trends. They are also likely to contain many errors. So, once collected, they are pre-processed into a format the machine learning algorithm can use for the model. ● Data preprocessing in Machine Learning is a crucial step that helps enhance the quality of data to promote the extraction of meaningful insights from the data. ● The proprocessing step also includes the removal of stop words, special characters and the conversion of uppercase letters to lowercase. ● The Lemmatization step includes converting tense word into root word. For example, the word running is converted to its root word run.
  • 13. 3. SEGMENTATION ● Segmentation can be defined as the process of separating sentences into different tokens. ● N-grams are used for grouping tokens. ● N-grams are used for a variety of things. Some examples include auto completion of sentences. ● In this project, 2-gram is used to group tokens.
  • 14. 4. FEATURE EXTRACTION ● Feature extraction is the process of taking out a list of words from the text data and then transforming them into a feature set which is usable by a classifier. ● In this system, TF-IDF vectorizer is used for feature extraction. ● TF-IDF stands for term frequency-inverse document frequency and it is a measure, used to quantify the importance or relevance of string representations in a document. ● TF-IDF associates each word in a document with a number that represents how relevant each word is in that document.
  • 15. 5. TRAINING ● Model training is the key step in machine learning that results in a model ready to be validated, tested, and deployed. ● The performance of the model determines the quality of the applications that are built using it. ● Quality of training data and the training algorithm are both important assets during the model training phase. ● Typically, dataset is split for training and testing. ● All these aspects of model training make it both an involved and important process in the overall machine learning development cycle.
  • 16. 6. TESTING ● In machine learning, model testing is referred to as the process where the performance of a fully trained model is evaluated on a testing set. ● The testing set consisting of a set of testing samples should be separated from the both training and validation sets, but it should follow the same probability distribution as the training set. ● Each testing sample has a known value of the target.
  • 17. DOMAIN THEORY ➔ Machine learning ● Machine learning (ML) is the study of computer algorithms that improve automatically through experience. ● Machine learning involves computers discovering how they can perform tasks without being explicitly programmed to do so. ● The Machine Learning process starts with inputting training data into the selected algorithm. ● New input data is fed into the machine learning algorithm to test whether the algorithm works correctly.
  • 18. ➔ NAIVE BAYES ● A Naive Bayes classifier is a probabilistic machine learning model that’s used for classification task. ● The classifier is based on the Bayes theorem. Bayes Theorem : P(A/B)=(P(B/A) P(A))/P(B) ● This system uses Multinomial Naive Bayes Classifier. ● The features/predictors used by the classifier are the frequency of the words present in the document.
  • 19. CONFUSION MATRIX Fig : Confusion Matrix
  • 23. DATA FLOW DIAGRAMS Fig. : Level 0 DFD
  • 25.
  • 34. COMPARISON BETWEEN MACHINE LEARNING AND TRANSFER LEARNING APPROACH Machine Learning: Machine learning is a subset of artificial intelligence that focuses on the development of algorithms that allow computers to learn from and make predictions or decisions based on data. It involves training models on labeled data to recognize patterns and make predictions without being explicitly programmed. Transfer Learning: Transfer learning is a machine learning technique where a model trained on one task is reused or adapted as the starting point for a model on a second related task. Usage: Machine Learning: In traditional machine learning, models are trained from scratch on specific datasets for particular tasks, such as image classification, text sentiment analysis, or predictive analytics. Transfer Learning: Transfer learning is commonly used in scenarios where data for a specific task is limited or expensive to obtain. By leveraging pre-trained models, transfer learning can adapt those models to new tasks with less data. .
  • 35. Training Process: Machine Learning: In machine learning, the training process involves feeding labeled data into an algorithm, which learns to recognize patterns and make predictions based on that data through iterative adjustments to its internal parameters. Transfer Learning: Transfer learning typically involves taking a pre-trained model, removing the last few layers (which are task-specific), and then adding new layers tailored to the new task. Data Requirements: Machine Learning: Traditional machine learning models require a large amount of labeled data specific to the task at hand for training. Transfer Learning: Transfer learning can be effective with smaller datasets since it leverages knowledge learned from a different but related task. Applications: Machine Learning: Machine learning techniques are applied in a wide range of applications, including image and speech recognition, natural language processing, recommendation systems, and more. Transfer Learning: Transfer learning is particularly useful in computer vision tasks like object detection and image classification, as well as in natural language processing tasks such as sentiment analysis and text
  • 36. CONCLUSION The overall aim of the project “Cyberbullying Detection Using Machine Learning” is to develop a system that automatically classifies comments and messages as bullying or non-bullying and also remove the bullying comments from the web application.
  • 37. BIBLIOGRAPHY Referenced Sites: 1. Cynthia Van Hee, Gilles Jacobs, Chris Emmery, Bart Desmet, Els Lefever, Ben Verhoeven, Guy De Pauw, Walter Daelemans, Véronique Hoste, Automatic detection of cyberbullying in social media text, PloS one 13 (10), e0203794, 2018 2. Sweta Agrawal, Amit Awekar, European conference on information retrieval, Deep learning for detecting cyberbullying across multiple social media platforms, 141-153, 2018 3. Ong Chee Hang, Halina Mohamed Dahlan 2019 6th International Conference on Research and Innovation in Information Systems, Cyberbullying lexicon for social media, (ICRIIS), 1-6, 2019 4. John Hani, Mohamed Nashaat, Mostafa Ahmed, Zeyad Emad, Eslam Amer, Ammar Mohammed, Social media cyberbullying detection using machine learning, Int. J. Adv. Comput. Sci. Appl 10 (5), 703-707, 2019