SlideShare a Scribd company logo
1 of 23
DETECTION AND REMOVAL OF PUBLISHING
FAKE POSTS & USERS IRRELAVENT
COMMENTS IN SOCIAL MEDIA
PREPARED BY:
Prasanth J (622516104037)
Santhanakumar P (622516104046)
Sukumar R (622516104052)
GUIDED BY:
Mrs. R.Bhuvaneswari, M.E., (Ph.D.),
Head of the Department, CSE
Date : 22-09-2020
Review : Final
ABSTRACT
Social media can be a double-edged sword for society, either as a convenient
channel exchanging ideas or as an unexpected conduit circulating fake news
through a large population.
Social nuisances that place heavy financial burdens on society. Here we look at
use of data mining followed by sentiment analysis on online social networks.
Here we use Sentiment analysis to detect the fake news by using the block
chain technique. The fake news are reported by the user and the algorithm will
check the data and add it to the database.
The irrelevant comments are automatically reported by the algorithm. Since, it
has a set of unwanted word which should not be used publicly.
EXISTING SYSTEM
However, most of the existing studies assume that each piece of information
spreads independently regardless of the interactions between contagions.
User spread the post through the social media in which some of them are fake
or not needed.
The irrelevant comments reported by the users are blocked by the admins after
reviewing the comments.
PROPOSED SYSTEM
The fake news are reported by the user and the algorithm checks the data and
blocks the content.
Sentiment analysis was used to determine a writer's/speaker's attitude with
respect to either a topic or the overall contextual polarity of a text.
The irrelevant comments are blocked automatically by the algorithm. Since, it
has preprocessed datasets.
HARDWARE REQUIREMENTS
Processor : Intel processor 3.0 GHz and above
RAM : 4GB and above
Hard disk : 50 to 500 GB
Keyboard : Any Standard Keyboard
Mouse : Any Standard Mouse
Monitor : 15 inch color monitor and above
SOFTWARE REQUIREMENTS
Front End : PHP
Back End : MySQL (Ver 5.6)
Operating System : Windows or Linux OS
System type : 32-bit or 64-bit Operating System
SYSTEM ARCHITECTURE
Data Acquisition
Datasets
Preprocessing
Stop Removal
Stemming words
analysis
Tokenization
Hybrid Segmentation
Global Context
Local Context
Pseudo Feedback
POS tagger
Named Entity
Recognition
Network Features
Content Features
Blog Features
SVM classifiers
Trained Datasets
Rumors identification
LIST OF MODULES
 Registration
 Login
 Approved
 Update Status
 Check status
 Block Id
 Find location
Logout
MODULES DESCRIPTION
 REGISTRATION
This module describes details of the users. When a new user arrives the
application user must enter the personal details such as user name, user age,
package detail, no of days, and user contact details (address, telephone number).
The user registers the details and gets consumer id and password.
 LOGIN
This module describes the details of login. In this module the admin and
consumer have an own unique login id and password. Login is used for protect
the unauthorized access.
 APPROVED
The users register the detail then the admin has check the detail and approve
the id.
 UPDATE STATUS
The user updates the status of the social media then the admin the check the
status the added to the status of social media.
 CHECK STATUS
The user can update the status then main work of admin has checked the status.
To check the status categories. The status has to a normal content to allow the
update the status but the status has to unwanted categories so the status could
not updated
 BLOCK ID
To the user can update the unwanted status initially admin send the warning
message of user the user cant accepted that user do that recently the account
has been blocked.
 FIND LOCATION
To the user can update the unwanted status Then the account has to be blocked
and find the user location.
 LOGOUT
After complete the booking process the user can logout the process.
ALGORITHM
Support Vector Machine(SVM)
A Support Vector Machine (SVM) is a discriminative classifier formally
defined by a separating hyperplane. In other words, given labeled training
data (supervised learning), the algorithm outputs an optimal hyperplane.
In this project we use SVM algorithm for classifying and fetch the data.
SCREENSHOT
 User Registration Page
 Admin Login Page
 User Profile Page
 User Post Page
 Admin Page
CONCLUSION
A crime pattern can be detected, nearly in real-time, when online social media
is monitored.
Crime can occur anywhere at any time. Previous statistics do not accurately
identify the crime intensity of a specific location.
More accurate results can be drawn from social media. Results from
geographic data analysis conducted on various tweets provided a clear picture
of the criminal trends in several different cities.
The crime intensity day-wise positively correlated with crime statistics from
cops, which ultimately prove the hypothesis.
The Ferguson shooting case study clearly differentiates the city's safe and
dangerous pattern
LITERATURE SURVEY
S.NO TITLE AUTHORS ALGORITHM JOURNAL LIMITATION
1
IAD: Interaction-
Aware Diffusion
Framework in Social
Networks{2018}
C. Gentry, S. Halevi,
and N. P. Smart
routing algorithms arXiv:1709.01773
Forecast the average
distance
2
Mining aspect-
specific opinion
using a
holistic lifelong topic
model{2016}
E. Aktas, F. Afram,
and K. Ghose
Dummy- Location
Selection (DLS)
Proc. 25th Int. Conf.
World Wide Web,
pp.
167–176
Chance for lose of data
3
TASC:topic-
adaptive sentiment
classification on
dynamic
tweets{2015}
C. Gentry, S.
Halevi, and N. P.
Smart
mixed-integer
nonlinear program
(MINLP)
EEE Trans. Knowl.
Data Eng., vol. 27,
no. 6, pp. 1696–
1709
Limitations on
recognition and
its performance in
behavioral
verification
4
Modeling
information
diffusion over social
networks for
temporal dynamic
prediction{2017}
E. Aktas, F. Afram,
and K. Ghose
wireless service
providers
(WSPs
IEEE
Trans. Knowl. Data
Eng, vol. PP, no. 99,
pp. 1–1
Detect the time
But don’t detect a
location
REFERENCES
Xi Zhang, Member, Yuan Su, Siyu Qu, Sihong Xi, Member, Binxing Fang, and
Philip S. Yu, Fellow, “Interaction-Aware Diffusion Framework in Social
Network,” IEEE Trans. Knowl. Data Eng. Vol. 14, no. 8, August 2018.
D. Li, S. Zhang, X. Sun, H. Zhou, S. Li, and X. Li, and X. Li, “Modeling
information diffusion over social networks for temporal dynamic prediction,”
IEEE Trans. Knowl. Data Eng. Vol PP, no. 99, pp. 1-1,2017.
R. Fan, J. Zhao, Y. Chen, and K. Xu, “Anger is more influential then joy:
Sentiment correlation in weibo,” PloS one, vol. 9, no. 10, p. e110184, 2014.
J. Zhang, B. Liu, J. Tang, T. Chen, and J. Li, “Social influence locality for
modeling retweeting behaviors,” in proc. 23th Int. Joint Conf. Artificial intell.,
2013.
THANK YOU

More Related Content

What's hot

DISCOVERY OF RANKING FRAUD FOR MOBILE APPS
DISCOVERY OF RANKING FRAUD FOR MOBILE APPSDISCOVERY OF RANKING FRAUD FOR MOBILE APPS
DISCOVERY OF RANKING FRAUD FOR MOBILE APPSShakas Technologies
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsjpstudcorner
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsNexgen Technology
 
E commerce 2010 section- b
E commerce 2010 section- bE commerce 2010 section- b
E commerce 2010 section- bStudsPlanet.com
 
Crime Detection And Prevention Method By Using HCI
Crime Detection And  Prevention Method By Using HCICrime Detection And  Prevention Method By Using HCI
Crime Detection And Prevention Method By Using HCIPAF KIET
 
COMPARATIVE ANALYSIS OF ANOMALY BASED WEB ATTACK DETECTION METHODS
COMPARATIVE ANALYSIS OF ANOMALY BASED WEB ATTACK DETECTION METHODSCOMPARATIVE ANALYSIS OF ANOMALY BASED WEB ATTACK DETECTION METHODS
COMPARATIVE ANALYSIS OF ANOMALY BASED WEB ATTACK DETECTION METHODSIJCI JOURNAL
 

What's hot (7)

DISCOVERY OF RANKING FRAUD FOR MOBILE APPS
DISCOVERY OF RANKING FRAUD FOR MOBILE APPSDISCOVERY OF RANKING FRAUD FOR MOBILE APPS
DISCOVERY OF RANKING FRAUD FOR MOBILE APPS
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
 
E commerce 2010 section- b
E commerce 2010 section- bE commerce 2010 section- b
E commerce 2010 section- b
 
Crime
CrimeCrime
Crime
 
Crime Detection And Prevention Method By Using HCI
Crime Detection And  Prevention Method By Using HCICrime Detection And  Prevention Method By Using HCI
Crime Detection And Prevention Method By Using HCI
 
COMPARATIVE ANALYSIS OF ANOMALY BASED WEB ATTACK DETECTION METHODS
COMPARATIVE ANALYSIS OF ANOMALY BASED WEB ATTACK DETECTION METHODSCOMPARATIVE ANALYSIS OF ANOMALY BASED WEB ATTACK DETECTION METHODS
COMPARATIVE ANALYSIS OF ANOMALY BASED WEB ATTACK DETECTION METHODS
 

Similar to DETECTION AND REMOVAL OF PUBLISHING FAKE POSTS & USERS IRRELEVANT COMMENTS ON SOCIAL MEDIA

CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCECRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCEvivatechijri
 
Fake News Detection System django.pptx
Fake News Detection System django.pptxFake News Detection System django.pptx
Fake News Detection System django.pptxAyushKavariya1
 
Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...eSAT Journals
 
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET Journal
 
Trust Based Packet Filtering.pptx
Trust Based Packet Filtering.pptxTrust Based Packet Filtering.pptx
Trust Based Packet Filtering.pptxPoojaG86
 
Cyber bullying detection and analysis.ppt.pdf
Cyber bullying detection and analysis.ppt.pdfCyber bullying detection and analysis.ppt.pdf
Cyber bullying detection and analysis.ppt.pdfHunais Abdul Nafi
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET Journal
 
IRJET- Portable Biometric E-Voting System
IRJET- Portable Biometric E-Voting SystemIRJET- Portable Biometric E-Voting System
IRJET- Portable Biometric E-Voting SystemIRJET Journal
 
Permission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OSPermission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OSBRNSSPublicationHubI
 
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...IJMER
 
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET Journal
 
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET Journal
 
Social networks protection against fake profiles and social bots attacks
Social networks protection against  fake profiles and social bots attacksSocial networks protection against  fake profiles and social bots attacks
Social networks protection against fake profiles and social bots attacksAboul Ella Hassanien
 
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning TechniquesIJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniquesijwmn
 
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUESMALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUESijwmn
 
Outlier Detection in Secure Shell Honeypot using Particle Swarm Optimization ...
Outlier Detection in Secure Shell Honeypot using Particle Swarm Optimization ...Outlier Detection in Secure Shell Honeypot using Particle Swarm Optimization ...
Outlier Detection in Secure Shell Honeypot using Particle Swarm Optimization ...Eswar Publications
 
Personam Solution - How it Works Brief
Personam Solution - How it Works BriefPersonam Solution - How it Works Brief
Personam Solution - How it Works BriefSunny Geo
 
Personam Solution - How it Works Brief
Personam Solution - How it Works BriefPersonam Solution - How it Works Brief
Personam Solution - How it Works BriefSunny Geo
 

Similar to DETECTION AND REMOVAL OF PUBLISHING FAKE POSTS & USERS IRRELEVANT COMMENTS ON SOCIAL MEDIA (20)

J1802035460
J1802035460J1802035460
J1802035460
 
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCECRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
 
Fake News Detection System django.pptx
Fake News Detection System django.pptxFake News Detection System django.pptx
Fake News Detection System django.pptx
 
Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...Automatic signature verification with chain code using weighted distance and ...
Automatic signature verification with chain code using weighted distance and ...
 
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
 
Trust Based Packet Filtering.pptx
Trust Based Packet Filtering.pptxTrust Based Packet Filtering.pptx
Trust Based Packet Filtering.pptx
 
Cyber bullying detection and analysis.ppt.pdf
Cyber bullying detection and analysis.ppt.pdfCyber bullying detection and analysis.ppt.pdf
Cyber bullying detection and analysis.ppt.pdf
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNN
 
IRJET- Portable Biometric E-Voting System
IRJET- Portable Biometric E-Voting SystemIRJET- Portable Biometric E-Voting System
IRJET- Portable Biometric E-Voting System
 
Permission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OSPermission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OS
 
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...
 
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data Mining
 
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
 
Ppt
PptPpt
Ppt
 
Social networks protection against fake profiles and social bots attacks
Social networks protection against  fake profiles and social bots attacksSocial networks protection against  fake profiles and social bots attacks
Social networks protection against fake profiles and social bots attacks
 
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning TechniquesIJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
 
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUESMALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
 
Outlier Detection in Secure Shell Honeypot using Particle Swarm Optimization ...
Outlier Detection in Secure Shell Honeypot using Particle Swarm Optimization ...Outlier Detection in Secure Shell Honeypot using Particle Swarm Optimization ...
Outlier Detection in Secure Shell Honeypot using Particle Swarm Optimization ...
 
Personam Solution - How it Works Brief
Personam Solution - How it Works BriefPersonam Solution - How it Works Brief
Personam Solution - How it Works Brief
 
Personam Solution - How it Works Brief
Personam Solution - How it Works BriefPersonam Solution - How it Works Brief
Personam Solution - How it Works Brief
 

Recently uploaded

Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...SocioCosmos
 
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...makika9823
 
Mastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfMastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfTirupati Social Media
 
9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings Republik9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings RepublikGenuineGirls
 
Online Social Shopping Motivation: A Preliminary Study
Online Social Shopping Motivation: A Preliminary StudyOnline Social Shopping Motivation: A Preliminary Study
Online Social Shopping Motivation: A Preliminary StudyAJHSSR Journal
 
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call MeCall^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call MeMs Riya
 
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一ra6e69ou
 
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...AJHSSR Journal
 
O9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking MenO9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking MenSapana Sha
 
Angela Killian | Operations Director | Dallas
Angela Killian | Operations Director | DallasAngela Killian | Operations Director | Dallas
Angela Killian | Operations Director | DallasAngela Killian
 
Call Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts ServiceCall Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts ServiceSapana Sha
 
social media for the hospitality industry.
social media for the hospitality industry.social media for the hospitality industry.
social media for the hospitality industry.japie swanepoel
 
Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...AJHSSR Journal
 

Recently uploaded (20)

young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Serviceyoung Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
 
Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...
 
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
 
Mastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfMastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdf
 
9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings Republik9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings Republik
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Masudpur
Delhi  99530 vip 56974  Genuine Escort Service Call Girls in MasudpurDelhi  99530 vip 56974  Genuine Escort Service Call Girls in Masudpur
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Masudpur
 
Online Social Shopping Motivation: A Preliminary Study
Online Social Shopping Motivation: A Preliminary StudyOnline Social Shopping Motivation: A Preliminary Study
Online Social Shopping Motivation: A Preliminary Study
 
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call MeCall^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
 
Bicycle Safety in Focus: Preventing Fatalities and Seeking Justice
Bicycle Safety in Focus: Preventing Fatalities and Seeking JusticeBicycle Safety in Focus: Preventing Fatalities and Seeking Justice
Bicycle Safety in Focus: Preventing Fatalities and Seeking Justice
 
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
 
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
 
FULL ENJOY Call Girls In Mohammadpur (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Mohammadpur  (Delhi) Call Us 9953056974FULL ENJOY Call Girls In Mohammadpur  (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Mohammadpur (Delhi) Call Us 9953056974
 
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
 
O9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking MenO9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking Men
 
Angela Killian | Operations Director | Dallas
Angela Killian | Operations Director | DallasAngela Killian | Operations Director | Dallas
Angela Killian | Operations Director | Dallas
 
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
 
Call Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts ServiceCall Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts Service
 
social media for the hospitality industry.
social media for the hospitality industry.social media for the hospitality industry.
social media for the hospitality industry.
 
9953056974 Young Call Girls In Kirti Nagar Indian Quality Escort service
9953056974 Young Call Girls In  Kirti Nagar Indian Quality Escort service9953056974 Young Call Girls In  Kirti Nagar Indian Quality Escort service
9953056974 Young Call Girls In Kirti Nagar Indian Quality Escort service
 
Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...
 

DETECTION AND REMOVAL OF PUBLISHING FAKE POSTS & USERS IRRELEVANT COMMENTS ON SOCIAL MEDIA

  • 1. DETECTION AND REMOVAL OF PUBLISHING FAKE POSTS & USERS IRRELAVENT COMMENTS IN SOCIAL MEDIA PREPARED BY: Prasanth J (622516104037) Santhanakumar P (622516104046) Sukumar R (622516104052) GUIDED BY: Mrs. R.Bhuvaneswari, M.E., (Ph.D.), Head of the Department, CSE Date : 22-09-2020 Review : Final
  • 2. ABSTRACT Social media can be a double-edged sword for society, either as a convenient channel exchanging ideas or as an unexpected conduit circulating fake news through a large population. Social nuisances that place heavy financial burdens on society. Here we look at use of data mining followed by sentiment analysis on online social networks. Here we use Sentiment analysis to detect the fake news by using the block chain technique. The fake news are reported by the user and the algorithm will check the data and add it to the database. The irrelevant comments are automatically reported by the algorithm. Since, it has a set of unwanted word which should not be used publicly.
  • 3. EXISTING SYSTEM However, most of the existing studies assume that each piece of information spreads independently regardless of the interactions between contagions. User spread the post through the social media in which some of them are fake or not needed. The irrelevant comments reported by the users are blocked by the admins after reviewing the comments.
  • 4. PROPOSED SYSTEM The fake news are reported by the user and the algorithm checks the data and blocks the content. Sentiment analysis was used to determine a writer's/speaker's attitude with respect to either a topic or the overall contextual polarity of a text. The irrelevant comments are blocked automatically by the algorithm. Since, it has preprocessed datasets.
  • 5. HARDWARE REQUIREMENTS Processor : Intel processor 3.0 GHz and above RAM : 4GB and above Hard disk : 50 to 500 GB Keyboard : Any Standard Keyboard Mouse : Any Standard Mouse Monitor : 15 inch color monitor and above
  • 6. SOFTWARE REQUIREMENTS Front End : PHP Back End : MySQL (Ver 5.6) Operating System : Windows or Linux OS System type : 32-bit or 64-bit Operating System
  • 7. SYSTEM ARCHITECTURE Data Acquisition Datasets Preprocessing Stop Removal Stemming words analysis Tokenization Hybrid Segmentation Global Context Local Context Pseudo Feedback POS tagger Named Entity Recognition Network Features Content Features Blog Features SVM classifiers Trained Datasets Rumors identification
  • 8. LIST OF MODULES  Registration  Login  Approved  Update Status  Check status  Block Id  Find location Logout
  • 9. MODULES DESCRIPTION  REGISTRATION This module describes details of the users. When a new user arrives the application user must enter the personal details such as user name, user age, package detail, no of days, and user contact details (address, telephone number). The user registers the details and gets consumer id and password.  LOGIN This module describes the details of login. In this module the admin and consumer have an own unique login id and password. Login is used for protect the unauthorized access.
  • 10.  APPROVED The users register the detail then the admin has check the detail and approve the id.  UPDATE STATUS The user updates the status of the social media then the admin the check the status the added to the status of social media.  CHECK STATUS The user can update the status then main work of admin has checked the status. To check the status categories. The status has to a normal content to allow the update the status but the status has to unwanted categories so the status could not updated
  • 11.  BLOCK ID To the user can update the unwanted status initially admin send the warning message of user the user cant accepted that user do that recently the account has been blocked.  FIND LOCATION To the user can update the unwanted status Then the account has to be blocked and find the user location.  LOGOUT After complete the booking process the user can logout the process.
  • 12. ALGORITHM Support Vector Machine(SVM) A Support Vector Machine (SVM) is a discriminative classifier formally defined by a separating hyperplane. In other words, given labeled training data (supervised learning), the algorithm outputs an optimal hyperplane. In this project we use SVM algorithm for classifying and fetch the data.
  • 19. CONCLUSION A crime pattern can be detected, nearly in real-time, when online social media is monitored. Crime can occur anywhere at any time. Previous statistics do not accurately identify the crime intensity of a specific location. More accurate results can be drawn from social media. Results from geographic data analysis conducted on various tweets provided a clear picture of the criminal trends in several different cities. The crime intensity day-wise positively correlated with crime statistics from cops, which ultimately prove the hypothesis. The Ferguson shooting case study clearly differentiates the city's safe and dangerous pattern
  • 20. LITERATURE SURVEY S.NO TITLE AUTHORS ALGORITHM JOURNAL LIMITATION 1 IAD: Interaction- Aware Diffusion Framework in Social Networks{2018} C. Gentry, S. Halevi, and N. P. Smart routing algorithms arXiv:1709.01773 Forecast the average distance 2 Mining aspect- specific opinion using a holistic lifelong topic model{2016} E. Aktas, F. Afram, and K. Ghose Dummy- Location Selection (DLS) Proc. 25th Int. Conf. World Wide Web, pp. 167–176 Chance for lose of data
  • 21. 3 TASC:topic- adaptive sentiment classification on dynamic tweets{2015} C. Gentry, S. Halevi, and N. P. Smart mixed-integer nonlinear program (MINLP) EEE Trans. Knowl. Data Eng., vol. 27, no. 6, pp. 1696– 1709 Limitations on recognition and its performance in behavioral verification 4 Modeling information diffusion over social networks for temporal dynamic prediction{2017} E. Aktas, F. Afram, and K. Ghose wireless service providers (WSPs IEEE Trans. Knowl. Data Eng, vol. PP, no. 99, pp. 1–1 Detect the time But don’t detect a location
  • 22. REFERENCES Xi Zhang, Member, Yuan Su, Siyu Qu, Sihong Xi, Member, Binxing Fang, and Philip S. Yu, Fellow, “Interaction-Aware Diffusion Framework in Social Network,” IEEE Trans. Knowl. Data Eng. Vol. 14, no. 8, August 2018. D. Li, S. Zhang, X. Sun, H. Zhou, S. Li, and X. Li, and X. Li, “Modeling information diffusion over social networks for temporal dynamic prediction,” IEEE Trans. Knowl. Data Eng. Vol PP, no. 99, pp. 1-1,2017. R. Fan, J. Zhao, Y. Chen, and K. Xu, “Anger is more influential then joy: Sentiment correlation in weibo,” PloS one, vol. 9, no. 10, p. e110184, 2014. J. Zhang, B. Liu, J. Tang, T. Chen, and J. Li, “Social influence locality for modeling retweeting behaviors,” in proc. 23th Int. Joint Conf. Artificial intell., 2013.