SlideShare a Scribd company logo
1 of 31
MSR Presentation on
RUMOR DETECTION ON REAL-TIME
TWITTER DATA USING SUPERVISED
LEARNING
Presented By:-
Patel Divya M.
M.E. (Information Technology)
Enroll. No. : 160430723010
SHANTILAL SHAH
ENGINEERING COLLEGE,
BHAVNAGAR
Guided By:-
Dr. Dinesh B. Vaghela
Asst. Prof. of Information Technology Dept.
GUJARAT
TECHNOLOGICAL
UNIVERSITY
1
• Introduction
• Research Topic: Rumor Detection
• Research work: Objective
• Literature Review
• Problem Statement
• Implementation Strategy
• Implementation Environment
• Conclusion
• Future Work
• References
Outline
1
2
Introduction
• Twitter is most popular micro-blogging service on social media[1].
• A common people have a direct platform to share information and their opinions about
the news events and any other information[1].
• Not all the information posted on twitter is correct or useful in providing information
about the event to other people[1].
1
3
Introduction: Rumor Detection
• What is Rumor?
An unverified statement that starts from one or more sources and spreads
over time [2].
A rumor can end in three ways: it can be resolved as either true, false or remain
unresolved [2].
• So, its necessary to provide some solutions for detecting such kind of activity spread on
social media.
1
4
Research work: Objective
 Phase 1:
• Survey of current methods and models available for Detecting Rumors.
• To study and analyze different methods of Rumor Detection on real time Twitter data.
Phase 2:
• To design a new model/approach for detection of rumors.
Phase 3:
• To implement a proposed model/approach for detection of rumors.
• To evaluate the performance of Rumor detection on Twitter by proposed model.
5
Paper Name: “Towards Automated Real-Time Detection of Misinformation on Twitter”
Authors: Suchita Jain, Vanya Sharma and Rishabh Kaushal [3]
Publisher / Journal Name: IEEE-2016.
Literature Review
6
Proposed
Model
 Focused on the problem by providing an approach to detect
misinformation or rumors on Twitter in real-time automatically.
 Their approach based on the supposition that verified News Channel
accounts on Twitter give more credible information as compared to the
public account of user.
Observation  They calculate accuracy according the tweet they retrieve from both the
News channels and general users.
Limitation  Feature selection/extraction part is missing.
Paper Name : “Automatic detection of Rumoured Tweets and finding its Origin”
Authors: Sahana V P, Alwyn R Pias, Richa Shastri, and Shweta Mandloi [4]
Publisher / Journal Name: IEEE-2015.
7
Proposed
Model
 Focused on the topic “London Riots in 2011”.
 The methodology contains mainly three sections: data, feature extraction,
classification.
 Used 20 features based on tweet content and user accounts.
 Then after they trained a classifier to correctly classifies the tweets. For
that they used Weka tool for classification.
 Also proposed an algorithm to find the origin of the rumored tweets i.e.
obtain the account information of the user who first started spreading
rumors on Twitter.
Observation  Achieved best accuracy for J48 decision tree classification algorithm.
 Recall rate is given high accuracy 0.877.
Limitation  Focused only on one specific rumor topic.
 Real-time twitter data were not considered.
Paper Name : “Detection and Analysis of 2016 US Presidential Election Related Rumors on
Twitter”
Authors: Zhiwei Jin, Juan Cao, Han Guo, Yongdong Zhang, Yu Wang, and Jiebo Luo [5]
Publisher / Journal Name: Springer 2017.
8
Proposed
Model
 Focused on the 2016 U.S. presidential election.
 Presented an analysis of rumor tweets from the followers of two
presidential candidates: Hillary Clinton and Donald Trump.
 They detected rumor tweets by matching large amount of tweets related
to president election with verified rumor articles.
 They collected over 8 million tweets from the followers of the two
candidates.
 They compared the performance of five matching algorithms with
respect to the rumor detection task: TF-IDF, BM25, Word2Vec and
Doc2Vec, lexicon-based algorithm.
Observation  Precision gives 94.7% accuracy which is the highest accuracy result
according to their detection algorithm.
Limitation  Focused only on specific topic i.e. “2016 US President Election related
rumors”.
Paper Name : “Automatic Detection of Rumor on Social Network”
Authors: Qiao Zhang, Shuiyuan Zhang, Jian Dong, Jinhua Xiong, and Xueqi Cheng [6]
Publisher / Journal Name: Springer 2015.
9
Proposed
Model
 Proposed an automatic rumor detection method based on the combination
of new proposed implicit features and shallow features of the messages.
 It mainly divided into 3 parts: data cleaning, feature extraction and model
training.
 Used User-based implicit features and Content-based implicit features.
 A large amount of supervised model they used such as Support Vector
Machine, Random Forest.
Observation  Results show that Implicit-Content-Based method have significant
improvement compared with Shallow-Content-Based method, with
10.5% improvement in precision and 4.7% in recall rate.
Limitation  User credibility.
 Detection of rumors on the Chinese micro-blogging services.
Paper Name : “Detecting Rumors on Online Social Networks Using Multi-layer Autoencoder”
Authors: Yan Zhang, Weiling Chen, Chai Kiat Yeo, Chiew Tong Lau, Bu Sung Lee [7]
Publisher / Journal Name: IEEE 2017.
10
Proposed
Model
 Proposed an anomaly detection method based on autoencoder to perform
rumor detection.
 They used Sina Weibo which is the most popular microblog in China.
 Proposed several self-adapting thresholds which are calculated based on
the property of each recent Weibo set.
Observation  Results show that the autoencoder model achieves a good accuracy i.e.
88%, F1 i.e. 82% and a low false positive rate i.e. 7%.
Limitation  Detection of rumors on the chienese micro-blogging services.
 Performance of autoencoder with 2 hidden layer gives best performance.
Literature Review
Sr.
No.
Title Algorithm/Technique Used Advantages Disadvantages
1 Towards Automated Real-Time
Detection of Misinformation on
Twitter [3]
Sentiment and semantic
analysis
 Detect rumors on Twitter
using tweets from the
verified news channels as
base.
 Detect rumors especially in
the critical times of
emergency.
 There result is based only on
the semantic and sentiment
analysis of the tweets.
 They weren’t used any
features. Also they weren’t
used any classification
techniques to detect rumors.
2 Automatic detection of Rumored
Tweets and finding its Origin [4]
J48 decision tree Classifier  Automatically detect the
spread of rumoured tweets.
 Focused on specific rumor
topic.
 Real-time twitter data were
not considered.
3 Detection and Analysis of 2016
US Presidential Election Related
Rumors on Twitter [5]
TF-IDF and BM25,
Word2Vec and Doc2Vec,
Lexicon matching
 Detect rumor tweets from the
aspects of people, content
and time.
 Their detection algorithm
understand rumors during
political events.
 Focused only one specific
topic i.e. “2016 US President
Election related rumors”.
11
Continue..
4 Automatic Detection of Rumor on
Social Network [6]
Support vector machine  Best result as compared to
Shallow features.
 User credibility
 Detection of rumors only on
the Chinese micro-blogging
services.
5 Detecting Rumors on Online Social
Networks Using Multi-layer
Autoencoder [7]
Autoencoder (Artificial
Neural Network)
 Multi-layer autoencoder is
used.
 Self-adapting thresholds
which is used to distinguish
rumors from non-rumors.
 Detection of rumors only on
the Chinese micro-blogging
services.
 Used unsupervised learning
method to detect rumors.
6 Rumor Detection and
Classification for Twitter Data [8]
J48 decision tree Classifier  They detect rumors as a type
of misinformation
propagation.
 Rumor detection and
classification (RDC) within
the context of microblog
social media.
 The result is not better than the
pre-processing method applied
on the algorithm.
 Real-time twitter data were not
considered.
12
Table 1: Comparative analysis of Literature
Problem Statement
• An advantage of social media is that all the people can share information and
also gives their opinions on that platform.
• The downside of such rapid diffusion of information is that false information
are also spread.
• As the rumors are spreading on Twitter and other social media so fast and
easier. We need to provide some solutions to detect such rumors.
13
Proposed Work
14
Figure 1: Basic steps for Proposed method
Dataset
Collection
Pre-
processing
Feature
Extraction
Classification
Dataset Collection
15
Input Tweets
Figure 2: Flow for fetching tweets
Data Pre-processing
• Remove all URLs (e.g. www.xyz.com), hash tags (e.g. #topic), targets
(@username)
• Correct the spellings; sequence of repeated characters is to be
handled
• Remove all punctuations ,symbols, numbers
• Remove Stop Words
• Remove Non-English Tweets
16
Feature Extraction
• Identification of attributes for Classification.
17
Classification
18
Classification
Decision Tree
Linear Classifier
Support Vector
Machine
Neural Network
Rule based
classifier
Probabilistic
Classifier
Naïve Bayes
Maximum Entropy
Figure 3: Classification Techniques
19
Figure 4: Proposed method
20
Figure 5: Using News website Verification
• Our Proposed approach is divided into three step: 1) Pre-processing, 2) Sentiment
Analysis, and 3) Classification.
• In first step, we are going to preprocess on the real-time tweets to determine the topic
about which the given input tweet is posted.
• In second step, we are finding tweet’s sentiment polarity of each tweets by using
sentiment score.
• In final step, we are going to apply this sentiment score as an input to the different
classification algorithm.
21
• We are using Proposed approach with News websites approach to compare different
specific rumors topic.
• If both gives the same result then we can say that our approach gives the better accuracy.
• This comparison approach also provide the verification about the rumor topic.
22
Implementation Strategy
 Tools
Python 3.5.4
Weka tool (for classification)
 Dataset
Tweets form twitter
 Performance Evaluation
Accuracy
23
Implementation Environment
24
Figure 6: Collecting Tweets using Python Streaming API
25
Figure 7: Retrieving Tweets for specific topic.
26
Figure 8: Storing tweets in table format.
27
Figure 9: Sentiment Analysis chart for specific topic.
Conclusion
• After the study of different research paper on rumor detection, different methods to
are used to detect rumors. There are many classifiers available for detecting
rumors. This research work can be useful to detect rumors on Twitter platform
efficiently and accurately.
28
Future Work
 To implement remaining work.
29
References
[1] Anubrata Das, Moumita Roy, Soumi Dutta, Saptarshi Ghosh, Asit Kumar Das. “Predicting Trends in the
Twitter Social Network: A Machine Learning Approach”, Springer International Publishing Switzerland, 2015.
[2] Soroush Vosoughi, PhD Thesis, “Automatic Detection and Verification of Rumors on Twitter”, June 2015.
[3] Suchita Jain, Vanya Sharma and Rishabh Kaushal. “Towards Automated Real-Time Detection of
Misinformation on Twitter”, Intl. Conference on Advances in Computing, Communications and Informatics
(ICACCI), IEEE 2016.
[4] Sahana V P, Alwyn R Pias, Richa Shastri, and Shweta Mandloi. “Automatic detection of Rumoured Tweets
and finding its Origin”, Intl. Conference on Computing and Network Communications (CoCoNet'15), IEEE
2015.
[5] Zhiwei Jin, Juan Cao, Han Guo, Yongdong Zhang, Yu Wang, and Jiebo Luo. “Detection and Analysis of
2016 US Presidential Election Related Rumors on Twitter”, Springer International Publishing AG 2017,
Springer 2017.
[6] Qiao Zhang, Shuiyuan Zhang, Jian Dong, Jinhua Xiong, and Xueqi Cheng. “Automatic Detection of Rumor
on Social Network”, Springer International Publishing Switzerland 2015, Springer 2017.
[7] Yan Zhang, Weiling Chen, Chai Kiat Yeo, Chiew Tong Lau, Bu Sung Lee, “Detecting Rumors on Online
Social Networks Using Multi-layer Autoencoder”, IEEE Technology & Engineering Management Conference
(TEMSCON), IEEE 2017
[8] Sardar Hamidian and Mona Diab. “Rumor Detection and Classification for Twitter Data”, The Fifth
International Conference on Social Media Technologies, Communication, and Informatics, SOTICS 2015. 30
31

More Related Content

Similar to DP1_160430723010_Divya.pptx

IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET-  	  Improved Real-Time Twitter Sentiment Analysis using ML & Word2VecIRJET-  	  Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2VecIRJET Journal
 
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET Journal
 
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...IRJET Journal
 
A DATA MINING APPROACH FOR FILTERING OUT SOCIAL SPAMMERS IN LARGE-SCALE TWITT...
A DATA MINING APPROACH FOR FILTERING OUT SOCIAL SPAMMERS IN LARGE-SCALE TWITT...A DATA MINING APPROACH FOR FILTERING OUT SOCIAL SPAMMERS IN LARGE-SCALE TWITT...
A DATA MINING APPROACH FOR FILTERING OUT SOCIAL SPAMMERS IN LARGE-SCALE TWITT...ijaia
 
Dynamic feature selection for spam detection (1).pptx
Dynamic feature selection for spam detection (1).pptxDynamic feature selection for spam detection (1).pptx
Dynamic feature selection for spam detection (1).pptxRivikaJain
 
IRJET - Election Result Prediction using Sentiment Analysis
IRJET - Election Result Prediction using Sentiment AnalysisIRJET - Election Result Prediction using Sentiment Analysis
IRJET - Election Result Prediction using Sentiment AnalysisIRJET Journal
 
IRJET- Twitter Spammer Detection
IRJET- Twitter Spammer DetectionIRJET- Twitter Spammer Detection
IRJET- Twitter Spammer DetectionIRJET Journal
 
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNINGSENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNINGIRJET Journal
 
Categorize balanced dataset for troll detection
Categorize balanced dataset for troll detectionCategorize balanced dataset for troll detection
Categorize balanced dataset for troll detectionvivatechijri
 
IRJET - Unauthorized Terror Attack Tracking System using Web Usage Mining
IRJET - Unauthorized Terror Attack Tracking System using Web Usage MiningIRJET - Unauthorized Terror Attack Tracking System using Web Usage Mining
IRJET - Unauthorized Terror Attack Tracking System using Web Usage MiningIRJET Journal
 
Sentiment Analysis of Twitter Data
Sentiment Analysis of Twitter DataSentiment Analysis of Twitter Data
Sentiment Analysis of Twitter DataSumit Raj
 
News construction from microblogging post using open data
News construction from microblogging post using open dataNews construction from microblogging post using open data
News construction from microblogging post using open dataFrancisco Berrizbeitia
 
An ensemble approach for the identification and classification of crime tweet...
An ensemble approach for the identification and classification of crime tweet...An ensemble approach for the identification and classification of crime tweet...
An ensemble approach for the identification and classification of crime tweet...CSITiaesprime
 
Final Poster for Engineering Showcase
Final Poster for Engineering ShowcaseFinal Poster for Engineering Showcase
Final Poster for Engineering ShowcaseTucker Truesdale
 
IRJET- A Survey on Trend Analysis on Twitter for Predicting Public Opinion on...
IRJET- A Survey on Trend Analysis on Twitter for Predicting Public Opinion on...IRJET- A Survey on Trend Analysis on Twitter for Predicting Public Opinion on...
IRJET- A Survey on Trend Analysis on Twitter for Predicting Public Opinion on...IRJET Journal
 
Spammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social NetworksSpammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social NetworksIRJET Journal
 
Twitter_Hashtag_Prediction.pptx
Twitter_Hashtag_Prediction.pptxTwitter_Hashtag_Prediction.pptx
Twitter_Hashtag_Prediction.pptxSayaliKawale2
 
fakenews_DBDA_Mar23.pptx
fakenews_DBDA_Mar23.pptxfakenews_DBDA_Mar23.pptx
fakenews_DBDA_Mar23.pptxdeepmitra8
 

Similar to DP1_160430723010_Divya.pptx (20)

IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET-  	  Improved Real-Time Twitter Sentiment Analysis using ML & Word2VecIRJET-  	  Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
 
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
 
757
757757
757
 
F017433947
F017433947F017433947
F017433947
 
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
 
A DATA MINING APPROACH FOR FILTERING OUT SOCIAL SPAMMERS IN LARGE-SCALE TWITT...
A DATA MINING APPROACH FOR FILTERING OUT SOCIAL SPAMMERS IN LARGE-SCALE TWITT...A DATA MINING APPROACH FOR FILTERING OUT SOCIAL SPAMMERS IN LARGE-SCALE TWITT...
A DATA MINING APPROACH FOR FILTERING OUT SOCIAL SPAMMERS IN LARGE-SCALE TWITT...
 
Dynamic feature selection for spam detection (1).pptx
Dynamic feature selection for spam detection (1).pptxDynamic feature selection for spam detection (1).pptx
Dynamic feature selection for spam detection (1).pptx
 
IRJET - Election Result Prediction using Sentiment Analysis
IRJET - Election Result Prediction using Sentiment AnalysisIRJET - Election Result Prediction using Sentiment Analysis
IRJET - Election Result Prediction using Sentiment Analysis
 
IRJET- Twitter Spammer Detection
IRJET- Twitter Spammer DetectionIRJET- Twitter Spammer Detection
IRJET- Twitter Spammer Detection
 
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNINGSENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
 
Categorize balanced dataset for troll detection
Categorize balanced dataset for troll detectionCategorize balanced dataset for troll detection
Categorize balanced dataset for troll detection
 
IRJET - Unauthorized Terror Attack Tracking System using Web Usage Mining
IRJET - Unauthorized Terror Attack Tracking System using Web Usage MiningIRJET - Unauthorized Terror Attack Tracking System using Web Usage Mining
IRJET - Unauthorized Terror Attack Tracking System using Web Usage Mining
 
Sentiment Analysis of Twitter Data
Sentiment Analysis of Twitter DataSentiment Analysis of Twitter Data
Sentiment Analysis of Twitter Data
 
News construction from microblogging post using open data
News construction from microblogging post using open dataNews construction from microblogging post using open data
News construction from microblogging post using open data
 
An ensemble approach for the identification and classification of crime tweet...
An ensemble approach for the identification and classification of crime tweet...An ensemble approach for the identification and classification of crime tweet...
An ensemble approach for the identification and classification of crime tweet...
 
Final Poster for Engineering Showcase
Final Poster for Engineering ShowcaseFinal Poster for Engineering Showcase
Final Poster for Engineering Showcase
 
IRJET- A Survey on Trend Analysis on Twitter for Predicting Public Opinion on...
IRJET- A Survey on Trend Analysis on Twitter for Predicting Public Opinion on...IRJET- A Survey on Trend Analysis on Twitter for Predicting Public Opinion on...
IRJET- A Survey on Trend Analysis on Twitter for Predicting Public Opinion on...
 
Spammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social NetworksSpammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social Networks
 
Twitter_Hashtag_Prediction.pptx
Twitter_Hashtag_Prediction.pptxTwitter_Hashtag_Prediction.pptx
Twitter_Hashtag_Prediction.pptx
 
fakenews_DBDA_Mar23.pptx
fakenews_DBDA_Mar23.pptxfakenews_DBDA_Mar23.pptx
fakenews_DBDA_Mar23.pptx
 

Recently uploaded

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 

Recently uploaded (20)

★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 

DP1_160430723010_Divya.pptx

  • 1. MSR Presentation on RUMOR DETECTION ON REAL-TIME TWITTER DATA USING SUPERVISED LEARNING Presented By:- Patel Divya M. M.E. (Information Technology) Enroll. No. : 160430723010 SHANTILAL SHAH ENGINEERING COLLEGE, BHAVNAGAR Guided By:- Dr. Dinesh B. Vaghela Asst. Prof. of Information Technology Dept. GUJARAT TECHNOLOGICAL UNIVERSITY 1
  • 2. • Introduction • Research Topic: Rumor Detection • Research work: Objective • Literature Review • Problem Statement • Implementation Strategy • Implementation Environment • Conclusion • Future Work • References Outline 1 2
  • 3. Introduction • Twitter is most popular micro-blogging service on social media[1]. • A common people have a direct platform to share information and their opinions about the news events and any other information[1]. • Not all the information posted on twitter is correct or useful in providing information about the event to other people[1]. 1 3
  • 4. Introduction: Rumor Detection • What is Rumor? An unverified statement that starts from one or more sources and spreads over time [2]. A rumor can end in three ways: it can be resolved as either true, false or remain unresolved [2]. • So, its necessary to provide some solutions for detecting such kind of activity spread on social media. 1 4
  • 5. Research work: Objective  Phase 1: • Survey of current methods and models available for Detecting Rumors. • To study and analyze different methods of Rumor Detection on real time Twitter data. Phase 2: • To design a new model/approach for detection of rumors. Phase 3: • To implement a proposed model/approach for detection of rumors. • To evaluate the performance of Rumor detection on Twitter by proposed model. 5
  • 6. Paper Name: “Towards Automated Real-Time Detection of Misinformation on Twitter” Authors: Suchita Jain, Vanya Sharma and Rishabh Kaushal [3] Publisher / Journal Name: IEEE-2016. Literature Review 6 Proposed Model  Focused on the problem by providing an approach to detect misinformation or rumors on Twitter in real-time automatically.  Their approach based on the supposition that verified News Channel accounts on Twitter give more credible information as compared to the public account of user. Observation  They calculate accuracy according the tweet they retrieve from both the News channels and general users. Limitation  Feature selection/extraction part is missing.
  • 7. Paper Name : “Automatic detection of Rumoured Tweets and finding its Origin” Authors: Sahana V P, Alwyn R Pias, Richa Shastri, and Shweta Mandloi [4] Publisher / Journal Name: IEEE-2015. 7 Proposed Model  Focused on the topic “London Riots in 2011”.  The methodology contains mainly three sections: data, feature extraction, classification.  Used 20 features based on tweet content and user accounts.  Then after they trained a classifier to correctly classifies the tweets. For that they used Weka tool for classification.  Also proposed an algorithm to find the origin of the rumored tweets i.e. obtain the account information of the user who first started spreading rumors on Twitter. Observation  Achieved best accuracy for J48 decision tree classification algorithm.  Recall rate is given high accuracy 0.877. Limitation  Focused only on one specific rumor topic.  Real-time twitter data were not considered.
  • 8. Paper Name : “Detection and Analysis of 2016 US Presidential Election Related Rumors on Twitter” Authors: Zhiwei Jin, Juan Cao, Han Guo, Yongdong Zhang, Yu Wang, and Jiebo Luo [5] Publisher / Journal Name: Springer 2017. 8 Proposed Model  Focused on the 2016 U.S. presidential election.  Presented an analysis of rumor tweets from the followers of two presidential candidates: Hillary Clinton and Donald Trump.  They detected rumor tweets by matching large amount of tweets related to president election with verified rumor articles.  They collected over 8 million tweets from the followers of the two candidates.  They compared the performance of five matching algorithms with respect to the rumor detection task: TF-IDF, BM25, Word2Vec and Doc2Vec, lexicon-based algorithm. Observation  Precision gives 94.7% accuracy which is the highest accuracy result according to their detection algorithm. Limitation  Focused only on specific topic i.e. “2016 US President Election related rumors”.
  • 9. Paper Name : “Automatic Detection of Rumor on Social Network” Authors: Qiao Zhang, Shuiyuan Zhang, Jian Dong, Jinhua Xiong, and Xueqi Cheng [6] Publisher / Journal Name: Springer 2015. 9 Proposed Model  Proposed an automatic rumor detection method based on the combination of new proposed implicit features and shallow features of the messages.  It mainly divided into 3 parts: data cleaning, feature extraction and model training.  Used User-based implicit features and Content-based implicit features.  A large amount of supervised model they used such as Support Vector Machine, Random Forest. Observation  Results show that Implicit-Content-Based method have significant improvement compared with Shallow-Content-Based method, with 10.5% improvement in precision and 4.7% in recall rate. Limitation  User credibility.  Detection of rumors on the Chinese micro-blogging services.
  • 10. Paper Name : “Detecting Rumors on Online Social Networks Using Multi-layer Autoencoder” Authors: Yan Zhang, Weiling Chen, Chai Kiat Yeo, Chiew Tong Lau, Bu Sung Lee [7] Publisher / Journal Name: IEEE 2017. 10 Proposed Model  Proposed an anomaly detection method based on autoencoder to perform rumor detection.  They used Sina Weibo which is the most popular microblog in China.  Proposed several self-adapting thresholds which are calculated based on the property of each recent Weibo set. Observation  Results show that the autoencoder model achieves a good accuracy i.e. 88%, F1 i.e. 82% and a low false positive rate i.e. 7%. Limitation  Detection of rumors on the chienese micro-blogging services.  Performance of autoencoder with 2 hidden layer gives best performance.
  • 11. Literature Review Sr. No. Title Algorithm/Technique Used Advantages Disadvantages 1 Towards Automated Real-Time Detection of Misinformation on Twitter [3] Sentiment and semantic analysis  Detect rumors on Twitter using tweets from the verified news channels as base.  Detect rumors especially in the critical times of emergency.  There result is based only on the semantic and sentiment analysis of the tweets.  They weren’t used any features. Also they weren’t used any classification techniques to detect rumors. 2 Automatic detection of Rumored Tweets and finding its Origin [4] J48 decision tree Classifier  Automatically detect the spread of rumoured tweets.  Focused on specific rumor topic.  Real-time twitter data were not considered. 3 Detection and Analysis of 2016 US Presidential Election Related Rumors on Twitter [5] TF-IDF and BM25, Word2Vec and Doc2Vec, Lexicon matching  Detect rumor tweets from the aspects of people, content and time.  Their detection algorithm understand rumors during political events.  Focused only one specific topic i.e. “2016 US President Election related rumors”. 11
  • 12. Continue.. 4 Automatic Detection of Rumor on Social Network [6] Support vector machine  Best result as compared to Shallow features.  User credibility  Detection of rumors only on the Chinese micro-blogging services. 5 Detecting Rumors on Online Social Networks Using Multi-layer Autoencoder [7] Autoencoder (Artificial Neural Network)  Multi-layer autoencoder is used.  Self-adapting thresholds which is used to distinguish rumors from non-rumors.  Detection of rumors only on the Chinese micro-blogging services.  Used unsupervised learning method to detect rumors. 6 Rumor Detection and Classification for Twitter Data [8] J48 decision tree Classifier  They detect rumors as a type of misinformation propagation.  Rumor detection and classification (RDC) within the context of microblog social media.  The result is not better than the pre-processing method applied on the algorithm.  Real-time twitter data were not considered. 12 Table 1: Comparative analysis of Literature
  • 13. Problem Statement • An advantage of social media is that all the people can share information and also gives their opinions on that platform. • The downside of such rapid diffusion of information is that false information are also spread. • As the rumors are spreading on Twitter and other social media so fast and easier. We need to provide some solutions to detect such rumors. 13
  • 14. Proposed Work 14 Figure 1: Basic steps for Proposed method Dataset Collection Pre- processing Feature Extraction Classification
  • 15. Dataset Collection 15 Input Tweets Figure 2: Flow for fetching tweets
  • 16. Data Pre-processing • Remove all URLs (e.g. www.xyz.com), hash tags (e.g. #topic), targets (@username) • Correct the spellings; sequence of repeated characters is to be handled • Remove all punctuations ,symbols, numbers • Remove Stop Words • Remove Non-English Tweets 16
  • 17. Feature Extraction • Identification of attributes for Classification. 17
  • 18. Classification 18 Classification Decision Tree Linear Classifier Support Vector Machine Neural Network Rule based classifier Probabilistic Classifier Naïve Bayes Maximum Entropy Figure 3: Classification Techniques
  • 20. 20 Figure 5: Using News website Verification
  • 21. • Our Proposed approach is divided into three step: 1) Pre-processing, 2) Sentiment Analysis, and 3) Classification. • In first step, we are going to preprocess on the real-time tweets to determine the topic about which the given input tweet is posted. • In second step, we are finding tweet’s sentiment polarity of each tweets by using sentiment score. • In final step, we are going to apply this sentiment score as an input to the different classification algorithm. 21
  • 22. • We are using Proposed approach with News websites approach to compare different specific rumors topic. • If both gives the same result then we can say that our approach gives the better accuracy. • This comparison approach also provide the verification about the rumor topic. 22
  • 23. Implementation Strategy  Tools Python 3.5.4 Weka tool (for classification)  Dataset Tweets form twitter  Performance Evaluation Accuracy 23
  • 24. Implementation Environment 24 Figure 6: Collecting Tweets using Python Streaming API
  • 25. 25 Figure 7: Retrieving Tweets for specific topic.
  • 26. 26 Figure 8: Storing tweets in table format.
  • 27. 27 Figure 9: Sentiment Analysis chart for specific topic.
  • 28. Conclusion • After the study of different research paper on rumor detection, different methods to are used to detect rumors. There are many classifiers available for detecting rumors. This research work can be useful to detect rumors on Twitter platform efficiently and accurately. 28
  • 29. Future Work  To implement remaining work. 29
  • 30. References [1] Anubrata Das, Moumita Roy, Soumi Dutta, Saptarshi Ghosh, Asit Kumar Das. “Predicting Trends in the Twitter Social Network: A Machine Learning Approach”, Springer International Publishing Switzerland, 2015. [2] Soroush Vosoughi, PhD Thesis, “Automatic Detection and Verification of Rumors on Twitter”, June 2015. [3] Suchita Jain, Vanya Sharma and Rishabh Kaushal. “Towards Automated Real-Time Detection of Misinformation on Twitter”, Intl. Conference on Advances in Computing, Communications and Informatics (ICACCI), IEEE 2016. [4] Sahana V P, Alwyn R Pias, Richa Shastri, and Shweta Mandloi. “Automatic detection of Rumoured Tweets and finding its Origin”, Intl. Conference on Computing and Network Communications (CoCoNet'15), IEEE 2015. [5] Zhiwei Jin, Juan Cao, Han Guo, Yongdong Zhang, Yu Wang, and Jiebo Luo. “Detection and Analysis of 2016 US Presidential Election Related Rumors on Twitter”, Springer International Publishing AG 2017, Springer 2017. [6] Qiao Zhang, Shuiyuan Zhang, Jian Dong, Jinhua Xiong, and Xueqi Cheng. “Automatic Detection of Rumor on Social Network”, Springer International Publishing Switzerland 2015, Springer 2017. [7] Yan Zhang, Weiling Chen, Chai Kiat Yeo, Chiew Tong Lau, Bu Sung Lee, “Detecting Rumors on Online Social Networks Using Multi-layer Autoencoder”, IEEE Technology & Engineering Management Conference (TEMSCON), IEEE 2017 [8] Sardar Hamidian and Mona Diab. “Rumor Detection and Classification for Twitter Data”, The Fifth International Conference on Social Media Technologies, Communication, and Informatics, SOTICS 2015. 30
  • 31. 31

Editor's Notes

  1. Lucrative=profitable