SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3398
Hate Speech Identification Using Machine Learning
Nikhilraj Gadekar1, Mario Pinto 2
1Student, Information Technology Department, Goa College of Engineering, India
2Assistant Professor, Information Technology Department, Goa College of Engineering, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - With the rise of social media people have the
liberty to express themselves, many users misuse this liberty
and we can see abuse and hate spread all across social media
platforms, be it in the form of comments, blogs, etc. Machine
Learning is widely used in various fields of research, weintend
to use machine learning to automate the detection of hate
speech. In this paper, we have used subjectivity analysis and
semantic features to create a lexicon that builds a classifier to
identify hate speech.
Key Words: Hate Speech, Hostile, Subjectivity Analysis,
Lexicon, Machine Learning, Cyber-bullying
1. INTRODUCTION
With a population of 1.40 billion people which is also
increasing at a very steady pace day by day, India has the
second-largest population in the world. India also boasts of
having one of the fastest-growing economies in the world
which means it becomes a very important playground for
social media companies.
The people of India spend about2.36hoursoftheir everyday
time on social media on average. The country’s internet
penetration rate stands at 47%, and it has 467 million social
media users as of 2022 and that number will only grow with
time.
The world is shrinking with the use of the internet but with
the positives also come the negatives, and one of the major
cons of social media is Hate speech which can also be called
abusive writing, cyberbullying, etc. The National Crime
Records Bureau figures show a 36% increase in
cyberstalking and cyberbullying cases in India post the
pandemic. Around 9.2% of 630 adolescents surveyed in the
Delhi-National Capital Regionhadexperiencedcyberbullying
and half of them had not reported it to teachers, guardians,
or the social media companies concerned, a recent study by
Child Rights and You, a non-governmental organization,
found.
The manual process to identify hate speech is slow, tedious,
and labor-intensive. Therefore automatic hate speech
detection becomes very important.
Despite Hindi being the third most spoken language in the
world, and a significant presence of Hindi content on social
media platforms we couldn’t find much work done to detect
hate speech using technology.
Twitter is the 3rd most widely used social media platform in
India with 295.44 million active users. Political and social
issues discussed on Twitter are heavily polarizing as people
are very attached to their political ideology the threads on
Twitter discussing these issues seem to have a lot of hate in
them.
In this paper the dataset that we have useddealswithtweets
that are majorly political and social, the dataset has been
segregated into two major categories which are hostile and
non-hostile, the hostile category has been further divided
into Non-hostile, fake, defamation, hate and offensive.
In our research, we propose a model that can successfully
classify if the tweets are fake, defamation,hate,offensiveand
non-hostile. We use a rule-based approach which has three
major steps I Subjectivity Analysis II Building hate speech
lexicon III Identifying theme-based nouns
The other part of the paper is organized as follows: In
sections 2 and 3 related works and methodology have been
elaborated. In section 4 dataset details have been discussed
and in section 5 the experimental results have been done.
The research paper is terminated in section 6.
2 Related Works:
A lot of work on hate speech detection on social media
platforms has been done in the past in various languages like
English and many other Western languages, but very little
work has been done in this area in low-resource languages
like Hindi which is the 3rd largest spoken language in the
world. The author of the paper [1] has collected 197,566
comments from four social media platforms which are
YouTube, Reddit, Wikipedia, and Twitter with 80% of the
comments labeled as non-hateful and the remaining labeled
as hateful. The author has used classification algorithms like
Logistic Regression (LR), Naïve Bayes (NB), Support Vector
Machines (SVM), Extreme Gradient Boosting (XGBoost), and
Fast Feed NeuralNetwork(FNN),theauthorhasusedvarious
Feature Engineering techniques which are Simple features,
BOW, TF-IDF,Word2VecandBERTincombinationwiththese
classification algorithms and found that XGBoost with BERT
gives the best accuracy. Thestudyin[2]statesthattheauthor
has collected the dataset from Facebook and in the Bangla
language and has labeled the data as Hate or Non-Hate, the
authors have used TF-IDF for extracting the features and
have used SVM andNaïve Bayes algorithms forclassification.
The authors achieve an accuracy of 70% and 72% using SVM
and Naïve Bayes respectively. The researchin[3]presentsan
approach to detect offense in memes usingNaturalLanguage
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3399
Processing (NLP) and Deep Learning, the model which the
authors have used is majorly divided into three steps 1)
Extracting the text from the image. 2) Classify the text as
offensive or non-offensive 3) further classifies it into slight
offensive, very offensive, and hateful offensive. The model
uses simple architecture with a multi-layer dense network
structureinvolvingNLPwithRNNandLSTMalongwithword
embeddings suchas GloVeandFastText. [4]Inthispaper,the
authors have presented a social engineering attackdetection
method that is based on NLP and machine learning. The
proposed method has been evaluated using a semi-synthetic
datasetand well-known metricsalongwithacomparisontoa
state-of-the-artalternative method. It has been shown thatit
performs well and outperforms thealternativemethodology.
3 Methodology:
The main task that we have is to create a lexicon of
sentiment expressions using semantic and subjectivity
features relative to hate speech and use these features to
make a classifier that will detect hate speech
Our approach consists of three major steps,
A. Subjectivity Analysis
B. Building a lexicon with hate-related words
C. Theme-Based Grammatical patterns
A. Subjectivity Analysis
We consider that the tweets which are only
subjective will have hate instead of facts and thus
we mark the objective tweets in the dataset as “not
hate”. To do this task successfully we use
SentiWordNet and assign scores forthesubjectivity
of each word. The key in the lexicon isnowmatched
with our corpus and the score is assigned to every
word in our corpus. The total score of a tweet or
sentence is then calculated by adding the scores of
all the keys in the respective tweet or sentence. A
sentence is considered positive if it has an average
score of 0.5 or above while a score of -0.5and below
makes the sentence negative. The sentence is
considered objective otherwise.
B. Building a lexicon with hate-related words
Now to build the lexicon we first identify
opinionated words from the subjective sentences
which were identified previously. All the words
which are strongly and weakly subjective and have
a polarity tag of negative are extracted.
We now include the “hate” verbs that are not a part
of the lexicon, we extract all the verbs which have a
relation with the hate words from our dataset. We
have then used an initial list of seed verbs
consisting of manually selected verbs that were not
a part of the lexicon, we then use SYSNET to find all
the synonyms of these verbs and add them to the
list of hate words. The “hate-word” list is now
matched with the corpus and all thematchedwords
from the corpus are then added to the final hate
lexicon.
C. Theme Based Grammatical Patterns
To have metaphors that represent non-literal
meaning rather than the literal meaning, only the
hate words cannot be used to directly conclude the
meaning of the sentences. We, therefore, use
grammatical patterns to represent the subjective
expression.
To get this done we divide our corpus into noun
phrases and note the most frequently used noun
phrases that are used in the tweets marked as
hateful.
Having generated all the lexicons that we need we
can now use them on our corpus to automatically
identify hate speech in our corpus. We now have
two options 1) We can run the entire algorithm
once and analyze the result 2) We can run each
lexicon separately and then integrate the entire
system. We choose the second option since this will
help us analyze each lexicon in a much easier and
better way, we can also gauge the role played by
each lexicon in the classification of hate speech.
We use well-defined criteriatosegregatethetweets
by the hateful content present
 If the tweet has two or more words qualified as
strongly negative, it is marked as strongly hateful.If
it has one strongly negative word with non-zero
hate-verbs or non-zero theme-based nouns, it is
marked as strongly hateful. If it has at least one
word each from our hate-verbs lexicon and themed
nouns, it is likewise marked as strongly hateful.
 If it has one strongly negative word, but no other
word from our other lexicons, it is weakly hateful.If
it contains one weakly hateful word with a theme-
based noun, it is weakly hateful. If it contains
neither of the above but contains a hate verb, it is
also weakly hateful.
 If the tweet satisfies neither of these criteria, it is
judged as non-hateful.
4 Dataset Details:
The dataset that we have used has 8192 tweets, it is divided
into Non-hostile, fake, defamation, hate, and offensive, of
which 4358 belong to the non-hostilecategorywhilethe rest
3834 tweets belong to the remaining categories.
We define these categories as
Fake News: A claim or information that is verified to be not
true. We have included tweets belonging to clickbait and
satire/parody categories as fake news as well.
Hate Speech: A post targeting a specific group of people
based on their ethnicity, religious beliefs, geographical
belonging, race, etc., with malicious intentions of spreading
hate or encouraging violence.
Offensive: A post containing profanity, impolite, rude, or
vulgar language to insult a targeted individual or group.
Defamation: A miss-information regarding an individual or
group, which is destroying their reputation publicly.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3400
Non-Hostile: A post with no hostility.
The categories are not mutually disjoint, hence some of the
tweets have multiple categories instead of just one.
Fig -1: Hostile Word Cloud Fig -2: Non-Hostile Word
Cloud
The figure below shows category-wise overlaps for the
hostile dimension of the dataset.
Fig -3: Venn diagram of Multi-Label Hindi hostility dataset.
Notations: [F- Fake], [O- Offensive], [H- Hate], [D-
Defamation], [NH- Non-hostile].
The table below shows a few annotated examples of the
dataset. It can be seen from the table that the 1st and the
last tweets belong to multiple categories.
Table -1: A few annotated examples from the dataset.
Hostile Non-
Hostile
Fake Hate offense Defame Total
Train 1144 792 742 564 2678 3050
Validation 160 103 110 77 376 435
Test 334 237 219 169 780 873
Overall 1638 1132 1071 810 3834 4358
Table -2: Dataset statisticsand Labeldistribution.Fake,hate,
defame, and offense reflect the number of respective posts
including multi-label cases. _ denotes total hostile posts.
Fig -4: Average number of characters and words per post.
Fig -5Average Punctuations (— , : ? ” ; !), Hashtags, and
User Mentions per post.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3401
5 Experimental Results:
Instead of using criteria in the corpus, we classify the
tweets as Strongly Hateful, Weakly Hateful, or Not hate. We
have considered all the tweetsclassifiedasnon-hostilebythe
algorithm as No Hate, All the tweets marked as fake or
defamatory are marked as Weakly Hateful, The tweets that
are marked hate, Offensive, or a combination of one or more
tags correspond to Strongly Hateful. The following
parameters are used to evaluate the performance of the
classifier.
Precision: Precision is the ratio between the True Positives
and all the Positives (Addition of True positives and False
positives).
Recall: The recall is the measure of our model correctly
identifying True Positives.
F1-Score: F1 is a function of Precision and Recall.
Table -2: Results Obtained without Subjectivity Analysis:
Feature Set Precision (%) Recall (%) F1-Score (%)
Semantic
(weakly/strongly
negative)
39.33 77.99 52.29
Semantic
+
hate verbs
39.35 78.03 52.32
Semantic + hate
verbs + nouns
42.54 84.35 56.55
Table -3: Results Obtained without Subjectivity Analysis:
Feature Set Precision (%) Recall (%) F1-Score (%)
Semantic
(weakly/strongly
negative)
45.37 84.98 59.16
Semantic
+
hate verbs
45.49 85.02 59.27
Semantic + hate
verbs + nouns
48.58 91.94 63.54
6 CONCLUSION
The detection of hate speech inlanguagessuchasHindiwith
a wide user base is getting increasingly relevant in this
digital age. Our model uses a rule-based approachtolook for
lexical patterns that allow us to detect and quantify hate
speech to a reasonable precision.Animportantfunction here
was played by the analysis of subjectivity in our algorithm,
accounting for which made a significant improvement inthe
accuracy of hate-speech detection.
REFERENCES
[1] Salminen, Joni & Hopf, Maximilian & Chowdhury,
Shammur & Jung, Soon-Gyo & Almerekhi,Hind&Jansen,
Jim. (2020). Developing an online hate classifier for
multiple social media platforms.10.1.10.1186/s13673-
019-0205-6.
[2] S. Ahammed, M. Rahman, M. H. Niloy and S. M. M. H.
Chowdhury, "Implementation of Machine Learning to
Detect Hate Speech in Bangla Language," 2019 8th
International Conference System Modeling and
Advancement in Research Trends (SMART), 2019, pp.
317-320, doi: 10.1109/SMART46866.2019.9117214.
[3] R. K. Giri, S. C. Gupta and U. K. Gupta, "An approach to
detect offence in Memes using Natural Language
Processing(NLP)andDeeplearning,"2021International
Conference on Computer Communication and
Informatics (ICCCI), 2021, pp. 1-5, doi:
10.1109/ICCCI50826.2021.9402406.
[4] M. Lansley, S. Kapetanakis and N. Polatidis, "SEADer++
v2: Detecting Social Engineering Attacks using Natural
Language Processing and Machine Learning," 2020
International Conference on INnovations in Intelligent
SysTems and Applications (INISTA), 2020, pp. 1-6, doi:
10.1109/INISTA49547.2020.9194623.
[5] S. Chiramel, D. Logofătu and G. Goldenthal, "Detectionof
social media platform insults using Natural language
processing and comparative study of machine learning
algorithms," 2020 24th International Conference on
System Theory, Control and Computing (ICSTCC),2020,
pp. 98-101, doi: 10.1109/ICSTCC50638.2020.9259730
[6] S. Mussiraliyeva, M. Bolatbek,B.Omarov,Z.Medetbek,G.
Baispay and R. Ospanov, "On Detecting Online
Radicalization and Extremism Using Natural Language
Processing," 2020 21st International Arab Conference
on Information Technology (ACIT), 2020, pp. 1-5, doi:
10.1109/ACIT50332.2020.9300086

More Related Content

What's hot

Text classification & sentiment analysis
Text classification & sentiment analysisText classification & sentiment analysis
Text classification & sentiment analysisM. Atif Qureshi
 
Structure of the compiler
Structure of the compilerStructure of the compiler
Structure of the compilerSudhaa Ravi
 
Sentiment Analysis
Sentiment AnalysisSentiment Analysis
Sentiment AnalysisAditya Nag
 
Sentiment analysis of twitter data
Sentiment analysis of twitter dataSentiment analysis of twitter data
Sentiment analysis of twitter dataBhagyashree Deokar
 
project sentiment analysis
project sentiment analysisproject sentiment analysis
project sentiment analysissneha penmetsa
 
Speech emotion recognition
Speech emotion recognitionSpeech emotion recognition
Speech emotion recognitionsaniya shaikh
 
A Role of Lexical Analyzer
A Role of Lexical AnalyzerA Role of Lexical Analyzer
A Role of Lexical AnalyzerArchana Gopinath
 
Token, Pattern and Lexeme
Token, Pattern and LexemeToken, Pattern and Lexeme
Token, Pattern and LexemeA. S. M. Shafi
 
Amazon sentimental analysis
Amazon sentimental analysisAmazon sentimental analysis
Amazon sentimental analysisAkhila
 
Textual & Sentiment Analysis of Movie Reviews
Textual & Sentiment Analysis of Movie ReviewsTextual & Sentiment Analysis of Movie Reviews
Textual & Sentiment Analysis of Movie ReviewsYousef Fadila
 
Ensemble learning
Ensemble learningEnsemble learning
Ensemble learningHaris Jamil
 
Lecture: Word Sense Disambiguation
Lecture: Word Sense DisambiguationLecture: Word Sense Disambiguation
Lecture: Word Sense DisambiguationMarina Santini
 
Lexical Analysis - Compiler Design
Lexical Analysis - Compiler DesignLexical Analysis - Compiler Design
Lexical Analysis - Compiler DesignAkhil Kaushik
 
Sentiment Analysis Using Product Review
Sentiment Analysis Using Product ReviewSentiment Analysis Using Product Review
Sentiment Analysis Using Product ReviewAbdullah Moin
 
Sentiment analysis presentation
Sentiment analysis presentationSentiment analysis presentation
Sentiment analysis presentationGunjanSrivastava23
 
Information Extraction
Information ExtractionInformation Extraction
Information Extractionssbd6985
 
Analytical learning
Analytical learningAnalytical learning
Analytical learningswapnac12
 

What's hot (20)

Text classification & sentiment analysis
Text classification & sentiment analysisText classification & sentiment analysis
Text classification & sentiment analysis
 
Structure of the compiler
Structure of the compilerStructure of the compiler
Structure of the compiler
 
Sentiment Analysis
Sentiment AnalysisSentiment Analysis
Sentiment Analysis
 
Semantic analysis
Semantic analysisSemantic analysis
Semantic analysis
 
Sentiment analysis of twitter data
Sentiment analysis of twitter dataSentiment analysis of twitter data
Sentiment analysis of twitter data
 
project sentiment analysis
project sentiment analysisproject sentiment analysis
project sentiment analysis
 
Speech emotion recognition
Speech emotion recognitionSpeech emotion recognition
Speech emotion recognition
 
A Role of Lexical Analyzer
A Role of Lexical AnalyzerA Role of Lexical Analyzer
A Role of Lexical Analyzer
 
Token, Pattern and Lexeme
Token, Pattern and LexemeToken, Pattern and Lexeme
Token, Pattern and Lexeme
 
Amazon sentimental analysis
Amazon sentimental analysisAmazon sentimental analysis
Amazon sentimental analysis
 
Textual & Sentiment Analysis of Movie Reviews
Textual & Sentiment Analysis of Movie ReviewsTextual & Sentiment Analysis of Movie Reviews
Textual & Sentiment Analysis of Movie Reviews
 
Ensemble learning
Ensemble learningEnsemble learning
Ensemble learning
 
Lecture: Word Sense Disambiguation
Lecture: Word Sense DisambiguationLecture: Word Sense Disambiguation
Lecture: Word Sense Disambiguation
 
Lexical Analysis - Compiler Design
Lexical Analysis - Compiler DesignLexical Analysis - Compiler Design
Lexical Analysis - Compiler Design
 
Sentiment Analysis Using Product Review
Sentiment Analysis Using Product ReviewSentiment Analysis Using Product Review
Sentiment Analysis Using Product Review
 
Signature files
Signature filesSignature files
Signature files
 
Sentiment analysis
Sentiment analysisSentiment analysis
Sentiment analysis
 
Sentiment analysis presentation
Sentiment analysis presentationSentiment analysis presentation
Sentiment analysis presentation
 
Information Extraction
Information ExtractionInformation Extraction
Information Extraction
 
Analytical learning
Analytical learningAnalytical learning
Analytical learning
 

Similar to Hate Speech Identification Using Machine Learning

Hate Speech Recognition System through NLP and Deep Learning
Hate Speech Recognition System through NLP and Deep LearningHate Speech Recognition System through NLP and Deep Learning
Hate Speech Recognition System through NLP and Deep LearningIRJET Journal
 
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...IRJET Journal
 
Derogatory Comment Classification
Derogatory Comment ClassificationDerogatory Comment Classification
Derogatory Comment ClassificationIRJET Journal
 
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET-  	  An Effective Analysis of Anti Troll System using Artificial Intell...IRJET-  	  An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...IRJET Journal
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...IRJET Journal
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...IRJET Journal
 
IRJET - Cyberbulling Detection Model
IRJET -  	  Cyberbulling Detection ModelIRJET -  	  Cyberbulling Detection Model
IRJET - Cyberbulling Detection ModelIRJET Journal
 
Automatic Hate Speech Detection: A Literature Review
Automatic Hate Speech Detection: A Literature ReviewAutomatic Hate Speech Detection: A Literature Review
Automatic Hate Speech Detection: A Literature ReviewDr. Amarjeet Singh
 
Combining Lexicon based and Machine Learning based Methods for Twitter Sentim...
Combining Lexicon based and Machine Learning based Methods for Twitter Sentim...Combining Lexicon based and Machine Learning based Methods for Twitter Sentim...
Combining Lexicon based and Machine Learning based Methods for Twitter Sentim...IRJET Journal
 
12101-56982-3-PB.pdf
12101-56982-3-PB.pdf12101-56982-3-PB.pdf
12101-56982-3-PB.pdfSyauqiRahmat1
 
IRJET- A Survey on Trend Analysis on Twitter for Predicting Public Opinion on...
IRJET- A Survey on Trend Analysis on Twitter for Predicting Public Opinion on...IRJET- A Survey on Trend Analysis on Twitter for Predicting Public Opinion on...
IRJET- A Survey on Trend Analysis on Twitter for Predicting Public Opinion on...IRJET Journal
 
Neural Network Based Context Sensitive Sentiment Analysis
Neural Network Based Context Sensitive Sentiment AnalysisNeural Network Based Context Sensitive Sentiment Analysis
Neural Network Based Context Sensitive Sentiment AnalysisEditor IJCATR
 
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
Detection and Analysis of Twitter Trending Topics via Link-Anomaly DetectionDetection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
Detection and Analysis of Twitter Trending Topics via Link-Anomaly DetectionIJERA Editor
 
IRJET - Suicidal Text Detection using Machine Learning
IRJET -  	  Suicidal Text Detection using Machine LearningIRJET -  	  Suicidal Text Detection using Machine Learning
IRJET - Suicidal Text Detection using Machine LearningIRJET Journal
 
Hate speech detection on Indonesian text using word embedding method-global v...
Hate speech detection on Indonesian text using word embedding method-global v...Hate speech detection on Indonesian text using word embedding method-global v...
Hate speech detection on Indonesian text using word embedding method-global v...IAESIJAI
 
Sentiment Analysis on Twitter data using Machine Learning
Sentiment Analysis on Twitter data using Machine LearningSentiment Analysis on Twitter data using Machine Learning
Sentiment Analysis on Twitter data using Machine LearningIRJET Journal
 
A STUDY ON TWITTER SENTIMENT ANALYSIS USING DEEP LEARNING
A STUDY ON TWITTER SENTIMENT ANALYSIS USING DEEP LEARNINGA STUDY ON TWITTER SENTIMENT ANALYSIS USING DEEP LEARNING
A STUDY ON TWITTER SENTIMENT ANALYSIS USING DEEP LEARNINGIRJET Journal
 
Sentiment Analysis on Twitter Data
Sentiment Analysis on Twitter DataSentiment Analysis on Twitter Data
Sentiment Analysis on Twitter DataIRJET Journal
 
An evolutionary approach to comparative analysis of detecting Bangla abusive ...
An evolutionary approach to comparative analysis of detecting Bangla abusive ...An evolutionary approach to comparative analysis of detecting Bangla abusive ...
An evolutionary approach to comparative analysis of detecting Bangla abusive ...journalBEEI
 

Similar to Hate Speech Identification Using Machine Learning (20)

Hate Speech Recognition System through NLP and Deep Learning
Hate Speech Recognition System through NLP and Deep LearningHate Speech Recognition System through NLP and Deep Learning
Hate Speech Recognition System through NLP and Deep Learning
 
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
 
Derogatory Comment Classification
Derogatory Comment ClassificationDerogatory Comment Classification
Derogatory Comment Classification
 
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET-  	  An Effective Analysis of Anti Troll System using Artificial Intell...IRJET-  	  An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
 
IRJET - Cyberbulling Detection Model
IRJET -  	  Cyberbulling Detection ModelIRJET -  	  Cyberbulling Detection Model
IRJET - Cyberbulling Detection Model
 
Automatic Hate Speech Detection: A Literature Review
Automatic Hate Speech Detection: A Literature ReviewAutomatic Hate Speech Detection: A Literature Review
Automatic Hate Speech Detection: A Literature Review
 
Combining Lexicon based and Machine Learning based Methods for Twitter Sentim...
Combining Lexicon based and Machine Learning based Methods for Twitter Sentim...Combining Lexicon based and Machine Learning based Methods for Twitter Sentim...
Combining Lexicon based and Machine Learning based Methods for Twitter Sentim...
 
12101-56982-3-PB.pdf
12101-56982-3-PB.pdf12101-56982-3-PB.pdf
12101-56982-3-PB.pdf
 
IRJET- A Survey on Trend Analysis on Twitter for Predicting Public Opinion on...
IRJET- A Survey on Trend Analysis on Twitter for Predicting Public Opinion on...IRJET- A Survey on Trend Analysis on Twitter for Predicting Public Opinion on...
IRJET- A Survey on Trend Analysis on Twitter for Predicting Public Opinion on...
 
Neural Network Based Context Sensitive Sentiment Analysis
Neural Network Based Context Sensitive Sentiment AnalysisNeural Network Based Context Sensitive Sentiment Analysis
Neural Network Based Context Sensitive Sentiment Analysis
 
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
Detection and Analysis of Twitter Trending Topics via Link-Anomaly DetectionDetection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
 
IRJET - Suicidal Text Detection using Machine Learning
IRJET -  	  Suicidal Text Detection using Machine LearningIRJET -  	  Suicidal Text Detection using Machine Learning
IRJET - Suicidal Text Detection using Machine Learning
 
Hate speech detection on Indonesian text using word embedding method-global v...
Hate speech detection on Indonesian text using word embedding method-global v...Hate speech detection on Indonesian text using word embedding method-global v...
Hate speech detection on Indonesian text using word embedding method-global v...
 
Sentiment Analysis on Twitter data using Machine Learning
Sentiment Analysis on Twitter data using Machine LearningSentiment Analysis on Twitter data using Machine Learning
Sentiment Analysis on Twitter data using Machine Learning
 
A STUDY ON TWITTER SENTIMENT ANALYSIS USING DEEP LEARNING
A STUDY ON TWITTER SENTIMENT ANALYSIS USING DEEP LEARNINGA STUDY ON TWITTER SENTIMENT ANALYSIS USING DEEP LEARNING
A STUDY ON TWITTER SENTIMENT ANALYSIS USING DEEP LEARNING
 
Sentiment Analysis on Twitter Data
Sentiment Analysis on Twitter DataSentiment Analysis on Twitter Data
Sentiment Analysis on Twitter Data
 
An evolutionary approach to comparative analysis of detecting Bangla abusive ...
An evolutionary approach to comparative analysis of detecting Bangla abusive ...An evolutionary approach to comparative analysis of detecting Bangla abusive ...
An evolutionary approach to comparative analysis of detecting Bangla abusive ...
 
E017433538
E017433538E017433538
E017433538
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
 
fundamentals of drawing and isometric and orthographic projection
fundamentals of drawing and isometric and orthographic projectionfundamentals of drawing and isometric and orthographic projection
fundamentals of drawing and isometric and orthographic projectionjeevanprasad8
 
Natalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in KrakówNatalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in Krakówbim.edu.pl
 
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfA CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfKamal Acharya
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdfPratik Pawar
 
fluid mechanics gate notes . gate all pyqs answer
fluid mechanics gate notes . gate all pyqs answerfluid mechanics gate notes . gate all pyqs answer
fluid mechanics gate notes . gate all pyqs answerapareshmondalnita
 
Top 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering ScientistTop 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering Scientistgettygaming1
 
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...Amil baba
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdfAhmedHussein950959
 
Fruit shop management system project report.pdf
Fruit shop management system project report.pdfFruit shop management system project report.pdf
Fruit shop management system project report.pdfKamal Acharya
 
Scaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageScaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageRCC Institute of Information Technology
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdfKamal Acharya
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfPipe Restoration Solutions
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdfKamal Acharya
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdfKamal Acharya
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234AafreenAbuthahir2
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptssuser9bd3ba
 
Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectArduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectRased Khan
 
İTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering WorkshopİTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering WorkshopEmre Günaydın
 
Toll tax management system project report..pdf
Toll tax management system project report..pdfToll tax management system project report..pdf
Toll tax management system project report..pdfKamal Acharya
 

Recently uploaded (20)

Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
fundamentals of drawing and isometric and orthographic projection
fundamentals of drawing and isometric and orthographic projectionfundamentals of drawing and isometric and orthographic projection
fundamentals of drawing and isometric and orthographic projection
 
Natalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in KrakówNatalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in Kraków
 
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfA CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
fluid mechanics gate notes . gate all pyqs answer
fluid mechanics gate notes . gate all pyqs answerfluid mechanics gate notes . gate all pyqs answer
fluid mechanics gate notes . gate all pyqs answer
 
Top 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering ScientistTop 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering Scientist
 
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Fruit shop management system project report.pdf
Fruit shop management system project report.pdfFruit shop management system project report.pdf
Fruit shop management system project report.pdf
 
Scaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageScaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltage
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectArduino based vehicle speed tracker project
Arduino based vehicle speed tracker project
 
İTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering WorkshopİTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering Workshop
 
Toll tax management system project report..pdf
Toll tax management system project report..pdfToll tax management system project report..pdf
Toll tax management system project report..pdf
 

Hate Speech Identification Using Machine Learning

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3398 Hate Speech Identification Using Machine Learning Nikhilraj Gadekar1, Mario Pinto 2 1Student, Information Technology Department, Goa College of Engineering, India 2Assistant Professor, Information Technology Department, Goa College of Engineering, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - With the rise of social media people have the liberty to express themselves, many users misuse this liberty and we can see abuse and hate spread all across social media platforms, be it in the form of comments, blogs, etc. Machine Learning is widely used in various fields of research, weintend to use machine learning to automate the detection of hate speech. In this paper, we have used subjectivity analysis and semantic features to create a lexicon that builds a classifier to identify hate speech. Key Words: Hate Speech, Hostile, Subjectivity Analysis, Lexicon, Machine Learning, Cyber-bullying 1. INTRODUCTION With a population of 1.40 billion people which is also increasing at a very steady pace day by day, India has the second-largest population in the world. India also boasts of having one of the fastest-growing economies in the world which means it becomes a very important playground for social media companies. The people of India spend about2.36hoursoftheir everyday time on social media on average. The country’s internet penetration rate stands at 47%, and it has 467 million social media users as of 2022 and that number will only grow with time. The world is shrinking with the use of the internet but with the positives also come the negatives, and one of the major cons of social media is Hate speech which can also be called abusive writing, cyberbullying, etc. The National Crime Records Bureau figures show a 36% increase in cyberstalking and cyberbullying cases in India post the pandemic. Around 9.2% of 630 adolescents surveyed in the Delhi-National Capital Regionhadexperiencedcyberbullying and half of them had not reported it to teachers, guardians, or the social media companies concerned, a recent study by Child Rights and You, a non-governmental organization, found. The manual process to identify hate speech is slow, tedious, and labor-intensive. Therefore automatic hate speech detection becomes very important. Despite Hindi being the third most spoken language in the world, and a significant presence of Hindi content on social media platforms we couldn’t find much work done to detect hate speech using technology. Twitter is the 3rd most widely used social media platform in India with 295.44 million active users. Political and social issues discussed on Twitter are heavily polarizing as people are very attached to their political ideology the threads on Twitter discussing these issues seem to have a lot of hate in them. In this paper the dataset that we have useddealswithtweets that are majorly political and social, the dataset has been segregated into two major categories which are hostile and non-hostile, the hostile category has been further divided into Non-hostile, fake, defamation, hate and offensive. In our research, we propose a model that can successfully classify if the tweets are fake, defamation,hate,offensiveand non-hostile. We use a rule-based approach which has three major steps I Subjectivity Analysis II Building hate speech lexicon III Identifying theme-based nouns The other part of the paper is organized as follows: In sections 2 and 3 related works and methodology have been elaborated. In section 4 dataset details have been discussed and in section 5 the experimental results have been done. The research paper is terminated in section 6. 2 Related Works: A lot of work on hate speech detection on social media platforms has been done in the past in various languages like English and many other Western languages, but very little work has been done in this area in low-resource languages like Hindi which is the 3rd largest spoken language in the world. The author of the paper [1] has collected 197,566 comments from four social media platforms which are YouTube, Reddit, Wikipedia, and Twitter with 80% of the comments labeled as non-hateful and the remaining labeled as hateful. The author has used classification algorithms like Logistic Regression (LR), Naïve Bayes (NB), Support Vector Machines (SVM), Extreme Gradient Boosting (XGBoost), and Fast Feed NeuralNetwork(FNN),theauthorhasusedvarious Feature Engineering techniques which are Simple features, BOW, TF-IDF,Word2VecandBERTincombinationwiththese classification algorithms and found that XGBoost with BERT gives the best accuracy. Thestudyin[2]statesthattheauthor has collected the dataset from Facebook and in the Bangla language and has labeled the data as Hate or Non-Hate, the authors have used TF-IDF for extracting the features and have used SVM andNaïve Bayes algorithms forclassification. The authors achieve an accuracy of 70% and 72% using SVM and Naïve Bayes respectively. The researchin[3]presentsan approach to detect offense in memes usingNaturalLanguage
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3399 Processing (NLP) and Deep Learning, the model which the authors have used is majorly divided into three steps 1) Extracting the text from the image. 2) Classify the text as offensive or non-offensive 3) further classifies it into slight offensive, very offensive, and hateful offensive. The model uses simple architecture with a multi-layer dense network structureinvolvingNLPwithRNNandLSTMalongwithword embeddings suchas GloVeandFastText. [4]Inthispaper,the authors have presented a social engineering attackdetection method that is based on NLP and machine learning. The proposed method has been evaluated using a semi-synthetic datasetand well-known metricsalongwithacomparisontoa state-of-the-artalternative method. It has been shown thatit performs well and outperforms thealternativemethodology. 3 Methodology: The main task that we have is to create a lexicon of sentiment expressions using semantic and subjectivity features relative to hate speech and use these features to make a classifier that will detect hate speech Our approach consists of three major steps, A. Subjectivity Analysis B. Building a lexicon with hate-related words C. Theme-Based Grammatical patterns A. Subjectivity Analysis We consider that the tweets which are only subjective will have hate instead of facts and thus we mark the objective tweets in the dataset as “not hate”. To do this task successfully we use SentiWordNet and assign scores forthesubjectivity of each word. The key in the lexicon isnowmatched with our corpus and the score is assigned to every word in our corpus. The total score of a tweet or sentence is then calculated by adding the scores of all the keys in the respective tweet or sentence. A sentence is considered positive if it has an average score of 0.5 or above while a score of -0.5and below makes the sentence negative. The sentence is considered objective otherwise. B. Building a lexicon with hate-related words Now to build the lexicon we first identify opinionated words from the subjective sentences which were identified previously. All the words which are strongly and weakly subjective and have a polarity tag of negative are extracted. We now include the “hate” verbs that are not a part of the lexicon, we extract all the verbs which have a relation with the hate words from our dataset. We have then used an initial list of seed verbs consisting of manually selected verbs that were not a part of the lexicon, we then use SYSNET to find all the synonyms of these verbs and add them to the list of hate words. The “hate-word” list is now matched with the corpus and all thematchedwords from the corpus are then added to the final hate lexicon. C. Theme Based Grammatical Patterns To have metaphors that represent non-literal meaning rather than the literal meaning, only the hate words cannot be used to directly conclude the meaning of the sentences. We, therefore, use grammatical patterns to represent the subjective expression. To get this done we divide our corpus into noun phrases and note the most frequently used noun phrases that are used in the tweets marked as hateful. Having generated all the lexicons that we need we can now use them on our corpus to automatically identify hate speech in our corpus. We now have two options 1) We can run the entire algorithm once and analyze the result 2) We can run each lexicon separately and then integrate the entire system. We choose the second option since this will help us analyze each lexicon in a much easier and better way, we can also gauge the role played by each lexicon in the classification of hate speech. We use well-defined criteriatosegregatethetweets by the hateful content present  If the tweet has two or more words qualified as strongly negative, it is marked as strongly hateful.If it has one strongly negative word with non-zero hate-verbs or non-zero theme-based nouns, it is marked as strongly hateful. If it has at least one word each from our hate-verbs lexicon and themed nouns, it is likewise marked as strongly hateful.  If it has one strongly negative word, but no other word from our other lexicons, it is weakly hateful.If it contains one weakly hateful word with a theme- based noun, it is weakly hateful. If it contains neither of the above but contains a hate verb, it is also weakly hateful.  If the tweet satisfies neither of these criteria, it is judged as non-hateful. 4 Dataset Details: The dataset that we have used has 8192 tweets, it is divided into Non-hostile, fake, defamation, hate, and offensive, of which 4358 belong to the non-hostilecategorywhilethe rest 3834 tweets belong to the remaining categories. We define these categories as Fake News: A claim or information that is verified to be not true. We have included tweets belonging to clickbait and satire/parody categories as fake news as well. Hate Speech: A post targeting a specific group of people based on their ethnicity, religious beliefs, geographical belonging, race, etc., with malicious intentions of spreading hate or encouraging violence. Offensive: A post containing profanity, impolite, rude, or vulgar language to insult a targeted individual or group. Defamation: A miss-information regarding an individual or group, which is destroying their reputation publicly.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3400 Non-Hostile: A post with no hostility. The categories are not mutually disjoint, hence some of the tweets have multiple categories instead of just one. Fig -1: Hostile Word Cloud Fig -2: Non-Hostile Word Cloud The figure below shows category-wise overlaps for the hostile dimension of the dataset. Fig -3: Venn diagram of Multi-Label Hindi hostility dataset. Notations: [F- Fake], [O- Offensive], [H- Hate], [D- Defamation], [NH- Non-hostile]. The table below shows a few annotated examples of the dataset. It can be seen from the table that the 1st and the last tweets belong to multiple categories. Table -1: A few annotated examples from the dataset. Hostile Non- Hostile Fake Hate offense Defame Total Train 1144 792 742 564 2678 3050 Validation 160 103 110 77 376 435 Test 334 237 219 169 780 873 Overall 1638 1132 1071 810 3834 4358 Table -2: Dataset statisticsand Labeldistribution.Fake,hate, defame, and offense reflect the number of respective posts including multi-label cases. _ denotes total hostile posts. Fig -4: Average number of characters and words per post. Fig -5Average Punctuations (— , : ? ” ; !), Hashtags, and User Mentions per post.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3401 5 Experimental Results: Instead of using criteria in the corpus, we classify the tweets as Strongly Hateful, Weakly Hateful, or Not hate. We have considered all the tweetsclassifiedasnon-hostilebythe algorithm as No Hate, All the tweets marked as fake or defamatory are marked as Weakly Hateful, The tweets that are marked hate, Offensive, or a combination of one or more tags correspond to Strongly Hateful. The following parameters are used to evaluate the performance of the classifier. Precision: Precision is the ratio between the True Positives and all the Positives (Addition of True positives and False positives). Recall: The recall is the measure of our model correctly identifying True Positives. F1-Score: F1 is a function of Precision and Recall. Table -2: Results Obtained without Subjectivity Analysis: Feature Set Precision (%) Recall (%) F1-Score (%) Semantic (weakly/strongly negative) 39.33 77.99 52.29 Semantic + hate verbs 39.35 78.03 52.32 Semantic + hate verbs + nouns 42.54 84.35 56.55 Table -3: Results Obtained without Subjectivity Analysis: Feature Set Precision (%) Recall (%) F1-Score (%) Semantic (weakly/strongly negative) 45.37 84.98 59.16 Semantic + hate verbs 45.49 85.02 59.27 Semantic + hate verbs + nouns 48.58 91.94 63.54 6 CONCLUSION The detection of hate speech inlanguagessuchasHindiwith a wide user base is getting increasingly relevant in this digital age. Our model uses a rule-based approachtolook for lexical patterns that allow us to detect and quantify hate speech to a reasonable precision.Animportantfunction here was played by the analysis of subjectivity in our algorithm, accounting for which made a significant improvement inthe accuracy of hate-speech detection. REFERENCES [1] Salminen, Joni & Hopf, Maximilian & Chowdhury, Shammur & Jung, Soon-Gyo & Almerekhi,Hind&Jansen, Jim. (2020). Developing an online hate classifier for multiple social media platforms.10.1.10.1186/s13673- 019-0205-6. [2] S. Ahammed, M. Rahman, M. H. Niloy and S. M. M. H. Chowdhury, "Implementation of Machine Learning to Detect Hate Speech in Bangla Language," 2019 8th International Conference System Modeling and Advancement in Research Trends (SMART), 2019, pp. 317-320, doi: 10.1109/SMART46866.2019.9117214. [3] R. K. Giri, S. C. Gupta and U. K. Gupta, "An approach to detect offence in Memes using Natural Language Processing(NLP)andDeeplearning,"2021International Conference on Computer Communication and Informatics (ICCCI), 2021, pp. 1-5, doi: 10.1109/ICCCI50826.2021.9402406. [4] M. Lansley, S. Kapetanakis and N. Polatidis, "SEADer++ v2: Detecting Social Engineering Attacks using Natural Language Processing and Machine Learning," 2020 International Conference on INnovations in Intelligent SysTems and Applications (INISTA), 2020, pp. 1-6, doi: 10.1109/INISTA49547.2020.9194623. [5] S. Chiramel, D. Logofătu and G. Goldenthal, "Detectionof social media platform insults using Natural language processing and comparative study of machine learning algorithms," 2020 24th International Conference on System Theory, Control and Computing (ICSTCC),2020, pp. 98-101, doi: 10.1109/ICSTCC50638.2020.9259730 [6] S. Mussiraliyeva, M. Bolatbek,B.Omarov,Z.Medetbek,G. Baispay and R. Ospanov, "On Detecting Online Radicalization and Extremism Using Natural Language Processing," 2020 21st International Arab Conference on Information Technology (ACIT), 2020, pp. 1-5, doi: 10.1109/ACIT50332.2020.9300086