SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4447
CYBERBULLING DETECTION MODEL
MAYANK KAUSHIK
BTECH STUDENT, IT DEPARTMENT, MAHARAJA AGRASEN INSTITUTE OF TECHNOLOGY, DELHI, INDIA
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract –Harassment ofsocialmedia usersbycyberbullies
is a significant yet harmful phenomenon on the social media.
Existing methods to detect cyberbullying have at least one of
these following three bottlenecks. First they only target one
social media platform, second is that they address only one
topic of cyberbullying. Third is that they rely on carefully
handcrafted features of the data. We in this project show that
machine learning models can overcome all these three
bottlenecks. Knowledge that is learned by these modelsonone
type of dataset can be transferred and used to other datasets.
Our experiments provide some very useful insights about
cyberbullying detection. According to the best of our
knowledge, this is work that systematically analyzes
cyberbullying detection on various topicsacrossvarioussocial
media platforms using Machine Learning and Transfer
learning
Key Words: Cyberbullying, Social Media, Machine Learning
1. INTRODUCTION
As the number of users on social media are increasing. It
leads to a new way of bullying. The later term is defined as
an intentional or an aggressive acts that are carried out by
person or groups of individuals using repeatedly
communication messages over time against a victim or user
who cannot easily defend him or herself [1]. Bullying has
always been a part of our society since a long time. With
change coming with internet, it was only a matter of time
that bullies found their view on this new and opportunistic
medium. Bullies has become able to do their nasty deeds
with anonymity and great distance between them and their
targets. The act of cyberbullying according to Cambridge
dictionary is defined as the activity ofusinginternettoharm,
frighten or bully another person, especially by sendingthem
unpleasant messages. The effect it has on his victim is the
main fact that distinguishes cyberbullying from the normal
bullying. It may happen traditional bullying may end in
physical damage as well as emotional and psychological
damage, as oppose to cyberbullying, whereitisall emotional
and psychological. It has to be prevented given the
consequences of cyberbullying, it urgently needs to get
detected as soon as it happens. One of the successful
approach that learns from its data and generates a model
that automatically classifyproperactionisMachinelearning.
It can lead us to detect a pattern among the language of
bullies and hence can generate a model to detect
cyberbullying actions. Thus, the main contribution of our
paper is to propose a supervised machinelearningapproach
for detecting and preventing cyberbullying.
1.1 Data Overview
We performed experiments using large, diverse publicly
available datasets forcyberbullyingdetectioninsocialmedia.
As twitter dataset contains examples of racism and sexism.
Where pot labeled as cyberbullyingareverylesscomparedto
normal neutral posts. Variation Differences in the number of
records in the data sets also affect the size of the dictionary,
which represents the number of different words found inthe
data set. We measure the size of the post in terms of the
number of words in the post. There are only a few large
messages for each data set. We truncate such large posts to
the size of a post with a rating of 95 in this dataset. This
dataset that we are working upon is taken from Kaggle, it is a
twitter dataset having8818annotatedtweetsandhebullying
ones having common slurs and terms used pertaining to
religious, sexual, gender, and ethnic minorities
1.2 The Approach
We first worked on applying sentiment analysis on Twitter.
We worked on a supervised approach to solve this problem.
In this approach, we used a dataset containing different
segments, namely, id, tweet, label (‘0’ for positive and ‘1’ for
negative). Then we pre-processed the data in differentstages.
Firstly, we combined the test and the training datasets to
create a new data-frame. Then, we removed the user handles
(represented after @) as they don’t contribute in analyzing
the tweet. Further we removedallthepunctuations, numbers
and special characters in order to create a clean database for
implementation. Also, short words don’t contribute much in
understanding the tweet by the algorithm, so we removed all
the words with word length of less than 3 characters. After
obtaining a clean dataset, we implementedtokenizationofthe
data because we will apply stemming from the ‘NLTK’
package. After stemming, we stitch back the tokens to form
the meaningful text for the processing. Afterwards, we use
Word Cloud for Data visualization of our current analysis of
the tweets in the data frame. The tweets with negative
comments are collected and can be transmittedtoauthorities
for checking.
2. TECHNOLOGY USED
Natural language processing (NLP) is a study of artificial
intelligence that helps machines and computers understand,
interpret, and manipulate simple human language. Natural
language processing helpsdevelopersorganizeknowledgeto
perform tasks such as translation, summarization, named
entity recognition, relationship extraction, voicerecognition,
topicsegmentation, etc. Natural languageprocessingisaway
that computers analyze, understand, and derive meaning
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4448
from day to day human language. Languages such as English,
Spanish, Hindi, etc. Themaincomponentsofnaturallanguage
processing are:
Morphological and lexical analysis
Syntactic analysis
Semantic analysis
Speech integration
Pragmatic analysis
1) Morphological and lexical analysis
Lexical analysis is a vocabulary that includes your wordsand
expressions. Represents the analysis, identification and
description of the structure of words. It includes dividing a
text into paragraphs, words,and sentences.Individualwords
are broken downintotheircomponents,andsymbolsthatare
not words, such as punctuation marks, are separated from
words.
2) Semantic analysis
Semantic analysis is a structure created by the parser that
assigns meanings. This component of NLP transfers linear
sequences of words into simpler structures. Shows how
words are associated with each other.
Semantics focuses only on the literal meaning of words,
phrases, and sentences. This only abstracts the meaning of
diction or the actual meaning of the given context. The
structures assigned by the parser always have assigned
meaning
For example, "colorless green idea". This would be rejected
by Symantec's analysisascolorless here;Greendoesn'tmake
any sense.
3) Pragmatic analysis
Pragmaticanalysisdealswiththegeneralcommunicativeand
social content and its effect on interpretation. It means
abstracting or deriving meaningful use of language in
situations. In this analysis, the main focus is always on what
was said, reinterpreted on what is understood.
Pragmatic analysis helps users discover this intended effect
by applying a set of rules that characterize cooperative
dialogues.
For example, "close the window?" In the exampleitshouldbe
precisely interpreted as a new request instead of an order.
4) Syntax analysis
Words are commonly accepted as the smallest syntax units.
Syntax refers to the principles and rules that govern the
sentence structure of any individual language.
The syntax focuses on the proper order of words that can
affect their meaning. This involves the analysis of the words
in a sentence following the grammatical structure of the
sentence. Words are transformed intostructuretoshowhow
words are related to each other.
Fig -1: NLP FLOW
3. THE NEXT STEPS
For our current simulation we are using supervised
classification of the data. For the next expansion, we are
looking for jumping into the unsupervised classification
using k-means algorithm. Also, we are going to live track the
tweets by integrating the algorithm with the twitter api.
After a successful implementation on twitter, we will
upgrade the platform for other top social mediasitesas well.
Currently we are working with NLP, but modern-day posts
are not limited to texts, but most of the bullying as recorded
these days is by the use of images as well. We will also try
and build a model for image recognition to further identify
and investigate such cybercrime.
4. RESULTS
After preprocessing the dataset, we followedthesamesteps
as were told in section 1.2, we then split the dataset into
ratios (0.7,0.3) for train and test. Accuracy, f-scoreandrecall
and precision are taken as a performance measure to
evaluate the classifiers.
We applied SVM, Random Forest classifier and KNN
algorithms as they are among the best performance
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4449
classifiers. We achieved highest accuracywhiletrainingwith
SVM and Random forest classifier of 95%whereasKNN gave
us the accuracy of 92%.
CLASSIFIER ACCURACY
SVM 95%
Random Forest 95%
KNN 92%
5. CONCLUSIONS
In this paper, we proposed an approach to detect
cyberbullying using machine learning techniques. We
evaluated our model on threeclassifiers SVM,Randomforest
and KNN and NLTK for feature extraction.
Furthermore, we compared our work with another related
work that used the same dataset as ours, finding that our
Neural Network outperformed their classifiers in terms of
accuracy and f-score. By achieving this accuracy, ourwork is
definitely going to improve cyber-bullying detection to help
people to use social media safely.
REFERENCES
[1] P. Badjatiya, S. Gupta, M. Gupta, and V. Varma. Deep
learning for hate speech detection in tweets. In WWW,
pages 759–760, 2017. M. Young, The Technical Writer’s
Handbook. Mill Valley, CA: University Science, 1989.
[2] N. Djuric, J. Zhou, R. Morris, M. Grbovic, V. Radosavljevic,
and N. Bhamidipati. Hate speech detection with
comment embeddings. In WWW, pages 29–30, 2015..
[3] S. Hinduja and J. W. Patchin. Bullying, cyberbullying,and
suicide. Archives of suicide research, 14(3):206–221,
2010.
[4] R. Johnson and T. Zhang. Supervised and semi-
supervised text categorization using lstm for region
embeddings. In ICML, pages 526–534, 2016.
[5] D. Karthik, R. Roi, and L. Henry. Modeling the detection
of textual cyberbullying. In Workshop on The Social
Mobile Web, ICWSM, 2011.
[6] Y. Kim. Convolutional neural networks for sentence
classification. In EMNLP, pages 1746–1751, 2014.
[7] L. v. d. Maaten and G. Hinton. Visualizing data using t-
sne. Journal of Machine Learning Research,
9(Nov):2579–2605, 2008.
[8] C. Nobata, J. Tetreault, A. Thomas, Y. Mehdad, and Y.
Chang. Abusive language detection in online user
content. In WWW, pages 145–153, 2016.
[9] J. W. Patchin and S. Hinduja. Bullies move beyond the
schoolyard: A preliminary look at cyberbullying. Youth
violence and juvenile justice, 4(2):148–169, 2006.
[10] J. Pennington, R. Socher, and C.D.Manning.Glove:Global
vectors for word representation. In EMNLP, pages
1532–1543, 2014.
[11] K. Reynolds, A. Kontostathis, and L. Edwards. Using
machine learning to detect cyberbullying. In ICMLA,
pages 241–244, 2011.
[12] R. L. Servance. Cyberbullying,cyber-harassment,andthe
conflict between schools and the first amendment.
Wisconsin Law Review, pages 12–13, 2003.
[13] D. Tang, F. Wei, N. Yang, M. Zhou, T. Liu, and B. Qin.
Learning sentiment-specific word embeddingfortwitter
sentiment classification. In ACL, pages 1555–1565,
2014.
[14] C. Van Hee, E. Lefever, B. Verhoeven, J. Mennes, B.
Desmet, G. De Pauw, W. Daelemans, and V. Hoste.
Automatic detection and prevention ofcyberbullying.In
Intl. Conf. Human and Social Analytics, pages 13–18,
2015.
[15] Z. Waseem and D. Hovy. Hateful symbols or hateful
people? predictive features for hate speechdetectionon
twitter. In NAACL SRW, pages 88–93, 2016.
[16] E. Whittaker and R. M.Kowalski.Cyberbullyingvia social
media. Journal of School Violence, 14(1):11–29, 2015.
[17] E. Wulczyn, N. Thain, and L. Dixon. Ex machina:Personal
attacks seen at scale. In WWW, pages 1391–1399, 2017.
[18] D. Yin, Z. Xue, L. Hong, B. D. Davison, A. Kontostathis,and
L. Edwards. Detection of harassment on web 2.0. In The
workshop on Content Analysis in the WEB 2.0, WWW,
pages 1–7, 2009.
[19] P. Zhou, Z. Qi, S. Zheng, J. Xu, H. Bao, and B. Xu. Text
classification improved by integrating bidirectional lstm
with two-dimensional max pooling. In COLING, pages
3485–3495, 2016.

More Related Content

What's hot

Sentiment Analysis on Twitter Data
Sentiment Analysis on Twitter DataSentiment Analysis on Twitter Data
Sentiment Analysis on Twitter Data
IRJET Journal
 
Analysis and Prediction of Sentiments for Cricket Tweets using Hadoop
Analysis and Prediction of Sentiments for Cricket Tweets using HadoopAnalysis and Prediction of Sentiments for Cricket Tweets using Hadoop
Analysis and Prediction of Sentiments for Cricket Tweets using Hadoop
IRJET Journal
 
project sentiment analysis
project sentiment analysisproject sentiment analysis
project sentiment analysissneha penmetsa
 
IRJET - Twitter Sentimental Analysis
IRJET -  	  Twitter Sentimental AnalysisIRJET -  	  Twitter Sentimental Analysis
IRJET - Twitter Sentimental Analysis
IRJET Journal
 
IRJET- BDI using NLP for Efficient Depression Identification
IRJET- BDI using NLP for Efficient Depression IdentificationIRJET- BDI using NLP for Efficient Depression Identification
IRJET- BDI using NLP for Efficient Depression Identification
IRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
IRJET- Conversational Assistant based on Sentiment Analysis
IRJET- Conversational Assistant based on Sentiment AnalysisIRJET- Conversational Assistant based on Sentiment Analysis
IRJET- Conversational Assistant based on Sentiment Analysis
IRJET Journal
 
Methods for Sentiment Analysis: A Literature Study
Methods for Sentiment Analysis: A Literature StudyMethods for Sentiment Analysis: A Literature Study
Methods for Sentiment Analysis: A Literature Study
vivatechijri
 
H017445260
H017445260H017445260
H017445260
IOSR Journals
 
E017433538
E017433538E017433538
E017433538
IOSR Journals
 
295B_Report_Sentiment_analysis
295B_Report_Sentiment_analysis295B_Report_Sentiment_analysis
295B_Report_Sentiment_analysisZahid Azam
 
DeepSearch_Project_Report
DeepSearch_Project_ReportDeepSearch_Project_Report
DeepSearch_Project_ReportUrjit Patel
 
B017441015
B017441015B017441015
B017441015
IOSR Journals
 
IRJET - Mobile Chatbot for Information Search
 IRJET - Mobile Chatbot for Information Search IRJET - Mobile Chatbot for Information Search
IRJET - Mobile Chatbot for Information Search
IRJET Journal
 
IRJET- Sentimental Analysis for Students’ Feedback using Machine Learning App...
IRJET- Sentimental Analysis for Students’ Feedback using Machine Learning App...IRJET- Sentimental Analysis for Students’ Feedback using Machine Learning App...
IRJET- Sentimental Analysis for Students’ Feedback using Machine Learning App...
IRJET Journal
 
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
Detection and Analysis of Twitter Trending Topics via Link-Anomaly DetectionDetection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
IJERA Editor
 
Project sentiment analysis
Project sentiment analysisProject sentiment analysis
Project sentiment analysisBob Prieto
 
A Survey Of Collaborative Filtering Techniques
A Survey Of Collaborative Filtering TechniquesA Survey Of Collaborative Filtering Techniques
A Survey Of Collaborative Filtering Techniques
tengyue5i5j
 
Analysis of Opinionated Text for Opinion Mining
Analysis of Opinionated Text for Opinion MiningAnalysis of Opinionated Text for Opinion Mining
Analysis of Opinionated Text for Opinion Mining
mlaij
 
NLP BASED INTERVIEW ASSESSMENT SYSTEM
NLP BASED INTERVIEW ASSESSMENT SYSTEMNLP BASED INTERVIEW ASSESSMENT SYSTEM
NLP BASED INTERVIEW ASSESSMENT SYSTEM
vivatechijri
 

What's hot (20)

Sentiment Analysis on Twitter Data
Sentiment Analysis on Twitter DataSentiment Analysis on Twitter Data
Sentiment Analysis on Twitter Data
 
Analysis and Prediction of Sentiments for Cricket Tweets using Hadoop
Analysis and Prediction of Sentiments for Cricket Tweets using HadoopAnalysis and Prediction of Sentiments for Cricket Tweets using Hadoop
Analysis and Prediction of Sentiments for Cricket Tweets using Hadoop
 
project sentiment analysis
project sentiment analysisproject sentiment analysis
project sentiment analysis
 
IRJET - Twitter Sentimental Analysis
IRJET -  	  Twitter Sentimental AnalysisIRJET -  	  Twitter Sentimental Analysis
IRJET - Twitter Sentimental Analysis
 
IRJET- BDI using NLP for Efficient Depression Identification
IRJET- BDI using NLP for Efficient Depression IdentificationIRJET- BDI using NLP for Efficient Depression Identification
IRJET- BDI using NLP for Efficient Depression Identification
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
IRJET- Conversational Assistant based on Sentiment Analysis
IRJET- Conversational Assistant based on Sentiment AnalysisIRJET- Conversational Assistant based on Sentiment Analysis
IRJET- Conversational Assistant based on Sentiment Analysis
 
Methods for Sentiment Analysis: A Literature Study
Methods for Sentiment Analysis: A Literature StudyMethods for Sentiment Analysis: A Literature Study
Methods for Sentiment Analysis: A Literature Study
 
H017445260
H017445260H017445260
H017445260
 
E017433538
E017433538E017433538
E017433538
 
295B_Report_Sentiment_analysis
295B_Report_Sentiment_analysis295B_Report_Sentiment_analysis
295B_Report_Sentiment_analysis
 
DeepSearch_Project_Report
DeepSearch_Project_ReportDeepSearch_Project_Report
DeepSearch_Project_Report
 
B017441015
B017441015B017441015
B017441015
 
IRJET - Mobile Chatbot for Information Search
 IRJET - Mobile Chatbot for Information Search IRJET - Mobile Chatbot for Information Search
IRJET - Mobile Chatbot for Information Search
 
IRJET- Sentimental Analysis for Students’ Feedback using Machine Learning App...
IRJET- Sentimental Analysis for Students’ Feedback using Machine Learning App...IRJET- Sentimental Analysis for Students’ Feedback using Machine Learning App...
IRJET- Sentimental Analysis for Students’ Feedback using Machine Learning App...
 
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
Detection and Analysis of Twitter Trending Topics via Link-Anomaly DetectionDetection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
 
Project sentiment analysis
Project sentiment analysisProject sentiment analysis
Project sentiment analysis
 
A Survey Of Collaborative Filtering Techniques
A Survey Of Collaborative Filtering TechniquesA Survey Of Collaborative Filtering Techniques
A Survey Of Collaborative Filtering Techniques
 
Analysis of Opinionated Text for Opinion Mining
Analysis of Opinionated Text for Opinion MiningAnalysis of Opinionated Text for Opinion Mining
Analysis of Opinionated Text for Opinion Mining
 
NLP BASED INTERVIEW ASSESSMENT SYSTEM
NLP BASED INTERVIEW ASSESSMENT SYSTEMNLP BASED INTERVIEW ASSESSMENT SYSTEM
NLP BASED INTERVIEW ASSESSMENT SYSTEM
 

Similar to IRJET - Cyberbulling Detection Model

Combining Lexicon based and Machine Learning based Methods for Twitter Sentim...
Combining Lexicon based and Machine Learning based Methods for Twitter Sentim...Combining Lexicon based and Machine Learning based Methods for Twitter Sentim...
Combining Lexicon based and Machine Learning based Methods for Twitter Sentim...
IRJET Journal
 
Live Twitter Sentiment Analysis and Interactive Visualizations with PyLDAvis ...
Live Twitter Sentiment Analysis and Interactive Visualizations with PyLDAvis ...Live Twitter Sentiment Analysis and Interactive Visualizations with PyLDAvis ...
Live Twitter Sentiment Analysis and Interactive Visualizations with PyLDAvis ...
IRJET Journal
 
IRJET - Twitter Sentiment Analysis using Machine Learning
IRJET -  	  Twitter Sentiment Analysis using Machine LearningIRJET -  	  Twitter Sentiment Analysis using Machine Learning
IRJET - Twitter Sentiment Analysis using Machine Learning
IRJET Journal
 
A STUDY ON TWITTER SENTIMENT ANALYSIS USING DEEP LEARNING
A STUDY ON TWITTER SENTIMENT ANALYSIS USING DEEP LEARNINGA STUDY ON TWITTER SENTIMENT ANALYSIS USING DEEP LEARNING
A STUDY ON TWITTER SENTIMENT ANALYSIS USING DEEP LEARNING
IRJET Journal
 
Derogatory Comment Classification
Derogatory Comment ClassificationDerogatory Comment Classification
Derogatory Comment Classification
IRJET Journal
 
Sentiment Analysis: A comparative study of Deep Learning and Machine Learning
Sentiment Analysis: A comparative study of Deep Learning and Machine LearningSentiment Analysis: A comparative study of Deep Learning and Machine Learning
Sentiment Analysis: A comparative study of Deep Learning and Machine Learning
IRJET Journal
 
Twitter Sentiment Analysis
Twitter Sentiment AnalysisTwitter Sentiment Analysis
Twitter Sentiment Analysis
IRJET Journal
 
Sentiment Analysis and Classification of Tweets using Data Mining
Sentiment Analysis and Classification of Tweets using Data MiningSentiment Analysis and Classification of Tweets using Data Mining
Sentiment Analysis and Classification of Tweets using Data Mining
IRJET Journal
 
Twitter Sentiment Analysis: An Unsupervised Approach
Twitter Sentiment Analysis: An Unsupervised ApproachTwitter Sentiment Analysis: An Unsupervised Approach
Twitter Sentiment Analysis: An Unsupervised Approach
IRJET Journal
 
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET-  	  An Effective Analysis of Anti Troll System using Artificial Intell...IRJET-  	  An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET Journal
 
IRJET- Sentimental Analysis of Twitter for Stock Market Investment
IRJET- Sentimental Analysis of Twitter for Stock Market InvestmentIRJET- Sentimental Analysis of Twitter for Stock Market Investment
IRJET- Sentimental Analysis of Twitter for Stock Market Investment
IRJET Journal
 
Sentiment Analysis for Sarcasm Detection using Deep Learning
Sentiment Analysis for Sarcasm Detection using Deep LearningSentiment Analysis for Sarcasm Detection using Deep Learning
Sentiment Analysis for Sarcasm Detection using Deep Learning
IRJET Journal
 
Sentiment Analysis on Twitter data using Machine Learning
Sentiment Analysis on Twitter data using Machine LearningSentiment Analysis on Twitter data using Machine Learning
Sentiment Analysis on Twitter data using Machine Learning
IRJET Journal
 
IRJET- Analysis of Brand Value Prediction based on Social Media Data
IRJET-  	  Analysis of Brand Value Prediction based on Social Media DataIRJET-  	  Analysis of Brand Value Prediction based on Social Media Data
IRJET- Analysis of Brand Value Prediction based on Social Media Data
IRJET Journal
 
IRJET- Semantic Question Matching
IRJET- Semantic Question MatchingIRJET- Semantic Question Matching
IRJET- Semantic Question Matching
IRJET Journal
 
Sentiment Analysis of Twitter Data
Sentiment Analysis of Twitter DataSentiment Analysis of Twitter Data
Sentiment Analysis of Twitter Data
Sumit Raj
 
IRJET- Design and Implementation of Sentiment Analyzer for Top Engineering Co...
IRJET- Design and Implementation of Sentiment Analyzer for Top Engineering Co...IRJET- Design and Implementation of Sentiment Analyzer for Top Engineering Co...
IRJET- Design and Implementation of Sentiment Analyzer for Top Engineering Co...
IRJET Journal
 
IRJET - Response Analysis of Educational Videos
IRJET - Response Analysis of Educational VideosIRJET - Response Analysis of Educational Videos
IRJET - Response Analysis of Educational Videos
IRJET Journal
 
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
IRJET Journal
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
IRJET Journal
 

Similar to IRJET - Cyberbulling Detection Model (20)

Combining Lexicon based and Machine Learning based Methods for Twitter Sentim...
Combining Lexicon based and Machine Learning based Methods for Twitter Sentim...Combining Lexicon based and Machine Learning based Methods for Twitter Sentim...
Combining Lexicon based and Machine Learning based Methods for Twitter Sentim...
 
Live Twitter Sentiment Analysis and Interactive Visualizations with PyLDAvis ...
Live Twitter Sentiment Analysis and Interactive Visualizations with PyLDAvis ...Live Twitter Sentiment Analysis and Interactive Visualizations with PyLDAvis ...
Live Twitter Sentiment Analysis and Interactive Visualizations with PyLDAvis ...
 
IRJET - Twitter Sentiment Analysis using Machine Learning
IRJET -  	  Twitter Sentiment Analysis using Machine LearningIRJET -  	  Twitter Sentiment Analysis using Machine Learning
IRJET - Twitter Sentiment Analysis using Machine Learning
 
A STUDY ON TWITTER SENTIMENT ANALYSIS USING DEEP LEARNING
A STUDY ON TWITTER SENTIMENT ANALYSIS USING DEEP LEARNINGA STUDY ON TWITTER SENTIMENT ANALYSIS USING DEEP LEARNING
A STUDY ON TWITTER SENTIMENT ANALYSIS USING DEEP LEARNING
 
Derogatory Comment Classification
Derogatory Comment ClassificationDerogatory Comment Classification
Derogatory Comment Classification
 
Sentiment Analysis: A comparative study of Deep Learning and Machine Learning
Sentiment Analysis: A comparative study of Deep Learning and Machine LearningSentiment Analysis: A comparative study of Deep Learning and Machine Learning
Sentiment Analysis: A comparative study of Deep Learning and Machine Learning
 
Twitter Sentiment Analysis
Twitter Sentiment AnalysisTwitter Sentiment Analysis
Twitter Sentiment Analysis
 
Sentiment Analysis and Classification of Tweets using Data Mining
Sentiment Analysis and Classification of Tweets using Data MiningSentiment Analysis and Classification of Tweets using Data Mining
Sentiment Analysis and Classification of Tweets using Data Mining
 
Twitter Sentiment Analysis: An Unsupervised Approach
Twitter Sentiment Analysis: An Unsupervised ApproachTwitter Sentiment Analysis: An Unsupervised Approach
Twitter Sentiment Analysis: An Unsupervised Approach
 
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET-  	  An Effective Analysis of Anti Troll System using Artificial Intell...IRJET-  	  An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
 
IRJET- Sentimental Analysis of Twitter for Stock Market Investment
IRJET- Sentimental Analysis of Twitter for Stock Market InvestmentIRJET- Sentimental Analysis of Twitter for Stock Market Investment
IRJET- Sentimental Analysis of Twitter for Stock Market Investment
 
Sentiment Analysis for Sarcasm Detection using Deep Learning
Sentiment Analysis for Sarcasm Detection using Deep LearningSentiment Analysis for Sarcasm Detection using Deep Learning
Sentiment Analysis for Sarcasm Detection using Deep Learning
 
Sentiment Analysis on Twitter data using Machine Learning
Sentiment Analysis on Twitter data using Machine LearningSentiment Analysis on Twitter data using Machine Learning
Sentiment Analysis on Twitter data using Machine Learning
 
IRJET- Analysis of Brand Value Prediction based on Social Media Data
IRJET-  	  Analysis of Brand Value Prediction based on Social Media DataIRJET-  	  Analysis of Brand Value Prediction based on Social Media Data
IRJET- Analysis of Brand Value Prediction based on Social Media Data
 
IRJET- Semantic Question Matching
IRJET- Semantic Question MatchingIRJET- Semantic Question Matching
IRJET- Semantic Question Matching
 
Sentiment Analysis of Twitter Data
Sentiment Analysis of Twitter DataSentiment Analysis of Twitter Data
Sentiment Analysis of Twitter Data
 
IRJET- Design and Implementation of Sentiment Analyzer for Top Engineering Co...
IRJET- Design and Implementation of Sentiment Analyzer for Top Engineering Co...IRJET- Design and Implementation of Sentiment Analyzer for Top Engineering Co...
IRJET- Design and Implementation of Sentiment Analyzer for Top Engineering Co...
 
IRJET - Response Analysis of Educational Videos
IRJET - Response Analysis of Educational VideosIRJET - Response Analysis of Educational Videos
IRJET - Response Analysis of Educational Videos
 
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
manasideore6
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
zwunae
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
Kamal Acharya
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 

Recently uploaded (20)

Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 

IRJET - Cyberbulling Detection Model

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4447 CYBERBULLING DETECTION MODEL MAYANK KAUSHIK BTECH STUDENT, IT DEPARTMENT, MAHARAJA AGRASEN INSTITUTE OF TECHNOLOGY, DELHI, INDIA ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract –Harassment ofsocialmedia usersbycyberbullies is a significant yet harmful phenomenon on the social media. Existing methods to detect cyberbullying have at least one of these following three bottlenecks. First they only target one social media platform, second is that they address only one topic of cyberbullying. Third is that they rely on carefully handcrafted features of the data. We in this project show that machine learning models can overcome all these three bottlenecks. Knowledge that is learned by these modelsonone type of dataset can be transferred and used to other datasets. Our experiments provide some very useful insights about cyberbullying detection. According to the best of our knowledge, this is work that systematically analyzes cyberbullying detection on various topicsacrossvarioussocial media platforms using Machine Learning and Transfer learning Key Words: Cyberbullying, Social Media, Machine Learning 1. INTRODUCTION As the number of users on social media are increasing. It leads to a new way of bullying. The later term is defined as an intentional or an aggressive acts that are carried out by person or groups of individuals using repeatedly communication messages over time against a victim or user who cannot easily defend him or herself [1]. Bullying has always been a part of our society since a long time. With change coming with internet, it was only a matter of time that bullies found their view on this new and opportunistic medium. Bullies has become able to do their nasty deeds with anonymity and great distance between them and their targets. The act of cyberbullying according to Cambridge dictionary is defined as the activity ofusinginternettoharm, frighten or bully another person, especially by sendingthem unpleasant messages. The effect it has on his victim is the main fact that distinguishes cyberbullying from the normal bullying. It may happen traditional bullying may end in physical damage as well as emotional and psychological damage, as oppose to cyberbullying, whereitisall emotional and psychological. It has to be prevented given the consequences of cyberbullying, it urgently needs to get detected as soon as it happens. One of the successful approach that learns from its data and generates a model that automatically classifyproperactionisMachinelearning. It can lead us to detect a pattern among the language of bullies and hence can generate a model to detect cyberbullying actions. Thus, the main contribution of our paper is to propose a supervised machinelearningapproach for detecting and preventing cyberbullying. 1.1 Data Overview We performed experiments using large, diverse publicly available datasets forcyberbullyingdetectioninsocialmedia. As twitter dataset contains examples of racism and sexism. Where pot labeled as cyberbullyingareverylesscomparedto normal neutral posts. Variation Differences in the number of records in the data sets also affect the size of the dictionary, which represents the number of different words found inthe data set. We measure the size of the post in terms of the number of words in the post. There are only a few large messages for each data set. We truncate such large posts to the size of a post with a rating of 95 in this dataset. This dataset that we are working upon is taken from Kaggle, it is a twitter dataset having8818annotatedtweetsandhebullying ones having common slurs and terms used pertaining to religious, sexual, gender, and ethnic minorities 1.2 The Approach We first worked on applying sentiment analysis on Twitter. We worked on a supervised approach to solve this problem. In this approach, we used a dataset containing different segments, namely, id, tweet, label (‘0’ for positive and ‘1’ for negative). Then we pre-processed the data in differentstages. Firstly, we combined the test and the training datasets to create a new data-frame. Then, we removed the user handles (represented after @) as they don’t contribute in analyzing the tweet. Further we removedallthepunctuations, numbers and special characters in order to create a clean database for implementation. Also, short words don’t contribute much in understanding the tweet by the algorithm, so we removed all the words with word length of less than 3 characters. After obtaining a clean dataset, we implementedtokenizationofthe data because we will apply stemming from the ‘NLTK’ package. After stemming, we stitch back the tokens to form the meaningful text for the processing. Afterwards, we use Word Cloud for Data visualization of our current analysis of the tweets in the data frame. The tweets with negative comments are collected and can be transmittedtoauthorities for checking. 2. TECHNOLOGY USED Natural language processing (NLP) is a study of artificial intelligence that helps machines and computers understand, interpret, and manipulate simple human language. Natural language processing helpsdevelopersorganizeknowledgeto perform tasks such as translation, summarization, named entity recognition, relationship extraction, voicerecognition, topicsegmentation, etc. Natural languageprocessingisaway that computers analyze, understand, and derive meaning
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4448 from day to day human language. Languages such as English, Spanish, Hindi, etc. Themaincomponentsofnaturallanguage processing are: Morphological and lexical analysis Syntactic analysis Semantic analysis Speech integration Pragmatic analysis 1) Morphological and lexical analysis Lexical analysis is a vocabulary that includes your wordsand expressions. Represents the analysis, identification and description of the structure of words. It includes dividing a text into paragraphs, words,and sentences.Individualwords are broken downintotheircomponents,andsymbolsthatare not words, such as punctuation marks, are separated from words. 2) Semantic analysis Semantic analysis is a structure created by the parser that assigns meanings. This component of NLP transfers linear sequences of words into simpler structures. Shows how words are associated with each other. Semantics focuses only on the literal meaning of words, phrases, and sentences. This only abstracts the meaning of diction or the actual meaning of the given context. The structures assigned by the parser always have assigned meaning For example, "colorless green idea". This would be rejected by Symantec's analysisascolorless here;Greendoesn'tmake any sense. 3) Pragmatic analysis Pragmaticanalysisdealswiththegeneralcommunicativeand social content and its effect on interpretation. It means abstracting or deriving meaningful use of language in situations. In this analysis, the main focus is always on what was said, reinterpreted on what is understood. Pragmatic analysis helps users discover this intended effect by applying a set of rules that characterize cooperative dialogues. For example, "close the window?" In the exampleitshouldbe precisely interpreted as a new request instead of an order. 4) Syntax analysis Words are commonly accepted as the smallest syntax units. Syntax refers to the principles and rules that govern the sentence structure of any individual language. The syntax focuses on the proper order of words that can affect their meaning. This involves the analysis of the words in a sentence following the grammatical structure of the sentence. Words are transformed intostructuretoshowhow words are related to each other. Fig -1: NLP FLOW 3. THE NEXT STEPS For our current simulation we are using supervised classification of the data. For the next expansion, we are looking for jumping into the unsupervised classification using k-means algorithm. Also, we are going to live track the tweets by integrating the algorithm with the twitter api. After a successful implementation on twitter, we will upgrade the platform for other top social mediasitesas well. Currently we are working with NLP, but modern-day posts are not limited to texts, but most of the bullying as recorded these days is by the use of images as well. We will also try and build a model for image recognition to further identify and investigate such cybercrime. 4. RESULTS After preprocessing the dataset, we followedthesamesteps as were told in section 1.2, we then split the dataset into ratios (0.7,0.3) for train and test. Accuracy, f-scoreandrecall and precision are taken as a performance measure to evaluate the classifiers. We applied SVM, Random Forest classifier and KNN algorithms as they are among the best performance
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4449 classifiers. We achieved highest accuracywhiletrainingwith SVM and Random forest classifier of 95%whereasKNN gave us the accuracy of 92%. CLASSIFIER ACCURACY SVM 95% Random Forest 95% KNN 92% 5. CONCLUSIONS In this paper, we proposed an approach to detect cyberbullying using machine learning techniques. We evaluated our model on threeclassifiers SVM,Randomforest and KNN and NLTK for feature extraction. Furthermore, we compared our work with another related work that used the same dataset as ours, finding that our Neural Network outperformed their classifiers in terms of accuracy and f-score. By achieving this accuracy, ourwork is definitely going to improve cyber-bullying detection to help people to use social media safely. REFERENCES [1] P. Badjatiya, S. Gupta, M. Gupta, and V. Varma. Deep learning for hate speech detection in tweets. In WWW, pages 759–760, 2017. M. Young, The Technical Writer’s Handbook. Mill Valley, CA: University Science, 1989. [2] N. Djuric, J. Zhou, R. Morris, M. Grbovic, V. Radosavljevic, and N. Bhamidipati. Hate speech detection with comment embeddings. In WWW, pages 29–30, 2015.. [3] S. Hinduja and J. W. Patchin. Bullying, cyberbullying,and suicide. Archives of suicide research, 14(3):206–221, 2010. [4] R. Johnson and T. Zhang. Supervised and semi- supervised text categorization using lstm for region embeddings. In ICML, pages 526–534, 2016. [5] D. Karthik, R. Roi, and L. Henry. Modeling the detection of textual cyberbullying. In Workshop on The Social Mobile Web, ICWSM, 2011. [6] Y. Kim. Convolutional neural networks for sentence classification. In EMNLP, pages 1746–1751, 2014. [7] L. v. d. Maaten and G. Hinton. Visualizing data using t- sne. Journal of Machine Learning Research, 9(Nov):2579–2605, 2008. [8] C. Nobata, J. Tetreault, A. Thomas, Y. Mehdad, and Y. Chang. Abusive language detection in online user content. In WWW, pages 145–153, 2016. [9] J. W. Patchin and S. Hinduja. Bullies move beyond the schoolyard: A preliminary look at cyberbullying. Youth violence and juvenile justice, 4(2):148–169, 2006. [10] J. Pennington, R. Socher, and C.D.Manning.Glove:Global vectors for word representation. In EMNLP, pages 1532–1543, 2014. [11] K. Reynolds, A. Kontostathis, and L. Edwards. Using machine learning to detect cyberbullying. In ICMLA, pages 241–244, 2011. [12] R. L. Servance. Cyberbullying,cyber-harassment,andthe conflict between schools and the first amendment. Wisconsin Law Review, pages 12–13, 2003. [13] D. Tang, F. Wei, N. Yang, M. Zhou, T. Liu, and B. Qin. Learning sentiment-specific word embeddingfortwitter sentiment classification. In ACL, pages 1555–1565, 2014. [14] C. Van Hee, E. Lefever, B. Verhoeven, J. Mennes, B. Desmet, G. De Pauw, W. Daelemans, and V. Hoste. Automatic detection and prevention ofcyberbullying.In Intl. Conf. Human and Social Analytics, pages 13–18, 2015. [15] Z. Waseem and D. Hovy. Hateful symbols or hateful people? predictive features for hate speechdetectionon twitter. In NAACL SRW, pages 88–93, 2016. [16] E. Whittaker and R. M.Kowalski.Cyberbullyingvia social media. Journal of School Violence, 14(1):11–29, 2015. [17] E. Wulczyn, N. Thain, and L. Dixon. Ex machina:Personal attacks seen at scale. In WWW, pages 1391–1399, 2017. [18] D. Yin, Z. Xue, L. Hong, B. D. Davison, A. Kontostathis,and L. Edwards. Detection of harassment on web 2.0. In The workshop on Content Analysis in the WEB 2.0, WWW, pages 1–7, 2009. [19] P. Zhou, Z. Qi, S. Zheng, J. Xu, H. Bao, and B. Xu. Text classification improved by integrating bidirectional lstm with two-dimensional max pooling. In COLING, pages 3485–3495, 2016.