SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2943
Detection of Drug Abuse using Social media mining
Astika Kudali1, Siddhi Kunekar2, Prof. Renuka Nagpure3
1,2Dept. Information Technology, Atharva College of Engineering, Mumbai.
3Professor, Dept. Information Technology, Atharva College of Engineering, Mumbai.
-----------------------------------------------------------------------***--------------------------------------------------------------------
Abstract – A The graph of drug intake is seen to be
growing nowadays. This is based upon surveys and other
drug rackets which are caught in a not so effortless manner.
People don’t openly answer in such surveys to sensitive
topics. Selection of people to survey also dictates the line of
this resultant graph which is amongst other challenges. This
information is vital to law enforcement agencies and for
public welfare. In this paper, we uncover drug patterns
using text and image mining. We extract dynamic data from
social media platforms like Instagram to discover such
wrong habitats. Initially, Instagram posts are mined using
text analysis with the help of certain drug-related hashtags.
The posts which are filtered are analysed to determine
frequent drug-related slangs and linguistics, which further
help in accessing more data. Similarly, other common trends
and networking behaviors of the addicts are learnt using the
obtained posts. User information and demographics is
traced and using network analysis, other linked user-
accounts are also inspected in similar manner.
Key Words: Social Media, Instagram, Data mining, Drug
pattern detection, hashtags
1. INTRODUCTION
Drug activities are increasing a lot these days. Young
children are involved in such illegal things. Behavior of
children as well as adults is getting affected because of
this. It is obviously not ideal for children to be involved in
all this. To catch the drug dealers, it is difficult for the law
enforcement agencies, as it takes a lot of planning and
security to undergo the procedure. Another way of tracing
these illicit activities is by conducting surveys. Now the
conclusion of surveys depends upon many factors like
representative sample undergoing the survey, also
whether they are being completely honest in their
answers, as people don’t answer truthfully in concern for
such sensitive subjects.
Data mining has a lot of applications. It aims to predict
more accurate results, by which further diagnosis of a
problem becomes easy. Data mining can be done for a lot
of things. When data mining is done for a huge amount of
data, it shifts towards more accurate results. Instagram as
a social media platform is emerging as millions of photos
are added into its data and large amount of people are
joining the platform. Many important occasions of a
person’s life are recorded and stored in the database. More
importantly, Instagram revolves around posting images
about one’s activities, and posts are usually accompanied
by hashtags, single words that describe the
activities/characteristics, which are what we use to fetch
posts related to drug consumption.[1 ] Thus, Instagram
acts as a dynamic source of real time data to give more
efficient results. This data can be of great use as a source
to trace the illicit activities. Big data gives an opportunity
to sort through wider range of people. Also, this can be
done with limited sources and reduced time than other
methods.
2. LITERATURE SURVEY
1.1 Fine-grained mining of Illicit Drug Use
Patterns Using Social Multimedia data
This paper was proposed by Yiheng Zhou, Numair Sani,
Jiebo Luo. The following paper proposes an idea of
Instagram data mining for tracing prohibited use of drugs.
This paper also uses image mining as well as text mining
to implement the model. This paper has detailed
information about the process used to carry forward the
project. it is stated that it requires a lot of time to carry out
traditional methods, thus it is suggested of a method
which requires less of time and labor. Firstly, mine the
data using hashtag-based algorithm and figure out time
pattern of drug consumption. Various geographical trends
were determined by location endpoint search, which in
detail when used was giving much more accurate results.
A basic development of this investigation is in mixed
media information examination and particularly face
picture examination. The ability to manage, analyse,
summarize, visualize, and discover knowledge from the
collected data in a timely manner and in a scalable fashion
is a complex task. Storing this data without using it in any
sense is simply a waste of storage space and time.
1.2 Detecting Topics and Locations on
Instagram Photos
This paper uses Computer Vision tools and text mining
techniques, ang provides a strategy to identify similar
content topics of pictures related to a specific hashtag on
Instagram. Instagram is a social media platform that
permits the users to share their status by transferring
pictures with some caption, its location and a few
hashtags.
According to this paper, the relevant content between
posts was detected by following a procedure. Firstly, the
web is scraped for all the posts related to a single hashtag.
Also using Image recognition, relevant data is collected.
Then using Visual description and User’s description
similar topics are recognized. Visual description meaning
using Image analysis for detecting similar kind of posts
and User’s description meaning the caption of that post
and the hashtags. Cosine method was computed to identify
the similarity between the identified topics in the user
posts description and the visual description in a value
between 0 and 1; where 0 means there is no similarity and
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2944
1 means that both topics are exactly the same.[2] The
results are similar to what was expected to be a result. For
this reason, the methodology and procedure of this work
can be valuable in the regions, for example, computerized
promoting, statistical surveying, assessments of public
sentiment, online networking, social investigations and
different fields.
1.3 A methodology for mapping Instagram
hashtag
It is expressed that it requires a great deal of time to
perform customary strategies, subsequently it is proposed
of a technique which requires less of time and work. The
time for studying data through qualitative means is also
critical to understanding how social media are used in
nonstandard ways, identifying practices that might easily
be missed through automated analyses.[3] Obviously,
enormous data isn’t synchronous with quantitative
examination and there are increasingly significant bits of
data to be studied from largescale testing and thus, we
advocate for blended strategies, joining quantitative and
subjective devices This paper enhances the methods that
can be used for hashtag analysis on Instagram. Too often,
Big Data enables the practice of apophenia: seeing
patterns where none actually exist, simply because
enormous quantities of data can offer connections that
radiate in all directions.[3]
3. METHODOLOGY
1.Scraping of data from social media: Instagram is a
social networking site where you can post pictures about
anything with a caption and hashtags. The hashtags are
basically to define what the picture is about. Mostly these
hashtags help identify people to recognize which category
the image belongs to. There are over 400 million people
using Instagram, many of them post about their activities
or achievements here. It is very difficult to trace a person
in a real life. But on Instagram it is comparatively easy to
identify the person. More importantly, Instagram revolves
around posting images about one’s activities, and posts are
usually accompanied by hashtags, single words that
describe the activities/characteristics, which are what we
use to fetch posts related to what we want.[1] Also, on
Instagram, it is easy to find connections between person to
person, which just gives access to more data on Internet.
2.Text Analysis: Text Analysis is the computerized
procedure of acquiring data from content. Content
investigation is the mechanized procedure that permits
machines to remove and order data from content, for
example, tweets, messages, bolster tickets, item audits,
overview reactions, and so forth. It is important to
implement textual analysis so as to identify which tags are
drug-related. In text analysis there are many technologies
amongst which, only two methods are implemented which
are used for our project.
Those are:
Word Frequency: In this it is checked, how many times
the word occurs in a given text. It helps in finding out
which tags are mostly used in those drug-related posts
and filter them out for further finding out about more tags
to add in that list. Collocation: In some parts of text there
might be multiple words that occur one after another.
There are bigrams (Two words after one another) and
trigrams (Three words after one another) which might
coexist repeatedly which should also be counted. In our
project, we see whether there are two or more hashtags
that occur simultaneously in different posts to get the
relativity in between them.
3. Filtering posts and collecting the information: There
are many posts which are filtered according to different
hashtags that are related to the drugs. We utilized an
example where if a post has more than two hashtags
which are in the rundown of hashtags that are mined from
the Data mining and Text analysis, at that point those
posts are considered as drug-related posts. From these
posts, the hashtags which occur in more than six posts are
considered as hashtags which are drug related. Then
further these tags are added into the list of drug-related
hashtags.
4. RESULT
Initially basic scrapping of data is done. Drug related
images are showcased in the Web-Chrome.
Fig-4.1: Instagram Drug related posts
Then posts are filtered based on a particular hashtag
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2945
Fig-4.2: Based on hashtag weed
There are also other hashtags related to weed which
gives other posts. In that way many hashtags are
looked out for.
Fig-4.3: Based on hashtag cannabis
Some hashtags are when Instagram posts are filtered
which are related to drugs. There are also hashtags
mentioned in comments sometimes.
Fig-4.4: Instagram post with hashtags
There are other lingos which need to be found out through
Instagram hashtags and other posts. The list is generated
which consists of all drug related hashtags.
Fig-4.5:Hashtag list
5. CONCLUSION
Thus, we aim to develop a model that works on dynamic
data from Instagram and detects the illegal drug related
posts through the hashtags given in the description of the
post. The model also runs through various other hashtags
to learn the lingo of drug users. Similarly, other hashtags
are added in a CSV file for further studying of their
behavioral patterns. The user accounts which are found to
be involved in such things are checked for such accounts
which might be also involved in drug activities. Also,
location-based analysis of posts is done for mining more of
such illicit patterns.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2946
ACKNOWLEDGEMENT
We would like to thank our guide, Prof. Renuka Nagpure
for helping us in giving an approach and guiding through
the project. Without her support it wouldn’t have been
possible to implement this project in an efficient manner.
We are also grateful to our Principal Dr. S. P. Kallurkar and
Prof. Deepali Maste (HOD, Information Technology
Engineering) for giving us their insights and thoughts for
the betterment of our project.
REFERENCES
[1] Yiheng Zhou, Numair Sani, Jiebo Luo, “Fine-grained
Mining of Illicit Drug Use Patterns Using Social Multimedia
Data from Instagram” IEEE, Nov. 2018.
[2] Carlos Fiallos, Karina Jimenes, Stalin Figueroa
“Detecting Topics and Locations on Instagram Photos”
IEEE, Jan. 2016
[3] Anju Mohandas, Bindhya Babu, Deepa Rajan S, Dr. L
Padma Suresh, Rainu Boben “ Survey on Mining Social
Media Data for Understanding Drug Usage” IEEE, Jan. 2016
[4] Anju Mohandas, Bindhya Babu, Deepa Rajan S, Dr. L
Padma Suresh, Rainu Boben “ Survey on Mining Social
Media Data for Understanding Drug Usage” IEEE, Jan. 2016
[5] Cody B., & Jennifer G. This is your Twitter on drugs.
Any questions? 2015.
[6] Munmun C., Michal G., Scott C., & Eric H. Predicting
Depression via Social Media. 2013.

More Related Content

What's hot

IRJET- Fake Profile Identification using Machine Learning
IRJET-  	  Fake Profile Identification using Machine LearningIRJET-  	  Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
IRJET Journal
 
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITY
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITYFRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITY
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITY
cscpconf
 
IRJET - Election Result Prediction using Sentiment Analysis
IRJET - Election Result Prediction using Sentiment AnalysisIRJET - Election Result Prediction using Sentiment Analysis
IRJET - Election Result Prediction using Sentiment Analysis
IRJET Journal
 
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGDETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
ijcsit
 
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET Journal
 
Sentiment Analysis of Twitter Data
Sentiment Analysis of Twitter DataSentiment Analysis of Twitter Data
Sentiment Analysis of Twitter Data
IRJET Journal
 
IRJET- Twitter Spammer Detection
IRJET- Twitter Spammer DetectionIRJET- Twitter Spammer Detection
IRJET- Twitter Spammer Detection
IRJET Journal
 
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET Journal
 
Social Data Mining
Social Data MiningSocial Data Mining
Social Data Mining
Mahesh Meniya
 
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
IRJET Journal
 
E017433538
E017433538E017433538
E017433538
IOSR Journals
 
IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET-  	  Improved Real-Time Twitter Sentiment Analysis using ML & Word2VecIRJET-  	  Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET Journal
 
ACM WebSci 2018 presentation/発表資料
ACM WebSci 2018 presentation/発表資料ACM WebSci 2018 presentation/発表資料
ACM WebSci 2018 presentation/発表資料
Yusuke Yamamoto
 
Measuring information credibility in social media using combination of user p...
Measuring information credibility in social media using combination of user p...Measuring information credibility in social media using combination of user p...
Measuring information credibility in social media using combination of user p...
IJECEIAES
 
ICICCE0280
ICICCE0280ICICCE0280
ICICCE0280
IJTET Journal
 
IRJET - Socirank Identifying and Ranking Prevalent News Topics using Social M...
IRJET - Socirank Identifying and Ranking Prevalent News Topics using Social M...IRJET - Socirank Identifying and Ranking Prevalent News Topics using Social M...
IRJET - Socirank Identifying and Ranking Prevalent News Topics using Social M...
IRJET Journal
 
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET Journal
 
Usability Review of Mashup Tools
Usability Review of Mashup ToolsUsability Review of Mashup Tools
Usability Review of Mashup Tools
Tanya Ahmed
 
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017
Rohit Desai
 
[IJET V2I4P9] Authors: Praveen Jayasankar , Prashanth Jayaraman ,Rachel Hannah
[IJET V2I4P9] Authors: Praveen Jayasankar , Prashanth Jayaraman ,Rachel Hannah[IJET V2I4P9] Authors: Praveen Jayasankar , Prashanth Jayaraman ,Rachel Hannah
[IJET V2I4P9] Authors: Praveen Jayasankar , Prashanth Jayaraman ,Rachel Hannah
IJET - International Journal of Engineering and Techniques
 

What's hot (20)

IRJET- Fake Profile Identification using Machine Learning
IRJET-  	  Fake Profile Identification using Machine LearningIRJET-  	  Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
 
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITY
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITYFRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITY
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITY
 
IRJET - Election Result Prediction using Sentiment Analysis
IRJET - Election Result Prediction using Sentiment AnalysisIRJET - Election Result Prediction using Sentiment Analysis
IRJET - Election Result Prediction using Sentiment Analysis
 
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGDETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
 
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
 
Sentiment Analysis of Twitter Data
Sentiment Analysis of Twitter DataSentiment Analysis of Twitter Data
Sentiment Analysis of Twitter Data
 
IRJET- Twitter Spammer Detection
IRJET- Twitter Spammer DetectionIRJET- Twitter Spammer Detection
IRJET- Twitter Spammer Detection
 
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
 
Social Data Mining
Social Data MiningSocial Data Mining
Social Data Mining
 
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
 
E017433538
E017433538E017433538
E017433538
 
IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET-  	  Improved Real-Time Twitter Sentiment Analysis using ML & Word2VecIRJET-  	  Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
 
ACM WebSci 2018 presentation/発表資料
ACM WebSci 2018 presentation/発表資料ACM WebSci 2018 presentation/発表資料
ACM WebSci 2018 presentation/発表資料
 
Measuring information credibility in social media using combination of user p...
Measuring information credibility in social media using combination of user p...Measuring information credibility in social media using combination of user p...
Measuring information credibility in social media using combination of user p...
 
ICICCE0280
ICICCE0280ICICCE0280
ICICCE0280
 
IRJET - Socirank Identifying and Ranking Prevalent News Topics using Social M...
IRJET - Socirank Identifying and Ranking Prevalent News Topics using Social M...IRJET - Socirank Identifying and Ranking Prevalent News Topics using Social M...
IRJET - Socirank Identifying and Ranking Prevalent News Topics using Social M...
 
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...
 
Usability Review of Mashup Tools
Usability Review of Mashup ToolsUsability Review of Mashup Tools
Usability Review of Mashup Tools
 
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017
 
[IJET V2I4P9] Authors: Praveen Jayasankar , Prashanth Jayaraman ,Rachel Hannah
[IJET V2I4P9] Authors: Praveen Jayasankar , Prashanth Jayaraman ,Rachel Hannah[IJET V2I4P9] Authors: Praveen Jayasankar , Prashanth Jayaraman ,Rachel Hannah
[IJET V2I4P9] Authors: Praveen Jayasankar , Prashanth Jayaraman ,Rachel Hannah
 

Similar to IRJET - Detection of Drug Abuse using Social Media Mining

Comparative Study of Cyberbullying Detection using Different Machine Learning...
Comparative Study of Cyberbullying Detection using Different Machine Learning...Comparative Study of Cyberbullying Detection using Different Machine Learning...
Comparative Study of Cyberbullying Detection using Different Machine Learning...
ijtsrd
 
Spammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social NetworksSpammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social Networks
IRJET Journal
 
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
ijaia
 
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
gerogepatton
 
Novel Machine Learning Algorithms for Centrality and Cliques Detection in You...
Novel Machine Learning Algorithms for Centrality and Cliques Detection in You...Novel Machine Learning Algorithms for Centrality and Cliques Detection in You...
Novel Machine Learning Algorithms for Centrality and Cliques Detection in You...
gerogepatton
 
IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...
IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...
IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...
IRJET Journal
 
IRJET- Tweet Segmentation and its Application to Named Entity Recognition
IRJET- Tweet Segmentation and its Application to Named Entity RecognitionIRJET- Tweet Segmentation and its Application to Named Entity Recognition
IRJET- Tweet Segmentation and its Application to Named Entity Recognition
IRJET Journal
 
Detection of Fake News Using Machine Learning
Detection of Fake News Using Machine LearningDetection of Fake News Using Machine Learning
Detection of Fake News Using Machine Learning
IRJET Journal
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
ijtsrd
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
IRJET Journal
 
vishwas
vishwasvishwas
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53
IRJET Journal
 
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORK
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORKINFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORK
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORK
IAEME Publication
 
nm
nmnm
IRJET- Personality Recognition using Social Media Data
IRJET- Personality Recognition using Social Media DataIRJET- Personality Recognition using Social Media Data
IRJET- Personality Recognition using Social Media Data
IRJET Journal
 
SOCIAL MEDIA ANALYSIS ON SUPPLY CHAIN MANAGEMENT IN FOOD INDUSTRY
SOCIAL MEDIA ANALYSIS ON SUPPLY CHAIN MANAGEMENT IN FOOD INDUSTRYSOCIAL MEDIA ANALYSIS ON SUPPLY CHAIN MANAGEMENT IN FOOD INDUSTRY
SOCIAL MEDIA ANALYSIS ON SUPPLY CHAIN MANAGEMENT IN FOOD INDUSTRY
Kaustubh Nale
 
A Baseline Based Deep Learning Approach of Live Tweets
A Baseline Based Deep Learning Approach of Live TweetsA Baseline Based Deep Learning Approach of Live Tweets
A Baseline Based Deep Learning Approach of Live Tweets
ijtsrd
 
IRJET - Unauthorized Terror Attack Tracking System using Web Usage Mining
IRJET - Unauthorized Terror Attack Tracking System using Web Usage MiningIRJET - Unauthorized Terror Attack Tracking System using Web Usage Mining
IRJET - Unauthorized Terror Attack Tracking System using Web Usage Mining
IRJET Journal
 
Detecting Spam Tags Against Collaborative Unfair Through Trust Modelling
Detecting Spam Tags Against Collaborative Unfair Through Trust ModellingDetecting Spam Tags Against Collaborative Unfair Through Trust Modelling
Detecting Spam Tags Against Collaborative Unfair Through Trust Modelling
IOSR Journals
 
Detailed Investigation of Text Classification and Clustering of Twitter Data ...
Detailed Investigation of Text Classification and Clustering of Twitter Data ...Detailed Investigation of Text Classification and Clustering of Twitter Data ...
Detailed Investigation of Text Classification and Clustering of Twitter Data ...
ijtsrd
 

Similar to IRJET - Detection of Drug Abuse using Social Media Mining (20)

Comparative Study of Cyberbullying Detection using Different Machine Learning...
Comparative Study of Cyberbullying Detection using Different Machine Learning...Comparative Study of Cyberbullying Detection using Different Machine Learning...
Comparative Study of Cyberbullying Detection using Different Machine Learning...
 
Spammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social NetworksSpammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social Networks
 
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
 
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
 
Novel Machine Learning Algorithms for Centrality and Cliques Detection in You...
Novel Machine Learning Algorithms for Centrality and Cliques Detection in You...Novel Machine Learning Algorithms for Centrality and Cliques Detection in You...
Novel Machine Learning Algorithms for Centrality and Cliques Detection in You...
 
IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...
IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...
IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...
 
IRJET- Tweet Segmentation and its Application to Named Entity Recognition
IRJET- Tweet Segmentation and its Application to Named Entity RecognitionIRJET- Tweet Segmentation and its Application to Named Entity Recognition
IRJET- Tweet Segmentation and its Application to Named Entity Recognition
 
Detection of Fake News Using Machine Learning
Detection of Fake News Using Machine LearningDetection of Fake News Using Machine Learning
Detection of Fake News Using Machine Learning
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
 
vishwas
vishwasvishwas
vishwas
 
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53
 
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORK
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORKINFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORK
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORK
 
nm
nmnm
nm
 
IRJET- Personality Recognition using Social Media Data
IRJET- Personality Recognition using Social Media DataIRJET- Personality Recognition using Social Media Data
IRJET- Personality Recognition using Social Media Data
 
SOCIAL MEDIA ANALYSIS ON SUPPLY CHAIN MANAGEMENT IN FOOD INDUSTRY
SOCIAL MEDIA ANALYSIS ON SUPPLY CHAIN MANAGEMENT IN FOOD INDUSTRYSOCIAL MEDIA ANALYSIS ON SUPPLY CHAIN MANAGEMENT IN FOOD INDUSTRY
SOCIAL MEDIA ANALYSIS ON SUPPLY CHAIN MANAGEMENT IN FOOD INDUSTRY
 
A Baseline Based Deep Learning Approach of Live Tweets
A Baseline Based Deep Learning Approach of Live TweetsA Baseline Based Deep Learning Approach of Live Tweets
A Baseline Based Deep Learning Approach of Live Tweets
 
IRJET - Unauthorized Terror Attack Tracking System using Web Usage Mining
IRJET - Unauthorized Terror Attack Tracking System using Web Usage MiningIRJET - Unauthorized Terror Attack Tracking System using Web Usage Mining
IRJET - Unauthorized Terror Attack Tracking System using Web Usage Mining
 
Detecting Spam Tags Against Collaborative Unfair Through Trust Modelling
Detecting Spam Tags Against Collaborative Unfair Through Trust ModellingDetecting Spam Tags Against Collaborative Unfair Through Trust Modelling
Detecting Spam Tags Against Collaborative Unfair Through Trust Modelling
 
Detailed Investigation of Text Classification and Clustering of Twitter Data ...
Detailed Investigation of Text Classification and Clustering of Twitter Data ...Detailed Investigation of Text Classification and Clustering of Twitter Data ...
Detailed Investigation of Text Classification and Clustering of Twitter Data ...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
HODECEDSIET
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 

Recently uploaded (20)

ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 

IRJET - Detection of Drug Abuse using Social Media Mining

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2943 Detection of Drug Abuse using Social media mining Astika Kudali1, Siddhi Kunekar2, Prof. Renuka Nagpure3 1,2Dept. Information Technology, Atharva College of Engineering, Mumbai. 3Professor, Dept. Information Technology, Atharva College of Engineering, Mumbai. -----------------------------------------------------------------------***-------------------------------------------------------------------- Abstract – A The graph of drug intake is seen to be growing nowadays. This is based upon surveys and other drug rackets which are caught in a not so effortless manner. People don’t openly answer in such surveys to sensitive topics. Selection of people to survey also dictates the line of this resultant graph which is amongst other challenges. This information is vital to law enforcement agencies and for public welfare. In this paper, we uncover drug patterns using text and image mining. We extract dynamic data from social media platforms like Instagram to discover such wrong habitats. Initially, Instagram posts are mined using text analysis with the help of certain drug-related hashtags. The posts which are filtered are analysed to determine frequent drug-related slangs and linguistics, which further help in accessing more data. Similarly, other common trends and networking behaviors of the addicts are learnt using the obtained posts. User information and demographics is traced and using network analysis, other linked user- accounts are also inspected in similar manner. Key Words: Social Media, Instagram, Data mining, Drug pattern detection, hashtags 1. INTRODUCTION Drug activities are increasing a lot these days. Young children are involved in such illegal things. Behavior of children as well as adults is getting affected because of this. It is obviously not ideal for children to be involved in all this. To catch the drug dealers, it is difficult for the law enforcement agencies, as it takes a lot of planning and security to undergo the procedure. Another way of tracing these illicit activities is by conducting surveys. Now the conclusion of surveys depends upon many factors like representative sample undergoing the survey, also whether they are being completely honest in their answers, as people don’t answer truthfully in concern for such sensitive subjects. Data mining has a lot of applications. It aims to predict more accurate results, by which further diagnosis of a problem becomes easy. Data mining can be done for a lot of things. When data mining is done for a huge amount of data, it shifts towards more accurate results. Instagram as a social media platform is emerging as millions of photos are added into its data and large amount of people are joining the platform. Many important occasions of a person’s life are recorded and stored in the database. More importantly, Instagram revolves around posting images about one’s activities, and posts are usually accompanied by hashtags, single words that describe the activities/characteristics, which are what we use to fetch posts related to drug consumption.[1 ] Thus, Instagram acts as a dynamic source of real time data to give more efficient results. This data can be of great use as a source to trace the illicit activities. Big data gives an opportunity to sort through wider range of people. Also, this can be done with limited sources and reduced time than other methods. 2. LITERATURE SURVEY 1.1 Fine-grained mining of Illicit Drug Use Patterns Using Social Multimedia data This paper was proposed by Yiheng Zhou, Numair Sani, Jiebo Luo. The following paper proposes an idea of Instagram data mining for tracing prohibited use of drugs. This paper also uses image mining as well as text mining to implement the model. This paper has detailed information about the process used to carry forward the project. it is stated that it requires a lot of time to carry out traditional methods, thus it is suggested of a method which requires less of time and labor. Firstly, mine the data using hashtag-based algorithm and figure out time pattern of drug consumption. Various geographical trends were determined by location endpoint search, which in detail when used was giving much more accurate results. A basic development of this investigation is in mixed media information examination and particularly face picture examination. The ability to manage, analyse, summarize, visualize, and discover knowledge from the collected data in a timely manner and in a scalable fashion is a complex task. Storing this data without using it in any sense is simply a waste of storage space and time. 1.2 Detecting Topics and Locations on Instagram Photos This paper uses Computer Vision tools and text mining techniques, ang provides a strategy to identify similar content topics of pictures related to a specific hashtag on Instagram. Instagram is a social media platform that permits the users to share their status by transferring pictures with some caption, its location and a few hashtags. According to this paper, the relevant content between posts was detected by following a procedure. Firstly, the web is scraped for all the posts related to a single hashtag. Also using Image recognition, relevant data is collected. Then using Visual description and User’s description similar topics are recognized. Visual description meaning using Image analysis for detecting similar kind of posts and User’s description meaning the caption of that post and the hashtags. Cosine method was computed to identify the similarity between the identified topics in the user posts description and the visual description in a value between 0 and 1; where 0 means there is no similarity and
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2944 1 means that both topics are exactly the same.[2] The results are similar to what was expected to be a result. For this reason, the methodology and procedure of this work can be valuable in the regions, for example, computerized promoting, statistical surveying, assessments of public sentiment, online networking, social investigations and different fields. 1.3 A methodology for mapping Instagram hashtag It is expressed that it requires a great deal of time to perform customary strategies, subsequently it is proposed of a technique which requires less of time and work. The time for studying data through qualitative means is also critical to understanding how social media are used in nonstandard ways, identifying practices that might easily be missed through automated analyses.[3] Obviously, enormous data isn’t synchronous with quantitative examination and there are increasingly significant bits of data to be studied from largescale testing and thus, we advocate for blended strategies, joining quantitative and subjective devices This paper enhances the methods that can be used for hashtag analysis on Instagram. Too often, Big Data enables the practice of apophenia: seeing patterns where none actually exist, simply because enormous quantities of data can offer connections that radiate in all directions.[3] 3. METHODOLOGY 1.Scraping of data from social media: Instagram is a social networking site where you can post pictures about anything with a caption and hashtags. The hashtags are basically to define what the picture is about. Mostly these hashtags help identify people to recognize which category the image belongs to. There are over 400 million people using Instagram, many of them post about their activities or achievements here. It is very difficult to trace a person in a real life. But on Instagram it is comparatively easy to identify the person. More importantly, Instagram revolves around posting images about one’s activities, and posts are usually accompanied by hashtags, single words that describe the activities/characteristics, which are what we use to fetch posts related to what we want.[1] Also, on Instagram, it is easy to find connections between person to person, which just gives access to more data on Internet. 2.Text Analysis: Text Analysis is the computerized procedure of acquiring data from content. Content investigation is the mechanized procedure that permits machines to remove and order data from content, for example, tweets, messages, bolster tickets, item audits, overview reactions, and so forth. It is important to implement textual analysis so as to identify which tags are drug-related. In text analysis there are many technologies amongst which, only two methods are implemented which are used for our project. Those are: Word Frequency: In this it is checked, how many times the word occurs in a given text. It helps in finding out which tags are mostly used in those drug-related posts and filter them out for further finding out about more tags to add in that list. Collocation: In some parts of text there might be multiple words that occur one after another. There are bigrams (Two words after one another) and trigrams (Three words after one another) which might coexist repeatedly which should also be counted. In our project, we see whether there are two or more hashtags that occur simultaneously in different posts to get the relativity in between them. 3. Filtering posts and collecting the information: There are many posts which are filtered according to different hashtags that are related to the drugs. We utilized an example where if a post has more than two hashtags which are in the rundown of hashtags that are mined from the Data mining and Text analysis, at that point those posts are considered as drug-related posts. From these posts, the hashtags which occur in more than six posts are considered as hashtags which are drug related. Then further these tags are added into the list of drug-related hashtags. 4. RESULT Initially basic scrapping of data is done. Drug related images are showcased in the Web-Chrome. Fig-4.1: Instagram Drug related posts Then posts are filtered based on a particular hashtag
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2945 Fig-4.2: Based on hashtag weed There are also other hashtags related to weed which gives other posts. In that way many hashtags are looked out for. Fig-4.3: Based on hashtag cannabis Some hashtags are when Instagram posts are filtered which are related to drugs. There are also hashtags mentioned in comments sometimes. Fig-4.4: Instagram post with hashtags There are other lingos which need to be found out through Instagram hashtags and other posts. The list is generated which consists of all drug related hashtags. Fig-4.5:Hashtag list 5. CONCLUSION Thus, we aim to develop a model that works on dynamic data from Instagram and detects the illegal drug related posts through the hashtags given in the description of the post. The model also runs through various other hashtags to learn the lingo of drug users. Similarly, other hashtags are added in a CSV file for further studying of their behavioral patterns. The user accounts which are found to be involved in such things are checked for such accounts which might be also involved in drug activities. Also, location-based analysis of posts is done for mining more of such illicit patterns.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2946 ACKNOWLEDGEMENT We would like to thank our guide, Prof. Renuka Nagpure for helping us in giving an approach and guiding through the project. Without her support it wouldn’t have been possible to implement this project in an efficient manner. We are also grateful to our Principal Dr. S. P. Kallurkar and Prof. Deepali Maste (HOD, Information Technology Engineering) for giving us their insights and thoughts for the betterment of our project. REFERENCES [1] Yiheng Zhou, Numair Sani, Jiebo Luo, “Fine-grained Mining of Illicit Drug Use Patterns Using Social Multimedia Data from Instagram” IEEE, Nov. 2018. [2] Carlos Fiallos, Karina Jimenes, Stalin Figueroa “Detecting Topics and Locations on Instagram Photos” IEEE, Jan. 2016 [3] Anju Mohandas, Bindhya Babu, Deepa Rajan S, Dr. L Padma Suresh, Rainu Boben “ Survey on Mining Social Media Data for Understanding Drug Usage” IEEE, Jan. 2016 [4] Anju Mohandas, Bindhya Babu, Deepa Rajan S, Dr. L Padma Suresh, Rainu Boben “ Survey on Mining Social Media Data for Understanding Drug Usage” IEEE, Jan. 2016 [5] Cody B., & Jennifer G. This is your Twitter on drugs. Any questions? 2015. [6] Munmun C., Michal G., Scott C., & Eric H. Predicting Depression via Social Media. 2013.