SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2025
FAKE NEWS DETECTION AND RUMOUR SOURCE IDENTIFICATION
K. ARVIND1, S. GOVARTHAN2, S. KISHORE KUMAR3, M. NAVEEN KUMAR4, R. LAKSHMI5
5Asst. Prof, Department of Information Technology, Valliammai Engineering College, Kanchipuram.
1,2,3,4B.Tech, Department of Information Technology, Valliammai Engineering College, Kanchipuram.
----------------------------------------------------------------------***---------------------------------------------------------------------
ABSTRACT: Information that spreads through social
media will carry a great deal of false news. As an
example, rumors on specific topics will unfold apace
resulting in an oversized variety of nodes coverage
identical (incorrect) observations. Exploitation Bayesian
classification the obtained info is classed into 2 classes
like faux and REAL. If the combined output from each
classes doesn't match then the data is faux. It’s vital to
spot the supply of the rumor spreader. Rather than
inspecting each individual in ancient techniques, we
have a tendency to adopt a reverse dissemination
strategy to specify a group of suspects of the important
rumor supply. This method addresses the measurability
issue of supply identification issues. Once a supply is
labelled as a producer of faux news, it is foreseen with
high confidence that any future articles from that supply
also will be faux news. The network administrator aims
to spot the supply node supported data of that nodes
have accepted the rumor.
Keywords:
Text classification -Online social network- Security -
Fake news detection
1. INTRODUCTION
Fake news is more and more turning into a menace
to our society. It’s generally generated for industrial
interests to draw in viewers and collect advertising
revenue. However, individuals and teams with
probably malicious agendas are renowned to initiate
pretend news so as to influence events and policies
round the world. It's conjointly believed that
circulation of faux news had material impact on the end
result of the 2016 U.S.A. Presidential Election. The rule
should be politically unbiased – since pretend news
exists on each finishes of the spectrum – and conjointly
give equal balance to legitimate news sources on either
end of the spectrum. Additionally, the question of
legitimacy could be a troublesome one. However, so as
to resolve this drawback, it's necessary to possess
Associate in nursing understanding on what pretend
News is. Later, it's required to seem into however the
techniques within the fields of machine learning,
linguistic communication process facilitates U.S.A. to
observe pretend news.
The reverse dissemination method appropriates
duplicates of bits of gossip conversely from the
shoppers whose states are resolved in sight of various
perceptions upon the systems. Those WHO will at
constant time get all duplicates of bits of hoax from
the contaminated shoppers ought to be the suspects of
the real sources. This switch dissemination method is
enlivened from the Jordan Center strategy, that is used
to differentiate speak sources in static systems. The
technique embraced here isn't constant because the
Jordan Center strategy, on the grounds that our
strategy depends on time shifting social networks as
opposition static systems. We discover that the
reverse dissemination strategy advertisement dresses
the ability in speak supply characteristic proof, and
during this manner, drastically advances the
proficiency of supply of the hoax recognizable proof.
Third, to make your mind up the real supply from the
suspects, we tend to utilize a moment hoax spreading
model to consistently gauge the chances of each
shopper being in numerous states in whenever
window. Since this model considers the time-
fluctuating associations among shoppers, it will
highlight the flow of each shopper. All the additional
notably, expecting any suspect because the supply of
the hoax, we will acquire the chances of the watched
shoppers to be in their watched states. At that time,
for any suspect, we will ascertain the foremost
extreme chance (Data count) of deed the perception.
The one who will provide the foremost extreme
knowledge count are thought of because the real
supply of the hoax.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2026
2. OBJECTIVES:
• Developing a pretend news find ion system to match
websites against an inventory of tagged pretend news
and detect, discard the rumor supply out there on the
network.
• Machine learning approach is followed since sources
are inflexible and are terribly complicated to know.
• Using linguistic communication process to find
pretend news directly supported news articles.
• The main objective is to find the pretend news that
may be a classic text classification drawback with a
simple proposition.
• It is required to make a model which will differentiate
between “Real” news and “Fake” news.
3. RELATED WORK:
1] “Rumor supply Identification in Social Networks
with Time-varying Topology” revealed by Jiaojiao Jiang,
Sheng Wen, Shui Yu, principle Xiang and Wanlei Zhou
dynasty
Identifying rumor sources in social networks plays
essential role in limiting the injury caused by them
through the timely quarantine of the sources. However,
the temporal variation within the topology of social
networks and therefore the in progress dynamic
processes challenge our ancient supply identification
techniques that are thought-about in static networks.
They borrowed plan from sociology and proposes a
completely unique methodology to beat the challenges.
Second, rather than inspecting each individual in
ancient techniques, a reverse dissemination strategy is
customized to specify a group of suspects of the
important rumor supply. It addresses the measurability
issue of supply identification issues, and thus
dramatically promotes the efficiency of rumor supply
identification. Third, to see the important supply from
the suspects, a completely unique microscopic rumor
spreading model is used to calculate the utmost chance
(ML) for every suspect. The one which may give the
most important cubic centimeter estimate is taken into
account because the real supply. The evaluations are
administered on real social networks with time-varying
topology.
[2] “Discovering multiple diffusion supply nodes in
social networks” revealed by Wenyu Zang12, Peng
Zhang2, Chuan Zhou2, and Li Guo2 at Procedia applied
science, vol. 29, pp. 443–452, 2014.
Social networks have greatly amplified unfold of data
across completely different communities. However,
recent observations states that numerous malicious
data, like malicious program and rumors, are broadly
speaking unfold via social networks. To limit this
malicious data, it's essential to develop effective
methodology to find the diffusion supply nodes in
social networks. Several pioneer works have explored
the supply node identification drawback; however all
of them supported a perfect assumption that there's
solely one supply node, neglecting the very fact that
malicious data are typically subtle from multiple
sources to advisedly avoid network audit. In this paper,
a multi-source locating methodology is planned
supported a given photo of part and sparsely
determined infected nodes within the network.
[3] “A quick Monte Carlo rule for supply localization on
graphs” revealed by A. agaskar and Y. M. metallic
element at SPIE Optical Engineering and Applications.
International Society for Optics and Photonics, 2013
Epidemic models on networks have long been studied
by biologists associated social sciences to see the
steady state levels of an infection on a network.
Recently, however, many authors have begun
considering the harder drawback of estimating the
supply of associate infection given data concerning its
behavior someday once the initial infection. during this
paper, a way to estimate the supply of associate
infection is delineate on a general graph supported
observations from a tiny low set of observers
throughout a set time window at some unknown time
once the initial infection. associate alternate
illustration is additionally delineate for the
susceptible-infected (SI) infection model supported
geodesic distances on a randomly-weighted version of
the graph; this illustration permits United States of
America to take advantage of quick algorithms to
cipher geodesic distances to estimate the marginal
distributions for every observer and cipher a pseudo-
likelihood operate that's maximized to seek out the
supply.
[4] “Bayesian abstract thought of epidemics on
networks via belief propagation” revealed by F.
Altarelli, A. Braunstein, L. DallAsta, A. Lage-Castellanos,
and R. Zecchina at Physical review letters, vol. 112,no.
11, p. 118701, 2014
Several theorem abstract thought issues for
irreversible random epidemic models on networks
from a applied mathematics physics viewpoint is
studied. Equations are derived for equations which
permit the computing of posterior distribution of the
time evolution of the state of every node given some
observations accurately. At distinction with most
existing ways, general observation models, as well as
unobserved nodes, state observations created at
completely different or unknown times, and
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2027
observations of infection times, probably mixed along.
This methodology is predicated on the idea
Propagation rule, is economical, naturally distributed,
and precise on trees.
4. PROPOSED SYSTEM:
Bayesian classification algorithm is used to classify the
obtained information into two categories such as real and
fake.. The output of these categories is compared and if
they do not match then the news is determined as fake.
Using machine learning approach to detect the fake news
and trace the origin of the fake news. Fake news will be
detected using Bayesian classification and N-gram
Algorithm. Reverse Dissemination process is done to back
track the rumor to its source. List of suspected nodes is
maintained in a table. Maximum likely hood is calculated
for nodes with same value.
5. SYSTEM ARCHITECTURE:
The social media is a platform in which several messages
are being forwarded. To check the truthfulness of the
message, the message is being subjected to several process
in our system. News and articles from the trusted sources
are gathered and are added to the database then the
forwarded message is matched with the trained database
containing the real news. By the naïve bayes process the
real and the fake news are separated using the clustering
method. If the message is compared and found fake then
the message is added to the database as fake and then
labelled as fake. Now the source of the fake message is
found by changing the time varying network into the static
network and this process is called reverse dissemination.
This is as specified in fig 5.1.
Fig 5.1 Architecture diagram
6. METHODOLOGY:
Naive Bayes:
Classification technique supported Bayes’ theorem
with associate degree assumption of independence
among predictors
1. Convert information set into a frequency table
2. Produce chance table by finding possibilities
3. Use Naive Bayesian equation to calculate posterior
chance for every category.
Offline Database
The news, articles from trusted sources is stored in an
offline database separately. News and articles from the
trusted sources are gathered and are added to the
database by which he database is trained thus later used
in the rumor evaluation to find the fake news. This process
can be seen fig the fig 6.1.
Fig 6.1 Offline database
Rumor Evaluation
The rumor is identified by using Bayesian classification
and generate output as the fake news or real news is
displayed on fig 6.2.
Fig 6.2 Rumor Evaluation
Reverse Dissemination
 Sends copies of rumors on the reversed
dynamic connections from determined nodes.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2028
 The node from that all the methods, covering
all the determined nodes’ states, originated is
additional seemingly to be a suspect.
 The reverse dissemination methodology is
predicated on time-varying social networks
(involving the physical quality and
online/offline standing of users) instead of
static networks.
 This method gets towards the rumor however
not giving precise rumor within the social
network.
7. CONCLUSION:
With the increasing quality of social media, additional
and additional individuals consume news from social
media rather than ancient fourth estate. However,
social media has additionally been accustomed unfold
pretend news, that has robust negative impacts on
individual users and broader society. In this article, we
have a tendency to explore the pretend news drawback
by reviewing existing literature in 2 phases:
characterization and detection. Within the
characterization part, we have a tendency to introduce
the essential ideas and principles of pretend news in
each ancient media and social media. with in the
detection part, we have a tendency to reviewed existing
pretend news detection approaches from a knowledge
mining perspective, as well as feature extraction and
model construction. we have a tendency to additionally
any mentioned the datasets, analysis metrics, and
promising future directions in pretend news detection
analysis and expand the field to alternative
applications.
8. FUTURE ENHANCEMENT:
Data-oriented: Data-oriented fake news research is fo-
Data-oriented: Data-oriented pretend news analysis is
specializing in different varieties of information
characteristics, dataset, temporal and psychological.
From a dataset, we incontestable that there's no
existing bench mark dataset that has} resources to
extract all relevant features. A promising direction is to
form a comprehensive and large-scale pretend news
benchmark dataset, which might be utilized by
analyzers to facilitate additional research during this
space. From a temporal perspective, pretend news
dissemination on social media demonstrates distinctive
temporal patterns different from true news.
9. REFERENCES:
[1]Jiaojiao Jiang, Sheng Wen, Shui Yu, Yang Xiang and
Wanlei Zhou “Rumor Source Identification in Social
Networks with Time-varying Topology,” IEEE
Transactions on Dependable and Secure Computing.
[2]W. Zang, P. Zhang, C. Zhou, and L. Guo, “Discovering
multiple diffusion source nodes in social networks,”
Procedia Computer Science, vol. 29, pp. 443–452, 2014.
[3]A.Agaskar and Y. M. Lu, “A fast monte carlo algorithm
for source localization on graphs,” in SPIE Optical
Engineering and Applications. International Society for
Optics and Photonics, 2013.
[4]F. Altarelli, A. Braunstein, L. DallAsta, A. Lage-
Castellanos, and R. Zecchina, “Bayesian inference of
epidemics on networks via belief propagation,” Physical
review letters, vol. 112, no. 11, p. 118701, 2014.
[5]Y. Moreno, M. Nekovee, and A. F. Pacheco, “Dynamics of
rumor spreading in complex networks,” Physical Review E,
vol. 69, no. 6, p. 066130, 2004.
[6] Wenxiang Dong ,Wenyi Zhang and Chee Wei Tan
“Rooting out the Rumor Culprit from Suspects”
University of Science and Technology of China, City
University of Hong Kong.
[7] Zhaoxu Wang, Wenyi Zhang “On Inferring Rumor
Source for SIS Model under Multiple Observations”
Dept. of EEIS University of Science and Technology of
China Hefei, China.

More Related Content

What's hot

IRJET - Fake News Detection: A Survey
IRJET -  	  Fake News Detection: A SurveyIRJET -  	  Fake News Detection: A Survey
IRJET - Fake News Detection: A SurveyIRJET Journal
 
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MININGFAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MININGijnlc
 
On Semantics and Deep Learning for Event Detection in Crisis Situations
On Semantics and Deep Learning for Event Detection in Crisis SituationsOn Semantics and Deep Learning for Event Detection in Crisis Situations
On Semantics and Deep Learning for Event Detection in Crisis SituationsCOMRADES project
 
Automatic Hate Speech Detection: A Literature Review
Automatic Hate Speech Detection: A Literature ReviewAutomatic Hate Speech Detection: A Literature Review
Automatic Hate Speech Detection: A Literature ReviewDr. Amarjeet Singh
 
News Reliability Evaluation using Latent Semantic Analysis
News Reliability Evaluation using Latent Semantic AnalysisNews Reliability Evaluation using Latent Semantic Analysis
News Reliability Evaluation using Latent Semantic AnalysisTELKOMNIKA JOURNAL
 
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGDETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGijcsit
 
Final Poster for Engineering Showcase
Final Poster for Engineering ShowcaseFinal Poster for Engineering Showcase
Final Poster for Engineering ShowcaseTucker Truesdale
 
CATEGORIZING 2019-N-COV TWITTER HASHTAG DATA BY CLUSTERING
CATEGORIZING 2019-N-COV TWITTER HASHTAG DATA BY CLUSTERINGCATEGORIZING 2019-N-COV TWITTER HASHTAG DATA BY CLUSTERING
CATEGORIZING 2019-N-COV TWITTER HASHTAG DATA BY CLUSTERINGijaia
 
Analyzing-Threat-Levels-of-Extremists-using-Tweets
Analyzing-Threat-Levels-of-Extremists-using-TweetsAnalyzing-Threat-Levels-of-Extremists-using-Tweets
Analyzing-Threat-Levels-of-Extremists-using-TweetsRESHAN FARAZ
 
Political prediction analysis using text mining and deep learning
Political prediction analysis using text mining and deep learningPolitical prediction analysis using text mining and deep learning
Political prediction analysis using text mining and deep learningVishwambhar Deshpande
 
Groundhog day: near duplicate detection on twitter
Groundhog day: near duplicate detection on twitterGroundhog day: near duplicate detection on twitter
Groundhog day: near duplicate detection on twitterDan Nguyen
 
Tweet Segmentation and Its Application to Named Entity Recognition
Tweet Segmentation and Its Application to Named Entity RecognitionTweet Segmentation and Its Application to Named Entity Recognition
Tweet Segmentation and Its Application to Named Entity Recognition1crore projects
 
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017Rohit Desai
 
Hoax analyzer for Indonesian news using RNNs with fasttext and glove embeddings
Hoax analyzer for Indonesian news using RNNs with fasttext and glove embeddingsHoax analyzer for Indonesian news using RNNs with fasttext and glove embeddings
Hoax analyzer for Indonesian news using RNNs with fasttext and glove embeddingsjournalBEEI
 
Strategic perspectives 3
Strategic perspectives 3Strategic perspectives 3
Strategic perspectives 3archiejones4
 
Evolving Swings (topics) from Social Streams using Probability Model
Evolving Swings (topics) from Social Streams using Probability ModelEvolving Swings (topics) from Social Streams using Probability Model
Evolving Swings (topics) from Social Streams using Probability ModelIJERA Editor
 
1026 telling story from text 2
1026 telling story from text 21026 telling story from text 2
1026 telling story from text 2Ke Jiang
 

What's hot (20)

IRJET - Fake News Detection: A Survey
IRJET -  	  Fake News Detection: A SurveyIRJET -  	  Fake News Detection: A Survey
IRJET - Fake News Detection: A Survey
 
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MININGFAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
 
On Semantics and Deep Learning for Event Detection in Crisis Situations
On Semantics and Deep Learning for Event Detection in Crisis SituationsOn Semantics and Deep Learning for Event Detection in Crisis Situations
On Semantics and Deep Learning for Event Detection in Crisis Situations
 
Automatic Hate Speech Detection: A Literature Review
Automatic Hate Speech Detection: A Literature ReviewAutomatic Hate Speech Detection: A Literature Review
Automatic Hate Speech Detection: A Literature Review
 
FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT
 
News Reliability Evaluation using Latent Semantic Analysis
News Reliability Evaluation using Latent Semantic AnalysisNews Reliability Evaluation using Latent Semantic Analysis
News Reliability Evaluation using Latent Semantic Analysis
 
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGDETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
 
Final Poster for Engineering Showcase
Final Poster for Engineering ShowcaseFinal Poster for Engineering Showcase
Final Poster for Engineering Showcase
 
CATEGORIZING 2019-N-COV TWITTER HASHTAG DATA BY CLUSTERING
CATEGORIZING 2019-N-COV TWITTER HASHTAG DATA BY CLUSTERINGCATEGORIZING 2019-N-COV TWITTER HASHTAG DATA BY CLUSTERING
CATEGORIZING 2019-N-COV TWITTER HASHTAG DATA BY CLUSTERING
 
Seminar Report Mine
Seminar Report MineSeminar Report Mine
Seminar Report Mine
 
Analyzing-Threat-Levels-of-Extremists-using-Tweets
Analyzing-Threat-Levels-of-Extremists-using-TweetsAnalyzing-Threat-Levels-of-Extremists-using-Tweets
Analyzing-Threat-Levels-of-Extremists-using-Tweets
 
Political prediction analysis using text mining and deep learning
Political prediction analysis using text mining and deep learningPolitical prediction analysis using text mining and deep learning
Political prediction analysis using text mining and deep learning
 
Groundhog day: near duplicate detection on twitter
Groundhog day: near duplicate detection on twitterGroundhog day: near duplicate detection on twitter
Groundhog day: near duplicate detection on twitter
 
Tweet Segmentation and Its Application to Named Entity Recognition
Tweet Segmentation and Its Application to Named Entity RecognitionTweet Segmentation and Its Application to Named Entity Recognition
Tweet Segmentation and Its Application to Named Entity Recognition
 
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017
 
Hoax analyzer for Indonesian news using RNNs with fasttext and glove embeddings
Hoax analyzer for Indonesian news using RNNs with fasttext and glove embeddingsHoax analyzer for Indonesian news using RNNs with fasttext and glove embeddings
Hoax analyzer for Indonesian news using RNNs with fasttext and glove embeddings
 
Strategic perspectives 3
Strategic perspectives 3Strategic perspectives 3
Strategic perspectives 3
 
757
757757
757
 
Evolving Swings (topics) from Social Streams using Probability Model
Evolving Swings (topics) from Social Streams using Probability ModelEvolving Swings (topics) from Social Streams using Probability Model
Evolving Swings (topics) from Social Streams using Probability Model
 
1026 telling story from text 2
1026 telling story from text 21026 telling story from text 2
1026 telling story from text 2
 

Similar to IRJET- Fake News Detection and Rumour Source Identification

IRJET- Fake Message Deduction using Machine Learining
IRJET- Fake Message Deduction using Machine LeariningIRJET- Fake Message Deduction using Machine Learining
IRJET- Fake Message Deduction using Machine LeariningIRJET Journal
 
Fake news Detection using Machine Learning
Fake news Detection using Machine LearningFake news Detection using Machine Learning
Fake news Detection using Machine LearningIRJET Journal
 
Expelling Information of Events from Critical Public Space using Social Senso...
Expelling Information of Events from Critical Public Space using Social Senso...Expelling Information of Events from Critical Public Space using Social Senso...
Expelling Information of Events from Critical Public Space using Social Senso...ijtsrd
 
Mitigating Social Media Misinformation: An Analysis of Hoax Hunter's Efficacy...
Mitigating Social Media Misinformation: An Analysis of Hoax Hunter's Efficacy...Mitigating Social Media Misinformation: An Analysis of Hoax Hunter's Efficacy...
Mitigating Social Media Misinformation: An Analysis of Hoax Hunter's Efficacy...IRJET Journal
 
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET Journal
 
Social Media Datasets for Analysis and Modeling Drug Usage
Social Media Datasets for Analysis and Modeling Drug UsageSocial Media Datasets for Analysis and Modeling Drug Usage
Social Media Datasets for Analysis and Modeling Drug Usageijtsrd
 
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNING
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNINGSENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNING
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNINGIRJET Journal
 
Detection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social NetworkDetection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social NetworkIRJET Journal
 
Inspection of Certain RNN-ELM Algorithms for Societal Applications
Inspection of Certain RNN-ELM Algorithms for Societal ApplicationsInspection of Certain RNN-ELM Algorithms for Societal Applications
Inspection of Certain RNN-ELM Algorithms for Societal ApplicationsIRJET Journal
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...ijtsrd
 
Information Contagion through Social Media: Towards a Realistic Model of the ...
Information Contagion through Social Media: Towards a Realistic Model of the ...Information Contagion through Social Media: Towards a Realistic Model of the ...
Information Contagion through Social Media: Towards a Realistic Model of the ...Axel Bruns
 
Secure and Reliable Data Transmission in Generalized E-Mail
Secure and Reliable Data Transmission in Generalized E-MailSecure and Reliable Data Transmission in Generalized E-Mail
Secure and Reliable Data Transmission in Generalized E-MailIJERA Editor
 
Epidemiological Modeling of News and Rumors on Twitter
Epidemiological Modeling of News and Rumors on TwitterEpidemiological Modeling of News and Rumors on Twitter
Epidemiological Modeling of News and Rumors on TwitterParang Saraf
 
IRJET- Detecting Fake News
IRJET- Detecting Fake NewsIRJET- Detecting Fake News
IRJET- Detecting Fake NewsIRJET Journal
 
Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacyvivatechijri
 
Privacy Preserving Aggregate Statistics for Mobile Crowdsensing
Privacy Preserving Aggregate Statistics for Mobile CrowdsensingPrivacy Preserving Aggregate Statistics for Mobile Crowdsensing
Privacy Preserving Aggregate Statistics for Mobile CrowdsensingIJSRED
 
Fake News Detection on Social Media using Machine Learning
Fake News Detection on Social Media using Machine LearningFake News Detection on Social Media using Machine Learning
Fake News Detection on Social Media using Machine Learningclassic tpr
 
Fake News Detection Using Machine Learning
Fake News Detection Using Machine LearningFake News Detection Using Machine Learning
Fake News Detection Using Machine LearningIRJET Journal
 
Optimizing the Use of Social Media for the Dissemination of Emergency Warnings
Optimizing the Use of Social Media for the Dissemination of Emergency WarningsOptimizing the Use of Social Media for the Dissemination of Emergency Warnings
Optimizing the Use of Social Media for the Dissemination of Emergency WarningsJames Embleton-Forrest, BA, MCGI
 

Similar to IRJET- Fake News Detection and Rumour Source Identification (20)

IRJET- Fake Message Deduction using Machine Learining
IRJET- Fake Message Deduction using Machine LeariningIRJET- Fake Message Deduction using Machine Learining
IRJET- Fake Message Deduction using Machine Learining
 
Fake news Detection using Machine Learning
Fake news Detection using Machine LearningFake news Detection using Machine Learning
Fake news Detection using Machine Learning
 
Expelling Information of Events from Critical Public Space using Social Senso...
Expelling Information of Events from Critical Public Space using Social Senso...Expelling Information of Events from Critical Public Space using Social Senso...
Expelling Information of Events from Critical Public Space using Social Senso...
 
Mitigating Social Media Misinformation: An Analysis of Hoax Hunter's Efficacy...
Mitigating Social Media Misinformation: An Analysis of Hoax Hunter's Efficacy...Mitigating Social Media Misinformation: An Analysis of Hoax Hunter's Efficacy...
Mitigating Social Media Misinformation: An Analysis of Hoax Hunter's Efficacy...
 
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
 
Social Media Datasets for Analysis and Modeling Drug Usage
Social Media Datasets for Analysis and Modeling Drug UsageSocial Media Datasets for Analysis and Modeling Drug Usage
Social Media Datasets for Analysis and Modeling Drug Usage
 
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNING
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNINGSENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNING
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNING
 
Detection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social NetworkDetection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social Network
 
Inspection of Certain RNN-ELM Algorithms for Societal Applications
Inspection of Certain RNN-ELM Algorithms for Societal ApplicationsInspection of Certain RNN-ELM Algorithms for Societal Applications
Inspection of Certain RNN-ELM Algorithms for Societal Applications
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
 
Information Contagion through Social Media: Towards a Realistic Model of the ...
Information Contagion through Social Media: Towards a Realistic Model of the ...Information Contagion through Social Media: Towards a Realistic Model of the ...
Information Contagion through Social Media: Towards a Realistic Model of the ...
 
204
204204
204
 
Secure and Reliable Data Transmission in Generalized E-Mail
Secure and Reliable Data Transmission in Generalized E-MailSecure and Reliable Data Transmission in Generalized E-Mail
Secure and Reliable Data Transmission in Generalized E-Mail
 
Epidemiological Modeling of News and Rumors on Twitter
Epidemiological Modeling of News and Rumors on TwitterEpidemiological Modeling of News and Rumors on Twitter
Epidemiological Modeling of News and Rumors on Twitter
 
IRJET- Detecting Fake News
IRJET- Detecting Fake NewsIRJET- Detecting Fake News
IRJET- Detecting Fake News
 
Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacy
 
Privacy Preserving Aggregate Statistics for Mobile Crowdsensing
Privacy Preserving Aggregate Statistics for Mobile CrowdsensingPrivacy Preserving Aggregate Statistics for Mobile Crowdsensing
Privacy Preserving Aggregate Statistics for Mobile Crowdsensing
 
Fake News Detection on Social Media using Machine Learning
Fake News Detection on Social Media using Machine LearningFake News Detection on Social Media using Machine Learning
Fake News Detection on Social Media using Machine Learning
 
Fake News Detection Using Machine Learning
Fake News Detection Using Machine LearningFake News Detection Using Machine Learning
Fake News Detection Using Machine Learning
 
Optimizing the Use of Social Media for the Dissemination of Emergency Warnings
Optimizing the Use of Social Media for the Dissemination of Emergency WarningsOptimizing the Use of Social Media for the Dissemination of Emergency Warnings
Optimizing the Use of Social Media for the Dissemination of Emergency Warnings
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 

Recently uploaded (20)

(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 

IRJET- Fake News Detection and Rumour Source Identification

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2025 FAKE NEWS DETECTION AND RUMOUR SOURCE IDENTIFICATION K. ARVIND1, S. GOVARTHAN2, S. KISHORE KUMAR3, M. NAVEEN KUMAR4, R. LAKSHMI5 5Asst. Prof, Department of Information Technology, Valliammai Engineering College, Kanchipuram. 1,2,3,4B.Tech, Department of Information Technology, Valliammai Engineering College, Kanchipuram. ----------------------------------------------------------------------***--------------------------------------------------------------------- ABSTRACT: Information that spreads through social media will carry a great deal of false news. As an example, rumors on specific topics will unfold apace resulting in an oversized variety of nodes coverage identical (incorrect) observations. Exploitation Bayesian classification the obtained info is classed into 2 classes like faux and REAL. If the combined output from each classes doesn't match then the data is faux. It’s vital to spot the supply of the rumor spreader. Rather than inspecting each individual in ancient techniques, we have a tendency to adopt a reverse dissemination strategy to specify a group of suspects of the important rumor supply. This method addresses the measurability issue of supply identification issues. Once a supply is labelled as a producer of faux news, it is foreseen with high confidence that any future articles from that supply also will be faux news. The network administrator aims to spot the supply node supported data of that nodes have accepted the rumor. Keywords: Text classification -Online social network- Security - Fake news detection 1. INTRODUCTION Fake news is more and more turning into a menace to our society. It’s generally generated for industrial interests to draw in viewers and collect advertising revenue. However, individuals and teams with probably malicious agendas are renowned to initiate pretend news so as to influence events and policies round the world. It's conjointly believed that circulation of faux news had material impact on the end result of the 2016 U.S.A. Presidential Election. The rule should be politically unbiased – since pretend news exists on each finishes of the spectrum – and conjointly give equal balance to legitimate news sources on either end of the spectrum. Additionally, the question of legitimacy could be a troublesome one. However, so as to resolve this drawback, it's necessary to possess Associate in nursing understanding on what pretend News is. Later, it's required to seem into however the techniques within the fields of machine learning, linguistic communication process facilitates U.S.A. to observe pretend news. The reverse dissemination method appropriates duplicates of bits of gossip conversely from the shoppers whose states are resolved in sight of various perceptions upon the systems. Those WHO will at constant time get all duplicates of bits of hoax from the contaminated shoppers ought to be the suspects of the real sources. This switch dissemination method is enlivened from the Jordan Center strategy, that is used to differentiate speak sources in static systems. The technique embraced here isn't constant because the Jordan Center strategy, on the grounds that our strategy depends on time shifting social networks as opposition static systems. We discover that the reverse dissemination strategy advertisement dresses the ability in speak supply characteristic proof, and during this manner, drastically advances the proficiency of supply of the hoax recognizable proof. Third, to make your mind up the real supply from the suspects, we tend to utilize a moment hoax spreading model to consistently gauge the chances of each shopper being in numerous states in whenever window. Since this model considers the time- fluctuating associations among shoppers, it will highlight the flow of each shopper. All the additional notably, expecting any suspect because the supply of the hoax, we will acquire the chances of the watched shoppers to be in their watched states. At that time, for any suspect, we will ascertain the foremost extreme chance (Data count) of deed the perception. The one who will provide the foremost extreme knowledge count are thought of because the real supply of the hoax.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2026 2. OBJECTIVES: • Developing a pretend news find ion system to match websites against an inventory of tagged pretend news and detect, discard the rumor supply out there on the network. • Machine learning approach is followed since sources are inflexible and are terribly complicated to know. • Using linguistic communication process to find pretend news directly supported news articles. • The main objective is to find the pretend news that may be a classic text classification drawback with a simple proposition. • It is required to make a model which will differentiate between “Real” news and “Fake” news. 3. RELATED WORK: 1] “Rumor supply Identification in Social Networks with Time-varying Topology” revealed by Jiaojiao Jiang, Sheng Wen, Shui Yu, principle Xiang and Wanlei Zhou dynasty Identifying rumor sources in social networks plays essential role in limiting the injury caused by them through the timely quarantine of the sources. However, the temporal variation within the topology of social networks and therefore the in progress dynamic processes challenge our ancient supply identification techniques that are thought-about in static networks. They borrowed plan from sociology and proposes a completely unique methodology to beat the challenges. Second, rather than inspecting each individual in ancient techniques, a reverse dissemination strategy is customized to specify a group of suspects of the important rumor supply. It addresses the measurability issue of supply identification issues, and thus dramatically promotes the efficiency of rumor supply identification. Third, to see the important supply from the suspects, a completely unique microscopic rumor spreading model is used to calculate the utmost chance (ML) for every suspect. The one which may give the most important cubic centimeter estimate is taken into account because the real supply. The evaluations are administered on real social networks with time-varying topology. [2] “Discovering multiple diffusion supply nodes in social networks” revealed by Wenyu Zang12, Peng Zhang2, Chuan Zhou2, and Li Guo2 at Procedia applied science, vol. 29, pp. 443–452, 2014. Social networks have greatly amplified unfold of data across completely different communities. However, recent observations states that numerous malicious data, like malicious program and rumors, are broadly speaking unfold via social networks. To limit this malicious data, it's essential to develop effective methodology to find the diffusion supply nodes in social networks. Several pioneer works have explored the supply node identification drawback; however all of them supported a perfect assumption that there's solely one supply node, neglecting the very fact that malicious data are typically subtle from multiple sources to advisedly avoid network audit. In this paper, a multi-source locating methodology is planned supported a given photo of part and sparsely determined infected nodes within the network. [3] “A quick Monte Carlo rule for supply localization on graphs” revealed by A. agaskar and Y. M. metallic element at SPIE Optical Engineering and Applications. International Society for Optics and Photonics, 2013 Epidemic models on networks have long been studied by biologists associated social sciences to see the steady state levels of an infection on a network. Recently, however, many authors have begun considering the harder drawback of estimating the supply of associate infection given data concerning its behavior someday once the initial infection. during this paper, a way to estimate the supply of associate infection is delineate on a general graph supported observations from a tiny low set of observers throughout a set time window at some unknown time once the initial infection. associate alternate illustration is additionally delineate for the susceptible-infected (SI) infection model supported geodesic distances on a randomly-weighted version of the graph; this illustration permits United States of America to take advantage of quick algorithms to cipher geodesic distances to estimate the marginal distributions for every observer and cipher a pseudo- likelihood operate that's maximized to seek out the supply. [4] “Bayesian abstract thought of epidemics on networks via belief propagation” revealed by F. Altarelli, A. Braunstein, L. DallAsta, A. Lage-Castellanos, and R. Zecchina at Physical review letters, vol. 112,no. 11, p. 118701, 2014 Several theorem abstract thought issues for irreversible random epidemic models on networks from a applied mathematics physics viewpoint is studied. Equations are derived for equations which permit the computing of posterior distribution of the time evolution of the state of every node given some observations accurately. At distinction with most existing ways, general observation models, as well as unobserved nodes, state observations created at completely different or unknown times, and
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2027 observations of infection times, probably mixed along. This methodology is predicated on the idea Propagation rule, is economical, naturally distributed, and precise on trees. 4. PROPOSED SYSTEM: Bayesian classification algorithm is used to classify the obtained information into two categories such as real and fake.. The output of these categories is compared and if they do not match then the news is determined as fake. Using machine learning approach to detect the fake news and trace the origin of the fake news. Fake news will be detected using Bayesian classification and N-gram Algorithm. Reverse Dissemination process is done to back track the rumor to its source. List of suspected nodes is maintained in a table. Maximum likely hood is calculated for nodes with same value. 5. SYSTEM ARCHITECTURE: The social media is a platform in which several messages are being forwarded. To check the truthfulness of the message, the message is being subjected to several process in our system. News and articles from the trusted sources are gathered and are added to the database then the forwarded message is matched with the trained database containing the real news. By the naïve bayes process the real and the fake news are separated using the clustering method. If the message is compared and found fake then the message is added to the database as fake and then labelled as fake. Now the source of the fake message is found by changing the time varying network into the static network and this process is called reverse dissemination. This is as specified in fig 5.1. Fig 5.1 Architecture diagram 6. METHODOLOGY: Naive Bayes: Classification technique supported Bayes’ theorem with associate degree assumption of independence among predictors 1. Convert information set into a frequency table 2. Produce chance table by finding possibilities 3. Use Naive Bayesian equation to calculate posterior chance for every category. Offline Database The news, articles from trusted sources is stored in an offline database separately. News and articles from the trusted sources are gathered and are added to the database by which he database is trained thus later used in the rumor evaluation to find the fake news. This process can be seen fig the fig 6.1. Fig 6.1 Offline database Rumor Evaluation The rumor is identified by using Bayesian classification and generate output as the fake news or real news is displayed on fig 6.2. Fig 6.2 Rumor Evaluation Reverse Dissemination  Sends copies of rumors on the reversed dynamic connections from determined nodes.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2028  The node from that all the methods, covering all the determined nodes’ states, originated is additional seemingly to be a suspect.  The reverse dissemination methodology is predicated on time-varying social networks (involving the physical quality and online/offline standing of users) instead of static networks.  This method gets towards the rumor however not giving precise rumor within the social network. 7. CONCLUSION: With the increasing quality of social media, additional and additional individuals consume news from social media rather than ancient fourth estate. However, social media has additionally been accustomed unfold pretend news, that has robust negative impacts on individual users and broader society. In this article, we have a tendency to explore the pretend news drawback by reviewing existing literature in 2 phases: characterization and detection. Within the characterization part, we have a tendency to introduce the essential ideas and principles of pretend news in each ancient media and social media. with in the detection part, we have a tendency to reviewed existing pretend news detection approaches from a knowledge mining perspective, as well as feature extraction and model construction. we have a tendency to additionally any mentioned the datasets, analysis metrics, and promising future directions in pretend news detection analysis and expand the field to alternative applications. 8. FUTURE ENHANCEMENT: Data-oriented: Data-oriented fake news research is fo- Data-oriented: Data-oriented pretend news analysis is specializing in different varieties of information characteristics, dataset, temporal and psychological. From a dataset, we incontestable that there's no existing bench mark dataset that has} resources to extract all relevant features. A promising direction is to form a comprehensive and large-scale pretend news benchmark dataset, which might be utilized by analyzers to facilitate additional research during this space. From a temporal perspective, pretend news dissemination on social media demonstrates distinctive temporal patterns different from true news. 9. REFERENCES: [1]Jiaojiao Jiang, Sheng Wen, Shui Yu, Yang Xiang and Wanlei Zhou “Rumor Source Identification in Social Networks with Time-varying Topology,” IEEE Transactions on Dependable and Secure Computing. [2]W. Zang, P. Zhang, C. Zhou, and L. Guo, “Discovering multiple diffusion source nodes in social networks,” Procedia Computer Science, vol. 29, pp. 443–452, 2014. [3]A.Agaskar and Y. M. Lu, “A fast monte carlo algorithm for source localization on graphs,” in SPIE Optical Engineering and Applications. International Society for Optics and Photonics, 2013. [4]F. Altarelli, A. Braunstein, L. DallAsta, A. Lage- Castellanos, and R. Zecchina, “Bayesian inference of epidemics on networks via belief propagation,” Physical review letters, vol. 112, no. 11, p. 118701, 2014. [5]Y. Moreno, M. Nekovee, and A. F. Pacheco, “Dynamics of rumor spreading in complex networks,” Physical Review E, vol. 69, no. 6, p. 066130, 2004. [6] Wenxiang Dong ,Wenyi Zhang and Chee Wei Tan “Rooting out the Rumor Culprit from Suspects” University of Science and Technology of China, City University of Hong Kong. [7] Zhaoxu Wang, Wenyi Zhang “On Inferring Rumor Source for SIS Model under Multiple Observations” Dept. of EEIS University of Science and Technology of China Hefei, China.