Submit Search
Upload
IRJET- Fake News Detection and Rumour Source Identification
•
0 likes
•
75 views
IRJET Journal
Follow
https://www.irjet.net/archives/V6/i3/IRJET-V6I3389.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
venkatramanJ4
Fake News Detection using Machine Learning
Fake News Detection using Machine Learning
ijtsrd
IRJET- Fake News Detection
IRJET- Fake News Detection
IRJET Journal
IRJET - Fake News Detection using Machine Learning
IRJET - Fake News Detection using Machine Learning
IRJET Journal
IRJET- Fake News Detection using Logistic Regression
IRJET- Fake News Detection using Logistic Regression
IRJET Journal
WARRANTS GENERATIONS USING A LANGUAGE MODEL AND A MULTI-AGENT SYSTEM
WARRANTS GENERATIONS USING A LANGUAGE MODEL AND A MULTI-AGENT SYSTEM
ijnlc
Odsc 2019 entity_reputation_knowledge_graph
Odsc 2019 entity_reputation_knowledge_graph
venkatramanJ4
A RELIABLE ARTIFICIAL INTELLIGENCE MODEL FOR FALSE NEWS DETECTION MADE BY PUB...
A RELIABLE ARTIFICIAL INTELLIGENCE MODEL FOR FALSE NEWS DETECTION MADE BY PUB...
caijjournal
Recommended
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
venkatramanJ4
Fake News Detection using Machine Learning
Fake News Detection using Machine Learning
ijtsrd
IRJET- Fake News Detection
IRJET- Fake News Detection
IRJET Journal
IRJET - Fake News Detection using Machine Learning
IRJET - Fake News Detection using Machine Learning
IRJET Journal
IRJET- Fake News Detection using Logistic Regression
IRJET- Fake News Detection using Logistic Regression
IRJET Journal
WARRANTS GENERATIONS USING A LANGUAGE MODEL AND A MULTI-AGENT SYSTEM
WARRANTS GENERATIONS USING A LANGUAGE MODEL AND A MULTI-AGENT SYSTEM
ijnlc
Odsc 2019 entity_reputation_knowledge_graph
Odsc 2019 entity_reputation_knowledge_graph
venkatramanJ4
A RELIABLE ARTIFICIAL INTELLIGENCE MODEL FOR FALSE NEWS DETECTION MADE BY PUB...
A RELIABLE ARTIFICIAL INTELLIGENCE MODEL FOR FALSE NEWS DETECTION MADE BY PUB...
caijjournal
IRJET - Fake News Detection: A Survey
IRJET - Fake News Detection: A Survey
IRJET Journal
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
ijnlc
On Semantics and Deep Learning for Event Detection in Crisis Situations
On Semantics and Deep Learning for Event Detection in Crisis Situations
COMRADES project
Automatic Hate Speech Detection: A Literature Review
Automatic Hate Speech Detection: A Literature Review
Dr. Amarjeet Singh
FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT
VaishaliSrigadhi
News Reliability Evaluation using Latent Semantic Analysis
News Reliability Evaluation using Latent Semantic Analysis
TELKOMNIKA JOURNAL
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
ijcsit
Final Poster for Engineering Showcase
Final Poster for Engineering Showcase
Tucker Truesdale
CATEGORIZING 2019-N-COV TWITTER HASHTAG DATA BY CLUSTERING
CATEGORIZING 2019-N-COV TWITTER HASHTAG DATA BY CLUSTERING
ijaia
Seminar Report Mine
Seminar Report Mine
sachin narang
Analyzing-Threat-Levels-of-Extremists-using-Tweets
Analyzing-Threat-Levels-of-Extremists-using-Tweets
RESHAN FARAZ
Political prediction analysis using text mining and deep learning
Political prediction analysis using text mining and deep learning
Vishwambhar Deshpande
Groundhog day: near duplicate detection on twitter
Groundhog day: near duplicate detection on twitter
Dan Nguyen
Tweet Segmentation and Its Application to Named Entity Recognition
Tweet Segmentation and Its Application to Named Entity Recognition
1crore projects
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017
Rohit Desai
Hoax analyzer for Indonesian news using RNNs with fasttext and glove embeddings
Hoax analyzer for Indonesian news using RNNs with fasttext and glove embeddings
journalBEEI
Strategic perspectives 3
Strategic perspectives 3
archiejones4
757
757
Anurag Jain
Evolving Swings (topics) from Social Streams using Probability Model
Evolving Swings (topics) from Social Streams using Probability Model
IJERA Editor
1026 telling story from text 2
1026 telling story from text 2
Ke Jiang
IRJET- Fake Message Deduction using Machine Learining
IRJET- Fake Message Deduction using Machine Learining
IRJET Journal
Fake news Detection using Machine Learning
Fake news Detection using Machine Learning
IRJET Journal
More Related Content
What's hot
IRJET - Fake News Detection: A Survey
IRJET - Fake News Detection: A Survey
IRJET Journal
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
ijnlc
On Semantics and Deep Learning for Event Detection in Crisis Situations
On Semantics and Deep Learning for Event Detection in Crisis Situations
COMRADES project
Automatic Hate Speech Detection: A Literature Review
Automatic Hate Speech Detection: A Literature Review
Dr. Amarjeet Singh
FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT
VaishaliSrigadhi
News Reliability Evaluation using Latent Semantic Analysis
News Reliability Evaluation using Latent Semantic Analysis
TELKOMNIKA JOURNAL
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
ijcsit
Final Poster for Engineering Showcase
Final Poster for Engineering Showcase
Tucker Truesdale
CATEGORIZING 2019-N-COV TWITTER HASHTAG DATA BY CLUSTERING
CATEGORIZING 2019-N-COV TWITTER HASHTAG DATA BY CLUSTERING
ijaia
Seminar Report Mine
Seminar Report Mine
sachin narang
Analyzing-Threat-Levels-of-Extremists-using-Tweets
Analyzing-Threat-Levels-of-Extremists-using-Tweets
RESHAN FARAZ
Political prediction analysis using text mining and deep learning
Political prediction analysis using text mining and deep learning
Vishwambhar Deshpande
Groundhog day: near duplicate detection on twitter
Groundhog day: near duplicate detection on twitter
Dan Nguyen
Tweet Segmentation and Its Application to Named Entity Recognition
Tweet Segmentation and Its Application to Named Entity Recognition
1crore projects
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017
Rohit Desai
Hoax analyzer for Indonesian news using RNNs with fasttext and glove embeddings
Hoax analyzer for Indonesian news using RNNs with fasttext and glove embeddings
journalBEEI
Strategic perspectives 3
Strategic perspectives 3
archiejones4
757
757
Anurag Jain
Evolving Swings (topics) from Social Streams using Probability Model
Evolving Swings (topics) from Social Streams using Probability Model
IJERA Editor
1026 telling story from text 2
1026 telling story from text 2
Ke Jiang
What's hot
(20)
IRJET - Fake News Detection: A Survey
IRJET - Fake News Detection: A Survey
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
On Semantics and Deep Learning for Event Detection in Crisis Situations
On Semantics and Deep Learning for Event Detection in Crisis Situations
Automatic Hate Speech Detection: A Literature Review
Automatic Hate Speech Detection: A Literature Review
FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT
News Reliability Evaluation using Latent Semantic Analysis
News Reliability Evaluation using Latent Semantic Analysis
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
Final Poster for Engineering Showcase
Final Poster for Engineering Showcase
CATEGORIZING 2019-N-COV TWITTER HASHTAG DATA BY CLUSTERING
CATEGORIZING 2019-N-COV TWITTER HASHTAG DATA BY CLUSTERING
Seminar Report Mine
Seminar Report Mine
Analyzing-Threat-Levels-of-Extremists-using-Tweets
Analyzing-Threat-Levels-of-Extremists-using-Tweets
Political prediction analysis using text mining and deep learning
Political prediction analysis using text mining and deep learning
Groundhog day: near duplicate detection on twitter
Groundhog day: near duplicate detection on twitter
Tweet Segmentation and Its Application to Named Entity Recognition
Tweet Segmentation and Its Application to Named Entity Recognition
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017
Poster presentation in 3rd big data conclave at vit chennai on 20th april 2017
Hoax analyzer for Indonesian news using RNNs with fasttext and glove embeddings
Hoax analyzer for Indonesian news using RNNs with fasttext and glove embeddings
Strategic perspectives 3
Strategic perspectives 3
757
757
Evolving Swings (topics) from Social Streams using Probability Model
Evolving Swings (topics) from Social Streams using Probability Model
1026 telling story from text 2
1026 telling story from text 2
Similar to IRJET- Fake News Detection and Rumour Source Identification
IRJET- Fake Message Deduction using Machine Learining
IRJET- Fake Message Deduction using Machine Learining
IRJET Journal
Fake news Detection using Machine Learning
Fake news Detection using Machine Learning
IRJET Journal
Expelling Information of Events from Critical Public Space using Social Senso...
Expelling Information of Events from Critical Public Space using Social Senso...
ijtsrd
Mitigating Social Media Misinformation: An Analysis of Hoax Hunter's Efficacy...
Mitigating Social Media Misinformation: An Analysis of Hoax Hunter's Efficacy...
IRJET Journal
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET Journal
Social Media Datasets for Analysis and Modeling Drug Usage
Social Media Datasets for Analysis and Modeling Drug Usage
ijtsrd
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNING
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNING
IRJET Journal
Detection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social Network
IRJET Journal
Inspection of Certain RNN-ELM Algorithms for Societal Applications
Inspection of Certain RNN-ELM Algorithms for Societal Applications
IRJET Journal
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
ijtsrd
Information Contagion through Social Media: Towards a Realistic Model of the ...
Information Contagion through Social Media: Towards a Realistic Model of the ...
Axel Bruns
204
204
vivatechijri
Secure and Reliable Data Transmission in Generalized E-Mail
Secure and Reliable Data Transmission in Generalized E-Mail
IJERA Editor
Epidemiological Modeling of News and Rumors on Twitter
Epidemiological Modeling of News and Rumors on Twitter
Parang Saraf
IRJET- Detecting Fake News
IRJET- Detecting Fake News
IRJET Journal
Social media platform and Our right to privacy
Social media platform and Our right to privacy
vivatechijri
Privacy Preserving Aggregate Statistics for Mobile Crowdsensing
Privacy Preserving Aggregate Statistics for Mobile Crowdsensing
IJSRED
Fake News Detection on Social Media using Machine Learning
Fake News Detection on Social Media using Machine Learning
classic tpr
Fake News Detection Using Machine Learning
Fake News Detection Using Machine Learning
IRJET Journal
Optimizing the Use of Social Media for the Dissemination of Emergency Warnings
Optimizing the Use of Social Media for the Dissemination of Emergency Warnings
James Embleton-Forrest, BA, MCGI
Similar to IRJET- Fake News Detection and Rumour Source Identification
(20)
IRJET- Fake Message Deduction using Machine Learining
IRJET- Fake Message Deduction using Machine Learining
Fake news Detection using Machine Learning
Fake news Detection using Machine Learning
Expelling Information of Events from Critical Public Space using Social Senso...
Expelling Information of Events from Critical Public Space using Social Senso...
Mitigating Social Media Misinformation: An Analysis of Hoax Hunter's Efficacy...
Mitigating Social Media Misinformation: An Analysis of Hoax Hunter's Efficacy...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
Social Media Datasets for Analysis and Modeling Drug Usage
Social Media Datasets for Analysis and Modeling Drug Usage
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNING
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNING
Detection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social Network
Inspection of Certain RNN-ELM Algorithms for Societal Applications
Inspection of Certain RNN-ELM Algorithms for Societal Applications
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Information Contagion through Social Media: Towards a Realistic Model of the ...
Information Contagion through Social Media: Towards a Realistic Model of the ...
204
204
Secure and Reliable Data Transmission in Generalized E-Mail
Secure and Reliable Data Transmission in Generalized E-Mail
Epidemiological Modeling of News and Rumors on Twitter
Epidemiological Modeling of News and Rumors on Twitter
IRJET- Detecting Fake News
IRJET- Detecting Fake News
Social media platform and Our right to privacy
Social media platform and Our right to privacy
Privacy Preserving Aggregate Statistics for Mobile Crowdsensing
Privacy Preserving Aggregate Statistics for Mobile Crowdsensing
Fake News Detection on Social Media using Machine Learning
Fake News Detection on Social Media using Machine Learning
Fake News Detection Using Machine Learning
Fake News Detection Using Machine Learning
Optimizing the Use of Social Media for the Dissemination of Emergency Warnings
Optimizing the Use of Social Media for the Dissemination of Emergency Warnings
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
ranjana rawat
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
M Maged Hegazy, LLM, MBA, CCP, P3O
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
soniya singh
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Asutosh Ranjan
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
humanexperienceaaa
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Suman Mia
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
Recently uploaded
(20)
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
IRJET- Fake News Detection and Rumour Source Identification
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2025 FAKE NEWS DETECTION AND RUMOUR SOURCE IDENTIFICATION K. ARVIND1, S. GOVARTHAN2, S. KISHORE KUMAR3, M. NAVEEN KUMAR4, R. LAKSHMI5 5Asst. Prof, Department of Information Technology, Valliammai Engineering College, Kanchipuram. 1,2,3,4B.Tech, Department of Information Technology, Valliammai Engineering College, Kanchipuram. ----------------------------------------------------------------------***--------------------------------------------------------------------- ABSTRACT: Information that spreads through social media will carry a great deal of false news. As an example, rumors on specific topics will unfold apace resulting in an oversized variety of nodes coverage identical (incorrect) observations. Exploitation Bayesian classification the obtained info is classed into 2 classes like faux and REAL. If the combined output from each classes doesn't match then the data is faux. It’s vital to spot the supply of the rumor spreader. Rather than inspecting each individual in ancient techniques, we have a tendency to adopt a reverse dissemination strategy to specify a group of suspects of the important rumor supply. This method addresses the measurability issue of supply identification issues. Once a supply is labelled as a producer of faux news, it is foreseen with high confidence that any future articles from that supply also will be faux news. The network administrator aims to spot the supply node supported data of that nodes have accepted the rumor. Keywords: Text classification -Online social network- Security - Fake news detection 1. INTRODUCTION Fake news is more and more turning into a menace to our society. It’s generally generated for industrial interests to draw in viewers and collect advertising revenue. However, individuals and teams with probably malicious agendas are renowned to initiate pretend news so as to influence events and policies round the world. It's conjointly believed that circulation of faux news had material impact on the end result of the 2016 U.S.A. Presidential Election. The rule should be politically unbiased – since pretend news exists on each finishes of the spectrum – and conjointly give equal balance to legitimate news sources on either end of the spectrum. Additionally, the question of legitimacy could be a troublesome one. However, so as to resolve this drawback, it's necessary to possess Associate in nursing understanding on what pretend News is. Later, it's required to seem into however the techniques within the fields of machine learning, linguistic communication process facilitates U.S.A. to observe pretend news. The reverse dissemination method appropriates duplicates of bits of gossip conversely from the shoppers whose states are resolved in sight of various perceptions upon the systems. Those WHO will at constant time get all duplicates of bits of hoax from the contaminated shoppers ought to be the suspects of the real sources. This switch dissemination method is enlivened from the Jordan Center strategy, that is used to differentiate speak sources in static systems. The technique embraced here isn't constant because the Jordan Center strategy, on the grounds that our strategy depends on time shifting social networks as opposition static systems. We discover that the reverse dissemination strategy advertisement dresses the ability in speak supply characteristic proof, and during this manner, drastically advances the proficiency of supply of the hoax recognizable proof. Third, to make your mind up the real supply from the suspects, we tend to utilize a moment hoax spreading model to consistently gauge the chances of each shopper being in numerous states in whenever window. Since this model considers the time- fluctuating associations among shoppers, it will highlight the flow of each shopper. All the additional notably, expecting any suspect because the supply of the hoax, we will acquire the chances of the watched shoppers to be in their watched states. At that time, for any suspect, we will ascertain the foremost extreme chance (Data count) of deed the perception. The one who will provide the foremost extreme knowledge count are thought of because the real supply of the hoax.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2026 2. OBJECTIVES: • Developing a pretend news find ion system to match websites against an inventory of tagged pretend news and detect, discard the rumor supply out there on the network. • Machine learning approach is followed since sources are inflexible and are terribly complicated to know. • Using linguistic communication process to find pretend news directly supported news articles. • The main objective is to find the pretend news that may be a classic text classification drawback with a simple proposition. • It is required to make a model which will differentiate between “Real” news and “Fake” news. 3. RELATED WORK: 1] “Rumor supply Identification in Social Networks with Time-varying Topology” revealed by Jiaojiao Jiang, Sheng Wen, Shui Yu, principle Xiang and Wanlei Zhou dynasty Identifying rumor sources in social networks plays essential role in limiting the injury caused by them through the timely quarantine of the sources. However, the temporal variation within the topology of social networks and therefore the in progress dynamic processes challenge our ancient supply identification techniques that are thought-about in static networks. They borrowed plan from sociology and proposes a completely unique methodology to beat the challenges. Second, rather than inspecting each individual in ancient techniques, a reverse dissemination strategy is customized to specify a group of suspects of the important rumor supply. It addresses the measurability issue of supply identification issues, and thus dramatically promotes the efficiency of rumor supply identification. Third, to see the important supply from the suspects, a completely unique microscopic rumor spreading model is used to calculate the utmost chance (ML) for every suspect. The one which may give the most important cubic centimeter estimate is taken into account because the real supply. The evaluations are administered on real social networks with time-varying topology. [2] “Discovering multiple diffusion supply nodes in social networks” revealed by Wenyu Zang12, Peng Zhang2, Chuan Zhou2, and Li Guo2 at Procedia applied science, vol. 29, pp. 443–452, 2014. Social networks have greatly amplified unfold of data across completely different communities. However, recent observations states that numerous malicious data, like malicious program and rumors, are broadly speaking unfold via social networks. To limit this malicious data, it's essential to develop effective methodology to find the diffusion supply nodes in social networks. Several pioneer works have explored the supply node identification drawback; however all of them supported a perfect assumption that there's solely one supply node, neglecting the very fact that malicious data are typically subtle from multiple sources to advisedly avoid network audit. In this paper, a multi-source locating methodology is planned supported a given photo of part and sparsely determined infected nodes within the network. [3] “A quick Monte Carlo rule for supply localization on graphs” revealed by A. agaskar and Y. M. metallic element at SPIE Optical Engineering and Applications. International Society for Optics and Photonics, 2013 Epidemic models on networks have long been studied by biologists associated social sciences to see the steady state levels of an infection on a network. Recently, however, many authors have begun considering the harder drawback of estimating the supply of associate infection given data concerning its behavior someday once the initial infection. during this paper, a way to estimate the supply of associate infection is delineate on a general graph supported observations from a tiny low set of observers throughout a set time window at some unknown time once the initial infection. associate alternate illustration is additionally delineate for the susceptible-infected (SI) infection model supported geodesic distances on a randomly-weighted version of the graph; this illustration permits United States of America to take advantage of quick algorithms to cipher geodesic distances to estimate the marginal distributions for every observer and cipher a pseudo- likelihood operate that's maximized to seek out the supply. [4] “Bayesian abstract thought of epidemics on networks via belief propagation” revealed by F. Altarelli, A. Braunstein, L. DallAsta, A. Lage-Castellanos, and R. Zecchina at Physical review letters, vol. 112,no. 11, p. 118701, 2014 Several theorem abstract thought issues for irreversible random epidemic models on networks from a applied mathematics physics viewpoint is studied. Equations are derived for equations which permit the computing of posterior distribution of the time evolution of the state of every node given some observations accurately. At distinction with most existing ways, general observation models, as well as unobserved nodes, state observations created at completely different or unknown times, and
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2027 observations of infection times, probably mixed along. This methodology is predicated on the idea Propagation rule, is economical, naturally distributed, and precise on trees. 4. PROPOSED SYSTEM: Bayesian classification algorithm is used to classify the obtained information into two categories such as real and fake.. The output of these categories is compared and if they do not match then the news is determined as fake. Using machine learning approach to detect the fake news and trace the origin of the fake news. Fake news will be detected using Bayesian classification and N-gram Algorithm. Reverse Dissemination process is done to back track the rumor to its source. List of suspected nodes is maintained in a table. Maximum likely hood is calculated for nodes with same value. 5. SYSTEM ARCHITECTURE: The social media is a platform in which several messages are being forwarded. To check the truthfulness of the message, the message is being subjected to several process in our system. News and articles from the trusted sources are gathered and are added to the database then the forwarded message is matched with the trained database containing the real news. By the naïve bayes process the real and the fake news are separated using the clustering method. If the message is compared and found fake then the message is added to the database as fake and then labelled as fake. Now the source of the fake message is found by changing the time varying network into the static network and this process is called reverse dissemination. This is as specified in fig 5.1. Fig 5.1 Architecture diagram 6. METHODOLOGY: Naive Bayes: Classification technique supported Bayes’ theorem with associate degree assumption of independence among predictors 1. Convert information set into a frequency table 2. Produce chance table by finding possibilities 3. Use Naive Bayesian equation to calculate posterior chance for every category. Offline Database The news, articles from trusted sources is stored in an offline database separately. News and articles from the trusted sources are gathered and are added to the database by which he database is trained thus later used in the rumor evaluation to find the fake news. This process can be seen fig the fig 6.1. Fig 6.1 Offline database Rumor Evaluation The rumor is identified by using Bayesian classification and generate output as the fake news or real news is displayed on fig 6.2. Fig 6.2 Rumor Evaluation Reverse Dissemination Sends copies of rumors on the reversed dynamic connections from determined nodes.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2028 The node from that all the methods, covering all the determined nodes’ states, originated is additional seemingly to be a suspect. The reverse dissemination methodology is predicated on time-varying social networks (involving the physical quality and online/offline standing of users) instead of static networks. This method gets towards the rumor however not giving precise rumor within the social network. 7. CONCLUSION: With the increasing quality of social media, additional and additional individuals consume news from social media rather than ancient fourth estate. However, social media has additionally been accustomed unfold pretend news, that has robust negative impacts on individual users and broader society. In this article, we have a tendency to explore the pretend news drawback by reviewing existing literature in 2 phases: characterization and detection. Within the characterization part, we have a tendency to introduce the essential ideas and principles of pretend news in each ancient media and social media. with in the detection part, we have a tendency to reviewed existing pretend news detection approaches from a knowledge mining perspective, as well as feature extraction and model construction. we have a tendency to additionally any mentioned the datasets, analysis metrics, and promising future directions in pretend news detection analysis and expand the field to alternative applications. 8. FUTURE ENHANCEMENT: Data-oriented: Data-oriented fake news research is fo- Data-oriented: Data-oriented pretend news analysis is specializing in different varieties of information characteristics, dataset, temporal and psychological. From a dataset, we incontestable that there's no existing bench mark dataset that has} resources to extract all relevant features. A promising direction is to form a comprehensive and large-scale pretend news benchmark dataset, which might be utilized by analyzers to facilitate additional research during this space. From a temporal perspective, pretend news dissemination on social media demonstrates distinctive temporal patterns different from true news. 9. REFERENCES: [1]Jiaojiao Jiang, Sheng Wen, Shui Yu, Yang Xiang and Wanlei Zhou “Rumor Source Identification in Social Networks with Time-varying Topology,” IEEE Transactions on Dependable and Secure Computing. [2]W. Zang, P. Zhang, C. Zhou, and L. Guo, “Discovering multiple diffusion source nodes in social networks,” Procedia Computer Science, vol. 29, pp. 443–452, 2014. [3]A.Agaskar and Y. M. Lu, “A fast monte carlo algorithm for source localization on graphs,” in SPIE Optical Engineering and Applications. International Society for Optics and Photonics, 2013. [4]F. Altarelli, A. Braunstein, L. DallAsta, A. Lage- Castellanos, and R. Zecchina, “Bayesian inference of epidemics on networks via belief propagation,” Physical review letters, vol. 112, no. 11, p. 118701, 2014. [5]Y. Moreno, M. Nekovee, and A. F. Pacheco, “Dynamics of rumor spreading in complex networks,” Physical Review E, vol. 69, no. 6, p. 066130, 2004. [6] Wenxiang Dong ,Wenyi Zhang and Chee Wei Tan “Rooting out the Rumor Culprit from Suspects” University of Science and Technology of China, City University of Hong Kong. [7] Zhaoxu Wang, Wenyi Zhang “On Inferring Rumor Source for SIS Model under Multiple Observations” Dept. of EEIS University of Science and Technology of China Hefei, China.
Download now