SlideShare ist ein Scribd-Unternehmen logo
1 von 10
FAKE NEWS DETECTION
I.SRI VARSHINI (19RH1A1263)
M.SANJANA REDDY (19RH1A12A0)
CONTENTS
• INTRODUCTION
• WHAT IS FAKE NEWS..?
• FAKE NEWS CHARACTERIZATION
• FAKE NEWS DETECTION
• WHAT IS TFIDFVECTORIZER
• WHAT IS PASSIVE AGGRESSIVE ALGORITHM
• EXAMPLE
• CONCLUSION
INTRODUCTION
• FAKE NEWS SPREADS LIKE A WILDLIFE AND THIS IS A BIG ISSUE IN THIS ERA.
• FOR SOME YEARS, MOSTLY SINCE THE RISE OF SOCIAL MEDIA, FAKE NEWS HAVE BECOME
A SOCIETY PROBLEM, IN SOME OCCASION SPREADING MORE AND FASTER THAN THE TRUE
INFORMATION. IN THIS PAPER I EVALUATE THE PERFORMANCE OF ATTENTION
MECHANISM FOR FAKE NEWS DETECTION ON TWO DATASETS, ONE CONTAINING
TRADITIONAL ONLINE NEWS ARTICLES AND THE SECOND ONE NEWS FROM VARIOUS
SOURCES.
• IT SHOWS THAT ATTENTION MECHANISM DOES NOT WORK AS WELL AS EXPECTED. IN
ADDITION, I MADE CHANGES TO ORIGINAL ATTENTION MECHANISM PAPER, BY USING
WORD2VEC EMBEDDING, THAT PROVES TO WORKS BETTER ON THIS PARTICULAR CASE.
WHAT IS FAKE NEWS..?
• A type of yellow journalism,fake news encapsulates pieces of news that may be hoaxes and is generally spread
through social media and other online media. This is often done to further or impose certain ideas and is often
achieved with political agendas.Such news items may contain false or exaggerated claims, and may end up being
viralized by algorithms, and users may end up in a filter bubble.
• Fake news has quickly become a society problem, being used to propagate false or rumour information in order
to change peoples behaviour.
• In order to work on fake news detection, it is important to understand what is fake news and how they are
characterized. The following is based on Fake News Detection on Social Media: A Data Mining Perspective.
• The first is characterization or what is fake news and the second is detection. In order to build detection models, it
is need to start by characterization, indeed, it is need to understand what is fake news before trying to detect them.
FAKE NEWS CHARACTERIZATION
Fake news definition is made of two parts: authenticity and intent. Authenticity means that fake
news content false information that can be verified as such, which means that conspiracy theory
is not included in fake news as there are difficult to be proven true or false in most cases. The
second part, intent, means that the false information has been written with the goal of
misleading the reader.
Fake news on social media: from characterization to detection.
WHAT IS TFIDFVECTORIZER
TF (Term Frequency): The number of times a word appears in a document is its Term Frequency. A
higher value means a term appears more often than others, and so, the document is a good match
when the term is part of the search terms.
IDF (Inverse Document Frequency): Words that occur many times a document, but also occur many
times in many others, may be irrelevant. IDF is a measure of how significant a term is in the entire
corpus.
The TfidfVectorizer converts a collection of raw documents into a matrix of TF-IDF features.
WHAT IS PASSIVE AGGRESSIVE ALGORITHM
Passive Aggressive algorithms are online learning algorithms. Such an
algorithm remains passive for a correct classification outcome, and turns
aggressive in the event of a miscalculation, updating and adjusting. Unlike
most other algorithms, it does not converge. Its purpose is to make updates
that correct the loss, causing very little change in the norm of the weight
vector.
EXAMPLE
Finally a INDIAN student from PONDICHERRY university, named RAMU found a home
remedy cure for Covid-19 which is for the very first time accepted by WHO.
He proved that by adding 1 tablespoon of black pepper powder to 2 table spoons of
honey
and some ginger juice for consecutive 5 days would suppress the effects of corona.
And eventually go away 100%
Entire world is starting to accept this remedy.
Finally a good news In 2020!!
PLEASE CIRCULATE THIS INFORMATION TO ALL YOUR FAMILY MEMBERS
AND FRIENDS.
CONCLUSION
This works focus on textual news content features. Indeed, other features related to
social media are difficult to acquire. For example, users information is difficult to
obtain on Facebook, as well as post information. In addition, the different datasets
that have been presented at style-based model does not provide any other information
than textual ones.
Looking at Different approaches to fake news detection it can be seen that the main
focus will be made on unsupervised and supervised learning models using textual
news content. It should be noted that machine learning models usually comes with a
trade-off between precision and recall and thus that a model which is very good at
detected fake news might have a high false positive rate as opposite to a model with a
low false positive rate which might not be good at detecting them. This cause ethical
questions such as automatic censorship that will not be discussed here.
FAKE NEWS DETECTION (1).pptx

Weitere ähnliche Inhalte

Was ist angesagt?

Seminar on detecting fake accounts in social media using machine learning
Seminar on detecting fake accounts in social media using machine learningSeminar on detecting fake accounts in social media using machine learning
Seminar on detecting fake accounts in social media using machine learningParvathi Sanil Nair
 
Presentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social NetworksPresentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social NetworksAshish Arora
 
Seminar Report Mine
Seminar Report MineSeminar Report Mine
Seminar Report Minesachin narang
 
Fake_News_Detection_1st_review[1] capstone project.pptx
Fake_News_Detection_1st_review[1] capstone project.pptxFake_News_Detection_1st_review[1] capstone project.pptx
Fake_News_Detection_1st_review[1] capstone project.pptxHarshMangal20
 
fraud detection
fraud detectionfraud detection
fraud detectionshalushamil
 
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGDETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGijcsit
 
PHISHING DETECTION
PHISHING DETECTIONPHISHING DETECTION
PHISHING DETECTIONumme ayesha
 
Predicting cyber bullying on t witter using machine learning
Predicting cyber bullying on t witter using machine learningPredicting cyber bullying on t witter using machine learning
Predicting cyber bullying on t witter using machine learningMirXahid1
 
Detecting the presence of cyberbullying using computer software
Detecting the presence of cyberbullying using computer softwareDetecting the presence of cyberbullying using computer software
Detecting the presence of cyberbullying using computer softwareAshish Arora
 
Detecting Phishing using Machine Learning
Detecting Phishing using Machine LearningDetecting Phishing using Machine Learning
Detecting Phishing using Machine Learningijtsrd
 
Detection of cyber-bullying
Detection of cyber-bullying Detection of cyber-bullying
Detection of cyber-bullying Ziar Khan
 
Detection of phishing websites
Detection of phishing websitesDetection of phishing websites
Detection of phishing websitesm srikanth
 
What is Deep Learning?
What is Deep Learning?What is Deep Learning?
What is Deep Learning?NVIDIA
 
Housing price prediction
Housing price predictionHousing price prediction
Housing price predictionAbhimanyu Dwivedi
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition SystemZara Tariq
 
Machine learning Summer Training report
Machine learning Summer Training reportMachine learning Summer Training report
Machine learning Summer Training reportSubhadip Mondal
 
Disease prediction using machine learning
Disease prediction using machine learningDisease prediction using machine learning
Disease prediction using machine learningJinishaKG
 
Music Genre Classification CS513
Music Genre Classification CS513Music Genre Classification CS513
Music Genre Classification CS513Balaji Katakam
 
Object detection with deep learning
Object detection with deep learningObject detection with deep learning
Object detection with deep learningSushant Shrivastava
 

Was ist angesagt? (20)

Seminar on detecting fake accounts in social media using machine learning
Seminar on detecting fake accounts in social media using machine learningSeminar on detecting fake accounts in social media using machine learning
Seminar on detecting fake accounts in social media using machine learning
 
Presentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social NetworksPresentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social Networks
 
Detecting fake news .pptx
Detecting fake news .pptxDetecting fake news .pptx
Detecting fake news .pptx
 
Seminar Report Mine
Seminar Report MineSeminar Report Mine
Seminar Report Mine
 
Fake_News_Detection_1st_review[1] capstone project.pptx
Fake_News_Detection_1st_review[1] capstone project.pptxFake_News_Detection_1st_review[1] capstone project.pptx
Fake_News_Detection_1st_review[1] capstone project.pptx
 
fraud detection
fraud detectionfraud detection
fraud detection
 
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGDETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
 
PHISHING DETECTION
PHISHING DETECTIONPHISHING DETECTION
PHISHING DETECTION
 
Predicting cyber bullying on t witter using machine learning
Predicting cyber bullying on t witter using machine learningPredicting cyber bullying on t witter using machine learning
Predicting cyber bullying on t witter using machine learning
 
Detecting the presence of cyberbullying using computer software
Detecting the presence of cyberbullying using computer softwareDetecting the presence of cyberbullying using computer software
Detecting the presence of cyberbullying using computer software
 
Detecting Phishing using Machine Learning
Detecting Phishing using Machine LearningDetecting Phishing using Machine Learning
Detecting Phishing using Machine Learning
 
Detection of cyber-bullying
Detection of cyber-bullying Detection of cyber-bullying
Detection of cyber-bullying
 
Detection of phishing websites
Detection of phishing websitesDetection of phishing websites
Detection of phishing websites
 
What is Deep Learning?
What is Deep Learning?What is Deep Learning?
What is Deep Learning?
 
Housing price prediction
Housing price predictionHousing price prediction
Housing price prediction
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
 
Machine learning Summer Training report
Machine learning Summer Training reportMachine learning Summer Training report
Machine learning Summer Training report
 
Disease prediction using machine learning
Disease prediction using machine learningDisease prediction using machine learning
Disease prediction using machine learning
 
Music Genre Classification CS513
Music Genre Classification CS513Music Genre Classification CS513
Music Genre Classification CS513
 
Object detection with deep learning
Object detection with deep learningObject detection with deep learning
Object detection with deep learning
 

Ă„hnlich wie FAKE NEWS DETECTION (1).pptx

Detailed Research on Fake News: Opportunities, Challenges and Methods
Detailed Research on Fake News: Opportunities, Challenges and MethodsDetailed Research on Fake News: Opportunities, Challenges and Methods
Detailed Research on Fake News: Opportunities, Challenges and MethodsMilap Bhanderi
 
IAMAI Factly Report: People below age 20 or above 50 more susceptible to fake...
IAMAI Factly Report: People below age 20 or above 50 more susceptible to fake...IAMAI Factly Report: People below age 20 or above 50 more susceptible to fake...
IAMAI Factly Report: People below age 20 or above 50 more susceptible to fake...Social Samosa
 
FAKE INFORMATION & WORD-OF-MOUTH BEHAVIOR
FAKE INFORMATION & WORD-OF-MOUTH BEHAVIORFAKE INFORMATION & WORD-OF-MOUTH BEHAVIOR
FAKE INFORMATION & WORD-OF-MOUTH BEHAVIORDisha Ghoshal
 
Fake News Detection on Social Media using Machine Learning
Fake News Detection on Social Media using Machine LearningFake News Detection on Social Media using Machine Learning
Fake News Detection on Social Media using Machine Learningclassic tpr
 
Demystifying Online Misinformation, with Dr. Claire Wardle, co-founder and Ex...
Demystifying Online Misinformation, with Dr. Claire Wardle, co-founder and Ex...Demystifying Online Misinformation, with Dr. Claire Wardle, co-founder and Ex...
Demystifying Online Misinformation, with Dr. Claire Wardle, co-founder and Ex...Damian Radcliffe
 
Media literacy in the age of information overload
Media literacy in the age of information overloadMedia literacy in the age of information overload
Media literacy in the age of information overloadGmeconline
 
Misinformation, Disinformation, Malinformation, fake news and libraries
Misinformation, Disinformation, Malinformation, fake news and librariesMisinformation, Disinformation, Malinformation, fake news and libraries
Misinformation, Disinformation, Malinformation, fake news and librariesDr Trivedi
 
Black History Facts Worksheets Origins. Online assignment writing service.
Black History Facts Worksheets Origins. Online assignment writing service.Black History Facts Worksheets Origins. Online assignment writing service.
Black History Facts Worksheets Origins. Online assignment writing service.Sabrina Ball
 
Existence of Social Media in Pandemic Boon or Bane
Existence of Social Media in Pandemic Boon or BaneExistence of Social Media in Pandemic Boon or Bane
Existence of Social Media in Pandemic Boon or Baneijtsrd
 
Essay Writing Tips That Will Make. Online assignment writing service.
Essay Writing Tips That Will Make. Online assignment writing service.Essay Writing Tips That Will Make. Online assignment writing service.
Essay Writing Tips That Will Make. Online assignment writing service.Kelly Flores
 
Content Happy Frog - Letter Writing Paper Set 2
Content Happy Frog - Letter Writing Paper Set 2Content Happy Frog - Letter Writing Paper Set 2
Content Happy Frog - Letter Writing Paper Set 2Alison Carias
 
Temporal_Patterns_of_Misinformation_Diffusion_in_Online_Social_Networks
Temporal_Patterns_of_Misinformation_Diffusion_in_Online_Social_NetworksTemporal_Patterns_of_Misinformation_Diffusion_in_Online_Social_Networks
Temporal_Patterns_of_Misinformation_Diffusion_in_Online_Social_NetworksHarry Gogonis
 
How To Write An Analysis Essay 101 Step-By-Step Guide Blog
How To Write An Analysis Essay 101 Step-By-Step Guide BlogHow To Write An Analysis Essay 101 Step-By-Step Guide Blog
How To Write An Analysis Essay 101 Step-By-Step Guide BlogKris Cundiff
 
Health Care Social Media for Medical Device Manufacturers - FDA - Presentatio...
Health Care Social Media for Medical Device Manufacturers - FDA - Presentatio...Health Care Social Media for Medical Device Manufacturers - FDA - Presentatio...
Health Care Social Media for Medical Device Manufacturers - FDA - Presentatio...David Harlow
 
Barry’s YALILearns session on Media Literacy.pptx
Barry’s YALILearns session on Media Literacy.pptxBarry’s YALILearns session on Media Literacy.pptx
Barry’s YALILearns session on Media Literacy.pptxBarryAssangwingNkemo
 

Ă„hnlich wie FAKE NEWS DETECTION (1).pptx (20)

Detailed Research on Fake News: Opportunities, Challenges and Methods
Detailed Research on Fake News: Opportunities, Challenges and MethodsDetailed Research on Fake News: Opportunities, Challenges and Methods
Detailed Research on Fake News: Opportunities, Challenges and Methods
 
IAMAI Factly Report: People below age 20 or above 50 more susceptible to fake...
IAMAI Factly Report: People below age 20 or above 50 more susceptible to fake...IAMAI Factly Report: People below age 20 or above 50 more susceptible to fake...
IAMAI Factly Report: People below age 20 or above 50 more susceptible to fake...
 
FAKE INFORMATION & WORD-OF-MOUTH BEHAVIOR
FAKE INFORMATION & WORD-OF-MOUTH BEHAVIORFAKE INFORMATION & WORD-OF-MOUTH BEHAVIOR
FAKE INFORMATION & WORD-OF-MOUTH BEHAVIOR
 
Fake News Detection on Social Media using Machine Learning
Fake News Detection on Social Media using Machine LearningFake News Detection on Social Media using Machine Learning
Fake News Detection on Social Media using Machine Learning
 
Demystifying Online Misinformation, with Dr. Claire Wardle, co-founder and Ex...
Demystifying Online Misinformation, with Dr. Claire Wardle, co-founder and Ex...Demystifying Online Misinformation, with Dr. Claire Wardle, co-founder and Ex...
Demystifying Online Misinformation, with Dr. Claire Wardle, co-founder and Ex...
 
Media literacy in the age of information overload
Media literacy in the age of information overloadMedia literacy in the age of information overload
Media literacy in the age of information overload
 
Social-Media
Social-MediaSocial-Media
Social-Media
 
The Triangulation of Truth
The Triangulation of TruthThe Triangulation of Truth
The Triangulation of Truth
 
Social media (ePR) unit outline
Social media (ePR) unit outlineSocial media (ePR) unit outline
Social media (ePR) unit outline
 
Misinformation, Disinformation, Malinformation, fake news and libraries
Misinformation, Disinformation, Malinformation, fake news and librariesMisinformation, Disinformation, Malinformation, fake news and libraries
Misinformation, Disinformation, Malinformation, fake news and libraries
 
Black History Facts Worksheets Origins. Online assignment writing service.
Black History Facts Worksheets Origins. Online assignment writing service.Black History Facts Worksheets Origins. Online assignment writing service.
Black History Facts Worksheets Origins. Online assignment writing service.
 
Existence of Social Media in Pandemic Boon or Bane
Existence of Social Media in Pandemic Boon or BaneExistence of Social Media in Pandemic Boon or Bane
Existence of Social Media in Pandemic Boon or Bane
 
Essay Writing Tips That Will Make. Online assignment writing service.
Essay Writing Tips That Will Make. Online assignment writing service.Essay Writing Tips That Will Make. Online assignment writing service.
Essay Writing Tips That Will Make. Online assignment writing service.
 
Content Happy Frog - Letter Writing Paper Set 2
Content Happy Frog - Letter Writing Paper Set 2Content Happy Frog - Letter Writing Paper Set 2
Content Happy Frog - Letter Writing Paper Set 2
 
MIL-PPT.pptx
MIL-PPT.pptxMIL-PPT.pptx
MIL-PPT.pptx
 
Duty identity-credibility
Duty identity-credibilityDuty identity-credibility
Duty identity-credibility
 
Temporal_Patterns_of_Misinformation_Diffusion_in_Online_Social_Networks
Temporal_Patterns_of_Misinformation_Diffusion_in_Online_Social_NetworksTemporal_Patterns_of_Misinformation_Diffusion_in_Online_Social_Networks
Temporal_Patterns_of_Misinformation_Diffusion_in_Online_Social_Networks
 
How To Write An Analysis Essay 101 Step-By-Step Guide Blog
How To Write An Analysis Essay 101 Step-By-Step Guide BlogHow To Write An Analysis Essay 101 Step-By-Step Guide Blog
How To Write An Analysis Essay 101 Step-By-Step Guide Blog
 
Health Care Social Media for Medical Device Manufacturers - FDA - Presentatio...
Health Care Social Media for Medical Device Manufacturers - FDA - Presentatio...Health Care Social Media for Medical Device Manufacturers - FDA - Presentatio...
Health Care Social Media for Medical Device Manufacturers - FDA - Presentatio...
 
Barry’s YALILearns session on Media Literacy.pptx
Barry’s YALILearns session on Media Literacy.pptxBarry’s YALILearns session on Media Literacy.pptx
Barry’s YALILearns session on Media Literacy.pptx
 

KĂĽrzlich hochgeladen

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

KĂĽrzlich hochgeladen (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

FAKE NEWS DETECTION (1).pptx

  • 1. FAKE NEWS DETECTION I.SRI VARSHINI (19RH1A1263) M.SANJANA REDDY (19RH1A12A0)
  • 2. CONTENTS • INTRODUCTION • WHAT IS FAKE NEWS..? • FAKE NEWS CHARACTERIZATION • FAKE NEWS DETECTION • WHAT IS TFIDFVECTORIZER • WHAT IS PASSIVE AGGRESSIVE ALGORITHM • EXAMPLE • CONCLUSION
  • 3. INTRODUCTION • FAKE NEWS SPREADS LIKE A WILDLIFE AND THIS IS A BIG ISSUE IN THIS ERA. • FOR SOME YEARS, MOSTLY SINCE THE RISE OF SOCIAL MEDIA, FAKE NEWS HAVE BECOME A SOCIETY PROBLEM, IN SOME OCCASION SPREADING MORE AND FASTER THAN THE TRUE INFORMATION. IN THIS PAPER I EVALUATE THE PERFORMANCE OF ATTENTION MECHANISM FOR FAKE NEWS DETECTION ON TWO DATASETS, ONE CONTAINING TRADITIONAL ONLINE NEWS ARTICLES AND THE SECOND ONE NEWS FROM VARIOUS SOURCES. • IT SHOWS THAT ATTENTION MECHANISM DOES NOT WORK AS WELL AS EXPECTED. IN ADDITION, I MADE CHANGES TO ORIGINAL ATTENTION MECHANISM PAPER, BY USING WORD2VEC EMBEDDING, THAT PROVES TO WORKS BETTER ON THIS PARTICULAR CASE.
  • 4. WHAT IS FAKE NEWS..? • A type of yellow journalism,fake news encapsulates pieces of news that may be hoaxes and is generally spread through social media and other online media. This is often done to further or impose certain ideas and is often achieved with political agendas.Such news items may contain false or exaggerated claims, and may end up being viralized by algorithms, and users may end up in a filter bubble. • Fake news has quickly become a society problem, being used to propagate false or rumour information in order to change peoples behaviour. • In order to work on fake news detection, it is important to understand what is fake news and how they are characterized. The following is based on Fake News Detection on Social Media: A Data Mining Perspective. • The first is characterization or what is fake news and the second is detection. In order to build detection models, it is need to start by characterization, indeed, it is need to understand what is fake news before trying to detect them.
  • 5. FAKE NEWS CHARACTERIZATION Fake news definition is made of two parts: authenticity and intent. Authenticity means that fake news content false information that can be verified as such, which means that conspiracy theory is not included in fake news as there are difficult to be proven true or false in most cases. The second part, intent, means that the false information has been written with the goal of misleading the reader. Fake news on social media: from characterization to detection.
  • 6. WHAT IS TFIDFVECTORIZER TF (Term Frequency): The number of times a word appears in a document is its Term Frequency. A higher value means a term appears more often than others, and so, the document is a good match when the term is part of the search terms. IDF (Inverse Document Frequency): Words that occur many times a document, but also occur many times in many others, may be irrelevant. IDF is a measure of how significant a term is in the entire corpus. The TfidfVectorizer converts a collection of raw documents into a matrix of TF-IDF features.
  • 7. WHAT IS PASSIVE AGGRESSIVE ALGORITHM Passive Aggressive algorithms are online learning algorithms. Such an algorithm remains passive for a correct classification outcome, and turns aggressive in the event of a miscalculation, updating and adjusting. Unlike most other algorithms, it does not converge. Its purpose is to make updates that correct the loss, causing very little change in the norm of the weight vector.
  • 8. EXAMPLE Finally a INDIAN student from PONDICHERRY university, named RAMU found a home remedy cure for Covid-19 which is for the very first time accepted by WHO. He proved that by adding 1 tablespoon of black pepper powder to 2 table spoons of honey and some ginger juice for consecutive 5 days would suppress the effects of corona. And eventually go away 100% Entire world is starting to accept this remedy. Finally a good news In 2020!! PLEASE CIRCULATE THIS INFORMATION TO ALL YOUR FAMILY MEMBERS AND FRIENDS.
  • 9. CONCLUSION This works focus on textual news content features. Indeed, other features related to social media are difficult to acquire. For example, users information is difficult to obtain on Facebook, as well as post information. In addition, the different datasets that have been presented at style-based model does not provide any other information than textual ones. Looking at Different approaches to fake news detection it can be seen that the main focus will be made on unsupervised and supervised learning models using textual news content. It should be noted that machine learning models usually comes with a trade-off between precision and recall and thus that a model which is very good at detected fake news might have a high false positive rate as opposite to a model with a low false positive rate which might not be good at detecting them. This cause ethical questions such as automatic censorship that will not be discussed here.