SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3834
Fake News Analyzer
Nitin Sharma
Student, Dept. Electronics & Telecommunications, K. J. Somaiya Institute Of Engineering & Technology, Sion,
Mumbai, India
Ritik Sharma
Student, Dept. Electronics & Telecommunications, K. J. Somaiya Institute Of Engineering & Technology, Sion,
Mumbai, India
Sharan Shetty
Student, Dept. Electronics & Telecommunications, K. J. Somaiya Institute Of Engineering & Technology, Sion,
Mumbai, India
Prof. Harshwardhan Ahire
Assistant Professor, Dept. Electronics & Telecommunications, K. J. Somaiya Institute Of Engineering & Technology,
Sion, Mumbai, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - This paper presents a method to detect
misinformation in news content and face tempering in
videos. The system is broken down into three
segments. 1. A simple UI’s designed for the users to
insert alleged text, paragraph, headlineorstatementto
analyses and process it.2.Text based misinformation
detection; the system would run a text classifier oncea
sentence, statement, or paragraph has been inserted
into the system in text format. Datasets like LIAR (with
over 12.8k manually labeled short statements were
collected) and different datasets from Kaggle were
used for training the model. Sentimental analysis was
executed after cleaning, lemmatizing, and splitting the
text data. The text than is processed on the basis of
probability of truth or false it propagates. 3. Deep fake
detection; Deep-Fake and Face2Face were used to
build a model that could automatically and efficiently
detect forged faces in a video. It followsadeeplearning
approach to detect whether the given video is
subjected to forgery or not. The whole system is
vertical integration of analyzing different aspects that
contribute to misinformation and fake data (in the
form of images, videos, and texts). The system would
contribute to fighting fake news.
1. Introduction
With the advancements in the field of technology and
the increase in the number of people using those
technologies, theretendstohavecertainrepercussions
which come along with all the pleasures of inventions.
The major concern for this generation is to educatethe
citizens about the consumption of content. What we
see, read, and listen to on the pool of the internet
impacts the way we see things around us and also our
perspectives. These very contents are designed to
deliberately misleadmassesaboutcertainsubjectsand
to induce a very specific view about them. These
contents could be false, intentionally plotted,
misreported, polarized, persuasive information, and
citizen journalism with improper facts. Hence, a
system/ application is needed that would identify and
break down any alleged information on the basis of
detailed analysis. This paper tries to present a case for
an ML-based application that would useasimpleUIfor
users to insert or upload their query text, paragraph,
headline, statement or alleged video to process it for
fake content analysis and detect its authenticity. This
would deal with Deep fakes and misinformation in the
text format. The system is divided into two different
segments that would focus on two different mediums
of spreading fake news i.e. Video, and text. Videos are
subjected to deep fakes and wrongful captions which
then are forwarded and reposted so many times that it
becomes difficult to verify their true source. We
worked on a deep fake and an object detection model
that would help us to understand whether a video is
face forged or not. And notify its true source. We have
used a microscopic level of analysis that would help us
in detecting face forgery which is hard to identify from
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3835
a naked human eye. The model is based on a well-
performing network of imageclassification.Textbased
classification is divided into 6 different classes that
would define if the given statement is Original (True),
True (True), Mostly True (True), Half True (True),
Barely True (False), False (False) and Pants Fire
(False). Based on these classifications, the system
concludes whether a given statement, paragraph or a
headline is trustworthy or not.
1.1 Deep-Fake
The concept of deep-fake refers to images, audios or
videos that are fakes, that is they depict events that
never occurred.Unlikemethodsofmanipulatingmedia
in the past like Photoshop,thesedeepfakesarecreated
by deep neural networkstobenearlyindistinguishable
from their real counterpartstheadvancesinthefieldof
deep fakes are equalpartsimpressiveandalarming.On
the upside the fidelity with which we can alter media
will certainly lead to some world class memes but in
the wrong hands this technology can be used tospread
misinformation and undermine public trust. Almost
like a sci fi type of identity theft, where you can get
anyone to say anything and its vice versa. This means
that as we get better at generating deep fakes, wemust
also get better at identifying those deep fakes Deep
Fakes can be generated by using auto encoders. The
auto encoders work as follows, when the data is
processed such as image data,datagetscompressedby
an encoder. The purpose of this compression is to
suppress the effect of noise in the data and to reduce
convolutional complexity; conversely the original
image can be restored at least approximately by
passing the compressed versionoftheimagethrougha
decoder. Now suppose we want to create a deep fake
that blends Van Gogh’s ‘Starry night’ and Da Vinci’s
‘Mona Lisa’. To do so when we train the auto encoders
for different data sets. We allow the encoders to share
weights while keeping the decoders separate,thatway
an image of the Mona Lisa can be compressed
Figure 01. Deep fake encoders
according to a general logic. It considers things likethe
illumination positionandtheexpressionofherfacebut
when it gets restored this will be done according tothe
logic specific to the starrynight, which has the effect of
overlaying Van Gogh’s distinctive style onto Davinci’s
masterpiece.
Figure 02. Examples of Deep-Fake images
1.2 News Headline Analysis
Text messages, news headlines from various micro
blogging and news media outlets are forwarded
through their URL links to multiple internet users via
different social media platforms and networks such as
WhatsApp, Facebook,Telegram,Instagram,etc.Mostof
the times these contents produced by several
independent and unverified sources areresponsibleto
spread lies and misinformationamongtheusers.Their
mainaimistowriteaneye-catchingheadlinethatcould
garner internet user’s attention and better SEO
operations give them better share ratio and hence
giving them a viral status that could fire up the entire
internet with false and maligned information. Most of
the time many users read the headline which could be
constructed in such a way that it creates controversial
waves so that it helps the publishers to gain more
visitors and sometimes many different political and
independent institutions spread these veryheadliners
through WhatsApp and several other chatting
applications making it difficult to verify the source of
thematerial.Andhenceitgetsdifficult ontheusersend
to verify the legitimacyofthematerial.Theseheadlines
are then spread through user’s tweets, texts, and chats
which are in normal text format. And once this
informationiscondensedintoasimpletextstatementit
gets complicated to determine the source and the
construction of the sentences that was originally
crafted
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3836
Figure 03. Examples of Deep-Fake videos
2. Proposed Method
We employed a web application to scan, take text input, and/or
upload media (image/video) which then could be analyzed
accordingtotheirrespectiveanalyzingsystems.Astheconsumption
offakenewsis mainlythroughsocialmediaapps,thesystemtreats
twoinputsystemsintwoseparateways;textclassificationandvideo
manipulationdetection.
Weusedexistingmachinelearningmodelsandtraineditusingour
data collected from random videos and headlines found on the
internet.Wedidn’tusetheexistingdeepfakeoracclaimedfakenews
headlines for this data set. We built a custom pipeline for
unorganized and real- world data to raise the uncertainty of the
modelandstudythemodel’soperationstodifferentliveexamples.
Fordeepfakevideos,wecompiledarawdatafromYouTube,Reddit,
newsnetwork’sarchivesandseveralothermemepagestobuilda
real- life practical data set for the machine learning model to
process. The random videos add to the uncertainty and put the
modelintotestforreallifeexamples.TheGUIhelpstheusertoadd
any videodirectlyinto the systemand we builda custompipeline
that breaks those movingimages into multiplesingle framesand
feedsitintotheMeso-4model.Afteritprocessesthevideofile,itgives
aprobabilityscoreof dependencyratio forthe data.The nature of
the file is projected through percentagescore that lets youdecide
whethertheallegedvideofileistrustworthyornot.
For Headline text analysis, we have worked with different NLP
modelsandtoolkitstogiveusastablesystemthatcouldtakeinputin
a textformatandanalysesittoprojectwhetherthegivenstatement
is how muchtrustworthy.We haveusedLIAR datasetto enhance
our system by using existing pre-trained models and constantly
adding newer data pointsto keep updatingthe system. It lets you
identify mis- quoted statements, misinformation and intestinally
fabricatedstatementsbyclassifyingthemintovarioustrustlevels.
2.1 Deep- Fake Detection
Meso-4 is a convolutional neural network with four
convolutionalblocksfollowedbyonefullyconnectedhidden
layer. We first import different libraries necessary for the
operations and then we created a dictionary tostore all the
image dimensionsand theno, of color channels. The height
and widthissetto256since3channelswereusedtoprocess
the image. The system uses classifier class to load weights
and make predictions. A meso-4 class was created to store
classifier class. 3 dimensions of the image data was passed
as the input layer which then proceeds to create 4
convolutional blocks. Convolutional layers always include
convolution layer and max pooling layer and a batch
normalization layer. Conv2d here represents the
convolutional layer. Filters were used to assign variable
parameters ofthe image data.CNN proceedstohigherorder
feature representations, from lines to corners to shapes to
faces. Meso-4 has 4 blocks in its convolutionallayerwithone
hidden layerand one outputlayerforthepredictions.Binary
class mode was established to classify images into true or
false value;the method is called as binaryclassificationtask
manager. We have builta custompreprocessorto dividethe
moving images into separate isolated independent images.
Figure 04. Results of real image detection
Figure 05. Results of Deep-Fake images
2.2 News Headline Analysis
We built a simpleUIforwebapplication thatcould helpthe
user insert i.e. simply copy paste the text into a system and
then it would initiate the process of identifying the source
and nature of the content uploaded. We used LIAR dataset
which was developed by William Yang Wang. We built few
classifiers to detect the text pasted. Aftergoingthroughtext
extraction, we fed the extracted data into different
classifiers. Naïve-Bayes, Logical Regression, Linear SVM,
Stochastic Gradient different other classifiers were used to
build a trustworthy classifying pipeline. Grid Search CV
methods were used to perform parameter tuning. Models
whichsuitedtheconditions better wereselectedtoidentify
fake news. 50 additional features were extracted from the
term frequency tfidf vectorizer to classify the most
important words in class
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3837
Figure 06. Results of news headline analysis (a)
Figure 07. Results of news headline analysis (b)
Acknowledgement
A successful work ofdissertationistheresultofinspiration,
support,guidance,motivation,andco-operationoffacilities
during study. It gives a great pleasure to acknowledge our
deep sense of gratitude to present our project titled; “Fake
News Analyzer”. We wouldliketogivesincerethankstoour
Principal Dr.Suresh Ukarande and H.O.D. Dr. Jayashree
Khanapuri for giving me the opportunity to present this
seminar. I am also thankful to my respected guide Prof.
Harshwardhan Ahire for this wholehearted support and
affectionate encouragement. His dynamism, vision, and
sincerity have deeply inspired us. He has taught us the
methodology to present the research work as clearly as
possible.
REFERENCES
[1] The psychology of fake news, Gordon Pennycook, David G
Rand, Trends in cognitive sciences 25 (5), 388-402,2021
[2] Fakenews,ThorstenQuandt,LenaFrischlich,SvenjaBoberg,
Tim Schatto‐Eckrodt
[3] Thescienceoffakenews.DavidMJLazer,MatthewABaum,
Yochai Benkler, Adam J Berinsky,Kelly M Greenhill,Filippo
Menczer, Miriam J Metzger, Brendan Nyhan, Gordon
Pennycook, David Rothschild, Michael Schudson, Steven A
Sloman, CassR Sunstein,EmilyAThorson, DuncanJ Watts,
Jonathan L Zittrain
[4] Science 359 (6380), 1094-1096, 2018F. Chollet. Xception:
Deep learning with depth wise separable convolutions.
2017 IEEE Conference on Computer Vision and Pattern
Recognition (CVPR), pages 1800–1807,2017. 5
[5] F. Chollet et al. Keras. http s://keras.io, 2015. 5
[6] W. Shi, F. Jiang, and D. Zhao. Single image superresolution
with dilated convolution based multi-scale information
learning inception module. arXiv preprint
arXiv:1707.07128, 2017.S. Fan, R. Wang, T.-T. Ng, C. Y.-C.
Tan, J. S. Herberg,
H. Farid. A Survey Of Image Forgery Detection.IEEESig-nal
Processing Magazine, 26(2):26–25, 2009. 1
[7] P. Garrido, L. Valgaerts, O. Rehmsen, T. Thormahlen,
P. Perez, and C. Theobalt. Automatic face reenactment. In
Proceedings ofthe IEEE Conferenceon Computer Vision and
Pattern Recognition, pages 4217–4224, 2014.
[8] MesoNet: a Compact Facial Video Forgery Detection
Network, https://github.com/ondyari/FaceForensics
[9] Detecting fake news article Jun Lin, Computer Science and
Engineering, Louisiana State University, Baton Rouge, LA,
USA, Glenna Tremblay-Taylor, Computer Science, Keene
State College, Keene, NH, USA, Guanyi Mou, Computer
Science, Worcester Polytechnic Institute, Worcester, MA,
USA, Di You, Computer Science, Worcester Polytechnic
Institute, Worcester, MA, USA, Kyumin Lee, Computer
Science, Worcester Polytechnic Institute, Worcester, MA,
USA

Weitere ähnliche Inhalte

Ähnlich wie Fake News Analyzer

IRJET - Fake News Detection: A Survey
IRJET -  	  Fake News Detection: A SurveyIRJET -  	  Fake News Detection: A Survey
IRJET - Fake News Detection: A SurveyIRJET Journal
 
IRJET- Authentication System in Social Networks
IRJET- Authentication System in Social NetworksIRJET- Authentication System in Social Networks
IRJET- Authentication System in Social NetworksIRJET Journal
 
Analyzing Social media’s real data detection through Web content mining using...
Analyzing Social media’s real data detection through Web content mining using...Analyzing Social media’s real data detection through Web content mining using...
Analyzing Social media’s real data detection through Web content mining using...IRJET Journal
 
IRJET - Face Detection and Recognition System
IRJET -  	  Face Detection and Recognition SystemIRJET -  	  Face Detection and Recognition System
IRJET - Face Detection and Recognition SystemIRJET Journal
 
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...IRJET Journal
 
Enhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart CredentialsEnhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart CredentialsIJCSIS Research Publications
 
Face Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial IntelligenceFace Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial IntelligenceIRJET Journal
 
Image Forgery / Tampering Detection Using Deep Learning and Cloud
Image Forgery / Tampering Detection Using Deep Learning and CloudImage Forgery / Tampering Detection Using Deep Learning and Cloud
Image Forgery / Tampering Detection Using Deep Learning and CloudIRJET Journal
 
Deep Learning Assisted Tool for Face Mask Detection
Deep Learning Assisted Tool for Face Mask DetectionDeep Learning Assisted Tool for Face Mask Detection
Deep Learning Assisted Tool for Face Mask DetectionIRJET Journal
 
IRJET-Design and Implementation of Efficient Adder using Various Logic Styles
IRJET-Design and Implementation of Efficient Adder using Various Logic StylesIRJET-Design and Implementation of Efficient Adder using Various Logic Styles
IRJET-Design and Implementation of Efficient Adder using Various Logic StylesIRJET Journal
 
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET Journal
 
Real Time Head Generation for Video Conferencing
Real Time Head Generation for Video ConferencingReal Time Head Generation for Video Conferencing
Real Time Head Generation for Video ConferencingIRJET Journal
 
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...IRJET Journal
 
Women's Maltreatment Redressal System based on Machine Learning Techniques
Women's Maltreatment Redressal System based on Machine Learning TechniquesWomen's Maltreatment Redressal System based on Machine Learning Techniques
Women's Maltreatment Redressal System based on Machine Learning TechniquesIRJET Journal
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...IRJET Journal
 
IRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social NetworkIRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social NetworkIRJET Journal
 
Real Time Moving Object Detection for Day-Night Surveillance using AI
Real Time Moving Object Detection for Day-Night Surveillance using AIReal Time Moving Object Detection for Day-Night Surveillance using AI
Real Time Moving Object Detection for Day-Night Surveillance using AIIRJET Journal
 
Broadcasting Forensics Using Machine Learning Approaches
Broadcasting Forensics Using Machine Learning ApproachesBroadcasting Forensics Using Machine Learning Approaches
Broadcasting Forensics Using Machine Learning Approachesijtsrd
 
IRJET- Secured Authentication using Image Shield Protection and Database ...
IRJET-  	  Secured Authentication using Image Shield Protection and Database ...IRJET-  	  Secured Authentication using Image Shield Protection and Database ...
IRJET- Secured Authentication using Image Shield Protection and Database ...IRJET Journal
 
IRJET - NETRA: Android Application for Visually Challenged People to Dete...
IRJET -  	  NETRA: Android Application for Visually Challenged People to Dete...IRJET -  	  NETRA: Android Application for Visually Challenged People to Dete...
IRJET - NETRA: Android Application for Visually Challenged People to Dete...IRJET Journal
 

Ähnlich wie Fake News Analyzer (20)

IRJET - Fake News Detection: A Survey
IRJET -  	  Fake News Detection: A SurveyIRJET -  	  Fake News Detection: A Survey
IRJET - Fake News Detection: A Survey
 
IRJET- Authentication System in Social Networks
IRJET- Authentication System in Social NetworksIRJET- Authentication System in Social Networks
IRJET- Authentication System in Social Networks
 
Analyzing Social media’s real data detection through Web content mining using...
Analyzing Social media’s real data detection through Web content mining using...Analyzing Social media’s real data detection through Web content mining using...
Analyzing Social media’s real data detection through Web content mining using...
 
IRJET - Face Detection and Recognition System
IRJET -  	  Face Detection and Recognition SystemIRJET -  	  Face Detection and Recognition System
IRJET - Face Detection and Recognition System
 
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...
 
Enhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart CredentialsEnhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart Credentials
 
Face Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial IntelligenceFace Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial Intelligence
 
Image Forgery / Tampering Detection Using Deep Learning and Cloud
Image Forgery / Tampering Detection Using Deep Learning and CloudImage Forgery / Tampering Detection Using Deep Learning and Cloud
Image Forgery / Tampering Detection Using Deep Learning and Cloud
 
Deep Learning Assisted Tool for Face Mask Detection
Deep Learning Assisted Tool for Face Mask DetectionDeep Learning Assisted Tool for Face Mask Detection
Deep Learning Assisted Tool for Face Mask Detection
 
IRJET-Design and Implementation of Efficient Adder using Various Logic Styles
IRJET-Design and Implementation of Efficient Adder using Various Logic StylesIRJET-Design and Implementation of Efficient Adder using Various Logic Styles
IRJET-Design and Implementation of Efficient Adder using Various Logic Styles
 
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
 
Real Time Head Generation for Video Conferencing
Real Time Head Generation for Video ConferencingReal Time Head Generation for Video Conferencing
Real Time Head Generation for Video Conferencing
 
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
 
Women's Maltreatment Redressal System based on Machine Learning Techniques
Women's Maltreatment Redressal System based on Machine Learning TechniquesWomen's Maltreatment Redressal System based on Machine Learning Techniques
Women's Maltreatment Redressal System based on Machine Learning Techniques
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
 
IRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social NetworkIRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social Network
 
Real Time Moving Object Detection for Day-Night Surveillance using AI
Real Time Moving Object Detection for Day-Night Surveillance using AIReal Time Moving Object Detection for Day-Night Surveillance using AI
Real Time Moving Object Detection for Day-Night Surveillance using AI
 
Broadcasting Forensics Using Machine Learning Approaches
Broadcasting Forensics Using Machine Learning ApproachesBroadcasting Forensics Using Machine Learning Approaches
Broadcasting Forensics Using Machine Learning Approaches
 
IRJET- Secured Authentication using Image Shield Protection and Database ...
IRJET-  	  Secured Authentication using Image Shield Protection and Database ...IRJET-  	  Secured Authentication using Image Shield Protection and Database ...
IRJET- Secured Authentication using Image Shield Protection and Database ...
 
IRJET - NETRA: Android Application for Visually Challenged People to Dete...
IRJET -  	  NETRA: Android Application for Visually Challenged People to Dete...IRJET -  	  NETRA: Android Application for Visually Challenged People to Dete...
IRJET - NETRA: Android Application for Visually Challenged People to Dete...
 

Mehr von IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Mehr von IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Kürzlich hochgeladen

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 

Kürzlich hochgeladen (20)

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 

Fake News Analyzer

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3834 Fake News Analyzer Nitin Sharma Student, Dept. Electronics & Telecommunications, K. J. Somaiya Institute Of Engineering & Technology, Sion, Mumbai, India Ritik Sharma Student, Dept. Electronics & Telecommunications, K. J. Somaiya Institute Of Engineering & Technology, Sion, Mumbai, India Sharan Shetty Student, Dept. Electronics & Telecommunications, K. J. Somaiya Institute Of Engineering & Technology, Sion, Mumbai, India Prof. Harshwardhan Ahire Assistant Professor, Dept. Electronics & Telecommunications, K. J. Somaiya Institute Of Engineering & Technology, Sion, Mumbai, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - This paper presents a method to detect misinformation in news content and face tempering in videos. The system is broken down into three segments. 1. A simple UI’s designed for the users to insert alleged text, paragraph, headlineorstatementto analyses and process it.2.Text based misinformation detection; the system would run a text classifier oncea sentence, statement, or paragraph has been inserted into the system in text format. Datasets like LIAR (with over 12.8k manually labeled short statements were collected) and different datasets from Kaggle were used for training the model. Sentimental analysis was executed after cleaning, lemmatizing, and splitting the text data. The text than is processed on the basis of probability of truth or false it propagates. 3. Deep fake detection; Deep-Fake and Face2Face were used to build a model that could automatically and efficiently detect forged faces in a video. It followsadeeplearning approach to detect whether the given video is subjected to forgery or not. The whole system is vertical integration of analyzing different aspects that contribute to misinformation and fake data (in the form of images, videos, and texts). The system would contribute to fighting fake news. 1. Introduction With the advancements in the field of technology and the increase in the number of people using those technologies, theretendstohavecertainrepercussions which come along with all the pleasures of inventions. The major concern for this generation is to educatethe citizens about the consumption of content. What we see, read, and listen to on the pool of the internet impacts the way we see things around us and also our perspectives. These very contents are designed to deliberately misleadmassesaboutcertainsubjectsand to induce a very specific view about them. These contents could be false, intentionally plotted, misreported, polarized, persuasive information, and citizen journalism with improper facts. Hence, a system/ application is needed that would identify and break down any alleged information on the basis of detailed analysis. This paper tries to present a case for an ML-based application that would useasimpleUIfor users to insert or upload their query text, paragraph, headline, statement or alleged video to process it for fake content analysis and detect its authenticity. This would deal with Deep fakes and misinformation in the text format. The system is divided into two different segments that would focus on two different mediums of spreading fake news i.e. Video, and text. Videos are subjected to deep fakes and wrongful captions which then are forwarded and reposted so many times that it becomes difficult to verify their true source. We worked on a deep fake and an object detection model that would help us to understand whether a video is face forged or not. And notify its true source. We have used a microscopic level of analysis that would help us in detecting face forgery which is hard to identify from
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3835 a naked human eye. The model is based on a well- performing network of imageclassification.Textbased classification is divided into 6 different classes that would define if the given statement is Original (True), True (True), Mostly True (True), Half True (True), Barely True (False), False (False) and Pants Fire (False). Based on these classifications, the system concludes whether a given statement, paragraph or a headline is trustworthy or not. 1.1 Deep-Fake The concept of deep-fake refers to images, audios or videos that are fakes, that is they depict events that never occurred.Unlikemethodsofmanipulatingmedia in the past like Photoshop,thesedeepfakesarecreated by deep neural networkstobenearlyindistinguishable from their real counterpartstheadvancesinthefieldof deep fakes are equalpartsimpressiveandalarming.On the upside the fidelity with which we can alter media will certainly lead to some world class memes but in the wrong hands this technology can be used tospread misinformation and undermine public trust. Almost like a sci fi type of identity theft, where you can get anyone to say anything and its vice versa. This means that as we get better at generating deep fakes, wemust also get better at identifying those deep fakes Deep Fakes can be generated by using auto encoders. The auto encoders work as follows, when the data is processed such as image data,datagetscompressedby an encoder. The purpose of this compression is to suppress the effect of noise in the data and to reduce convolutional complexity; conversely the original image can be restored at least approximately by passing the compressed versionoftheimagethrougha decoder. Now suppose we want to create a deep fake that blends Van Gogh’s ‘Starry night’ and Da Vinci’s ‘Mona Lisa’. To do so when we train the auto encoders for different data sets. We allow the encoders to share weights while keeping the decoders separate,thatway an image of the Mona Lisa can be compressed Figure 01. Deep fake encoders according to a general logic. It considers things likethe illumination positionandtheexpressionofherfacebut when it gets restored this will be done according tothe logic specific to the starrynight, which has the effect of overlaying Van Gogh’s distinctive style onto Davinci’s masterpiece. Figure 02. Examples of Deep-Fake images 1.2 News Headline Analysis Text messages, news headlines from various micro blogging and news media outlets are forwarded through their URL links to multiple internet users via different social media platforms and networks such as WhatsApp, Facebook,Telegram,Instagram,etc.Mostof the times these contents produced by several independent and unverified sources areresponsibleto spread lies and misinformationamongtheusers.Their mainaimistowriteaneye-catchingheadlinethatcould garner internet user’s attention and better SEO operations give them better share ratio and hence giving them a viral status that could fire up the entire internet with false and maligned information. Most of the time many users read the headline which could be constructed in such a way that it creates controversial waves so that it helps the publishers to gain more visitors and sometimes many different political and independent institutions spread these veryheadliners through WhatsApp and several other chatting applications making it difficult to verify the source of thematerial.Andhenceitgetsdifficult ontheusersend to verify the legitimacyofthematerial.Theseheadlines are then spread through user’s tweets, texts, and chats which are in normal text format. And once this informationiscondensedintoasimpletextstatementit gets complicated to determine the source and the construction of the sentences that was originally crafted
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3836 Figure 03. Examples of Deep-Fake videos 2. Proposed Method We employed a web application to scan, take text input, and/or upload media (image/video) which then could be analyzed accordingtotheirrespectiveanalyzingsystems.Astheconsumption offakenewsis mainlythroughsocialmediaapps,thesystemtreats twoinputsystemsintwoseparateways;textclassificationandvideo manipulationdetection. Weusedexistingmachinelearningmodelsandtraineditusingour data collected from random videos and headlines found on the internet.Wedidn’tusetheexistingdeepfakeoracclaimedfakenews headlines for this data set. We built a custom pipeline for unorganized and real- world data to raise the uncertainty of the modelandstudythemodel’soperationstodifferentliveexamples. Fordeepfakevideos,wecompiledarawdatafromYouTube,Reddit, newsnetwork’sarchivesandseveralothermemepagestobuilda real- life practical data set for the machine learning model to process. The random videos add to the uncertainty and put the modelintotestforreallifeexamples.TheGUIhelpstheusertoadd any videodirectlyinto the systemand we builda custompipeline that breaks those movingimages into multiplesingle framesand feedsitintotheMeso-4model.Afteritprocessesthevideofile,itgives aprobabilityscoreof dependencyratio forthe data.The nature of the file is projected through percentagescore that lets youdecide whethertheallegedvideofileistrustworthyornot. For Headline text analysis, we have worked with different NLP modelsandtoolkitstogiveusastablesystemthatcouldtakeinputin a textformatandanalysesittoprojectwhetherthegivenstatement is how muchtrustworthy.We haveusedLIAR datasetto enhance our system by using existing pre-trained models and constantly adding newer data pointsto keep updatingthe system. It lets you identify mis- quoted statements, misinformation and intestinally fabricatedstatementsbyclassifyingthemintovarioustrustlevels. 2.1 Deep- Fake Detection Meso-4 is a convolutional neural network with four convolutionalblocksfollowedbyonefullyconnectedhidden layer. We first import different libraries necessary for the operations and then we created a dictionary tostore all the image dimensionsand theno, of color channels. The height and widthissetto256since3channelswereusedtoprocess the image. The system uses classifier class to load weights and make predictions. A meso-4 class was created to store classifier class. 3 dimensions of the image data was passed as the input layer which then proceeds to create 4 convolutional blocks. Convolutional layers always include convolution layer and max pooling layer and a batch normalization layer. Conv2d here represents the convolutional layer. Filters were used to assign variable parameters ofthe image data.CNN proceedstohigherorder feature representations, from lines to corners to shapes to faces. Meso-4 has 4 blocks in its convolutionallayerwithone hidden layerand one outputlayerforthepredictions.Binary class mode was established to classify images into true or false value;the method is called as binaryclassificationtask manager. We have builta custompreprocessorto dividethe moving images into separate isolated independent images. Figure 04. Results of real image detection Figure 05. Results of Deep-Fake images 2.2 News Headline Analysis We built a simpleUIforwebapplication thatcould helpthe user insert i.e. simply copy paste the text into a system and then it would initiate the process of identifying the source and nature of the content uploaded. We used LIAR dataset which was developed by William Yang Wang. We built few classifiers to detect the text pasted. Aftergoingthroughtext extraction, we fed the extracted data into different classifiers. Naïve-Bayes, Logical Regression, Linear SVM, Stochastic Gradient different other classifiers were used to build a trustworthy classifying pipeline. Grid Search CV methods were used to perform parameter tuning. Models whichsuitedtheconditions better wereselectedtoidentify fake news. 50 additional features were extracted from the term frequency tfidf vectorizer to classify the most important words in class
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3837 Figure 06. Results of news headline analysis (a) Figure 07. Results of news headline analysis (b) Acknowledgement A successful work ofdissertationistheresultofinspiration, support,guidance,motivation,andco-operationoffacilities during study. It gives a great pleasure to acknowledge our deep sense of gratitude to present our project titled; “Fake News Analyzer”. We wouldliketogivesincerethankstoour Principal Dr.Suresh Ukarande and H.O.D. Dr. Jayashree Khanapuri for giving me the opportunity to present this seminar. I am also thankful to my respected guide Prof. Harshwardhan Ahire for this wholehearted support and affectionate encouragement. His dynamism, vision, and sincerity have deeply inspired us. He has taught us the methodology to present the research work as clearly as possible. REFERENCES [1] The psychology of fake news, Gordon Pennycook, David G Rand, Trends in cognitive sciences 25 (5), 388-402,2021 [2] Fakenews,ThorstenQuandt,LenaFrischlich,SvenjaBoberg, Tim Schatto‐Eckrodt [3] Thescienceoffakenews.DavidMJLazer,MatthewABaum, Yochai Benkler, Adam J Berinsky,Kelly M Greenhill,Filippo Menczer, Miriam J Metzger, Brendan Nyhan, Gordon Pennycook, David Rothschild, Michael Schudson, Steven A Sloman, CassR Sunstein,EmilyAThorson, DuncanJ Watts, Jonathan L Zittrain [4] Science 359 (6380), 1094-1096, 2018F. Chollet. Xception: Deep learning with depth wise separable convolutions. 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pages 1800–1807,2017. 5 [5] F. Chollet et al. Keras. http s://keras.io, 2015. 5 [6] W. Shi, F. Jiang, and D. Zhao. Single image superresolution with dilated convolution based multi-scale information learning inception module. arXiv preprint arXiv:1707.07128, 2017.S. Fan, R. Wang, T.-T. Ng, C. Y.-C. Tan, J. S. Herberg, H. Farid. A Survey Of Image Forgery Detection.IEEESig-nal Processing Magazine, 26(2):26–25, 2009. 1 [7] P. Garrido, L. Valgaerts, O. Rehmsen, T. Thormahlen, P. Perez, and C. Theobalt. Automatic face reenactment. In Proceedings ofthe IEEE Conferenceon Computer Vision and Pattern Recognition, pages 4217–4224, 2014. [8] MesoNet: a Compact Facial Video Forgery Detection Network, https://github.com/ondyari/FaceForensics [9] Detecting fake news article Jun Lin, Computer Science and Engineering, Louisiana State University, Baton Rouge, LA, USA, Glenna Tremblay-Taylor, Computer Science, Keene State College, Keene, NH, USA, Guanyi Mou, Computer Science, Worcester Polytechnic Institute, Worcester, MA, USA, Di You, Computer Science, Worcester Polytechnic Institute, Worcester, MA, USA, Kyumin Lee, Computer Science, Worcester Polytechnic Institute, Worcester, MA, USA