Suche senden
Hochladen
Fake News Analyzer
•
0 gefällt mir
•
4 views
IRJET Journal
Folgen
https://www.irjet.net/archives/V9/i4/IRJET-V9I4559.pdf
Weniger lesen
Mehr lesen
Ingenieurwesen
Melden
Teilen
Melden
Teilen
1 von 4
Jetzt herunterladen
Downloaden Sie, um offline zu lesen
Empfohlen
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET Journal
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET Journal
Protecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking Applications
IRJET Journal
Fake News and Message Detection
Fake News and Message Detection
IRJET Journal
Covid Mask Detection and Social Distancing Using Raspberry pi
Covid Mask Detection and Social Distancing Using Raspberry pi
IRJET Journal
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
IJARIIT
IRJET - YouTube Spam Comments Detection
IRJET - YouTube Spam Comments Detection
IRJET Journal
IRJET- Object Detection and Recognition for Blind Assistance
IRJET- Object Detection and Recognition for Blind Assistance
IRJET Journal
Empfohlen
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET Journal
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET Journal
Protecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking Applications
IRJET Journal
Fake News and Message Detection
Fake News and Message Detection
IRJET Journal
Covid Mask Detection and Social Distancing Using Raspberry pi
Covid Mask Detection and Social Distancing Using Raspberry pi
IRJET Journal
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
IJARIIT
IRJET - YouTube Spam Comments Detection
IRJET - YouTube Spam Comments Detection
IRJET Journal
IRJET- Object Detection and Recognition for Blind Assistance
IRJET- Object Detection and Recognition for Blind Assistance
IRJET Journal
IRJET - Fake News Detection: A Survey
IRJET - Fake News Detection: A Survey
IRJET Journal
IRJET- Authentication System in Social Networks
IRJET- Authentication System in Social Networks
IRJET Journal
Analyzing Social media’s real data detection through Web content mining using...
Analyzing Social media’s real data detection through Web content mining using...
IRJET Journal
IRJET - Face Detection and Recognition System
IRJET - Face Detection and Recognition System
IRJET Journal
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...
IRJET Journal
Enhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart Credentials
IJCSIS Research Publications
Face Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial Intelligence
IRJET Journal
Image Forgery / Tampering Detection Using Deep Learning and Cloud
Image Forgery / Tampering Detection Using Deep Learning and Cloud
IRJET Journal
Deep Learning Assisted Tool for Face Mask Detection
Deep Learning Assisted Tool for Face Mask Detection
IRJET Journal
IRJET-Design and Implementation of Efficient Adder using Various Logic Styles
IRJET-Design and Implementation of Efficient Adder using Various Logic Styles
IRJET Journal
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET Journal
Real Time Head Generation for Video Conferencing
Real Time Head Generation for Video Conferencing
IRJET Journal
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
IRJET Journal
Women's Maltreatment Redressal System based on Machine Learning Techniques
Women's Maltreatment Redressal System based on Machine Learning Techniques
IRJET Journal
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
IRJET Journal
IRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social Network
IRJET Journal
Real Time Moving Object Detection for Day-Night Surveillance using AI
Real Time Moving Object Detection for Day-Night Surveillance using AI
IRJET Journal
Broadcasting Forensics Using Machine Learning Approaches
Broadcasting Forensics Using Machine Learning Approaches
ijtsrd
IRJET- Secured Authentication using Image Shield Protection and Database ...
IRJET- Secured Authentication using Image Shield Protection and Database ...
IRJET Journal
IRJET - NETRA: Android Application for Visually Challenged People to Dete...
IRJET - NETRA: Android Application for Visually Challenged People to Dete...
IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
Weitere ähnliche Inhalte
Ähnlich wie Fake News Analyzer
IRJET - Fake News Detection: A Survey
IRJET - Fake News Detection: A Survey
IRJET Journal
IRJET- Authentication System in Social Networks
IRJET- Authentication System in Social Networks
IRJET Journal
Analyzing Social media’s real data detection through Web content mining using...
Analyzing Social media’s real data detection through Web content mining using...
IRJET Journal
IRJET - Face Detection and Recognition System
IRJET - Face Detection and Recognition System
IRJET Journal
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...
IRJET Journal
Enhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart Credentials
IJCSIS Research Publications
Face Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial Intelligence
IRJET Journal
Image Forgery / Tampering Detection Using Deep Learning and Cloud
Image Forgery / Tampering Detection Using Deep Learning and Cloud
IRJET Journal
Deep Learning Assisted Tool for Face Mask Detection
Deep Learning Assisted Tool for Face Mask Detection
IRJET Journal
IRJET-Design and Implementation of Efficient Adder using Various Logic Styles
IRJET-Design and Implementation of Efficient Adder using Various Logic Styles
IRJET Journal
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET Journal
Real Time Head Generation for Video Conferencing
Real Time Head Generation for Video Conferencing
IRJET Journal
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
IRJET Journal
Women's Maltreatment Redressal System based on Machine Learning Techniques
Women's Maltreatment Redressal System based on Machine Learning Techniques
IRJET Journal
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
IRJET Journal
IRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social Network
IRJET Journal
Real Time Moving Object Detection for Day-Night Surveillance using AI
Real Time Moving Object Detection for Day-Night Surveillance using AI
IRJET Journal
Broadcasting Forensics Using Machine Learning Approaches
Broadcasting Forensics Using Machine Learning Approaches
ijtsrd
IRJET- Secured Authentication using Image Shield Protection and Database ...
IRJET- Secured Authentication using Image Shield Protection and Database ...
IRJET Journal
IRJET - NETRA: Android Application for Visually Challenged People to Dete...
IRJET - NETRA: Android Application for Visually Challenged People to Dete...
IRJET Journal
Ähnlich wie Fake News Analyzer
(20)
IRJET - Fake News Detection: A Survey
IRJET - Fake News Detection: A Survey
IRJET- Authentication System in Social Networks
IRJET- Authentication System in Social Networks
Analyzing Social media’s real data detection through Web content mining using...
Analyzing Social media’s real data detection through Web content mining using...
IRJET - Face Detection and Recognition System
IRJET - Face Detection and Recognition System
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...
Classification of Sentiment Analysis on Tweets Based on Techniques from Machi...
Enhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart Credentials
Face Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial Intelligence
Image Forgery / Tampering Detection Using Deep Learning and Cloud
Image Forgery / Tampering Detection Using Deep Learning and Cloud
Deep Learning Assisted Tool for Face Mask Detection
Deep Learning Assisted Tool for Face Mask Detection
IRJET-Design and Implementation of Efficient Adder using Various Logic Styles
IRJET-Design and Implementation of Efficient Adder using Various Logic Styles
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
Real Time Head Generation for Video Conferencing
Real Time Head Generation for Video Conferencing
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Women's Maltreatment Redressal System based on Machine Learning Techniques
Women's Maltreatment Redressal System based on Machine Learning Techniques
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
IRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social Network
Real Time Moving Object Detection for Day-Night Surveillance using AI
Real Time Moving Object Detection for Day-Night Surveillance using AI
Broadcasting Forensics Using Machine Learning Approaches
Broadcasting Forensics Using Machine Learning Approaches
IRJET- Secured Authentication using Image Shield Protection and Database ...
IRJET- Secured Authentication using Image Shield Protection and Database ...
IRJET - NETRA: Android Application for Visually Challenged People to Dete...
IRJET - NETRA: Android Application for Visually Challenged People to Dete...
Mehr von IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Mehr von IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Kürzlich hochgeladen
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Call Girls in Nagpur High Profile
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
roncy bisnoi
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
Prabhanshu Chaturvedi
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Call Girls in Nagpur High Profile
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
rknatarajan
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
fenichawla
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
SIVASHANKAR N
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
sanyuktamishra911
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
ranjana rawat
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
120cr0395
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
sivaprakash250
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
ranjana rawat
Kürzlich hochgeladen
(20)
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
Fake News Analyzer
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3834 Fake News Analyzer Nitin Sharma Student, Dept. Electronics & Telecommunications, K. J. Somaiya Institute Of Engineering & Technology, Sion, Mumbai, India Ritik Sharma Student, Dept. Electronics & Telecommunications, K. J. Somaiya Institute Of Engineering & Technology, Sion, Mumbai, India Sharan Shetty Student, Dept. Electronics & Telecommunications, K. J. Somaiya Institute Of Engineering & Technology, Sion, Mumbai, India Prof. Harshwardhan Ahire Assistant Professor, Dept. Electronics & Telecommunications, K. J. Somaiya Institute Of Engineering & Technology, Sion, Mumbai, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - This paper presents a method to detect misinformation in news content and face tempering in videos. The system is broken down into three segments. 1. A simple UI’s designed for the users to insert alleged text, paragraph, headlineorstatementto analyses and process it.2.Text based misinformation detection; the system would run a text classifier oncea sentence, statement, or paragraph has been inserted into the system in text format. Datasets like LIAR (with over 12.8k manually labeled short statements were collected) and different datasets from Kaggle were used for training the model. Sentimental analysis was executed after cleaning, lemmatizing, and splitting the text data. The text than is processed on the basis of probability of truth or false it propagates. 3. Deep fake detection; Deep-Fake and Face2Face were used to build a model that could automatically and efficiently detect forged faces in a video. It followsadeeplearning approach to detect whether the given video is subjected to forgery or not. The whole system is vertical integration of analyzing different aspects that contribute to misinformation and fake data (in the form of images, videos, and texts). The system would contribute to fighting fake news. 1. Introduction With the advancements in the field of technology and the increase in the number of people using those technologies, theretendstohavecertainrepercussions which come along with all the pleasures of inventions. The major concern for this generation is to educatethe citizens about the consumption of content. What we see, read, and listen to on the pool of the internet impacts the way we see things around us and also our perspectives. These very contents are designed to deliberately misleadmassesaboutcertainsubjectsand to induce a very specific view about them. These contents could be false, intentionally plotted, misreported, polarized, persuasive information, and citizen journalism with improper facts. Hence, a system/ application is needed that would identify and break down any alleged information on the basis of detailed analysis. This paper tries to present a case for an ML-based application that would useasimpleUIfor users to insert or upload their query text, paragraph, headline, statement or alleged video to process it for fake content analysis and detect its authenticity. This would deal with Deep fakes and misinformation in the text format. The system is divided into two different segments that would focus on two different mediums of spreading fake news i.e. Video, and text. Videos are subjected to deep fakes and wrongful captions which then are forwarded and reposted so many times that it becomes difficult to verify their true source. We worked on a deep fake and an object detection model that would help us to understand whether a video is face forged or not. And notify its true source. We have used a microscopic level of analysis that would help us in detecting face forgery which is hard to identify from
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3835 a naked human eye. The model is based on a well- performing network of imageclassification.Textbased classification is divided into 6 different classes that would define if the given statement is Original (True), True (True), Mostly True (True), Half True (True), Barely True (False), False (False) and Pants Fire (False). Based on these classifications, the system concludes whether a given statement, paragraph or a headline is trustworthy or not. 1.1 Deep-Fake The concept of deep-fake refers to images, audios or videos that are fakes, that is they depict events that never occurred.Unlikemethodsofmanipulatingmedia in the past like Photoshop,thesedeepfakesarecreated by deep neural networkstobenearlyindistinguishable from their real counterpartstheadvancesinthefieldof deep fakes are equalpartsimpressiveandalarming.On the upside the fidelity with which we can alter media will certainly lead to some world class memes but in the wrong hands this technology can be used tospread misinformation and undermine public trust. Almost like a sci fi type of identity theft, where you can get anyone to say anything and its vice versa. This means that as we get better at generating deep fakes, wemust also get better at identifying those deep fakes Deep Fakes can be generated by using auto encoders. The auto encoders work as follows, when the data is processed such as image data,datagetscompressedby an encoder. The purpose of this compression is to suppress the effect of noise in the data and to reduce convolutional complexity; conversely the original image can be restored at least approximately by passing the compressed versionoftheimagethrougha decoder. Now suppose we want to create a deep fake that blends Van Gogh’s ‘Starry night’ and Da Vinci’s ‘Mona Lisa’. To do so when we train the auto encoders for different data sets. We allow the encoders to share weights while keeping the decoders separate,thatway an image of the Mona Lisa can be compressed Figure 01. Deep fake encoders according to a general logic. It considers things likethe illumination positionandtheexpressionofherfacebut when it gets restored this will be done according tothe logic specific to the starrynight, which has the effect of overlaying Van Gogh’s distinctive style onto Davinci’s masterpiece. Figure 02. Examples of Deep-Fake images 1.2 News Headline Analysis Text messages, news headlines from various micro blogging and news media outlets are forwarded through their URL links to multiple internet users via different social media platforms and networks such as WhatsApp, Facebook,Telegram,Instagram,etc.Mostof the times these contents produced by several independent and unverified sources areresponsibleto spread lies and misinformationamongtheusers.Their mainaimistowriteaneye-catchingheadlinethatcould garner internet user’s attention and better SEO operations give them better share ratio and hence giving them a viral status that could fire up the entire internet with false and maligned information. Most of the time many users read the headline which could be constructed in such a way that it creates controversial waves so that it helps the publishers to gain more visitors and sometimes many different political and independent institutions spread these veryheadliners through WhatsApp and several other chatting applications making it difficult to verify the source of thematerial.Andhenceitgetsdifficult ontheusersend to verify the legitimacyofthematerial.Theseheadlines are then spread through user’s tweets, texts, and chats which are in normal text format. And once this informationiscondensedintoasimpletextstatementit gets complicated to determine the source and the construction of the sentences that was originally crafted
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3836 Figure 03. Examples of Deep-Fake videos 2. Proposed Method We employed a web application to scan, take text input, and/or upload media (image/video) which then could be analyzed accordingtotheirrespectiveanalyzingsystems.Astheconsumption offakenewsis mainlythroughsocialmediaapps,thesystemtreats twoinputsystemsintwoseparateways;textclassificationandvideo manipulationdetection. Weusedexistingmachinelearningmodelsandtraineditusingour data collected from random videos and headlines found on the internet.Wedidn’tusetheexistingdeepfakeoracclaimedfakenews headlines for this data set. We built a custom pipeline for unorganized and real- world data to raise the uncertainty of the modelandstudythemodel’soperationstodifferentliveexamples. Fordeepfakevideos,wecompiledarawdatafromYouTube,Reddit, newsnetwork’sarchivesandseveralothermemepagestobuilda real- life practical data set for the machine learning model to process. The random videos add to the uncertainty and put the modelintotestforreallifeexamples.TheGUIhelpstheusertoadd any videodirectlyinto the systemand we builda custompipeline that breaks those movingimages into multiplesingle framesand feedsitintotheMeso-4model.Afteritprocessesthevideofile,itgives aprobabilityscoreof dependencyratio forthe data.The nature of the file is projected through percentagescore that lets youdecide whethertheallegedvideofileistrustworthyornot. For Headline text analysis, we have worked with different NLP modelsandtoolkitstogiveusastablesystemthatcouldtakeinputin a textformatandanalysesittoprojectwhetherthegivenstatement is how muchtrustworthy.We haveusedLIAR datasetto enhance our system by using existing pre-trained models and constantly adding newer data pointsto keep updatingthe system. It lets you identify mis- quoted statements, misinformation and intestinally fabricatedstatementsbyclassifyingthemintovarioustrustlevels. 2.1 Deep- Fake Detection Meso-4 is a convolutional neural network with four convolutionalblocksfollowedbyonefullyconnectedhidden layer. We first import different libraries necessary for the operations and then we created a dictionary tostore all the image dimensionsand theno, of color channels. The height and widthissetto256since3channelswereusedtoprocess the image. The system uses classifier class to load weights and make predictions. A meso-4 class was created to store classifier class. 3 dimensions of the image data was passed as the input layer which then proceeds to create 4 convolutional blocks. Convolutional layers always include convolution layer and max pooling layer and a batch normalization layer. Conv2d here represents the convolutional layer. Filters were used to assign variable parameters ofthe image data.CNN proceedstohigherorder feature representations, from lines to corners to shapes to faces. Meso-4 has 4 blocks in its convolutionallayerwithone hidden layerand one outputlayerforthepredictions.Binary class mode was established to classify images into true or false value;the method is called as binaryclassificationtask manager. We have builta custompreprocessorto dividethe moving images into separate isolated independent images. Figure 04. Results of real image detection Figure 05. Results of Deep-Fake images 2.2 News Headline Analysis We built a simpleUIforwebapplication thatcould helpthe user insert i.e. simply copy paste the text into a system and then it would initiate the process of identifying the source and nature of the content uploaded. We used LIAR dataset which was developed by William Yang Wang. We built few classifiers to detect the text pasted. Aftergoingthroughtext extraction, we fed the extracted data into different classifiers. Naïve-Bayes, Logical Regression, Linear SVM, Stochastic Gradient different other classifiers were used to build a trustworthy classifying pipeline. Grid Search CV methods were used to perform parameter tuning. Models whichsuitedtheconditions better wereselectedtoidentify fake news. 50 additional features were extracted from the term frequency tfidf vectorizer to classify the most important words in class
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3837 Figure 06. Results of news headline analysis (a) Figure 07. Results of news headline analysis (b) Acknowledgement A successful work ofdissertationistheresultofinspiration, support,guidance,motivation,andco-operationoffacilities during study. It gives a great pleasure to acknowledge our deep sense of gratitude to present our project titled; “Fake News Analyzer”. We wouldliketogivesincerethankstoour Principal Dr.Suresh Ukarande and H.O.D. Dr. Jayashree Khanapuri for giving me the opportunity to present this seminar. I am also thankful to my respected guide Prof. Harshwardhan Ahire for this wholehearted support and affectionate encouragement. His dynamism, vision, and sincerity have deeply inspired us. He has taught us the methodology to present the research work as clearly as possible. REFERENCES [1] The psychology of fake news, Gordon Pennycook, David G Rand, Trends in cognitive sciences 25 (5), 388-402,2021 [2] Fakenews,ThorstenQuandt,LenaFrischlich,SvenjaBoberg, Tim Schatto‐Eckrodt [3] Thescienceoffakenews.DavidMJLazer,MatthewABaum, Yochai Benkler, Adam J Berinsky,Kelly M Greenhill,Filippo Menczer, Miriam J Metzger, Brendan Nyhan, Gordon Pennycook, David Rothschild, Michael Schudson, Steven A Sloman, CassR Sunstein,EmilyAThorson, DuncanJ Watts, Jonathan L Zittrain [4] Science 359 (6380), 1094-1096, 2018F. Chollet. Xception: Deep learning with depth wise separable convolutions. 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pages 1800–1807,2017. 5 [5] F. Chollet et al. Keras. http s://keras.io, 2015. 5 [6] W. Shi, F. Jiang, and D. Zhao. Single image superresolution with dilated convolution based multi-scale information learning inception module. arXiv preprint arXiv:1707.07128, 2017.S. Fan, R. Wang, T.-T. Ng, C. Y.-C. Tan, J. S. Herberg, H. Farid. A Survey Of Image Forgery Detection.IEEESig-nal Processing Magazine, 26(2):26–25, 2009. 1 [7] P. Garrido, L. Valgaerts, O. Rehmsen, T. Thormahlen, P. Perez, and C. Theobalt. Automatic face reenactment. In Proceedings ofthe IEEE Conferenceon Computer Vision and Pattern Recognition, pages 4217–4224, 2014. [8] MesoNet: a Compact Facial Video Forgery Detection Network, https://github.com/ondyari/FaceForensics [9] Detecting fake news article Jun Lin, Computer Science and Engineering, Louisiana State University, Baton Rouge, LA, USA, Glenna Tremblay-Taylor, Computer Science, Keene State College, Keene, NH, USA, Guanyi Mou, Computer Science, Worcester Polytechnic Institute, Worcester, MA, USA, Di You, Computer Science, Worcester Polytechnic Institute, Worcester, MA, USA, Kyumin Lee, Computer Science, Worcester Polytechnic Institute, Worcester, MA, USA
Jetzt herunterladen