Suche senden
Hochladen
IRJET - Profanity Statistical Analyzer
•
0 gefällt mir
•
25 views
IRJET Journal
Folgen
https://www.irjet.net/archives/V7/i3/IRJET-V7I31115.pdf
Weniger lesen
Mehr lesen
Ingenieurwesen
Melden
Teilen
Melden
Teilen
1 von 2
Jetzt herunterladen
Downloaden Sie, um offline zu lesen
Empfohlen
Predicting cyber bullying on t witter using machine learning
Predicting cyber bullying on t witter using machine learning
MirXahid1
Categorize balanced dataset for troll detection
Categorize balanced dataset for troll detection
vivatechijri
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET Journal
A systematic literature review of academic cyberbullying 2021
A systematic literature review of academic cyberbullying 2021
Cape Peninsula University of Technology
Smart detection of offensive words in social media using the soundex algorith...
Smart detection of offensive words in social media using the soundex algorith...
IJECEIAES
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET Journal
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET Journal
IRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social Network
IRJET Journal
Empfohlen
Predicting cyber bullying on t witter using machine learning
Predicting cyber bullying on t witter using machine learning
MirXahid1
Categorize balanced dataset for troll detection
Categorize balanced dataset for troll detection
vivatechijri
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET Journal
A systematic literature review of academic cyberbullying 2021
A systematic literature review of academic cyberbullying 2021
Cape Peninsula University of Technology
Smart detection of offensive words in social media using the soundex algorith...
Smart detection of offensive words in social media using the soundex algorith...
IJECEIAES
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET Journal
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET Journal
IRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social Network
IRJET Journal
Comparative Study of Cyberbullying Detection using Different Machine Learning...
Comparative Study of Cyberbullying Detection using Different Machine Learning...
ijtsrd
Towards the Social Programmer (MSR 2012 Keynote by M. Storey)
Towards the Social Programmer (MSR 2012 Keynote by M. Storey)
Margaret-Anne Storey
Lies, Damned Lies and Software Analytics: Why Big Data Needs Rich Data
Lies, Damned Lies and Software Analytics: Why Big Data Needs Rich Data
Margaret-Anne Storey
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET Journal
IRJET- Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
IRJET Journal
G05913234
G05913234
IOSR-JEN
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
IOSR Journals
Cyber bullying Detection based on Semantic-Enhanced Marginalized Denoising Au...
Cyber bullying Detection based on Semantic-Enhanced Marginalized Denoising Au...
dbpublications
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
ijcsit
IRJET - Social Media Intelligence Tools
IRJET - Social Media Intelligence Tools
IRJET Journal
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication
FACE
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
FACE
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET Journal
E017433538
E017433538
IOSR Journals
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
IJERA Editor
IRJET- Detecting Fake News
IRJET- Detecting Fake News
IRJET Journal
Research industry panel review
Research industry panel review
Margaret-Anne Storey
IRJET - Fake News Detection using Machine Learning
IRJET - Fake News Detection using Machine Learning
IRJET Journal
F017433947
F017433947
IOSR Journals
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
IRJET Journal
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
IRJET Journal
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
IRJET Journal
Weitere ähnliche Inhalte
Was ist angesagt?
Comparative Study of Cyberbullying Detection using Different Machine Learning...
Comparative Study of Cyberbullying Detection using Different Machine Learning...
ijtsrd
Towards the Social Programmer (MSR 2012 Keynote by M. Storey)
Towards the Social Programmer (MSR 2012 Keynote by M. Storey)
Margaret-Anne Storey
Lies, Damned Lies and Software Analytics: Why Big Data Needs Rich Data
Lies, Damned Lies and Software Analytics: Why Big Data Needs Rich Data
Margaret-Anne Storey
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET Journal
IRJET- Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
IRJET Journal
G05913234
G05913234
IOSR-JEN
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
IOSR Journals
Cyber bullying Detection based on Semantic-Enhanced Marginalized Denoising Au...
Cyber bullying Detection based on Semantic-Enhanced Marginalized Denoising Au...
dbpublications
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
ijcsit
IRJET - Social Media Intelligence Tools
IRJET - Social Media Intelligence Tools
IRJET Journal
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication
FACE
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
FACE
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET Journal
E017433538
E017433538
IOSR Journals
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
IJERA Editor
IRJET- Detecting Fake News
IRJET- Detecting Fake News
IRJET Journal
Research industry panel review
Research industry panel review
Margaret-Anne Storey
IRJET - Fake News Detection using Machine Learning
IRJET - Fake News Detection using Machine Learning
IRJET Journal
F017433947
F017433947
IOSR Journals
Was ist angesagt?
(19)
Comparative Study of Cyberbullying Detection using Different Machine Learning...
Comparative Study of Cyberbullying Detection using Different Machine Learning...
Towards the Social Programmer (MSR 2012 Keynote by M. Storey)
Towards the Social Programmer (MSR 2012 Keynote by M. Storey)
Lies, Damned Lies and Software Analytics: Why Big Data Needs Rich Data
Lies, Damned Lies and Software Analytics: Why Big Data Needs Rich Data
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
G05913234
G05913234
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
Cyber bullying Detection based on Semantic-Enhanced Marginalized Denoising Au...
Cyber bullying Detection based on Semantic-Enhanced Marginalized Denoising Au...
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
IRJET - Social Media Intelligence Tools
IRJET - Social Media Intelligence Tools
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
E017433538
E017433538
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
IRJET- Detecting Fake News
IRJET- Detecting Fake News
Research industry panel review
Research industry panel review
IRJET - Fake News Detection using Machine Learning
IRJET - Fake News Detection using Machine Learning
F017433947
F017433947
Ähnlich wie IRJET - Profanity Statistical Analyzer
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
IRJET Journal
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
IRJET Journal
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
IRJET Journal
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
ijaia
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
gerogepatton
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
gerogepatton
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
IRJET Journal
IRJET- Analytic System Based on Prediction Analysis of Social Emotions from U...
IRJET- Analytic System Based on Prediction Analysis of Social Emotions from U...
IRJET Journal
IRJET- Fake News Detection using Logistic Regression
IRJET- Fake News Detection using Logistic Regression
IRJET Journal
IRJET - Social Network Stress Analysis using Word Embedding Technique
IRJET - Social Network Stress Analysis using Word Embedding Technique
IRJET Journal
Artificial Intelligence Approach for Covid Period StudyPal
Artificial Intelligence Approach for Covid Period StudyPal
IRJET Journal
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNING
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNING
IRJET Journal
IRJET - Suicidal Text Detection using Machine Learning
IRJET - Suicidal Text Detection using Machine Learning
IRJET Journal
Sentiment analysis of comments in social media
Sentiment analysis of comments in social media
IJECEIAES
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53
IRJET Journal
L017146571
L017146571
IOSR Journals
Fake News Detection Using Machine Learning
Fake News Detection Using Machine Learning
IRJET Journal
Design of Chatbot using Deep Learning
Design of Chatbot using Deep Learning
IRJET Journal
IRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat Application
IRJET Journal
Semantic Sentiment Analysis using Machine Learning for Suicidal Tendency Pred...
Semantic Sentiment Analysis using Machine Learning for Suicidal Tendency Pred...
IRJET Journal
Ähnlich wie IRJET - Profanity Statistical Analyzer
(20)
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
IRJET- Analytic System Based on Prediction Analysis of Social Emotions from U...
IRJET- Analytic System Based on Prediction Analysis of Social Emotions from U...
IRJET- Fake News Detection using Logistic Regression
IRJET- Fake News Detection using Logistic Regression
IRJET - Social Network Stress Analysis using Word Embedding Technique
IRJET - Social Network Stress Analysis using Word Embedding Technique
Artificial Intelligence Approach for Covid Period StudyPal
Artificial Intelligence Approach for Covid Period StudyPal
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNING
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNING
IRJET - Suicidal Text Detection using Machine Learning
IRJET - Suicidal Text Detection using Machine Learning
Sentiment analysis of comments in social media
Sentiment analysis of comments in social media
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53
L017146571
L017146571
Fake News Detection Using Machine Learning
Fake News Detection Using Machine Learning
Design of Chatbot using Deep Learning
Design of Chatbot using Deep Learning
IRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat Application
Semantic Sentiment Analysis using Machine Learning for Suicidal Tendency Pred...
Semantic Sentiment Analysis using Machine Learning for Suicidal Tendency Pred...
Mehr von IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Mehr von IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Kürzlich hochgeladen
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
Arindam Chakraborty, Ph.D., P.E. (CA, TX)
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
hamedmustafa094
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
Omar Fathy
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Arindam Chakraborty, Ph.D., P.E. (CA, TX)
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
JIT KUMAR GUPTA
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
BhangaleSonal
Air Compressor reciprocating single stage
Air Compressor reciprocating single stage
Abc194748
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
smsksolar
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
nuruddin69
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
JuliansyahHarahap1
School management system project Report.pdf
School management system project Report.pdf
Kamal Acharya
Computer Networks Basics of Network Devices
Computer Networks Basics of Network Devices
ChandrakantDivate1
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
DineshKumar4165
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
SCMS School of Architecture
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
DineshKumar4165
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
anil_gaur
Kürzlich hochgeladen
(20)
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
Air Compressor reciprocating single stage
Air Compressor reciprocating single stage
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
School management system project Report.pdf
School management system project Report.pdf
Computer Networks Basics of Network Devices
Computer Networks Basics of Network Devices
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
IRJET - Profanity Statistical Analyzer
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5531 Profanity Statistical Analyzer Akshay Limje1, Ashutosh Patil2, Nilay Tagde3, Purvesh Kondewar4, Prof. Ashish Golghate5 1,2,3,4,5Department of Computer Science and Engineering, DBACER, Wanadongri, Hingna Road-441110, Nagpur. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Nowadays use of internet has become a big trend among the children especially teenagers. Use of internet and various social networking sites has become a daily part of the children’s activity. While interacting with the social media websites, they come across many profane/abusive words which are not appropriate for them. Some social media claim that they provide a decent platform for the children, these contents of social media including webpages and blogs may create a bad impact for the people where they might end up in sudden change in attitude which might lead to depression. Therefore, to deal with this problem, we have developed a tool “PROFANITY STATISTICAL ANALYZER”. This analyzer will help us find the profane/abusive contentsfromtheir webpage, social media posts and blogs over the internet. There is a margin for profane words through which we can classify the website, post or blog as inappropriate to the person of particular age. Calculating the percentage amount of profane word will help us to categorize those websites and show the actual profane/offensive words in the contents, at the same time helping the user to decide whether to visit or not to visit the specific webpage. Key Words: Social Media, Blog, Analyzer, Profane. 1. INTRODUCTION Anytime one engages online, whether on message board forums or comments on social media, there is always a serious risk that he or she may be the target of ridicule and even harassment. Nevertheless, major social media companies like Facebook, Twitter and Reddit find it difficult to tackle this problem as the number of posts that contains the abusive contents cannot be eliminated with only human resources. To combat abusive language, many IT companies have standard guidelines that must be followedbytheusers. They employ human moderators in conjunction with systems that use regular expressions and blacklist, to recognize bad language and thus a post can be removed. As large number of people communicate online, the needfor high quality automated abusive language detectors become much more profound. So, to take necessary actions we have made a solution that will surely help to eradicate this problem. In this project, we are aiming towardsanapproach of detecting abusive language inthegivenpost, writtenblogs and web pages so that user must be able to detect the offensive content of all types that are posted on that particular webpage. Basically, this project is mainly divided into three different phases. In the first phase, we are taking a webpage or a blog with some abusive content as an input. This input will then be tokenized to form a dataset. In second phase, this dataset which is then compared with the dataset containing a list of abusive words with a custom writtenfunctioninPythonthat results in finding abusive words. In the third phase, result of the comparison between input dataset and abusive words dataset is used to provide users with essential information that will help them to decide whether to visit or not to that webpage and result may bepresentedintermsofpercentage or in the form of graph or pie charts. 2. LITERATURE REVIEW 1) Y. Chen, Y. Zhou, S. Zhu, and H. Xu, “Detecting offensive language in social media to protectadolescentonlinesafety”. In Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on and 2012 International Conference on Social Computing (SocialCom), IEEE, 2012. :- Their work was one of the first to use a combination of lexical syntactic feature-based language model and parser features to detect offensive language in YouTube comments to shield adolescents. While they do note that they do not have a strict definition of offensive language in mind, their tool can be tuned by the use of a threshold which can be set by parents or teachers so online material can be filtered out before it appears on a web browser. The work takes a supervised classification approach using Support Vector Machines (SVMs) with features including n-grams, automaticallyderived blacklists,manuallydevelopedregular expressions and dependency parse features. They achieve a performance on the task of inflammatorysentencedetection of precision of 98.24% and recall of 94.34%. 2) Badjatiya, P., Gupta, S., Gupta, M., & Varma, V. (2017), “Deep learning for hate speech detection in tweets.” Proceedings of the 26th International Conference on World Wide Web Companion, April-3-2017: - They have selected few baseline methods and then discuss the proposed approach. In all these methods, an embedding is generated for a tweet and is used as its feature representation with a classifier. Baseline Methods: As baselines, we experiment with three broad representations. Char n-grams: It is the state-of-the-art method which uses character n-grams for hate speech detection.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5532 3)Sweeta Agrawal and Amit Awekar, 2018, “Deep Learning for Detecting Cyberbullying Across Multiple Social Media Platforms”. In Proceedings of the European Conference in Information Retrieval (ECIR). Grenoble, France: - Past works on cyberbullying detection have at least one of the following three bottlenecks. First (Bottleneck B1), they target only one particular social media platform. How these methods perform across other SMPs is unknown. Second (Bottleneck B2), theyaddressonlyonetopic ofcyberbullying such as racism, and sexism. Depending on the topic, vocabulary and nature of cyberbullying changes. These models are not flexible in accommodating changes in the definition of cyberbullying. Third (Bottleneck B3), they rely on carefully handcrafted features such as swear word list and POS tagging. However, these handcrafted features are not robust against variations in writing style. In contrast to existing bottlenecks, this work targets three different types of social networks (Form spring: A Q&A forum, Twitter: microblogging, and Wikipedia: collaborative knowledge repository) for three topics of cyberbullying (personal attack, racism, and sexism) without doing any explicit feature engineering by developing deep learning-based models along with transfer learning. They have experimented with diverse traditional machine learning models (logistic regression,supportvectormachine,random forest, naive Bayes) and deep neural network models (CNN, LSTM, BLSTM, BLSTM with Attention) using variety of representation methods for words (bag ofcharactern-gram, bag of word unigram, GloVe embeddings, SSWE embeddings). 3. CONCLUSIONS The world is now more aware of the problem of spreading hate through mediums like social networks. Hate speechisa difficult phenomenon to define and is not monolithic. Every company like Facebook and twitter are working hard in regulating and countering such bad content. This attention has raised the need for automating the detection of abusive words. In this paper we analyzed the content of a post (e.g. twitter). We created dataset out of thatandcomparedit with abusive words dataset. Moreover, our results show the amount of abusive content that was present. In addition, this model will helpindrawing road map and blueprint for future model. The future work will include sentiment analysis.Thedatasetwecollected will be used for the perfection of training of neural network. We must also study more closely the people who use hate speech, focusing both on their individual characteristicsand motivations and on the social structures they are embedded in. REFERENCES [1] Y. Chen, Y. Zhou, S. Zhu, and H. Xu, “Detecting offensive language in social media to protect adolescent online safety”, In Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on and 2012 International Conference on Social Computing (SocialCom), IEEE, 2012M. [2] Badjatiya, P., Gupta, S., Gupta, M., & Varma, V. (2017), “Deep learning for hate speech detection in tweets”, Proceedings of the 26th International Conference on World Wide Web Companion, April-3-2017. [3] Sweeta Agrawal andAmitAwekar,2018,“DeepLearning for Detecting Cyberbullying Across Multiple Social Media Platforms”, In Proceedings of the European Conference in Information Retrieval (ECIR), Grenoble, France. [4] A. Joulin, E. Grave, P. Bojanowski & T. Mikolov (2016), “Bag of tricks for efficient text classification”, Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics: Volume 2 [5] C. Nobata, J. Tetreault, A. Thomas, Y, Mehbad & Yi Chang (2016), “Abusive Language Detection in Online User Content”, International World Wide Web Conference Committee (IW3C2-2016). [6] J. Ruppenhofer & T. Kleinbauer (2019), “Detection of Abusive Language: The Problem of Biased Datasets”, Proceedings to NAACL-HLT 2019
Jetzt herunterladen