SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 149
Cyber Bullying Detection in Web Chat Application
Muskan sheikh1, Prerana Lanjewar2, Shahu Atkari3, Mohit Sindhpure4, Omkar Dudhbure5
1,2,3,4Student, Dept. of Computer Engineering Manoharbhai Patel Institute of Engineering & Technology Shahapur,
Bhandara, India
5Assistant Professor, Dept. of Computer Engineering Manoharbhai Patel Institute of Engineering & Technology
Shahapur, Bhandara, India
----------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - : In today’s life, the effect of social media is
increasing popularly .cyber bullying has emerged as a critical
afflicting children, youngster’s and teenagers. System gaining
knowledge of strategies make automatic detection of bullying
messages in social media possible, and this may assist to
assemble a healthful and safe social media environment. One
critical issue in this significant research area is the reliable
and discriminative processing of text messages in numerical
representation. In this cyberbullyingisharassmentorbullying
executed through digital device like computers, laptops,
Smartphone and tablets. Cyber bullying can be defined as
belligerent, intentional actions performed by an individual or
a group of people via digital communication methods such as
sending messages and postingcommentsagainstavictim. This
paper, review Many companies will used this application for
chatting, email notification, group chatting and meeting also.
This web is helpful for people whois workoncompanybecause
many people use the abusing word or comment on post that
time ,this application doesn’t show abused word only show
there related symbols like asterisk, smallsquareboxetc. Inthis
web, when person start chatting with another person or
comment on post that time they cannot use abused words.
Key Words: Encryption algorithm, cloud computing, Back
propagation algorithm, cyber bullying, abuse word etc.
1. INTRODUCTION
Online life, as defined is in a gathering of Internet put
together applications that work with respect to the
ideological and innovative establishments of Web 2.0, and
that permit the creation and trade of client produced
content. By means of online networking, individuals can
appreciate gigantic data, advantageous correspondence
experience, etc. Be that as it may, internet based life may
have some symptoms, for example, cyberbullying, which
may impactly affect the life of individuals, particularly kids
and young people. Cyber bullying can be defined as forceful,
purposeful activities performed by an individual or a
gathering of individuals through computerized specialized
techniques, for example, sending messages and posting
remarks against an unfortunate casualty. Unique in relation
to conventional tormenting that typically happens at school
during up close and personal correspondence,cyberbullying
via web-based networking media can occur anyplace
whenever. For bullies, they are allowed to offend them on
the grounds that they do not have to confront anyone and
can take cover behind the Internet. For victims, they are
effectively presented to badgering since all of us, especially
youth, are always associated with the Internet or web based
life. The identical as conventional bullying,cyberbullyinghas
negative, insidious and sweeping influenceson children.The
outcomes for victims below cyberbullying might also be
tragic inclusive of the occurrence of self-injuriousbehaviour
or suicides. One way to cope with the cyber
bullying problem is to robotically stumble on and
promptly document bullying messages so
that right measures can be taken to save
you feasible tragedies. Previous works on
computational research of bullying
have proven that herbal language processing
and machine learning are effective gear to take a look
at bullying. In cyberbullying detection, the asterisk
representation for Internet messages should be robust and
discriminative. Since messages on social media are often
very short and contain a whole lot of casual language and
misspellings, robust representations for those messagesare
required to reduce their ambiguity. Cyber Bullying is the
harassment or bullying executed through digital device like
computers, laptops, Smartphone and tablets. Many
companies will used this application for chatting, email
notification, group chatting and meeting and also we detect
the abusive word that sends by the only employee to others
that we encrypt the textual content in asterisk or emoji or
good phrase. We develop a company outlook system. In this
there are modules Admin and Employee. There’s also some
sub modules of admin and worker such as task, contact,
meeting, status, chatting etc. Main isthatduringchattingand
status some employees send or use a bullying word so our
paintings are that encrypt that phrase. This is client to client
base system.
2. LITERATURE SURVEY
Cyberbullying has as a vital factor a afflicating kids,
adolescents, and teens in the literature study. Gaining
knowledge of tactics make it possible to quickly identify
abusive messages in social media, and tis can aid in creating
a healthy and sage atmosphere for social media. We study
that in companies cyberbullingcanbeusedbytryingtoscare
employee. IN In paper [10] the goal of their project is to
design computer software to detect the presence of
cyberbullying in online chat conversations.
In paper [2] proposed the content-based cyber bullying
discovery makes the program's discoveryof bullyingkneads
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 150
in social media conceivable and it would offer assistance to
construct and allow a solid and secure social media
environment. In this important inquiry about the region,the
strategy has executed a web-based application whichavoids
cyberbullying in different websites and applications for
messengers.
In paper [3] advances the state of the art in cyber bullying
detection beyond textual analysis to also consider the social
relationship in which these social relationships in which
these bullying messages are exchanged. Their results
indicate that social features are useful in detecting cyber
bullying. In effect, it suggests that understanding the social
context in which a message is exchanged is just as important
as the message itself. In future, similar approaches can be
applied over more fine grained data about human behavior
to identify cyber and physical social bullying in different
settings, thus paving the way for a safer environment for
bullied individuals in different social settings.
In paper [7] their proposed system based android chat
application utilized for chatting reason with remoteusersor
clients connected with the web, and it won't let the client
send unseemly messages. Their paper proposes the
component of making proficient talk application that won't
allow the client to send wrong or ill-advised messages to the
members.
In paper[8] describes the nation of technology foranalyzing
internet crime in opposition to children ,in particular sexual
predationand cyber bullying .Thissurveyincludesadialogue
of their work on category of chat log that contain bullying or
predatory behaviour.
3. PROPOSED SYSTEM
This web application provides different ways of
tracking and security that ultimately will improve
performance. Company can track employee’s performance
and keep monitoring them all the time. Chat application
available in this web application. In this web application we
are provide two modules such as admin module and
Employee module. In admin module different sub modules
are available such as save information, contact, task,
meeting, status and performance.
Fig -1: System Flow
And the different employee sub modules are available such
as chatting, meeting, contact, status and task. In existing
system that type of modulesarenotpresent.Thisapplication
is helpful for those people who is work on company because
many people use the abusing word or comment on post that
time ,this application doesn’t show abused word only show
there related symbols like asterisk , small square box etc. In
this application, when person start chatting with another
person or comment on post that time they cannot used
abused words. Many companieswill usedthisapplication for
chatting, email notification, group chatting and meeting and
also we detect the abusive word that sends by the only
employee to others that we encrypt the textual content in
asterisk. We develop a companyoutlook system.Inthisthere
are modules Admin and Employee. There's also some sub
modules of admin and worker such as task,contact,meeting,
status, chatting etc. Main is that during chatting and status
some employees send or use a bullying word so our
paintings are that encrypt that phrase. This is client to client
base system. Advantages of the projected system is the talk
application diminishes the efforts and time. Employees can
see each and every detail about project, task and respective
meetings .It is easy to used, safe and access by only
authorized person.
4. CONCLUSION
This application offers reliability, time saving and easy
control. The proposed system provides the new way of
computing and monitoring the operations with responsive
and attractive user interface.
5. REFERENCES
[1] A. M. Kaplan and M. Haenlein, “Users of the world,unite!
the challenges and opportunities of social media,”
Business horizons, vol. 53, no. 1, pp. 59–68, 2010.M.
Young, The Technical Writer’s Handbook. Mill Valley,
CA: University Science, 1989.
[2] Sowparnika shree N, Shalini N, Sushma Reddy A,,Rohini
R T, Shiva Kumar Naik” TEXT BASED CYBERBULLYING
DETECTION”.
[3] Q. Huang, V. K. Singh, and P. K. Atrey, “Cyber bullying
detection using social and textual analysis,” in
Proceedings of the 3rd International Workshop on
Socially-Aware Multimedia. ACM, 2014, pp. 3–6.
[4] Modeling the Detection of Textual Cyberbullying K
Dinakar, R.Reichart, and H.Liebeman,”Modeling the
detection of textual cyberbullying.” inTheSocial Mobile.
[5] M. Dadvar, D. Trieschnigg, R. Ordelman, and F. de Jong,
“Improving cyberbullying detection withusercontext,”
in Advances in InformationRetrieval.Springer,2013,pp.
693–696.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 151
[6] “Chatting ApplicationwithReal TimeTranslation”Nikhil
Chaudhari, Sushma Shinkar, Priyanka Pagare may-
2018.
[7] “Professional chatapplicationbasedonnatural language
processing” S.Kartick, R.John Victor, S Manikandan,
Bhargavi Goswami.
[8] A. Kontostathis, L. Edwards, and A. Leatherman, “Text
Mining And Cybercrime,” Text Mining: ApplicationsAnd
Theory. John Wiley & Sons, Ltd, Chichester, Uk, 2010.
[9] J.M. Xu, K.-S. Jun, X. Zhu, and A. Bellmore, “Learningfrom
bullying traces in social media,” in Proceedings of the
2012 conference of the North American chapter of the
association for computational linguistics: Human
language technologies. Association for Computational
Linguistics, 2012, pp. 656–666.
[10] J. Bayzick, A. Kontostathis, And L. Edwards, “Detecting
The Presence Of Cyberbullying Using Computer
Software,” In Proceedings Of The Acm Websci’11.
Koblenz, Germany: Acm, June 2011, Pp. 1–2.

More Related Content

PDF
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
PDF
Predicting cyber bullying on t witter using machine learning
PDF
IRJET- Secure Social Network using Text Mining
PDF
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
PDF
An assesment of Cybersecurity challenge in Arusha
PDF
Comvigo IM Lock WhitePaper
PDF
IRJET- Secured Authentication using Image Shield Protection and Database ...
PDF
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
Predicting cyber bullying on t witter using machine learning
IRJET- Secure Social Network using Text Mining
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
An assesment of Cybersecurity challenge in Arusha
Comvigo IM Lock WhitePaper
IRJET- Secured Authentication using Image Shield Protection and Database ...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...

What's hot (19)

PDF
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
PDF
An Improved Explicit Profile Matching In Mobile Social Networks
PDF
instant message transfer between two smart phones using wi fi
PDF
IRJET- Phishing Web Site
PDF
My Privacy My decision: Control of Photo Sharing on Online Social Networks
PDF
The conceptual idea of online social media
PDF
PDF
Introduction to Mail Management System
PDF
Multi facet trust model for online social network environment
PDF
Book
PDF
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
PDF
IRJET- Malicious Short Urls Detection: A Survey
DOC
14 cyber threats
PDF
Sip 140208055023-phpapp02
PDF
Sophos Security Threat Report Jan 2010 Wpna
PDF
Auto Response System for Legal Consultation
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
Analytical Study on Network Security Breach’s
PDF
An iac approach for detecting profile cloning
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Improved Explicit Profile Matching In Mobile Social Networks
instant message transfer between two smart phones using wi fi
IRJET- Phishing Web Site
My Privacy My decision: Control of Photo Sharing on Online Social Networks
The conceptual idea of online social media
Introduction to Mail Management System
Multi facet trust model for online social network environment
Book
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
IRJET- Malicious Short Urls Detection: A Survey
14 cyber threats
Sip 140208055023-phpapp02
Sophos Security Threat Report Jan 2010 Wpna
Auto Response System for Legal Consultation
International Journal of Computational Engineering Research(IJCER)
Analytical Study on Network Security Breach’s
An iac approach for detecting profile cloning
Ad

Similar to IRJET- Cyber Bullying Detection in Web Chat Application (20)

PDF
21 zen vol2_issue2_feb12
PDF
Design of Chatbot using Deep Learning
PDF
Phishing detection in ims using domain ontology and cba an innovative rule ...
PDF
PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...
PDF
PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...
PDF
WEB APPLICATION FOR MATHEMATICS CLUB OF P.C.E
PDF
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
PDF
IRJET- Fake Profile Identification using Machine Learning
PPT
Network GRC Delivery
PDF
Cyberbullying Detection on Social Networks Using Machine Learning Approaches
PDF
VOICE BASED EMAIL SYSTEM
PDF
IRJET - YouTube Spam Comments Detection
PDF
Artificial Intelligence Approach for Covid Period StudyPal
DOCX
Risk Analysis PaperMilestone1.docx
PDF
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
PDF
L017146571
DOCX
Best Cyber Security Courses In Bangladesh.docx
DOCX
ENMG 602 Homework Assignment 1 Problem 1 Observation.docx
PDF
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
DOCX
Social Media & Enterprise Security Whitepaper
21 zen vol2_issue2_feb12
Design of Chatbot using Deep Learning
Phishing detection in ims using domain ontology and cba an innovative rule ...
PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...
PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...
WEB APPLICATION FOR MATHEMATICS CLUB OF P.C.E
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Fake Profile Identification using Machine Learning
Network GRC Delivery
Cyberbullying Detection on Social Networks Using Machine Learning Approaches
VOICE BASED EMAIL SYSTEM
IRJET - YouTube Spam Comments Detection
Artificial Intelligence Approach for Covid Period StudyPal
Risk Analysis PaperMilestone1.docx
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
L017146571
Best Cyber Security Courses In Bangladesh.docx
ENMG 602 Homework Assignment 1 Problem 1 Observation.docx
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
Social Media & Enterprise Security Whitepaper
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
DOCX
573137875-Attendance-Management-System-original
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Safety Seminar civil to be ensured for safe working.
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
PPT on Performance Review to get promotions
PPTX
Geodesy 1.pptx...............................................
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Construction Project Organization Group 2.pptx
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
Digital Logic Computer Design lecture notes
PDF
Well-logging-methods_new................
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
573137875-Attendance-Management-System-original
CH1 Production IntroductoryConcepts.pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Safety Seminar civil to be ensured for safe working.
Model Code of Practice - Construction Work - 21102022 .pdf
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Operating System & Kernel Study Guide-1 - converted.pdf
PPT on Performance Review to get promotions
Geodesy 1.pptx...............................................
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Embodied AI: Ushering in the Next Era of Intelligent Systems
Foundation to blockchain - A guide to Blockchain Tech
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Construction Project Organization Group 2.pptx
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Digital Logic Computer Design lecture notes
Well-logging-methods_new................

IRJET- Cyber Bullying Detection in Web Chat Application

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 149 Cyber Bullying Detection in Web Chat Application Muskan sheikh1, Prerana Lanjewar2, Shahu Atkari3, Mohit Sindhpure4, Omkar Dudhbure5 1,2,3,4Student, Dept. of Computer Engineering Manoharbhai Patel Institute of Engineering & Technology Shahapur, Bhandara, India 5Assistant Professor, Dept. of Computer Engineering Manoharbhai Patel Institute of Engineering & Technology Shahapur, Bhandara, India ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - : In today’s life, the effect of social media is increasing popularly .cyber bullying has emerged as a critical afflicting children, youngster’s and teenagers. System gaining knowledge of strategies make automatic detection of bullying messages in social media possible, and this may assist to assemble a healthful and safe social media environment. One critical issue in this significant research area is the reliable and discriminative processing of text messages in numerical representation. In this cyberbullyingisharassmentorbullying executed through digital device like computers, laptops, Smartphone and tablets. Cyber bullying can be defined as belligerent, intentional actions performed by an individual or a group of people via digital communication methods such as sending messages and postingcommentsagainstavictim. This paper, review Many companies will used this application for chatting, email notification, group chatting and meeting also. This web is helpful for people whois workoncompanybecause many people use the abusing word or comment on post that time ,this application doesn’t show abused word only show there related symbols like asterisk, smallsquareboxetc. Inthis web, when person start chatting with another person or comment on post that time they cannot use abused words. Key Words: Encryption algorithm, cloud computing, Back propagation algorithm, cyber bullying, abuse word etc. 1. INTRODUCTION Online life, as defined is in a gathering of Internet put together applications that work with respect to the ideological and innovative establishments of Web 2.0, and that permit the creation and trade of client produced content. By means of online networking, individuals can appreciate gigantic data, advantageous correspondence experience, etc. Be that as it may, internet based life may have some symptoms, for example, cyberbullying, which may impactly affect the life of individuals, particularly kids and young people. Cyber bullying can be defined as forceful, purposeful activities performed by an individual or a gathering of individuals through computerized specialized techniques, for example, sending messages and posting remarks against an unfortunate casualty. Unique in relation to conventional tormenting that typically happens at school during up close and personal correspondence,cyberbullying via web-based networking media can occur anyplace whenever. For bullies, they are allowed to offend them on the grounds that they do not have to confront anyone and can take cover behind the Internet. For victims, they are effectively presented to badgering since all of us, especially youth, are always associated with the Internet or web based life. The identical as conventional bullying,cyberbullyinghas negative, insidious and sweeping influenceson children.The outcomes for victims below cyberbullying might also be tragic inclusive of the occurrence of self-injuriousbehaviour or suicides. One way to cope with the cyber bullying problem is to robotically stumble on and promptly document bullying messages so that right measures can be taken to save you feasible tragedies. Previous works on computational research of bullying have proven that herbal language processing and machine learning are effective gear to take a look at bullying. In cyberbullying detection, the asterisk representation for Internet messages should be robust and discriminative. Since messages on social media are often very short and contain a whole lot of casual language and misspellings, robust representations for those messagesare required to reduce their ambiguity. Cyber Bullying is the harassment or bullying executed through digital device like computers, laptops, Smartphone and tablets. Many companies will used this application for chatting, email notification, group chatting and meeting and also we detect the abusive word that sends by the only employee to others that we encrypt the textual content in asterisk or emoji or good phrase. We develop a company outlook system. In this there are modules Admin and Employee. There’s also some sub modules of admin and worker such as task, contact, meeting, status, chatting etc. Main isthatduringchattingand status some employees send or use a bullying word so our paintings are that encrypt that phrase. This is client to client base system. 2. LITERATURE SURVEY Cyberbullying has as a vital factor a afflicating kids, adolescents, and teens in the literature study. Gaining knowledge of tactics make it possible to quickly identify abusive messages in social media, and tis can aid in creating a healthy and sage atmosphere for social media. We study that in companies cyberbullingcanbeusedbytryingtoscare employee. IN In paper [10] the goal of their project is to design computer software to detect the presence of cyberbullying in online chat conversations. In paper [2] proposed the content-based cyber bullying discovery makes the program's discoveryof bullyingkneads
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 150 in social media conceivable and it would offer assistance to construct and allow a solid and secure social media environment. In this important inquiry about the region,the strategy has executed a web-based application whichavoids cyberbullying in different websites and applications for messengers. In paper [3] advances the state of the art in cyber bullying detection beyond textual analysis to also consider the social relationship in which these social relationships in which these bullying messages are exchanged. Their results indicate that social features are useful in detecting cyber bullying. In effect, it suggests that understanding the social context in which a message is exchanged is just as important as the message itself. In future, similar approaches can be applied over more fine grained data about human behavior to identify cyber and physical social bullying in different settings, thus paving the way for a safer environment for bullied individuals in different social settings. In paper [7] their proposed system based android chat application utilized for chatting reason with remoteusersor clients connected with the web, and it won't let the client send unseemly messages. Their paper proposes the component of making proficient talk application that won't allow the client to send wrong or ill-advised messages to the members. In paper[8] describes the nation of technology foranalyzing internet crime in opposition to children ,in particular sexual predationand cyber bullying .Thissurveyincludesadialogue of their work on category of chat log that contain bullying or predatory behaviour. 3. PROPOSED SYSTEM This web application provides different ways of tracking and security that ultimately will improve performance. Company can track employee’s performance and keep monitoring them all the time. Chat application available in this web application. In this web application we are provide two modules such as admin module and Employee module. In admin module different sub modules are available such as save information, contact, task, meeting, status and performance. Fig -1: System Flow And the different employee sub modules are available such as chatting, meeting, contact, status and task. In existing system that type of modulesarenotpresent.Thisapplication is helpful for those people who is work on company because many people use the abusing word or comment on post that time ,this application doesn’t show abused word only show there related symbols like asterisk , small square box etc. In this application, when person start chatting with another person or comment on post that time they cannot used abused words. Many companieswill usedthisapplication for chatting, email notification, group chatting and meeting and also we detect the abusive word that sends by the only employee to others that we encrypt the textual content in asterisk. We develop a companyoutlook system.Inthisthere are modules Admin and Employee. There's also some sub modules of admin and worker such as task,contact,meeting, status, chatting etc. Main is that during chatting and status some employees send or use a bullying word so our paintings are that encrypt that phrase. This is client to client base system. Advantages of the projected system is the talk application diminishes the efforts and time. Employees can see each and every detail about project, task and respective meetings .It is easy to used, safe and access by only authorized person. 4. CONCLUSION This application offers reliability, time saving and easy control. The proposed system provides the new way of computing and monitoring the operations with responsive and attractive user interface. 5. REFERENCES [1] A. M. Kaplan and M. Haenlein, “Users of the world,unite! the challenges and opportunities of social media,” Business horizons, vol. 53, no. 1, pp. 59–68, 2010.M. Young, The Technical Writer’s Handbook. Mill Valley, CA: University Science, 1989. [2] Sowparnika shree N, Shalini N, Sushma Reddy A,,Rohini R T, Shiva Kumar Naik” TEXT BASED CYBERBULLYING DETECTION”. [3] Q. Huang, V. K. Singh, and P. K. Atrey, “Cyber bullying detection using social and textual analysis,” in Proceedings of the 3rd International Workshop on Socially-Aware Multimedia. ACM, 2014, pp. 3–6. [4] Modeling the Detection of Textual Cyberbullying K Dinakar, R.Reichart, and H.Liebeman,”Modeling the detection of textual cyberbullying.” inTheSocial Mobile. [5] M. Dadvar, D. Trieschnigg, R. Ordelman, and F. de Jong, “Improving cyberbullying detection withusercontext,” in Advances in InformationRetrieval.Springer,2013,pp. 693–696.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 151 [6] “Chatting ApplicationwithReal TimeTranslation”Nikhil Chaudhari, Sushma Shinkar, Priyanka Pagare may- 2018. [7] “Professional chatapplicationbasedonnatural language processing” S.Kartick, R.John Victor, S Manikandan, Bhargavi Goswami. [8] A. Kontostathis, L. Edwards, and A. Leatherman, “Text Mining And Cybercrime,” Text Mining: ApplicationsAnd Theory. John Wiley & Sons, Ltd, Chichester, Uk, 2010. [9] J.M. Xu, K.-S. Jun, X. Zhu, and A. Bellmore, “Learningfrom bullying traces in social media,” in Proceedings of the 2012 conference of the North American chapter of the association for computational linguistics: Human language technologies. Association for Computational Linguistics, 2012, pp. 656–666. [10] J. Bayzick, A. Kontostathis, And L. Edwards, “Detecting The Presence Of Cyberbullying Using Computer Software,” In Proceedings Of The Acm Websci’11. Koblenz, Germany: Acm, June 2011, Pp. 1–2.