DETECTION AND REMOVAL OF PUBLISHING
FAKE POSTS & USERS IRRELAVENT
COMMENTS IN SOCIAL MEDIA
PREPARED BY:
Prasanth J (622516104037)
Santhanakumar P (622516104046)
Sukumar R (622516104052)
GUIDED BY:
Mrs. R.Bhuvaneswari, M.E., (Ph.D.),
Head of the Department, CSE
Date : 22-09-2020
Review : Final
ABSTRACT
Social media can be a double-edged sword for society, either as a convenient
channel exchanging ideas or as an unexpected conduit circulating fake news
through a large population.
Social nuisances that place heavy financial burdens on society. Here we look at
use of data mining followed by sentiment analysis on online social networks.
Here we use Sentiment analysis to detect the fake news by using the block
chain technique. The fake news are reported by the user and the algorithm will
check the data and add it to the database.
The irrelevant comments are automatically reported by the algorithm. Since, it
has a set of unwanted word which should not be used publicly.
EXISTING SYSTEM
However, most of the existing studies assume that each piece of information
spreads independently regardless of the interactions between contagions.
User spread the post through the social media in which some of them are fake
or not needed.
The irrelevant comments reported by the users are blocked by the admins after
reviewing the comments.
PROPOSED SYSTEM
The fake news are reported by the user and the algorithm checks the data and
blocks the content.
Sentiment analysis was used to determine a writer's/speaker's attitude with
respect to either a topic or the overall contextual polarity of a text.
The irrelevant comments are blocked automatically by the algorithm. Since, it
has preprocessed datasets.
HARDWARE REQUIREMENTS
Processor : Intel processor 3.0 GHz and above
RAM : 4GB and above
Hard disk : 50 to 500 GB
Keyboard : Any Standard Keyboard
Mouse : Any Standard Mouse
Monitor : 15 inch color monitor and above
SOFTWARE REQUIREMENTS
Front End : PHP
Back End : MySQL (Ver 5.6)
Operating System : Windows or Linux OS
System type : 32-bit or 64-bit Operating System
SYSTEM ARCHITECTURE
Data Acquisition
Datasets
Preprocessing
Stop Removal
Stemming words
analysis
Tokenization
Hybrid Segmentation
Global Context
Local Context
Pseudo Feedback
POS tagger
Named Entity
Recognition
Network Features
Content Features
Blog Features
SVM classifiers
Trained Datasets
Rumors identification
LIST OF MODULES
 Registration
 Login
 Approved
 Update Status
 Check status
 Block Id
 Find location
Logout
MODULES DESCRIPTION
 REGISTRATION
This module describes details of the users. When a new user arrives the
application user must enter the personal details such as user name, user age,
package detail, no of days, and user contact details (address, telephone number).
The user registers the details and gets consumer id and password.
 LOGIN
This module describes the details of login. In this module the admin and
consumer have an own unique login id and password. Login is used for protect
the unauthorized access.
 APPROVED
The users register the detail then the admin has check the detail and approve
the id.
 UPDATE STATUS
The user updates the status of the social media then the admin the check the
status the added to the status of social media.
 CHECK STATUS
The user can update the status then main work of admin has checked the status.
To check the status categories. The status has to a normal content to allow the
update the status but the status has to unwanted categories so the status could
not updated
 BLOCK ID
To the user can update the unwanted status initially admin send the warning
message of user the user cant accepted that user do that recently the account
has been blocked.
 FIND LOCATION
To the user can update the unwanted status Then the account has to be blocked
and find the user location.
 LOGOUT
After complete the booking process the user can logout the process.
ALGORITHM
Support Vector Machine(SVM)
A Support Vector Machine (SVM) is a discriminative classifier formally
defined by a separating hyperplane. In other words, given labeled training
data (supervised learning), the algorithm outputs an optimal hyperplane.
In this project we use SVM algorithm for classifying and fetch the data.
SCREENSHOT
 User Registration Page
 Admin Login Page
 User Profile Page
 User Post Page
 Admin Page
CONCLUSION
A crime pattern can be detected, nearly in real-time, when online social media
is monitored.
Crime can occur anywhere at any time. Previous statistics do not accurately
identify the crime intensity of a specific location.
More accurate results can be drawn from social media. Results from
geographic data analysis conducted on various tweets provided a clear picture
of the criminal trends in several different cities.
The crime intensity day-wise positively correlated with crime statistics from
cops, which ultimately prove the hypothesis.
The Ferguson shooting case study clearly differentiates the city's safe and
dangerous pattern
LITERATURE SURVEY
S.NO TITLE AUTHORS ALGORITHM JOURNAL LIMITATION
1
IAD: Interaction-
Aware Diffusion
Framework in Social
Networks{2018}
C. Gentry, S. Halevi,
and N. P. Smart
routing algorithms arXiv:1709.01773
Forecast the average
distance
2
Mining aspect-
specific opinion
using a
holistic lifelong topic
model{2016}
E. Aktas, F. Afram,
and K. Ghose
Dummy- Location
Selection (DLS)
Proc. 25th Int. Conf.
World Wide Web,
pp.
167–176
Chance for lose of data
3
TASC:topic-
adaptive sentiment
classification on
dynamic
tweets{2015}
C. Gentry, S.
Halevi, and N. P.
Smart
mixed-integer
nonlinear program
(MINLP)
EEE Trans. Knowl.
Data Eng., vol. 27,
no. 6, pp. 1696–
1709
Limitations on
recognition and
its performance in
behavioral
verification
4
Modeling
information
diffusion over social
networks for
temporal dynamic
prediction{2017}
E. Aktas, F. Afram,
and K. Ghose
wireless service
providers
(WSPs
IEEE
Trans. Knowl. Data
Eng, vol. PP, no. 99,
pp. 1–1
Detect the time
But don’t detect a
location
REFERENCES
Xi Zhang, Member, Yuan Su, Siyu Qu, Sihong Xi, Member, Binxing Fang, and
Philip S. Yu, Fellow, “Interaction-Aware Diffusion Framework in Social
Network,” IEEE Trans. Knowl. Data Eng. Vol. 14, no. 8, August 2018.
D. Li, S. Zhang, X. Sun, H. Zhou, S. Li, and X. Li, and X. Li, “Modeling
information diffusion over social networks for temporal dynamic prediction,”
IEEE Trans. Knowl. Data Eng. Vol PP, no. 99, pp. 1-1,2017.
R. Fan, J. Zhao, Y. Chen, and K. Xu, “Anger is more influential then joy:
Sentiment correlation in weibo,” PloS one, vol. 9, no. 10, p. e110184, 2014.
J. Zhang, B. Liu, J. Tang, T. Chen, and J. Li, “Social influence locality for
modeling retweeting behaviors,” in proc. 23th Int. Joint Conf. Artificial intell.,
2013.
THANK YOU

More Related Content

PPTX
CRIME DETECTION
PDF
IRJET- Fake Profile Identification using Machine Learning
PPTX
Seminar on detecting fake accounts in social media using machine learning
PPTX
DYNAMIC LARGE SCALE DATA ON TWITTER USING SENTIMENT ANALYSIS AND TOPIC MODELING
PDF
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
PAGES
Usability Review of Mashup Tools
PPTX
A Comparative Analysis of Different Feature Set on the Performance of Differe...
PDF
A Survey Of Collaborative Filtering Techniques
CRIME DETECTION
IRJET- Fake Profile Identification using Machine Learning
Seminar on detecting fake accounts in social media using machine learning
DYNAMIC LARGE SCALE DATA ON TWITTER USING SENTIMENT ANALYSIS AND TOPIC MODELING
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
Usability Review of Mashup Tools
A Comparative Analysis of Different Feature Set on the Performance of Differe...
A Survey Of Collaborative Filtering Techniques

What's hot (7)

DOCX
DISCOVERY OF RANKING FRAUD FOR MOBILE APPS
DOCX
Discovery of ranking fraud for mobile apps
DOCX
Discovery of ranking fraud for mobile apps
DOCX
E commerce 2010 section- b
PDF
PPTX
Crime Detection And Prevention Method By Using HCI
PDF
COMPARATIVE ANALYSIS OF ANOMALY BASED WEB ATTACK DETECTION METHODS
DISCOVERY OF RANKING FRAUD FOR MOBILE APPS
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
E commerce 2010 section- b
Crime Detection And Prevention Method By Using HCI
COMPARATIVE ANALYSIS OF ANOMALY BASED WEB ATTACK DETECTION METHODS
Ad

Similar to DETECTION AND REMOVAL OF PUBLISHING FAKE POSTS & USERS IRRELEVANT COMMENTS ON SOCIAL MEDIA (20)

PPTX
CYBER BULLYING DETECTION UPDATED USING social
PPTX
Fake news detection
PDF
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
PDF
ESWC SS 2012 - Friday Keynote Marko Grobelnik: Big Data Tutorial
PDF
Predicting the success of altruistic requests
PDF
Terrorism Analysis through Social Media using Data Mining
PPTX
Detecting fake news .pptx
PPT
Analysis of Women Safety In Indian Cities Using Machine Learning On Social Media
PDF
Master's Thesis
PDF
IRJET- Fake Message Deduction using Machine Learining
PDF
Fake News and Message Detection
PDF
IRJET- Post Summarization and Text Classification in Social Networking Sites
PPTX
ppt_fak_newshhhhhhjjjjjjjhhjjjsjjsjjsj.pptx
PDF
Cyber bullying detection and analysis.ppt.pdf
PDF
Using Complex Event Processing for Modeling Semantic Requests in Real-Time So...
PPTX
GEETHAhshansbbsbsbhshnsnsn_INTERNSHIP.pptx
PPTX
College_Tech-seminar_2024_Indrajith.pptx
PDF
Analytic System Based on Prediction Analysis of Social Emotions from User Pre...
PDF
IRJET- Design and Development of a System for Predicting Threats using Data S...
PDF
CYBERBULLYING DETECTION USING MACHINE LEARNING-1 (1).pdf
CYBER BULLYING DETECTION UPDATED USING social
Fake news detection
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
ESWC SS 2012 - Friday Keynote Marko Grobelnik: Big Data Tutorial
Predicting the success of altruistic requests
Terrorism Analysis through Social Media using Data Mining
Detecting fake news .pptx
Analysis of Women Safety In Indian Cities Using Machine Learning On Social Media
Master's Thesis
IRJET- Fake Message Deduction using Machine Learining
Fake News and Message Detection
IRJET- Post Summarization and Text Classification in Social Networking Sites
ppt_fak_newshhhhhhjjjjjjjhhjjjsjjsjjsj.pptx
Cyber bullying detection and analysis.ppt.pdf
Using Complex Event Processing for Modeling Semantic Requests in Real-Time So...
GEETHAhshansbbsbsbhshnsnsn_INTERNSHIP.pptx
College_Tech-seminar_2024_Indrajith.pptx
Analytic System Based on Prediction Analysis of Social Emotions from User Pre...
IRJET- Design and Development of a System for Predicting Threats using Data S...
CYBERBULLYING DETECTION USING MACHINE LEARNING-1 (1).pdf
Ad

Recently uploaded (20)

PDF
Dominate the Explore Page Level Me Up...
DOCX
Get More Leads From LinkedIn Ads Today .docx
PDF
Does Ownership Structure Play an Important Role in the Banking Industry?
PDF
49f97d4d-be4b-40d1-88f7-06f1460c2238.pdf
PDF
Optimizing Customer Lifetime Value (CLV) Prediction Models in Retail Banking ...
PDF
Your Breakthrough Starts Here Make Me Popular
PDF
Buy Verified Cryptocurrency Accounts - Lori Donato's blo.pdf
PDF
A guide to using Social Media For Business
PPTX
Lesson 3: person and his/her relationship with the others NSTP 1
PDF
What is TikTok Cyberbullying_ 15 Smart Ways to Prevent It.pdf
PDF
Regulation Study, Differences and Implementation of Bank Indonesia National C...
PPTX
Mindfulness_and_Coping_Workshop in workplace
PDF
The Black Turn Best Music Distribution In India
PDF
Online echo chambers, misinformation, disinformation, identity politics, how ...
PPTX
Eric Starker - Social Media Portfolio - 2025
PDF
Faculty of E languageTruongMinhThien.pdf
PDF
Social Media Marketing Company In Nagpur
PDF
Implementation of Total Quality Management (TQM) in Plywood Production Contro...
PDF
Effectiveness of Good Corporate Governance and Corporate Social Responsibilit...
PDF
Presentation-Popular-Culture-in-the-Philippines.pdf
Dominate the Explore Page Level Me Up...
Get More Leads From LinkedIn Ads Today .docx
Does Ownership Structure Play an Important Role in the Banking Industry?
49f97d4d-be4b-40d1-88f7-06f1460c2238.pdf
Optimizing Customer Lifetime Value (CLV) Prediction Models in Retail Banking ...
Your Breakthrough Starts Here Make Me Popular
Buy Verified Cryptocurrency Accounts - Lori Donato's blo.pdf
A guide to using Social Media For Business
Lesson 3: person and his/her relationship with the others NSTP 1
What is TikTok Cyberbullying_ 15 Smart Ways to Prevent It.pdf
Regulation Study, Differences and Implementation of Bank Indonesia National C...
Mindfulness_and_Coping_Workshop in workplace
The Black Turn Best Music Distribution In India
Online echo chambers, misinformation, disinformation, identity politics, how ...
Eric Starker - Social Media Portfolio - 2025
Faculty of E languageTruongMinhThien.pdf
Social Media Marketing Company In Nagpur
Implementation of Total Quality Management (TQM) in Plywood Production Contro...
Effectiveness of Good Corporate Governance and Corporate Social Responsibilit...
Presentation-Popular-Culture-in-the-Philippines.pdf

DETECTION AND REMOVAL OF PUBLISHING FAKE POSTS & USERS IRRELEVANT COMMENTS ON SOCIAL MEDIA

  • 1. DETECTION AND REMOVAL OF PUBLISHING FAKE POSTS & USERS IRRELAVENT COMMENTS IN SOCIAL MEDIA PREPARED BY: Prasanth J (622516104037) Santhanakumar P (622516104046) Sukumar R (622516104052) GUIDED BY: Mrs. R.Bhuvaneswari, M.E., (Ph.D.), Head of the Department, CSE Date : 22-09-2020 Review : Final
  • 2. ABSTRACT Social media can be a double-edged sword for society, either as a convenient channel exchanging ideas or as an unexpected conduit circulating fake news through a large population. Social nuisances that place heavy financial burdens on society. Here we look at use of data mining followed by sentiment analysis on online social networks. Here we use Sentiment analysis to detect the fake news by using the block chain technique. The fake news are reported by the user and the algorithm will check the data and add it to the database. The irrelevant comments are automatically reported by the algorithm. Since, it has a set of unwanted word which should not be used publicly.
  • 3. EXISTING SYSTEM However, most of the existing studies assume that each piece of information spreads independently regardless of the interactions between contagions. User spread the post through the social media in which some of them are fake or not needed. The irrelevant comments reported by the users are blocked by the admins after reviewing the comments.
  • 4. PROPOSED SYSTEM The fake news are reported by the user and the algorithm checks the data and blocks the content. Sentiment analysis was used to determine a writer's/speaker's attitude with respect to either a topic or the overall contextual polarity of a text. The irrelevant comments are blocked automatically by the algorithm. Since, it has preprocessed datasets.
  • 5. HARDWARE REQUIREMENTS Processor : Intel processor 3.0 GHz and above RAM : 4GB and above Hard disk : 50 to 500 GB Keyboard : Any Standard Keyboard Mouse : Any Standard Mouse Monitor : 15 inch color monitor and above
  • 6. SOFTWARE REQUIREMENTS Front End : PHP Back End : MySQL (Ver 5.6) Operating System : Windows or Linux OS System type : 32-bit or 64-bit Operating System
  • 7. SYSTEM ARCHITECTURE Data Acquisition Datasets Preprocessing Stop Removal Stemming words analysis Tokenization Hybrid Segmentation Global Context Local Context Pseudo Feedback POS tagger Named Entity Recognition Network Features Content Features Blog Features SVM classifiers Trained Datasets Rumors identification
  • 8. LIST OF MODULES  Registration  Login  Approved  Update Status  Check status  Block Id  Find location Logout
  • 9. MODULES DESCRIPTION  REGISTRATION This module describes details of the users. When a new user arrives the application user must enter the personal details such as user name, user age, package detail, no of days, and user contact details (address, telephone number). The user registers the details and gets consumer id and password.  LOGIN This module describes the details of login. In this module the admin and consumer have an own unique login id and password. Login is used for protect the unauthorized access.
  • 10.  APPROVED The users register the detail then the admin has check the detail and approve the id.  UPDATE STATUS The user updates the status of the social media then the admin the check the status the added to the status of social media.  CHECK STATUS The user can update the status then main work of admin has checked the status. To check the status categories. The status has to a normal content to allow the update the status but the status has to unwanted categories so the status could not updated
  • 11.  BLOCK ID To the user can update the unwanted status initially admin send the warning message of user the user cant accepted that user do that recently the account has been blocked.  FIND LOCATION To the user can update the unwanted status Then the account has to be blocked and find the user location.  LOGOUT After complete the booking process the user can logout the process.
  • 12. ALGORITHM Support Vector Machine(SVM) A Support Vector Machine (SVM) is a discriminative classifier formally defined by a separating hyperplane. In other words, given labeled training data (supervised learning), the algorithm outputs an optimal hyperplane. In this project we use SVM algorithm for classifying and fetch the data.
  • 19. CONCLUSION A crime pattern can be detected, nearly in real-time, when online social media is monitored. Crime can occur anywhere at any time. Previous statistics do not accurately identify the crime intensity of a specific location. More accurate results can be drawn from social media. Results from geographic data analysis conducted on various tweets provided a clear picture of the criminal trends in several different cities. The crime intensity day-wise positively correlated with crime statistics from cops, which ultimately prove the hypothesis. The Ferguson shooting case study clearly differentiates the city's safe and dangerous pattern
  • 20. LITERATURE SURVEY S.NO TITLE AUTHORS ALGORITHM JOURNAL LIMITATION 1 IAD: Interaction- Aware Diffusion Framework in Social Networks{2018} C. Gentry, S. Halevi, and N. P. Smart routing algorithms arXiv:1709.01773 Forecast the average distance 2 Mining aspect- specific opinion using a holistic lifelong topic model{2016} E. Aktas, F. Afram, and K. Ghose Dummy- Location Selection (DLS) Proc. 25th Int. Conf. World Wide Web, pp. 167–176 Chance for lose of data
  • 21. 3 TASC:topic- adaptive sentiment classification on dynamic tweets{2015} C. Gentry, S. Halevi, and N. P. Smart mixed-integer nonlinear program (MINLP) EEE Trans. Knowl. Data Eng., vol. 27, no. 6, pp. 1696– 1709 Limitations on recognition and its performance in behavioral verification 4 Modeling information diffusion over social networks for temporal dynamic prediction{2017} E. Aktas, F. Afram, and K. Ghose wireless service providers (WSPs IEEE Trans. Knowl. Data Eng, vol. PP, no. 99, pp. 1–1 Detect the time But don’t detect a location
  • 22. REFERENCES Xi Zhang, Member, Yuan Su, Siyu Qu, Sihong Xi, Member, Binxing Fang, and Philip S. Yu, Fellow, “Interaction-Aware Diffusion Framework in Social Network,” IEEE Trans. Knowl. Data Eng. Vol. 14, no. 8, August 2018. D. Li, S. Zhang, X. Sun, H. Zhou, S. Li, and X. Li, and X. Li, “Modeling information diffusion over social networks for temporal dynamic prediction,” IEEE Trans. Knowl. Data Eng. Vol PP, no. 99, pp. 1-1,2017. R. Fan, J. Zhao, Y. Chen, and K. Xu, “Anger is more influential then joy: Sentiment correlation in weibo,” PloS one, vol. 9, no. 10, p. e110184, 2014. J. Zhang, B. Liu, J. Tang, T. Chen, and J. Li, “Social influence locality for modeling retweeting behaviors,” in proc. 23th Int. Joint Conf. Artificial intell., 2013.