Issue 5
Issue 5
ABSTRACT I. INTRODUCTION
2
ELECTROFITY WALL JOURNAL – ECE | UCE – AKNU | Volume 1 Issue 5
3
ELECTROFITY WALL JOURNAL – ECE | UCE – AKNU | Volume 1 Issue 5
4
ELECTROFITY WALL JOURNAL – ECE | UCE – AKNU | Volume 1 Issue 5
5
ELECTROFITY WALL JOURNAL – ECE | UCE – AKNU | Volume 1 Issue 5
6
ELECTROFITY WALL JOURNAL – ECE | UCE – AKNU | Volume 1 Issue 5
REFERENCES
7
ELECTROFITY WALL JOURNAL – ECE|UCE-AKNU|Volume 1 Issue
Neeraja Simmalapudi1
Regd. No 198297603047 IV B.Tech
Prathyusha Yamana2
Regd. No 198297603061 IV B.Tech
Department of Electronics and Communication Engineering
Adikavi Nannaya University,Rajamahendravaram.
ABSTRACT I. INTRODUCTION
Cyber bullying is the use of technology as To date, people all over the world utilize
a medium to bully someone. Although it has internet as a tool for communication amongst
been an issue for many years, the recognition of them. Online tools such as social networking
its impact on young people has recently sites (SNSs) are the most popular socializing
increased. Social networking sites provide a tool especially for adolescents as SNSs tightly
medium for bullies, and teens and young adults integrated in their daily practices since it can
who use these sites are vulnerable to attacks. be a medium for users to interact with each
According to Williard(2004), there are eight other without any limitation of time or
types of cyberbullying such as harassment, distance. Nevertheless, SNSs can give negative
denigration, impersonation, etc. It has been consequences if users misuse them and one of
around 2 decades since social media sites came the common negative activities that occurs in
into the picture, but there hasn’t been a lot of SNSs is cyber bullying which is the focus of
effective measures to curb social bullying and it this paper. Cyber bullying involves a person
has become one of the alarming issues in recent doing threatening act, harassment, etc. towards
times. Through machine learning, we can detect another person. Meaning of cyber bullying is a
language patterns used by bullies and their group(s) or an individual(s) of peoples that
victims and develop rules to automatically adopt telecommunication advantages to
detect cyber bullying content. intimidate other persons on the communication
Key Words: Cyberbullying, machine learning. networks. However, most of the researchers in
cyber bullying field take into account
definition of cyber bullying from.
8
ELECTROFITY WALL JOURNAL – ECE|UCE-AKNU|Volume 1 Issue
stalking. The most severe type of cyber bullying We have used Dataturks’ Tweet Dataset
is flaming and the less severe is cyber stalking for Cybertroll Detection obtained from Kaggle for
as stated in. Flaming occurs between two or reaching the final results. Because of the
more individuals that argue on some incidents seriousness of the issue we aim to resolve, it
that involve rude, offensive and vulgar language was crucial to choose a dataset that was
and occurred within electronic message. complete, reliable, relevant, and to the point.
Flaming is the most severe type of cyber While we considered many other datasets as
bullying because if online fight between well, many of them either had missing
internet’s users take part, it could be difficult to attributes, were too low in quality, or were
recognize cyber bully and victim on that time. found to have irrelevant data after manual
Harassment occurs repeatedly sending of inspection. Thus, after having tried out of
harmful message to a victim. Denigration is many other open sourced datasets, we came
posting about victim that untrue, rumors or down to as it seemed in line with all the
cruel. Impersonation happens when cyber bully parameters required. Here is the Detailed
disguises into a target and post bad information Description of the dataset: It is a partially
about that particular target with intention to manually labelled dataset. Total Instances:
bullying the target. Outing occurs when cyber 20001 The dataset has 2 attributes- tweet and
bully share victim’s secrets or private label [0 corresponds to No while 1 corresponds
information which can embarrassing victim. to Yes]
Boycott is exclude a person within social
2.2 Data Cleaning
interaction in social media with a purpose.
The dataset used was set in a json
Willard mentioned cyber stalking occurs when
format. Since the fields of the dataset were
cyber bully send harmful messages repeatedly.
relatively simple to interpret, the original set of
The cyber stalking is less severity than other
fields in the annotation attribute was removed,
categories since cyber bully (cyber stalker)
and filled with the label values to simplify the
could be detected directly once they send
next step. The number of instances for each
annoying messages towards victim.
class are mentioned in table 1.
9
ELECTROFITY WALL JOURNAL – ECE|UCE-AKNU|Volume 1 Issue
1
ELECTROFITY WALL JOURNAL – ECE|UCE-AKNU|Volume 1 Issue
III. DESCRIPTION
OF ALGORITHMS
1
ELECTROFITY WALL JOURNAL – ECE|UCE-AKNU|Volume 1 Issue
1
ELECTROFITY WALL JOURNAL – ECE|UCE-AKNU|Volume 1 Issue
forest spits out a class prediction and the class automatic and time taken for detection
with the most votes becomes our model’s is less and it works on the live
is the key as they can produce ensemble The latest machine learning models
are used for training models that are
predictions that are more accurate than any of
accurate.
the individual predictions, as the trees protect
each other from their individual errors. The
process of Bagging is used to diversify models VI. FUTURE SCOPE
as each individual tree is allowed to randomly Cyberbullying can come in many forms.
sample from the dataset with replacement. The We can enhance the detection of cyberbullying
classifier was implemented using by combining texts with videos and images
sklearn.ensemble package. and can provide language inputs to detect
sarcastic comments. So, making the dataset a
little more varied and including many more
languages will always be a plus.
1
ELECTROFITY WALL JOURNAL – ECE|UCE-AKNU|Volume 1 Issue
cyberbullying comment or not. In this paper, a [3] Kelly Reynolds, April Kontostathis, Lynne
comparative study between various Supervised Edwards, “Using Machine Learning to Detect
Cyberbullying”, Proceedings of 10th
algorithms, additionally also comparing various
International Conference on Machine Learning
Supervised Ensemble methods as well are done. and Applications and Workshops 2011,
This can help the users by preventing them for doi : 10.1109/ICMLA.2011.152.
becoming victims to this harsh consequence of [4] “Cyber Bullying Detection Using Machine
cyberbullying. Since the domain of online Learning”. 1000projects.org [Online].
bullying is a never-ending process, it is required Available:
https://1000projects.org/cyber-bullying-
that the methodologies require constant detection-using-machine-learning.html
upgrading and updating to the current situation.
[5] Arathi Unni, Ranimol K R, Linda
Finally, it can even prevent a potential
Sebastian, Rajalakshmi S, Sissy Siby,
crisis.This work is a foundational step toward “Detecting the Presence of Cyberbullying
developing software tools for social networks to using Machine Learning”, vol. 09, issue 13,
2021.
monitor cyberbullying.
1
ELECTROFITY WALL JOURNAL-ECE | UCE – AKNU | Volume 1 Issue
ABSTRACT intelligence.
1
ELECTROFITY WALL JOURNAL-ECE | UCE – AKNU | Volume 1 Issue
1
ELECTROFITY WALL JOURNAL-ECE | UCE – AKNU | Volume 1 Issue
II. MACHINE
2. Unsupervised machine learning
LEARNING
METHODS Unsupervised learning, also known
as unsupervised machine learning, uses
Machine learning models fall
machine learning algorithms to analyze and
into three primary categories.
cluster unlabeled datasets. These algorithms
discover hidden patterns or data groupings
without the need for human intervention.
Thismethod’s ability to discover similarities
and differences in information make it ideal
for exploratory data analysis, cross-selling
strategies, customer segmentation, and
imageand pattern recognition. It’s also used
to reduce the number of features in a model
through the process of dimensionality
1. Supervised machine learning
reduction. Principal component analysis
Supervised learning, also known as (PCA) and singular value decomposition
supervised machine learning, is defined by (SVD) are two common approaches for this.
itsuse of labeled datasets to train algorithms Other algorithms used in unsupervised
to classify data or predict outcomes learning include neural networks, k-means
accurately. As input data is fed into the clustering, and probabilistic clustering
model, the modeladjusts its weights until it methods.
has been fitted appropriately. This occurs as 3. Semi-supervised learning
part of the crossvalidation process to ensure
Semi-supervised learning offers a
that the model avoids overfitting or
happy medium between supervised and
underfitting. Supervised learning helps
unsupervised learning. During training, it
organizations solve a variety of real-world
uses a smaller labeled data set to guide
problems at scale, such as classifying spam
classification and feature extraction from a
in a separate folder from your inbox. Some
larger, unlabeled data set. Semi-supervised
methods used in supervised learning include
learning can solve the problem of not
neural networks, naïve bayes, linear
having enough labeled data for a supervised
regression, logistic regression, random
learning algorithm. It also helps if it’s too
forest, and support vector machine (SVM).
costly to label enough data.
1
ELECTROFITY WALL JOURNAL-ECE | UCE – AKNU | Volume 1 Issue
simulate the way the human brain branching sequence of linked decisions
works, with a huge number of linked that can be represented with a tree
good at recognizing patterns and play decision trees is that they are easy to
an important role in applications validate and audit, unlike the black box
used to predict numerical values, based results from a number of decision trees.
1
ELECTROFITY WALL JOURNAL-ECE | UCE – AKNU | Volume 1 Issue
4.1 Technological singularity for specific job roles shifts. For example,
While this topic garners a lot of public when we look at the automotive industry,
attention, many researchers are not many manufacturers, like GM, are shifting
concerned with the idea of AI surpassing to focus on electric vehicle production to
human intelligence in the near future. align with green initiatives. The energy
Technological singularity is also referred to industry isn’t going away, but the source of
as strong AI or superintelligence. energy is shifting from a fuel economy to an
Philosopher Nick Bostrum defines electric one.
superintelligence as “any intellect that In a similar way, artificial intelligence
vastly outperforms the best human brains in will shift the demand for jobs to other areas.
practically every field, including scientific There will need to be individuals to help
creativity, general wisdom, and social manage AI systems. There will still need to
skills.” Despite the fact that be people to address more complex
superintelligence is not imminent in society, problems within the industries that are most
the idea of it raises some interesting likely to be affected by job demand shifts,
questions as we consider the use of such as customer service. The biggest
autonomous systems, like self-driving cars. challenge with artificial intelligence and its
It’s unrealistic to think that a driverless car effect on the job market will be helping
would never have an accident, but who is people to transition to new roles that are in
responsible and liable under those demand.
circumstances? Should we still develop 4.3 Privacy
autonomous vehicles, or do we limit this Privacy tends to be discussed in the
technology to semi-autonomous vehicles context of data privacy, data protection, and
which help people drive safely? The jury is data security. These concerns have allowed
still out on this, but these are the types of policymakers to make more strides in recent
ethical debates that are occurring as new, years. For example, in 2016, GDPR
innovative AI technology develops. legislation was created to protect the
4.2 AI impact on jobs personal data of people in the European
While a lot of public perception of Union and European Economic Area,
artificial intelligence centers around job giving individualsmore control of their data.
losses, this concern should probably be In the United States, individual states are
reframed. With every disruptive, new developing policies, such as the California
technology, we see thatthe market demand Consumer Privacy Act (CCPA), which
1
ELECTROFITY WALL JOURNAL-ECE | UCE – AKNU | Volume 1 Issue
was
2
ELECTROFITY WALL JOURNAL-ECE | UCE – AKNU | Volume 1 Issue
Image recognition is a well-known and convert live voice and recorded speech into
widespread example of machine learning in atext file. The speech can be segmented by
2
ELECTROFITY WALL JOURNAL-ECE | UCE – AKNU | Volume 1 Issue
2
ELECTROFITY WALL JOURNAL-ECE | UCE – AKNU | Volume 1 Issue
2
ELECTROFITY WALL JOURNAL-ECE | UCE – AKNU | Volume 1 Issue
REFERENCES
[1].https://www.ibm.com/cloud/learn/machi
ne-learning
[2].https://www.salesforce.com/eu/blog/20
20/06/real-world-examples-of-machine-
learning.html
2
ELECTROFITY WALL JOURNAL-ECE | UCE – AKNU | Volume 1 Issue