22 research outputs found

    Automatic Discovery Of Harsh Messages In Social Media

    Get PDF
    Cyberbullying has arisen as a widespread issue for teenagers, particularly children and young adults, due to the rise in popularity of social media. Automatic identification of bullying messages in social media becomes possible by machine learning methods, and this will allow for the construction of a secure and stable social media community. The topic of reliable and discriminative numerical representation learning of text messages is a crucial concern in this important research field. We've developed a new learning approach for this project, as described in this article. The method smSDA, which was named after the method SmSDA, which was derived from the common deep learning model stacked denoising autoencoder, is constructed using semantic extension of that model. The semantic extension includes semantic dropout noise, a methodology that utilizes domain awareness, and sparse constraints, which is implemented using term embedding techniques. Our method can leverage the secret text function structure and learn a comprehensive and discriminatory representation of bullying content. The tests are done on two publicly available online corpora of cyberbullying (Twitter and MySpace) and the findings indicate that our suggested baseline techniques outperform other models

    Abused Word Detection on Social Media

    Get PDF
    Online social media now a days it�s a medium to communicate each other and it�s a platform of advertising, popularity and so on. It offers a platform for the people to connect online and also gives the privacy for one-to-one interaction.The different type of languages having different type of abused words that�s having different typos isreally hard to recognise the word that�s the big problem. Most of the people using abused words on social media. By this the social environment become polluted or unhealthy for young people. Its gives the bad impact on students and their mind. For that we proposed a system which is hiding the abused word on the social media without exposing publically to decrease the death rate of students which is harassed on social media and commenting negative comments social media to overcome this issue

    Cyberbullying Detection System with Multiple Server Configurations

    Get PDF
    Due to the proliferation of online networking, friendships and relationships - social communications have reached a whole new level. As a result of this scenario, there is an increasing evidence that social applications are frequently used for bullying. State-of-the-art studies in cyberbullying detection have mainly focused on the content of the conversations while largely ignoring the users involved in cyberbullying. To encounter this problem, we have designed a distributed cyberbullying detection system that will detect bullying messages and drop them before they are sent to the intended receiver. A prototype has been created using the principles of NLP, Machine Learning and Distributed Systems. Preliminary studies conducted with it, indicate a strong promise of our approach

    Designing Semantics Dropout Noise And Enforcing Sparsity

    Get PDF
    We examine one profound learning technique named stacked denoising autoencoder (SDA). SDA stacks a few denoising autoencoders and connects the yield of each layer as the learned portrayal. Each denoising autoencoder in SDA is prepared to recoup the information from a ruined form of it. We build up another content portrayal display in view of a variation of SDA: marginalized stacked denoising autoencoders (mSDA), which receives straight rather than nonlinear projection to quicken preparing and minimizes limitless commotion dissemination keeping in mind the end goal to take in more vigorous portrayals. We use semantic data to grow mSDA and create Semantic-upgraded Marginalized Stacked Denoising Autoencoders (smSDA). The semantic data comprises of bullying words

    Undecimated Wavelet Transform for Word Embedded Semantic Marginal Autoencoder in Security improvement and Denoising different Languages

    Full text link
    By combining the undecimated wavelet transform within a Word Embedded Semantic Marginal Autoencoder (WESMA), this research study provides a novel strategy for improving security measures and denoising multiple languages. The incorporation of these strategies is intended to address the issues of robustness, privacy, and multilingualism in data processing applications. The undecimated wavelet transform is used as a feature extraction tool to identify prominent language patterns and structural qualities in the input data. The proposed system may successfully capture significant information while preserving the temporal and geographical links within the data by employing this transform. This improves security measures by increasing the system's ability to detect abnormalities, discover hidden patterns, and distinguish between legitimate content and dangerous threats. The Word Embedded Semantic Marginal Autoencoder also functions as an intelligent framework for dimensionality and noise reduction. The autoencoder effectively learns the underlying semantics of the data and reduces noise components by exploiting word embeddings and semantic context. As a result, data quality and accuracy are increased in following processing stages. The suggested methodology is tested using a diversified dataset that includes several languages and security scenarios. The experimental results show that the proposed approach is effective in attaining security enhancement and denoising capabilities across multiple languages. The system is strong in dealing with linguistic variances, producing consistent outcomes regardless of the language used. Furthermore, incorporating the undecimated wavelet transform considerably improves the system's ability to efficiently address complex security concern

    THE DISCOVERY OF CYBER HARRYING IS BASED ON AUTOMATIC CODING TO REDUCE NOISE

    Get PDF
    As a side effect of increasingly popular social media, cyberbullying has emerged as a serious question afflicting children, adolescents and young adults. Machine literature techniques make automatic rifle detection of bullying messages in social media possibility, and this could help to construct a salubrious and safe convivial media surrounding. In this meaningful research region, one critical conclusion is muscular and discriminative numerical representation learning of message messages. In this papery, we propose a new representation learning course to attack this proposition. Our sample titled Semantic-Enhanced Marginalized DE widespread Auto-Encoder join via lexical refine of one's consistently acute check out join up near without character call it all even rotate encoder. The dialectal linger is composed of re-create bohemian fire up and barrenness constraints, high disposition the morphological exigency conflict exhibit employment on administration settlement and great inlay grind. Our alert vimana forgive sustain the secret impress forming of imperious advice and advance an extreme and nasty report of abstract. Comprehensive experiments on two renowned programmed tyrannous corpora (Twitter and Myspace) are convoy, and the outcomes get so that us crave approaches transcend new copy departure regularity habits access

    Análisis comparativo sobre modelos de redes neuronales profundas para la detección de ciberbullying en redes sociales

    Get PDF
    Social media usage has been increased and it consists of both positive and negative effects. By considering the misusage of social media platforms by various cyberbullying methods like stalking, harassment there should be preventive methods to control these and to avoid mental stress. These extra words will expand the size of the vocabulary and influence the performance of the algorithm. Therefore, we come up with variant deep learning models like LSTM, BI-LSTM, RNN, BI-RNN, GRU, BI-GRU to detect cyberbullying in social media. These models are applied on Twitter, public comments data and performance were observed for these models and obtained improved accuracy of 90.4%.Introducción: el uso de las redes sociales se ha incrementado y tiene efectos tanto positivos como negativos. Al considerar el uso indebido de las plataformas de redes sociales a través de varios métodos de acoso cibernético, como el acecho y el acoso, debe haber métodos preventivos para controlarlos y evitar el estrés mental.Problema: estas palabras adicionales ampliarán el tamaño del vocabulario e influirán en el rendimiento del algoritmo.Objetivo: Detectar el ciberacoso en las redes sociales.Metodología: en este documento, presentamos variantes de modelos de aprendizaje profundo como la memoria a largo plazo (LSTM), memoria bidireccional a largo plazo (BI-LSTM), redes neuronales recurrentes (RNN), redes neuronales recurrentes bidireccionales (BI-RNN), unidad recurrente cerrada (GRU) y unidad recurrente cerrada bidireccional (BI-GRU) para detectar el ciberacoso en las redes sociales.Resultados: El mecanismo propuesto ha sido realizado, analizado e implementado sobre datos de Twitter con Accuracy, Precision, Recall y F-Score como medidas. Los modelos de aprendizaje profundo como LSTM, BI-LSTM, RNN, BI-RNN, GRU y BI-GRU se aplican en Twitter a los datos de comentarios públicos y se observó el rendimiento de estos modelos, obteniendo una precisión mejorada del 90,4 %.Conclusiones: Los resultados indican que el mecanismo propuesto es eficiente en comparación con los es-quemas del estado del arte.Originalidad: la aplicación de modelos de aprendizaje profundo para realizar un análisis comparativo de los datos de las redes sociales es el primer enfoque para detectar el ciberacoso.Restricciones: estos modelos se aplican solo en comentarios de datos textuales. El trabajo propio no se ha concentrado en datos multimedia como audio, video e imágenes

    EMAIL CHAT DETECTION USING SEMANTIC IMPLEMENTED RELEGATED AUTO CONVERTER

    Get PDF
    As a profit of evident public broadcast, thermionic tyrannical has attain a ruthless embarrass afflicting children, adolescents and burgeoning adults. Machine order approaches make evident unmasking of hectoring messages in comprehensive cellular suited, and this could help to commenced a vigorous and safe informational news background. In this necessary exhort area, one cruel relevance press on and detrimental consequent portrayal horticulture of text messages. In this scan, we aim a new likeness behavior prepare to try this sadden. Our taste titled Semantic-Enhanced Marginalized DE circulate Auto-Encoder enters via linguistic develop of the here and there deep inspect come up with stacked cease auto encoder. The linguistic interruption consists of cure nonconformist rouse and impotence constraints, quality the grammatical disaster collide is bred stationed on department conclusion and vast embedding hone. Our prompted skyscraper spare retains the hidden mark forming of bossy info and gain a frightful and hostile report of text. Comprehensive experiments on two popular programmed imperious corpora (Twitter and Myspace) are conducted, and the results show that our asked approaches eclipse new norm text theory habits approaches

    Automatic Hate Speech Detection: A Literature Review

    Get PDF
    Hate speech has been an ongoing problem on the Internet for many years. Besides, social media, especially Facebook, and Twitter have given it a global stage where those hate speeches can spread far more rapidly. Every social media platform needs to implement an effective hate speech detection system to remove offensive content in real-time. There are various approaches to identify hate speech, such as Rule-Based, Machine Learning based, deep learning based and Hybrid approach. Since this is a review paper, we explained the valuable works of various authors who have invested their valuable time in studying to identifying hate speech using various approaches

    ONLINE INTRUSION DETECTION BASED THE IMPROVEMENT OF DENOGINGOTO-INCODER

    Get PDF
    As a result of the most popular social media, cyberbullying exploitation has been a major issue for children, young people and adults. Automatic volumes are automatically detected guns from bullying messages, and this can help create environmentally friendly and safe sources. In this useful research area, one important conclusion is numerical reading and representation of message messaging values. In this introduction, we suggest a new course of teaching to attack this proposal. We have an integrated auto-encoder for the Semantic-Enhanced Marginalized DE with a lexical reflex of the smart person and always try to join up without the character to call all the switch to the type. The Pictal list contains bohemian fire boosts and obstacles to preventing conflicts, as well as high demands of behavioral ethical issues that provide employment opportunities for major management and release. Our warning is forgiving to keep the mysterious respect of urgent counseling and reporting unlawful and dirty. The full experience of two famous customers (Twitter and Myspace) is a caravan, and results find it possible to navigate beyond the new way of finding common habits
    corecore