MONITORING SUSPICIOUS COMMUNICATION ON SOCIAL MEDIA USING DATAMINING

Welcome to DSpace BU Repository

Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.

Show simple item record

dc.contributor.author Raza, Syed Abbas Reg # 48899
dc.contributor.author Seerat, Syeda Ulya Reg # 48901
dc.contributor.author Niaz, Zeenat Reg # 48914
dc.date.accessioned 2023-05-03T05:02:16Z
dc.date.available 2023-05-03T05:02:16Z
dc.date.issued 2020
dc.identifier.uri http://hdl.handle.net/123456789/15331
dc.description Supervised by Shahid Khan en_US
dc.description.abstract Social media has become very popular in this technology-driven era, and most people social media for business and many other purposes. The Internet has made this possible to connect with the globe. Where this technology is used tor a positive sense, people used it for negative. Some people use these platforms for a bully, threats, and even terrorism discussion. The purpose ofthe proposed system is to monitor and identify the suspicious communications on Twitter by identifying the suspicious words in chats of users. To get effective results, we used machine learning algorithms to train our model. Machine learning is a spectacularly powerful tool to make predictions or forecasting based on the bulk amount of data. Data in text format should be cleaned to reduce the noise within. We have done pre-processing in which the text present in the post or message will be filtered, cleaned, and extracted. use some The root words and unnecessary data cleanout, which increase processing time and reduce cost. Then, in the next phase, feature selection and extraction of the text normalization, tokenization, stemming. After the extraction of completed using case features present in the text, feature weighting is done using techniques like TF/IDF. have used four different algorithms for better accuracy. The For identification, we algorithm we applied is Multinomial Naive Bayes, Decision Tree, Support Vector Machine, and Adaboost. We have compared their result and then select the best one. the results captured through software called Jupiter notebook using python All language. All the details of our work are mentioned in this report. en_US
dc.language.iso en_US en_US
dc.publisher Bahria University Karachi Campus en_US
dc.relation.ispartofseries BS IT;MFN BS-IT 30
dc.title MONITORING SUSPICIOUS COMMUNICATION ON SOCIAL MEDIA USING DATAMINING en_US
dc.type Project Reports en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account