Beruflich Dokumente
Kultur Dokumente
Prof. S.R Asati (Guide), Kajal Diwe Rajshri Yadav, Ravi Shambharkar
Computer science & Engineering,Dept. of Computer science Dept. of Computer science and engineering, Dept. of
and engineering Computer science and engineering,
S.S.P.A.C.E, Wardha (MS) S.S.P.A.C.E, Wardha (MS) S.S.P.A.C.E, Wardha (MS)S.S.P.A.C.E, Wardha (MS)
Kajaldiwe46@gmail.com rajshriyadav@gmail.com
Since their introduction, social network sites (SNSs) such as Thus, it gave us an idea to create a web-based application;
Myspace, Facebook, Cyworld, and Bebo have attracted which is cyberbullying detection and removal system. With
millions of users, many of whom have integrated these sites the primary function of detecting and removal of
into their daily practices. As of this writing, there are cyberbullying related tweets and provide rigor and
hundreds of SNSs, with various technological affordances, satisfying solution after detecting cyberbullying tweets or
supporting a wide range of interests and practices. While comments, With our system user can detect cyberbullying
their key technological features are fairly consistent, the tweets or comments and report 0it to admin who will
cultures that emerge around SNSs are varied. Most sites populate news feed with that tweet and add specific
support the maintenance of pre-existing social networks cyberbullying keywords to the application’s database.
(Danah M. Boyd and Nicole B. Ellison). There are over 100 Admin will also take some responsible actions against the
million worldwide views per day on YouTube .There are accounts which are spreading cyberbullying tweets and
more Facebook users (350 million) than there are U.S. comments.
residents (309 million). Twitter will process about 10 billion
In conclusion, our system will give rights and power to
relentless. Not only does it go on after school, college or
monitor, regulate and take action against the cyberbullies.
work has finished, but it then carries through into the next
Which will definitely result in decrement of harassing
day and the cycle continues. It has been well documented
anyone over the internet.
that cyber bullying has resulted in tragic events including
No.
1 Tweet Segmentation and Its Chenliang Li, Aixin Sun FEBRUARY In this paper tweet segmentation is
Application to Named Entity 2015 defined where it explain how to
Recognition recognize tweets.
354
IJFRCSCE | March 2018, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 4 Issue: 3 354 – 356
_______________________________________________________________________________________________
2 Tweet Segmentation and ChetanChavan, Prof. 1 –JANUARY It defined how to extract information
Named Entity Recognition RanjeetsinghSuryawanshi 2016 from huge quantity of tweets on the
basis of NER.
3 A Review Paper on Tweet Anuja A. Thete, January 2016 In this paper, they propose a novel
segmentation and its framework for tweet segmentation in
Prof.J.S. Karnewar
Application to Named a batch mode, called HybridSeg by
EntityRecognition splitting tweets into
and Communication
Engineering
9 Enhancing Named Entity Ikuya Yamada, July 31, 2015 The author propose a novel
Recognition in Twitter Hideaki Takeda method to enhance the
Messages Using Entity performance of the Twitter
Linking.
NER task by using Entity
Linking which is a method for
detecting entity mentions
10 Survey on Named Entity MinalS.Sonmal,Prof. December In this the Real time applications
Recognition System over RajaramH.Ambole 2015 is proposed depending on name
Twitter Data. entity recognition.
355
IJFRCSCE | March 2018, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 4 Issue: 3 354 – 356
_______________________________________________________________________________________________
12 TwiNER: Named Entity Chenliang Li, August 2012 In this paper,
Recognition in Targeted JianshuWeng
we present a novel 2-step
Twitter Stream.
unsupervised NER system for
targeted Twitter stream, called
TwiNER. And it is used to
partition tweets into valid
segments (phrases)
Proposed Architecture
III. Conclusion
356
IJFRCSCE | March 2018, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________