0% found this document useful (0 votes)
22 views

Project Documentation

Uploaded by

johnwick90323
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views

Project Documentation

Uploaded by

johnwick90323
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

A PROJECT REPORT ON

CYBERBULLYING PREDECTION USING MACHINE LEARNING

A Major Project Submitted to Jawaharlal Nehru Technological University, Kakinada


in Partial fulfillments of Requirements for the Award of the Degree of

BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE AND ENGINEERING

Submitted By

SHAIK AKRAM (21KT5A0506)

Under the Esteemed Guidance of

MR. A. Chandra Mouli , M.Tech, [Ph.D]

ASSOCIATE PROFESSOR

DEPARTMENT OF CSE

POTTI SRIRAMULU CHALAVADI MALLIKARJUNA RAO


COLLEGE OF ENGINEERING & TECHNOLOGY
(Approved by AICTE New Delhi, Affiliated to JNTU-Kakinada)
RAGHAVAREDDY STREET, KOTHAPET, VIJAYAWADA-520001, A.P 2021--2024
POTTI SRIRAMULU CHALAVADI MALLIKARJUNA RAO
COLLEGE OF ENGINEERING & TECHNOLOGY
(Approved by AICTE New Delhi, Affiliated to JNTU-Kakinada)
RAGHAVAREDDY STREET, KOTHAPET, VIJAYAWADA-520001, A.P 2021—2024

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

CERTIFICATE

This is to certify that the project work entitled “CYBERBULLYING PREDECTION USING
MACHINE LEARNING” is a bonafide work carried out by Mr. SHAIK AKRAM
(21KT5A0506). Fulfillment for the award of the degree of Bachelor of Technology in
COMPUTER SCIENCE AND ENGINEERING of Jawaharlal Nehru Technological
University, Kakinada during the year 2021-2024. It is certified that all corrections/suggestions
indicated for internal assessment have been incorporated in the report. The project report has
been approved as it satisfies the academic requirements in respect of project work prescribed for
the above degree

PROJECT GUIDE HEAD OF THE DEPARTMENT

EXTERNAL EXAMINER
ACKNOWLEDEMENT

We owe a great many thanks to a great many people who helped and supported and suggested
us in every step.

We are glad for having the support of our principal Dr. J. Lakshmi
Narayana ,M.Tech ,Ph.D who inspired us with his words filled with dedication and discipline
towards work.

We express our gratitude towards Dr. D. Durga Prasad, M.Tech, Ph.D, Professor & HoD
of Computer Science and Engineering for extending his support through training classes which
had been the major source to carry out our project.

We are very much thankful to Mr. A. Chandra Mouli, M. Tech, Ph.D , Associate
Professor, Guide of our project for guiding and correcting various documents of ours with
attention and care. Sir, has taken pain to go through the project and make necessary corrections
as and when needed.

Finally, we thank one and all who directly and indirectly helped us to complete our project
successfully.

Project
Submitted by
Shaik.Akram
(21KT5A0506)
DECLARATION

This is to declare that the project entitled “ CYBERBULLYING PREDECTION USING


MACHINE LEARNING ” submitted by us in the partial fulfillment of requirements for the
award of the degree of Bachelor of Technology in Computer Science & Engineering in Potti
Sriramulu Chalavadi Mallikarjuna Rao College of Engineering and Technology, is bonafide
record of project work carried out by us under the supervision and guidance of Mr A.Chandra
Mouli , M. Tech,[Ph.D] , Associate Professor of Computer Science and Engineering. As per
our knowledge, the work has not been submitted to any other institute or universities for any
other degree.

Project
Submitted by
Shaik.Akram
(21KT5A0506)
ABSTRACT

Cyberbullying has become a prevalent issue in the digital age, significantly affecting individuals'
mental health and well-being. This project presents an approach to predict cyberbullying
incidents using machine learning techniques. By leveraging a diverse set of features, including
text content, user interactions, and temporal patterns, a predictive model is developed to classify
cyberbullying instances. Several machine learning algorithms, including Support Vector
Machines (SVM), Random Forest, and Gradient Boosting Machines (GBM), are evaluated to
identify the most effective model..
This project offers a comprehensive understanding of Cyberbullying incidents and their
corresponding offences combining a series of approaches reported in relevant Work. The
implementation provides the opportunity to systematically combine various element or
Cyberbullying characteristics. Additionally, a comprehensive list of Cyberbullying-related
offences is put forward. The offences are ordered in a Deep Neural Network classification
system based on specific criteria to assist in better classification and correlation of their
respective incidents. This enables a thorough understanding of the repeating and underlying
criminal activities.
The proposed system demonstrates promising results in cyberbullying prediction, offering a
proactive solution to mitigate its harmful consequences. Implementing this predictive model
enables social media platforms and authorities to swiftly identify and address cyberbullying,
fostering a safer online environment.
In conclusion, We have successfully implemented an effective system for detecting and
identifying abusive comments on social media using a random forest classifier. Our goal is to
filter tweets or comments using machine learning algorithms, creating a healthy environment for
interaction and information exchange. It's our responsibility as the future generation to prevent
the toxic environment in social media and foster a positive online space.
CONTENTS

S.NO TOPIC PAGE.NO

1. INTRODUCTION 1

1.1 Brief Overview of the project 1

1.1.1 Scope 1

1.1.2 Purpose 1

1.1.3 Objective of the study 2

1.1.4 Existing System 2

1.2 Problem Statement 3

1.3 Proposed System 4

2. SYSTEM ANALYSIS 5

2.1 System Study 5

2.1.1 Feasibility Study 5

2.2 Requirement Analysis 8

2.2.1 Functional Requirements 8

2.2.2 Non Functional Requirements 8

2.3 System Requirement Specification 9

2.3.1 Hardware Requirements 9

2.3.2 Software Requirements 9

2.3.3 Libraries Required 9

2.4 Methodologies 10
2.4.1 Preprocessing 10

2.4.2 Feature Extraction 11

12
2.4.3 Classification

2.4.4 Performance Evaluation 14

3. SYSTEM DESIGN 16

3.1 About System Design 17

3.1.1 Initialize Design Definition 17

3.1.2 Establish Design Characteristics 18

3.1.3 Assess alternatives for system elements 18

3.1.4 Manage the design 17

3.2 System Architecture 18

3.3 Unified Modelling Language(UML) Diagrams 20

3.4 Dataset(Sample) 25

4. SYSTEM IMPLEMENTATION 26

4.1 About Implementation 27

4.2 Source code 28

4.3 Results 44

5. TESTING 50

5.1 About Testing 51

5.2 Testing Methods 51


5.3 Test Cases 54

6. CONCLUSION & FUTURE SCOPE 56

7. REFERENCES 57
LIST OF THE FIGURE

S.NO Fig. NO NAME OF THE FIGURE PAGE NO


1 3.2.1 System Architecture 19

2 3.3.1.1 Use case diagram for system 24

3 3.3.2.1 Class diagram for system 25

4 3.3.3.1 Sequence diagram for system 26

5 3.3.4.1 Activity diagram for system 28

6 4.3.1 Output for ML Algorithm 34

7 4.3.3 Output Analysis 35

8 5.2.3.1 Levels of Testing 46


9 5.3.1 Verification and Validation 49

LIST OF TABLES

S.NO Fig. NO NAME OF THE TABLE PAGE NO


1 5.2.1 Testing Meyhods 53

2 5.3.1 Test Case 54


CYBERBULLYING PREDECTION
USING MACHINE LEARNING
INTRODUCTION

You might also like