INTERNATIONAL RESEARCH JOURNAL OF SCIENCE ENGINEERING AND TECHNOLOGY

( Online- ISSN 2454 -3195 ) New DOI : 10.32804/RJSET

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 211    Submit Your Rating     Cite This   Download        Certificate

PREDICTION OF CYBERBULLYING USING RANDOM FOREST CLASSIFIER: A REVIEW

    2 Author(s):  LAKHDEEP KAUR,DR. SONIA VATTA

Vol -  9, Issue- 2 ,         Page(s) : 25 - 32  (2019 ) DOI : https://doi.org/10.32804/RJSET

Abstract

With the advancement of technology, social media is a basic need of the modern world. Due to increasing the popularity of social media, cyberbullying is also becoming a big concern. If a person harasses another person using digital appliances like mobile phones, internet or emails is called cyberbullying. The bully person can be very intelligent, he knows all the schemes to create problem to the victim and can easily hide his identity. The cyberbullying is very difficult to identify because the bully messages are very less as compared to the normal messages. The classification and feature extraction of the data set is very difficult. But Data mining is the best and popular technology for classification and regression. It is the process by which useful information and patterns are extracted from a large amount of data stored in the databases. Data Mining is also known as knowledge discovery process as knowledge is being extracted or patterns are analyzed which is very useful to collect data. It is very important to note that the exactness and availability of the results will rely on the standard of information investigation and the nature of the suspicious user. In the existing work, the Naïve Bayes classifier has been used on the cyberbullying. But there is huge no. of limitations for classifying the cyberbullying like accuracy, precision time, recall, execution time. In this review paper, the Random Forest classifier will be described for the cyberbullying. It is expected that Random Forest classifier will high accuracy and high sensitivity as compared to Naïve Bayes.

[1] Micheline Kamber and Jian Pei Jiawei Han,” Data Mining Concepts and Techniques”, 2012, 3rd.
[2] Mohammed Abdul Khaled, Sateesh Kumar Pradhan and G.N. Dash,” Asurvey of data mining techniques on medical data for finding locally frequent diseases,”2013, International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, pp. 149-153
[3] Abdur Razzak, "A questionnaire survey on infectious disease amonghospital patients in Kushtia and Jhenaidah, Bangladesh," 2011, International Journal of Genetics and Molecular Biology, vol. 3, no. 9, pp. 120-xxx
[4] D. P. Shukla, Shamsher Bahadur Patel and Ashish Kumar Sen, "Aliterature review in health informatics using data mining techniques," 2014, International Journal of Software & Hardware Research in Engineering, vol. 2, no. 2
[5] V. Gayathri, M.Chanda Mona and S.Banu Chitra, "A survey of datamining techniques on medical diagnosis and research," 2014, International Journal of Data Engineering (OOE) Singapore Journal of Scientific Research (SJSR), vol. 6, pp. 301-310
[6] Yasin N. Silva, Christopher Rich, Deborah Hall, “BullyBlocker: Towards the Identification of Cyber bullying in Social Networking Sites”, 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)
[7] Ana Kovaþeviü, “Cyber bullying detection using web content mining”, 22nd Telecommunications forum TELFOR 2014 Serbia, Belgrade, November 25-27, 2014
[8] Aishwarya Upadhyay, Akshay Chaudhari, Arunesh, Sarita Ghale, “Detection and Prevention measures for Cyber bullying and Online Grooming”, International Conference on Inventive Systems and Control (ICISC-2017)
[9] Charalampos Chelmis, Daphney–Stavroula Zois, Mengfan Yao, “Mining Patterns of Cyber bullying on Twitter”, 2017 IEEE International Conference on Data Mining Workshops
[10] Walisa Romsaiyud1 , Kodchakorn na Nakornphanom2 , Pimpaka Prasertsilp3 , Piyaporn Nurarak4 , Pirom Konglerd, “Automated Cyber bullying Detection using Clustering Appearance Patterns”, IEEE, 2017
[11] Aishwarya Upadhyay, Akshay Chaudhari, Arunesh, Sarita Ghale, “Detection and Prevention measures for Cyber bullying and Online Grooming”, International Conference on Inventive Systems and Control (ICISC-2017)
[12] Alanood Hamad Alduailej, Dr. Muhammad Badruddin Khan, “The challenge of cyber bullying and its automatic detection in Arabic text”, 2017 International Conference on Computer and Applications (ICCA)
 [13] Semiu Salawu, Yulan He, and Joanna Lumsden, “Approaches to Automated Detection of Cyber bullying: A Survey”, IEEE, 2017
[14] Noviantho, Sani Muhamad Isa, Livia Ashianti, “Cyber bullying Classification using Text Mining”, 2017 1st International Conference on Informatics and Computational Sciences (ICICoS)
[15] I-Hsien Ting, Wun Sheng Liou, Dario Liberona, Shyue-Liang Wang, Giovanny Mauricio Tarazona Bermudez, “Towards the Detection of Cyber bullying Based on Social Network Mining Techniques”, IEEE, 2017
[16] Divyashree, Vinutha H, Deepashree N S, “International Journal of Innovative Research in Computer and Communication Engineering”, Vol. 4, Issue 4, April 2016.
[17] Vivek K. Singh, Qianjia Huang, Pradeep K. Atrey, “Cyber bullying Detection Using Probabilistic Socio-Textual Information Fusion”, 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)
[18] Cynthia Van Hee∗ , Els Lefever∗ , Ben Verhoeven† , Julie Mennes∗ , Bart Desme, “Automatic Detection and Prevention of Cyber bullying”, 2015.
[19] K. Nalini, Dr. L. Jaba Sheela, “A survey on Datamining in Cyber Bullying”, 2014, International Journal on Recent and Innovation Trends in Computing and Communication Volume: 2 Issue: 7
 [20] Nektaria Potha, Manolis Maragoudakis, “Cyber bullying Detection using Time Series Modeling”, 2014 IEEE International Conference on Data Mining Workshop
 [21] Qianjia Huang, Vivek K. Singh, Pradeep K. Atrey, “Cyber Bullying Detection Using Social and Textual Analysis”, IEEE, 2014
 [22] Sourabh Parime, Vaibhav Suri, “Cyber bullying Detection and Prevention: Data Mining and Psychological Perspective”, 2014 International Conference on Circuit, Power and Computing Technologies [ICCPCT]
[23] J.I.Sheeba, Dr.K.Vivekanandan, “Low Frequency Keyword Extraction with Sentiment Classification and Cyberbully Detection Using Fuzzy Logic Technique”, 2013 IEEE International Conference on Computational Intelligence and Computing Research
[24] Samaneh Nadali, Masrah Azrifah Azmi Murad, Nurfadhlina Mohamad Sharef, Aida Mustapha,Somayeh Shojaee, “A Review of Cyber bullying Detection: An Overview”, 2013 13th International Conference on Intellient Systems Design and Applications
[25] Tibor Bosse and Sven Stam, “A Normative Agent System to Prevent Cyber bullying”, 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology
[26] AI-Ajlan &Ykhlef, “A deep learning-based method to detect cyber bullying on Twitter” 2019 IEEE explore
[27] T. S. Sathyanarayana Rao, “Cyber bullying: A virtual offense with real consequences” 2018 Indian J Psychiatry
[28] Kyriakos Charalampous, Constantina Demetriou, Loukia Tricha, Myria Ioannou, Stelios Georgiou, Militsa Nikiforou, Panayiotis Stavrinides, “The effect of parental style on bullying and cyber bullying behaviors and the mediating role of peer attachment relationships:A longitudinal study”

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details