Cyber Bullying Detection Using Machine Learning

Abstract:

Cyber bullying is the process of sending wrong messages to a person or community which causes heated debate with users. Cyberbullying is mostly seen in social networking sites where users reply to post with bullying words to threaten or insult other users. Cyberbullying is considered a misuse of technology. According to the latest survey done on all over the world data day by day, cases are increasing on cyberbullying. In order to solve this problem many natural language processing techniques are proposed by various authors which are time taking and not automatic. With the advancement of machine learning and artificial intelligence, models can be created and automatic detection can be implemented. To show this scenario live chat application is developed in python programming with multiple clients and one server and the Naive Bayes algorithm is used to train the model on a Twitter dataset and using this model live detection of cyberbullying is predicted and alert messages are shown on the chat application.

Problem statement:

       Social networking and online chatting application provide a platform for any user to share knowledge and talent but few users take this platform to threaten users with cyberbullying attacks which cause issues in using these platforms.

Objective:

    To provide a better platform for users to share knowledge on social networking sites there is a need for an effective detection system that can automate the process of cyberbullying detections and take decisions.

Existing system:

  • Techniques like unsupervised labeling methods which use N-gram, TF-IDF methods to detect cyberbullying are used which use the youtube dataset to detect attacks.
  • A support vector classifier is used to train models for detection.

Disadvantages:

         Techniques which are used in the existing system are not automated they need time to process request and update response.

           Social networking and chatting sites require automated detecting and processing methods.

Proposed system:

         Cyberbullying detection is designed using machine learning techniques. Twitter data set is collected with features and labels and mode is trained using the Naive Bayes algorithm and trained model is applied to live chatting application which has multiple clients and a single server. For each message, cyberbullying is detecting using the model and then alert messages are posted on chat boards.

Advantages:

         Cyberbullying detection process is automatic and time taken for detection is less and it works on the live environment. 

            The latest machine learning models are used for training models that are accurate.

Software Requirement:

Programming language: python

Front End GUI : tkinter

Dataset: Twitter cyberbullying dataset

Algorithm                       : Naive bayes

COVID-19 Data Analysis And Cases Prediction Using CNN

ABSTRACT:

Corona virus ( COVID-19 ) is creating panic all over the world with fast growing cases. There are various datasets available which provides information of world-wide effected information. Covid has affected all counties with large number of cases with variation of numbers under death, survived, effected. In this project we are using data set which has county wise details of cases with various combined features and labels. Covid data analysis and case prediction project provide solution for data analysis of various counties on various time and data factors and creating model for survival and death cases and prediction cases in future. Machine learning provides deep learning methods like Convolution neural network which is used for model creation and prediction for next few months are done using this project.  

PROBLEM STATEMENT:

      With the increase of COVID 19 cases all over the world daily predictions and analysis is required for effective control of pandemic all over the world

OBJECTIVE:

    By collecting data from Kaggle and new York dataset data preprocessing is performed and data analysis is performed on dataset and machine learning model is generated for future prediction of cases.

EXISTING SYSTEM:

  • Prediction was performed on COVID 19 cases based on different machine learning techniques which are based on x ray data set collected from COVID 19 patients.
  • Disease prediction from x ray images is done using deep learning techniques.

Disadvantages:

  • Data set used for predicting disease is different compare to one we are using for this project.
  • Image processing techniques are used.

PROPOSED SYSTEM:

Using data set pre-processing is performed on the collected data set and various steps for deep learning model is performed and prediction of cases is done then data analysis is done on various factors.

Advantages:

  • Data analysis and prediction is performed on textual data
  • Deep learning models are generated for predicting future cases.
  • Data analysis is performed for various factors.

SOFTWARE REQUIREMENTS

  • Operating system                   :           Windows XP/7/10
  • Coding Language              :           python
  • Development Kit                  :        anaconda 
  • Programming language: Python
  • IDE                                               :           Anaconda prompt

File Security Using Elliptic Curve Cryptography (ECC) in Cloud

Abstract:

Data security in cloud computing is a mostly researched topic which has various solutions like applying encryption to data and using multi cloud environment. But still there are many issues related to data security. In this project we are using ECC digital signature method to sign signature of user data while uploading to cloud and use same digital signature to download when required.

The Elliptic Curve Cryptography (ECC) is modern family of public-key cryptosystems, you can use an Elliptic Curve algorithm for public/private key cryptography. To be able to use ECC; cryptographic signatures, hash functions and others that help secure the messages or files are to be studied at a deeper level.

It implements all major capabilities of the asymmetric cryptosystems: Encryption, Signatures and Key Exchange The main advantage is that keys are a lot smaller. With RSA you need key servers to distribute public keys. With Elliptic Curves, you can provide your own public key.

In python, the above described method can be implemented using the   ECDSA Algorithm. 

Objective:

  • Using public key cryptosystems with both public and private key can give security for data compare to single key encryption. In this project ECC algorithm is used for security data to cloud and uploading data to cloud.

Existing system:

  • AES, DES are mostly used crypto graphic algorithms for securing data. These methods are used in most of the applications which use single key for encryption and decryption.

Disadvantages:

  • These methods are old methods which are used in most of the applications.
  • They use single key for encryption and decryption.

Proposed system:

  • In cloud environment data security is very important as data is stored in third party servers there is need to effective multi key encryption techniques like ECC algorithms. In this project we are using ECC algorithm in python language and using cloud to store encrypted data.

Advantages:

  • Time taken for encryption process is less
  • Multiple keys are used for encryption and decryption process.

Architecture:

Software Requirement: 

  • Operating system           :           Windows XP/7/10
  • Coding Language           :           Html, JavaScript,  
  • Development Kit             :        Flask Framework
  • Database                             :           SQLite
  • IDE                                          :           Anaconda prompt

Online Rental System or Universal Rental Capture .Net Project

Download the complete Online Rental System or Universal Rental Capture .Net Project code, Full Report, PPT.

Abstract

It will make web implementation different for different cities. Instead of delivering products from a single rental exhibition, these visits act as mediators between the user and the owner of the rental exhibition. There is no prohibited sale to our customers on our website. Rental show owners want to launch their product on our website and then they can easily register on our website with personal information and credit card numbers.

Online-Rental-System
Online-Rental-System

The application provides the supplier with additional repair services to repair or remove their products. Customers do not need to register on our site with just one request and location instructions on our site. We are responsible for communication between customers and suppliers and maintain the database. It also has an ecological module that accepts customer feedback. The application provides another function in “Transport Services”.

There are many online rental systems. But not all products are available in one place. At the same time, many are trapped in the same city. This means that the car rental system is only implemented in online transactions with cars. At the same time, many of them do not provide the right relationship between the customer and the supplier. At the same time, existing rental systems are limited to a supplier, which means that products are available in the rental space.

 Existing System:

If someone wants to buy a house in a particular city from their home, how is that possible? If you go to another city, but if you want to rent a product before you reach your goal, how is that possible? So the answer to these questions is through our website.

There are many marketing systems online. But not all products are available in one place. At the same time, many are trapped in the same city. This means that the car rental system is only implemented in online transactions with cars. At the same time, many of them do not provide the right relationship between the customer and the supplier. At the same time, existing rental systems are limited to a supplier, which means that products are available in the rental showroom..

Draw backs:

  • It is limited to individual products and cities.
  • Tune There is no good relationship between user and supplier.
  • Products are limited to a room in the exhibition rental area..

PROPOSED SYSTEM

A basic system is a web-based system that customers can use anywhere in the world. The system can deliver more products in stores in different locations.

The direct market enters into the system with this system without a targeted approach. You can pay to advertise your rental product by announcing your credit card number.

The proposed system can accept all types of rental products, compatible with the system broker so that sellers upload their product images to the system. The customer communicates directly with this product image and receives relevant information about the rental product.

The proposed system receives an online request from the customer to have the trading system deliver each product for its intended purpose. Here plays an important role. The administrator can obtain product information for each product and specific vendors using this system..

Modules

  1. Registration
  2. Advertise product
  3. Data base maintenance
  4. Searching and Booking the product
  5. Verify Bookings and Intimate to Vendor
  6. Authentication

Vendor Registration Module:

Marketers complement the web by providing personal information and the type of success. 

Advertise Products Module:

Once you have entered the link to the sales page, you will sell your product and add a product form and provide relevant information about the product, such as identification tag, availability date, rents, etc. and save the product image..

It consists of following sub modules:

  1. Update Product
  2. Delete Product 

Update Product Module:

The supplier can update existing product information, such as rental agreement, date of preparation, etc. through product identification. 

Delete Product Module:

The seller can destroy his existing product by identifying the product. 

Data base maintenance Module:

Information provided by the company, such as product information, personal information, etc. And client-supplied data, such as answers and book information, will be stored in a database of webmasters.

Searching and Booking the products Module:

The customer, when he arrives at the place where he or she is looking for a product, if he or she receives the required product, just fill out the booking form and use the database..

Verify Bookings and Intimate to Vendo Moduler:

The administrator after logging into the site verifies the client for the latest books. You must then send all the book information to the seller.

Authentication Module:

Authentication is nothing more than to guarantee system security. Here everyone has to log in to the system login page. The login page blocks users with UN approval. The user must provide their login details such as ID and password to access the system. For this reason, the system protects all users’ data. When a user enters an ID and password, they verify the user’s presence in the database. If there is a user, they can be treated as a valid user. Otherwise, the request will be postponed.

Software Requirements:

Database : SQL Server 2008

Tools: Microsoft Visual Studio .Net-2012

Code: C#.Net

Download The below attached Full Project Source Code, Project Report, Output screens.

Veterinary Website Management System Java Project

Abstract:

Online applications are playing an important role in our day to day life from online shopping to doctor booking which is saving time and helping ineffective management of resources. As of now, there are no applications for online doctor appointments for veterinary systems. In this project java based web application is designed, which as features for booking an appointment by checking the availability of a doctor and then select specific doctor specialization and a form is shown to the user who will fill the form based on animal condition and symptoms and do online payment. Books are conformed by admin and updates are sent to the doctor regarding bookings along with details the user has filled. The project is designed with three modules admin, user, and doctor. Entire data is managed in a centralized database using the MySQL database.

Existing system:

At present, there are many websites that provide online veterinary services but they have only details of doctors and type of treatment. There are no online services like booking appointments, sending patient details ..etc.

Disadvantages:

  • Websites which provide veterinary services are limited to specific service only
  • Users need to wait for a long time for finding a doctor and getting treatment

Proposed system:

In proposed system website is developed with advanced features for Veterinary purpose which has features of online appointment booking, checking the availability of doctors with timings, Advance patient information updating and online payment.

Advantages:

  • Users can save time by processing through this website
  • Easy to find if a doctor is available based on our required treatment.

Modules:

Admin:

Admin will look after the application who will check users and doctors and confirm appointments and send emails to the user. Admin updated user booking status to the doctor online.

User:

The user should register with the application he is basically a person who wants to get his pet to be treated. The user will select the type of doctor and treatment and fill form related to a problem and check the availability of doctors and book appointments and confirm the booking.

Doctor:

The doctor will register with the application based on his specialization and what type of service he provides. A doctor can check booking uses details and check the form which use has filled to know about patient status.

HARDWARE AND SOFTWARE REQUIREMENTS

Hardware Requirements

Processor : Intel 2.0 Ghz Or Above
Hard Disk : 200 Gb
Ram : 2 gb Ram.

Software Requirements

Operating System: Windows XP With Sp2.
Language (Front End) Java (Jdk1.5/1.6)
Server: Apache Tomcat 5.5/6.0
Web Technology: Html, Javascript, CSS.
Database (Back End): MySQL
Architecture: 3-Tier Architecture