Fake news detection using machine learning
Keywords:
fake news, machine learning, opinionAbstract
ID of the phony news is the pivotal advance. Calculation like SVM and NB are utilized in our task. Furthermore, we remove Fake news-explicit feeling information each Trend's instances, both labelled and unlabeled, and use it to enhance the understanding of Fake news-explicit opinion classifiers. News online has turned into the significant wellspring of data for individuals., much data showing up on the Internet is questionable and, surprisingly, planned to misdirect. Some phony news is so like the genuine ones that it is hard for human to distinguish them. robotized counterfeit news location devices like AI and profound learning models have turned into a fundamental necessity. additionally utilized stemming, lemmatization, stop word methods to get message portrayal for AI and profound learning models separately. The significant item perspectives are recognized in light of two perceptions. Fully intent on ordering words early on. This would permit to give a separated subset of phony news to end clients. We dissect and explore different avenues regarding a bunch of clear language-autonomous elements in view of the social spread of phony news to classify them into the presented typology
Downloads
References
Anusha Sinha, Nishant Arora, Shipra Singh, Mohita Cheema, Akthar Nazir "Counterfeit Product Review Monitoring Using Opinion Mining" International Journal of Pure and Applied Mathematics, Volume 119 No. 12 2018, ISSN: 1314-3395.
Bhanu Prakash Battula, KVSS Rama Krishna and Tai-hoon Kim " An Efficient Approach for Knowledge Discovery in Decision Trees utilizing Inter Quartile Range Transform" International Journal of Control and Automation , Vol. 8, No. 7 (2015), pp. 325-334, ISSN: 2005-4297 IJCA.
Bhaskar N Patel, Satish G. Prajapati and Dr. Kamaljit I. Lakhtaria "Effective Classification of Data Using Decision Tree" Bonfring International Journal of Data Mining, Vol. 2, No. 1, March 2012. ISSN 2277 - 5048.
Eka Dyar Wahyuni and Arif Djunaidy "Counterfeit audit discovery from an item survey utilizing changed technique for iterative calculation structure" MATEC Web of Conferences 58, 03003 (2016), DOI: 10.1051/matecconf/20165803003.
Elshrif Elmurngi and Abdelouahed Gherbi "Identifying Fake Reviews through Sentiment Analysis Using Machine Learning Techniques" International Conference on information Analysis, june2018, ISBN: 978-1-61208-603-3.
Gurneet Kaur and Abhinash Singla "Nostalgic Analysis of Flipkart surveys utilizing Naïve Bayes and Decision Tree calculation" International Journal of Advanced Research in Computer Engineering and Technology, Volume 5 Issue 1, January 2016, ISSN: 2278 - 1323.
Kolli Shivagangadhar, Sagar H, Sohan Sathyan, Vanipriya C.H " Fraud Detection in Online Reviews utilizing Machine Learning Techniques" International Journal of Computational Engineering Research, Volume, 05 , Issue 05 , May - 2015, ISSN (e): 2250 - 3005.
Michael Crawford,Taghi.M,Khoshgoftaar,Joseph.D. Prusa Aaron N. Richter and Hamzah Al Najada "Study of audit spam identification utilizing AI strategies" Journal of Big Data (2015) 2:23 ,Springer diary , DOI 10.1186/s40537-015-0029-9.
Manqing Dong , Lina yao, Xianzhi Wang Boualem Benatallah, Chaoran Huang Xiaodong Ning "Assessment Fraud Detection through Neural Autoencoder Decision Forest" a School of Computer Science and Engineering, University of New South Wales, Sydney 2052, Australia, 2018, www.elsevier.com.
Pooja Sharma and Rupali Bhartiya " Implementation of choice tree Algorithm to investigation of execution" International Journal of Advanced Research in Computer and Communication Engineering", Vol. 1, Issue 10, December 2012, ISSN : 2278-1021.
Qing-yun dai,Chun-ping Zhang and Hao wu " Research of Decision Tree Classification Algorithm in Data Mining" International Journal of Database Theory and Application, Vol.9, No.5 (2016), pp.1-8, ISSN: 2005-4270 IJDTA.
Rajashree S. Jadhav and Deipali V. Gore "A New Approach for Identifying Manipulated Online Reviews utilizing Decision Tree" International Journal of Computer Science and Information Technologies, Vol. 5 (2) , 2014, 1447-1450,ISSN0975-9646.
Rashmi Gomatesh Adike and Vivekanand Reddy "Identification of Fake Review and Brand Spam Using Data Mining Technique" International Journal of Recent Fake news in Engineering and Research, Volume 02, Issue 07; July - 2016, ISSN: 2455-1457.
Salma Farooq and Hilal Ahmad Khanday "Assessment Spam Detection: A Review" International Journal of Engineering Research and Development, Volume 12, Issue 4, e-ISSN: 2278-067X, p-ISSN: 2278-800X, April 2016.
Shashank Kumar "Exploration on Product Review Analysis and Spam Review Detection" Research entryway Conference Paper, February 2017, 317932754.
Rinartha, K., & Suryasa, W. (2017). Comparative study for better result on query suggestion of article searching with MySQL pattern matching and Jaccard similarity. In 2017 5th International Conference on Cyber and IT Service Management (CITSM) (pp. 1-4). IEEE.
Rinartha, K., Suryasa, W., & Kartika, L. G. S. (2018). Comparative Analysis of String Similarity on Dynamic Query Suggestions. In 2018 Electrical Power, Electronics, Communications, Controls and Informatics Seminar (EECCIS) (pp. 399-404). IEEE.
Aryani, L. N. A., & Lesmana, C. B. J. (2019). Neuropsychiatric factor and polymorphism gene in internet addiction. International Journal of Health & Medical Sciences, 2(1), 39-44. https://doi.org/10.31295/ijhms.v2n1.90
Published
How to Cite
Issue
Section
Copyright (c) 2022 International journal of health sciences

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the International Journal of Health Sciences (IJHS) are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJHS right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.
Articles published in IJHS can be copied, communicated and shared in their published form for non-commercial purposes provided full attribution is given to the author and the journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
This copyright notice applies to articles published in IJHS volumes 4 onwards. Please read about the copyright notices for previous volumes under Journal History.