SlideShare a Scribd company logo
PREDICTING CYBER
BULLYING ON TWITTER
USING MACHINE LEARNING
U N D E R T H E G U I D A N C E O F ,
D R . E . I L A V A R A S A N , M . T E C H . , P H . D , P R O F E S S O R
P O N D I C H E R R Y E N G I N E E R I N G C O L L E G E
T E A M M E M B E R S :
Z A H I D S H A B A N M I R ( 2 0 C S 3 3 9 )
J O H N P A U L A ( 2 0 C S 3 3 1 )
AGENDA
Introduction
Problem Definition
Objectives of the proposed system
Literature Review
Proposed System
Current Status of the project
Hardware and Software requirements
Conclusion
References
INTRODUCTION
In today’s world which has been made smaller by technology,
new age problems have been born.
No doubt technology has a lot of benefits; however, it also comes
with a negative side. It has given birth to cyberbullying.
To put it simply, cyberbullying refers to the misuse of information
technology with the intention to harass others. Subsequently,
cyberbullying comes in various forms.
It doesn’t necessarily mean hacking someone’s profiles or posing
to be someone else.
INTRODUCTION
It also includes posting negative comments about somebody
or spreading rumors to defame someone.
As everyone is caught up on the social network, it makes it
very easy for anyone to misuse this access.
For this reason prediction of cyberbullying has become area
of research.
PROBLEM DEFINITION
In the last few years, online communication has shifted toward user-
driven technologies, such as SM websites, blogs, online virtual
communities, and online sharing platforms.
New forms of aggression and violence emerge exclusively online. The
dramatic increase in negative human behavior on SM, with high
increments in aggressive behavior, presents a new challenge.
Consequently, developing a cyber bullying prediction model that
detects aggressive behavior that is related to the security of human
beings is more important than developing a prediction model for
aggressive behavior related to the security of machines.
OBJECTIVES OF THE PROPOSED SYSTEM:
To propose our project NLP (Natural Language Processing) and
Machine learning techniques for Cyberbullying prediction in social
media.
•By using NLP, get lot of features like sentiment analysis, pos-
tagging, noun phrase extraction, etc


Merits
OBJECTIVES OF THE PROPOSED SYSTEM:
A word can appear as a verb in a sentence, whereas in other sentences, it can
appear as an adverb. Also, based on the sentence structure, a word can be in
the present, past, or past participle form.
If we consider including all these words instead of stemming these words into
their root form as part of our model, then dictionary size will be huge, and also,
the model will perform a massive amount of unnecessary calculation, which is
an inefficient use of the memory.
So, ultimately the model will take more time during the training process. To
avoid all these, we perform stemming operations to convert each word into its
root form.
LITERATURE REVIEW
LITERATURE REVIEW
LITERATURE REVIEW
LITERATURE REVIEW
LIMITATIONS OF THE EXISTING SYSTEM/RESEARCH
ISSUES:
Cyberbullying prediction based on Content-based features of
various machine learning methods.
Increasing over fitting risk when the number of observations is
insufficient
Over fitting is not reduced.
The given paper uses only text message as input.
Demerits:
LIMITATIONS OF THE EXISTING SYSTEM/RESEARCH
ISSUES:
Training patterns cannot be updated dynamically .It has to be
manually done every time
The model takes more time during the training process to
convert the each words to itsroot form.
The given model does not deal with the real time problem where
now days usage of words has modified people tend to use emoji
and emoticons rather than typing words in such cases the
proposed model does not have all the above mentioned
features.
Existing System
Collect input tweets from the tweeter.
Preprocessing of input comments – remove
duplicates, stop words, punctuations.
Train the model using SVM and hyperparamater
tunning is also done.
Visualize the aspects of the given model.
1.
2.
3.
4.
THE PROPOSED SYSTEM
1.Collect input(text,audio) tweets from the tweeter.
2.Coversion of emoji and audio to text is done.
3.Preprocessing of input comments – remove duplicates,
stop words, punctuations.
4.Train the model using RNN and hyperparamater tunning is
also done.
5.Visualize the aspects of the given model.
ARCHITECTURE OF PROPOSED SYSTEM
INPUT DATA
Text
Text with emoji’s
Audio file
Emoji’s are converted
into text
After removal of noise
audio files are
converted into text.
DATA PREPROCESSING
•Tokenization(chopping it up into pieces)
•Removing Stop Word(filtering of words)
•Stemming and Lemmitazation (generation of root words)
•GLoVe(Global Vectors for Word Representation)
RNN
Recurrent Neural Network


• Deep learning
•Sequential data
•Output from previous step
are fed as input to the current
step.
•Important feature of RNN is
Hidden state, which
remembers some information
about a sequence.
Current Status of the project
•Collected the Datasets
•Working with the datasets
Input and Output
Example for cyber bullying or non- cyber bullying:


Cyber bullying
What.. you are an idiot?.
Non- cyber bullying
That person is a hero to us all.
Hardware and Software requirements
Environment:
•Software Requirements:
•Cloud Tool: Anaconda
•Operating system: 64 Bit OS (Windows 7/ 8 / 10) / Linux
•Scripting : Python
•IDE : Jupyter notebook,Google colab or Spyder.
Hardware Requirements:
•RAM: Minimum 4GB
•ROM: 20 GB minimum
CONCLUSION
Considering that social media has become the most common way to communicate,
cyberbullying is the most common method of bullying.
It is important to delete cyberbullying because it is plaguing every user, including
our next generation .
The situation with cyber bullying is getting only worse, as the incidents of
depression and suicide are only increasing.In this we use NLP (Natural Language
Processing) and Machine learning techniques for Cyberbullying prediction in social
media.
We believe that the current study will provide crucial details on and new directions
in the field of detecting aggressive human behavior, including cyberbullying
detection in online social networking sites.
Reference
[1]. Mohammed ali al-garadi, Mohammad rashid hussain , Nawsher khan , Ghulam murtaza,
Henry friday nweke, Ihsan ali , Ghulam mujtaba, Haruna chiroma , Hasan ali khattak , and
Abdullah gani .“Predicting Cyberbullying on Social Media in the Big Data Era Using Machine
Learning Algorithms: Review of Literature and Open Challenges. vol.7, pp. 70701 - 70718, 22
May 2019,doi.10.1109/ACCESS.2019.2918354.
[2]. Waleed Mugahed Al-Rahmi ; Noraffandy Yahaya ; Mahdi M. Alamri,” A Model of Factors
Affecting Cyber Bullying Behaviors Among University Students. vol. 7, pp. 153417– 153431,
October. 2019,doi. 10.1109/ACCESS.2018.2881292.
[3].Norah Basheer Alotaibi :” Cyber Bullying and the Expected Consequences on the Students’
Academic Achievement”. vol. 7, pp.153417 - 153431, 16 October 2019, doi.
10.1109/ACCESS.2019.2947163.
Reference
[4]. Pete Burnap1 and Matthew L Williams,” Us and them: identifying cyber hate on Twitter
across multiple protected characteristics”, Burnap and Williams ,. EPJ Data Science vol. 5,
Article number: 11, 23 March 2016,doi. 10.1140/epjds/s13688-016-0072-6.
•
[5]. Egundo Moisés Toapanta, John Angelo Recalde Monar, Luis Mafla Gallegos,”Prototype to
Perform Audit in Social Networks to Determine Cyberbullying”. 01 October
2020,doi.10.1109/WorldS450073.2020.9210335.
•
[6]. Saloni Wade1, Maithili Parulekar2, Prof. Kumud Wasnik,” Cyber Bullying Detection on
Twitter Mining” International research journal of engineering and technology (IRJET) vol. 07,
issue: 07 , July 2020.
QUERIES
THANK YOU

More Related Content

What's hot (20)

PPSX
Face recognition technology - BEST PPT
Siddharth Modi
 
PDF
20 Latest Computer Science Seminar Topics on Emerging Technologies
Seminar Links
 
PPTX
SPEECH RECOGNITION USING NEURAL NETWORK
Kamonasish Hore
 
PPTX
Credit card fraud detection
vineeta vineeta
 
PPT
Face Detection and Recognition System
Zara Tariq
 
PPTX
Deep Learning Explained
Melanie Swan
 
PPT
Fingerprint voting system
jannatul haque
 
PPTX
Blockchain voting
sandhyajoshi17
 
PDF
Facial emotion recognition
Rahin Patel
 
PPTX
ATM System by image processing
shahab islam
 
PPTX
Graphical password authentication
Asim Kumar Pathak
 
PDF
E-voting system with blockchain
yashgupta9121
 
PPTX
Machine Learning for Disease Prediction
Mustafa Oğuz
 
PDF
Using Machine Learning in Networks Intrusion Detection Systems
Omar Shaya
 
PDF
Speech emotion recognition
saniya shaikh
 
PPTX
Seminar on detecting fake accounts in social media using machine learning
Parvathi Sanil Nair
 
PPTX
Facial Expression Recognition System using Deep Convolutional Neural Networks.
Sandeep Wakchaure
 
PPT
Intruders
techn
 
PPTX
Automatic number plate recognition using matlab
ChetanSingh134
 
PPTX
MD5 ALGORITHM.pptx
Rajapriya82
 
Face recognition technology - BEST PPT
Siddharth Modi
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
Seminar Links
 
SPEECH RECOGNITION USING NEURAL NETWORK
Kamonasish Hore
 
Credit card fraud detection
vineeta vineeta
 
Face Detection and Recognition System
Zara Tariq
 
Deep Learning Explained
Melanie Swan
 
Fingerprint voting system
jannatul haque
 
Blockchain voting
sandhyajoshi17
 
Facial emotion recognition
Rahin Patel
 
ATM System by image processing
shahab islam
 
Graphical password authentication
Asim Kumar Pathak
 
E-voting system with blockchain
yashgupta9121
 
Machine Learning for Disease Prediction
Mustafa Oğuz
 
Using Machine Learning in Networks Intrusion Detection Systems
Omar Shaya
 
Speech emotion recognition
saniya shaikh
 
Seminar on detecting fake accounts in social media using machine learning
Parvathi Sanil Nair
 
Facial Expression Recognition System using Deep Convolutional Neural Networks.
Sandeep Wakchaure
 
Intruders
techn
 
Automatic number plate recognition using matlab
ChetanSingh134
 
MD5 ALGORITHM.pptx
Rajapriya82
 

Similar to Predicting cyber bullying on t witter using machine learning (20)

PPTX
Detecting Threat messages using deep learning.pptx
pramu8279
 
PPTX
Cyber Bullying Detection using SVM and LSTM
KarthikMThirthahalli
 
PDF
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
IRJET Journal
 
PDF
A study of cyberbullying detection using Deep Learning and Machine Learning T...
IRJET Journal
 
PDF
A study of cyberbullying detection using Deep Learning and Machine Learning T...
IRJET Journal
 
PPTX
final review ppt of engineering hypothetic arm
ssuserd24233
 
PDF
Detection of Cyberbullying on Social Media using Machine Learning
IRJET Journal
 
PDF
Cyberbullying Detection Using Machine Learning
IRJET Journal
 
PDF
Cyberbullying Detection on Social Networks Using Machine Learning Approaches
IRJET Journal
 
PDF
Comparative Study of Cyberbullying Detection using Different Machine Learning...
ijtsrd
 
DOCX
A Review on Deep-Learning-Based Cyberbullying Detection
Shakas Technologies
 
PPTX
Presentation2.pptx
katidaw310
 
PDF
A Machine Learning Ensemble Model for the Detection of Cyberbullying
gerogepatton
 
PDF
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
ijaia
 
PDF
A Machine Learning Ensemble Model for the Detection of Cyberbullying
gerogepatton
 
PDF
IRJET - Cyberbulling Detection Model
IRJET Journal
 
PDF
Cyber bullying detection project documents free downloas
alljobsssinfotech
 
PPTX
Initial PPT1.ppt for cyber bullying detection
401ChaitanyaBajjuri
 
PDF
Bullyspoiler: Detect and Block Cyberbullying Tweet and Bully using Deep Learn...
Associate Professor in VSB Coimbatore
 
PDF
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
Lisa Muthukumar
 
Detecting Threat messages using deep learning.pptx
pramu8279
 
Cyber Bullying Detection using SVM and LSTM
KarthikMThirthahalli
 
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
IRJET Journal
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
IRJET Journal
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
IRJET Journal
 
final review ppt of engineering hypothetic arm
ssuserd24233
 
Detection of Cyberbullying on Social Media using Machine Learning
IRJET Journal
 
Cyberbullying Detection Using Machine Learning
IRJET Journal
 
Cyberbullying Detection on Social Networks Using Machine Learning Approaches
IRJET Journal
 
Comparative Study of Cyberbullying Detection using Different Machine Learning...
ijtsrd
 
A Review on Deep-Learning-Based Cyberbullying Detection
Shakas Technologies
 
Presentation2.pptx
katidaw310
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
gerogepatton
 
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
ijaia
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
gerogepatton
 
IRJET - Cyberbulling Detection Model
IRJET Journal
 
Cyber bullying detection project documents free downloas
alljobsssinfotech
 
Initial PPT1.ppt for cyber bullying detection
401ChaitanyaBajjuri
 
Bullyspoiler: Detect and Block Cyberbullying Tweet and Bully using Deep Learn...
Associate Professor in VSB Coimbatore
 
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
Lisa Muthukumar
 
Ad

Recently uploaded (20)

PPTX
Introduction to Design of Machine Elements
PradeepKumarS27
 
PPTX
Lecture 1 Shell and Tube Heat exchanger-1.pptx
mailforillegalwork
 
PPTX
Product Development & DevelopmentLecture02.pptx
zeeshanwazir2
 
PDF
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
PDF
MAD Unit - 1 Introduction of Android IT Department
JappanMavani
 
PDF
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
PDF
Basic_Concepts_in_Clinical_Biochemistry_2018كيمياء_عملي.pdf
AdelLoin
 
PPTX
Damage of stability of a ship and how its change .pptx
ehamadulhaque
 
PPTX
GitOps_Without_K8s_Training_detailed git repository
DanialHabibi2
 
PPTX
Evaluation and thermal analysis of shell and tube heat exchanger as per requi...
shahveer210504
 
PDF
Zilliz Cloud Demo for performance and scale
Zilliz
 
PPTX
Thermal runway and thermal stability.pptx
godow93766
 
PPTX
Types of Bearing_Specifications_PPT.pptx
PranjulAgrahariAkash
 
PPTX
GitOps_Without_K8s_Training simple one without k8s
DanialHabibi2
 
PDF
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
PPT
PPT2_Metal formingMECHANICALENGINEEIRNG .ppt
Praveen Kumar
 
PPTX
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 
PPTX
Day2 B2 Best.pptx
helenjenefa1
 
PPTX
Solar Thermal Energy System Seminar.pptx
Gpc Purapuza
 
PDF
MAD Unit - 2 Activity and Fragment Management in Android (Diploma IT)
JappanMavani
 
Introduction to Design of Machine Elements
PradeepKumarS27
 
Lecture 1 Shell and Tube Heat exchanger-1.pptx
mailforillegalwork
 
Product Development & DevelopmentLecture02.pptx
zeeshanwazir2
 
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
MAD Unit - 1 Introduction of Android IT Department
JappanMavani
 
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
Basic_Concepts_in_Clinical_Biochemistry_2018كيمياء_عملي.pdf
AdelLoin
 
Damage of stability of a ship and how its change .pptx
ehamadulhaque
 
GitOps_Without_K8s_Training_detailed git repository
DanialHabibi2
 
Evaluation and thermal analysis of shell and tube heat exchanger as per requi...
shahveer210504
 
Zilliz Cloud Demo for performance and scale
Zilliz
 
Thermal runway and thermal stability.pptx
godow93766
 
Types of Bearing_Specifications_PPT.pptx
PranjulAgrahariAkash
 
GitOps_Without_K8s_Training simple one without k8s
DanialHabibi2
 
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
PPT2_Metal formingMECHANICALENGINEEIRNG .ppt
Praveen Kumar
 
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 
Day2 B2 Best.pptx
helenjenefa1
 
Solar Thermal Energy System Seminar.pptx
Gpc Purapuza
 
MAD Unit - 2 Activity and Fragment Management in Android (Diploma IT)
JappanMavani
 
Ad

Predicting cyber bullying on t witter using machine learning

  • 1. PREDICTING CYBER BULLYING ON TWITTER USING MACHINE LEARNING U N D E R T H E G U I D A N C E O F , D R . E . I L A V A R A S A N , M . T E C H . , P H . D , P R O F E S S O R P O N D I C H E R R Y E N G I N E E R I N G C O L L E G E T E A M M E M B E R S : Z A H I D S H A B A N M I R ( 2 0 C S 3 3 9 ) J O H N P A U L A ( 2 0 C S 3 3 1 )
  • 2. AGENDA Introduction Problem Definition Objectives of the proposed system Literature Review Proposed System Current Status of the project Hardware and Software requirements Conclusion References
  • 3. INTRODUCTION In today’s world which has been made smaller by technology, new age problems have been born. No doubt technology has a lot of benefits; however, it also comes with a negative side. It has given birth to cyberbullying. To put it simply, cyberbullying refers to the misuse of information technology with the intention to harass others. Subsequently, cyberbullying comes in various forms. It doesn’t necessarily mean hacking someone’s profiles or posing to be someone else.
  • 4. INTRODUCTION It also includes posting negative comments about somebody or spreading rumors to defame someone. As everyone is caught up on the social network, it makes it very easy for anyone to misuse this access. For this reason prediction of cyberbullying has become area of research.
  • 5. PROBLEM DEFINITION In the last few years, online communication has shifted toward user- driven technologies, such as SM websites, blogs, online virtual communities, and online sharing platforms. New forms of aggression and violence emerge exclusively online. The dramatic increase in negative human behavior on SM, with high increments in aggressive behavior, presents a new challenge. Consequently, developing a cyber bullying prediction model that detects aggressive behavior that is related to the security of human beings is more important than developing a prediction model for aggressive behavior related to the security of machines.
  • 6. OBJECTIVES OF THE PROPOSED SYSTEM: To propose our project NLP (Natural Language Processing) and Machine learning techniques for Cyberbullying prediction in social media. •By using NLP, get lot of features like sentiment analysis, pos- tagging, noun phrase extraction, etc Merits
  • 7. OBJECTIVES OF THE PROPOSED SYSTEM: A word can appear as a verb in a sentence, whereas in other sentences, it can appear as an adverb. Also, based on the sentence structure, a word can be in the present, past, or past participle form. If we consider including all these words instead of stemming these words into their root form as part of our model, then dictionary size will be huge, and also, the model will perform a massive amount of unnecessary calculation, which is an inefficient use of the memory. So, ultimately the model will take more time during the training process. To avoid all these, we perform stemming operations to convert each word into its root form.
  • 12. LIMITATIONS OF THE EXISTING SYSTEM/RESEARCH ISSUES: Cyberbullying prediction based on Content-based features of various machine learning methods. Increasing over fitting risk when the number of observations is insufficient Over fitting is not reduced. The given paper uses only text message as input. Demerits:
  • 13. LIMITATIONS OF THE EXISTING SYSTEM/RESEARCH ISSUES: Training patterns cannot be updated dynamically .It has to be manually done every time The model takes more time during the training process to convert the each words to itsroot form. The given model does not deal with the real time problem where now days usage of words has modified people tend to use emoji and emoticons rather than typing words in such cases the proposed model does not have all the above mentioned features.
  • 14. Existing System Collect input tweets from the tweeter. Preprocessing of input comments – remove duplicates, stop words, punctuations. Train the model using SVM and hyperparamater tunning is also done. Visualize the aspects of the given model. 1. 2. 3. 4.
  • 15. THE PROPOSED SYSTEM 1.Collect input(text,audio) tweets from the tweeter. 2.Coversion of emoji and audio to text is done. 3.Preprocessing of input comments – remove duplicates, stop words, punctuations. 4.Train the model using RNN and hyperparamater tunning is also done. 5.Visualize the aspects of the given model.
  • 17. INPUT DATA Text Text with emoji’s Audio file Emoji’s are converted into text After removal of noise audio files are converted into text.
  • 18. DATA PREPROCESSING •Tokenization(chopping it up into pieces) •Removing Stop Word(filtering of words) •Stemming and Lemmitazation (generation of root words) •GLoVe(Global Vectors for Word Representation)
  • 19. RNN Recurrent Neural Network • Deep learning •Sequential data •Output from previous step are fed as input to the current step. •Important feature of RNN is Hidden state, which remembers some information about a sequence.
  • 20. Current Status of the project •Collected the Datasets •Working with the datasets
  • 21. Input and Output Example for cyber bullying or non- cyber bullying: Cyber bullying What.. you are an idiot?. Non- cyber bullying That person is a hero to us all.
  • 22. Hardware and Software requirements Environment: •Software Requirements: •Cloud Tool: Anaconda •Operating system: 64 Bit OS (Windows 7/ 8 / 10) / Linux •Scripting : Python •IDE : Jupyter notebook,Google colab or Spyder. Hardware Requirements: •RAM: Minimum 4GB •ROM: 20 GB minimum
  • 23. CONCLUSION Considering that social media has become the most common way to communicate, cyberbullying is the most common method of bullying. It is important to delete cyberbullying because it is plaguing every user, including our next generation . The situation with cyber bullying is getting only worse, as the incidents of depression and suicide are only increasing.In this we use NLP (Natural Language Processing) and Machine learning techniques for Cyberbullying prediction in social media. We believe that the current study will provide crucial details on and new directions in the field of detecting aggressive human behavior, including cyberbullying detection in online social networking sites.
  • 24. Reference [1]. Mohammed ali al-garadi, Mohammad rashid hussain , Nawsher khan , Ghulam murtaza, Henry friday nweke, Ihsan ali , Ghulam mujtaba, Haruna chiroma , Hasan ali khattak , and Abdullah gani .“Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Learning Algorithms: Review of Literature and Open Challenges. vol.7, pp. 70701 - 70718, 22 May 2019,doi.10.1109/ACCESS.2019.2918354. [2]. Waleed Mugahed Al-Rahmi ; Noraffandy Yahaya ; Mahdi M. Alamri,” A Model of Factors Affecting Cyber Bullying Behaviors Among University Students. vol. 7, pp. 153417– 153431, October. 2019,doi. 10.1109/ACCESS.2018.2881292. [3].Norah Basheer Alotaibi :” Cyber Bullying and the Expected Consequences on the Students’ Academic Achievement”. vol. 7, pp.153417 - 153431, 16 October 2019, doi. 10.1109/ACCESS.2019.2947163.
  • 25. Reference [4]. Pete Burnap1 and Matthew L Williams,” Us and them: identifying cyber hate on Twitter across multiple protected characteristics”, Burnap and Williams ,. EPJ Data Science vol. 5, Article number: 11, 23 March 2016,doi. 10.1140/epjds/s13688-016-0072-6. • [5]. Egundo Moisés Toapanta, John Angelo Recalde Monar, Luis Mafla Gallegos,”Prototype to Perform Audit in Social Networks to Determine Cyberbullying”. 01 October 2020,doi.10.1109/WorldS450073.2020.9210335. • [6]. Saloni Wade1, Maithili Parulekar2, Prof. Kumud Wasnik,” Cyber Bullying Detection on Twitter Mining” International research journal of engineering and technology (IRJET) vol. 07, issue: 07 , July 2020.