FND Report Final
FND Report Final
An Internship Report
On
BACHELOR OF ENGINEERING
In
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
Submitted By
RAJANI K 4GM21CS076
SHARADHI S G 4GM21CS097
SHREYA N M H 4GM21CS100
SUSHMITHA V N 4GM21CS112
Anjaneya Temple opposite, 1st Main, 1st Cross, Near UBDT Boys Hostel Road,
Davangere, Karnataka 57700
2022-2023
Srishyla Educational Trust (R), Bheemasamudra
CERTIFICATE
Certified that the Internship titled “Fake News Detection” is a bonafide work carried out by
RAJANI K (4GM21CS076), SHARADHI S G (4GM21CS097), SHREYA N M H
(4GM21CS100), SUSHMITHA V N (4GM21CS112) as per curriculum scheme 2021 with
course code 21INT49 of Bachelor of Engineering in the Department of Computer Science and
Engineering of the Visvesvaraya Technological University, Belagavi, during the year 2022-23.
The internship report has been approved as it satisfies the academic requirements with respect
to the Internship work prescribed for Bachelor of Engineering Degree.
External Viva
1.
2.
ACKNOWLEDGEMENT
The joy and satisfaction that accompany the successful completion of any task would be
incomplete without the mention of the people who made it possible.
We would like to express our gratitude to our Principal, Dr. Sanjay Pande M B for providing
us a congenial environment for engineering studies and also for having showed us the way to
carry out the Internship work.
We would like to thank our Guide Mrs. Sandhya R Savanur, Assistant Professor, Department
of Computer Science and Engineering for support, guidance, motivation, encouragement for
the successful completion of this Internship work.
We would like to thank our mentor Mr. Shivali S, Sirintel technologies, for providing
resources, sharing knowledge and providing industry working environment.
We intend to thank all the teaching and non-teaching staffs of our Department of Computer
Science and Engineering for their immense help and co-operation.
Finally, we would like to express our gratitude to our parents and friends who always stood by
us.
Student Name
RAJANI K 4GM21CS076
SHARADHI S G 4GM21CS097
SHREYA N M H 4GM21CS100
SUSHMITHA V N 4GM21CS112
Srishyla Educational Trust ® Bheemasamudra
GM INSTITUTE OF TECHNOLOGY, DAVANGERE
Department of Computer Science & Engineering
Vision
Mission
Page No.
FIGURE
FIGURE NAME PAGE NO.
NO.
5.1 Home Page of GUI 22
1.1. HISTORY:
• HR DIRECTOR: MAMATA T
• TECHNICAL HEAD: SHIVALI S
• COMPANY PH: +91-89712791247
• EMAIL ID: SIRINTEL.TEC@GMAIL.COM
One good idea can rule the world. The idea of company was started with the expectation of
meeting requirements of real time projects. Sirintel Technologies is a leading firm providing
technological solutions to various students across the state of Karnataka to enrich their
knowledge with practical experience and live training through various projects. Being situated
in the city of Davangere, the center place of Karnataka, Sirintel Technologies is accessible to
all the students throughout Karnataka. It is having a geographical advantage being in the center
city of Karnataka.
1
Fake News Detection
1.2. VISION:
The Main vision of Sirintel Technologies is " To be a key player in deployment of Knowledge
Technology, by producing and providing versatile and resourceful professionals to the growing
Industries. The vision of Sirintel Technologies is to involve its students in never-ending
Engineering Research and make them excel in Quality Education. In the years to come its
vision is to keep its students in the forefront in Engineering and Technological Education.
Moreover, it should remain forever a world class institution for technological education and
scientific research for public good.
1.3. MISSION:
To create and sustain a community of learning in which students acquire knowledge and learn
to apply it professionally with due consideration for ethical, ecological and economic issues
2
Fake News Detection
1.5. STRATEGY:
Our strategy is built on the strong foundation of corporate values. To drive the focus of
entire organization and to ensure successful implementation we have designed strategies such
as :
• Inspiring Students
• Establishing ultimate Expert Service Arena
• Knowledge Sharing and enhancement
• Embracing Sirintel Technologies to be the global performer
• Produce Pristine results and project solutions
3
Fake News Detection
The company is new and is having big plans to hit the big success in future. To ensure that the
Sirintel Technologies achieves its goals in the long run, we are carrying on the following
activities:
➢ We are approaching the Government with new projects in various fields such as
transportation, maintenance of records, Rural data etc.
➢ We are also planning to design various medical electronic devices at the lower cost.
➢ Planning to be broad based all over India and to enter the global markets in future.
4
Fake News Detection
Chapter 2: INTRODUCTION
2.1. OBJECTIVES:
➢ To detect fake news effectively to avoid defamation of individuals.
➢ Determines the accuracy of the “Fake News Detector”.
Passive: If the prediction is correct, keep the model and do not make any changes. i.e.,
the data in the example is not enough to cause any changes in the model.
Aggressive: If the prediction is incorrect, make changes to the model. i.e., some change
to the model may correct it.
5
Fake News Detection
Confusion Matrix:
It is extremely useful for measuring Recall, Precision, Specificity, Accuracy, and most
importantly AUC-ROC curves.
Let’s take TP, FP, FN, TN in terms of pregnancy analogy.
6
Fake News Detection
True Positive:
Interpretation: If it is predicted positive and it’s true.
Prediction is that a woman is pregnant and she actually is.
True Negative:
Interpretation: If it is predicted negative and it’s true.
Prediction is that a man is not pregnant and he actually is not.
7
Fake News Detection
Section 2.1 explains the objective of our project “Fake News Detection”. Section 2.2 gives the
problem statement. Section 2.3 explains the proposed solution for the problem statement.
Section 3 lists the week wise report of tasks completed during internship period. Section 4.1
includes the technical outcomes of the project. Section 4.2 includes the details of how
internship helped in personality development. Section 4.3 details about the time management
skills learnt during internship. Section 4.4 describes the technical skills learnt during the
internship. Section 5 contains results and conclusion.
8
Fake News Detection
What is Python?
Python is a popular programming language. It was created by Guido van Rossum, and released
in 1991.
It is used for:
Why Python?
• Python works on different platforms (Windows, Mac, Linux, Raspberry Pi, etc.).
9
Fake News Detection
Data Structures : are a way of organizing data so that it can be accessed more efficiently
depending upon the situation. Data Structures are fundamentals of any programming
language around which a program is built. Python helps to learn the fundamental of these
data structures in a simpler way as compared to other programming languages.
LISTS:
• A Python list is similar to an array in other languages. In Python, an empty list can be
created in the following ways.
my_list = []
my_list = list()
EXAMPLES:
• my_list = [1, 2, 3]
• my_list2 = ["a", "b", "c"]
• my_list3 = ["a", 1, "Python", 5]
TUPLES:
• A tuple is similar to a list, but you create them with parentheses instead of square
brackets. You can also use the tuple built-in. The main difference is that a tuple is
immutable while the list is mutable. Let’s look at a few examples:
my_tuple = (1, 2, 3, 4, 5)
my_tuple [0:3] = (1, 2, 3)
10
Fake News Detection
another_tuple = tuple ()
abc =tuple([1, 2, 3])
DICTIONARIES:
• A Python dictionary is basically a hash table or a hash mapping. In some languages,
they might be referred to as associative memories or associative arrays. They are
indexed with keys, which can be any immutable type. For example, a string or number
can be a key. You need to be aware that a dictionary is an unordered set of key : value
pairs and the keys must be unique. You can get a list of keys by calling a dictionary
instance’s keys method. To check if a dictionary has a key, you can use Python’s in
keyword. In some of the older versions of Python (2.3 and older to be specific), you
will see the has_key keyword used for testing if a key is in a dictionary. This keyword
is deprecated in Python 2.x and removed entirely from Python 3.x.
More on Lists:
The list data type has some more methods. Here are all the methods of list objects:
list.append(x)
Add an item to the end of the list. Equivalent to a[len(a):] = [x].
list.extend(iterable)
Extend the list by appending all the items from the iterable. Equivalent
to a[len(a):] = iterable.
11
Fake News Detection
list.insert(i, x)
Insert an item at a given position. The first argument is the index of the element before
which to insert, so a.insert(0, x) inserts at the front of the list, and a.insert(len(a), x) is
equivalent to a.append(x).
list.remove(x)
Remove the first item from the list whose value is equal to x. It raises a ValueError if
there is no such item.
list.pop([i])
Remove the item at the given position in the list, and return it. If no index is
specified, a.pop() removes and returns the last item in the list. (The square brackets
around the i in the method signature denote that the parameter is optional, not that you
should type square brackets at that position. You will see this notation frequently in the
Python Library Reference.)
list.clear()
Remove all items from the list. Equivalent to del a[:].
The optional arguments start and end are interpreted as in the slice notation and are
used to limit the search to a particular subsequence of the list. The returned index is
computed relative to the beginning of the full sequence rather than the start argument.
list.count(x)
Return the number of times x appears in the list.
12
Fake News Detection
list.reverse()
Reverse the elements of the list in place.
list.copy()
Return a shallow copy of the list. Equivalent to a[:].
13
Fake News Detection
WEEK 2 (17/10/2022-22/10/2022)
Ethical hacking is also known as White hat Hacking or Penetration Testing. Ethical hacking
involves an authorized attempt to gain unauthorized access to a computer system or data.
Ethical hacking is used to improve the security of the systems and networks by fixing the
vulnerability found while testing.
Ethical hackers improve the security posture of an organization. Ethical hackers use the same
tools, tricks, and techniques that malicious hackers used, but with the permission of the
authorized person. The purpose of ethical hacking is to improve the security and to defend the
systems from attacks by malicious users.
Advantages of Hacking:
1. It is used to recover the loss of information, especially when you lost your password.
2. It is used to perform penetration testing to increase the security of the computer and
network.
3. It is used to test how good security is on your network.
Disadvantages of Hacking:
1. It can harm the privacy of someone.
2. Hacking is illegal.
3. Criminal can use hacking to their advantage.
4. Hampering system operations.
5. Massive security breach.
14
Fake News Detection
Python offers multiple options for developing GUI (Graphical User Interface). Out of all the
GUI methods, tkinter is the most commonly used method. It is a standard Python interface to
the Tk GUI toolkit shipped with Python. Python with tkinter is the fastest and easiest way to
create the GUI applications. Creating a GUI using tkinter is an easy task.
import tkinter
There are two main methods used which the user needs to remember while creating the
Python application with GUI.
15
Fake News Detection
import tkinter
m = tkinter.Tk()
'''
widgets are added here
'''
m.mainloop()
tkinter also offers access to the geometric configuration of the widgets which can organize
the widgets in the parent windows. There are mainly three geometry manager classes class.
1. pack() method : It organizes the widgets in blocks before placing in the parent
widget.
2. grid() method : It organizes the widgets in grid (table-like structure) before
placing in the parent widget.
3. place() method : It organizes the widgets by placing them on specific positions
directed by the programmer.
16
Fake News Detection
The “Fake News Detection” project is implemented using Passive Aggressive Algorithm
which works as shown below :
def accuracy():
# Read the CSV file 'news.csv' and load it into a DataFrame called df
df = pd.read_csv('news.csv')
df.shape
df.head()
# Extract the 'label' column (target variable) into the variable 'labels'
labels = df.label
# Stop words are removed (common English words like 'the', 'and', etc.)
17
Fake News Detection
tfidf_train = tfidf_vectorizer.fit_transform(x_train)
# Convert the test data to TF-IDF vectors using the same vectorizer
tfidf_test = tfidf_vectorizer.transform(x_test)
pac = PassiveAggressiveClassifier(max_iter=50)
pac.fit(tfidf_train, y_train)
# Predict labels for the test data using the trained model
y_pred = pac.predict(tfidf_test)
print(f'Accuracy: {round(score*100,2)}%')
# The confusion matrix shows true positives, true negatives, false positives, and false negatives
18
Fake News Detection
print(CNF)
19
Fake News Detection
➢ Sirintel Technologies company conducted a placement talk and business strategy event
by person Kisan, where he was an employer from upgrade.
➢ He discussed about higher studies and placement drives which is going to be huge turn
over in a student's personal choice.
➢ Discussed about courses offered from upgrade which a student can learn efficiently by
just sitting at home and completing the course duration affectively. And after taking up
& course a good performer will get a guaranteed job with a stipend salary.
20
Fake News Detection
4.4. SKILLS :
➢ Insertion of PDF:
We learnt how to display the PDF files in the Tkinter GUI by using the required
libraries to read the file.
➢ Collaboration:
It is the partnership; a union; The act of producing and making something, Where
we worked together to achieve a common goal in ways that benefits our skill
development.
21
Fake News Detection
Chapter 5: RESULTS
22
Fake News Detection
23
Fake News Detection
24
Fake News Detection
Chapter 6 : CONCLUSION
In the 21st century, the majority of the tasks are done online. Newspapers that were earlier
preferred as hard-copies are now being substituted by applications like Facebook, Twitter, and
news articles to be read online. WhatsApp’s forwards are also a major source. The growing
problem of fake news only makes things more complicated and tries to change or hamper the
opinion and attitude of people towards use of digital technology.
When a person is deceived by the real news, two possible things happen- People start
believing that their perceptions about a particular topic are true as assumed. Thus, in order to
curb the phenomenon, the “Fake News Detection” system has been developed that takes
performance evaluation, which is also done using various performance measures. The best
model, i.e. the model with highest accuracy is used to classify the news headlines or articles.
As evident above for static search, this best model came out to be Logistic Regression with an
accuracy of 65%. Hence, the grid search parameter is used for optimization to increase the
performance of logistic regression which gave the accuracy of 75%. Hence, if a user feed a
particular news article or its headline in this model, there are 75% chances that it will be
classified to its true nature. The user can check the news article or keywords online; he can also
check the authenticity of the website. The accuracy for dynamic system is 93% and it increases
with every iteration.
This project is intended to build its own dataset which will be kept up to date according
to the latest news. All the live news and latest data will be kept in a database using Web Crawler
and online database.input from the user and classify it to be true or fake. To implement this,
various NLP and Machine Learning Techniques have to be used. The model is trained using
an appropriate dataset.
25
Fake News Detection
REFERENCES
[1] H. Gupta, M. S. Jamal, S. Madisetty and M. S. Desarkar, "A framework for real-time spam
detection in Twitter," 2018 10th International Conference on Communication Systems &
Networks (COMSNETS), Bengaluru, 2018, pp. 380-383
[3] Reis 1. C. Correia, A., Murai, F., Veloso, A., Benevento, F., & Cambria, E. (2019).
Supervised Leaming for Fake News Detection IEEE Intelligent Systems, 34(2), 76-81
[4] Pal, S. Kumar, T. S, & Pal, S., (2019). Applying Machine Learning to Detect Fake News.
Indian Journal of Computer Science.
[5] IOP Conference Series: Materials Science and Engineering, Volume 1099, International
Conference on Applied Scientific Computational Intelligence using Data Science (ASCI 2020)
22nd-23rd December 2020, Jaipur, India
26