0% found this document useful (0 votes)
141 views4 pages

Profanity Filtering Using PHP: Natural Language

This system analyzes online forums and classifies posts into legal and illegal groups using text mining. It identifies hot topics and clusters authors. The system downloads posts continuously, employs data mining techniques, and helps reduce illegal activities on the internet. The system has four modules: inputting suspicious keywords, a data mining algorithm, automatically downloading illegal posts, and viewing suspicious activity.

Uploaded by

sachin mohan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
141 views4 pages

Profanity Filtering Using PHP: Natural Language

This system analyzes online forums and classifies posts into legal and illegal groups using text mining. It identifies hot topics and clusters authors. The system downloads posts continuously, employs data mining techniques, and helps reduce illegal activities on the internet. The system has four modules: inputting suspicious keywords, a data mining algorithm, automatically downloading illegal posts, and viewing suspicious activity.

Uploaded by

sachin mohan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 4

PROFANITY FILTERING USING PHP

A swear filter, also known as a profanity filter or language filter is a software


system which modifies text to remove words deemed offensive by the
.administrator or community of an online forum
With the advancement of internet technology and the change in the mode
of communication, it is found that much first-hand news has been discussed in
Internet forums well before they are reported in traditional mass media. Also,
this communication channel provides an effective channel for illegal activities
such as broadcasting of copyrighted movies, threatening messages and online
gambling etc. Our proposed System will analyze online plain text sources from
selected discussion forums and will classify the text into different groups and
.system will decide which post is legal and illegal

This system will identify postings from selected discussion forums


continuously and employ data mining techniques to identify hot topics and
cluster authors into different groups using word-based user profiles. System will
analyze online plain text sources using text data mining. This system will help
to reduce many illegal activities which are held on internet. This system can be
used for security purpose. This system will scan post written in a natural language
.and will cluster this post into different groups and will identify illegal topics
Modules and their Description
:This system comprises of 4 Major Modules
Bad Keyword Entry into System .1

Data Mining Algorithm .2

Auto Download Illegal Postings .3

View Suspicious Activity .4

:Description
:Suspicious Keyword Entry into System .1

Here, Admin is responsible to input suspicious keywords into the -


.system to catch the illegal activity over the web

:Data Mining Algorithm .2

This Data Mining Algorithm is used over the internet to detect -


.criminal activities and illegal postings

:Auto Download Illegal Postings .3

System auto downloads the postings from selected discussion forums -


continuously and employ data mining techniques to identify hot topics
and cluster authors into different groups using word-based user
.profiles

:View Suspicious Activity .4


determines what to block by using the most commonly reported words -
and phrases marked offensive by the community. This also includes
types of posts that you have hidden as a page admin. Here, Admin role
is to view the suspicious activity over the web and take a legal action
.towards the person

:Software Requirements 

Windows 7 or higher 
.Eclipse IDE 
MySQL 

:Hardware Components 
Processor –Core i3 
Hard Disk – 160 GB 
Memory – 1GB RAM 
Monitor 
Internet Connection 

:Advantages of the Proposed Project 


.This system will reduce illegal activities held on internet 

.This system will provide security for many websites 

.This system will act as an evidence for investigation 

:Disadvantages 
.If Internet connection fails, this system won’t work 
:Application 
.This application can be used by many websites for security purpose 

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy