{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:48:06Z","timestamp":1767340086620,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031199578"},{"type":"electronic","value":"9783031199585"}],"license":[{"start":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T00:00:00Z","timestamp":1666310400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T00:00:00Z","timestamp":1666310400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-19958-5_46","type":"book-chapter","created":{"date-parts":[[2022,10,20]],"date-time":"2022-10-20T11:06:59Z","timestamp":1666264019000},"page":"489-498","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":72,"title":["Reason Based Machine Learning Approach to\u00a0Detect Bangla Abusive Social Media Comments"],"prefix":"10.1007","author":[{"given":"Tanjim","family":"Mahmud","sequence":"first","affiliation":[]},{"given":"Sudhakar","family":"Das","sequence":"additional","affiliation":[]},{"given":"Michal","family":"Ptaszynski","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3090-7645","authenticated-orcid":false,"given":"Mohammad Shahadat","family":"Hossain","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0244-3561","authenticated-orcid":false,"given":"Karl","family":"Andersson","sequence":"additional","affiliation":[]},{"given":"Koushick","family":"Barua","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,21]]},"reference":[{"key":"46_CR1","doi-asserted-by":"crossref","unstructured":"Rashid Chowdhury, R., et al.: Analyzing sentiment of movie reviews in Bangla by applying machine learning techniques. In: 2019 International Conference on Bangla Speech and Language Processing (ICBSLP), pp. 1\u20136 (2019)","DOI":"10.1109\/ICBSLP47725.2019.201483"},{"key":"46_CR2","doi-asserted-by":"crossref","unstructured":"Eshan, S.C., Hasan, M.S.: An application of machine learning to detect abusive Bengali text. In: 2017 20th International Conference of Computer and Information Technology (ICCIT), pp. 1\u20136 (2017)","DOI":"10.1109\/ICCITECHN.2017.8281787"},{"key":"46_CR3","doi-asserted-by":"crossref","unstructured":"Hussain, M.G., et al.: An approach to detect abusive Bangla text. In: 2018 International Conference on Innovation in Engineering and Technology (ICIET), pp. 1\u20135 (2018)","DOI":"10.1109\/CIET.2018.8660863"},{"key":"46_CR4","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1007\/978-3-030-68154-8_74","volume-title":"Intelligent Computing and Optimization","author":"M Akter","year":"2021","unstructured":"Akter, M., Hossain, M.S., Ahmed, T.U., Andersson, K.: Mosquito classification using convolutional neural network with data augmentation. In: Vasant, P., Zelinka, I., Weber, G.-W. (eds.) ICO 2020. AISC, vol. 1324, pp. 865\u2013879. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-68154-8_74"},{"key":"46_CR5","unstructured":"Ghosh, R., et al.: Social media cyberbullying detection using machine learning in Bengali language (2021)"},{"key":"46_CR6","unstructured":"Clark, I., et al.: Deep Learning For Natural Language Processing. https:\/\/machinelearningmastery.com\/deep-learning-for-nlp\/. Accessed 22 Sept 2021"},{"key":"46_CR7","doi-asserted-by":"crossref","unstructured":"Sazzed, S.: Abusive content detection in transliterated Bengali-English social media corpus. In: Proceedings of the Fifth Workshop on Computational Approaches to Linguistic Code-Switching, pp. 125\u2013130 (2021)","DOI":"10.18653\/v1\/2021.calcs-1.16"},{"key":"46_CR8","doi-asserted-by":"crossref","unstructured":"Jahan, M., et al.: Abusive comments detection in Bangla-English code-mixed and transliterated text. In: 2019 2nd International Conference on Innovation in Engineering and Technology (ICIET), pp. 1\u20136 (2019)","DOI":"10.1109\/ICIET48527.2019.9290630"},{"issue":"4","key":"46_CR9","doi-asserted-by":"publisher","first-page":"2163","DOI":"10.11591\/eei.v10i4.3107","volume":"10","author":"T Islam","year":"2021","unstructured":"Islam, T., et al.: An evolutionary approach to comparative analysis of detecting Bangla abusive text. Bull. Electr. Eng. Inform. 10(4), 2163\u20132169 (2021)","journal-title":"Bull. Electr. Eng. Inform."},{"key":"46_CR10","doi-asserted-by":"crossref","unstructured":"Abdhullah-Al-Mamun, S.A.: Social media bullying detection using machine learning on Bangla text. In: 2018 10th International Conference on Electrical and Computer Engineering (ICECE), pp. 385\u2013388 (2018)","DOI":"10.1109\/ICECE.2018.8636797"},{"key":"46_CR11","unstructured":"Hussain, M.G., Mahmud, T.A.: A Technique for Perceiving Abusive Bangla Comments (2019)"},{"key":"46_CR12","doi-asserted-by":"crossref","unstructured":"Emon, E.A., et al.: A deep learning approach to detect abusive Bengali text. In: 2019 7th International Conference on Smart Computing & Communications (ICSCC), pp. 1\u20135 (2019)","DOI":"10.1109\/ICSCC.2019.8843606"},{"key":"46_CR13","doi-asserted-by":"crossref","unstructured":"Ishmam, A.M., Sharmin, S.: Hateful speech detection in public Facebook pages for the Bengali language. In: 2019 18th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 555\u2013560 (2019)","DOI":"10.1109\/ICMLA.2019.00104"},{"key":"46_CR14","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"788","DOI":"10.1007\/978-3-030-68154-8_68","volume-title":"Intelligent Computing and Optimization","author":"T Mahmud","year":"2021","unstructured":"Mahmud, T., Sikder, J., Chakma, R.J., Fardoush, J.: Fabric defect detection system. In: Vasant, P., Zelinka, I., Weber, G.-W. (eds.) ICO 2020. AISC, vol. 1324, pp. 788\u2013800. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-68154-8_68"},{"key":"46_CR15","series-title":"Algorithms for Intelligent Systems","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/978-981-16-0586-4_37","volume-title":"Proceedings of International Joint Conference on Advances in Computational Intelligence","author":"N Romim","year":"2021","unstructured":"Romim, N., Ahmed, M., Talukder, H., Saiful Islam, M.: Hate speech detection in the Bengali language: a dataset and its baseline evaluation. In: Uddin, M.S., Bansal, J.C. (eds.) Proceedings of International Joint Conference on Advances in Computational Intelligence. AIS, pp. 457\u2013468. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-16-0586-4_37"},{"key":"46_CR16","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-981-16-3153-5_18","volume-title":"Intelligent Computing and Innovation on Data Science","author":"T Mahmud","year":"2021","unstructured":"Mahmud, T., et al.: Face detection and recognition system. In: Peng, S.-L., Hsieh, S.-Y., Gopalakrishnan, S., Duraisamy, B. (eds.) Intelligent Computing and Innovation on Data Science. LNNS, vol. 248, pp. 145\u2013155. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-16-3153-5_18"},{"key":"46_CR17","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1016\/j.procs.2021.03.045","volume":"184","author":"T Mahmud","year":"2021","unstructured":"Mahmud, T., et al.: An optimal learning model for training expert system to detect uterine cancer. Procedia Comput. Sci. 184, 356\u2013363 (2021)","journal-title":"Procedia Comput. Sci."},{"key":"46_CR18","doi-asserted-by":"publisher","first-page":"190637","DOI":"10.1109\/ACCESS.2020.3031438","volume":"8","author":"R Islam","year":"2020","unstructured":"Islam, R., et al.: A deep learning inspired belief rule-based expert system. IEEE Access 8, 190637\u2013190651 (2020)","journal-title":"IEEE Access"},{"issue":"2","key":"46_CR19","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1007\/s12559-021-09978-8","volume":"14","author":"T Ahmed","year":"2021","unstructured":"Ahmed, T., et al.: An integrated deep learning and belief rule base intelligent system to predict survival of COVID-19 patient under uncertainty. Cogn. Comput. 14(2), 660\u2013676 (2021)","journal-title":"Cogn. Comput."},{"issue":"3","key":"46_CR20","doi-asserted-by":"publisher","first-page":"607","DOI":"10.11591\/ijeecs.v1.i3.pp607-618","volume":"1","author":"M Islam","year":"2016","unstructured":"Islam, M., et al.: Belief-rule-based intelligent decision system to select hospital location. Indonesian J. Electr. Eng. Comput. Sci. 1(3), 607 (2016)","journal-title":"Indonesian J. Electr. Eng. Comput. Sci."},{"key":"46_CR21","unstructured":"Mahmud, T., et al.: Evaluation of job offers using the evidential reasoning approach. Glob. J. Comput. Sci. Technol. (2013)"},{"issue":"21","key":"46_CR22","first-page":"51","volume":"57","author":"T Mahmud","year":"2012","unstructured":"Mahmud, T., Shahadat Hossain, M.: An evidential reasoning-based decision support system to support house hunting. Int. J. Comput. Appl. 57(21), 51\u201358 (2012)","journal-title":"Int. J. Comput. Appl."}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Computing &amp; Optimization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-19958-5_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,20]],"date-time":"2022-10-20T11:57:51Z","timestamp":1666267071000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-19958-5_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,21]]},"ISBN":["9783031199578","9783031199585"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-19958-5_46","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022,10,21]]},"assertion":[{"value":"21 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing & Optimization","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hua Hin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thailand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ico2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icico.info\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}