{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T02:38:11Z","timestamp":1747190291991,"version":"3.40.5"},"reference-count":43,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,11,16]],"date-time":"2020-11-16T00:00:00Z","timestamp":1605484800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Establishment of IT Business Incubator at CUET","award":["56.02.0000.023.16.032.18.93"],"award-info":[{"award-number":["56.02.0000.023.16.032.18.93"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2020,11,16]]},"abstract":"<jats:p>The most prominent form of human communication and interaction is speech. It plays an indispensable role for expressing emotions, motivating, guiding, and cheering. An ill-intentioned speech can mislead people, societies, and even a nation. A misguided speech can trigger social controversy and can result in violent activities. Every day, there are a lot of speeches being delivered around the world, which are quite impractical to inspect manually. In order to prevent any vicious action resulting from any misguided speech, the development of an automatic system that can efficiently detect suspicious speech has become imperative. In this study, we have presented a framework for acquisition of speech along with the location of the speaker, converting the speeches into texts and, finally, we have proposed a system based on long short-term memory (LSTM) which is a variant of recurrent neural network (RNN) to classify speeches into suspicious and nonsuspicious. We have considered speeches of Bangla language and developed our own dataset that contains about 5000 suspicious and nonsuspicious samples for training and validating our model. A comparative analysis of accuracy among other machine learning algorithms such as logistic regression, SVM, KNN, Naive Bayes, and decision tree is performed in order to evaluate the effectiveness of the system. The experimental results show that our proposed deep learning-based model provides the highest accuracy compared to other algorithms.<\/jats:p>","DOI":"10.1155\/2020\/5639787","type":"journal-article","created":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T00:35:16Z","timestamp":1605573316000},"page":"1-14","source":"Crossref","is-referenced-by-count":3,"title":["Towards a Framework for Acquisition and Analysis of Speeches to Identify Suspicious Contents through Machine Learning"],"prefix":"10.1155","volume":"2020","author":[{"given":"Md. Rashadur","family":"Rahman","sequence":"first","affiliation":[{"name":"Department of Computer Science & Engineering, Chittagong University of Engineering & Technology, Chattogram, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0259-7624","authenticated-orcid":true,"given":"Mohammad Shamsul","family":"Arefin","sequence":"additional","affiliation":[{"name":"Department of Computer Science & Engineering, Chittagong University of Engineering & Technology, Chattogram, Bangladesh"}]},{"given":"Md. Billal","family":"Hossain","sequence":"additional","affiliation":[{"name":"Department of Computer Science & Engineering, Chittagong University of Engineering & Technology, Chattogram, Bangladesh"}]},{"given":"Mohammad Ashfak","family":"Habib","sequence":"additional","affiliation":[{"name":"Department of Computer Science & Engineering, Chittagong University of Engineering & Technology, Chattogram, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2421-2214","authenticated-orcid":true,"given":"A. S. M.","family":"Kayes","sequence":"additional","affiliation":[{"name":"Department of Computer Science & Information Technology, La Trobe University, Melbourne, Australia"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1037\/h0078936"},{"volume-title":"Lincoln at Cooper Union: The Speech that Made Abraham Lincoln President","year":"2004","author":"H. Holzer","key":"2"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1353\/rap.2006.0032"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s10677-019-10013-x"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1080\/13504630.2015.1128810"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.4159\/harvard.9780674065086","volume-title":"The Harm in Hate Speech","author":"J. Waldron","year":"2012"},{"key":"7","volume-title":"Freedom of Speech","author":"E. Barendt","year":"2005","edition":"2nd"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1353\/hrq.2014.0064"},{"issue":"2","key":"9","first-page":"379","article-title":"Free speech and the confluence of national security and internet exceptionalism","volume":"86","author":"A. K. Chen","year":"2017","journal-title":"Fordham Law Review"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.3390\/socsci7030037"},{"first-page":"85","article-title":"A measurement study of hate speech in social media","author":"M. Mondal","key":"11"},{"issue":"1","key":"12","first-page":"12","article-title":"Google Android: an emerging software platform for mobile devices","volume":"1","author":"N. Gandhewar","year":"2010","journal-title":"International Journal on Computer Science and Engineering"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/s0308-5961(03)00068-5"},{"first-page":"1","article-title":"Google Android a mobile platform: a review","author":"P. Kaur","key":"14"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.14445\/22315381\/ijett-v15p255"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/3232676"},{"first-page":"145","article-title":"Abusive language detection in online user content","author":"C. Nobata","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1080\/19331681.2019.1702607"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2968173"},{"first-page":"759","article-title":"Deep learning for hate speech detection in Tweets","author":"P. Badjatiya","key":"20"},{"first-page":"85","article-title":"Using convolutional neural networks to classify hate-speech","author":"B. Gamb\u00e4ck","key":"21"},{"first-page":"745","article-title":"Detecting hate speech on Twitter using a Convolution-GRU based deep neural network","author":"Z. Zhang","key":"22"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-1216-2_4"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-019-0205-6"},{"first-page":"1","article-title":"N-gram based sentiment mining for Bangla text using Support Vector Machine","author":"S. M. A. Taher","key":"25"},{"first-page":"366","article-title":"Bangla news classification using naive Bayes classifier","author":"A. N. Chy","key":"26"},{"first-page":"1","article-title":"Classification of Bangla text documents based on inverse class frequency","author":"A. Dhar","key":"27"},{"first-page":"581","article-title":"Automatic detection of suspicious Bangla text using logistic regression","author":"O. Sharif","key":"28"},{"first-page":"555","article-title":"Hateful speech detection in public Facebook pages for the Bengali language","author":"A. M. Ishmam","key":"29"},{"first-page":"1","article-title":"A deep learning approach to detect abusive Bengali text","author":"E. A. Emon","key":"30"},{"first-page":"1","article-title":"Using social networks to detect malicious Bangla text content","author":"T. Islam","key":"31"},{"first-page":"1","article-title":"Threat and abusive language detection on social media in Bengali language","author":"P. Chakraborty","key":"32"},{"volume-title":"Effects of Padding on LSTMs and CNNs","year":"2019","author":"M. Dwarampudi","key":"33"},{"first-page":"740","article-title":"On the practical computational power of finite precision RNNs for language recognition","author":"G. Weiss","key":"34"},{"first-page":"1442","article-title":"Massive exploration of neural machine translation architectures","author":"D. Britz","key":"35"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"author":"D. P. Kingma","key":"37","article-title":"Adam: a method for stochastic optimization"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1037\/h0031619"},{"first-page":"90","article-title":"Baselines and bigrams: simple, good sentiment and topic classification","author":"S. Wang","key":"39"},{"first-page":"132","article-title":"Cross-domain detection of abusive language online","author":"M. Karan","key":"40"},{"issue":"5","key":"41","first-page":"272","article-title":"Random forests and decision trees","volume":"9","author":"J. Ali","year":"2012","journal-title":"International Journal of Computer Science Issues"},{"first-page":"75","article-title":"The efects of user features on twitter hate speech detection","author":"E. F. Unsvag","key":"42"},{"first-page":"330","article-title":"Anatomy of online hate: developing a taxonomy and machine learning models for identifying and classifying hate in online news media","author":"J. Salminen","key":"43"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2020\/5639787.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2020\/5639787.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2020\/5639787.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T00:35:27Z","timestamp":1605573327000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/complexity\/2020\/5639787\/"}},"subtitle":[],"editor":[{"given":"Abd E.I.-Baset","family":"Hassanien","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,11,16]]},"references-count":43,"alternative-id":["5639787","5639787"],"URL":"https:\/\/doi.org\/10.1155\/2020\/5639787","relation":{},"ISSN":["1099-0526","1076-2787"],"issn-type":[{"type":"electronic","value":"1099-0526"},{"type":"print","value":"1076-2787"}],"subject":[],"published":{"date-parts":[[2020,11,16]]}}}