{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T07:41:07Z","timestamp":1724312467906},"reference-count":127,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2020,10,12]],"date-time":"2020-10-12T00:00:00Z","timestamp":1602460800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJICC"],"published-print":{"date-parts":[[2020,11,3]]},"abstract":"Purpose<\/jats:title>Hate speech is an expression of intense hatred. Twitter has become a popular analytical tool for the prediction and monitoring of abusive behaviors. Hate speech detection with social media data has witnessed special research attention in recent studies, hence, the need to design a generic metadata architecture and efficient feature extraction technique to enhance hate speech detection.<\/jats:p><\/jats:sec>Design\/methodology\/approach<\/jats:title>This study proposes a hybrid embeddings enhanced with a topic inference method and an improved cuckoo search neural network for hate speech detection in Twitter data. The proposed method uses a hybrid embeddings technique that includes Term Frequency-Inverse Document Frequency (TF-IDF) for word-level feature extraction and Long Short Term Memory (LSTM) which is a variant of recurrent neural networks architecture for sentence-level feature extraction. The extracted features from the hybrid embeddings then serve as input into the improved cuckoo search neural network for the prediction of a tweet as hate speech, offensive language or neither.<\/jats:p><\/jats:sec>Findings<\/jats:title>The proposed method showed better results when tested on the collected Twitter datasets compared to other related methods. In order to validate the performances of the proposed method, t<\/jats:italic>-test and post hoc multiple comparisons were used to compare the significance and means of the proposed method with other related methods for hate speech detection. Furthermore, Paired Sample t<\/jats:italic>-Test was also conducted to validate the performances of the proposed method with other related methods.<\/jats:p><\/jats:sec>Research limitations\/implications<\/jats:title>Finally, the evaluation results showed that the proposed method outperforms other related methods with mean F1-score of 91.3.<\/jats:p><\/jats:sec>Originality\/value<\/jats:title>The main novelty of this study is the use of an automatic topic spotting measure based on na\u00efve Bayes model to improve features representation.<\/jats:p><\/jats:sec>","DOI":"10.1108\/ijicc-06-2020-0061","type":"journal-article","created":{"date-parts":[[2020,10,31]],"date-time":"2020-10-31T10:43:43Z","timestamp":1604141023000},"page":"485-525","source":"Crossref","is-referenced-by-count":15,"title":["Hate speech detection in Twitter using hybrid embeddings and improved cuckoo search-based neural networks"],"prefix":"10.1108","volume":"13","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-8889-5985","authenticated-orcid":false,"given":"Femi Emmanuel","family":"Ayo","sequence":"first","affiliation":[]},{"given":"Olusegun","family":"Folorunso","sequence":"additional","affiliation":[]},{"given":"Friday Thomas","family":"Ibharalu","sequence":"additional","affiliation":[]},{"given":"Idowu Ademola","family":"Osinuga","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020111310170396700_ref001","doi-asserted-by":"crossref","unstructured":"Aggarwal, C.C. (2011), \u201cAn introduction to social network data analytics\u201d, in Aggarwal, C.C. (Ed.), Social Network Data Analytics, Springer, New York, pp. 1-15.","DOI":"10.1007\/978-1-4419-8462-3_1"},{"key":"key2020111310170396700_ref002","first-page":"1","article-title":"A simple but tough-to-beat baseline for sentence embeddings","volume-title":"International Conference for Learning Representations","year":"2016"},{"issue":"1","key":"key2020111310170396700_ref003","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1111\/coin.12017","article-title":"A survey of techniques for event detection in Twitter","volume":"31","year":"2015","journal-title":"Computational Intelligence"},{"key":"key2020111310170396700_ref004","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1145\/3041021.3054223","article-title":"Deep learning for hate speech detection in tweets","year":"2017"},{"key":"key2020111310170396700_ref005","volume-title":"Modern Information Retrieval the Concepts and Technology behind Search","year":"2011","edition":"2nd ed."},{"key":"key2020111310170396700_ref006","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101710","article-title":"Improving cyberbullying detection using Twitter users\u2019 psychological features and machine learning","volume-title":"Computers and Security","year":"2020"},{"issue":"7194","key":"key2020111310170396700_ref007","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1038\/nature06948","article-title":"A L\u00e9vy flight for light","volume":"453","year":"2008","journal-title":"Nature"},{"key":"key2020111310170396700_ref008","doi-asserted-by":"crossref","first-page":"101734","DOI":"10.1016\/j.bspc.2019.101734","article-title":"Convolutional neural network approach for automatic tympanic membrane detection and classification","volume":"56","year":"2020","journal-title":"Biomedical Signal Processing and Control"},{"key":"key2020111310170396700_ref009","first-page":"243","article-title":"Detection of hate speech and offensive language in Twitter data using LSTM model","volume-title":"Recent Trends in Image and Signal Processing in Computer Vision","year":"2020"},{"key":"key2020111310170396700_ref010","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1162\/tacl_a_00051","article-title":"Enriching word vectors with subword information","volume":"5","year":"2017","journal-title":"Transactions of the Association for Computational Linguistics"},{"key":"key2020111310170396700_ref011","first-page":"40","article-title":"Understanding the value of networked publics in radio: employing digital methods and social network analysis to understand the Twitter publics of two Italian national radio stations","volume-title":"Information, Communication and Society","year":"2016"},{"issue":"1","key":"key2020111310170396700_ref012","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/s10745-006-9083-4","article-title":"L\u00e9vy flights in Dobe Ju\/'hoansi foraging patterns","volume":"35","year":"2007","journal-title":"Human Ecology"},{"key":"key2020111310170396700_ref013","first-page":"458","article-title":"Who should I follow? Recommending people in directed social networks","year":"2011"},{"key":"key2020111310170396700_ref014","first-page":"298","article-title":"Learning to detect online harassment on Twitter with the transformer","year":"2019"},{"key":"key2020111310170396700_ref015","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2019.122372","article-title":"A new direction in social network analysis: online social network analysis problems and applications","volume":"535","year":"2019","journal-title":"Physica A: Statistical Mechanics and its Applications"},{"key":"key2020111310170396700_ref016","first-page":"404","article-title":"HATEMINER at SemEval-2019 task 5: hate speech detection against immigrants and women in Twitter using a multinomial naive Bayes classifier","year":"2019"},{"key":"key2020111310170396700_ref017","first-page":"13","article-title":"Mean birds: detecting aggression and bullying on Twitter","year":"2017"},{"key":"key2020111310170396700_ref018","first-page":"71","article-title":"Detecting offensive language in social media to protect adolescent online safety","year":"2012"},{"key":"key2020111310170396700_ref019","first-page":"413","article-title":"Online social network analysis (OSNA) based approach for interconnecting complex systems of internet of things (SIoT)","volume-title":"Principles of Internet of Things (IoT) Ecosystem: Insight Paradigm","year":"2020"},{"key":"key2020111310170396700_ref020","article-title":"Empirical evaluation of gated recurrent neural networks on sequence modeling","year":"2014"},{"issue":"2","key":"key2020111310170396700_ref021","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3377323","article-title":"A multilingual evaluation for online hate speech detection","volume":"20","year":"2020","journal-title":"ACM Transactions on Internet Technology (TOIT)"},{"key":"key2020111310170396700_ref022","first-page":"111","article-title":"Company event popularity for financial markets using Twitter and sentiment analysis","volume-title":"Expert Systems with Applications","year":"2017"},{"key":"key2020111310170396700_ref023","first-page":"512","article-title":"Automated hate speech detection and the problem of offensive language","year":"2017"},{"key":"key2020111310170396700_ref024","first-page":"3752","article-title":"Privacy-preserving classification of personal text messages with secure multi-party computation: an application to hate-speech detection","volume-title":"Advances in Neural Information Processing Systems 32","year":"2019"},{"key":"key2020111310170396700_ref025","doi-asserted-by":"publisher","first-page":"4171","DOI":"10.18653\/v1\/N19-1423","article-title":"Bert: pre-training of deep bidirectional transformers for language understanding","volume-title":"Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. Association for Computational Linguistics","year":"2018"},{"key":"key2020111310170396700_ref026","first-page":"11","article-title":"Modeling the detection of textual cyberbullying","year":"2011"},{"issue":"2","key":"key2020111310170396700_ref027","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1108\/IJICC-01-2020-0004","article-title":"DEPSOSVM: variant of differential evolution based on PSO for image and text data classification","volume":"13","year":"2020","journal-title":"International Journal of Intelligent Computing and Cybernetics"},{"key":"key2020111310170396700_ref028","first-page":"29","article-title":"Hate speech detection with comment embeddings","year":"2015"},{"key":"key2020111310170396700_ref029","first-page":"617","article-title":"Ghmerti at SemEval-2019 task 6: a deep word-and character-based approach to offensive language identification","year":"2019"},{"key":"key2020111310170396700_ref030","first-page":"284","article-title":"Optimal image fusion algorithm using modified grey wolf optimization amalgamed with cuckoo search, levy fly and Mantegna algorithm","year":"2020"},{"key":"key2020111310170396700_ref031","first-page":"1","article-title":"The new information Frontier: toward a more nuanced view of social movement communication","volume-title":"Social Movement Studies","year":"2016"},{"key":"key2020111310170396700_ref032","first-page":"307","article-title":"Detection of harassment on Twitter with deep learning techniques","year":"2019"},{"key":"key2020111310170396700_ref033","first-page":"453","article-title":"Hate speech detection using word embedding and deep learning in the Arabic language context","year":"2020"},{"issue":"12","key":"key2020111310170396700_ref034","doi-asserted-by":"crossref","first-page":"4180","DOI":"10.3390\/app10124180","article-title":"Time of your hate: the challenge of time in hate speech detection on social media","volume":"10","year":"2020","journal-title":"Applied Sciences"},{"key":"key2020111310170396700_ref035","first-page":"94","article-title":"A hierarchically-labeled Portuguese hate speech dataset","year":"2019"},{"issue":"2","key":"key2020111310170396700_ref036","first-page":"70","article-title":"Do we want free speech or not? Modern Challenges to Free Speech","volume":"24","year":"2020","journal-title":"Coventry Law Journal"},{"key":"key2020111310170396700_ref037","first-page":"105","article-title":"A unified deep learning architecture for abuse detection","year":"2019"},{"key":"key2020111310170396700_ref038","first-page":"438","article-title":"Polarization and acculturation in US Election 2016 outcomes\u2013Can Twitter analytics predict changes in voting preferences","volume-title":"Technological Forecasting and Social Change","year":"2019"},{"key":"key2020111310170396700_ref039","first-page":"1","volume-title":"The Elements of Statistical Learning: Data Mining, Inference, and Prediction","year":"2009","edition":"2nd ed."},{"issue":"8","key":"key2020111310170396700_ref040","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","article-title":"Long short-term memory","volume":"9","year":"1997","journal-title":"Neural Computation"},{"key":"key2020111310170396700_ref041","first-page":"48","article-title":"An overview of event extraction from text","year":"2011"},{"issue":"1","key":"key2020111310170396700_ref042","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1108\/IJICC-04-2017-0033","article-title":"Predicting motion picture box office performance using temporal tweet patterns","volume":"11","year":"2018","journal-title":"International Journal of Intelligent Computing and Cybernetics"},{"key":"key2020111310170396700_ref043","first-page":"1440","article-title":"Multilingual Twitter corpus and baselines for evaluating demographic bias in hate speech recognition","volume-title":"Proceedings of the 12th Language Resources and Evaluation Conference. European Language Resources Association","year":"2020"},{"key":"key2020111310170396700_ref044","first-page":"161","article-title":"Searching Twitter: separating the tweet from the chaff","year":"2011"},{"issue":"11","key":"key2020111310170396700_ref045","doi-asserted-by":"crossref","first-page":"2169","DOI":"10.1002\/asi.21149","article-title":"Twitter power: tweets as electronic word of mouth","volume":"60","year":"2009","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"key2020111310170396700_ref046","first-page":"7","article-title":"When does a compliment become sexist? analysis and classification of ambivalent sexism using Twitter data","year":"2017"},{"issue":"1","key":"key2020111310170396700_ref047","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1108\/eb026526","article-title":"A statistical interpretation of term specificity and its application in retrieval","volume":"28","year":"1972","journal-title":"Journal of Documentation"},{"key":"key2020111310170396700_ref048","first-page":"427","article-title":"Bag of tricks for efficient text classification","volume-title":"Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics. Association for Computational Linguistics","year":"2016"},{"key":"key2020111310170396700_ref049","article-title":"Speech and Language Processing: an introduction to Natural Language processing, computational linguistics, and speech recognition (2nd ed.)","volume-title":"Stuart Russell and Peter Norvig","year":"2009"},{"key":"key2020111310170396700_ref050","first-page":"1942","article-title":"Particle swarm optimization","volume":"4","year":"1995","journal-title":"Neural Networks"},{"key":"key2020111310170396700_ref051","doi-asserted-by":"publisher","first-page":"941","DOI":"10.18653\/v1\/P16-1089","article-title":"Siamese cbow: optimizing word embeddings for sentence representations","volume-title":"Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics. Association for Computational Linguistics","year":"2016"},{"issue":"3","key":"key2020111310170396700_ref052","first-page":"99","article-title":"Using Na\u00efve Bayes algorithm in detection of hate tweets","volume":"8","year":"2018","journal-title":"International Journal of Scientific and Research Publications"},{"key":"key2020111310170396700_ref053","doi-asserted-by":"crossref","first-page":"103923","DOI":"10.1016\/j.jrp.2020.103923","article-title":"A multi-method investigation of the personality correlates of digital aggression","volume":"85","year":"2020","journal-title":"Journal of Research in Personality"},{"key":"key2020111310170396700_ref054","first-page":"3294","article-title":"Skip-thought vectors","volume-title":"Advances in Neural Information Processing Systems","year":"2015"},{"key":"key2020111310170396700_ref055","unstructured":"Koziel, S. and Yang, X.S. (Eds) (2011), Computational Optimization, Methods and Algorithms, Springer, Vol. 356."},{"key":"key2020111310170396700_ref056","first-page":"591","article-title":"What is Twitter, a social network or a news media?","year":"2010"},{"key":"key2020111310170396700_ref057","first-page":"1188","article-title":"Distributed representations of sentences and documents","year":"2014"},{"key":"key2020111310170396700_ref058","first-page":"106188","article-title":"Is the message the medium? How politicians' Twitter blunders affect perceived authenticity of Twitter communication","volume-title":"Computers in Human Behavior","year":"2020"},{"key":"key2020111310170396700_ref059","first-page":"4","article-title":"Naive (Bayes) at forty: the independence assumption in information retrieval","year":"1998"},{"key":"key2020111310170396700_ref060","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JIOT.2020.2997133","article-title":"Evaluating IoT platforms using integrated probabilistic linguistic MCDM method","year":"2020","journal-title":"IEEE Internet of Things Journal"},{"key":"key2020111310170396700_ref061","doi-asserted-by":"crossref","first-page":"132217","DOI":"10.1109\/ACCESS.2019.2940538","article-title":"Estimation of distribution algorithm based on L\u00e9vy flight for solving the set-union knapsack problem","volume":"7","year":"2019","journal-title":"IEEE Access"},{"key":"key2020111310170396700_ref062","article-title":"Emoticon smoothed language models for Twitter sentiment analysis","year":"2012"},{"key":"key2020111310170396700_ref063","first-page":"3006","article-title":"Fuzzy multi-task learning for hate speech type identification","year":"2019"},{"issue":"February 2020","key":"key2020111310170396700_ref064","first-page":"105954","article-title":"Hybrid whale optimization algorithm enhanced with L\u00e9vy flight and differential evolution for job shop scheduling problems","volume":"87","year":"2020","journal-title":"Applied Soft Computing"},{"key":"key2020111310170396700_ref065","volume-title":"Neural Network Models For Hate Speech Classification in Tweets","year":"2018"},{"key":"key2020111310170396700_ref066","first-page":"154","article-title":"Requiem for online harassers: identifying racism from political tweets","year":"2017"},{"key":"key2020111310170396700_ref067","volume-title":"Foundations of Statistical Natural Language Processing","year":"1999"},{"key":"key2020111310170396700_ref068","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/j.compenvurbsys.2018.11.001","article-title":"Social media data: challenges, opportunities and limitations in urban studies","volume":"74","year":"2019","journal-title":"Computers, Environment and Urban Systems"},{"key":"key2020111310170396700_ref069","first-page":"321","article-title":"Social media use in crisis communication management: an opportunity for local communities?","volume-title":"Social Media and Local Governments","year":"2016"},{"key":"key2020111310170396700_ref070","first-page":"299","article-title":"Do characters abuse more than words?","year":"2016"},{"key":"key2020111310170396700_ref071","article-title":"Efficient estimation of word representations in vector space","volume-title":"CoRR abs\/1301.3781","year":"2013"},{"key":"key2020111310170396700_ref072","first-page":"3111","article-title":"Distributed representations of words and phrases and their compositionality","year":"2013"},{"key":"key2020111310170396700_ref073","article-title":"Advances in pre-training distributed word representations","year":"2018"},{"key":"key2020111310170396700_ref074","first-page":"286","article-title":"Prediction uncertainty estimation for hate speech classification","year":"2019"},{"key":"key2020111310170396700_ref075","first-page":"577","article-title":"DA-LD-Hildesheim at SemEval-2019 task 6: tracking offensive content with deep learning using shallow representation","year":"2019"},{"key":"key2020111310170396700_ref076","first-page":"29","article-title":"Fast learning in multi-resolution hierarchies","volume-title":"Advances in Neural Information Processing Systems","year":"1989"},{"key":"key2020111310170396700_ref077","first-page":"503","article-title":"Tw-StAR at SemEval-2019 task 5: N-gram embeddings for hate speech detection in multilingual tweets","year":"2019"},{"issue":"1","key":"key2020111310170396700_ref078","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1108\/IJICC-04-2018-0057","article-title":"Topic features for machine learning-based sentiment analysis in Indonesian tweets","volume":"12","year":"2019","journal-title":"International Journal of Intelligent Computing and Cybernetics"},{"key":"key2020111310170396700_ref079","volume-title":"Machine Learning: A Probabilistic Perspective. Adaptive Computation and Machine Learning Series","year":"2012"},{"issue":"4","key":"key2020111310170396700_ref080","first-page":"69","article-title":"Deep context-aware embedding for abusive and hate speech detection on Twitter","volume":"15","year":"2019","journal-title":"Australian Journal of Intelligent Information Processing Systems"},{"key":"key2020111310170396700_ref081","first-page":"1","article-title":"Using Twitter to raise the profile of childhood cancer awareness month","volume-title":"Network Modeling Analysis in Health Informatics and Bioinformatics","year":"2020"},{"key":"key2020111310170396700_ref082","article-title":"VAIS hate speech detection system: a deep learning based approach for system combination","volume-title":"The Sixth International Workshop on Vietnamese Language and Speech Processing (VLSP 2019) - in Conjunction with the 2019 Conference of the Pacific Association for Computational Linguistics (PACLING 2019)","year":"2019"},{"key":"key2020111310170396700_ref083","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1145\/2872427.2883062","article-title":"Abusive language detection in online user content","year":"2016"},{"key":"key2020111310170396700_ref084","first-page":"1277","article-title":"Hate speech","volume-title":"Encyclopedia of the American Constitution","year":"2000","edition":"2nd ed."},{"key":"key2020111310170396700_ref085","first-page":"1","article-title":"Online sexual harassment over anonymous social media in Bangladesh","year":"2019"},{"key":"key2020111310170396700_ref086","doi-asserted-by":"publisher","first-page":"528","DOI":"10.18653\/v1\/N18-1049","article-title":"Unsupervised learning of sentence embeddings using compositional n-gram features","volume-title":"Proceedings of the 2017 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. Association for Computational Linguistics","year":"2017"},{"key":"key2020111310170396700_ref087","first-page":"19","article-title":"Twitter as a corpus for sentiment analysis and opinion mining","year":"2010"},{"issue":"4","key":"key2020111310170396700_ref088","doi-asserted-by":"crossref","first-page":"694","DOI":"10.1109\/TASLP.2016.2520371","article-title":"Deep sentence embedding using long short-term memory networks: analysis and application to information retrieval","volume":"24","year":"2016","journal-title":"IEEE\/ACM Transactions on Audio, Speech, and Language Processing"},{"issue":"4","key":"key2020111310170396700_ref089","doi-asserted-by":"crossref","first-page":"764","DOI":"10.1016\/j.ipm.2017.02.004","article-title":"Twitter sentiment analysis using hybrid cuckoo search method","volume":"53","year":"2017","journal-title":"Information Processing and Management"},{"key":"key2020111310170396700_ref090","doi-asserted-by":"publisher","first-page":"41","DOI":"10.18653\/v1\/W17-3006","article-title":"One-step and two-step classification for abusive language detection on twitter","volume-title":"Proceedings of the First Workshop on Abusive Language Online. Association for Computational Linguistics","year":"2017"},{"key":"key2020111310170396700_ref091","first-page":"2799","article-title":"Reducing gender bias in abusive language detection","year":"2018"},{"issue":"2","key":"key2020111310170396700_ref092","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3371276","article-title":"MANDOLA: a big-data processing and visualization platform for monitoring and detecting online hate speech","volume":"20","year":"2020","journal-title":"ACM Transactions on Internet Technology (TOIT)"},{"issue":"2","key":"key2020111310170396700_ref093","doi-asserted-by":"crossref","first-page":"1830","DOI":"10.1016\/j.jcp.2007.06.008","article-title":"L\u00e9vy flights, non-local search and simulated annealing","volume":"226","year":"2007","journal-title":"Journal of Computational Physics"},{"key":"key2020111310170396700_ref094","volume-title":"The Cuckoos","year":"2005"},{"key":"key2020111310170396700_ref095","first-page":"1532","article-title":"Glove: global vectors for word representation","year":"2014"},{"key":"key2020111310170396700_ref096","first-page":"508","article-title":"UA at SemEval-2019 task 5: setting a strong linear baseline for hate speech detection","year":"2019"},{"key":"key2020111310170396700_ref097","doi-asserted-by":"publisher","first-page":"2227","DOI":"10.18653\/v1\/N18-1202","article-title":"Deep contextualized word representations","volume-title":"Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. Association for Computational Linguistics","year":"2018"},{"issue":"2","key":"key2020111310170396700_ref098","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1108\/IJICC-09-2019-0105","article-title":"A hybrid constriction coefficient-based particle swarm optimization and gravitational search algorithm for training multi-layer perceptron","volume":"13","year":"2020","journal-title":"International Journal of Intelligent Computing and Cybernetics"},{"issue":"4","key":"key2020111310170396700_ref099","doi-asserted-by":"crossref","first-page":"e354","DOI":"10.1371\/journal.pone.0000354","article-title":"Free-flight odor tracking in Drosophila is consistent with an optimal intermittent scale-free search","volume":"2","year":"2007","journal-title":"PloS One"},{"issue":"3","key":"key2020111310170396700_ref100","first-page":"244","article-title":"Detection of cyberbullying on social media using data mining techniques","volume":"15","year":"2017","journal-title":"International Journal of Computer Science and Information Security (IJCSIS)"},{"key":"key2020111310170396700_ref101","first-page":"420","article-title":"INF-HatEval at SemEval-2019 task 5: convolutional neural networks for hate speech detection against women and immigrants on Twitter","year":"2019"},{"issue":"6","key":"key2020111310170396700_ref102","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1037\/h0042519","article-title":"The perceptron: a probabilistic model for information storage and organization in the brain","volume":"65","year":"1958","journal-title":"Psychological Review"},{"key":"key2020111310170396700_ref103","doi-asserted-by":"publisher","first-page":"377","DOI":"10.18653\/v1\/S19-2066","article-title":"Amobee at SemEval-2019 tasks 5 and 6: multiple choice CNN over contextual embedding","volume-title":"Proceedings of the 13th International Workshop on Semantic Evaluation. Association for Computational Linguistics","year":"2019"},{"key":"key2020111310170396700_ref104","volume-title":"Latent Universal Task-specific BERTArXiv","year":"2019"},{"key":"key2020111310170396700_ref105","article-title":"An Italian Twitter corpus of hate speech against immigrants","year":"2018"},{"key":"key2020111310170396700_ref106","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.ijnurstu.2016.02.004","article-title":"Using Twitter\u2122 to drive research impact: a discussion of strategies, opportunities and challenges","volume":"59","year":"2016","journal-title":"International Journal of Nursing Studies"},{"key":"key2020111310170396700_ref107","first-page":"159","article-title":"Text analysis for hate speech detection using backpropagation neural network","year":"2018"},{"key":"key2020111310170396700_ref108","first-page":"365","article-title":"Kdehateval at semeval-2019 task 5: a neural network model for detecting hate speech in Twitter","year":"2019"},{"issue":"5","key":"key2020111310170396700_ref109","doi-asserted-by":"crossref","first-page":"739","DOI":"10.1007\/s10964-012-9867-3","article-title":"Is cyberbullying worse than traditional bullying? Examining the differential roles of medium, publicity, and anonymity for the perceived severity of bullying","volume":"42","year":"2013","journal-title":"Journal of Youth and Adolescence"},{"issue":"4","key":"key2020111310170396700_ref110","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1023\/A:1008202821328","article-title":"Differential evolution\u2013a simple and efficient heuristic for global optimization over continuous spaces","volume":"11","year":"1997","journal-title":"Journal of Global Optimization"},{"issue":"2","key":"key2020111310170396700_ref111","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1016\/j.adengl.2016.01.002","article-title":"e-Dermatology: social networks and other web based tools","volume":"107","year":"2016","journal-title":"Actas Dermo-Sifiliogr\u00e1ficas"},{"key":"key2020111310170396700_ref112","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.neunet.2018.12.002","article-title":"Deep learning in spiking neural networks","volume":"111","year":"2019","journal-title":"Neural Networks"},{"issue":"3","key":"key2020111310170396700_ref113","doi-asserted-by":"crossref","first-page":"36","DOI":"10.5121\/ijaia.2011.2304","article-title":"Improved cuckoo search algorithm for feedforward neural network training","volume":"2","year":"2011","journal-title":"International Journal of Artificial Intelligence and Applications"},{"key":"key2020111310170396700_ref114","first-page":"447","article-title":"MineriaUNAM at SemEval-2019 task 5: detecting hate speech in Twitter using multiple features in a combinatorial framework","year":"2019"},{"issue":"1","key":"key2020111310170396700_ref115","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1080\/19331681.2019.1702607","article-title":"Detecting weak and strong Islamophobic hate speech on social media","volume":"17","year":"2020","journal-title":"Journal of Information Technology and Politics"},{"key":"key2020111310170396700_ref116","first-page":"231","article-title":"Automatic crime prediction using events extracted from Twitter posts","year":"2012"},{"key":"key2020111310170396700_ref117","first-page":"19","article-title":"Detecting hate speech on the world wide web","year":"2012"},{"key":"key2020111310170396700_ref118","first-page":"88","article-title":"Hateful symbols or hateful people? predictive features for hate speech detection on Twitter","year":"2016"},{"key":"key2020111310170396700_ref119","first-page":"431","article-title":"Know-center at SemEval-2019 task 5: multilingual hate speech detection on Twitter using CNNs","year":"2019"},{"key":"key2020111310170396700_ref120","first-page":"1980","article-title":"Detecting offensive tweets via topical feature discovery over a large scale Twitter corpus","year":"2012"},{"key":"key2020111310170396700_ref121","first-page":"210","article-title":"Cuckoo search via L\u00e9vy flights","year":"2009"},{"issue":"4","key":"key2020111310170396700_ref122","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1504\/IJMMNO.2010.035430","article-title":"Engineering optimization by cuckoo search","volume":"1","year":"2010","journal-title":"International Journal of Mathematical Modelling and Numerical Optimisation"},{"issue":"6","key":"key2020111310170396700_ref123","doi-asserted-by":"crossref","first-page":"1616","DOI":"10.1016\/j.cor.2011.09.026","article-title":"Multiobjective cuckoo search for design optimization","volume":"40","year":"2013","journal-title":"Computers and Operations Research"},{"key":"key2020111310170396700_ref124","volume-title":"Nature-inspired Optimization Algorithms","year":"2014"},{"key":"key2020111310170396700_ref125","first-page":"745","article-title":"Detecting hate speech on Twitter using a convolution-gru based deep neural network","year":"2018"},{"issue":"10","key":"key2020111310170396700_ref126","first-page":"4193","article-title":"A novel cuckoo search optimization algorithm based on Gauss distribution","volume":"8","year":"2012","journal-title":"Journal of Computational Information Systems"},{"key":"key2020111310170396700_ref127","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1016\/j.neucom.2019.10.072","article-title":"Visual abstraction and exploration of large-scale geographical social media data","volume":"376","year":"2020","journal-title":"Neurocomputing"}],"container-title":["International Journal of Intelligent Computing and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJICC-06-2020-0061\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJICC-06-2020-0061\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,13]],"date-time":"2020-11-13T10:18:04Z","timestamp":1605262684000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJICC-06-2020-0061\/full\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,12]]},"references-count":127,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,11,3]]}},"alternative-id":["10.1108\/IJICC-06-2020-0061"],"URL":"https:\/\/doi.org\/10.1108\/ijicc-06-2020-0061","relation":{},"ISSN":["1756-378X"],"issn-type":[{"value":"1756-378X","type":"print"}],"subject":[],"published":{"date-parts":[[2020,10,12]]}}}