IDEAS home Printed from https://ideas.repec.org/a/hin/complx/5639787.html
   My bibliography  Save this article

Towards a Framework for Acquisition and Analysis of Speeches to Identify Suspicious Contents through Machine Learning

Author

Listed:
  • Md. Rashadur Rahman
  • Mohammad Shamsul Arefin
  • Md. Billal Hossain
  • Mohammad Ashfak Habib
  • A. S. M. Kayes

Abstract

The most prominent form of human communication and interaction is speech. It plays an indispensable role for expressing emotions, motivating, guiding, and cheering. An ill-intentioned speech can mislead people, societies, and even a nation. A misguided speech can trigger social controversy and can result in violent activities. Every day, there are a lot of speeches being delivered around the world, which are quite impractical to inspect manually. In order to prevent any vicious action resulting from any misguided speech, the development of an automatic system that can efficiently detect suspicious speech has become imperative. In this study, we have presented a framework for acquisition of speech along with the location of the speaker, converting the speeches into texts and, finally, we have proposed a system based on long short-term memory (LSTM) which is a variant of recurrent neural network (RNN) to classify speeches into suspicious and nonsuspicious. We have considered speeches of Bangla language and developed our own dataset that contains about 5000 suspicious and nonsuspicious samples for training and validating our model. A comparative analysis of accuracy among other machine learning algorithms such as logistic regression, SVM, KNN, Naive Bayes, and decision tree is performed in order to evaluate the effectiveness of the system. The experimental results show that our proposed deep learning-based model provides the highest accuracy compared to other algorithms.

Suggested Citation

  • Md. Rashadur Rahman & Mohammad Shamsul Arefin & Md. Billal Hossain & Mohammad Ashfak Habib & A. S. M. Kayes, 2020. "Towards a Framework for Acquisition and Analysis of Speeches to Identify Suspicious Contents through Machine Learning," Complexity, Hindawi, vol. 2020, pages 1-14, November.
  • Handle: RePEc:hin:complx:5639787
    DOI: 10.1155/2020/5639787
    as

    Download full text from publisher

    File URL: http://downloads.hindawi.com/journals/8503/2020/5639787.pdf
    Download Restriction: no

    File URL: http://downloads.hindawi.com/journals/8503/2020/5639787.xml
    Download Restriction: no

    File URL: https://libkey.io/10.1155/2020/5639787?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:hin:complx:5639787. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Mohamed Abdelhakeem (email available below). General contact details of provider: https://www.hindawi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.