Authors:
Aadil Gani Ganie Department of Information Engineering, Faculty of Mechanical Engineering and Information, University of Miskolc, Miskolc-Egyetemváros, Hungary

Search for other papers by Aadil Gani Ganie in
Current site
Google Scholar
PubMed
Close
https://orcid.org/0000-0002-6607-6994
and
Samad Dadvandipour Department of Information Engineering, Faculty of Mechanical Engineering and Information, University of Miskolc, Miskolc-Egyetemváros, Hungary

Search for other papers by Samad Dadvandipour in
Current site
Google Scholar
PubMed
Close
https://orcid.org/0000-0002-8216-9672
Open access

Abstract

Identification of online hate is the prime concern for natural language processing researchers; social media has augmented this menace by providing a virtual platform for online harassment. This study identifies online harassment using the trolling aggression and cyber-bullying dataset from shared tasks workshop. This work concentrates on extreme pre-processing and ensemble approach for model building; this study also considers the existing algorithms like the random forest, logistic regression, multinomial Naïve Bayes. Logistic regression proves to be more efficient with the highest accuracy of 57.91%. Ensemble bidirectional encoder representation from transformers showed promising results with 62% precision, which is better than most existing models.

Abstract

Identification of online hate is the prime concern for natural language processing researchers; social media has augmented this menace by providing a virtual platform for online harassment. This study identifies online harassment using the trolling aggression and cyber-bullying dataset from shared tasks workshop. This work concentrates on extreme pre-processing and ensemble approach for model building; this study also considers the existing algorithms like the random forest, logistic regression, multinomial Naïve Bayes. Logistic regression proves to be more efficient with the highest accuracy of 57.91%. Ensemble bidirectional encoder representation from transformers showed promising results with 62% precision, which is better than most existing models.

1 Introduction

With the increasing parameter of social media usage among all age groups, its erroneous use has led to online harassment. Cyber or Internet bullying is bullying through digital media, mainly social media. According to UNICEF, cyber-bullying has repetitive behavior to scare those targeted, anger, or shame. Examples include spreading lies about someone, sending hurtful messages or threats on social media through messages, impersonating someone, and sending mean messages on their behalf [1]. Social media provides us with a space to discuss various topics related to day-to-day life. There may be narratives and counter-narratives, which is generally regarded as suitable for dissent and discussion; however, some cyber abusers take this opportunity to abuse and shame someone. With several languages, users utilize while interacting online, the cyber world remains global. In linguistically diverse countries like India, Indonesia, etc., the gap between users using their native language and English speakers are noteworthy. Social media giants like Facebook and Twitter took several steps to mitigate or eradicate cyber abuse, but it still exists. This study has been carried out to identify online harassment in multilingual text. Significant work has been done to determine cyber harassment in an automated way using traditional supervised machine learning methods like Support Vector Machine (SVM), Long Short Term Memory (LSTM), logistic regression, decision trees, etc., [2–4]. Though, most of the work has been prepared in the English language. This study used fine-tuned uncased-Bidirectional Encoder Representation from Transformers (BERT) architecture for identifying online harassment in a multilingual dataset. Authors in [5] tried to detect the cyber abuse in multilingual data, but they used simple transformer architecture without fine-tuning and significant preprocessing of the textual data. This study focuses on the famous ensemble approach to attain more accuracy. In preprocessing, lemmatization, stop-word removal, Parts of Speech (PoS) tagging have been evaluated to feed the most accurate data to the model. Before using the pre-trained BERT network, the data was provided into various traditional classifiers like SVM, multinomial Niave Bayes, Logistic regression, etc. Almost all the classifiers achieved the same accuracy. This study used TRolling Aggression and Cyber-bullying (TRAC)-1 dataset and showed accuracy close to state-of-art results and more than the baseline without much fine-tuning.

2 Materials and methods

Online harassment can take any form, but predominantly it is rooted in social media. The latest survey by pew research center [6] finds that 75% of the targets of online abuse equaling 31% of Americans overall say their most recent experience of online hate was on social media. Questions have been upraised on the working of social media giants for the elimination or mitigation of online harassment; about 79% say social media companies are not doing a fair job at addressing online harassment bullying on their platforms. Some of the key findings of an online survey conducted by the American trends panel [7] are that 41% of American adults have experienced online hate, and 25% have experienced grave harassment. The above disturbing trends have forced the researchers to automate the detection and subsequent eradication of online harassment, which eventually gives rise to online hate detection using Natural Language Processing (NLP). It is pretty challenging and perplexing to institutionalize the idea of abuse. Mishra [8] used it to discuss racism and sexism, while Nobata [9] referred to hate speech, profanity, and derogatory language. The first reported method for abuse detection was that of Spertus [10] in 1997, who hand-crafted rules over text to generate feature vectors for learning. Dadvar [11] uses a social feature engineering technique that incorporates features and identity traits of a user to the model likelihood of abusive behavior called user profiling Dadvar [11] includes the user's age alongside other lexicon-based features to detect cyber-bullying. In [12], authors used the gender of Twitter users with character n-gram for detection of sexism and racism in tweets F1-score improved from an existing 73.89%–73.93%. Authors [13] were the first to use the deep learning model for online harassment detection. They improved the accuracy of their model from existing 78.89%–80.07%, which outperforms the existing traditional methods significantly. In [4], used LSTM model with GloVe for feature engineering to detect online abuse, they achieved the best (weighted F1 of 93%) results by randomly initializing embeddings. Park and Fung [14] categorize the comments collected by combining two datasets, they concluded that combining the two-granularities using two input channels improves accuracy other researchers like [15–17] acknowledge the same. In GermEval shared task [18], authors made the winning submission with an F1-score of 76.95% and 53.59% for sub-task 1 and sub-task 2. Researchers in [19] have shown that learning about the classification of emotions and detecting abuse leads to improved performance.

3 Dataset

For this study data has been collected from the dataset - the shared task on aggression identification organized at the trolling, aggression, and cyber-bullying workshop [20]. Training data consists of 10,799 randomly selected Facebook comments; these comments have been annotated into three categories Overly AGgressive (OAG), COovertly Aggressive (COA), and Non-AGgressive (NAG). Test data or validation data is 1200 samples.

4 Results and discussion

Identification of observations as abusive gives the victims of abuse validation and allows observers to understand the extent of the problem. This study tried to identify online harassment using pre-trained BERT with an ensemble approach on the TRAC-1 dataset. The most recent study by [5] has used simple BERT architecture without considering the importance of preprocessing steps like handling of Not a Number (NaN) values, stopword removal, PoS tagging, contractions, stemming and lemmatization, which suggests that probably their model was not trained on good data, which may have led to model over-fitting[21–24]. The researchers also did not consider the fine-tuning strategies [25–26], which supplement the model to achieve better results. In this study, all the steps mentioned above were performed and try to identify the abuse in the multilingual text as it is shown in Table 1. This experiment has been conducted on Graphic Processing Unit (GPU) Tesla T4, core i5, 12 GB RAM.

Table 1.

Data preprocessing

Id Facebook_corpus_msr_466073
Text Most Private Banks ATM's Like HDFC, ICICI etc., are out of cash. Only Public sector bank's ATMs working
Label NAG
Clean Most of private banks atm like hdfc, icici etc. are out of cash. only public sector bank atm working
No contractions [‘most', ‘of', ‘private', ‘banks', ‘atm', ‘like', ‘hdfc,', ‘icici', ‘etc', ‘are', ‘out', ‘of', ‘cash.', ‘only', ‘public', ‘sector', ‘bank', ‘atm', ‘working']
Stopwords [‘private', ‘banks', ‘atm', ‘like', ‘hdfc', ‘icici', ‘etc', ‘cash', ‘public', ‘sector', ‘bank', ‘atm', ‘working']
PoSTag [(‘private', ‘JJ'), (‘banks', ‘NNS'), (‘atm', ‘VBP'), (‘like', ‘IN'), (‘hdfc', ‘NN'), (‘icici', ‘NN'), (‘etc', ‘FW'), (‘cash', ‘NN'), (‘public', ‘NN'), (‘sector', ‘NN'), (‘bank', ‘NN'), (‘atm', ‘IN'), (‘working', ‘VBG')]
Lemmatized most of private banks atm like hdfc icici etc are out of cash only public sector bank atm working

After preprocessing, the data has been fed into various famous existing algorithms like SVM, Naïve Bayes, logistic regression, random forest, etc., due to the shallow nature of the network, but the results obtained were not satisfactory. The accuracy achieved is not a milestone, but it is more than the baseline, which is 35.53% as it is shown in Fig. 1. Due to poor performance by the above algorithms deep learning approach has been introduced, the data has been fed into the pre-trained BERT with a multi-head attention model. It works on the mechanism of multi-head attention with a masked language model. BERT is a language representation pre-training method used to create models that are then freely downloaded and utilized by NLP practitioners. There are two ways to approach the problem either use the existing models to extract language features of high quality from text data, or fine-tune them to produce state-of-the-art predictions for a particular task (classification, identification of entities, answering question, etc.).

Fig. 1.
Fig. 1.

Result of machine learning algorithms

Citation: Pollack Periodica 17, 3; 10.1556/606.2022.00608

Three main advantages of BERT are quicker development, fewer data and better results. Fine-tuning the model played an important role in increasing the network's performance. BERT sequence classifier from transformers has been used for classification. BERT comes in two variants base model and large model. The size of training data is only difference between the two variants. This study used a bert-based-uncased model with several labels 3. Results of various fine-tuning parameters are listed below. BERT consists of the encoder and decoder parts. The first encoder layer receives a concatenation of WordPiece embeddings and positional embeddings produced from the input sequence as its input representation. The conversion of a query and a group of key-value pairs to output can be characterized as an attention function, where the question, keys, values, and production are all vectors. The result is a weighted sum of the values, with the weight allocated to each value determined by the query's compatibility function with the relevant key. a Query, Key, and Value vector for each input embedding token are built by multiplying the embedding by three learned matrices W Q , W K , and W V , respectively, given an embedded column vector x for an input sequence. The Query, Key, and Value vectors are stacked into column vectors Q, K, V for concurrent computing. The self-attention function is therefore provided by:
Attention ( x ) = Attention ( Q , K , V ) = softmax Q K d k V ,
where d k is the dimension of queries and keys. The transformer performs self-attention function in parallel with multiple attention heads by projecting the queries, keys and values h times with different, learned linear projections to d k ; d k and d v dimensions, respectively. Attention function is performed in parallel on each of these projected versions of queries, keys and values, resulting d v -dimensional output column vector values,
M u l t i H e a d ( x ) = M u l t i H e a d ( Q , K , V ) = C o n c a t ( h e a d 1 , , h e a d h ) W o ,
this operation C o n c a t ( h e a d 1 , , h e a d h ) W o results in row vector, because W is a matrix. Concat is a row vector, so the result is a row vector, it means that M u l t i H e a d ( x ) is a row vector and here h e a d i = A t t e n t i o n ( W i Q Q , W i K K , W i V V ) . Concat is the concatenation function; the projections are parameter matrices W i Q d m a d d e l × d k , W i K d m a d d × i × d k , W i V d m a d d × d v and W O h d y × d m o d e l w i t h d m o d e l = d k h .
Each transformer layer consists of two sub-layers. The first sub-layer is the multi-head attention and its normalized output is fed to the second sub-layer of fully connected feed forward network. The activation function for the feed forward networks is ReLU. Formally, the hidden states of transformer with M number of transformer layers are calculated as follows:
T r m ( x ) = norm ( A t t ( x ) + F F N ( A t t ( x ) ) ) ,
where
A t t ( x ) = norm ( x T + M u l t i H e a d ( x ) ) , F F N ( x ) = m ( 0 , x T W 1 + b 1 ) W 2 + b 2 , .
where norm is the normalization function with linear connection followed by fully connected feed forward network, W 1 and W 2 are the weights of the first and second fully connected networks with b 1, b 2 as bias values, and m ϵ M.
BERT creates a corrupted version X ˆ by randomly assigning a special symbol [MASK] to 15% of the tokens in x . If the masked tokens are denoted as x, the training goal is to reconstruct x from X ˆ ,
max θ log p θ ( x | x ˆ ) t = 1 T m t logp θ ( x t | x ˆ ) = t = 1 T m t log exp ( H θ ( x ˆ ) t e ( x t ) ) x exp ( H θ ( x ˆ ) t e ( x ) ) ,
where m t = 1 denotes token x t is masked, e(x) indicates the embedding of x and H θ is a transformer that transforms a length-T text sequence x into a series of hidden vectors H θ ( x ) = [ H θ ( x ) 1 , H θ ( x ) 2 , , H θ ( x ) T ] . The results with fine-tuning are shown in Tables 2-5, the comparison between the existed methods and this approach is shown in Fig. 2.
Table 2.

Learning = 2∙10−5, batch size =32

Epoch Training loss Validation Loss Validation Accuracy Training Time Validation Time
1 0.90 0.83 0.59 0:02:04 0:00:04
2 0.64 0.85 0.6 0:02:00 0:00:05
3 0.31 1.11 0.6 0:02:01 0:00:05
4 0.12 1.31 0.6 0:02:02 0:00:05
Table 3.

Learning rate = 5∙10−5, batch size = 64

Epoch Training loss Validation Loss Validation Accuracy Training Time Validation Time
1 0.91 0.85 0.60 0:01:31 0:00:08
2 0.61 0.95 0.60 0:01:36 0:00:09
3 0.23 1.31 0.60 0:01:38 0:00:09
4 0.07 1.60 0.60 0:01:39 0:00:09
Table 4.

Learning rate = 2∙10−5, batch size = 64

Epoch Training loss Validation Loss Validation Accuracy Training Time Validation Time
1 0.92 0.85 0.59 0:01:43 0:00:04
2 0.70 0.86 0.60 0:01:48 0:00:04
3 0.45 0.97 0.60 0:01:50 0:00:04
4 0.26 1.07 0.60 0:01:51 0:00:04
Table 5.

Learning rate = 5∙10−5, batch size = 16

Epoch Training loss Validation Loss Validation Accuracy Training Time Validation Time
1 0.90 0.86 0.59 0:02:13 0:00:05
2 0.61 0.94 0.60 0:02:19 0:00:05
3 0.27 1.34 0.61 0:02:21 0:00:05
4 0.11 1.85 0.62 0:02:21 0:00:05
Fig. 2.
Fig. 2.

Result comparison on test data

Citation: Pollack Periodica 17, 3; 10.1556/606.2022.00608

5 Conclusion

The research has been carried out to identify the online harassment on digital media using a famous dataset from the shared task of identifying trolling, aggression, and cyber-bullying workshop (TRAC-1), unlike existing studies, which fed the semi preprocessed data to the model. This study preprocessed the data significantly by applying the techniques like contraction handling, stemming, lemmatization, stop-word removal, etc. The preprocessed data has been fed to the existing algorithm like Naïve Bayes logistic regression, but the accuracy achieved is not par. This work achieved competitive accuracy compared to state-of-the-art models by using fine-tuning strategies for pre-trained BERT with an ensemble approach. However, it can be concluded that with the increase in batch size and learning rate, the accuracy deteriorates, and the model starts to over-fit.

Acknowledgements

Author is highly thankful to my supervisor and my faculty for their continuous support.

References

  • [1]

    Cyberbullying: What is it and how to stop it . [Online]. Available: https://www.unicef.org/end-violence/how-to-stop-cyberbullying. Accessed Apr. 25, 2021.

  • [2]

    K. Dinakar , R. Reichart , and H. Lieberman , “Modeling the detection of textual cyberbullying,” in Proceedings of the International AAAI Conference on Web and Social Media, vol. 5, no. 1, pp. 1117, 2011.

    • Search Google Scholar
    • Export Citation
  • [3]

    K. Reynolds , A. Kontostathis , and L. Edwards , “Using machine learning to detect cyberbullying,” in 10th International Conference on Machine Learning and Applications and Workshops, Honolulu, HI, USA, Dec. 18–21, 2011, vol. 2, pp. 241244.

    • Search Google Scholar
    • Export Citation
  • [4]

    P. Badjatiya , S. Gupta , M. Gupta , and V. Varma , “Deep learning for hate speech detection in tweets,” in Proceedings of the 26th International Conference on World Wide Web Companion, Austin, USA, April 5–6, 2017, pp. 759760.

    • Search Google Scholar
    • Export Citation
  • [5]

    A. Malte and P. Ratadiya , “Multilingual cyber abuse detection using advanced transformer architecture,” in TENCON 2019-2019 IEEE Region 10 Conference, Kochi, India, Oct. 17–20, 2019, pp. 784789.

    • Search Google Scholar
    • Export Citation
  • [6]

    The state of online harassment. [Online]. Available: https://www.pewresearch.org/internet/2021/01/13/the-state-of-online-harassment/. Accessed: Apr. 27, 2021.

    • Search Google Scholar
    • Export Citation
  • [7]

    The American Trends Panel. [Online]. Available: https://www.pewresearch.org/methods/u-s-survey-research/american-trends-panel/. Accessed: Apr. 27, 2021.

    • Search Google Scholar
    • Export Citation
  • [8]

    P. Mishra , M. D. Tredici , H. Yannakoudakis , and E. Shutova , “Author profiling for abuse detection,” in Proceedings of the 27th International Conference on Computational Linguistics, Santa Fe, New Mexico, USA, Aug. 31, 2018, pp. 10881098.

    • Search Google Scholar
    • Export Citation
  • [9]

    D. Samad and G. A. Gani , “Analyzing and predicting spear-phishing using machine learning methods,” Multidiszciplináris Tudományok, vol. 10, no. 4, pp. 262273, 2020.

    • Search Google Scholar
    • Export Citation
  • [10]

    C. Nobata , J. Tetreault , A. Thomas , Y. Mehdad , and Y. Chang , “Abusive language detection in online user content,” in Proceedings of the 25th International Conference on World Wide Web, Montréal, Québec, Canada, Ap. 11–15, 2016, pp. 145153.

    • Search Google Scholar
    • Export Citation
  • [11]

    E. Spertus , “Smokey: Automatic recognition of hostile messages,” in Proceedings of IAAI-97, The 9th Conference on Innovative Application of Artificial Intelligence, Providence Rhode Island, Jul. 27, 1997, pp. 10581065.

    • Search Google Scholar
    • Export Citation
  • [12]

    M. Dadvar , D. Trieschnigg , R. Ordelman , and F. de Jong , “Improving cyberbullying detection with user context,” in European Conference on Information Retrieval, Moscow, Russia, Mar. 24–27, 2013, pp. 693696.

    • Search Google Scholar
    • Export Citation
  • [13]

    A. G. Ganie , “Private network optimization,” Multidiszciplináris Tudományok, vol. 11, no. 4, pp. 248254, 2021.

  • [14]

    Z. Waseem and D. Hovy , “Hateful symbols or hateful people? predictive features for hate speech detection on twitter,” in Proceedings of the NAACL Student Research Workshop, San Diego, California, June 17, 2016, pp. 8893.

    • Search Google Scholar
    • Export Citation
  • [15]

    N. Djuric , J. Zhou , R. Morris , M. Grbovic , V. Radosavljevic , and N. Bhamidipati , “Hate speech detection with comment embedding,” in Proceedings of the 24th International Conference on World Wide Web, Florence, Italy, May 18–22, 2015, pp. 2930.

    • Search Google Scholar
    • Export Citation
  • [16]

    J. H. Park and P. Fung , “One-step and two-step classification for abusive language detection on twitter,” in Proceedings of the First Workshop on Abusive Language Online, Vancouver, Canada, Jul. 30–Aug. 4, 2017, pp. 4145.

    • Search Google Scholar
    • Export Citation
  • [17]

    V. Singh , A. Varshney , S. S. Akhtar , D. Vijay , and M. Shrivastava , “Aggression detection on social media text using deep neural networks,” in Proceedings of the 2nd Workshop on Abusive Language Online, Brussels, Belgium, Oct. 31, 2018, pp. 4350.

    • Search Google Scholar
    • Export Citation
  • [18]

    C. Wang , “Interpreting neural network hate speech classifiers,” in Proceedings of the 2nd Workshop on Abusive Language Online, Brussels, Belgium, Oct. 31, 2018, pp. 8692.

    • Search Google Scholar
    • Export Citation
  • [19]

    Z. Zhang , D. Robinson , and J. Tepper , “Detecting hate speech on twitter using a convolution-gru based deep neural network,” in European Semantic Web Conference, Crete, Greece, Jun. 3–7, 2018, pp. 745760.

    • Search Google Scholar
    • Export Citation
  • [20]

    A. G. Ganie and S. Dadvandipour , “Sentiment analysis on the effect of trending source less News: special reference to the recent death of an Indian actor,” in International Conference on Artificial Intelligence and Sustainable Computing, Greater Noida, India, Mar. 22–23, 2021, pp. 316.

    • Search Google Scholar
    • Export Citation
  • [21]

    A. Paraschiv and D. C. Cercel , “UPB at GermEval-2019 Task 2: BERT-Based Offensive Language Classification of German Tweets,” in Proceedings of the 15th Conference on Natural Language Processing, Erlangen, Germany, Oct. 8, 2019, pp. 395402.

    • Search Google Scholar
    • Export Citation
  • [22]

    S. Rajamanickam , P. Mishra , H. Yannakoudakis , and E. Shutova , “Joint modeling of emotion and abusive language detection,” in Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, Online, Jul. 5–10, 2020, pp. 42704279.

    • Search Google Scholar
    • Export Citation
  • [23]

    A. G. Ganie , S. Dadvandipour , and M. A. Lone , “Detection of semantic obsessive text in multimedia using machine and deep learning techniques and algorithms,” J. Theor. Appl. Inf. Technol., vol. 99, no. 11, pp. 25672577, 2021.

    • Search Google Scholar
    • Export Citation
  • [24]

    S. Modha , P. Majumder , and T. Mandl , “Filtering aggression from the multilingual social media feed,” in Proceedings of the First Workshop on Trolling, Aggression, and Cyberbullying, Santa Fe, New Mexico, USA, Aug. 18, 2018, pp. 199207.

    • Search Google Scholar
    • Export Citation
  • [25]

    M. H. Al-Hafadhi and G. Krallics , “Prediction and numerical simulation of residual stress in multi-pass pipe welds,” Pollack Period., vol. 16, no. 2, pp. 712, 2021.

    • Search Google Scholar
    • Export Citation
  • [26]

    L. Kota and K. Jármai , “Improving optimization using adaptive algorithms,” Pollack Period., vol. 16, no. 1, pp. 1418, 2021.

  • [1]

    Cyberbullying: What is it and how to stop it . [Online]. Available: https://www.unicef.org/end-violence/how-to-stop-cyberbullying. Accessed Apr. 25, 2021.

  • [2]

    K. Dinakar , R. Reichart , and H. Lieberman , “Modeling the detection of textual cyberbullying,” in Proceedings of the International AAAI Conference on Web and Social Media, vol. 5, no. 1, pp. 1117, 2011.

    • Search Google Scholar
    • Export Citation
  • [3]

    K. Reynolds , A. Kontostathis , and L. Edwards , “Using machine learning to detect cyberbullying,” in 10th International Conference on Machine Learning and Applications and Workshops, Honolulu, HI, USA, Dec. 18–21, 2011, vol. 2, pp. 241244.

    • Search Google Scholar
    • Export Citation
  • [4]

    P. Badjatiya , S. Gupta , M. Gupta , and V. Varma , “Deep learning for hate speech detection in tweets,” in Proceedings of the 26th International Conference on World Wide Web Companion, Austin, USA, April 5–6, 2017, pp. 759760.

    • Search Google Scholar
    • Export Citation
  • [5]

    A. Malte and P. Ratadiya , “Multilingual cyber abuse detection using advanced transformer architecture,” in TENCON 2019-2019 IEEE Region 10 Conference, Kochi, India, Oct. 17–20, 2019, pp. 784789.

    • Search Google Scholar
    • Export Citation
  • [6]

    The state of online harassment. [Online]. Available: https://www.pewresearch.org/internet/2021/01/13/the-state-of-online-harassment/. Accessed: Apr. 27, 2021.

    • Search Google Scholar
    • Export Citation
  • [7]

    The American Trends Panel. [Online]. Available: https://www.pewresearch.org/methods/u-s-survey-research/american-trends-panel/. Accessed: Apr. 27, 2021.

    • Search Google Scholar
    • Export Citation
  • [8]

    P. Mishra , M. D. Tredici , H. Yannakoudakis , and E. Shutova , “Author profiling for abuse detection,” in Proceedings of the 27th International Conference on Computational Linguistics, Santa Fe, New Mexico, USA, Aug. 31, 2018, pp. 10881098.

    • Search Google Scholar
    • Export Citation
  • [9]

    D. Samad and G. A. Gani , “Analyzing and predicting spear-phishing using machine learning methods,” Multidiszciplináris Tudományok, vol. 10, no. 4, pp. 262273, 2020.

    • Search Google Scholar
    • Export Citation
  • [10]

    C. Nobata , J. Tetreault , A. Thomas , Y. Mehdad , and Y. Chang , “Abusive language detection in online user content,” in Proceedings of the 25th International Conference on World Wide Web, Montréal, Québec, Canada, Ap. 11–15, 2016, pp. 145153.

    • Search Google Scholar
    • Export Citation
  • [11]

    E. Spertus , “Smokey: Automatic recognition of hostile messages,” in Proceedings of IAAI-97, The 9th Conference on Innovative Application of Artificial Intelligence, Providence Rhode Island, Jul. 27, 1997, pp. 10581065.

    • Search Google Scholar
    • Export Citation
  • [12]

    M. Dadvar , D. Trieschnigg , R. Ordelman , and F. de Jong , “Improving cyberbullying detection with user context,” in European Conference on Information Retrieval, Moscow, Russia, Mar. 24–27, 2013, pp. 693696.

    • Search Google Scholar
    • Export Citation
  • [13]

    A. G. Ganie , “Private network optimization,” Multidiszciplináris Tudományok, vol. 11, no. 4, pp. 248254, 2021.

  • [14]

    Z. Waseem and D. Hovy , “Hateful symbols or hateful people? predictive features for hate speech detection on twitter,” in Proceedings of the NAACL Student Research Workshop, San Diego, California, June 17, 2016, pp. 8893.

    • Search Google Scholar
    • Export Citation
  • [15]

    N. Djuric , J. Zhou , R. Morris , M. Grbovic , V. Radosavljevic , and N. Bhamidipati , “Hate speech detection with comment embedding,” in Proceedings of the 24th International Conference on World Wide Web, Florence, Italy, May 18–22, 2015, pp. 2930.

    • Search Google Scholar
    • Export Citation
  • [16]

    J. H. Park and P. Fung , “One-step and two-step classification for abusive language detection on twitter,” in Proceedings of the First Workshop on Abusive Language Online, Vancouver, Canada, Jul. 30–Aug. 4, 2017, pp. 4145.

    • Search Google Scholar
    • Export Citation
  • [17]

    V. Singh , A. Varshney , S. S. Akhtar , D. Vijay , and M. Shrivastava , “Aggression detection on social media text using deep neural networks,” in Proceedings of the 2nd Workshop on Abusive Language Online, Brussels, Belgium, Oct. 31, 2018, pp. 4350.

    • Search Google Scholar
    • Export Citation
  • [18]

    C. Wang , “Interpreting neural network hate speech classifiers,” in Proceedings of the 2nd Workshop on Abusive Language Online, Brussels, Belgium, Oct. 31, 2018, pp. 8692.

    • Search Google Scholar
    • Export Citation
  • [19]

    Z. Zhang , D. Robinson , and J. Tepper , “Detecting hate speech on twitter using a convolution-gru based deep neural network,” in European Semantic Web Conference, Crete, Greece, Jun. 3–7, 2018, pp. 745760.

    • Search Google Scholar
    • Export Citation
  • [20]

    A. G. Ganie and S. Dadvandipour , “Sentiment analysis on the effect of trending source less News: special reference to the recent death of an Indian actor,” in International Conference on Artificial Intelligence and Sustainable Computing, Greater Noida, India, Mar. 22–23, 2021, pp. 316.

    • Search Google Scholar
    • Export Citation
  • [21]

    A. Paraschiv and D. C. Cercel , “UPB at GermEval-2019 Task 2: BERT-Based Offensive Language Classification of German Tweets,” in Proceedings of the 15th Conference on Natural Language Processing, Erlangen, Germany, Oct. 8, 2019, pp. 395402.

    • Search Google Scholar
    • Export Citation
  • [22]

    S. Rajamanickam , P. Mishra , H. Yannakoudakis , and E. Shutova , “Joint modeling of emotion and abusive language detection,” in Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, Online, Jul. 5–10, 2020, pp. 42704279.

    • Search Google Scholar
    • Export Citation
  • [23]

    A. G. Ganie , S. Dadvandipour , and M. A. Lone , “Detection of semantic obsessive text in multimedia using machine and deep learning techniques and algorithms,” J. Theor. Appl. Inf. Technol., vol. 99, no. 11, pp. 25672577, 2021.

    • Search Google Scholar
    • Export Citation
  • [24]

    S. Modha , P. Majumder , and T. Mandl , “Filtering aggression from the multilingual social media feed,” in Proceedings of the First Workshop on Trolling, Aggression, and Cyberbullying, Santa Fe, New Mexico, USA, Aug. 18, 2018, pp. 199207.

    • Search Google Scholar
    • Export Citation
  • [25]

    M. H. Al-Hafadhi and G. Krallics , “Prediction and numerical simulation of residual stress in multi-pass pipe welds,” Pollack Period., vol. 16, no. 2, pp. 712, 2021.

    • Search Google Scholar
    • Export Citation
  • [26]

    L. Kota and K. Jármai , “Improving optimization using adaptive algorithms,” Pollack Period., vol. 16, no. 1, pp. 1418, 2021.

  • Collapse
  • Expand

Senior editors

Editor(s)-in-Chief: Iványi, Amália

Editor(s)-in-Chief: Iványi, Péter

 

Scientific Secretary

Miklós M. Iványi

Editorial Board

  • Bálint Bachmann (Institute of Architecture, Faculty of Engineering and Information Technology, University of Pécs, Hungary)
  • Jeno Balogh (Department of Civil Engineering Technology, Metropolitan State University of Denver, Denver, Colorado, USA)
  • Radu Bancila (Department of Geotechnical Engineering and Terrestrial Communications Ways, Faculty of Civil Engineering and Architecture, “Politehnica” University Timisoara, Romania)
  • Charalambos C. Baniotopolous (Department of Civil Engineering, Chair of Sustainable Energy Systems, Director of Resilience Centre, School of Engineering, University of Birmingham, U.K.)
  • Oszkar Biro (Graz University of Technology, Institute of Fundamentals and Theory in Electrical Engineering, Austria)
  • Ágnes Borsos (Institute of Architecture, Department of Interior, Applied and Creative Design, Faculty of Engineering and Information Technology, University of Pécs, Hungary)
  • Matteo Bruggi (Dipartimento di Ingegneria Civile e Ambientale, Politecnico di Milano, Italy)
  • Petra Bujňáková (Department of Structures and Bridges, Faculty of Civil Engineering, University of Žilina, Slovakia)
  • Anikó Borbála Csébfalvi (Department of Civil Engineering, Institute of Smart Technology and Engineering, Faculty of Engineering and Information Technology, University of Pécs, Hungary)
  • Mirjana S. Devetaković (Faculty of Architecture, University of Belgrade, Serbia)
  • Szabolcs Fischer (Department of Transport Infrastructure and Water Resources Engineering, Faculty of Architerture, Civil Engineering and Transport Sciences Széchenyi István University, Győr, Hungary)
  • Radomir Folic (Department of Civil Engineering, Faculty of Technical Sciences, University of Novi Sad Serbia)
  • Jana Frankovská (Department of Geotechnics, Faculty of Civil Engineering, Slovak University of Technology in Bratislava, Slovakia)
  • János Gyergyák (Department of Architecture and Urban Planning, Institute of Architecture, Faculty of Engineering and Information Technology, University of Pécs, Hungary)
  • Kay Hameyer (Chair in Electromagnetic Energy Conversion, Institute of Electrical Machines, Faculty of Electrical Engineering and Information Technology, RWTH Aachen University, Germany)
  • Elena Helerea (Dept. of Electrical Engineering and Applied Physics, Faculty of Electrical Engineering and Computer Science, Transilvania University of Brasov, Romania)
  • Ákos Hutter (Department of Architecture and Urban Planning, Institute of Architecture, Faculty of Engineering and Information Technolgy, University of Pécs, Hungary)
  • Károly Jármai (Institute of Energy and Chemical Machinery, Faculty of Mechanical Engineering and Informatics, University of Miskolc, Hungary)
  • Teuta Jashari-Kajtazi (Department of Architecture, Faculty of Civil Engineering and Architecture, University of Prishtina, Kosovo)
  • Róbert Kersner (Department of Technical Informatics, Institute of Information and Electrical Technology, Faculty of Engineering and Information Technology, University of Pécs, Hungary)
  • Rita Kiss  (Biomechanical Cooperation Center, Faculty of Mechanical Engineering, Budapest University of Technology and Economics, Budapest, Hungary)
  • István Kistelegdi  (Department of Building Structures and Energy Design, Institute of Architecture, Faculty of Engineering and Information Technology, University of Pécs, Hungary)
  • Stanislav Kmeť (President of University Science Park TECHNICOM, Technical University of Kosice, Slovakia)
  • Imre Kocsis  (Department of Basic Engineering Research, Faculty of Engineering, University of Debrecen, Hungary)
  • László T. Kóczy (Department of Information Sciences, Faculty of Mechanical Engineering, Informatics and Electrical Engineering, University of Győr, Hungary)
  • Dražan Kozak (Faculty of Mechanical Engineering, Josip Juraj Strossmayer University of Osijek, Croatia)
  • György L. Kovács (Department of Technical Informatics, Institute of Information and Electrical Technology, Faculty of Engineering and Information Technology, University of Pécs, Hungary)
  • Balázs Géza Kövesdi (Department of Structural Engineering, Faculty of Civil Engineering, Budapest University of Engineering and Economics, Budapest, Hungary)
  • Tomáš Krejčí (Department of Mechanics, Faculty of Civil Engineering, Czech Technical University in Prague, Czech Republic)
  • Jaroslav Kruis (Department of Mechanics, Faculty of Civil Engineering, Czech Technical University in Prague, Czech Republic)
  • Miklós Kuczmann (Department of Automations, Faculty of Mechanical Engineering, Informatics and Electrical Engineering, Széchenyi István University, Győr, Hungary)
  • Tibor Kukai (Department of Engineering Studies, Institute of Smart Technology and Engineering, Faculty of Engineering and Information Technology, University of Pécs, Hungary)
  • Maria Jesus Lamela-Rey (Departamento de Construcción e Ingeniería de Fabricación, University of Oviedo, Spain)
  • János Lógó  (Department of Structural Mechanics, Faculty of Civil Engineering, Budapest University of Technology and Economics, Hungary)
  • Carmen Mihaela Lungoci (Faculty of Electrical Engineering and Computer Science, Universitatea Transilvania Brasov, Romania)
  • Frédéric Magoulés (Department of Mathematics and Informatics for Complex Systems, Centrale Supélec, Université Paris Saclay, France)
  • Gabriella Medvegy (Department of Interior, Applied and Creative Design, Institute of Architecture, Faculty of Engineering and Information Technology, University of Pécs, Hungary)
  • Tamás Molnár (Department of Visual Studies, Institute of Architecture, Faculty of Engineering and Information Technology, University of Pécs, Hungary)
  • Ferenc Orbán (Department of Mechanical Engineering, Institute of Smart Technology and Engineering, Faculty of Engineering and Information Technology, University of Pécs, Hungary)
  • Zoltán Orbán (Department of Civil Engineering, Institute of Smart Technology and Engineering, Faculty of Engineering and Information Technology, University of Pécs, Hungary)
  • Dmitrii Rachinskii (Department of Mathematical Sciences, The University of Texas at Dallas, Texas, USA)
  • Chro Radha (Chro Ali Hamaradha) (Sulaimani Polytechnic University, Technical College of Engineering, Department of City Planning, Kurdistan Region, Iraq)
  • Maurizio Repetto (Department of Energy “Galileo Ferraris”, Politecnico di Torino, Italy)
  • Zoltán Sári (Department of Technical Informatics, Institute of Information and Electrical Technology, Faculty of Engineering and Information Technology, University of Pécs, Hungary)
  • Grzegorz Sierpiński (Department of Transport Systems and Traffic Engineering, Faculty of Transport, Silesian University of Technology, Katowice, Poland)
  • Zoltán Siménfalvi (Institute of Energy and Chemical Machinery, Faculty of Mechanical Engineering and Informatics, University of Miskolc, Hungary)
  • Andrej Šoltész (Department of Hydrology, Faculty of Civil Engineering, Slovak University of Technology in Bratislava, Slovakia)
  • Zsolt Szabó (Faculty of Information Technology and Bionics, Pázmány Péter Catholic University, Hungary)
  • Mykola Sysyn (Chair of Planning and Design of Railway Infrastructure, Institute of Railway Systems and Public Transport, Technical University of Dresden, Germany)
  • András Timár (Faculty of Engineering and Information Technology, University of Pécs, Hungary)
  • Barry H. V. Topping (Heriot-Watt University, UK, Faculty of Engineering and Information Technology, University of Pécs, Hungary)

POLLACK PERIODICA
Pollack Mihály Faculty of Engineering
Institute: University of Pécs
Address: Boszorkány utca 2. H–7624 Pécs, Hungary
Phone/Fax: (36 72) 503 650

E-mail: peter.ivanyi@mik.pte.hu 

or amalia.ivanyi@mik.pte.hu

Indexing and Abstracting Services:

  • SCOPUS
  • CABELLS Journalytics

 

2023  
Scopus  
CiteScore 1.5
CiteScore rank Q3 (Civil and Structural Engineering)
SNIP 0.849
Scimago  
SJR index 0.288
SJR Q rank Q3

Pollack Periodica
Publication Model Hybrid
Submission Fee none
Article Processing Charge 900 EUR/article
Printed Color Illustrations 40 EUR (or 10 000 HUF) + VAT / piece
Regional discounts on country of the funding agency World Bank Lower-middle-income economies: 50%
World Bank Low-income economies: 100%
Further Discounts Editorial Board / Advisory Board members: 50%
Corresponding authors, affiliated to an EISZ member institution subscribing to the journal package of Akadémiai Kiadó: 100%
Subscription fee 2025 Online subsscription: 381 EUR / 420 USD
Print + online subscription: 456 EUR / 520 USD
Subscription Information Online subscribers are entitled access to all back issues published by Akadémiai Kiadó for each title for the duration of the subscription, as well as Online First content for the subscribed content.
Purchase per Title Individual articles are sold on the displayed price.

 

2023  
Scopus  
CiteScore 1.5
CiteScore rank Q3 (Civil and Structural Engineering)
SNIP 0.849
Scimago  
SJR index 0.288
SJR Q rank Q3

Monthly Content Usage

Abstract Views Full Text Views PDF Downloads
Oct 2024 0 38 18
Nov 2024 0 22 6
Dec 2024 0 332 286
Jan 2025 0 145 110
Feb 2025 0 151 81
Mar 2025 0 85 50
Apr 2025 0 0 0