Designing an E-Repository of Sentiment Data and Cyberbullying Detection in Indonesian using a Parameter Optimization Algorithm for LSTM
Keywords:
Cyberbullying Detection, Database Repository, Long Short-Term Memory (LSTM), Optimizing Parameters, Particle Swarm Optimization (PSO), Salp Swarm Algorithm (SSA)Abstract
The rise in the number of social media users, particularly in Indonesia, has led to an increase in the prevalence of cyberbullying cases in Indonesia. One of the rising social media platform twitter is nominated as the moxt toxic platform. One approach to preventing cyberbullying on social media is to analyse a person's opinion or assessment of the sentiment or emotion expressed on the platform. Sentiment Analysis, has been shown to be an effective strategy for identifying and addressing cyberbullying. Hyperparameter tuning is crucial for enhancing the performance of deep learning models like Long Short-Term Memory (LSTM), which often struggle with optimizing parameters due to local minima. This challenge is tackled using Particle Swarm Optimization (PSO) and Salp Swarm Algorithm (SSA) for more effective tuning.. The research encompasses various stages: data scraping, preprocessing, translating, labeling, and modeling with an LSTM optimized by PSO and SSA to determine the optimal number of LSTM units. This is followed by statistical testing and evaluation. The optimal model will be utilized in the data repository website and cyberbullying classification based on user input and allows users to download and upload datasets with administrator permission. The finding shows that models LSTM that been optimised with PSO (PSO-LSTM), has the best performance between the conventional model and the SSA-LSTM model. The PSO-LSTM algorithm produces 87.43% accuracy, 41.29% loss, and 12.93 seconds execution time. Results of the website data repository design have been tested with the User Acceptance Test with the results running in accordance with the expected results.
Downloads
References
W. Craig et al., “Social Media Use and Cyber-Bullying: A Cross-National Analysis of Young People in 42 Countries,” Journal of Adolescent Health, vol. 66, no. 6, 2020, doi: 10.1016/j.jadohealth.2020.03.006.
S. A. Anggraeni, L. J. H. Lotulung, and ..., “Motif Perilaku Cyberbullying Remaja Di Media Sosial Twitter,” Acta Diurna …. 2022.
M. H. L. Lee, M. Kaur, V. Shaker, A. Yee, R. Sham, and C. S. Siau, “Cyberbullying, Social Media Addiction and Associations with Depression, Anxiety, and Stress among Medical Students in Malaysia,” Int J Environ Res Public Health, vol. 20, no. 4, Feb. 2023, doi: 10.3390/IJERPH20043136.
S. Kaiser, H. Kyrrestad, and S. Fossum, “Cyberbullying status and mental health in Norwegian adolescents,” Scand J Psychol, vol. 61, no. 5, pp. 707–713, Oct. 2020, doi: 10.1111/sjop.12656.
Schonfeld, D. McNiel, T. Toyoshima, and R. Binder, “Cyberbullying and Adolescent Suicide,” Journal of the American Academy of Psychiatry and the Law Online, vol. 51, no. 1, pp. 112–119, Mar. 2023, doi: 10.29158/JAAPL.220078-22.
S. Kemp, “TWITTER STATISTICS AND TRENDS,” DATE REPORTAL. [Online]. Available: https://datareportal.com/essential-twitter-stats?utm_source=DataReportal&utm_medium=Country_Article_Hyperlink&utm_campaign=Digital_2022&utm_term=Indonesia&utm_content=Facebook_Stats_Link
“Twitter Tops the List of Most Toxic Apps.” Accessed: Mar. 01, 2024. [Online]. Available: https://www.forbes.com/sites/petersuciu/2022/06/08/twitter-tops-the-list-of-most-toxic-apps/?sh=6cb110565d53
V. Balakrishnan, S. Khan, and H. R. Arabnia, “Improving cyberbullying detection using Twitter users’ psychological features and machine learning,” Comput Secur, vol. 90, 2020, doi: 10.1016/j.cose.2019.101710.
S. Yang, X. Yu, and Y. Zhou, “LSTM and GRU Neural Network Performance Comparison Study: Taking Yelp Review Dataset as an Example,” Proceedings - 2020 International Workshop on Electronic Communication and Artificial Intelligence, IWECAI 2020, pp. 98–101, Jun. 2020, doi: 10.1109/IWECAI50956.2020.00027.
N. Chintalapudi, G. Battineni, and F. Amenta, “Sentimental Analysis of COVID-19 Tweets Using Deep Learning Models,” Infectious Disease Reports 2021, Vol. 13, Pages 329-339, vol. 13, no. 2, pp. 329–339, Apr. 2021, doi: 10.3390/IDR13020032.
Muzakir, H. Syaputra, and F. Panjaitan, “A Comparative Analysis of Classification Algorithms for Cyberbullying Crime Detection: An Experimental Study of Twitter Social Media in Indonesia,” Scientific Journal of Informatics, vol. 9, no. 2, pp. 133–138, Oct. 2022, doi: 10.15294/SJI.V9I2.35149.
A. Asqolani and E. B. Setiawan, “A Hybrid Deep Learning Approach Leveraging Word2Vec Feature Expansion for Cyberbullying Detection in Indonesian Twitter,” Ingenierie des Systemes d’Information, vol. 28, no. 4, 2023, doi: 10.18280/isi.280410.
D. A. Kristiyanti, I. S. Sitanggang, Annisa, and S. Nurdiati, “Feature Selection Technique Model for Forest and Land Fire Data Sentiment Analysis: Comparison of SSA, PSO, and ALO,” in Proceedings of the 7th 2023 International Conference on New Media Studies, CONMEDIA 2023, 2023. doi: 10.1109/CONMEDIA60526.2023.10428170.
M. Sosnowski et al., “Feature Selection Using New Version of V-Shaped Transfer Function for Salp Swarm Algorithm in Sentiment Analysis,” Computation 2023, Vol. 11, Page 56, vol. 11, no. 3, p. 56, Mar. 2023, doi: 10.3390/COMPUTATION11030056.
N. Govind, M. Sahoo, S. S. K. Pillai, and S. K. Sahu, “IPSD: e-repository of Permian seeds from Indian Lower Gondwana,” Acta Palaeobotanica, vol. 63, no. 2, pp. 151–161, Dec. 2023, doi: 10.35535/ACPA-2023-0010.
D. Riana et al., “Identifikasi Citra Pap Smear RepoMedUNM dengan Menggunakan K-Means Clustering dan GLCM,” Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), vol. 6, no. 1, pp. 1–8, Jan. 2022, doi: 10.29207/RESTI.V6I1.3495.
U. Naseem, I. Razzak, and P. W. Eklund, “A survey of pre-processing techniques to improve short-text quality: a case study on hate speech detection on twitter,” Multimedia Tools and Applications 2020 80:28, vol. 80, no. 28, pp. 35239–35266, Nov. 2020, doi: 10.1007/S11042-020-10082-6.
U. Naseem, I. Razzak, and P. W. Eklund, “A survey of pre-processing techniques to improve short-text quality: a case study on hate speech detection on twitter,” Multimed Tools Appl, vol. 80, no. 28–29, pp. 35239–35266, Nov. 2021, doi: 10.1007/S11042-020-10082-6/METRICS.
H.-T. Duong and A. Nguyen-Thi, “A review: preprocessing techniques and data augmentation for sentiment analysis”, doi: 10.1186/s40649-020-00080-x.
H. H. Wang, “Speech Recorder and Translator using Google Cloud Speech-to-Text and Translation,” Journal of IT in Asia, vol. 9, no. 1, 2021, doi: 10.33736/jita.2815.2021.
M. Suyal and P. Goyal, “A New Classifier Model on Drug Reviews Dataset by VADER Sentiment Analyzer to Analyze Reviews of the Dataset are Real or Fake based on Machine Learning,” International Journal of Engineering Trends and Technology, vol. 70, no. 7, pp. 68–78, Jul. 2022, doi: 10.14445/22315381/IJETT-V70I7P208.
C. Chen, N. Lu, L. Wang, and Y. Xing, “Intelligent selection and optimization method of feature variables in fluid catalytic cracking gasoline refining process,” Comput Chem Eng, vol. 150, p. 107336, Jul. 2021, doi: 10.1016/j.compchemeng.2021.107336.
M. Jain, V. Saihjpal, N. Singh, and S. B. Singh, “An Overview of Variants and Advancements of PSO Algorithm,” Applied Sciences 2022, Vol. 12, Page 8392, vol. 12, no. 17, p. 8392, Aug. 2022, doi: 10.3390/APP12178392.
J. Zhou et al., “Predicting TBM penetration rate in hard rock condition: A comparative study among six XGB-based metaheuristic techniques,” Geoscience Frontiers, vol. 12, no. 3, p. 101091, May 2021, doi: 10.1016/J.GSF.2020.09.020.
R. Poli, J. Kennedy, and T. Blackwell, “Particle Swarm Optimization: An Overview Particle swarm optimization an overview”, doi: 10.1007/s11721-007-0002-0.
M. Sosnowski et al., “Feature Selection Using New Version of V-Shaped Transfer Function for Salp Swarm Algorithm in Sentiment Analysis,” Computation 2023, Vol. 11, Page 56, vol. 11, no. 3, p. 56, Mar. 2023, doi: 10.3390/COMPUTATION11030056.
Q. Duan, L. Wang, H. Kang, Y. Shen, X. Sun, and Q. Chen, “Improved Salp Swarm Algorithm with Simulated Annealing for Solving Engineering Optimization Problems,” Symmetry 2021, Vol. 13, Page 1092, vol. 13, no. 6, p. 1092, Jun. 2021, doi: 10.3390/SYM13061092.
S. Kassaymeh, S. Abdullah, M. A. Al-Betar, and M. Alweshah, “Salp swarm optimizer for modeling the software fault prediction problem,” Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 6, pp. 3365–3378, Jun. 2022, doi: 10.1016/J.JKSUCI.2021.01.015.
L. P. Hung and S. Alias, “Beyond Sentiment Analysis: A Review of Recent Trends in Text Based Sentiment Analysis and Emotion Detection,” Journal of Advanced Computational Intelligence and Intelligent Informatics, vol. 27, no. 1. 2023. doi: 10.20965/jaciii. 2023.p0084.
Picornell et al., “A deep learning LSTM-based approach for forecasting annual pollen curves: Olea and Urticaceae pollen types as a case study,” Comput Biol Med, vol. 168, p. 107706, Jan. 2024, doi: 10.1016/J.COMPBIOMED.2023.107706.
H. Chen, X. Li, Y. Wu, L. Zuo, M. Lu, and Y. Zhou, “Compressive Strength Prediction of High-Strength Concrete Using Long Short-Term Memory and Machine Learning Algorithms,” Buildings 2022, Vol. 12, Page 302, vol. 12, no. 3, p. 302, Mar. 2022, doi: 10.3390/BUILDINGS12030302.
G. Dwijuna Ahadi, N. N. Laili, and E. Zain, “The Simulation Study of Normality Test Using Kolmogorov-Smirnov, Anderson-Darling, and Shapiro-Wilk,” EIGEN MATHEMATICS JOURNAL, vol. 6, no. 1, pp. 11–19, Jun. 2023, doi: 10.29303/EMJ.V6I1.131.
T. K. Kim, “Understanding one-way anova using conceptual figures,” Korean J Anesthesiol, vol. 70, no. 1, pp. 22–26, Feb. 2017, doi: 10.4097/kjae.2017.70.1.22.
Downloads
Published
How to Cite
Issue
Section
License
![Creative Commons License](http://i.creativecommons.org/l/by-sa/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.