Nowadays irony appears to be pervasive in all social media discussion forums and chats, offering further obstacles to sentiment analysis efforts. The aim of the present research work is to detect irony and its types in English tweets We employed a new system for irony detection in English tweets, and we propose a distilled bidirectional encoder representations from transformers (DistilBERT) light transformer model based on the bidirectional encoder representations from transformers (BERT) architecture, this is further strengthened by the use and design of bidirectional long-short term memory (Bi-LSTM) network this configuration minimizes data preprocessing tasks proposed model tests on a SemEval2018 task 3, 3,834 samples were provided. Experiment results show the proposed system has achieved a precision of 81% for not irony class and 66% for irony class, recall of 77% for not irony and 72% for irony, and F1 score of 79% for not irony and 69% for irony class since researchers have come up with a binary classification model, in this study we have extended our work for multiclass classification of irony. It is significant and will serve as a foundation for future research on different types of irony in tweets.
SENTIMENT ANALYSIS IN MYANMAR LANGUAGE USING CONVOLUTIONAL LSTM NEURAL NETWORKijnlc
In recent years, there has been an increasing use of social media among people in Myanmar and writing review on social media pages about the product, movie, and trip are also popular among people. Moreover, most of the people are going to find the review pages about the product they want to buy before deciding whether they should buy it or not. Extracting and receiving useful reviews over interesting products is very important and time consuming for people. Sentiment analysis is one of the important processes for extracting useful reviews of the products. In this paper, the Convolutional LSTM neural network architecture is proposed to analyse the sentiment classification of cosmetic reviews written in Myanmar Language. The paper also intends to build the cosmetic reviews dataset for deep learning and sentiment lexicon in Myanmar Language.
Sentiment Analysis In Myanmar Language Using Convolutional Lstm Neural Networkkevig
In recent years, there has been an increasing use of social media among people in Myanmar and writing
review on social media pages about the product, movie, and trip are also popular among people. Moreover,
most of the people are going to find the review pages about the product they want to buy before deciding
whether they should buy it or not. Extracting and receiving useful reviews over interesting products is very
important and time consuming for people. Sentiment analysis is one of the important processes for extracting
useful reviews of the products. In this paper, the Convolutional LSTM neural network architecture is
proposed to analyse the sentiment classification of cosmetic reviews written in Myanmar Language. The
paper also intends to build the cosmetic reviews dataset for deep learning and sentiment lexicon in Myanmar
Language.
Sentimental analysis is a context based mining of text, which extracts and identify subjective information from a text or sentence provided. Here the main concept is extracting the sentiment of the text using machine learning techniques such as LSTM Long short term memory . This text classification method analyses the incoming text and determines whether the underlined emotion is positive or negative along with probability associated with that positive or negative statements. Probability depicts the strength of a positive or negative statement, if the probability is close to zero, it implies that the sentiment is strongly negative and if probability is close to1, it means that the statement is strongly positive. Here a web application is created to deploy this model using a Python based micro framework called flask. Many other methods, such as RNN and CNN, are inefficient when compared to LSTM. Dirash A R | Dr. S K Manju Bargavi "LSTM Based Sentiment Analysis" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42345.pdf Paper URL: https://www.ijtsrd.comcomputer-science/data-processing/42345/lstm-based-sentiment-analysis/dirash-a-r
MIMEME ATTRIBUTE CLASSIFICATION USING LDV ENSEMBLE MULTIMODEL LEARNINGCSEIJJournal
One of the most common types of social networking interaction is memes. Memes are innately multimodal,
so studying and processing them is a hot issue currently. This study's analysis of the DV dataset comprises
classifying memes according to their irony, humour, motive, and overarching mood. The effectiveness of
three different creative transformer-based strategies has been carefully examined. The DV Dataset used
here is created by own meme data for this implementation analysis of hateful memes. Out of all of our
strategies, the proposed ensemble model LDV obtained a macro F1 score of 0.737 for humour
classification, 0.775 for motivation classification, 0.69 for sarcasm classification, and 0.756 for overall
sentiment of the meme.
Mimeme Attribute Classification using LDV Ensemble Multimodel LearningCSEIJJournal
One of the most common types of social networking interaction is memes. Memes are innately multimodal,
so studying and processing them is a hot issue currently. This study's analysis of the DV dataset comprises
classifying memes according to their irony, humour, motive, and overarching mood. The effectiveness of
three different creative transformer-based strategies has been carefully examined. The DV Dataset used
here is created by own meme data for this implementation analysis of hateful memes. Out of all of our
strategies, the proposed ensemble model LDV obtained a macro F1 score of 0.737 for humour
classification, 0.775 for motivation classification, 0.69 for sarcasm classification, and 0.756 for overall
sentiment of the meme.
With the surge in modern research focus towards Pervasive Computing, lot of techniques and challenges
needs to be addressed so as to effectively create smart spaces and achieve miniaturization. In the process of
scaling down to compact devices, the real things to ponder upon are the Information Retrieval challenges.
In this work, we discuss the aspects of multimedia which makes information access challenging. An
Example Pattern Recognition scenario is presented and the mathematical techniques that can be used to
model uncertainty are also presented for developing a system that can sense, compute and communicate in
a way that can make human life easy with smart objects assisting from around his surroundings.
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGdannyijwest
Social Networks has become one of the most popular platforms to allow users to communicate, and share their interests without being at the same geographical location. With the great and rapid growth of Social Media sites such as Facebook, LinkedIn, Twitter…etc. causes huge amount of user-generated content. Thus, the improvement in the information quality and integrity becomes a great challenge to all social media sites, which allows users to get the desired content or be linked to the best link relation using improved search / link technique. So introducing semantics to social networks will widen up the representation of the social networks. In this paper, a new model of social networks based on semantic tag ranking is introduced. This model is based on the concept of multi-agent systems. In this proposed model the representation of social links will be extended by the semantic relationships found in the vocabularies which are known as (tags) in most of social networks.The proposed model for the social media engine is based on enhanced Latent Dirichlet Allocation(E-LDA) as a semantic indexing algorithm, combined with Tag Rank as social network ranking algorithm. The improvements on (E-LDA) phase is done by optimizing (LDA) algorithm using the optimal parameters. Then a filter is introduced to enhance the final indexing output. In ranking phase, using Tag Rank based on the indexing phase has improved the output of the ranking. Simulation results of the proposed model have shown improvements in indexing and ranking output.
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGIJwest
The document presents a new model for intelligent social networks based on semantic tag ranking. It uses a multi-agent system approach with agents performing indexing and ranking. For indexing, it uses an enhanced Latent Dirichlet Allocation (E-LDA) model that optimizes LDA parameters. Tags above a threshold from E-LDA output are ranked using Tag Rank. Simulation results showed improvements in indexing and ranking over conventional methods. The model introduces semantics to social networks to improve search and link recommendation.
SENTIMENT ANALYSIS IN MYANMAR LANGUAGE USING CONVOLUTIONAL LSTM NEURAL NETWORKijnlc
In recent years, there has been an increasing use of social media among people in Myanmar and writing review on social media pages about the product, movie, and trip are also popular among people. Moreover, most of the people are going to find the review pages about the product they want to buy before deciding whether they should buy it or not. Extracting and receiving useful reviews over interesting products is very important and time consuming for people. Sentiment analysis is one of the important processes for extracting useful reviews of the products. In this paper, the Convolutional LSTM neural network architecture is proposed to analyse the sentiment classification of cosmetic reviews written in Myanmar Language. The paper also intends to build the cosmetic reviews dataset for deep learning and sentiment lexicon in Myanmar Language.
Sentiment Analysis In Myanmar Language Using Convolutional Lstm Neural Networkkevig
In recent years, there has been an increasing use of social media among people in Myanmar and writing
review on social media pages about the product, movie, and trip are also popular among people. Moreover,
most of the people are going to find the review pages about the product they want to buy before deciding
whether they should buy it or not. Extracting and receiving useful reviews over interesting products is very
important and time consuming for people. Sentiment analysis is one of the important processes for extracting
useful reviews of the products. In this paper, the Convolutional LSTM neural network architecture is
proposed to analyse the sentiment classification of cosmetic reviews written in Myanmar Language. The
paper also intends to build the cosmetic reviews dataset for deep learning and sentiment lexicon in Myanmar
Language.
Sentimental analysis is a context based mining of text, which extracts and identify subjective information from a text or sentence provided. Here the main concept is extracting the sentiment of the text using machine learning techniques such as LSTM Long short term memory . This text classification method analyses the incoming text and determines whether the underlined emotion is positive or negative along with probability associated with that positive or negative statements. Probability depicts the strength of a positive or negative statement, if the probability is close to zero, it implies that the sentiment is strongly negative and if probability is close to1, it means that the statement is strongly positive. Here a web application is created to deploy this model using a Python based micro framework called flask. Many other methods, such as RNN and CNN, are inefficient when compared to LSTM. Dirash A R | Dr. S K Manju Bargavi "LSTM Based Sentiment Analysis" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42345.pdf Paper URL: https://www.ijtsrd.comcomputer-science/data-processing/42345/lstm-based-sentiment-analysis/dirash-a-r
MIMEME ATTRIBUTE CLASSIFICATION USING LDV ENSEMBLE MULTIMODEL LEARNINGCSEIJJournal
One of the most common types of social networking interaction is memes. Memes are innately multimodal,
so studying and processing them is a hot issue currently. This study's analysis of the DV dataset comprises
classifying memes according to their irony, humour, motive, and overarching mood. The effectiveness of
three different creative transformer-based strategies has been carefully examined. The DV Dataset used
here is created by own meme data for this implementation analysis of hateful memes. Out of all of our
strategies, the proposed ensemble model LDV obtained a macro F1 score of 0.737 for humour
classification, 0.775 for motivation classification, 0.69 for sarcasm classification, and 0.756 for overall
sentiment of the meme.
Mimeme Attribute Classification using LDV Ensemble Multimodel LearningCSEIJJournal
One of the most common types of social networking interaction is memes. Memes are innately multimodal,
so studying and processing them is a hot issue currently. This study's analysis of the DV dataset comprises
classifying memes according to their irony, humour, motive, and overarching mood. The effectiveness of
three different creative transformer-based strategies has been carefully examined. The DV Dataset used
here is created by own meme data for this implementation analysis of hateful memes. Out of all of our
strategies, the proposed ensemble model LDV obtained a macro F1 score of 0.737 for humour
classification, 0.775 for motivation classification, 0.69 for sarcasm classification, and 0.756 for overall
sentiment of the meme.
With the surge in modern research focus towards Pervasive Computing, lot of techniques and challenges
needs to be addressed so as to effectively create smart spaces and achieve miniaturization. In the process of
scaling down to compact devices, the real things to ponder upon are the Information Retrieval challenges.
In this work, we discuss the aspects of multimedia which makes information access challenging. An
Example Pattern Recognition scenario is presented and the mathematical techniques that can be used to
model uncertainty are also presented for developing a system that can sense, compute and communicate in
a way that can make human life easy with smart objects assisting from around his surroundings.
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGdannyijwest
Social Networks has become one of the most popular platforms to allow users to communicate, and share their interests without being at the same geographical location. With the great and rapid growth of Social Media sites such as Facebook, LinkedIn, Twitter…etc. causes huge amount of user-generated content. Thus, the improvement in the information quality and integrity becomes a great challenge to all social media sites, which allows users to get the desired content or be linked to the best link relation using improved search / link technique. So introducing semantics to social networks will widen up the representation of the social networks. In this paper, a new model of social networks based on semantic tag ranking is introduced. This model is based on the concept of multi-agent systems. In this proposed model the representation of social links will be extended by the semantic relationships found in the vocabularies which are known as (tags) in most of social networks.The proposed model for the social media engine is based on enhanced Latent Dirichlet Allocation(E-LDA) as a semantic indexing algorithm, combined with Tag Rank as social network ranking algorithm. The improvements on (E-LDA) phase is done by optimizing (LDA) algorithm using the optimal parameters. Then a filter is introduced to enhance the final indexing output. In ranking phase, using Tag Rank based on the indexing phase has improved the output of the ranking. Simulation results of the proposed model have shown improvements in indexing and ranking output.
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGIJwest
The document presents a new model for intelligent social networks based on semantic tag ranking. It uses a multi-agent system approach with agents performing indexing and ranking. For indexing, it uses an enhanced Latent Dirichlet Allocation (E-LDA) model that optimizes LDA parameters. Tags above a threshold from E-LDA output are ranked using Tag Rank. Simulation results showed improvements in indexing and ranking over conventional methods. The model introduces semantics to social networks to improve search and link recommendation.
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGdannyijwest
Social Networks has become one of the most popular platforms to allow users to communicate, and share
their interests without being at the same geographical location. With the great and rapid growth of Social
Media sites such as Facebook, LinkedIn, Twitter...etc. causes huge amount of user-generated content.
Thus, the improvement in the information quality and integrity becomes a great challenge to all social
media sites, which allows users to get the desired content or be linked to the best link relation using
improved search / link technique. So introducing semantics to social networks will widen up the
representation of the social networks.
TEXTS CLASSIFICATION WITH THE USAGE OF NEURAL NETWORK BASED ON THE WORD2VEC’S...ijsc
Assigning the submitted text to one of the predetermined categories is required when dealing with
application-oriented texts. There are many different approaches to solving this problem, including using
neural network algorithms. This article explores using neural networks to sort news articles based on their
category. Two word vectorization algorithms are being used — The Bag of Words (BOW) and the
word2vec distributive semantic model. For this work the BOW model was applied to the FNN, whereas the
word2vec model was applied to CNN. We have measured the accuracy of the classification when applying
these methods for ad texts datasets. The experimental results have shown that both of the models show us
quite the comparable accuracy. However, the word2vec encoding used for CNN showed more relevant
results, regarding to the texts semantics. Moreover, the trained CNN, based on the word2vec architecture,
has produced a compact feature map on its last convolutional layer, which can then be used in the future
text representation. I.e. Using CNN as a text encoder and for learning transfer.
Texts Classification with the usage of Neural Network based on the Word2vec’s...ijsc
The document summarizes research on classifying texts using neural networks with different text representation models. It explores using a bag-of-words model with a fully connected neural network and using the word2vec model with a convolutional neural network. The research tested these approaches on a dataset of news articles across 20 categories, finding the word2vec/CNN approach produced more semantically relevant results while also learning a compact text representation.
Optimizer algorithms and convolutional neural networks for text classificationIAESIJAI
Lately, deep learning has improved the algorithms and the architectures of several natural language processing (NLP) tasks. In spite of that, the performance of any deep learning model is widely impacted by the used optimizer algorithm; which allows updating the model parameters, finding the optimal weights, and minimizing the value of the loss function. Thus, this paper proposes a new convolutional neural network (CNN) architecture for text classification (TC) and sentiment analysis and uses it with various optimizer algorithms in the literature. Actually, in NLP, and particularly for sentiment classification concerns, the need for more empirical experiments increases the probability of selecting the pertinent optimizer. Hence, we have evaluated various optimizers on three types of text review datasets: small, medium, and large. Thereby, we examined the optimizers regarding the data amount and we have implemented our CNN model on three different sentiment analysis datasets so as to binary label text reviews. The experimental results illustrate that the adaptive optimization algorithms Adam and root mean square propagation (RMSprop) have surpassed the other optimizers. Moreover, our best CNN model which employed the RMSprop optimizer has achieved 90.48% accuracy and surpassed the state-of-the-art CNN models for binary sentiment classification problems.
The Identification of Depressive Moods from Twitter Data by Using Convolution...IRJET Journal
The document presents research on identifying depressive moods on Twitter using a convolutional neural network model. Key points:
- A CNN model was developed using text and emoji representations from Twitter data to predict depressive moods.
- The model achieved 88% accuracy on the test data, demonstrating it could correctly classify sentiments most of the time.
- The model was more successful at identifying negative sentiments than positive ones, based on higher precision and recall rates for negative classes.
- Integrating both text and emoji data enhanced the model's performance, showing potential for more nuanced sentiment analysis.
IRJET- A Pragmatic Supervised Learning Methodology of Hate Speech Detection i...IRJET Journal
This document summarizes a paper that proposes a supervised machine learning approach for detecting hate speech in social media. It begins with an introduction to the problem of hate speech online and anonymity enabling harmful communication. It then describes common text preprocessing techniques like tokenization and filtering used to clean text data. Feature extraction methods are discussed, including n-grams, bag-of-words, and word embeddings. Popular machine learning algorithms for classification are also summarized, such as support vector machines, logistic regression, and neural networks. The document concludes by reviewing related work on hate speech detection and challenges around dataset annotation.
This document summarizes a neural network-based approach for detecting fake news spreaders on Twitter. The approach uses two neural network architectures - one based on recurrent neural networks and one based on convolutional neural networks - to aggregate information from a user's tweets and classify the user. An ensemble approach is also described that combines the neural network models with a separate classifier trained on individual tweets. The models were tested on English and Spanish tweet datasets with accuracies around 77-78%.
Effect of word embedding vector dimensionality on sentiment analysis through ...IAESIJAI
Word embedding has become the most popular method of lexical description
in a given context in the natural language processing domain, especially
through the word to vector (Word2Vec) and global vectors (GloVe)
implementations. Since GloVe is a pre-trained model that provides access to
word mapping vectors on many dimensionalities, a large number of
applications rely on its prowess, especially in the field of sentiment analysis.
However, in the literature, we found that in many cases, GloVe is
implemented with arbitrary dimensionalities (often 300d) regardless of the
length of the text to be analyzed. In this work, we conducted a study that
identifies the effect of the dimensionality of word embedding mapping
vectors on short and long texts in a sentiment analysis context. The results
suggest that as the dimensionality of the vectors increases, the performance
metrics of the model also increase for long texts. In contrast, for short texts,
we recorded a threshold at which dimensionality does not matter.
The document presents a study on classifying derogatory comments using machine learning models. It aims to build a model that can detect and classify toxic, harmful, or abusive comments on social media. The researchers collected a dataset from Kaggle containing Wikipedia comments labeled as obscene, severely toxic, threatening, identity attacking, insulting. They propose using Naive Bayes-SVM as a baseline model and comparing the performance of BERT and LSTM models on this task. Previous works that used NB-SVM, BERT and LSTM models for related tasks are summarized in a table, showing accuracy rates from 87% to 98%. The proposed system architecture involves preprocessing the data, using NB-SVM for initial classification, and then feeding the output into BERT and
The document discusses the development of a chatbot using deep learning models like sequence-to-sequence learning with LSTM. It proposes using a movie dialog corpus consisting of over 220,000 conversational exchanges to train the chatbot model. Transfer learning is used with pre-trained word embeddings to improve the model. The chatbot implementation uses an LSTM encoder-decoder architecture in the sequence-to-sequence model.
The document describes a comparative study of various machine learning and neural network models for detecting abusive language on Twitter. It finds that a bidirectional GRU network trained on word-level features, with a Latent Topic Clustering module, achieves the most accurate results with an F1 score of 0.805 for detecting abusive tweets. Additionally, it explores using context tweets as additional features and finds this improves some models' performance.
EXTENDING OUTPUT ATTENTIONS IN RECURRENT NEURAL NETWORKS FOR DIALOG GENERATIONijaia
In natural language processing, attention mechanism in neural networks are widely utilized. In this paper, the research team explore a new mechanism of extending output attention in recurrent neural networks for dialog systems. The new attention method was compared with the current method in generating dialog sentence using a real dataset. Our architecture exhibits several attractive properties such as better handle long sequences and, it could generate more reasonable replies in many cases.
Mining knowledge graphs to map heterogeneous relations between the internet o...IJECEIAES
Patterns for the internet of things (IoT) which represent proven solutions used to solve design problems in the IoT are numerous. Similar to objectoriented design patterns, these IoT patterns contain multiple mutual heterogeneous relationships. However, these pattern relationships are hidden and virtually unidentified in most documents. In this paper, we use machine learning techniques to automatically mine knowledge graphs to map these relationships between several IoT patterns. The end result is a semantic knowledge graph database which outlines patterns as vertices and their relations as edges. We have identified four main relationships between the IoT patterns-a pattern is similar to another pattern if it addresses the same use case problem, a large-scale pattern uses a small- scale pattern in a lower level layer, a large pattern is composed of multiple smaller scale patterns underneath it, and patterns complement and combine with each other to resolve a given use case problem. Our results show some promising prospects towards the use of machine learning techniques to generate an automated repository to organise the IoT patterns, which are usually extracted at various levels of abstraction and granularity.
IRJET- Visual Question Answering using Combination of LSTM and CNN: A SurveyIRJET Journal
This document discusses using a combination of long short-term memory (LSTM) and convolutional neural networks (CNN) for visual question answering (VQA). It proposes extracting image features from CNNs and encoding question semantics with LSTMs. A multilayer perceptron would then combine the image and question representations to predict answers. The methodology aims to reduce statistical biases in VQA datasets by focusing attention on relevant image regions. It was implemented in Keras with TensorFlow using pre-trained CNNs for images and word embeddings for questions. The proposed approach analyzes local image features and question semantics to improve VQA classification accuracy over methods relying solely on language.
Deepfake Detection on Social Media Leveraging Deep Learning and FastText Embe...Shakas Technologies
Deepfake Detection on Social Media Leveraging Deep Learning and FastText Embeddings for Identifying Machine-Generated Tweets.
Shakas Technologies ( Galaxy of Knowledge)
#11/A 2nd East Main Road,
Gandhi Nagar,
Vellore - 632006.
Mobile : +91-9500218218 / 8220150373| land line- 0416- 3552723
Shakas Training & Development | Shakas Sales & Services | Shakas Educational Trust|IEEE projects | Research & Development | Journal Publication |
Email : info@shakastech.com | shakastech@gmail.com |
website: www.shakastech.com
Facebook: https://www.facebook.com/pages/Shakas-Technologies
Hate speech detection on Indonesian text using word embedding method-global v...IAESIJAI
Hate speech is defined as communication directed toward a specific individual or group that involves hatred or anger and a language with solid arguments leading to someone's opinion can cause social conflict. It has a lot of potential for individuals to communicate their thoughts on an online platform because the number of Internet users globally, including in Indonesia, is continually rising. This study aims to observe the impact of pre-trained global vector (GloVe) word embedding on accuracy in the classification of hate speech and non-hate speech. The use of pre-trained GloVe (Indonesian text) and single and multi-layer long short-term memory (LSTM) classifiers has performance that is resistant to overfitting compared to pre-trainable embedding for hate-speech detection. The accuracy value is 81.5% on a single layer and 80.9% on a double-layer LSTM. The following job is to provide pre-trained with formal and non-formal language corpus; pre-processing to overcome non-formal words is very challenging.
We propose a model for carrying out deep learning based multimodal sentiment analysis. The MOUD dataset is taken for experimentation purposes. We developed two parallel text based and audio basedmodels and further, fused these heterogeneous feature maps taken from intermediate layers to complete thearchitecture. Performance measures–Accuracy, precision, recall and F1-score–are observed to outperformthe existing models.
Automatic Grading of Handwritten AnswersIRJET Journal
The document describes a proposed system for automatically grading handwritten exam answers. It uses optical character recognition to extract text from scanned answer sheets. Natural language processing techniques like BERT embeddings and Word Mover's Distance are used to compare the student's answer against reference answers from teachers. The system aims to grade papers quickly and accurately to reduce workload for teachers while still providing detailed performance assessments for students. It was developed to address the need for online and at-scale exam grading given limitations of traditional in-person exams.
BIDIRECTIONAL LONG SHORT-TERM MEMORY (BILSTM)WITH CONDITIONAL RANDOM FIELDS (...kevig
This study investigates the effectiveness of Knowledge Named Entity Recognition in Online Judges (OJs). OJs are lacking in the classification of topics and limited to the IDs only. Therefore a lot of time is consumed in finding programming problems more specifically in knowledge entities.A Bidirectional Long Short-Term Memory (BiLSTM) with Conditional Random Fields (CRF) model is applied for the recognition of knowledge named entities existing in the solution reports.For the test run, more than 2000 solution reports are crawled from the Online Judges and processed for the model output. The stability of the model is also assessed with the higher F1 value. The results obtained through the proposed BiLSTM-CRF model are more effectual (F1: 98.96%) and efficient in lead-time.
Hybrid model for detection of brain tumor using convolution neural networksCSITiaesprime
The development of aberrant brain cells, some of which may turn cancerous, is known as a brain tumor. Magnetic resonance imaging (MRI) scans are the most common technique for finding brain tumors. Information about the aberrant tissue growth in the brain is discernible from the MRI scans. In numerous research papers, machine learning, and deep learning algorithms are used to detect brain tumors. It takes extremely little time to forecast a brain tumor when these algorithms are applied to MRI pictures, and better accuracy makes it easier to treat patients. The radiologist can make speedy decisions because of this forecast. The proposed work creates a hybrid convolution neural networks (CNN) model using CNN for feature extraction and logistic regression (LR). The pre-trained model visual geometry group 16 (VGG16) is used for the extraction of features. To reduce the complexity and parameters to train we eliminated the last eight layers of VGG16. From this transformed model the features are extracted in the form of a vector array. These features fed into different machine learning classifiers like support vector machine (SVM), naïve bayes (NB), LR, extreme gradient boosting (XGBoost), AdaBoost, and random forest for training and testing. The performance of different classifiers is compared. The CNN-LR hybrid combination outperformed the remaining classifiers. The evaluation measures such as recall, precision, F1-score, and accuracy of the proposed CNN-LR model are 94%, 94%, 94%, and 91% respectively.
Implementing lee's model to apply fuzzy time series in forecasting bitcoin priceCSITiaesprime
Over time, cryptocurrencies like Bitcoin have attracted investor's and speculators' interest. Bitcoin's dramatic rise in value in recent years has caught the attention of many who see it as a promising investment asset. After all, Bitcoin investment is inseparable from Bitcoin price volatility that investors must mitigate. This research aims to use Lee's Fuzzy Time Series approach to forecast the price of Bitcoin. A time series analysis method called Lee's Fuzzy Time Series to get around ambiguity and uncertainty in time series data. Ching-Cheng Lee first introduced this approach in his research on time series prediction. This method is a development of several previous fuzzy time series (FTS) models, namely Song and Chissom and Cheng and Chen. According to most previous studies, Lee's model was stated to be able to convey more precise forecasting results than the classic model from the FTS. This study used first and second orders, where researchers obtained error values from the first order of 5.419% and the second order of 4.042%, which means that the forecasting results are excellent. But of both orders, only the first order can be used to predict the next period's Bitcoin price. In the second order, the resulting relations in the next period do not have groups in their fuzzy logical relationship group (FLRG), so they can not predict the price in the next period. This study contributes to considering investors and the general public as a factor in keeping, selling, or purchasing cryptocurrencies.
More Related Content
Similar to Fine grained irony classification through transfer learning approach
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGdannyijwest
Social Networks has become one of the most popular platforms to allow users to communicate, and share
their interests without being at the same geographical location. With the great and rapid growth of Social
Media sites such as Facebook, LinkedIn, Twitter...etc. causes huge amount of user-generated content.
Thus, the improvement in the information quality and integrity becomes a great challenge to all social
media sites, which allows users to get the desired content or be linked to the best link relation using
improved search / link technique. So introducing semantics to social networks will widen up the
representation of the social networks.
TEXTS CLASSIFICATION WITH THE USAGE OF NEURAL NETWORK BASED ON THE WORD2VEC’S...ijsc
Assigning the submitted text to one of the predetermined categories is required when dealing with
application-oriented texts. There are many different approaches to solving this problem, including using
neural network algorithms. This article explores using neural networks to sort news articles based on their
category. Two word vectorization algorithms are being used — The Bag of Words (BOW) and the
word2vec distributive semantic model. For this work the BOW model was applied to the FNN, whereas the
word2vec model was applied to CNN. We have measured the accuracy of the classification when applying
these methods for ad texts datasets. The experimental results have shown that both of the models show us
quite the comparable accuracy. However, the word2vec encoding used for CNN showed more relevant
results, regarding to the texts semantics. Moreover, the trained CNN, based on the word2vec architecture,
has produced a compact feature map on its last convolutional layer, which can then be used in the future
text representation. I.e. Using CNN as a text encoder and for learning transfer.
Texts Classification with the usage of Neural Network based on the Word2vec’s...ijsc
The document summarizes research on classifying texts using neural networks with different text representation models. It explores using a bag-of-words model with a fully connected neural network and using the word2vec model with a convolutional neural network. The research tested these approaches on a dataset of news articles across 20 categories, finding the word2vec/CNN approach produced more semantically relevant results while also learning a compact text representation.
Optimizer algorithms and convolutional neural networks for text classificationIAESIJAI
Lately, deep learning has improved the algorithms and the architectures of several natural language processing (NLP) tasks. In spite of that, the performance of any deep learning model is widely impacted by the used optimizer algorithm; which allows updating the model parameters, finding the optimal weights, and minimizing the value of the loss function. Thus, this paper proposes a new convolutional neural network (CNN) architecture for text classification (TC) and sentiment analysis and uses it with various optimizer algorithms in the literature. Actually, in NLP, and particularly for sentiment classification concerns, the need for more empirical experiments increases the probability of selecting the pertinent optimizer. Hence, we have evaluated various optimizers on three types of text review datasets: small, medium, and large. Thereby, we examined the optimizers regarding the data amount and we have implemented our CNN model on three different sentiment analysis datasets so as to binary label text reviews. The experimental results illustrate that the adaptive optimization algorithms Adam and root mean square propagation (RMSprop) have surpassed the other optimizers. Moreover, our best CNN model which employed the RMSprop optimizer has achieved 90.48% accuracy and surpassed the state-of-the-art CNN models for binary sentiment classification problems.
The Identification of Depressive Moods from Twitter Data by Using Convolution...IRJET Journal
The document presents research on identifying depressive moods on Twitter using a convolutional neural network model. Key points:
- A CNN model was developed using text and emoji representations from Twitter data to predict depressive moods.
- The model achieved 88% accuracy on the test data, demonstrating it could correctly classify sentiments most of the time.
- The model was more successful at identifying negative sentiments than positive ones, based on higher precision and recall rates for negative classes.
- Integrating both text and emoji data enhanced the model's performance, showing potential for more nuanced sentiment analysis.
IRJET- A Pragmatic Supervised Learning Methodology of Hate Speech Detection i...IRJET Journal
This document summarizes a paper that proposes a supervised machine learning approach for detecting hate speech in social media. It begins with an introduction to the problem of hate speech online and anonymity enabling harmful communication. It then describes common text preprocessing techniques like tokenization and filtering used to clean text data. Feature extraction methods are discussed, including n-grams, bag-of-words, and word embeddings. Popular machine learning algorithms for classification are also summarized, such as support vector machines, logistic regression, and neural networks. The document concludes by reviewing related work on hate speech detection and challenges around dataset annotation.
This document summarizes a neural network-based approach for detecting fake news spreaders on Twitter. The approach uses two neural network architectures - one based on recurrent neural networks and one based on convolutional neural networks - to aggregate information from a user's tweets and classify the user. An ensemble approach is also described that combines the neural network models with a separate classifier trained on individual tweets. The models were tested on English and Spanish tweet datasets with accuracies around 77-78%.
Effect of word embedding vector dimensionality on sentiment analysis through ...IAESIJAI
Word embedding has become the most popular method of lexical description
in a given context in the natural language processing domain, especially
through the word to vector (Word2Vec) and global vectors (GloVe)
implementations. Since GloVe is a pre-trained model that provides access to
word mapping vectors on many dimensionalities, a large number of
applications rely on its prowess, especially in the field of sentiment analysis.
However, in the literature, we found that in many cases, GloVe is
implemented with arbitrary dimensionalities (often 300d) regardless of the
length of the text to be analyzed. In this work, we conducted a study that
identifies the effect of the dimensionality of word embedding mapping
vectors on short and long texts in a sentiment analysis context. The results
suggest that as the dimensionality of the vectors increases, the performance
metrics of the model also increase for long texts. In contrast, for short texts,
we recorded a threshold at which dimensionality does not matter.
The document presents a study on classifying derogatory comments using machine learning models. It aims to build a model that can detect and classify toxic, harmful, or abusive comments on social media. The researchers collected a dataset from Kaggle containing Wikipedia comments labeled as obscene, severely toxic, threatening, identity attacking, insulting. They propose using Naive Bayes-SVM as a baseline model and comparing the performance of BERT and LSTM models on this task. Previous works that used NB-SVM, BERT and LSTM models for related tasks are summarized in a table, showing accuracy rates from 87% to 98%. The proposed system architecture involves preprocessing the data, using NB-SVM for initial classification, and then feeding the output into BERT and
The document discusses the development of a chatbot using deep learning models like sequence-to-sequence learning with LSTM. It proposes using a movie dialog corpus consisting of over 220,000 conversational exchanges to train the chatbot model. Transfer learning is used with pre-trained word embeddings to improve the model. The chatbot implementation uses an LSTM encoder-decoder architecture in the sequence-to-sequence model.
The document describes a comparative study of various machine learning and neural network models for detecting abusive language on Twitter. It finds that a bidirectional GRU network trained on word-level features, with a Latent Topic Clustering module, achieves the most accurate results with an F1 score of 0.805 for detecting abusive tweets. Additionally, it explores using context tweets as additional features and finds this improves some models' performance.
EXTENDING OUTPUT ATTENTIONS IN RECURRENT NEURAL NETWORKS FOR DIALOG GENERATIONijaia
In natural language processing, attention mechanism in neural networks are widely utilized. In this paper, the research team explore a new mechanism of extending output attention in recurrent neural networks for dialog systems. The new attention method was compared with the current method in generating dialog sentence using a real dataset. Our architecture exhibits several attractive properties such as better handle long sequences and, it could generate more reasonable replies in many cases.
Mining knowledge graphs to map heterogeneous relations between the internet o...IJECEIAES
Patterns for the internet of things (IoT) which represent proven solutions used to solve design problems in the IoT are numerous. Similar to objectoriented design patterns, these IoT patterns contain multiple mutual heterogeneous relationships. However, these pattern relationships are hidden and virtually unidentified in most documents. In this paper, we use machine learning techniques to automatically mine knowledge graphs to map these relationships between several IoT patterns. The end result is a semantic knowledge graph database which outlines patterns as vertices and their relations as edges. We have identified four main relationships between the IoT patterns-a pattern is similar to another pattern if it addresses the same use case problem, a large-scale pattern uses a small- scale pattern in a lower level layer, a large pattern is composed of multiple smaller scale patterns underneath it, and patterns complement and combine with each other to resolve a given use case problem. Our results show some promising prospects towards the use of machine learning techniques to generate an automated repository to organise the IoT patterns, which are usually extracted at various levels of abstraction and granularity.
IRJET- Visual Question Answering using Combination of LSTM and CNN: A SurveyIRJET Journal
This document discusses using a combination of long short-term memory (LSTM) and convolutional neural networks (CNN) for visual question answering (VQA). It proposes extracting image features from CNNs and encoding question semantics with LSTMs. A multilayer perceptron would then combine the image and question representations to predict answers. The methodology aims to reduce statistical biases in VQA datasets by focusing attention on relevant image regions. It was implemented in Keras with TensorFlow using pre-trained CNNs for images and word embeddings for questions. The proposed approach analyzes local image features and question semantics to improve VQA classification accuracy over methods relying solely on language.
Deepfake Detection on Social Media Leveraging Deep Learning and FastText Embe...Shakas Technologies
Deepfake Detection on Social Media Leveraging Deep Learning and FastText Embeddings for Identifying Machine-Generated Tweets.
Shakas Technologies ( Galaxy of Knowledge)
#11/A 2nd East Main Road,
Gandhi Nagar,
Vellore - 632006.
Mobile : +91-9500218218 / 8220150373| land line- 0416- 3552723
Shakas Training & Development | Shakas Sales & Services | Shakas Educational Trust|IEEE projects | Research & Development | Journal Publication |
Email : info@shakastech.com | shakastech@gmail.com |
website: www.shakastech.com
Facebook: https://www.facebook.com/pages/Shakas-Technologies
Hate speech detection on Indonesian text using word embedding method-global v...IAESIJAI
Hate speech is defined as communication directed toward a specific individual or group that involves hatred or anger and a language with solid arguments leading to someone's opinion can cause social conflict. It has a lot of potential for individuals to communicate their thoughts on an online platform because the number of Internet users globally, including in Indonesia, is continually rising. This study aims to observe the impact of pre-trained global vector (GloVe) word embedding on accuracy in the classification of hate speech and non-hate speech. The use of pre-trained GloVe (Indonesian text) and single and multi-layer long short-term memory (LSTM) classifiers has performance that is resistant to overfitting compared to pre-trainable embedding for hate-speech detection. The accuracy value is 81.5% on a single layer and 80.9% on a double-layer LSTM. The following job is to provide pre-trained with formal and non-formal language corpus; pre-processing to overcome non-formal words is very challenging.
We propose a model for carrying out deep learning based multimodal sentiment analysis. The MOUD dataset is taken for experimentation purposes. We developed two parallel text based and audio basedmodels and further, fused these heterogeneous feature maps taken from intermediate layers to complete thearchitecture. Performance measures–Accuracy, precision, recall and F1-score–are observed to outperformthe existing models.
Automatic Grading of Handwritten AnswersIRJET Journal
The document describes a proposed system for automatically grading handwritten exam answers. It uses optical character recognition to extract text from scanned answer sheets. Natural language processing techniques like BERT embeddings and Word Mover's Distance are used to compare the student's answer against reference answers from teachers. The system aims to grade papers quickly and accurately to reduce workload for teachers while still providing detailed performance assessments for students. It was developed to address the need for online and at-scale exam grading given limitations of traditional in-person exams.
BIDIRECTIONAL LONG SHORT-TERM MEMORY (BILSTM)WITH CONDITIONAL RANDOM FIELDS (...kevig
This study investigates the effectiveness of Knowledge Named Entity Recognition in Online Judges (OJs). OJs are lacking in the classification of topics and limited to the IDs only. Therefore a lot of time is consumed in finding programming problems more specifically in knowledge entities.A Bidirectional Long Short-Term Memory (BiLSTM) with Conditional Random Fields (CRF) model is applied for the recognition of knowledge named entities existing in the solution reports.For the test run, more than 2000 solution reports are crawled from the Online Judges and processed for the model output. The stability of the model is also assessed with the higher F1 value. The results obtained through the proposed BiLSTM-CRF model are more effectual (F1: 98.96%) and efficient in lead-time.
Similar to Fine grained irony classification through transfer learning approach (20)
Hybrid model for detection of brain tumor using convolution neural networksCSITiaesprime
The development of aberrant brain cells, some of which may turn cancerous, is known as a brain tumor. Magnetic resonance imaging (MRI) scans are the most common technique for finding brain tumors. Information about the aberrant tissue growth in the brain is discernible from the MRI scans. In numerous research papers, machine learning, and deep learning algorithms are used to detect brain tumors. It takes extremely little time to forecast a brain tumor when these algorithms are applied to MRI pictures, and better accuracy makes it easier to treat patients. The radiologist can make speedy decisions because of this forecast. The proposed work creates a hybrid convolution neural networks (CNN) model using CNN for feature extraction and logistic regression (LR). The pre-trained model visual geometry group 16 (VGG16) is used for the extraction of features. To reduce the complexity and parameters to train we eliminated the last eight layers of VGG16. From this transformed model the features are extracted in the form of a vector array. These features fed into different machine learning classifiers like support vector machine (SVM), naïve bayes (NB), LR, extreme gradient boosting (XGBoost), AdaBoost, and random forest for training and testing. The performance of different classifiers is compared. The CNN-LR hybrid combination outperformed the remaining classifiers. The evaluation measures such as recall, precision, F1-score, and accuracy of the proposed CNN-LR model are 94%, 94%, 94%, and 91% respectively.
Implementing lee's model to apply fuzzy time series in forecasting bitcoin priceCSITiaesprime
Over time, cryptocurrencies like Bitcoin have attracted investor's and speculators' interest. Bitcoin's dramatic rise in value in recent years has caught the attention of many who see it as a promising investment asset. After all, Bitcoin investment is inseparable from Bitcoin price volatility that investors must mitigate. This research aims to use Lee's Fuzzy Time Series approach to forecast the price of Bitcoin. A time series analysis method called Lee's Fuzzy Time Series to get around ambiguity and uncertainty in time series data. Ching-Cheng Lee first introduced this approach in his research on time series prediction. This method is a development of several previous fuzzy time series (FTS) models, namely Song and Chissom and Cheng and Chen. According to most previous studies, Lee's model was stated to be able to convey more precise forecasting results than the classic model from the FTS. This study used first and second orders, where researchers obtained error values from the first order of 5.419% and the second order of 4.042%, which means that the forecasting results are excellent. But of both orders, only the first order can be used to predict the next period's Bitcoin price. In the second order, the resulting relations in the next period do not have groups in their fuzzy logical relationship group (FLRG), so they can not predict the price in the next period. This study contributes to considering investors and the general public as a factor in keeping, selling, or purchasing cryptocurrencies.
Sentiment analysis of online licensing service quality in the energy and mine...CSITiaesprime
The Ministry of Energy and Mineral Resources of the Republic of Indonesia regularly assessed public satisfaction with its online licensing services. User rated their satisfaction at 3.42 on a scale of 4, below the organization's average of 3.53. Evaluating public service performance is crucial for quality improvement. Previous research relied solely on survey data to assess public satisfaction. This study goes further by analyzing user feedback in text form from an online licensing application to identify negative aspects of the service that need enhancement. The dataset spanned September 2019 to February 2023, with 24,112 entries. The choice of classification methods on the highest accuracy values among decision tree, random forest, naive bayes, stochastic gradient descent, logistic regression (LR), and k-nearest neighbor. The text data was converted into numerical form using CountVectorizer and term frequency-inverse document frequency (TF-IDF) techniques, along with unigrams and bigrams for dividing sentences into word segments. LR bigram CountVectorizer ranked highest with 89% for average precision, F1-score, and recall, compared to the other five classification methods. The sentiment analysis polarity level was 36.2% negative. Negative sentiment revealed expectations from the public to the ministry to improve the top three aspects: system, mechanism, and procedure; infrastructure and facilities; and service specification product types.
Trends in sentiment of Twitter users towards Indonesian tourism: analysis wit...CSITiaesprime
This research analyzes the sentiment of Twitter users regarding tourism in Indonesia using the keyword "wonderful Indonesia" as the tourism promotion identity. This study aims to gain a deeper understanding of the public sentiment towards "wonderful Indonesia" through social media data analysis. The novelty obtained provides new insights into valuable information about Indonesian tourism for the government and relevant stakeholders in promoting Indonesian tourism and enhancing tourist experiences. The method used is tweet analysis and classification using the K-nearest neighbor (KNN) algorithm to determine the positive, neutral, or negative sentiment of the tweets. The classification results show that the majority of tweets (65.1% out of a total of 14,189 tweets) have a neutral sentiment, indicating that most tweets with the "wonderful Indonesia" tagline are related to advertising or promoting Indonesian tourism. However, the percentage of tweets with positive sentiment (33.8%) is higher than those with negative sentiment (1.1%). This study also achieved training results with an accuracy rate of 98.5%, precision of 97.6%, recall of 98.5%, and F1-score of 98.1%. However, reassessment is needed in the future as Twitter users' sentiments can change along with the development of Indonesian tourism itself.
The impact of usability in information technology projectsCSITiaesprime
Achieving success in information system and technology (IS/IT) projects is a complex and multifaceted endeavour that has proven difficult. The literature is replete with project failures, but identifying the critical success factors contributing to favourable outcomes remains challenging. The triad of Time-Cost-Quality is widely accepted as key to achieving project success. While time and cost can be quantified and measured, quality is a more complex construct that requires different metrics and measurement approaches. Utilizing the PRISMA Methodology, this study initiated a comprehensive search across literature databases and identified 142 relevant articles pertaining to the specified keywords. A subset of ten articles was deemed suitable for further examination through rigorous screening and eligibility assessments. Notably, a primary finding indicates that despite recognizing usability as a critical element, there is a tendency to neglect usability enhancements due to time and resource constraints. Regarding the influence of usability on project success, the active involvement of end-users emerges as a pivotal factor. Moreover, fostering the enhancement of Human Computer Interaction (HCI) knowledge within the development team is essential. Failure to provide good usability can lead to project failure, undermining user satisfaction and adoption of the technology.
Collecting and analyzing network-based evidenceCSITiaesprime
Since nearly the beginning of the Internet, malware has been a significant deterrent to productivity for end users, both personal and business related. Due to the pervasiveness of digital technologies in all aspects of human lives, it is increasingly unlikely that a digital device is involved as goal, medium or simply ‘witness’ of a criminal event. Forensic investigations include collection, recovery, analysis, and presentation of information stored on network devices and related to network crimes. These activities often involve wide range of analysis tools and application of different methods. This work presents methods that helps digital investigators to correlate and present information acquired from forensic data, with the aim to get a more valuable reconstructions of events or action to reach case conclusions. Main aim of network forensic is to gather evidence. Additionally, the evidence obtained during the investigation must be produced through a rigorous investigation procedure in a legal context.
Agile adoption challenges in insurance: a systematic literature and expert re...CSITiaesprime
The drawback of agile is struggled to function in large businesses like banks, insurance companies, and government agencies, which are frequently associated with cumbersome processes. Traditional software development techniques were cumbersome and pay more attention to standardization and industry, this leads to high costs and prolonged costs. The insurance company does not embrace change and agility may find themselves distracted and lose customers to agile competitors who are more relevant and customer-centric. Thus, to investigate the challenges and to recognize the prospect of agile adoption in insurance industry, a systematic literature review (SLR) in this study was organized and validated by expert review from professional with expertise in agile. The project performance domain from project management body of knowledge (PMBOK) was applied to align the challenges and the solution. Academicians and practitioners can acquire the perception and knowledge in having exceeded understanding about the challenge and solution of agile adoption from the results.
Exploring network security threats through text mining techniques: a comprehe...CSITiaesprime
In response to the escalating cybersecurity threats, this research focuses on leveraging text mining techniques to analyze network security data effectively. The study utilizes user-generated reports detailing attacks on server networks. Employing clustering algorithms, these reports are grouped based on threat levels. Additionally, a classification algorithm discerns whether network activities pose security risks. The research achieves a noteworthy 93% accuracy in text classification, showcasing the efficacy of these techniques. The novelty lies in classifying security threat report logs according to their threat levels. Prioritizing high-risk threats, this approach aids network management in strategic focus. By enabling swift identification and categorization of network security threats, this research equips organizations to take prompt, targeted actions, enhancing overall network security.
An LSTM-based prediction model for gradient-descending optimization in virtua...CSITiaesprime
A virtual learning environment (VLE) is an online learning platform that allows many students, even millions, to study according to their interests without being limited by space and time. Online learning environments have many benefits, but they also have some drawbacks, such as high dropout rates, low engagement, and students' self-regulated behavior. Evaluating and analyzing the students' data generated from online learning platforms can help instructors to understand and monitor students learning progress. In this study, we suggest a predictive model for assessing student success in online learning. We investigate the effect of hyperparameters on the prediction of student learning outcomes in VLEs by the long short-term memory (LSTM) model. A hyperparameter is a parameter that has an impact on prediction results. Two optimization algorithms, adaptive moment estimation (Adam) and Nesterov-accelerated adaptive moment estimation (Nadam), were used to modify the LSTM model's hyperparameters. Based on the findings of research done on the optimization of the LSTM model using the Adam and Nadam algorithm. The average accuracy of the LSTM model using Nadam optimization is 89%, with a maximum accuracy of 93%. The LSTM model with Nadam optimisation performs better than the model with Adam optimisation when predicting students in online learning.
Generalization of linear and non-linear support vector machine in multiple fi...CSITiaesprime
Support vector machines (SVMs) are a set of related supervised learning methods used for classification and regression. They belong to a family of generalized linear classifiers. In other terms, SVM is a classification and regression prediction tool that uses machine learning theory to maximize predictive accuracy. In this article, the discussion about linear and non-linear SVM classifiers with their functions and parameters is investigated. Due to the equality type of constraints in the formulation, the solution follows from solving a set of linear equations. Besides this, if the under-consideration problem is in the form of a non-linear case, then the problem must convert into linear separable form with the help of kernel trick and solve it according to the methods. Some important algorithms related to sentimental work are also presented in this paper. Generalization of the formulation of linear and non-linear SVMs is also open in this article. In the final section of this paper, the different modified sections of SVM are discussed which are modified by different research for different purposes.
Designing a framework for blockchain-based e-voting system for LibyaCSITiaesprime
A transition to democratic rule is considered the first step down a long road towards Libya’s recovery and prosperity. Thus, it strives to improve the country’s elections by introducing new technologies. A blockchain is a distributed ledger that is characterised by independence and security. Therefore, it has been widely applied in various fields ranging from credit encryption and digital currency. With the development of internet technology, electronic voting (E-voting) systems have been greatly popularised. However, they suffer from various security threats, which create a sense of distrust among existing systems. Integrating blockchain with online elections is a promising trend, which could lead to make an election transparent, immutable, reliable, and more secure. In this paper, we present a literature review and a case analysis of blockchain technology. Moreover, a framework for an E-voting system based on blockchain is proposed. The methodology is adopted on the basis of three activities, they are identification of the relevant literature about E-voting, system modelling, and the determination of suitable technological tools. The framework is secure and reliable. Thus, it could help increase the number of voters and ensure a high level of participation, as well as facilitate free and fair electoral processes.
Development reference model to build management reporter using dynamics great...CSITiaesprime
The digital technology transformation impacts changes in business patterns that require companies to innovate to act appropriately in making strategic decisions quickly, precisely, and accurately to increase efficiency, be practical company performance, and impacts changes in business patterns that require companies to innovate to act appropriately in making strategic decisions quickly to improve the performance. An enterprise resource planning (ERP) system is one step toward achieving performance. ERP system is one step to achieving performance. ERP system is essential for companies to automate the efficiency of business processes. The decisions from management in implementing the ERP system are necessary for ERP implementation to be successful. However, in practice, companies still experience complexity. For that, it needs to be considered related a business process reference model is essential to enhance efficiency in implementing the ERP used. This research discusses the business process reference model based on the ERP dynamics great plain (GP) application aggregated using management reporter (MR) to help users better understand the practical overview. The methodology utilizes a reference model based on Microsoft Dynamics GP guidelines with a business process redesign approach. This contributes to developing business processes to help users understand using the ERP dynamics GP application.
Social media and optimization of the promotion of Lake Toba tourism destinati...CSITiaesprime
Tourism is one of the largest contributors to Indonesia's foreign exchange earnings, surpassing taxation, energy, and gas. This study seeks to investigate the use of social media to optimize the promotion of Lake Toba as a tourist destination, which has been impacted by the COVID-19 pandemic. Using interview techniques and live field observations, it was discovered that social media, particularly the Instagram platform, play a significant role in promoting Lake Toba tourism. The Department of Culture and Tourism of the North Sumatra Province uses landscape photography as its primary promotion method, which has proved to be more effective and interesting than conventional methods such as the distribution of brochures or the use of manuals. The capture procedure and techniques for landscape photography were carried out by professional photographers in collaboration with the Department of Culture and Tourism of the North Sumatra Province. In addition to providing information, tourism sumut's Instagram account functions as a platform to raise public awareness about Lake Toba tourism and as a promotional medium for North Sumatra's tourist attractions on an international scale. Department of Culture and Tourism of the North Sumatra Province collaborates with travel agencies and local communities to disseminate Lake Toba tourism information.
Caring jacket: health monitoring jacket integrated with the internet of thing...CSITiaesprime
One of the policies that have been made by the World Health Organization (WHO) and the Indonesian government during this COVID-19 pandemic, is to use an oximeter for self-isolation patients. The oximeter is used to monitor the patient if happy hypoxia which is a silent killer, happens to the patient. To maintain body endurance, exercise is needed by COVID-19 patients, but doing too much exercise can also cause decreased immunity. That’s why fatigue level and exercise intensity need to be monitored. When exercising, social distancing protocol should be also reminded because can lower COVID-19 spreading up to 13.6%. To solve this issue, the Caring Jacket is proposed which is a health monitoring jacket integrated with an IoT system. This jacket is equipped with some sensors and the global positioning system (GPS) for tracking. The data from the test showed the temperature reading accuracy is up to 99.38%, the oxygen rate up to 97.31%, the beats per minute (BPM) sensor up to 97.82%, and the precision of all sensors is 97.00% compared with a calibrated device.
Net impact implementation application development life-cycle management in ba...CSITiaesprime
Digital transformation in the banking sector creates a lot of demand for application development, either new development or application enhancement. Continuous demand for reimagining, revamping, and running applications reliably needs to be supported by collaboration tools. Several big banks in Indonesia use Atlassian products, including Jira, Confluence, Bamboo, Bitbucket, and Crowd, to support strategic company projects. We need to measure the net impact of application development life-cycle management (ADLM) as a collaboration tool. Using the deLone and McLean model, process questionnaire data from banks in Indonesia that use ADLM. Processing data using structural equation modeling (SEM), multiple variables are analyzed statistically to establish, estimate, and test the causation model. The conclusions highlight that system quality strongly affected only User Satisfaction (p=0.049 and β=0.39). Information quality strongly affected use (p=0.001 and β=0.84) and strongly affected user satisfaction (p=0.169 and β=0.28). Service quality strongly affected only use (p=0.127 and β=0.31). Conclusion research verifies the information system's achievement approach described by DeLone and McLean. Importantly, it was discovered that system usability and quality were key indicators of ADLM success. To fulfill their objective, ADLM must be developed in a way that is simple to use, adaptable, and functional.
Circularly polarized metamaterial Antenna in energy harvesting wearable commu...CSITiaesprime
When battery powered sensors are spread out in places that are sometimes hard to reach, sustaining them become difficult. Therefore, to develop this technology on a large scale such as in the internet of things (IoT) scenario, it is necessary to figure out how to power them. The proffered solution in this work, is to get energy from the environment using energy harvesting Antennas. This work presents a wearable circular polarized efficient receiving and transmitting sensors for medical, IoT, and communication systems at the frequency range of WLAN, and GSM from 900 MHz up to 6 GHz. Using a cascaded system block of a circularly polarized Antenna, a rectifier and t-matching network, the design was successfully simulated. A DC charging voltage of 2.8V was achieved to power-up batteries of the wearable and IoT sensors. The major contribution of this work is the tri-band Antenna system which is able to harvest reflected Wi-Fi frequencies and also GSM frequencies combined in a miniaturized manner. This innovative configuration is a step forward in building devices with over 80% duty cycle.
An ensemble approach for the identification and classification of crime tweet...CSITiaesprime
Twitter is a famous social media platform, which supports short posts limited to 280 characters. Users tweet about many topics like movie reviews, customer service, meals they just ate, and awareness posts. Tweets carrying information about some crime scenes are crime tweets. Crime tweets are crucial and informative and separate classification is required. Identification and classification of crime tweets is a challenging task and has been the researcher’s latest interest. The researchers used different approaches to identify and classify crime tweets. This research has used an ensemble approach for the identification and classification of crime tweets. Tweepy and Twint libraries were used to collect datasets from Twitter. Both libraries use contrasting methods for extracting tweets from Twitter. This research has applied many ensemble approaches for the identification and classification of crime tweets. Logistic regression (LR), support vector machine (SVM), k-nearest neighbor (KNN), decision tree (DT), and random forest (RF) Classifier assigned with the weights of 1,2,1,1 and 1 respectively ensemble together by a soft weighted Voting classifier along with term frequency – inverse document frequency (TF-IDF) vectorizer gives the best performance with an accuracy of 96.2% on the testing dataset.
National archival platform system design using the microservice-based service...CSITiaesprime
Archives play a vital function concerning the dynamics of people and nations as an instrument to treasure information in diverse domains of politics, society, economics, culture, science, and technology. The acceleration of digital transformation triggers the implementation of a smart government that supports better public services. The smart government encourages a national archival system to facilitate archive producers and users. The four electronic-based government system (SPBE) factors in the archival sector and open archival information system (OAIS) as a data preservation standard are the benchmarks in developing this study's national archival platform system. An improved service computing system engineering (SCSE) framework adapted to the microservice architecture is used to aid the design of the national archival platform system. The proposed design met the four-factor service design validation of coupling, cohesion, complexity, and reusability. Also, the prototype suggests what resources are needed to put the design into action by passing the performance test of availability measurement.
Antispoofing in face biometrics: A comprehensive study on software-based tech...CSITiaesprime
The vulnerability of the face recognition system to spoofing attacks has piqued the biometric community's interest, motivating them to develop anti-spoofing techniques to secure it. Photo, video, or mask attacks can compromise face biometric systems (types of presentation attacks). Spoofing attacks are detected using liveness detection techniques, which determine whether the facial image presented at a biometric system is a live face or a fake version of it. We discuss the classification of face anti-spoofing techniques in this paper. Anti-spoofing techniques are divided into two categories: hardware and software methods. Hardware-based techniques are summarized briefly. A comprehensive study on software-based countermeasures for presentation attacks is discussed, which are further divided into static and dynamic methods. We cited a few publicly available presentation attack datasets and calculated a few metrics to demonstrate the value of anti-spoofing techniques.
The antecedent e-government quality for public behaviour intention, and exten...CSITiaesprime
An The main objective of the study is to identify the antecedent of leadership quality, public satisfaction and public behaviour intention of e-government service. Also, this study integrated e-government quality to expectation-confirmation model. In order to achieve these goals, observational research was then carried out to collect primary information, using the method of data dissemination and obtaining the opinion of 360 from the public using the e-government service and some of the e-government and software quality experts. The results of the study show that the positive association among the e-government services quality and public perceived usefulness, public expectation confirmation, leadership quality and public satisfaction that also play a positive role on the public behavior intention.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Webinar: Designing a schema for a Data WarehouseFederico Razzoli
Are you new to data warehouses (DWH)? Do you need to check whether your data warehouse follows the best practices for a good design? In both cases, this webinar is for you.
A data warehouse is a central relational database that contains all measurements about a business or an organisation. This data comes from a variety of heterogeneous data sources, which includes databases of any type that back the applications used by the company, data files exported by some applications, or APIs provided by internal or external services.
But designing a data warehouse correctly is a hard task, which requires gathering information about the business processes that need to be analysed in the first place. These processes must be translated into so-called star schemas, which means, denormalised databases where each table represents a dimension or facts.
We will discuss these topics:
- How to gather information about a business;
- Understanding dictionaries and how to identify business entities;
- Dimensions and facts;
- Setting a table granularity;
- Types of facts;
- Types of dimensions;
- Snowflakes and how to avoid them;
- Expanding existing dimensions and facts.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Generating privacy-protected synthetic data using Secludy and Milvus
Fine grained irony classification through transfer learning approach
1. Computer Science and Information Technologies
Vol. 4, No. 1, March 2023, pp. 43~49
ISSN: 2722-3221, DOI: 10.11591/csit.v4i1.pp43-49 43
Journal homepage: http://iaesprime.com/index.php/csit
Fine grained irony classification through transfer learning
approach
Abhinandan Shirahattii1
, Vijay Rajpurohit2
, Sanjeev Sannakki2
1
Department of Computer Science, KLE Society's Dr. M. S. Sheshgiri College of Engineering and Technology, Visvesvaraya
Technological University, Belagavi, Karnataka, India
2
Department of Computer Science, KLS Gogte Institue of Technology, Visvesvaraya Technological University, Belagavi, India
Article Info ABSTRACT
Article history:
Received Aug 7, 2022
Revised Dec 23, 2022
Accepted Jan 5, 2023
Nowadays irony appears to be pervasive in all social media discussion
forums and chats, offering further obstacles to sentiment analysis efforts.
The aim of the present research work is to detect irony and its types in
English tweets We employed a new system for irony detection in English
tweets, and we propose a distilled bidirectional encoder representations from
transformers (DistilBERT) light transformer model based on the
bidirectional encoder representations from transformers (BERT)
architecture, this is further strengthened by the use and design of
bidirectional long-short term memory (Bi-LSTM) network this configuration
minimizes data preprocessing tasks proposed model tests on a SemEval-
2018 task 3, 3,834 samples were provided. Experiment results show the
proposed system has achieved a precision of 81% for not irony class and
66% for irony class, recall of 77% for not irony and 72% for irony, and F1
score of 79% for not irony and 69% for irony class since researchers have
come up with a binary classification model, in this study we have extended
our work for multiclass classification of irony. It is significant and will serve
as a foundation for future research on different types of irony in tweets.
Keywords:
Bidirectional long-short term
memory
Encoder
Irony
Natural language processing
Sentiment analysis
Transformer
This is an open access article under the CC BY-SA license.
Corresponding Author:
Abhinandan Shirahatti
Department of Computer Science, KLE Society's Dr. M. S. Sheshgiri College of Engineering and
Technology, Visvesvaraya Technological University
R.C Nagar 2nd Stage Belagavi Karnataka, India
Email: abhinandans2010@gmail.com
1. INTRODUCTION
Irony has indeed been demonstrated to be ubiquitous in social media, offering major challenge to
sentiment analysis field [1]. It is a cognitive phenomenon in which affect-related features play a significant
role. In data driven world data is increasing exponentially day by day [2]. Machine learning and deep
learning algorithms are playing a vital role in massive data analysis and knowledge extraction. The broad use
of creative and metaphorical expressions like irony and sarcasm is common in user-generated content on
social media sites like Twitter and Facebook [3]. Irony is the use of language that traditionally means the
contrary to express one's meaning, usually for amusing or emphatic effect. Despite their significant
distinctions in connotation, the phrases sarcasm and irony are frequently interchanged. The precision of irony
identification is crucial in marketing research. Because irony usually causes polarity inversion, failing to
acknowledge it may result in poor sentiment classification findings [4]. Intelligence services must be able to
identify irony in order to separate perceived risks from ironic statements. Irony identification is indeed a
complex problem especially relative to most natural language processing (NLP) tasks. Irony manifests itself
in the form of polarized feeling, which is common on Twitter. For example “I really love this year’s summer;
2. ISSN: 2722-3221
Comput Sci Inf Technol, Vol. 4, No. 1, March 2023: 43-49
44
weeks and weeks of awful weather”. In this example, irony results from a polarity inversion between two
evaluations, the literal evaluation “I really love this year’s summer” is positive, while the intended one,
which is implied by the context “weeks and weeks of awful weather”, is negative.
2. RELATED WORK
Transformers have the ability to learn longer-term dependence, but in the context of language
modelling, they are constrained by a fixed-length context. Transformer-XL (extra long), which extends the
length of learning dependency without interfering with sequential coherence [5]. Bidirectional encoder
representations from transformers (BERT) is intended to train deep bidirectional representations from
unlabeled text by reinforcing on both left and right context simultaneously in all levels [6]. Dai and Le
presents two ways for improving sequence learning using recurrent networks that employ unlabeled text
input. The first method is to anticipate what will happen next in a series. The second method is to utilize a
sequence auto encoder, to scans the supplied sequence and to predicts it again [7]. Howard and Ruder
proposes an efficient transfer learning approach that may be used to in any NLP tasks [8]. Provided a deep
bidirectional language model that has been pertained on huge text corpora and will be put directly on top of
the current model, considerably improving performance in subsequent NLP tasks [9]. Suggestion data mining
is an emerging and demanding topic of NLP that aims to follow user recommendations on web forums [10].
Proposed 8×8 encoder and decoder layer with an attention mechanism that aids in parallel processing and
reduces training time. The attention mechanism aids in paying special attention to each word and its position
in the sentence [11]. Xie et al. offer an n-dimensional linkage approach for incorporating aspect relationships
into deep neural networks for aspect value estimation [12].
3. PROPOSED METHODOLOGY
The Proposed bidirectional long-short term memory-DistilBERT (BiLSTM-DistilBERT) framework
consist a stack of layers like sentence embedding, transformer, BiLSTM [13], concatenate, pooling and
finally softmax classification layers [14], [15], as shown in Figure 1. The sentence is represent as
𝑆 = { 𝑠1, 𝑠2, 𝑠3 … 𝑠𝑛 } is embedded into the pre-trained DistilBERT transformer layer followed by BiLSTM
recurrent neural network [16]. Pooling mechanism is used to the representation of concatenated tensor value
of DistilBERT and BiLSTM outputs and finally routed through a fully connected softmax-layer.
Figure 1. The Proposed BiLSTM-DistilBERT framework
The preceding insight supports our proposed model intuition, as per our observations the pertained
deep neural networks play a vital role in NLP downstream tasks. Finally we proposed an end to end model
that employs transfer learning by selecting a pre-trained DistilBERT uncased model for our base and adding
3. Comput Sci Inf Technol ISSN: 2722-3221
Fine grained irony classification through transfer learning approach (Abhinandan Shirahattii)
45
additional BiLSTM recurrent neural network to extend the model [17], [18]. This is effective because the
pre-trained model’s weights contain information representing a high-level understanding of the English
language, so we can build on that general knowledge by adding additional layers whose weights will come to
represent task-specific understanding of what makes a tweet irony or non-irony [19], [20]. The Hugging Face
Transformers library makes transfer learning very approachable, as our general workflow can be divided into
four main stages, namely input embedding, defining a model architecture, training classification layer
Weights, fine-tuning DistilBERT and training all weights. Hugging Face application programming interface
makes it extremely easy to convert words and sentences into sequence of tokens and these tokens are get
converted into tensors by the text vectorization class, finally these tensors are fed into our model. Once we
instantiate our tokenizer object, we can then go about encoding our training, validation, and test sets in
batches using the tokenizer’s. batch_encode_plus() method. Important arguments set as part of training are
max_length to controls the maximum number of words to tokenize in a given text. Padding or truncation to
adjust input according to max_length. Attention mask help the model to decide on which tokens to pay more
attention and what all need to ignore thus, including the attention mask as an input to our model helps us to
increase the model performance. As pertained model is extended by BiLSTM recurrent neural network units
are capable to capture the long range dependencies among the tokens through this proposed model can learn
the semantics of each inputs with respect to the specific task. The output of LSTM units get concatenated and
passed through a feedforward network with maximum kernel size followed by pooling layer and as output
softmax layer uses the softmax function to squash the vector of arbitrary real-valued scores.
4. RESULT AND DISCUSSION
The Proposed model is used Keras [21], is an open-source software library that provides a Python
interface for artificial neural networks. Keras acts as an interface for the Tensor Flow library. In binary
classification challenge, tweets are classified as irony or not irony. For binary classification, we trained
model with 30 epochs, Adam optimizer and sparse categorical cross entropy loss function [22].
4.1. DataSet
SemEval-2018 task 3: irony detection in English tweets, shared task on irony detection [23]: given a
tweet, automatic NLP systems should determine whether the tweet is ironic (task A) and which type of irony
(if any) is expressed (task B). The ironic tweets were collected using irony-related hashtags (i.e. #irony,
#sarcasm, #not) and were subsequently manually annotated to minimize the amount of noise in the corpus.
For both tasks, a training corpus of 3,834 tweets was provided, as well as a test set containing 784 tweets.
Table 1 represents the irony and not irony samples for binary classification task. Table 2 shows the dataset
splitting ration for training, validation and testing for multi-class classification task.
Table 1. Binary classification dataset splitting ration for training, validation and testing
Training Validation Testing
Not irony 1,545 369 455
Irony 1,506 395 329
Table 2. Multi-class classification dataset splitting ration for training, validation and testing
Training Validation Testing
Not irony 1,534 382 473
Clash irony 1,088 295 164
Situtional 263 53 85
Others 168 54 62
4.2. Experimental results
SemEval 2018 irony dataset has only training and testing samples. So, we have divided training
samples into training and validation set in ratio of 80:20 [24]. Table 2 shows dataset splitting ration for
training, validation and testing phases. We have achieved maximum training accuracy of 98% and validation
accuracy of 69%. On testing samples, we have achieved precision of 81% for not irony class and 66% for
irony class, recall of 77% for not irony and 72% for irony and 79% F1 score for not irony and 69% irony
class. Table 3 shows precision, recall and F1 score for testing samples for binary classification. Our model is
performing better in classifying not irony tweets as compare to irony class.
4. ISSN: 2722-3221
Comput Sci Inf Technol, Vol. 4, No. 1, March 2023: 43-49
46
Table 3. Precision, recall and F1 score for testing samples for binary classification
Precision recall F1 score
Not irony 81 77 79
Irony 66 72 69
Figure 2 shows accuracy and loss for training and validation dataset during training, as shown in
Figure 2 training loss is always high compare to validation loss. Figure 3 shows confusion matrix for binary
classification. Total of 168 samples of not irony class are classified as irony class and total of 108 samples
visa-versa. Figure 4 shows area under the curve (AUC) and receiver operating characteristics (ROC) curve
for irony binary classification. AUC-ROC curve shows performance of classification model under various
threshold settings. AUC of our model is 0.72.
Figure 2. Training and Validation loss and accuracy for 30 epochs in Binary classification
Figure 3. Confusion matrix for binary classification
Figure 4. AUC-ROC curve for irony binary classification
5. Comput Sci Inf Technol ISSN: 2722-3221
Fine grained irony classification through transfer learning approach (Abhinandan Shirahattii)
47
In multi-class classification challenge, tweets are classified as three irony categories namely, clash
irony, situational irony, and others and irony. Since multi-class dataset is derived from binary classification
challenge by categorizing irony tweets, multi-class dataset is not balanced. For multi-class classification, we
trained model with 30 epochs, Adam optimizer and sparse categorical cross entropy loss function.
Table 4, shows testing phase results multi-class classification, as shows in the Table 4, proposed
model achieves the F1 score of 84% for not irony, 18% for clash irony and 12% for situational. Figure 5,
shows accuracy and loss for training and validation dataset during training. We have achieved maximum
training accuracy of 87% and validation accuracy of 66%. On testing samples, we have achieved precision of
73% for not irony class, 57% for clash irony class, 80% for situational irony class, recall of 99% for not irony
and 10% for clash irony, 6% for situational irony and 84% F1 score for not irony and 18% clash irony and
12% for situational irony. Our model is performing better in classifying not irony tweets as compare to
different irony classes. Other type of irony class tweets not properly classified. Figure 6 shows confusion
matrix for multi class irony classification. Proposed model is classified total of 553 samples as not irony
class, 111 samples as clash irony, 56 samples as situational irony and 36 samples are as otherirony.
Table 4. Testing phase results for different phases for all four classes
Precision recall F1 score
Not irony 73 99 84
Clash irony 57 10 18
Situtional 80 06 12
Others 00 00 00
Figure 5. Loss and accuracy for training and validation samples during training phase of multi class irony
classification
Figure 6. Confusion matrix for multi class irony classification
4.3. Evaluation metrics
In this research work we used confusion matrix to evaluate the performance of the proposed model
for fine-grained irony classification task on SemEval-2018 task 3. In (1) to (3) are used to compute hyper
6. ISSN: 2722-3221
Comput Sci Inf Technol, Vol. 4, No. 1, March 2023: 43-49
48
parameters of proposed hybrid neural network model, which might impact classification performance [25].
F1-Score is a measure combining both precision and recall. It is generally described as the harmonic mean of
the two.
Precision(𝑃) =
𝑇𝑟𝑢𝑒𝑃𝑜𝑠𝑖𝑡𝑖𝑣𝑒
𝑇𝑟𝑢𝑒𝑃𝑜𝑠𝑖𝑡𝑖𝑣𝑒+𝐹𝑎𝑙𝑠𝑒𝑃𝑜𝑠𝑖𝑡𝑖𝑣𝑒
(1)
Recall(𝑅) =
𝑇𝑟𝑢𝑒𝑃𝑜𝑠𝑖𝑡𝑖𝑣𝑒
𝑇𝑟𝑢𝑒𝑃𝑜𝑠𝑖𝑡𝑖𝑣𝑒+𝐹𝑎𝑙𝑠𝑒𝑁𝑒𝑔𝑎𝑡𝑖𝑣𝑒
(2)
F1 − Score = 2 ∗
𝑃∗𝑅
𝑃+𝑅
(3)
5. CONCLUSION AND FUTURE SCOPE
In this research work we proposed a BiLSTM-DistilBERT hybrid neaural network model to address
fine-grained irony classification task on SemEval-2018 task 3 dataset. Transformers are used to minimize the
data preprocessing and feature extraction tasks. Through transfer learning approach our proposed BiLSTM-
DistilBERT model achieves state-of-the-art results over the SemEval-2018 task 3 dataset. Also in future,
instead of DistilBERT transformers other type of transformers could be used to extract features from tweets.
Also classification models such as basic supervised machine learning algorithm support vector machine
could be used.
ACKNOWLEDGEMENTS
We would like to express our gratitude to all of our coworkers who contributed to this research, both
in terms of their knowledge and other forms of support, at the Faculty of Computer Science, KLS Gogte
Institute of Technology, affiliated to Visvesvaraya Technological University.
REFERENCES
[1] M. Deckert, M. Schmoeger, M. Geist, S. Wertgen, and U. Willinger, “Electrophysiological correlates of conventional metaphor,
irony, and literal language processing – an event-related potentials and eLORETA study,” Brain and Language, vol. 215,
p. 104930, Apr. 2021, doi: 10.1016/j.bandl.2021.104930.
[2] Z. L. Chia, M. Ptaszynski, F. Masui, G. Leliwa, and M. Wroczynski, “Machine learning and feature engineering-based study into
sarcasm and irony classification with application to cyberbullying detection,” Information Processing and Management, vol. 58,
no. 4, p. 102600, Jul. 2021, doi: 10.1016/j.ipm.2021.102600.
[3] J. Á. González, L. F. Hurtado, and F. Pla, “Transformer based contextualization of pre-trained word embeddings for irony
detection in Twitter,” Information Processing and Management, vol. 57, no. 4, p. 102262, Jul. 2020,
doi: 10.1016/j.ipm.2020.102262.
[4] S. Zhang, X. Zhang, J. Chan, and P. Rosso, “Irony detection via sentiment-based transfer learning,” Information Processing and
Management, vol. 56, no. 5, pp. 1633–1644, Sep. 2019, doi: 10.1016/j.ipm.2019.04.006.
[5] Z. Dai, Z. Yang, Y. Yang, J. Carbonell, Q. V. Le, and R. Salakhutdinov, “Transformer-XL: attentive language models beyond a
fixed-length context,” in ACL 2019 - 57th Annual Meeting of the Association for Computational Linguistics, Proceedings of the
Conference, 2020, pp. 2978–2988, doi: 10.18653/v1/p19-1285.
[6] J. Devlin, M. W. Chang, K. Lee, and K. Toutanova, “BERT: pre-training of deep bidirectional transformers for language
understanding,” in NAACL HLT 2019 - 2019 Conference of the North American Chapter of the Association for Computational
Linguistics: Human Language Technologies - Proceedings of the Conference, 2019, vol. 1, pp. 4171–4186.
[7] A. M. Dai and Q. V Le, “Semi-supervised sequence learning,” Advances in Neural Information Processing Systems, vol. 28,
2015, [Online]. Available: https://proceedings.neurips.cc/paper/2015/file/7137debd45ae4d0ab9aa953017286b20-Paper.pdf.
[8] J. Howard and S. Ruder, “Universal language model fine-tuning for text classification,” in ACL 2018 - 56th Annual Meeting of the
Association for Computational Linguistics, Proceedings of the Conference (Long Papers), 2018, vol. 1, pp. 328–339, doi:
10.18653/v1/p18-1031.
[9] M. E. Peters et al., “Deep contextualized word representations,” in NAACL HLT 2018 - 2018 Conference of the North American
Chapter of the Association for Computational Linguistics: Human Language Technologies - Proceedings of the Conference,
2018, vol. 1, pp. 2227–2237, doi: 10.18653/v1/n18-1202.
[10] R. A. Potamias, A. Neofytou, and G. Siolas, “NTUA-ISLab at SemEval-2019 task 9: mining suggestions in the wild,” in NAACL
HLT 2019 - International Workshop on Semantic Evaluation, SemEval 2019, Proceedings of the 13th Workshop, 2019,
pp. 1224–1230, doi: 10.18653/v1/s19-2215.
[11] Y. Wu et al., “Google’s neural machine translation system: bridging the gap between human and machine translation,” arXiv
preprint arXiv:1609.08144, 2016, doi: 10.48550/arXiv.1609.08144.
[12] H. Xie, W. Lin, S. Lin, J. Wang, and L. C. Yu, “A multi-dimensional relation model for dimensional sentiment analysis,”
Information Sciences, vol. 579, pp. 832–844, Nov. 2021, doi: 10.1016/j.ins.2021.08.052.
[13] S. Brahma, “Improved sentence modeling using suffix bidirectional LSTM,” arXiv preprint arXiv:1805.07340, 2018,
doi: 10.48550/arXiv.1805.07340.
[14] S. Ilić, E. Marrese-Taylor, J. Balazs, and Y. Matsuo, “Deep contextualized word representations for detecting sarcasm and irony,”
in Proceedings of the 9th Workshop on Computational Approaches to Subjectivity, Sentiment and Social Media Analysis, 2018,
pp. 2–7, doi: 10.18653/v1/w18-6202.
7. Comput Sci Inf Technol ISSN: 2722-3221
Fine grained irony classification through transfer learning approach (Abhinandan Shirahattii)
49
[15] C. Wu, F. Wu, S. Wu, J. Liu, Z. Yuan, and Y. Huang, “THU NGN at SemEval-2018 task 3: Tweet irony detection with densely
connected LSTM and multi-task learning,” in NAACL HLT 2018 - International Workshop on Semantic Evaluation, SemEval
2018 - Proceedings of the 12th Workshop, 2018, pp. 51–56, doi: 10.18653/v1/s18-1006.
[16] R. A. Potamias, G. Siolas, and A. Stafylopatis, “A robust deep ensemble classifier for figurative language detection,” in
Communications in Computer and Information Science, vol. 1000, Springer International Publishing, 2019, pp. 164–175.
[17] C. Baziotis et al., “NTUA-SLP at SemEval-2018 task 3: tracking ironic Tweets using ensembles of word and character level
attentive RNNs,” in NAACL HLT 2018 - International Workshop on Semantic Evaluation, SemEval 2018 - Proceedings of the
12th Workshop, 2018, pp. 613–621, doi: 10.18653/v1/s18-1100.
[18] G. Alwakid, T. Osman, M. El Haj, S. Alanazi, M. Humayun, and N. U. Sama, “MULDASA: multifactor lexical sentiment
analysis of social-media content in nonstandard arabic social media,” Applied Sciences (Switzerland), vol. 12, no. 8, p. 3806, Apr.
2022, doi: 10.3390/app12083806.
[19] K. Cortis and B. Davis, “Over a decade of social opinion mining: a systematic review,” Artificial Intelligence Review, vol. 54,
no. 7, pp. 4873–4965, Jun. 2021, doi: 10.1007/s10462-021-10030-2.
[20] E. Savini and C. Caragea, “Intermediate-task transfer learning with BERT for sarcasm detection,” Mathematics, vol. 10, no. 5,
p. 844, Mar. 2022, doi: 10.3390/math10050844.
[21] S. Nitish, H. Geoffrey, K. Alex, S. Ilya, and S. Ruslan, “Dropout: a simple way to prevent neural networks from overfitting,”
Journal of Machine Learning Research, vol. 15, pp. 1929–1958, 2014.
[22] H. Luo, T. Li, B. Liu, and J. Zhang, “Doer: dual cross-shared RNN for aspect term-polarity co-extraction,” in ACL 2019 - 57th
Annual Meeting of the Association for Computational Linguistics, Proceedings of the Conference, 2020, pp. 591–601, doi:
10.18653/v1/p19-1056.
[23] S. Chen, Y. Wang, J. Liu, and Y. Wang, “Bidirectional machine reading comprehension for aspect sentiment triplet extraction,”
35th AAAI Conference on Artificial Intelligence, AAAI 2021, vol. 14A, no. 14, pp. 12666–12674, May 2021,
doi: 10.1609/aaai.v35i14.17500.
[24] C. Zhang, Q. Li, D. Song, and B. Wang, “A multi-task learning framework for opinion triplet extraction,” in Findings of the
Association for Computational Linguistics Findings of ACL: EMNLP 2020, 2020, pp. 819–828, doi: 10.18653/v1/2020.findings-
emnlp.72.
[25] Y. Yin, F. Wei, L. Dong, K. Xu, M. Zhang, and M. Zhou, “Unsupervised word and dependency path embeddings for aspect term
extraction,” IJCAI International Joint Conference on Artificial Intelligence, vol. 2016-Janua, pp. 2979–2985, 2016.
BIOGRAPHIES OF AUTHORS
Abhinandan Shirahatti is Assistant Professor in Computer Science and
Engineering at KLE DR MSSCET, Belagavi, India and he is currently pursuing PhD studies at
the Visvesvaraya Technological University, Belagavi, India in the Department of Computer
Science and Engineering. He received his Master and Bachelor of Engineering degrees from
the Visvesvaraya Technological University, Belagavi, India in 2012 and 2010, respectively.
He can be contacted at email: abhinandans2010@gmail.com.
Dr. Vijay Rajpurohit Professor and Head, Department of CSE at GIT, Belgaum,
Karnataka, India. Received B.E. in Computer Science from KUD Dharwad, M. Tech from
N.I.T.K Surathkal, and PhD from Manipal University His research interest include image
processing, cloud computing, and data analytics. He has good number of publications. He can
be contacted at email: vijaysr2k@yahoo.com.
Dr. Sanjeev Sannakki Professor in the department of CSE at GIT, Belgaum, and
Karnataka, India. He received his B.E. in ECE from KUD Dharwad in 2009, M. Tech and PhD
from VTU, Belagavi. His research interest include image processing, cloud computing,
computer networks, and data analytics. He has good number of publications. He is the
reviewerfor a few international journals. He can be contacted at email:
sannakkisanjeev@gmail.com.