[PDF][PDF] Recognition of Urdu Handwritten Alphabet Using Convolutional Neural Network (CNN).

G Ahmed, T Alyas, MW Iqbal, MU Ashraf… - … , Materials & Continua, 2022 - researchgate.net
Handwritten character recognition systems are used in every field of life nowadays,
including shopping malls, banks, educational institutes, etc. Urdu is the national language of …

An unsupervised approach for sentiment analysis on social media short text classification in roman urdu

TA Rana, K Shahzadi, T Rana, A Arshad… - Transactions on Asian …, 2021 - dl.acm.org
During the last two decades, sentiment analysis, also known as opinion mining, has become
one of the most explored research areas in Natural Language Processing (NLP) and data …

A performance comparison of unsupervised techniques for event detection from oscar tweets

M Malik, W Aslam, Z Aslam, A Alharbi… - Computational …, 2022 - Wiley Online Library
People's lives are influenced by social media. It is an essential source for sharing news,
awareness, detecting events, people's interests, etc. Social media covers a wide range of …

[PDF][PDF] Deep learning and machine learning-based model for conversational sentiment classification

S Ullah, MR Talib, TA Rana, MK Hanif… - Comput. Mater …, 2022 - researchgate.net
In the current era of the internet, people use online media for conversation, discussion,
chatting, and other similar purposes. Analysis of such material where more than one person …

[PDF][PDF] Extraction of opinion target using syntactic rules in urdu text

TA Rana, B Bakht, M Afzal, NA Mian… - … Automation & Soft …, 2021 - researchgate.net
Opinion target or aspect extraction is the key task of aspect-based sentiment analysis. This
task focuses on the extraction of targeted words or phrases against which a user has …

Analysis of Network Security in IoT-based Cloud Computing Using Machine Learning

H Naeem - International Journal for Electronic Crime Investigation, 2023 - ijeci.lgu.edu.pk
Network security in IoT-based cloud computing can benefit greatly from the application of
machine learning techniques. IoT devices introduce unique security challenges with their …

The Data Security and multi-cloud Privacy concerns

N Tabassum, H Naeem, A Batool - International Journal for …, 2023 - ijeci.lgu.edu.pk
The security, privacy, and challenges of establishing trust in cloud computing are examined
in this paper. It discusses the issues that must be resolved to guarantee the security, privacy …

Optimizing Virtualization for Client-Based Workloads in Cloud Computing

MI Sarwar - International Journal for Electronic Crime Investigation, 2023 - ijeci.lgu.edu.pk
Cloud computing has transformed the IT field by offering adaptable and versatile resources
to cater to the increasing demands of businesses and organizations. Virtualization …

[PDF][PDF] Multi layered rule-based technique for explicit aspect extraction from online reviews

M Hussain, TA Rana, A Iftikhar, MU Ashraf, MW Iqbal… - 2021 - researchgate.net
In the field of sentiment analysis, extracting aspects or opinion targets from user reviews
about a product is a key task. Extracting the polarity of an opinion is much more useful if we …

Urdu Miner: An Application for Urdu Text Mining

M Khan, U Razzaq, Z Ahmed… - 2021 16th International …, 2021 - ieeexplore.ieee.org
A large amount of data is generated every day; it represents both a challenge and
opportunity to understand statistics from existing and new data (datasets/documents). Urdu …