[PDF][PDF] Recognition of Urdu Handwritten Alphabet Using Convolutional Neural Network (CNN).
Handwritten character recognition systems are used in every field of life nowadays,
including shopping malls, banks, educational institutes, etc. Urdu is the national language of …
including shopping malls, banks, educational institutes, etc. Urdu is the national language of …
An unsupervised approach for sentiment analysis on social media short text classification in roman urdu
During the last two decades, sentiment analysis, also known as opinion mining, has become
one of the most explored research areas in Natural Language Processing (NLP) and data …
one of the most explored research areas in Natural Language Processing (NLP) and data …
A performance comparison of unsupervised techniques for event detection from oscar tweets
People's lives are influenced by social media. It is an essential source for sharing news,
awareness, detecting events, people's interests, etc. Social media covers a wide range of …
awareness, detecting events, people's interests, etc. Social media covers a wide range of …
[PDF][PDF] Deep learning and machine learning-based model for conversational sentiment classification
In the current era of the internet, people use online media for conversation, discussion,
chatting, and other similar purposes. Analysis of such material where more than one person …
chatting, and other similar purposes. Analysis of such material where more than one person …
[PDF][PDF] Extraction of opinion target using syntactic rules in urdu text
Opinion target or aspect extraction is the key task of aspect-based sentiment analysis. This
task focuses on the extraction of targeted words or phrases against which a user has …
task focuses on the extraction of targeted words or phrases against which a user has …
Analysis of Network Security in IoT-based Cloud Computing Using Machine Learning
H Naeem - International Journal for Electronic Crime Investigation, 2023 - ijeci.lgu.edu.pk
Network security in IoT-based cloud computing can benefit greatly from the application of
machine learning techniques. IoT devices introduce unique security challenges with their …
machine learning techniques. IoT devices introduce unique security challenges with their …
The Data Security and multi-cloud Privacy concerns
N Tabassum, H Naeem, A Batool - International Journal for …, 2023 - ijeci.lgu.edu.pk
The security, privacy, and challenges of establishing trust in cloud computing are examined
in this paper. It discusses the issues that must be resolved to guarantee the security, privacy …
in this paper. It discusses the issues that must be resolved to guarantee the security, privacy …
Optimizing Virtualization for Client-Based Workloads in Cloud Computing
MI Sarwar - International Journal for Electronic Crime Investigation, 2023 - ijeci.lgu.edu.pk
Cloud computing has transformed the IT field by offering adaptable and versatile resources
to cater to the increasing demands of businesses and organizations. Virtualization …
to cater to the increasing demands of businesses and organizations. Virtualization …
[PDF][PDF] Multi layered rule-based technique for explicit aspect extraction from online reviews
In the field of sentiment analysis, extracting aspects or opinion targets from user reviews
about a product is a key task. Extracting the polarity of an opinion is much more useful if we …
about a product is a key task. Extracting the polarity of an opinion is much more useful if we …
Urdu Miner: An Application for Urdu Text Mining
M Khan, U Razzaq, Z Ahmed… - 2021 16th International …, 2021 - ieeexplore.ieee.org
A large amount of data is generated every day; it represents both a challenge and
opportunity to understand statistics from existing and new data (datasets/documents). Urdu …
opportunity to understand statistics from existing and new data (datasets/documents). Urdu …