SentiReview: Sentiment analysis based on text and emoticons
P Yadav, D Pandya - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
Social networking has gradually become a routine for people to post their opinions, views
and comments on any product or person. People share their feelings online in a very …
and comments on any product or person. People share their feelings online in a very …
INTELMO: Enhancing Models' Adoption of Interactive Interfaces
This paper presents INTELMO, an easy-to-use library to help model developers adopt user-
faced interactive interfaces and articles from real-time RSS sources for their language …
faced interactive interfaces and articles from real-time RSS sources for their language …
A non-intrusive method for smart speaker forensics
With the rapid development of the Internet of Things technology, smart speakers have
become increasingly popular. However, smart speaker security is an ensuing threat. At …
become increasingly popular. However, smart speaker security is an ensuing threat. At …
A processing model using natural language processing (nlp) for narrative text of medical record for producing symptoms of mental disorders
Mental health is still a serious problem in Indonesia. Data on basic health research in 2013
showed the prevalence of serious mental disorders in Indonesia reached 1.7 permil. The …
showed the prevalence of serious mental disorders in Indonesia reached 1.7 permil. The …
Optimizing MRC Tasks: Understanding and Resolving Ambiguities
F Dsouza, A Bodade, H Kolhe… - … on Paradigm Shifts …, 2023 - ieeexplore.ieee.org
The attention model allows paying flexible attention to only those components of the input
that contribute to the effective execution of the task at hand. An artificial intelligence …
that contribute to the effective execution of the task at hand. An artificial intelligence …
Image Security Barrier (ISB): Hide valuable information in image using machine learning
P Maske, K Pardhi, S Hatzade… - … on Emerging Trends …, 2022 - ieeexplore.ieee.org
People have a addictions of sharing their daily activities on story, posts, chatting or snap in
form of an image on social media. Sometimes image content information includes the date of …
form of an image on social media. Sometimes image content information includes the date of …
Malicious Address Identifier (MAI): A Browser Extension to Identify Malicious URLs
O Jaiswal, P Asare, J Gadgilwar… - … on Emerging Trends …, 2023 - ieeexplore.ieee.org
Many websites have emerged since the internet was introduced. Every day, people visit a
variety of websites, and they unknowingly click on malicious URLs because they simply …
variety of websites, and they unknowingly click on malicious URLs because they simply …
Cyber-Trolling Detection System
Hate Speech and harassment are widespread in online communication, due to users'
freedom and anonymity and the lack of regulation governed by social Media. Due to this …
freedom and anonymity and the lack of regulation governed by social Media. Due to this …
A review for semantic analysis and text document annotation using natural language processing techniques
N Pande, M Karyakarte - Proceedings of International Conference …, 2019 - papers.ssrn.com
In today's fast-growing world with rapid change in technology, everyone wants to read out
the main part of the document or website in no time, with a certainty of an event occurring or …
the main part of the document or website in no time, with a certainty of an event occurring or …
Electricity Fault Detection using AI/Ml
S Tembhare, A Mankar, A Sheikh… - … on Emerging Trends …, 2023 - ieeexplore.ieee.org
I Power stations require regular stability. To restore stability, an interruption such as an
inaccuracy must be confined. This paper provides an in-depth examination of fault detection …
inaccuracy must be confined. This paper provides an in-depth examination of fault detection …