Deep Learning has achieved significant improvement in various machine learning tasks. Nowadays,
Recurrent Neural Network (RNN) and Long Short Term Memory (LSTM) have been increasing its popularity on
Text Sequence i.e. word prediction. The ability to abstract information from image or text is being widely
adopted by organizations around the world. A basic task in deep learning is classification be it image or text.
Current trending techniques such as RNN, CNN has proven that such techniques open the door for data analysis.
Emerging technologies such has Region CNN, Recurrent CNN have been under consideration for the analysis.
Recurrent CNN is being under development with the current world. The proposed system uses Recurrent Neural
Network for review prediction. Also LSTM is used along with RNN so as to predict long sentences. This system
focuses on context based review prediction and will provide full length sentence. This will help to write a proper
reviews by understanding the context of user.
Prediction of Answer Keywords using Char-RNNIJECEIAES
Generating sequences of characters using a Recurrent Neural Network (RNN) is a tried and tested method for creating unique and context aware words, and is fundamental in Natural Language Processing tasks. These type of Neural Networks can also be used a question-answering system. The main drawback of most of these systems is that they work from a factoid database of information, and when queried about new and current information, the responses are usually bleak. In this paper, the author proposes a novel approach to finding answer keywords from a given body of news text or headline, based on the query that was asked, where the query would be of the nature of current affairs or recent news, with the use of Gated Recurrent Unit (GRU) variant of RNNs. Thus, this ensures that the answers provided are relevant to the content of query that was put forth.
Author Identification of Source Code Segments Written by Multiple Authors Usi...Parvez Mahbub
Authors:
Parvez Mahbub
Department of Computer Science
Dalhousie University
parvezmrobin@dal.ca
Naz Zarreen Oishie
Department of Computer Science
University of Saskatchewan
naz.oishie@usask.ca
S.M. Rafizul Haque
CSE Discipline
Khulna University
rafizul@cse.ku.ac.bd
Text mining efforts to innovate new, previous unknown or hidden data by automatically extracting
collection of information from various written resources. Applying knowledge detection method to
formless text is known as Knowledge Discovery in Text or Text data mining and also called Text Mining.
Most of the techniques used in Text Mining are found on the statistical study of a term either word or
phrase. There are different algorithms in Text mining are used in the previous method. For example
Single-Link Algorithm and Self-Organizing Mapping(SOM) is introduces an approach for visualizing
high-dimensional data and a very useful tool for processing textual data based on Projection method.
Genetic and Sequential algorithms are provide the capability for multiscale representation of datasets and
fast to compute with less CPU time based on the Isolet Reduces subsets in Unsupervised Feature
Selection. We are going to propose the Vector Space Model and Concept based analysis algorithm it will
improve the text clustering quality and a better text clustering result may achieve. We think it is a good
behavior of the proposed algorithm is in terms of toughness and constancy with respect to the formation of
Neural Network.
IRJET - Automatic Lip Reading: Classification of Words and Phrases using Conv...IRJET Journal
This document presents research on developing an automatic lip reading system using convolutional neural networks. The system takes in video frames of a speaker's face without audio and classifies the words or phrases being spoken. The researchers preprocessed the data by detecting faces in video frames and cropping them. They then trained a CNN model on concatenated frames. Their model achieved 80.44% accuracy on the test set in classifying 10 words and 10 phrases from 17 speakers. The researchers concluded the model could be improved by addressing overfitting to unseen speakers with a larger dataset and regularization techniques.
This document provides a summary of approaches for performing sentiment analysis. It discusses document-level, sentence-level, and aspect-level sentiment analysis. At the document level, the entire document is classified as positive or negative. At the sentence level, each sentence's sentiment is determined. At the aspect level, the sentiments expressed towards specific aspects are identified. The document also outlines applications of sentiment analysis such as in e-commerce, brand/customer feedback analysis, and government use. Finally, it discusses sentiment classification approaches and levels.
Performance estimation based recurrent-convolutional encoder decoder for spee...karthik annam
This document discusses a proposed Recurrent-Convolutional Encoder-Decoder (R-CED) network for speech enhancement. The R-CED network aims to overcome challenges with existing methods by estimating the a priori and posteriori signal-to-noise ratios to separate noise from speech. The R-CED consists of convolutional layers with increasing and decreasing numbers of filters to encode and decode features. Performance will be evaluated using metrics like PESQ, STOI, CER, MSE, SNR, and SDR. The proposed method aims to improve speech enhancement accuracy and recover enhanced speech quality compared to other techniques.
QUALITATIVE ANALYSIS OF PLP IN LSTM FOR BANGLA SPEECH RECOGNITIONijma
This document summarizes a study that compares different acoustic feature extraction methods (LPC, MFCC, PLP) for a Bangla speech recognition system using LSTM neural networks. It finds that PLP outperforms MFCC and LPC based on statistical distance measurements of phoneme coefficients. PLP shows better distinction between phonemes compared to MFCC and LPC. While RNN/LSTM are inherently slow, combining PLP with faster networks like Transformers may improve performance for large datasets.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
We propose a model for carrying out deep learning based multimodal sentiment analysis. The MOUD dataset is taken for experimentation purposes. We developed two parallel text based and audio basedmodels and further, fused these heterogeneous feature maps taken from intermediate layers to complete thearchitecture. Performance measures–Accuracy, precision, recall and F1-score–are observed to outperformthe existing models.
This document is a resume for Manoj Alwani providing his contact information, education history, professional experience, skills, projects, publications, and courses. It details that he has a M.S. in Computer Science from Stony Brook University and a B.Tech from India. His professional experience includes research roles at Element Inc and Stony Brook University focused on deep learning and computer vision. His skills and projects involve areas such as deep learning, computer vision, parallel computing, robotics, and natural language processing.
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...IRJET Journal
This paper proposes a convolutional neural network model to recognize handwritten digits using the MNIST dataset. The model is built using TensorFlow and consists of convolutional, pooling and fully connected layers. The model is trained on 60,000 images and tested on 10,000 images, achieving 98% accuracy on the training set and classifying digits with low error of 0.03% on the test set. Previous methods for handwritten digit recognition are discussed and the CNN approach is shown to provide superior performance with faster training times compared to other models.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A systematic review on sequence-to-sequence learning with neural network and ...IJECEIAES
We develop a precise writing survey on sequence-to-sequence learning with neural network and its models. The primary aim of this report is to enhance the knowledge of the sequence-to-sequence neural network and to locate the best way to deal with executing it. Three models are mostly used in sequence-to-sequence neural network applications, namely: recurrent neural networks (RNN), connectionist temporal classification (CTC), and attention model. The evidence we adopted in conducting this survey included utilizing the examination inquiries or research questions to determine keywords, which were used to search for bits of peer-reviewed papers, articles, or books at scholastic directories. Through introductory hunts, 790 papers, and scholarly works were found, and with the assistance of choice criteria and PRISMA methodology, the number of papers reviewed decreased to 16. Every one of the 16 articles was categorized by their contribution to each examination question, and they were broken down. At last, the examination papers experienced a quality appraisal where the subsequent range was from 83.3% to 100%. The proposed systematic review enabled us to collect, evaluate, analyze, and explore different approaches of implementing sequence-to-sequence neural network models and pointed out the most common use in machine learning. We followed a methodology that shows the potential of applying these models to real-world applications.
This document provides an overview of deep learning, including definitions, origins, applications, and limitations. It defines deep learning as a machine learning technique that uses multiple layers to learn representations of data. Deep learning algorithms attempt to learn multiple levels of representation using a hierarchy of layers. While deep learning has been used since around 2000, it has grown as a subset of machine learning focused on deep artificial neural networks. Deep learning can learn both unsupervised and supervised and is useful for tasks like speech recognition, natural language processing, image recognition, and self-driving cars. However, it requires large amounts of data and time to train models.
Abstract—Classical machine learning techniques have been employed severally in intrusion detection. But due to the rising cases and sophistication of attacks, more advanced machine learning techniques including ensemble-based methods, neural networks and deep learning techniques have been applied. However, there is still need for improved machine learning approach to detect attacks more effectively and efficiently. Stacked generalization approach has been shown to be capable of learning from features and meta-features but has been limited by the deficiencies of base classifiers and lack of optimization in the choice of meta-feature combination. This paper therefore proposes a stacked generalization ensemble approach based on two-tier meta-learner, in which the outputs of classical stacked ensemble are passed to multi-feature-based stacked ensemble, which is optimized. A Grid-search approach is used for the optimization. Nine data features and four meta-features derived from Logistic Regression, Support Vector Machine, Naïve Bayes, and Multilayer Perceptron neural network are used for the machine learning classification task. By applying neural networks as the meta-learner for the classification of NSL-KDD data, improved performances in terms of accuracy, precision, recall and F-measure of 0.97, 0.98, 0.98 and 0.98, respectively are achieved.
International Journal of Computer Science and Information Security,IJCSIS ISSN 1947-5500, Pittsburgh, PA, USA
Email: ijcsiseditor@gmail.com
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
COMPREHENSIVE ANALYSIS OF NATURAL LANGUAGE PROCESSING TECHNIQUEJournal For Research
Natural Language Processing (NLP) techniques are one of the most used techniques in the field of computer applications. It has become one of the vast and advanced techniques. Language is the means of communication or interaction among humans and in present scenario when everything is dependent on machine or everything is computerized, communication between computer and human has become a necessity. To fulfill this necessity NLP has been emerged as the means of interaction which narrows the gap between machines (computers) and humans. It was evolved from the study of linguistics which was passed through the Turing test to check the similarity between data but it was limited to small set of data. Later on various algorithms were developed along with the concept of AI (Artificial Intelligence) for the successful execution of NLP. In this paper, the main emphasis is on the different techniques of NLP which have been developed till now, their applications and the comparison of all those techniques on different parameters.
The upsurge of deep learning for computer vision applicationsIJECEIAES
Artificial intelligence (AI) is additionally serving to a brand new breed of corporations disrupt industries from restorative examination to horticulture. Computers can’t nevertheless replace humans, however, they will work superbly taking care of the everyday tangle of our lives. The era is reconstructing big business and has been on the rise in recent years which has grounded with the success of deep learning (DL). Cyber-security, Auto and health industry are three industries innovating with AI and DL technologies and also Banking, retail, finance, robotics, manufacturing. The healthcare industry is one of the earliest adopters of AI and DL. DL accomplishing exceptional dimensions levels of accurateness to the point where DL algorithms can outperform humans at classifying videos & images. The major drivers that caused the breakthrough of deep neural networks are the provision of giant amounts of coaching information, powerful machine infrastructure, and advances in academia. DL is heavily employed in each academe to review intelligence and within the trade-in building intelligent systems to help humans in varied tasks. Thereby DL systems begin to crush not solely classical ways, but additionally, human benchmarks in numerous tasks like image classification, action detection, natural language processing, signal process, and linguistic communication process.
THE EFFECTS OF THE LDA TOPIC MODEL ON SENTIMENT CLASSIFICATIONijscai
Online reviews are a feedback to the product and play a key role in improving the product to cater to consumers. Online reviews that rely heavily on manual categorization are time consuming and labor intensive.The recurrent neural network in deep learning can process time series data, while the long and short term memory network can process long time sequence data well. This has good experimental verification support in natural language processing, machine translation, speech recognition and language model.The merits of the extracted data features affect the classification results produced by the classification model. The LDA topic model adds a priori a posteriori knowledge to classify the data so that the characteristics of the data can be extracted efficiently.Applied to the classifier can improve accuracy and efficiency. Two-way long-term and short-term memory networks are variants and extensions of cyclic neural networks.The deep learning framework Keras uses Tensorflow as the backend to build a convenient two-way long-term and short-term memory network model, which provides a strong technical support for the experiment.Using the LDA topic model to extract the keywords needed to train the neural network and increase the internal relationship between words can improve the learning efficiency of the model. The experimental results in the same experimental environment are better than the traditional word frequency features.
Constructed model for micro-content recognition in lip reading based deep lea...journalBEEI
The document describes a proposed model for micro-content recognition in lip reading using deep learning. The model takes micro-contents (the English alphabet) as input from video and recognizes them using a convolutional neural network (CNN). The CNN performs feature extraction and recognition. The model was tested on a dataset containing videos of 11 people pronouncing letters and achieved a high recognition rate of 98%.
Suggestion Generation for Specific Erroneous Part in a Sentence using Deep Le...ijtsrd
This document presents a method for generating suggestions for specific erroneous parts of sentences in Indian languages like Malayalam using deep learning. The method uses recurrent neural networks with long short-term memory layers to train a model on input-output examples of sentences and their corrections. The model takes in preprocessed sentence data and generates a set of possible corrections for erroneous parts through multiple network layers. An analysis of the model shows that it can accurately generate suggestions for word length of three, but requires more data and study to handle the complex morphology and symbols of Malayalam. The performance of the method is limited by the hardware used and it could be improved with a more powerful system and additional training data.
Sentimental analysis is a context based mining of text, which extracts and identify subjective information from a text or sentence provided. Here the main concept is extracting the sentiment of the text using machine learning techniques such as LSTM Long short term memory . This text classification method analyses the incoming text and determines whether the underlined emotion is positive or negative along with probability associated with that positive or negative statements. Probability depicts the strength of a positive or negative statement, if the probability is close to zero, it implies that the sentiment is strongly negative and if probability is close to1, it means that the statement is strongly positive. Here a web application is created to deploy this model using a Python based micro framework called flask. Many other methods, such as RNN and CNN, are inefficient when compared to LSTM. Dirash A R | Dr. S K Manju Bargavi "LSTM Based Sentiment Analysis" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42345.pdf Paper URL: https://www.ijtsrd.comcomputer-science/data-processing/42345/lstm-based-sentiment-analysis/dirash-a-r
SENTIMENT ANALYSIS FOR MOVIES REVIEWS DATASET USING DEEP LEARNING MODELSIJDKP
Due to the enormous amount of data and opinions being produced, shared and transferred everyday across the internet and other media, Sentiment analysis has become vital for developing opinion mining systems. This paper introduces a developed classification sentiment analysis using deep learning networks and introduces comparative results of different deep learning networks. Multilayer Perceptron (MLP) was developed as a baseline for other networks results. Long short-term memory (LSTM) recurrent neural network, Convolutional Neural Network (CNN) in addition to a hybrid model of LSTM and CNN were developed and applied on IMDB dataset consists of 50K movies reviews files. Dataset was divided to 50% positive reviews and 50% negative reviews. The data was initially pre-processed using Word2Vec and word embedding was applied accordingly. The results have shown that, the hybrid CNN_LSTM model have outperformed the MLP and singular CNN and LSTM networks. CNN_LSTM have reported the accuracy of 89.2% while CNN has given accuracy of 87.7%, while MLP and LSTM have reported accuracy of 86.74% and 86.64 respectively. Moreover, the results have elaborated that the proposed deep learning models have also outperformed SVM, Naïve Bayes and RNTN that were published in other works using English datasets.
NLP Techniques for Text Generation.docxKevinSims18
Natural Language Processing (NLP) techniques are a subset of artificial intelligence (AI) that deals with the interactions between computers and human language. Text generation is an important application of NLP that involves the automatic creation of human-like text. This blog post will explore some of the NLP techniques used for text generation.
SENTIMENT ANALYSIS IN MYANMAR LANGUAGE USING CONVOLUTIONAL LSTM NEURAL NETWORKijnlc
In recent years, there has been an increasing use of social media among people in Myanmar and writing review on social media pages about the product, movie, and trip are also popular among people. Moreover, most of the people are going to find the review pages about the product they want to buy before deciding whether they should buy it or not. Extracting and receiving useful reviews over interesting products is very important and time consuming for people. Sentiment analysis is one of the important processes for extracting useful reviews of the products. In this paper, the Convolutional LSTM neural network architecture is proposed to analyse the sentiment classification of cosmetic reviews written in Myanmar Language. The paper also intends to build the cosmetic reviews dataset for deep learning and sentiment lexicon in Myanmar Language.
Sentiment Analysis In Myanmar Language Using Convolutional Lstm Neural Networkkevig
In recent years, there has been an increasing use of social media among people in Myanmar and writing
review on social media pages about the product, movie, and trip are also popular among people. Moreover,
most of the people are going to find the review pages about the product they want to buy before deciding
whether they should buy it or not. Extracting and receiving useful reviews over interesting products is very
important and time consuming for people. Sentiment analysis is one of the important processes for extracting
useful reviews of the products. In this paper, the Convolutional LSTM neural network architecture is
proposed to analyse the sentiment classification of cosmetic reviews written in Myanmar Language. The
paper also intends to build the cosmetic reviews dataset for deep learning and sentiment lexicon in Myanmar
Language.
IRJET- Survey on Deep Learning Approaches for Phrase Structure Identification...IRJET Journal
This document discusses deep learning approaches for identifying phrase structures in sentences. It begins with an introduction to natural language processing and phrase structure grammar. Traditional n-gram and rule-based approaches to phrase structure identification are described. Recent deep learning methods for natural language tasks that have been applied to phrase structure identification are then summarized, including word embeddings, convolutional neural networks, recurrent neural networks and recursive neural networks. The document concludes that deep learning requires less manual feature engineering and has achieved good performance on many NLP tasks, but still has room for improvement, especially on tasks involving unlabeled data.
EXTENDING OUTPUT ATTENTIONS IN RECURRENT NEURAL NETWORKS FOR DIALOG GENERATIONijaia
In natural language processing, attention mechanism in neural networks are widely utilized. In this paper, the research team explore a new mechanism of extending output attention in recurrent neural networks for dialog systems. The new attention method was compared with the current method in generating dialog sentence using a real dataset. Our architecture exhibits several attractive properties such as better handle long sequences and, it could generate more reasonable replies in many cases.
Sensing complicated meanings from unstructured data: a novel hybrid approachIJECEIAES
The majority of data on computers nowadays is in the form of unstructured data and unstructured text. The inherent ambiguity of natural language makes it incredibly difficult but also highly profitable to find hidden information or comprehend complex semantics in unstructured text. In this paper, we present the combination of natural language processing (NLP) and convolution neural network (CNN) hybrid architecture called automated analysis of unstructured text using machine learning (AAUT-ML) for the detection of complex semantics from unstructured data that enables different users to make understand formal semantic knowledge to be extracted from an unstructured text corpus. The AAUT-ML has been evaluated using three datasets data mining (DM), operating system (OS), and data base (DB), and compared with the existing models, i.e., YAKE, term frequency-inverse document frequency (TF-IDF) and text-R. The results show better outcomes in terms of precision, recall, and macro-averaged F1-score. This work presents a novel method for identifying complex semantics using unstructured data.
The document describes a comparative study of various machine learning and neural network models for detecting abusive language on Twitter. It finds that a bidirectional GRU network trained on word-level features, with a Latent Topic Clustering module, achieves the most accurate results with an F1 score of 0.805 for detecting abusive tweets. Additionally, it explores using context tweets as additional features and finds this improves some models' performance.
BIDIRECTIONAL LONG SHORT-TERM MEMORY (BILSTM)WITH CONDITIONAL RANDOM FIELDS (...kevig
This study investigates the effectiveness of Knowledge Named Entity Recognition in Online Judges (OJs). OJs are lacking in the classification of topics and limited to the IDs only. Therefore a lot of time is consumed in finding programming problems more specifically in knowledge entities.A Bidirectional Long Short-Term Memory (BiLSTM) with Conditional Random Fields (CRF) model is applied for the recognition of knowledge named entities existing in the solution reports.For the test run, more than 2000 solution reports are crawled from the Online Judges and processed for the model output. The stability of the model is also assessed with the higher F1 value. The results obtained through the proposed BiLSTM-CRF model are more effectual (F1: 98.96%) and efficient in lead-time.
BIDIRECTIONAL LONG SHORT-TERM MEMORY (BILSTM)WITH CONDITIONAL RANDOM FIELDS (...ijnlc
This study investigates the effectiveness of Knowledge Named Entity Recognition in Online Judges (OJs). OJs are lacking in the classification of topics and limited to the IDs only. Therefore a lot of time is consumed in finding programming problems more specifically in knowledge entities.A Bidirectional Long Short-Term Memory (BiLSTM) with Conditional Random Fields (CRF) model is applied for the recognition of knowledge named entities existing in the solution reports.For the test run, more than 2000 solution reports are crawled from the Online Judges and processed for the model output. The stability of the model is
also assessed with the higher F1 value. The results obtained through the proposed BiLSTM-CRF model are more effectual (F1: 98.96%) and efficient in lead-time.
Text classification based on gated recurrent unit combines with support vecto...IJECEIAES
As the amount of unstructured text data that humanity produce largely and a lot of texts are grows on the Internet, so the one of the intelligent technique is require processing it and extracting different types of knowledge from it. Gated recurrent unit (GRU) and support vector machine (SVM) have been successfully used to Natural Language Processing (NLP) systems with comparative, remarkable results. GRU networks perform well in sequential learning tasks and overcome the issues of “vanishing and explosion of gradients in standard recurrent neural networks (RNNs) when captureing long-term dependencies. In this paper, we proposed a text classification model based on improved approaches to this norm by presenting a linear support vector machine (SVM) as the replacement of Softmax in the final output layer of a GRU model. Furthermore, the cross-entropy function shall be replaced with a margin-based function. Empirical results present that the proposed GRU-SVM model achieved comparatively better results than the baseline approaches BLSTM-C, DABN.
EXPERIMENTS ON DIFFERENT RECURRENT NEURAL NETWORKS FOR ENGLISH-HINDI MACHINE ...csandit
Recurrent Neural Networks are a type of Artificial Neural Networks which are adept at dealing
with problems which have a temporal aspect to them. These networks exhibit dynamic
properties due to their recurrent connections. Most of the advances in deep learning employ
some form of Recurrent Neural Networks for their model architecture. RNN's have proven to be
an effective technique in applications like computer vision and natural language processing. In
this paper, we demonstrate the effectiveness of RNNs for the task of English to Hindi Machine
Translation. We perform experiments using different neural network architectures - employing
Gated Recurrent Units, Long Short Term Memory Units and Attention Mechanism and report
the results for each architecture. Our results show a substantial increase in translation quality
over Rule-Based and Statistical Machine Translation approaches.
Feature Extraction and Analysis of Natural Language Processing for Deep Learn...Sharmila Sathish
This document discusses using deep learning techniques for multi-modal feature extraction. It proposes a multi-modal neural network with independent sub-networks for each data mode. It also discusses using a bi-directional GRU network for English word segmentation to effectively solve long-distance dependency issues while reducing training and prediction time compared to bi-directional LSTM. Experimental results showed the proposed multi-modal fusion model can effectively extract low-dimensional fused features from original high-dimensional multi-modal data.
The document discusses two neural network models for reading comprehension tasks: the Attentive Reader model proposed by Herman et al. in 2015 and the Stanford Reader model proposed by Chen et al. in 2016. The author implemented a two-layer attention model inspired by these previous models that achieves a 1.5% higher accuracy on reading comprehension tasks compared to the Stanford Reader.
Domain Specific Named Entity Recognition Using Supervised ApproachWaqas Tariq
This paper introduces Named Entity Recognition approach for textual corpus. Supervised Statistical methods are used to develop our system. Our system can be used to categorize NEs belonging to a particular domain for which it is being trained. As Named Entities appears in text surrounded by contexts (words that are left or right of the NE), we will be focusing on extracting NE contexts from text and then perform statistical computing on them. We are using n-gram modeling for extracting contexts from text. Our methodology first extracts left and right tri-grams surrounding NE instances in the training corpus and calculate their probabilities. Then all the extracted tri-grams along with their calculated probabilities are stored in a file. During testing, system detects unrecognized NEs in the testing corpus and categorize them using the tri-gram probabilities calculated during training time. The proposed system consists of two modules namely Knowledge acquisition and NE Recognition. Knowledge acquisition module extracts the tri-grams surrounding NEs in the training corpus and NE Recognition module performs the categorization of Named Entities in the testing corpus.
This document proposes an automatic emotion recognition system that analyzes audio information to classify human emotions. It uses spectral features and MFCC coefficients for feature extraction from voice signals. Then, a deep learning-based LSTM algorithm is used for classification. The system is evaluated on three audio datasets. Recurrent convolutional neural networks are proposed to capture temporal and frequency dependencies in speech spectrograms. The system aims to improve on existing methods which have lower accuracy and require more computational resources for implementation.
Deep convolutional neural networks-based features for Indonesian large vocabu...IAESIJAI
This document describes a study that used convolutional neural networks (CNNs) to extract features for Indonesian large vocabulary speech recognition. The CNN model was trained discriminatively on speech data that had undergone speed perturbation, unlike typical deep learning models that are trained generatively. Evaluations showed the proposed CNN-DNN method achieved a 7.26% error reduction over DBN-DNN using MFCC features and a 9.01% error reduction over DBN-DNN using filterbank features on an Indonesian speech dataset. An additional 6.13% error reduction was achieved compared to a generatively trained CNN-DNN model. The study aims to address the challenge of limited data for non-mainstream languages like Indones
Similar to Eat it, Review it: A New Approach for Review Prediction (20)
Understanding the Impact and Challenges of Corona Crisis on Education Sector...vivatechijri
n the second week of March 2020, governments of all states in a country suddenly declared
shutting down of all colleges and schools for a temporary period of time as an immediate measure to stop the
spread of pandemic that is of novel corona virus. As the days pass by almost close to a month with no certainty
when they will again reopen. Due to pandemic like this an alarm bells have started sounding in the field of
education where a huge impact can be seen on teaching and learning process as well as on the entire education
sector in turn. The pandemic disruption like this is actually gave time to educators of today to really think about
the sector. Through the present research article, the author is highlighting on the possible impact of
coronavirus on education sector with the future challenges for education sector with possible suggestions.
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION TOWARDS IMPROVEMENT AND DEVELOPMENT vivatechijri
This document discusses the importance of leadership in leading an organization towards improvement and development. It states that leadership is responsible for providing a clear vision and strategy to successfully achieve that vision. Effective leadership can impact the success of an organization by controlling its direction and motivating employees. Leadership is different from traditional management in that it guides employees towards organizational goals through open communication and motivation, rather than simply directing work. The paper concludes that only leadership can lead an organization to change according to its evolving environment, while management may simply follow old rules. Leadership is key to adapting to new market needs and trends.
The topic of assignment is a critical problem in mathematics and is further explored in the real
physical world. We try to implement a replacement method during this paper to solve assignment problems with
algorithm and solution steps. By using new method and computing by existing two methods, we analyse a
numerical example, also we compare the optimal solutions between this new method and two current methods. A
standardized technique, simple to use to solve assignment problems, may be the proposed method
Structural and Morphological Studies of Nano Composite Polymer Gel Electroly...vivatechijri
The document summarizes research on a nano composite polymer gel electrolyte containing SiO2 nanoparticles. Key points:
1. Polyvinylidene fluoride-co-hexafluoropropylene polymer was used as the base polymer mixed with propylene carbonate, magnesium perchlorate, and SiO2 nanoparticles to synthesize the nano composite polymer gel electrolyte.
2. The electrolyte was characterized using XRD, SEM, and FTIR which confirmed the homogeneous dispersion of SiO2 nanoparticles and increased amorphous nature of the electrolyte, enhancing its ion conductivity.
3. XRD showed decreased crystallinity and disappearance of polymer peaks upon addition of SiO2. SEM revealed
Theoretical study of two dimensional Nano sheet for gas sensing applicationvivatechijri
This study is focus on various two dimensional material for sensing various gases with theoretical
view for new research in gas sensing application. In this paper we review various two dimensional sheet such as
Graphene, Boron Nitride nanosheet, Mxene and their application in sensing various gases present in the
atmosphere.
METHODS FOR DETECTION OF COMMON ADULTERANTS IN FOODvivatechijri
Food is essential forliving. Food adulteration deceives consumers and can endanger their health. The
purpose of this document is to list common food adulterant methods commonly found in India. An adulterant is
a substance found in other substances such as food, cosmetics, pharmaceuticals, fuels, or other chemicals that
compromise the safety or effectiveness of that substance. The addition of adulterants is called adulteration. The
most common reason for adulteration is the use of undeclared materials by manufacturers that are cheaper than
the correct and declared ones. The adulterants can be harmful or reduce the effectiveness of the product, or
they can be harmless.
The novel ideas of being a entrepreneur is a key for everyone to get in the hustle, but developing a
idea from core requires a systematic plan, time management, time investment and most importantly client
attention. The Time required for developing may vary from idea to idea and strength of the team. Leadership to
build a team and manage the same throughout the peak of development is the main quality. Innovations and
Techniques to qualify the huddles is another aspect of Business Development and client Retention.
Innovation for supporting prosperity has for quite some time been a focus on numerous orders, including PC science, brain research, and human-PC connection. In any case, the meaning of prosperity isn't continuously clear and this has suggestions for how we plan for and evaluate advances that intend to cultivate it. Here, we talk about current meanings of prosperity and how it relates with and now and then is a result of self-amazing quality. We at that point center around how innovations can uphold prosperity through encounters of self-amazing quality, finishing with conceivable future bearings.
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGEvivatechijri
Demand for data storage is growing exponentially, but the capacity of existing storage media is not keeping up, there emerges a requirement for a storage medium with high capacity, high storage density, and possibility to face up to extreme environmental conditions. According to a research in 2018, every minute Google conducted 3.88 million searches, other people posted 49,000 photos on Instagram, sent 159,362,760 e-mails, tweeted 473,000 times and watched 4.33 million videos on YouTube. In 2020 it estimated a creation of 1.7 megabytes of knowledge per second per person globally, which translates to about 418 zettabytes during a single year. The magnetic or optical data-storage systems that currently hold this volume of 0s and 1s typically cannot last for quite a century. Running data centres takes vast amounts of energy. In short, we are close to have a substantial data-storage problem which will only become more severe over time. Deoxyribonucleic acid (DNA) are often potentially used for these purposes because it isn't much different from the traditional method utilized in a computer. DNA’s information density is notable, 215 petabytes or 215 million gigabytes of data can be stored in just one gram of DNA. First we can encode all data at a molecular level and then store it in a medium that will last for a while and not become out-dated just like floppy disks. Due to the improved techniques for reading and writing DNA, a rapid increase is observed in the amount of possible data storage in DNA.
The usage of chatbots has increased tremendously since past few years. A conversational interface is an interface that the user can interact with by means of a conversation. The conversation can occur by speech but also by text input. When a chatty interface uses text, it is also described as a chatbot or a conversational medium. During this study, the user experience factors of these so called chatbots were investigated. The prime objective is “to spot the state of the art in chatbot usability and applied human-computer interaction methodologies, to research the way to assess chatbots usability". Two sorts of chatbots are formulated, one with and one without personalisation factors. the planning of this research may be a two-by-two factorial design. The independent variables are the two chatbots (unpersonalised versus personalised) and thus the speci?c task or goal the user are ready to do with the chatbot within the ?nancial ?eld (a simple versus a posh task). The results are that there was no noteworthy interaction effect between personalisation and task on the user experience of chatbots. A signi?cant di?erence was found between the two tasks with regard to the user experience of chatbots, however this variation wasn't because of personalisation.
The Smart glasses Technology of wearable computing aims to identify the computing devices into today’s world.(SGT) are wearable Computer glasses that is used to add the information alongside or what the wearer sees. They are also able to change their optical properties at runtime.(SGT) is used to be one of the modern computing devices that amalgamate the humans and machines with the help of information and communication technology. Smart glasses is mainly made up of an optical head-mounted display or embedded wireless glasses with transparent heads- up display or augmented reality (AR) overlay in it. In recent years, it is been used in the medical and gaming applications, and also in the education sector. This report basically focuses on smart glasses, one of the categories of wearable computing which is very popular presently in the media and expected to be a big market in the next coming years. It Evaluate the differences from smart glasses to other smart devices. It introduces many possible different applications from the different companies for the different types of audience and gives an overview of the different smart glasses which are available presently and will be available after the next few years.
Future Applications of Smart Iot Devicesvivatechijri
With the Internet of Things (IoT) bit by bit creating as the resulting time of the headway of the Internet, it gets critical to see the diverse expected zones for the utilization of IoT and the research challenges that are connected with these applications going from splendid savvy urban areas, to medical care administrations, shrewd farming, collaborations and retail. IoT is needed to attack into for all expectations and purposes for all pieces of our day-to-day life. Despite the fact that the current IoT enabling advancements have immensely improved in the continuous years, there are so far different issues that require attention. Since the IoT ideas results from heterogeneous advancements, many examination difficulties will arise. In like manner, IoT is planning for new components of exploration to be finished. This paper presents the progressing headway of IoT advancements and inspects future applications.
Cross Platform Development Using Fluttervivatechijri
Today the development of cross-platform mobile application has under the state of compromise. The developers are not willing to choose an alternative of either building the similar app many times for many operating systems or to accept a lowest common denominator and optimal solution that will going to trade the native speed, accuracy for portability. The Flutter is an open-source SDK for creating high-performance, high fidelity mobile apps for the development of iOS and Android. Few significant features of flutter are - Just-in-time compilation (JIT), Ahead- of-time compilation (AOT compilation) into a native (system-dependent) machine code so that the resulting binary file can execute natively. The Flutter’s hot reload functionality helps us to understand quickly and easily experiment, build UIs, add features, and fix bugs. Hot reload works by injecting updated source code files into the running Dart Virtual Machine (VM). With the help of Flutter, we believe that we would be having a solution that gives us the best of both worlds: hardware accelerated graphics and UI, powered by native ARM code, targeting both popular mobile operating systems.
The Internet, today, has become an important part of our lives. The World Wide Web that was once a small and inaccessible data storage service is now large and valuable. Current activities partially or completely integrated into the physical world can be made to a higher standard. All activities related to our daily life are mapped and linked to another business in the digital world. The world has seen great strides in the Internet and in 3D stereoscopic displays. The time has come to unite the two to bring a new level of experience to the users. 3D Internet is a concept that is yet to be used and requires browsers to be equipped with in-depth visualization and artificial intelligence. When this material is included, the Internet concept of material may become a reality discussed in this paper. In this paper we have discussed the features, possible setting methods, applications, and advantages and disadvantages of using the Internet. With this paper we aim to provide a clear view of 3D Internet and the potential benefits associated with this obviously cost the amount of investment needed to be used.
Recommender System (RS) has emerged as a significant research interest that aims to assist users to seek out items online by providing suggestions that closely match their interests. Recommender system, an information filtering technology employed in many items is presented in internet sites as per the interest of users, and is implemented in applications like movies, music, venue, books, research articles, tourism and social media normally. Recommender systems research is usually supported comparisons of predictive accuracy: the higher the evaluation scores, the higher the recommender. One amongst the leading approaches was the utilization of advice systems to proactively recommend scholarly papers to individual researchers. In today's world, time has more value and therefore the researchers haven't any much time to spend on trying to find the proper articles in line with their research domain. Recommender Systems are designed to suggest users the things that best fit the user needs and preferences. Recommender systems typically produce an inventory of recommendations in one among two ways -through collaborative or content-based filtering. Additionally, both the general public and also the non-public used descriptive metadata are used. The scope of the advice is therefore limited to variety of documents which are either publicly available or which are granted copyright permits. Recommendation systems (RS) support users and developers of varied computer and software systems to beat information overload, perform information discovery tasks and approximate computation, among others.
The study LiFi (Light Fidelity) demonstrates about how can we use this technology as a medium of communication similar to Wifi . This is the latest technology proposed by Harold Haas in 2011. It explains about the process of transmitting data with the help of illumination of an Led bulb and about its speed intensity to transmit data. Basically in this paper, author will discuss about the technology and also explain that how we can replace from WiFi to LiFi . WiFi generally used for wireless coverage within the buildings while LiFi is capable for high intensity wireless data coverage in limited areas with no obstacles .This research paper represents introduction of the Lifi technology,performance,modulation and challenges. This research paper can be used as a reference and knowledge to develop some of LiFitechnology.
Social media platform and Our right to privacyvivatechijri
The advancement of Information Technology has hastened the ability to disseminate information across the globe. In particular, the recent trends in ‘Social Networking’ have led to a spark in personally sensitive information being published on the World Wide Web. While such socially active websites are creative tools for expressing one’s personality it also entails serious privacy concerns. Thus, Social Networking websites could be termed a double edged sword. It is important for the law to keep abreast of these developments in technology. The purpose of this paper is to demonstrate the limits of extending existing laws to battle privacy intrusions in the Internet especially in the context of social networking. It is suggested that privacy specific legislation is the most appropriate means of protecting online privacy. In doing so it is important to maintain a balance between the competing right of expression, the failure of which may hinder the reaping of benefits offered by Internet technology
THE USABILITY METRICS FOR USER EXPERIENCEvivatechijri
THE USABILITY METRICS FOR USER EXPERIENCE was innovatively created by Google engineers and it is ready for production in record time. The success of Google is to attributed the efficient search algorithm, and also to the underlying commodity hardware. As Google run number of application then Google’s goal became to build a vast storage network out of inexpensive commodity hardware. So Google create its own file system, named as THE USABILITY METRICS FOR USER EXPERIENCE that is GFS. THE USABILITY METRICS FOR USER EXPERIENCE is one of the largest file system in operation. Generally THE USABILITY METRICS FOR USER EXPERIENCE is a scalable distributed file system of large distributed data intensive apps. In the design phase of THE USABILITY METRICS FOR USER EXPERIENCE, in which the given stress includes component failures , files are huge and files are mutated by appending data. The entire file system is organized hierarchically in directories and identified by pathnames. The architecture comprises of multiple chunk servers, multiple clients and a single master. Files are divided into chunks, and that is the key design parameter. THE USABILITY METRICS FOR USER EXPERIENCE also uses leases and mutation order in their design to achieve atomicity and consistency. As of there fault tolerance, THE USABILITY METRICS FOR USER EXPERIENCE is highly available, replicas of chunk servers and master exists.
Google File System was innovatively created by Google engineers and it is ready for production in record time. The success of Google is to attributed the efficient search algorithm, and also to the underlying commodity hardware. As Google run number of application then Google’s goal became to build a vast storage network out of inexpensive commodity hardware. So Google create its own file system, named as Google File System that is GFS. Google File system is one of the largest file system in operation. Generally Google File System is a scalable distributed file system of large distributed data intensive apps. In the design phase of Google file system, in which the given stress includes component failures , files are huge and files are mutated by appending data. The entire file system is organized hierarchically in directories and identified by pathnames. The architecture comprises of multiple chunk servers, multiple clients and a single master. Files are divided into chunks, and that is the key design parameter. Google File System also uses leases and mutation order in their design to achieve atomicity and consistency. As of there fault tolerance, Google file system is highly available, replicas of chunk servers and master exists.
A Study of Tokenization of Real Estate Using Blockchain Technologyvivatechijri
Real estate is by far one of the most trusted investments that people have preferred, being a lucrative investment it provides a steady source of income in the form of lease and rents. Although there are numerous advantages, one of the key downsides of real estate investments is lack of liquidity. Thus, even though global real estate investments amount to about twice the size of investments in stock markets, the number of investors in the real estate market is significantly lower. Block chain technology has real potential in addressing the issues of liquidity and transparency, opening the market to even retail investors. Owing to the functionality and flexibility of creating Security Tokens, which are backed by real-world assets, real estate can be made liquid with the help of Special Purpose Vehicles. Tokens of ERC 777 standard, which represent fractional ownership of the real estate can be purchased by an investor and these tokens can also be listed on secondary exchanges. The robustness of Smart Contracts can enable the efficient transfer of tokens and seamless distribution of earnings amongst the investors. This work describes Ethereum blockchainbased solutions to make the existing Real Estate investment system much more efficient.
20CDE09- INFORMATION DESIGN
UNIT I INCEPTION OF INFORMATION DESIGN
Introduction and Definition
History of Information Design
Need of Information Design
Types of Information Design
Identifying audience
Defining the audience and their needs
Inclusivity and Visual impairment
Case study.
A brief introduction to quadcopter (drone) working. It provides an overview of flight stability, dynamics, general control system block diagram, and the electronic hardware.
How to Manage Internal Notes in Odoo 17 POSCeline George
In this slide, we'll explore how to leverage internal notes within Odoo 17 POS to enhance communication and streamline operations. Internal notes provide a platform for staff to exchange crucial information regarding orders, customers, or specific tasks, all while remaining invisible to the customer. This fosters improved collaboration and ensures everyone on the team is on the same page.
Software Engineering and Project Management - Introduction to Project ManagementPrakhyath Rai
Introduction to Project Management: Introduction, Project and Importance of Project Management, Contract Management, Activities Covered by Software Project Management, Plans, Methods and Methodologies, some ways of categorizing Software Projects, Stakeholders, Setting Objectives, Business Case, Project Success and Failure, Management and Management Control, Project Management life cycle, Traditional versus Modern Project Management Practices.
Social media management system project report.pdfKamal Acharya
The project "Social Media Platform in Object-Oriented Modeling" aims to design
and model a robust and scalable social media platform using object-oriented
modeling principles. In the age of digital communication, social media platforms
have become indispensable for connecting people, sharing content, and fostering
online communities. However, their complex nature requires meticulous planning
and organization.This project addresses the challenge of creating a feature-rich and
user-friendly social media platform by applying key object-oriented modeling
concepts. It entails the identification and definition of essential objects such as
"User," "Post," "Comment," and "Notification," each encapsulating specific
attributes and behaviors. Relationships between these objects, such as friendships,
content interactions, and notifications, are meticulously established.The project
emphasizes encapsulation to maintain data integrity, inheritance for shared behaviors
among objects, and polymorphism for flexible content handling. Use case diagrams
depict user interactions, while sequence diagrams showcase the flow of interactions
during critical scenarios. Class diagrams provide an overarching view of the system's
architecture, including classes, attributes, and methods .By undertaking this project,
we aim to create a modular, maintainable, and user-centric social media platform that
adheres to best practices in object-oriented modeling. Such a platform will offer users
a seamless and secure online social experience while facilitating future enhancements
and adaptability to changing user needs.
Exploring Deep Learning Models for Image Recognition: A Comparative Reviewsipij
Image recognition, which comes under Artificial Intelligence (AI) is a critical aspect of computer vision,
enabling computers or other computing devices to identify and categorize objects within images. Among
numerous fields of life, food processing is an important area, in which image processing plays a vital role,
both for producers and consumers. This study focuses on the binary classification of strawberries, where
images are sorted into one of two categories. We Utilized a dataset of strawberry images for this study; we
aim to determine the effectiveness of different models in identifying whether an image contains
strawberries. This research has practical applications in fields such as agriculture and quality control. We
compared various popular deep learning models, including MobileNetV2, Convolutional Neural Networks
(CNN), and DenseNet121, for binary classification of strawberry images. The accuracy achieved by
MobileNetV2 is 96.7%, CNN is 99.8%, and DenseNet121 is 93.6%. Through rigorous testing and analysis,
our results demonstrate that CNN outperforms the other models in this task. In the future, the deep
learning models can be evaluated on a richer and larger number of images (datasets) for better/improved
results.
Encontro anual da comunidade Splunk, onde discutimos todas as novidades apresentadas na conferência anual da Spunk, a .conf24 realizada em junho deste ano em Las Vegas.
Neste vídeo, trago os pontos chave do encontro, como:
- AI Assistant para uso junto com a SPL
- SPL2 para uso em Data Pipelines
- Ingest Processor
- Enterprise Security 8.0 (Maior atualização deste seu release)
- Federated Analytics
- Integração com Cisco XDR e Cisto Talos
- E muito mais.
Deixo ainda, alguns links com relatórios e conteúdo interessantes que podem ajudar no esclarecimento dos produtos e funções.
https://www.splunk.com/en_us/campaigns/the-hidden-costs-of-downtime.html
https://www.splunk.com/en_us/pdfs/gated/ebooks/building-a-leading-observability-practice.pdf
https://www.splunk.com/en_us/pdfs/gated/ebooks/building-a-modern-security-program.pdf
Nosso grupo oficial da Splunk:
https://usergroups.splunk.com/sao-paulo-splunk-user-group/
A vernier caliper is a precision instrument used to measure dimensions with high accuracy. It can measure internal and external dimensions, as well as depths.
Here is a detailed description of its parts and how to use it.
Understanding Cybersecurity Breaches: Causes, Consequences, and PreventionBert Blevins
Cybersecurity breaches are a growing threat in today’s interconnected digital landscape, affecting individuals, businesses, and governments alike. These breaches compromise sensitive information and erode trust in online services and systems. Understanding the causes, consequences, and prevention strategies of cybersecurity breaches is crucial to protect against these pervasive risks.
Cybersecurity breaches refer to unauthorized access, manipulation, or destruction of digital information or systems. They can occur through various means such as malware, phishing attacks, insider threats, and vulnerabilities in software or hardware. Once a breach happens, cybercriminals can exploit the compromised data for financial gain, espionage, or sabotage. Causes of breaches include software and hardware vulnerabilities, phishing attacks, insider threats, weak passwords, and a lack of security awareness.
The consequences of cybersecurity breaches are severe. Financial loss is a significant impact, as organizations face theft of funds, legal fees, and repair costs. Breaches also damage reputations, leading to a loss of trust among customers, partners, and stakeholders. Regulatory penalties are another consequence, with hefty fines imposed for non-compliance with data protection regulations. Intellectual property theft undermines innovation and competitiveness, while disruptions of critical services like healthcare and utilities impact public safety and well-being.
A brand new catalog for the 2024 edition of IWISS. We have enriched our product range and have more innovations in electrician tools, plumbing tools, wire rope tools and banding tools. Let's explore together!
Eat it, Review it: A New Approach for Review Prediction
1. VIVA-Tech International Journal for Research and Innovation
ISSN(Online): 2581-7280
Volume 1, Issue 2 (2019)
Article No. 9
PP 1-6
1
www.viva-technology.org/New/IJRI
Eat it, Review it: ANew Approach for Review Prediction
Deepal S. Thakur1
, Rajiv N. Tarsarya2
, Ashwini Save3
1
(Computer Engineering Department, VIVA Institute of Technology, India)
Abstract: Deep Learning has achieved significant improvement in various machine learning tasks. Nowadays,
Recurrent Neural Network (RNN) and Long Short Term Memory (LSTM) have been increasing its popularity on
Text Sequence i.e. word prediction. The ability to abstract information from image or text is being widely
adopted by organizations around the world. A basic task in deep learning is classification be it image or text.
Current trending techniques such as RNN, CNN has proven that such techniques open the door for data analysis.
Emerging technologies such has Region CNN, Recurrent CNN have been under consideration for the analysis.
Recurrent CNN is being under development with the current world. The proposed system uses Recurrent Neural
Network for review prediction. Also LSTM is used along with RNN so as to predict long sentences. This system
focuses on context based review prediction and will provide full length sentence. This will help to write a proper
reviews by understanding the context of user.
Keywords – CNN, Deep Learning, LSTM, Machine Learning, RCNN, RNN
1. INTRODUCTION
The field of learning has given rise to Artificial Intelligence due to which innovations have reached to another
level. Today AI is bringing revolutionary changes to each and every field be it in nation’s security, health or
education. Machine learning and Deep learning are the two main subfields of artificial intelligence has proved a
boon to the learning. Both plays different role and has their different importance in aspects of environment
learning. Machine learning is a sub-discipline of Artificial Intelligence and today it is much in demand since it is
able to provide relevant tools that the society needs to bring about change. Machine Learning takes the core
ideas of Artificial Intelligence and uses them to solve real-world issues. It is here that the neural networks come
into play as they are designed to imitate the human decision-making ability. Deep Learning focuses on a subset
of ML techniques and tools and then applies them to solve any problem that requires the quality of human
thought. Henceforth making learning a machine would more feasible than making learn a human mind. In field
of text the data is enormous to handle. Leaning the data in deep helps in understanding the different meanings of
words. This meaning plays important role in understanding the context of user. Existing systems predicts next
word for better suggestions using machine learning techniques but lack in understanding the context of the
2. VIVA-Tech International Journal for Research and Innovation
ISSN(Online): 2581-7280
Volume 1, Issue 2 (2019)
Article No. 9
PP 1-6
2
www.viva-technology.org/New/IJRI
costumer, which is the main drawback of these systems. Deep Learning techniques provides way for context
based prediction which can overcome the limitations of existing systems [1]. This system emphasizes on the
context based sentence prediction and mainly focuses on restaurant review system.
2. LITERATURE REVIEW
S. Lai, et. al. [1] have proposed the context-based information classification; RCNN is very useful. The
performance is best in several datasets particularly on document level datasets.
Hassa, et. al. [9] have proposed RNN for the structure sentence representation. This tree like structure captures
the semantic of the sentences. The text is analyzed word by word by using RNN then the semantic of all the
previous texts.
J. Y. Lee, et. al. [7] have proposed that text classification is an important task in natural language processing.
Many approaches have been developed for classification such as SVM (Support Vector Machine), Naïve Bayes
and so on. Usually short text appears in sequence (sentences in the document) hence using information from
preceding text may improve the classification. This paper introduced RNN (Recurrent Neural Network) and
CNN (Convolutional Neural Network) based model for text classification.
V. Tran, et. al. [5] have proposed that n-gram is a contiguous sequence of ‘n’ items from a given sequence of
text. If the given sentence is ‘S’ ,we can construct a list on n-grams from ‘S’ , by finding pairs of words that
occurs next to each other. The model is used to derive probability of sentences using the chain rule of
unconditional probability.
Z. Shi, et. al. [4] have defined that recurrent neural network has input, output and hidden layer. The current
hidden layer is calculated by current input layer and previous hidden layer. LSTM is a special Recurrent Neural
Network. The repeating module of ordinary RNN has a simple structure instead LSTM uses more complex
function to replace it for more accurate result.
J. Shin, et. al. [10] have defined that understanding the contextual aspects of a sentence is very important while
its classification .This paper mainly focuses on classification. Various approaches like SVM, T-LSTM, and
CNN have been previously used for sentence classification.
W. Yin, et. al. [11] have defined various classification tasks are important for Natural language processing
applications. Nowadays CNN are increasing used as they are able to model long range dependencies in
sentence, the systems used are with fixed-sized filters. But, the proposed MVCNN approach breaks this barrier
and yields better results when applied to multiple datasets: binary with 89.4%, Sentiment140 with 88.2% and
Subjectivity classification dataset (Subj.) with 93.9% accuracy.
I. Sutskever, et. al. [12] have defined deep learning being the newest technology in the era has advanced in
many fields. One of the techniques called as Deep Neural Networks are very powerful machine learning models
3. VIVA-Tech International Journal for Research and Innovation
ISSN(Online): 2581-7280
Volume 1, Issue 2 (2019)
Article No. 9
PP 1-6
3
www.viva-technology.org/New/IJRI
and have achieved efficient and excellent performance on many problems like speech recognition, visual object
detection etc. due to its ability to perform parallel computation for the modest no of steps. The results showed
that a large deep LSTM with a limited vocabulary can outperform a standard SMT-based system.
W. yin, et. al. [3] have defined that deep neural networks have revolutionized the field of natural language
processing. Convolutional Neural Network and Recurrent Neural Network, the two main types of DNN
architectures, are widely explored to handle various NLP tasks. CNN is supposed to be good at extracting
position invariant features and RNN at modelling units in sequence. CNNs are considered good at extracting
local and position-invariant features and therefore should perform well on TextC, but in experiments they are
outperformed by RNNs.
K. C. Arnold, et. al. [6] have proposed an approach that presents phrase suggestion instead of word predictions.
It says phrases were interpreted as suggestions that affect the context of what the user write more than then the
conventional single word suggestion. The proposed system uses statistical language modelling capable of
accurately predicting phrases and sentences. System used n-gram sequence model and KenLM for language
model queries which used Kneser-Ney smoothing. It pruned the n grams that repeated less than two times in the
dataset, by marking the start-of-sentence token with some additional flags to indicate the start of the sentence.
The work demonstrated the phrase completions were accepted by users and were interpreted as suggestions
rather than the predictions.
M. Liang, et. al. [8] have defined that in past years, deep learning techniques has achieved great success in many
computer vision tasks. The visual system of the brain shares many properties with CNNs and hence they have
inspired neuroscience to a great extent. CNN is typical feed forward architecture while in the visual systems
recurrent connections are abundant. So incorporating recurrent connection in each convolutional layer the
following system was proposed for Object Recognition. The proposed model tested several benchmark object
detection datasets. RCNN achieved better results over CNN.
P. Ongsulee [2] has defined that machine learning explores the study and construction of algorithms that can
learn from and make predictions on data. Machine learning is sometimes conflated with data mining, where the
latter subfield focuses more on exploratory data analysis and is known as unsupervised learning. Machine
learning can also be unsupervised and be used to learn and establish baseline behavioural profiles for various
entities and then used to find meaningful anomalies.
4. VIVA-Tech International Journal for Research and Innovation
ISSN(Online): 2581-7280
Volume 1, Issue 2 (2019)
Article No. 9
PP 1-6
4
www.viva-technology.org/New/IJRI
3. PROPOSED SYSTEM
The system makes use of Deep Learning techniques which has more accuracy rate as compared to other
machine learning techniques like SVM etc. This system is developed by using python language which consist
of interfaces to many system calls and libraries. It uses Amazon Food Reviews dataset. This dataset consist of
different food and ambience related sentences.
In initial state sequence padding is performed on dataset so that the batches of padded sequences can be used
for training. Word embedding is performed by using word2vec. Word embedding converts the input in the
form of vectors. The vectors generated from word embedding are given as data to the recurrent neural network
for training and the further process is carried out by RNN and LSTM which predicts the sentence. Figure 3.1
shows in detail how the data flows.
Figure 3.1: System Flow Diagram
Figure 4.1 describes the generated vector is given as input to RNN, which on applying activation function
generates features automatically. The feature mapping layer is fully connected to the recurrent structure. RNN
consist of the hidden states which works as a memory for the network. Hidden states capture the information of
previous time steps. LSTM cells are designed to be capable of learning long term dependencies. Recurrent
structure and LSTM identifies the context of the current word and by applying max-pooling and soft-max
function gives the probability of the next word. Which is then forwarded to intermediate output layer an d
5. VIVA-Tech International Journal for Research and Innovation
ISSN(Online): 2581-7280
Volume 1, Issue 2 (2019)
Article No. 9
PP 1-6
5
www.viva-technology.org/New/IJRI
directory. Directory contains the probabilities of next word predicted by soft-max layer. Intermediate layer and
directory then predicts the sentence and displays to user. Before starting training the model, we need to pad the
sequences and make their lengths equal. It generates padded sequences and label where padded sequences are
words that will be taken under consideration to predict label, i.e. the next word. Deep learning models works
totally on mathematics, so the sequences need to be converted into vectored form, so word embedding is done
using Word2vec. All the calculations are carried on this vectors. No feature inputs are to be given to the model
as in deep learning the model maps the features based on activation function, where parameters are selected
automatically by the model itself. Max Pooling layer then operates on every feature independently, it reduces
the spatial size of representation to reduce the amount of parameters and computational cost of network. Output
layer projects the values obtained through max-pooling.
4. RESULTS
While predicting a sentence, it needs a lot of data to understand context of user. To predict what a user want to
write in a sentence is difficult task. Current generation mobile keyboards predicts next word but are not able to
predict sentence. The main standout feature of the system is it predicts sentence and not a single word. There is
no such system developed that predicts or suggests sentences. More the data more can be better accurate
sentences, hence size of data are also important.
5. CONCLUSION
The system will helps user to write restaurant reviews. Current system in market predicts the words using
machine learning techniques. This system provides new innovative approach for review prediction which
analyses the context of the word written by user and then predicts full-length sentence. The system helps user to
review the items, infrastructure and atmosphere in jargon that would be easy for the customer. Also it allow user
to express their own recipe in review section. Deep learning paves way not only for accurate sentence prediction
but also a system that considers a user’s point of view and then generate a sentence. Users can review at an ease
and can easily type a review through this system.
REFERENCES
[1] S. Lai, L. Xu, K. Liu and J. Zhao, “Recurrent Convolutional Neural Networks for Text Classification”,
Proceedings of the Twenty-Ninth AAAI Conference on AI 2015.
[2] P. Ongsulee, “Artificial Intelligence, Machine Learning and Deep Learning”, 2017 15th International
Conference on ICT and Knowledge Engineering (ICT&KE)
[3] W. Yin, K. Kann, Mo Yu and H. Schütze, “Comparative study of CNN and RNN for Natural Language
Processing”, Feb-17.
[4] Z.Shi, M. Shi and C. Li, “The prediction of character based on Recurrent Neural network language model”,
2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS).
[5] V. Tran, K. Nguyen and D. Bui, “A Vietnamese Language Model Based on Recurrent Neural Network”, 2016
Eighth International Conference on Knowledge and Systems Engineering.
6. VIVA-Tech International Journal for Research and Innovation
ISSN(Online): 2581-7280
Volume 1, Issue 2 (2019)
Article No. 9
PP 1-6
6
www.viva-technology.org/New/IJRI
[6] K. C. Arnold, K.Z. Gajos and A. T. Kalai, “On Suggesting Phrases vs. Predicting Words for Mobile Text
Composition”; https://www.microsoft.com/enus/research/wpcontent/uploads /2016/12/ arnold16suggesting.pdf.
[7] J. Lee and F. Dernoncourt, “Sequential Short-Text Classification with Recurrent and Convolutional Neural
Networks”, Conference paper at NAACL 2016.
[8] M. Liang and X. Hu, “Recurrent Convolutional Neural Network for Object Recognition”, 2015 IEEE
Conference on Computer Vision and Pattern Recognition (CVPR).
[9] A. Hassan and A.Mahmood, “Deep Learning for Sentence Classification”, 2017 IEEE Long Island Systems,
Applications and Technology Conference (LISAT).
[10] J. Shin, Y. Kim and S. Yoon, “Contextual CNN: A Novel Architecture Capturing Unified Meaning for
Sentence Classification”, 2018 IEEE International Conference on Big Data and Smart Computing (BigComp).
[11] W. Yin and H. Schutze, “Multichannel Variable-Size Convolution for Sentence Classification”, 19th
Conference on Computational Language Learning, c 2015 Association for Computational Linguistics.
[12] I.Sutskever, O.Vinyals and Q. V. Le, “Sequence to Sequence Learning with Neural Networks”, Dec-14.
[13] Y. Zhang, B. Wallace, “A Sensitivity Analysis of (and Practitioners’ Guide to) Convolutional Neural Networks
for Sentence Classification”, arXiv: 1510.03820v4 [cs.CL], 2016.
[14] A. Salem, A. Almarimi, G Andrejková, “Text Dissimilarities Predictions Using Convolutional Neural Networks
and Clustering” World Symposium on Digital Intelligence for Systems and Machines (DISA), 2018
[15] Y. Lin, J. Wang, “Research on text classification based on SVM-KNN” IEEE 5th International Conference on
Software Engineering and Service Science, 2014
[16] A. Hassan, A. Mahmood, “Convolutional Recurrent Deep Learning Model for Sentence Classification”, IEEE
Access, 2018
[17] R. Lotfidereshgi, P. Gournay, “Speech Prediction Using an Adaptive Recurrent Neural Network with
Application to Packet Loss Concealment”, 2018 IEEE International Conference on Acoustics, Speech and
Signal Processing (ICASSP)
[18] D. Nagalavi, M. Hanumanthappa, “N-gram Word prediction language models to identify the sequence of article
blocks in English e-newspapers”, 2016 International Conference on Computation System and Information
Technology for Sustainable Solutions (CSITSS)
[19] E. Ertugrul, P. Karagoz, “Movie Genre Classification from Plot Summaries Using Bidirectional LSTM”, 2018
IEEE 12th International Conference on Semantic Computing (ICSC)