2022
DOI: 10.1016/j.compeleceng.2022.108051
|View full text |Cite
|
Sign up to set email alerts
|

A comparative analysis of transformer based models for figurative language classification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…They proposed an improved variant where BERT is used as an encoder and decoder, and experimental results show that the model has high fluency and logical coherence in generating conversations. Junaid T et al [13] used self attention mechanism to capture contextual information of sentences. The Transformer model greatly accelerates training speed through parallel computation using self attention mechanism and achieves excellent performance in machine translation tasks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…They proposed an improved variant where BERT is used as an encoder and decoder, and experimental results show that the model has high fluency and logical coherence in generating conversations. Junaid T et al [13] used self attention mechanism to capture contextual information of sentences. The Transformer model greatly accelerates training speed through parallel computation using self attention mechanism and achieves excellent performance in machine translation tasks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Text data mining refers to the discovery of patterns as proposed by Fayyad et al 10 , while natural language processing (NLP) is seen as a branch of artificial intelligence that deals with human language 17 or makes this language understandable to computers 18 thereby enabling different approaches, including the grouping of texts by topics (“topic modeling”). Topics are groups of similar objects, being a particular case of clustering.…”
Section: Introductionmentioning
confidence: 99%
“…Information security is the set of forms that secure data faraway from illegal connection, revelation, duplication, alteration. It is intended to preserve in different ways, Confidentiality (c), Integrity (I), and Availability (A) of trade information (Andress, 2014;Junaid et al, 2022). As such, data security systems are developed around the center destinations of CIA triad is guaranteeing private data is just revealed to approved people (C), forestalling unapproved alterations to private data (I), and ensuring that data is accessed when requested by approved individuals (A) (Ahmad et al, 2014;Thaler et al, 2018).…”
Section: Introductionmentioning
confidence: 99%