2022
DOI: 10.17485/ijst/v15i47.1907
|View full text |Cite
|
Sign up to set email alerts
|

Context Aware Image Sentiment Classification using Deep Learning Techniques

Abstract: Objectives: To propose context aware sentiment classification using deep learning techniques. Methods: We used EfficientNetB-7 deep learning framework for caption generation for the input image and to classify the sentiment of generated caption using machine learning techniques. First, we employ several real-time and synthetic image datasets, then apply pre-processing and normalization for data balancing. Then efficient module implementation for feature extraction and selection using convolutional and pooling … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 15 publications
0
1
0
Order By: Relevance
“…The four DL and ML privacy technologies viz. homomorphic encryption, trusted execution, differential privacy, and secure multiparty computing environment homomorphic encryption, trusted execution, differential privacy, and secure multiparty computing environment are most frequently utilised to prevent the attacker from discovering which instances were used to create the target model; the trusted execution environments make use of hardware-based security and isolation for training code security and sensitive data security (6,7) .…”
Section: Introductionmentioning
confidence: 99%
“…The four DL and ML privacy technologies viz. homomorphic encryption, trusted execution, differential privacy, and secure multiparty computing environment homomorphic encryption, trusted execution, differential privacy, and secure multiparty computing environment are most frequently utilised to prevent the attacker from discovering which instances were used to create the target model; the trusted execution environments make use of hardware-based security and isolation for training code security and sensitive data security (6,7) .…”
Section: Introductionmentioning
confidence: 99%
“…https://www.indjst.org/ Action representation, action learning, and categorization are typically the two main processes in the human action recognition process. According to (1) , previous methods of action recognition are based on action representation and may be roughly classified into two groups: global and local representations.…”
Section: Introductionmentioning
confidence: 99%