Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–3 of 3 results for author: Anika, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:1912.00127  [pdf, other

    cs.CL cs.IR cs.LG stat.ML

    A Hybrid Approach Towards Two Stage Bengali Question Classification Utilizing Smart Data Balancing Technique

    Authors: Md. Hasibur Rahman, Chowdhury Rafeed Rahman, Ruhul Amin, Md. Habibur Rahman Sifat, Afra Anika

    Abstract: Question classification (QC) is the primary step of the Question Answering (QA) system. Question Classification (QC) system classifies the questions in particular classes so that Question Answering (QA) System can provide correct answers for the questions. Our system categorizes the factoid type questions asked in natural language after extracting features of the questions. We present a two stage… ▽ More

    Submitted 2 March, 2020; v1 submitted 29 November, 2019; originally announced December 2019.

  2. arXiv:1911.03059  [pdf, other

    cs.CL

    A Comprehensive Comparison of Machine Learning Based Methods Used in Bengali Question Classification

    Authors: Afra Anika, Md. Hasibur Rahman, Salekul Islam, Abu Shafin Mohammad Mahdee Jameel, Chowdhury Rafeed Rahman

    Abstract: QA classification system maps questions asked by humans to an appropriate answer category. A sound question classification (QC) system model is the pre-requisite of a sound QA system. This work demonstrates phases of assembling a QA type classification model. We present a comprehensive comparison (performance and computational complexity) among some machine learning based approaches used in QC for… ▽ More

    Submitted 19 November, 2019; v1 submitted 8 November, 2019; originally announced November 2019.

  3. arXiv:1906.01276  [pdf

    cs.CR cs.NI

    Anonymity Network Tor and Performance Analysis of ARANEA; an IOT Based Privacy-Preserving Router

    Authors: AKM Bahalul Haque, Sharaban Tahura Nisa, Md. Amdadul Bari, Ayvee Nusreen Anika

    Abstract: There was a time when the word security was only confined to the physical protection of things that were valuable which must be guarded against all the odds. Today, in a world where people can do things virtually have emerged the necessity to protect the virtual world. Every single facet of our life is being controlled by the internet one way or another. There is no privacy in the cyberspace as th… ▽ More

    Submitted 4 June, 2019; originally announced June 2019.

    Comments: 16 Pages, 12 Figures