{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,3]],"date-time":"2026-05-03T14:32:31Z","timestamp":1777818751362,"version":"3.51.4"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"24","license":[{"start":{"date-parts":[[2019,8,17]],"date-time":"2019-08-17T00:00:00Z","timestamp":1566000000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,8,17]],"date-time":"2019-08-17T00:00:00Z","timestamp":1566000000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s00500-019-04281-z","type":"journal-article","created":{"date-parts":[[2019,8,17]],"date-time":"2019-08-17T10:02:41Z","timestamp":1566036161000},"page":"13007-13024","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":41,"title":["RNN-LSTM-GRU based language transformation"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4895-7544","authenticated-orcid":false,"given":"Ahmed","family":"Khan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aaliya","family":"Sarfaraz","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,8,17]]},"reference":[{"key":"4281_CR1","unstructured":"AbdulJaleel N, Larkey L (2003) English to arabic transliteration for information retrieval: a statistical approach. Center for Intelligent Information Retrieval Computer Science, University of Massachusetts"},{"key":"4281_CR2","unstructured":"Ahmed T (2009) Roman to urdu transliteration using wordlist. In: Proceedings of conference on language and technology, pp 305\u2013309"},{"key":"4281_CR3","doi-asserted-by":"publisher","first-page":"8495","DOI":"10.1109\/ACCESS.2018.2887103","volume":"7","author":"QUA Akram","year":"2019","unstructured":"Akram QUA, Hussain S (2019) Improving Urdu recognition using character-based artistic features of nastalique calligraphy. IEEE Access 7:8495\u20138507","journal-title":"IEEE Access"},{"key":"4281_CR4","doi-asserted-by":"crossref","unstructured":"Alam M, ul Hussain S (2017) Sequence to sequence networks for roman-urdu to urdu transliteration. In: Multi-topic conference (INMIC), international. IEEE, pp 1\u20137","DOI":"10.1109\/INMIC.2017.8289449"},{"key":"4281_CR5","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1016\/j.procs.2017.10.120","volume":"117","author":"MSH Ameur","year":"2017","unstructured":"Ameur MSH, Meziane F, Guessoum A (2017) Arabic machine transliteration using an attention-based encoder\u2013decoder model. Proc Comput Sci 117:287\u2013297","journal-title":"Proc Comput Sci"},{"key":"4281_CR6","doi-asserted-by":"publisher","first-page":"3224","DOI":"10.1109\/ACCESS.2018.2885011","volume":"7","author":"W Anwar","year":"2019","unstructured":"Anwar W, Bajwa IS, Choudhary MA, Ramzan S (2019) An empirical study on forensic analysis of Urdu text using LDA-based authorship attribution. IEEE Access 7:3224\u20133234","journal-title":"IEEE Access"},{"key":"4281_CR7","unstructured":"Bahdanau D, Cho K, Bengio Y (2014) Neural machine translation by jointly learning to align and translate, arXiv preprint arXiv:1409.0473"},{"key":"4281_CR8","unstructured":"Bhalla D, Joshi N, Mathur I (2013) Rule based transliteration scheme for english to punjabi, arXiv preprint arXiv:1307.4300"},{"key":"4281_CR9","unstructured":"B\u00f6gel T (2012) Urdu-roman transliteration via finite state transducers. In: FSMNLP 2012, 10th international workshop on finite state methods and natural language processing, pp 25\u201329"},{"key":"4281_CR10","doi-asserted-by":"crossref","unstructured":"Chen N, Banchs RE, Zhang M, Duan X, Li H (2018) Report of news 2018 named entity transliteration shared task. In: Proceedings of the seventh named entities workshop, pp 55\u201373","DOI":"10.18653\/v1\/W18-2409"},{"issue":"3","key":"4281_CR11","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/s10462-016-9482-x","volume":"47","author":"A Daud","year":"2017","unstructured":"Daud A, Khan W, Che D (2017) Urdu language processing: a survey. Artif Intell Rev 47(3):279\u2013311","journal-title":"Artif Intell Rev"},{"key":"4281_CR12","unstructured":"Deng L (2011) An overview of deep-structured learning for information processing"},{"key":"4281_CR13","doi-asserted-by":"crossref","unstructured":"Deselaers T, Hasan S, Bender O, Ney H (2009) A deep learning approach to machine transliteration. In: Proceedings of the fourth workshop on statistical machine translation. Association for Computational Linguistics, pp 233\u2013241","DOI":"10.3115\/1626431.1626476"},{"key":"4281_CR14","unstructured":"Durrani N, Sajjad H, Fraser A, Schmid H (2010) Hindi-to-urdu machine translation through transliteration. In: Proceedings of the 48th annual meeting of the association for computational linguistics, pp 465\u2013474"},{"key":"4281_CR15","doi-asserted-by":"crossref","unstructured":"Finch A, Liu L, Wang X, Sumita E (2015) Neural network transduction models in transliteration generation. In: Proceedings of the fifth named entity workshop, pp 61\u201366","DOI":"10.18653\/v1\/W15-3909"},{"key":"4281_CR16","doi-asserted-by":"crossref","unstructured":"Finch A, Liu L, Wang X, Sumita E (2016) Target-bidirectional neural models for machine transliteration. In: Proceedings of the sixth named entity workshop, pp 78\u201382","DOI":"10.18653\/v1\/W16-2711"},{"key":"4281_CR17","doi-asserted-by":"crossref","unstructured":"Habash N (2008) Four techniques for online handling of out-of-vocabulary words in arabic-english statistical machine translation. In: Proceedings of 46th annual meeting of the association for computational linguistics on human language technologies, pp 57\u201360","DOI":"10.3115\/1557690.1557706"},{"key":"4281_CR18","doi-asserted-by":"crossref","unstructured":"He W, He Z, Wu H, Wang H (2016) Improved neural machine translation with smt features. In: AAAI, pp 151\u2013157","DOI":"10.1609\/aaai.v30i1.9983"},{"key":"4281_CR19","unstructured":"Hermjakob U, Knight K, Daum\u00e9 H III (2008) Name translation in statistical machine translation-learning when to transliterate. In: Proceedings of ACL-08: HLT, pp 389\u2013397"},{"key":"4281_CR20","unstructured":"Kang I-H, Kim G (2000) English-to-korean transliteration using multiple unbounded overlapping phoneme chunks. In: Proceedings of the 18th conference on computational linguistics, vol 1, pp 418\u2013424"},{"key":"4281_CR21","doi-asserted-by":"crossref","unstructured":"Karakanta A, Dehdari J, van Genabith J (2018) Neural machine translation for low-resource languages without parallel corpora, Machine Translation, pp 1\u201323","DOI":"10.1007\/s10590-017-9203-5"},{"issue":"4","key":"4281_CR22","first-page":"525","volume":"3","author":"A Khan","year":"2014","unstructured":"Khan A (2014) Joint ownership verification for digital text. Adv Comput Sci Appl 3(4):525\u2013531","journal-title":"Adv Comput Sci Appl"},{"issue":"6","key":"4281_CR23","first-page":"6091","volume":"27","author":"A Khan","year":"2015","unstructured":"Khan A (2015a) Comparative analysis of watermarking techniques. Sci Int 27(6):6091\u20136096","journal-title":"Sci Int"},{"issue":"4","key":"4281_CR24","first-page":"426","volume":"4","author":"A Khan","year":"2015","unstructured":"Khan A (2015b) Robust textual steganography. J Sci 4(4):426\u2013434","journal-title":"J Sci"},{"issue":"2","key":"4281_CR25","first-page":"361","volume":"29","author":"A Khan","year":"2017","unstructured":"Khan A, Sarfaraz A (2017) Vetting the security of mobile applications. Sci Int 29(2):361\u2013365","journal-title":"Sci Int"},{"issue":"3","key":"4281_CR27","first-page":"19","volume":"12","author":"A Khan","year":"2018","unstructured":"Khan A, Sarfaraz A (2018) Practical guidelines for securing wireless local area networks (WLANs). Int J Secur Appl 12(3):19\u201328","journal-title":"Int J Secur Appl"},{"issue":"17","key":"4281_CR26","doi-asserted-by":"publisher","first-page":"8045","DOI":"10.1007\/s00500-018-3441-1","volume":"23","author":"A Khan","year":"2019","unstructured":"Khan A, Sarfaraz A (2019a) Novel high-capacity robust and imperceptible image steganography scheme using multi flipped permutations and frequency entropy matching method. Soft Comput 23(17):8045\u20138056","journal-title":"Soft Comput"},{"key":"4281_CR28","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7664-7","author":"A Khan","year":"2019","unstructured":"Khan A, Sarfaraz A (2019b) FFT-ETM based distortion less and high payload image steganography. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-019-7664-7","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"4281_CR29","first-page":"4451","volume":"28","author":"A Khan","year":"2016","unstructured":"Khan A, Sohaib M et al (2016) High-capacity multi-layer framework for highly robust textual steganography. Sci Int 28(5):4451\u20134457","journal-title":"Sci Int"},{"key":"4281_CR30","doi-asserted-by":"crossref","unstructured":"Khan W, Daud A, Khan K, Nasir JA, Basheri M, Aljohani N, Alotaibi FS (2019) Part of speech tagging in Urdu: comparison of machine and deep learning approaches. IEEE Access","DOI":"10.1109\/ACCESS.2019.2897327"},{"key":"4281_CR51","unstructured":"Klein G, Kim Y, Deng Y, Senellart J, Rush AM (2017) Opennmt: Opensource toolkit for neural machine translation. arXiv:1701.02810"},{"issue":"4","key":"4281_CR31","first-page":"599","volume":"24","author":"K Knight","year":"1998","unstructured":"Knight K, Graehl J (1998) Machine transliteration. Comput Linguist 24(4):599\u2013612","journal-title":"Comput Linguist"},{"key":"4281_CR32","doi-asserted-by":"crossref","unstructured":"Kundu S, Paul S, Pal S (2018) A deep learning based approach to transliteration. In: Proceedings of the seventh named entities workshop, pp 79\u201383","DOI":"10.18653\/v1\/W18-2411"},{"issue":"1","key":"4281_CR33","first-page":"17","volume":"12","author":"JS Lee","year":"1998","unstructured":"Lee JS, Choi K-S (1998) English to korean statistical transliteration for information retrieval. Comput Process Oriental Lang 12(1):17\u201337","journal-title":"Comput Process Oriental Lang"},{"key":"4281_CR34","unstructured":"Long Z, Utsuro T, Mitsuhashi T, Yamamoto M (2017) Translation of patent sentences with a large vocabulary of technical terms using neural machine translation, arXiv preprint arXiv:1704.04521"},{"key":"4281_CR35","doi-asserted-by":"publisher","first-page":"47991","DOI":"10.1109\/ACCESS.2019.2908420","volume":"7","author":"K Mehmood","year":"2019","unstructured":"Mehmood K, Essam D, Shafi K, Malik MK (2019) Discriminative feature spamming technique for roman Urdu sentiment analysis. IEEE Access 7:47991\u201348002","journal-title":"IEEE Access"},{"key":"4281_CR36","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-03838-2","author":"R Noor","year":"2019","unstructured":"Noor R, Khan A, Sarfaraz A, Mehmood Z, Cheema AM (2019a) Highly robust hybrid image watermarking approach using Tchebichef transform with secured PCA and CAT encryption. Soft Comput. https:\/\/doi.org\/10.1007\/s00500-019-03838-2","journal-title":"Soft Comput"},{"issue":"4","key":"4281_CR37","doi-asserted-by":"publisher","first-page":"1535","DOI":"10.1007\/s11277-018-6097-3","volume":"104","author":"R Noor","year":"2019","unstructured":"Noor R, Khan A, Sarfaraz A (2019b) High performance and energy efficient image watermarking for video using a mobile device. Wirel Pers Commun 104(4):1535\u20131551","journal-title":"Wirel Pers Commun"},{"issue":"4","key":"4281_CR38","first-page":"17","volume":"21","author":"AM Omar","year":"2016","unstructured":"Omar AM, Qu J, Yuenyong S (2016) Automatic transliteration of proper names from Somali to English. Sci Technol Asia 21(4):17\u201325","journal-title":"Sci Technol Asia"},{"key":"4281_CR39","unstructured":"Papineni K, Roukos S, Ward T, Zhu W-J (2002) Bleu: a method for automatic evaluation of machine translation. In: Proceedings of the 40th annual meeting on association for computational linguistics. Association for Computational Linguistics, pp 311\u2013318"},{"issue":"2","key":"4281_CR40","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/5.18626","volume":"77","author":"LR Rabiner","year":"1989","unstructured":"Rabiner LR (1989) A tutorial on hidden markov models and selected applications in speech recognition. Proc IEEE 77(2):257\u2013286","journal-title":"Proc IEEE"},{"key":"4281_CR41","doi-asserted-by":"crossref","unstructured":"Rao K, Peng F, Sak H, Beaufays F (2015) Grapheme-to-phoneme conversion using long short-term memory recurrent neural networks. In: IEEE international conference on acoustics, speech and signal processing, IEEE, pp 4225\u20134229","DOI":"10.1109\/ICASSP.2015.7178767"},{"key":"4281_CR42","unstructured":"Rosca M, Breuel T (2016) Sequence-to-sequence neural network models for transliteration, arXiv:1610.09565"},{"key":"4281_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.017","author":"H Sajjad","year":"2019","unstructured":"Sajjad H, Kanwal T, Anjum A, Rehman SU, Khan A, Khan A, Manzoor U (2019) An efficient privacy preserving protocol for dynamic continuous data collection. Comput Secur. https:\/\/doi.org\/10.1016\/j.cose.2019.06.017","journal-title":"Comput Secur"},{"key":"4281_CR44","doi-asserted-by":"crossref","unstructured":"Sanjanaashree P et al. (2014) Joint layer based deep learning framework for bilingual machine transliteration. In: 2014 international conference on advances in computing, communications and informatics (ICACCI, IEEE, 2014, pp 1737\u20131743","DOI":"10.1109\/ICACCI.2014.6968553"},{"issue":"4","key":"4281_CR45","doi-asserted-by":"publisher","first-page":"2995","DOI":"10.1007\/s11277-018-5989-6","volume":"103","author":"A Sarfaraz","year":"2018","unstructured":"Sarfaraz A, Khan A (2018) Feature selection based correlation attack on HTTPS secure searching. Wirel Pers Commun 103(4):2995\u20133008","journal-title":"Wirel Pers Commun"},{"key":"4281_CR46","doi-asserted-by":"crossref","unstructured":"Shao Y, Nivre J (2016) Applying neural networks to english-chinese named entity transliteration. In: Proceedings of the sixth named entity workshop, 2016, pp 73\u201377","DOI":"10.18653\/v1\/W16-2710"},{"key":"4281_CR47","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1007\/978-981-10-3773-3_59","volume-title":"Advances in computer and computational sciences","author":"VK Sharma","year":"2018","unstructured":"Sharma VK, Mittal N (2018) Cross-lingual information retrieval: a dictionary-based query translation approach. In: Bhatia SK, Mishra KK, Tiwari S, Singh VK (eds) Advances in computer and computational sciences. Springer, Singapore, pp 611\u2013618"},{"issue":"1","key":"4281_CR48","first-page":"157","volume":"5","author":"K Shilpa","year":"2016","unstructured":"Shilpa K, Usha K (2016) Transliteration in malayalam using deep learning. Int J Adv Res Comput Commun Eng 5(1):157\u2013160","journal-title":"Int J Adv Res Comput Commun"},{"key":"4281_CR49","unstructured":"Wang Y-Y, Acero A, Chelba C (2003) Is word error rate a good indicator for spoken language understanding accuracy. In: 2003 IEEE workshop on automatic speech recognition and understanding, ASRU\u201903. IEEE, 2003, pp 577\u2013582"},{"key":"4281_CR50","doi-asserted-by":"crossref","unstructured":"Wang W, Peter J-T, Rosendahl H, Ney H (2016) Character: translation edit rate on character level. In: Proceedings of the first conference on machine translation: volume 2, Shared Task Papers, vol 2, pp 505\u2013510","DOI":"10.18653\/v1\/W16-2342"},{"key":"4281_CR52","doi-asserted-by":"crossref","unstructured":"Zahid MA, Rao NI, Siddiqui AM (2010) English to urdu transliteration: an application of soundex algorithm. In: 2010 international conference on information and emerging technologies (ICIET), IEEE, pp 1\u20135","DOI":"10.1109\/ICIET.2010.5625681"},{"key":"4281_CR53","unstructured":"Zoph B, Yuret D, May J, Knight K (2016) Transfer learning for low-resource neural machine translation, arXiv preprint arXiv:1604.02201"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-019-04281-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-019-04281-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-019-04281-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,19]],"date-time":"2023-09-19T06:10:04Z","timestamp":1695103804000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-019-04281-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,17]]},"references-count":53,"journal-issue":{"issue":"24","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["4281"],"URL":"https:\/\/doi.org\/10.1007\/s00500-019-04281-z","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,17]]},"assertion":[{"value":"17 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"Mentioned authors have no conflict of interest upon this article. This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}