{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T21:38:39Z","timestamp":1770068319633,"version":"3.49.0"},"reference-count":81,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2899260","type":"journal-article","created":{"date-parts":[[2019,2,13]],"date-time":"2019-02-13T20:15:43Z","timestamp":1550088943000},"page":"23319-23328","source":"Crossref","is-referenced-by-count":149,"title":["Sarcasm Detection Using Soft Attention-Based Bidirectional Long Short-Term Memory Model With Convolution Network"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7967-8732","authenticated-orcid":false,"given":"Le Hoang","family":"Son","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4263-7168","authenticated-orcid":false,"given":"Akshi","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Saurabh Raj","family":"Sangwan","sequence":"additional","affiliation":[]},{"given":"Anshika","family":"Arora","sequence":"additional","affiliation":[]},{"given":"Anand","family":"Nayyar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1102-1387","authenticated-orcid":false,"given":"Mohamed","family":"Abdel-Basset","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.11.001"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/s40815-016-0260-3"},{"key":"ref71","first-page":"1","article-title":"Collaborative handshaking approaches between Internet of computing and Internet of Things towards a smart world: A review from 2009&#x2013;2017","author":"jha","year":"2018","journal-title":"Telecommun Syst"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/s40815-015-0117-1"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-016-1412-y"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-017-9462-8"},{"key":"ref39","author":"salehinejad","year":"2017","journal-title":"Recent advances in recurrent neural networks"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-016-0811-1"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1108\/eb046814"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2017.01.003"},{"key":"ref78","doi-asserted-by":"crossref","first-page":"3549","DOI":"10.1007\/s00500-015-1712-7","article-title":"Picture fuzzy clustering: A new computational intelligence method","volume":"20","author":"thong","year":"2016","journal-title":"Soft Comput"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.06.023"},{"key":"ref33","article-title":"R-NET: Machine reading comprehension with self-matching networks","author":"wang","year":"2017"},{"key":"ref32","author":"seo","year":"2016","journal-title":"Bidirectional attention flow for machine comprehension"},{"key":"ref31","first-page":"2449","article-title":"Tweet sarcasm detection using deep neural network","author":"zhang","year":"2016","journal-title":"Proc COLING 26th Int Conf Comput Linguistics Tech Papers"},{"key":"ref30","first-page":"1","article-title":"Learning to forget: Continual prediction with LSTM","author":"gers","year":"1999","journal-title":"Proc 9th Int Conf Artif Neur Netw (ICANN'99)"},{"key":"ref37","first-page":"63","article-title":"NLTK: The natural language toolkit","volume":"1","author":"loper","year":"2002","journal-title":"Proc ACL Workshop Effective Tools Methodol Teach Natural Lang Process Comput Linguistics Assoc Comput Linguistics"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-35488-8_1"},{"key":"ref35","first-page":"312","article-title":"Semeval-2013 task 2: Sentiment analysis in Twitter","author":"hltcoe","year":"2013"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/S15-2080"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2018.05.053"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.15625\/1813-9663\/34\/1\/12725"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2018.11.007"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"95","DOI":"10.18653\/v1\/W16-2111","article-title":"How do cultural differences impact the quality of sarcasm annotation?: A case study of indian annotators and american text","author":"joshi","year":"2016","journal-title":"Proc 10th SIGHUM Workshop Lang Technol Cultural Heritage Social Sci Hum"},{"key":"ref63","first-page":"1","article-title":"FD-AOMDV: Fault-tolerant disjoint ad-hoc on-demand multipath distance vector routing algorithm in mobile ad-hoc networks","author":"robinson","year":"2019","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"ref27","author":"amir","year":"2016","journal-title":"Modeling context with user embeddings for sarcasm detection in social media"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/s10661-018-6914-x"},{"key":"ref65","first-page":"1","article-title":"How to prevent maritime border collision for Fisheries?&#x2014;A design of real-time automatic identification system","author":"saravanan","year":"2019","journal-title":"Earth Science Informatics"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W16-0425"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.03.023"},{"key":"ref67","first-page":"1","article-title":"A new fusion of salp swarm with sine cosine for optimization of non-linear functions","author":"singh","year":"2019","journal-title":"Eng Comput"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.04.050"},{"key":"ref2","author":"sivanandam","year":"2007","journal-title":"PRINCIPLES OF SOFT COMPUTING (With CD)"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2016.05.009"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1016\/j.dcan.2016.06.002","article-title":"Sarcastic sentiment detection in tweets streamed in real time: A big data approach","volume":"2","author":"bharti","year":"2016","journal-title":"Digit Commun Netw"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2848298"},{"key":"ref22","first-page":"704","article-title":"Sarcasm as contrast between a positive sentiment and negative situation","volume":"13","author":"riloff","year":"2013","journal-title":"Proc EMNLP"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-0068.2010.00822.x"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2594194"},{"key":"ref23","first-page":"3","article-title":"The CLSA model: A novel framework for concept-level sentiment analysis","author":"cambria","year":"2015","journal-title":"Proc Int Conf Intell Text Process Comput Linguistics"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1169"},{"key":"ref25","first-page":"1","article-title":"Verbal aggression detection on Twitter comments: Convolutional neural network for short-text sentiment analysis","author":"junyi","year":"2018","journal-title":"Neural Comput Appl"},{"key":"ref50","first-page":"657","article-title":"A primer on the Web information retrieval paradigm","volume":"4","author":"bhatia","year":"2008","journal-title":"J Theor Appl Inf Technol"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2885639"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2018.02.008"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-018-1750-z"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2017.01.021"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2868544"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-171947"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2018.04.006"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-1111-6"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-018-1262-7"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2690342"},{"key":"ref11","first-page":"5107e","article-title":"Systematic literature review of sentiment analysis on Twitter using soft computing techniques","author":"kumar","year":"2019","journal-title":"Concurrency Comput Pract Exper"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ASRU.2013.6707742"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2885117"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2873730"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2878478"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2647384"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2876674"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2882878"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-016-0763-5"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2879481"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2878425"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2016.08.009"},{"key":"ref4","first-page":"1","article-title":"Empirical study of Twitter and Tumblr for sentiment analysis using soft computing techniques","author":"kumar","year":"2017","journal-title":"Proc World Congr Eng Comput Sci"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2740982"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/775224.775226"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.5815\/ijisa.2012.10.01"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2851311"},{"key":"ref49","first-page":"37","article-title":"Evaluation: From precision, recall and F-measure to ROC, informedness, markedness and correlation","volume":"2","author":"powers","year":"2011","journal-title":"J Mach Learn Technol"},{"key":"ref9","first-page":"372","article-title":"Sentiment analysis on Twitter","volume":"9","author":"kumar","year":"2012","journal-title":"Int J Comput Sci Issues"},{"key":"ref46","first-page":"597","article-title":"Convergence analysis of two-layer neural networks with relu activation","author":"li","year":"2017","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref45","first-page":"1","article-title":"VADER: A parsimonious rule-based model for sentiment analysis of social media text","author":"gilbert","year":"2014","journal-title":"Proc of the Int Conf on Weblogs and Social Media (ICWSM)"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2776930"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"key":"ref42","first-page":"2048","article-title":"Show, attend and tell: Neural image caption generation with visual attention","author":"xu","year":"2015","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D15-1166"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1002\/asi.22872"},{"key":"ref43","first-page":"241","article-title":"Enhanced sentiment learning using Twitter hashtags and smileys","author":"davidov","year":"2010","journal-title":"Proc 23rd Int Conf Comput Linguistics Posters Assoc Comput Linguistics"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08641269.pdf?arnumber=8641269","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T08:24:15Z","timestamp":1643271855000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8641269\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":81,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2899260","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}