{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T07:08:10Z","timestamp":1763536090695},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,14]]},"DOI":"10.1109\/ic3i56241.2022.10072802","type":"proceedings-article","created":{"date-parts":[[2023,3,22]],"date-time":"2023-03-22T17:34:44Z","timestamp":1679506484000},"page":"845-849","source":"Crossref","is-referenced-by-count":2,"title":["Most Possible Likely Word Generation for Text based Applications using Generative Pretrained Transformer model Comparing to Long Short Term Memory Model"],"prefix":"10.1109","author":[{"given":"P.","family":"Niharika","sequence":"first","affiliation":[{"name":"Saveetha Institute of Medical and Technical Sciences Saveetha University,Saveetha School of Engineering,Department of Computer Science and Engineering,Chennai,Tamilnadu,India"}]},{"given":"S. John Justin","family":"Thangaraj","sequence":"additional","affiliation":[{"name":"Saveetha Institute of Medical and Technical Sciences Saveetha University,Saveetha School of Engineering,Department of Computer Science and Engineering,Chennai,Tamilnadu,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.22247\/ijcna\/2021\/207980"},{"key":"ref2","article-title":"Natural Language Processing with Python: Analyzing Text with the Natural Language Toolkit","author":"Bird","year":"2009","journal-title":"O\u2019Reilly Media, Inc."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/3250058"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2019.11.103"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1080\/01480545.2019.1679829"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1561\/1500000074"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330955"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2019.09.147"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1142\/s0218126621501358"},{"key":"ref10","article-title":"Gpt-3: Building Innovative NLP Products Using Large Language Models","author":"Kublik","year":"2022","journal-title":"O\u2019Reilly Media"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.2200\/s01123ed1v01y202108hlt053"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-02145-9"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3389\/978-2-88966-560-0"},{"key":"ref14","article-title":"Toxic Comment Classification Using LSTM, GRU and Neural Network","author":"Partheepan","year":"2021","journal-title":"RAVINTHIRAN PARTHEEPAN"},{"key":"ref15","article-title":"Sentiment Analysis in Social Networks","author":"Pozzi","year":"2016","journal-title":"Morgan Kaufmann"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1080\/01430750.2019.1586768"},{"key":"ref17","article-title":"Natural Language Annotation for Machine Learning: A Guide to Corpus-Building for Applications","author":"Pustejovsky","year":"2012","journal-title":"O\u2019Reilly Media, Inc"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1063\/5.0024971"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/d17-1039"},{"key":"ref20","article-title":"Transformers for Natural Language Processing: Build Innovative Deep Neural Network Architectures for NLP with Python","author":"Rothman","year":"2021","journal-title":"PyTorch, TensorFlow, BERT, RoBERTa, and More"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.chemosphere.2021.130236"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/635\/5\/052018"},{"article-title":"Lstm Recurrent Neural Networks for Signature Verification","year":"2012","author":"Tiflin","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02132-6"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1080\/01430750.2019.1611652"},{"article-title":"The Reading Mind: A Cognitive Approach to Understanding How the Mind Reads","year":"2017","author":"Willingham","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99495-6"}],"event":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","start":{"date-parts":[[2022,12,14]]},"location":"Uttar Pradesh, India","end":{"date-parts":[[2022,12,16]]}},"container-title":["2022 5th International Conference on Contemporary Computing and Informatics (IC3I)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10072015\/10072297\/10072802.pdf?arnumber=10072802","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T14:54:17Z","timestamp":1707836057000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10072802\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,14]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/ic3i56241.2022.10072802","relation":{},"subject":[],"published":{"date-parts":[[2022,12,14]]}}}