{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T21:15:57Z","timestamp":1725657357377},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T00:00:00Z","timestamp":1654473600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T00:00:00Z","timestamp":1654473600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,6]]},"DOI":"10.1109\/isdfs55398.2022.9800816","type":"proceedings-article","created":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T19:52:11Z","timestamp":1655927531000},"page":"1-5","source":"Crossref","is-referenced-by-count":3,"title":["Performance Analysis of Deep Approaches on Airbnb Sentiment Reviews"],"prefix":"10.1109","author":[{"given":"Muhammad Raheel","family":"Raza","sequence":"first","affiliation":[{"name":"Firat University,Department of Software Engineering,Elazig,Turkey"}]},{"given":"Walayat","family":"Hussain","sequence":"additional","affiliation":[{"name":"Victoria University,Victoria University Business School,Melbourne,VIC,Australia,3011"}]},{"given":"Asaf","family":"Varol","sequence":"additional","affiliation":[{"name":"Maltepe University,Faculty of Engineering and Natural Sciences,Istanbul,Turkey"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"crossref","DOI":"10.24874\/IJQR14.01-17","article-title":"City characteristics that attract Airbnb travellers: evidence from Europe","author":"g\u00fc\u00e7l\u00fc","year":"2020"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhm.2019.02.008"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2923706"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhm.2018.04.004"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.06.041"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2939543"},{"key":"ref34","first-page":"1","article-title":"Cloud marginal resource allocation: A decision support model","author":"hussain","year":"2019","journal-title":"Mobile Networks Applications"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CSIT.2016.7549473"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3124885"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/forecast3010012"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4780"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/int.22732"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3517154"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ASYU52992.2021.9598999"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2022.3157951"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2020.113288"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78303-7_5"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6675790"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS52919.2021.9486312"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.buildenv.2019.106555"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-022-07297-z"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ASYU52992.2021.9599044"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2017.08.007"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/forecast3040052"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.10.054"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/forecast3030033"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3163144"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2020.3023155"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhm.2018.04.004"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-84060-0_11"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.06.041"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1080\/15256480.2020.1862014"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-96150-3_6"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-020-00656-5"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IISEC54230.2021.9672381"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3611064"}],"event":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","start":{"date-parts":[[2022,6,6]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2022,6,7]]}},"container-title":["2022 10th International Symposium on Digital Forensics and Security (ISDFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9800750\/9800752\/09800816.pdf?arnumber=9800816","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T17:57:52Z","timestamp":1686592672000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9800816\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,6]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/isdfs55398.2022.9800816","relation":{},"subject":[],"published":{"date-parts":[[2022,6,6]]}}}