<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Extracting Protests from News using LSTM Models with different Attention Mechanisms</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>D. Thenmozhi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Chandrabose Aravindan</string-name>
          <email>aravindanc@ssn.edu.in</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Abishek Shyamsunder</string-name>
          <email>abishekshyamsunder@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Adithya Vishwanathan</string-name>
          <email>adithya16002@cse.ssn.edu.in</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Akash Kumar Pujari</string-name>
          <email>akash16007@cse.ssn.edu.in</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of CSE, SSN College of Engineering</institution>
          ,
          <addr-line>Chennai</addr-line>
        </aff>
      </contrib-group>
      <abstract>
        <p>Extracting Protests from news is very useful because it helps in the early identification and subduing of contentious events and controlling violent public outbreaks. This also helps in the study of social sciences on the difference in protest types and their expression across countries. In this paper, a deep learning approach is presented for classifying input documents developed using data from one country and is exercised on data from others. Long Short-Term Memory(LSTM) a variant of Recurrent Neural Network(RNN) is used to implement our approach for the text classification. Models were created for 2 tasks in specific, the first aimed at identifying if a given news document led to a protest or not while the latter predicted if or not an input sentence contained an event trigger. The data given by CodaLab - CLEF 2019 Lab ProtestNews was used to develop and evaluate the performance of the models. The documents and sentences were assigned labels 'protest'/'non-protest' and 'event-trigger'/'not-event-trigger'. A total of 4 LSTM models were implemented with different attention mechanisms, and the ones implementing Scaled-Luong and Bahdanau obtained higher overall F1 macro scores of 0.3290 and 0.3682 on the final evaluation test set respectively.</p>
      </abstract>
      <kwd-group>
        <kwd>Text Classification</kwd>
        <kwd>Information Extraction</kwd>
        <kwd>Long Short Term Model</kwd>
        <kwd>Recurring Neural Networks</kwd>
        <kwd>Attention Mechanism</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Text classification refers to the process of assigning tags or categories to textual
data according to its content. It is one of the fundamental tasks of Natural
Language Processing (NLP) which involves the application of computer techniques
to the analysis and synthesis of natural language. Information Extraction, a field
strongly associated with the aforementioned topics is the automated retrieval of
specific information from a body of text. Using these in unison, the CLEF 2019</p>
      <p>
        Lab ProtestNews TASK 1 aims at classifying news documents as ‘protest’ or
‘non-protest’ given raw data and TASK 2 aims at classifying a sentence as one
containing an event-trigger or not given the sentence and the news article
containing the sentence and Task 3 the extraction of various information from a
given event sentence such as location, time and participation of the event [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>This paper focuses on the use of LSTM, an artificial RNN architecture with
different attention mechanisms to perform efficient binary classification of input
data and assign class labels for TASK 1 and TASK 2 of CLEF 2019 Lab
ProtestNews, functioning along lines similar to that of the novel work published by Peng
Zhou et al. [18], which employs Bidirectional LSTM as well as Two-dimensional
Max Pooling for the purpose of text classification.</p>
      <p>
        The main challenge is to extract various event information from news articles
across multiple countries around the globe. The events considered mainly focus
on politics and social movements across the globe collected from Indian and
Chinese news articles written in English. Neural Networks can be used for addressing
these kinds of problems, but the ability of RNNs to outperform traditional
models in applications such as Discriminative Keywords Spotting, evidenced by the
works of S Fernandez et al. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], favours the use of the latter. RNNs use the most
recent information to perform the present task. Classifying news articles,
however, requires long term dependencies and the vulnerablity of RNNs to hold only
the most recent information is overcome by the use of LSTM. As seen by the
successful employment of LSTM for Statistical Machine Translation in the
paper authored by Kyunghyun Cho et al. [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], they are a special category of RNNs
designed specifically to solve the long-term dependency problem.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Literature Survey</title>
      <p>This section serves to analyse the wide array of published literature and helps
in getting an insight into the various models adopted to tackle the problem at
hand.</p>
      <p>
        Research works [
        <xref ref-type="bibr" rid="ref12 ref15 ref17 ref5">17, 12, 15, 5</xref>
        ] present various machine learning approaches for
detecting violence from given textual data. These vary from rule mining [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] to
sub-graph pattern mining [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
      </p>
      <p>
        Sudha Subramani et al. [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], although focusing on detection of domestic violence,
view the problem as one of binary classification much similar to the approach
used in this paper. Other studies [
        <xref ref-type="bibr" rid="ref10 ref7">7, 10</xref>
        ] bring to light different deep learning
approaches for the classification of textual data. Madisetty Sreekanth and Desarkar
Maunendra Sankar [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] in particular, employ a Convolutional Neural
NetworkLSTM, which has maximum correlation with the model adopted at present.
Mazhar Iqbal Rana et al. [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] provide a comparison of various classifiers in
context of short text aiding in sound judgement of baseline establishment.
Big Data Analytics and Probabilistic methods [
        <xref ref-type="bibr" rid="ref11 ref3">3, 11</xref>
        ] can also be used as
alternatives to those mentioned above.
      </p>
      <p>
        Even though many papers [
        <xref ref-type="bibr" rid="ref10 ref11 ref14">14, 10, 11</xref>
        ] concentrate on data obtained from various
social media forums, the concept can be migrated to news articles while taking
into consideration the greater length and diversity of news instances. The four
models listed in section 4 have established their efficacy through various works
published [
        <xref ref-type="bibr" rid="ref1 ref16 ref8 ref9">8, 16, 1, 9</xref>
        ], differing from one another along the attention mechanism
used. These in their basic form consist of two components, an encoder which
computes the representation of each sentence and a decoder which decomposes
the conditional probability.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Proposed Methodology</title>
      <p>This model classifies news documents as protest and non-protest news,
eventtrigger or not event-trigger and it extracts various information from a given
sentence such as location, time and participants of an event. To meet the
objectives, the following are done
– Gather news articles
– Preprocessing of news articles
– Grouping and Indexing of news articles
– Feature selection from news articles
– Labelling the news with the help of the model</p>
      <p>Text pre-processing is the initial and important step in news article
classification process. pre-processing step makes sure that the learning model receives
only the data that are considered useful and the noisy data is removed from
the text. The data comes from various sources and ought to be cleaned before
it is fed into the model. The noisy data or useless information which includes
punctuation marks, non-alpha numeric characters etc. are first removed from the
text with the use of regular expressions. A dictionary of unique words is created,
and these unique words help in embedding the input sequence to the model to
do the classification.</p>
      <p>The objects of the training file are separated from one another by using
‘newline’ as the delimiter. A multi-layer RNN with LSTM as a recurrent unit
are used to build a deep neural network model for finding the classified labels.
Several layers are used to build the deep neural network namely, embedding layer,
encoding-decoding layers, projection layer and loss layer. The weight vectors are
learnt from the input sentences and label input based on their vocabulary using
the embedding layer. 2-layered bi-directional LSTM is used as hidden layers to
perform the encoding and decoding using the embeddings of input sentences or
paragraphs. This is shown in Fig 1.
4</p>
    </sec>
    <sec id="sec-4">
      <title>Implementation</title>
      <p>The current methodology adopted for the TASK1 and TASK2 of CLEF 2019
Lab ProtestNews is implemented using Tensorflow. The data provided, belonging
to 4 unique sets namely Development, Training, Testing and Testing_China is
presented in Table 1.</p>
      <p>
        A total of 4 models [
        <xref ref-type="bibr" rid="ref1 ref16 ref8 ref9">8, 16, 1, 9</xref>
        ] have been implemented by using the deep
learning approach mentioned in section 3. The 4 models implemented all belong
to seq2seq class of algorithms and vary from one another along the attention
mechanism used
– Model1- 2 Layered, bi-directional LSTM, with Normed-Bahdanau attention
– Model2- 2 Layered, bi-directional LSTM, with Scaled-Luong attention
– Model3- 2 Layered, bi-directional LSTM, with Bahdanau attention
– Model4- 2 Layered, bi-directional LSTM, with Luong attention
5
      </p>
    </sec>
    <sec id="sec-5">
      <title>Results</title>
      <p>A total of 4 models were submitted and were evaluated by the CLEF 2019 Lab
ProtestNews Evaluation engine. The test data provided was classified into two
sets, the first belonging to news articles from India and the latter containing
articles from China, labelled Set 1 for China-Task1, Set 2 for China-Task2, Set
3 for India-Task1 and Set 4 for India-Task2. The Table 2 shows the various F1
macro scores obtained by the models in the final evaluation stage.</p>
      <p>Average</p>
      <p>Clearly Model 3 for which the 2 Layered, bi-directional LSTM, with
Bahdanau attention was adopted produced the best results of the lot with a F1
macro score of 0.3682.
6</p>
    </sec>
    <sec id="sec-6">
      <title>Perspectives for future work</title>
      <p>From Table 2 given under results, undoubtedly Model3 outperforms its peers for
the test data given under Task2. Thus, with the scope of the current study under
consideration, adopting the input structure of the training data of Task2 (i.e.
sentence wise rather than Document wise) and administering the same in the
implementation phase of Task1 may provide better results, thus increasing the
overall accuracy. However, there may be two approaches that must be juxtaposed
for the post processing of predictions outputted by the model. These are as given
below
– At-least-one approach: If any of the sentences belonging to a
paragraph/news-article is classified as class 1 (I.e. classified under ‘protest’)
then the whole paragraph/news-article can be classified as class 1.
– Vote-based approach: Each of the sentences can be considered to voting for
either class 1 or class 0 when classified. Finally, the whole
paragraph/newsarticle can be classified based on which class obtained the maximum votes.
7</p>
    </sec>
    <sec id="sec-7">
      <title>Conclusion</title>
      <p>We have developed deep learning models for information extraction and text
classification using data from one country and tested them on data from different
countries. RNN-LSTM models were used to classify documents and sentences to
the labels ‘protest’/’non-protest’ and ‘event-trigger’/’not-event-trigger’
respectively. The 4 models implemented differed along the attention mechanism used.
The various F1 macro scores obtained were 0.0481, 0.3290, 0.3682 and 0.2064
respectively. The performance may be further improved by the effective splitting of
Document data at the pre-processing stage and applying appropriate integration
logic of the output at the post-processing stage.
18. Zhou, P., Qi, Z., Zheng, S., Xu, J., Bao, H., Xu, B.: Text classification improved by
integrating bidirectional lstm with two-dimensional max pooling. arXiv preprint
arXiv:1611.06639 (2016)</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Bahdanau</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cho</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bengio</surname>
            ,
            <given-names>Y.:</given-names>
          </string-name>
          <article-title>Neural machine translation by jointly learning to align and translate</article-title>
          .
          <source>arXiv preprint arXiv:1409.0473</source>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Cho</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Van Merriënboer</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gulcehre</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bahdanau</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bougares</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schwenk</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bengio</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Learning phrase representations using rnn encoder-decoder for statistical machine translation</article-title>
          .
          <source>arXiv preprint arXiv:1406.1078</source>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Doyle</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Katz</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Summers</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ackermann</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zavorin</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lim</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Muthiah</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Butler</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Self</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhao</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          , et al.:
          <article-title>Forecasting significant societal events using the embers streaming predictive analytics system</article-title>
          .
          <source>Big Data</source>
          <volume>2</volume>
          (
          <issue>4</issue>
          ),
          <fpage>185</fpage>
          -
          <lpage>195</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Fernández</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Graves</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schmidhuber</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>An application of recurrent neural networks to discriminative keyword spotting</article-title>
          .
          <source>In: International Conference on Artificial Neural Networks</source>
          . pp.
          <fpage>220</fpage>
          -
          <lpage>229</lpage>
          . Springer (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Hammer</surname>
            ,
            <given-names>H.L.</given-names>
          </string-name>
          :
          <article-title>Detecting threats of violence in online discussions using bigrams of important words pp</article-title>
          .
          <fpage>319</fpage>
          -
          <lpage>319</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Hürriyetoğlu</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yörük</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yüret</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          , Yoltar, Ç.,
          <string-name>
            <surname>Gürel</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Duruşan</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mutlu</surname>
            ,
            <given-names>O.:</given-names>
          </string-name>
          <article-title>A task set proposal for automatic protest information collection across multiple countries</article-title>
          .
          <source>In: European Conference on Information Retrieval</source>
          . pp.
          <fpage>316</fpage>
          -
          <lpage>323</lpage>
          . Springer (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Kowsari</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brown</surname>
          </string-name>
          , D.E.,
          <string-name>
            <surname>Heidarysafa</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Meimandi</surname>
            ,
            <given-names>K.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gerber</surname>
            ,
            <given-names>M.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barnes</surname>
            ,
            <given-names>L.E.</given-names>
          </string-name>
          : Hdltex:
          <article-title>Hierarchical deep learning for text classification</article-title>
          .
          <source>In: 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA)</source>
          . pp.
          <fpage>364</fpage>
          -
          <lpage>371</lpage>
          . IEEE (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Luong</surname>
            ,
            <given-names>M.T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pham</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Manning</surname>
          </string-name>
          , C.D.:
          <article-title>Effective approaches to attention-based neural machine translation</article-title>
          .
          <source>arXiv preprint arXiv:1508.04025</source>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Luong</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brevdo</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhao</surname>
            ,
            <given-names>R.:</given-names>
          </string-name>
          <article-title>Neural machine translation (seq2seq) tutorial</article-title>
          .
          <year>2017</year>
          . URL: https://www. tensorflow.
          <source>org/tutorials/seq2seq (17.02</source>
          .
          <year>2018</year>
          ) (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Madisetty</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Desarkar</surname>
            ,
            <given-names>M.S.:</given-names>
          </string-name>
          <article-title>Aggression detection in social media using deep neural networks</article-title>
          .
          <source>In: Proceedings of the First Workshop on Trolling, Aggression and Cyberbullying (TRAC-2018)</source>
          . pp.
          <fpage>120</fpage>
          -
          <lpage>127</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Muthiah</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Huang</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Arredondo</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mares</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Getoor</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Katz</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ramakrishnan</surname>
          </string-name>
          , N.:
          <article-title>Planned protest modeling in news and social media</article-title>
          .
          <source>In: Twenty-Seventh IAAI Conference</source>
          . pp.
          <fpage>3920</fpage>
          -
          <lpage>3927</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Qiao</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          :
          <article-title>Computational approach to detecting and predicting occupy protest events</article-title>
          . In: 2015 International Conference on Identification, Information, and
          <article-title>Knowledge in the Internet of Things (IIKI)</article-title>
          . pp.
          <fpage>94</fpage>
          -
          <lpage>97</lpage>
          . IEEE (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Rana</surname>
            ,
            <given-names>M.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khalid</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Akbar</surname>
          </string-name>
          , M.U.:
          <article-title>News classification based on their headlines: A review</article-title>
          .
          <source>In: 17th IEEE International Multi Topic Conference</source>
          <year>2014</year>
          . pp.
          <fpage>211</fpage>
          -
          <lpage>216</lpage>
          . IEEE (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Ranganath</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Morstatter</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hu</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tang</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , Liu, H.:
          <article-title>Predicting online protest participation of social media users</article-title>
          .
          <source>In: Thirtieth AAAI Conference on Artificial Intelligence</source>
          . pp.
          <fpage>208</fpage>
          -
          <lpage>214</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Sudha</surname>
            <given-names>Subramani</given-names>
          </string-name>
          , Huy Quan Vu,
          <string-name>
            <surname>H.W.</surname>
          </string-name>
          :
          <article-title>Intent classification using feature sets for domestic violence discourse on social media pp</article-title>
          .
          <fpage>129</fpage>
          -
          <lpage>136</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Sutskever</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vinyals</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Le</surname>
            ,
            <given-names>Q.V.</given-names>
          </string-name>
          :
          <article-title>Sequence to sequence learning with neural networks</article-title>
          .
          <source>In: Advances in neural information processing systems</source>
          . pp.
          <fpage>3104</fpage>
          -
          <lpage>3112</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Wueest</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rothenhäusler</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hutter</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>Using computational linguistics to enhance protest event analysis pp</article-title>
          .
          <fpage>1</fpage>
          -
          <lpage>27</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>