<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Detecting disinformation through computational argumentation techniques and large language models</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Ana Gutiérrez</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Stella Heras</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Javier Palanca</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Universitat Politècnica de València (UPV)</institution>
          ,
          <addr-line>46022 Valencia</addr-line>
          ,
          <country country="ES">Spain</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Valencian Research Institute for Artificial Intelligence (VRAIN), Universitat Politècnica de València (UPV)</institution>
          ,
          <addr-line>46022 Valencia</addr-line>
          ,
          <country country="ES">Spain</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Nowadays, the spread of disinformation poses a major challenge for society. Citizens find themselves immersed in a complex and data-saturated digital context that hinders their ability to critically discern between truthful information and disinformation. The task is complex because disinformation often appears in the form of rhetorical manipulations, logical fallacies, or distortions of the truth. This project aims to develop a system for detecting disinformation based on computational argumentation techniques and large language models, which promotes critical thinking and media literacy in society. The implemented web tool analyzes the patterns of human reasoning used in argumentation, classifying arguments into argumentation schemes defined by argumentation theory. After identifying the argumentation scheme, the system thoroughly examines the reasoning presented in the argument and uses a set of critical questions to question its validity. Using a large language model, enhanced with external contextualization from various information sources, the system is guided in the process of evaluating the truthfulness of the argument. The final response includes both a qualitative and quantitative justification of the level of truthfulness, providing links and references to the information sources used in the evaluation.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Computational Argumentation</kwd>
        <kwd>Large Language Models (LLM)</kwd>
        <kwd>Natural Language Processing (NLP)</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>This project presents a practical application of computational argumentation in a specific domain of
natural argumentation, such as the dissemination and exchange of information in social networks,
media, and other communication channels, where the fight against disinformation is a complex and
crucial task. In this context and recognizing that disinformation often involves logical fallacies and
rhetorical manipulation, this work investigates how Articfiial Intelligence, particularly computational
argumentation and large language models, can be leveraged to develop a system that enhances critical
thinking and media literacy.</p>
    </sec>
    <sec id="sec-2">
      <title>2. State of the art</title>
      <p>
        An extensive review of the current state of the art reveals that disinformation detection is highly complex
due to natural language’s inherent ambiguities, vagueness, enthymemes1, and dialectical variations,
which can easily lead to deception or fallacies. As a fundamental natural language processing (NLP) task,
disinformation detection involves analyzing text and speech. Before applying specialized Argument
Mining techniques, it is crucial to first address key NLP aspects such as text preprocessing, feature
extraction, and numerical representation, as discussed in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        However, the primary challenge in performing NLP tasks is preserving the order of words within
their original context, as losing this information can degrade model performance. Capturing long-term
dependencies is challenging, but sequential models like Recurrent Neural Networks (RNNs)[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] and
Transformers[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] address this issue by processing data sequentially. Among RNNs, Long Short-Term
Memory (LSTM) networks and Gated Recurrent Units (GRUs) are particularly adept at long-term
learning. Transformers, which have gained significant popularity, also excel in various NLP tasks
with encoder-based models for classification (e.g., BERT, DistilBERT, RoBERTa) [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] and decoder-based
models for generation (e.g., GPT [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]).
      </p>
      <p>Transformer-based models outperform traditional architectures like RNNs due to their attention
mechanisms, which efectively capture long-range relationships without being constrained by word
dependency length or complexity. Consequently, large language models (LLMs) based on Transformers
represent the state-of-the-art in NLP tasks for disinformation detection. However, it has been observed
that LLMs have certain limitations when applied to this area of study.</p>
      <sec id="sec-2-1">
        <title>2.1. Critical review: limitations of LLMs</title>
        <p>LLMs consist of millions of parameters, leading to high computational costs, substantial economic
investment, and a significant environmental impact due to their carbon footprint. Although techniques
like fine-tuning can refine these models, they still require powerful GPUs. Therefore, finding methods to
reduce computational expenses without sacrificing performance is essential, making prompt engineering
a promising approach.</p>
        <p>
          These architectures often have dificulty retrieving specific information if it wasn’t part of their
training data, leading to "hallucinations," where the model generates information that seems plausible
but is actually incorrect. Furthermore, it becomes evident that these models lack a logical layer. In other
words, they do not consider the underlying logic that makes a text or argument truthful; instead, they
simply detect and classify content based on its structure without paying attention to the reasoning
involved, as seen in [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. While LLMs are very adept at generating informative text, they often struggle
with extensive reasoning and may even end up contradicting themselves.
        </p>
        <p>
          As outlined in [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ], relying solely on LLMs for disinformation detection is insuficient, highlighting
the need to incorporate a logical layer into these models. The proposed solution in this project is to
introduce this logical layer by applying techniques from computational argumentation.
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Computational Argumentation</title>
        <p>
          A key concept used throughout this project is argumentation schemes [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ], as abstract patterns of human
reasoning. The system outlined in [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] has been followed, which categorizes diferent argumentation
schemes into three major groups: Source-Based Arguments, Applying Rules to Cases Arguments and
Reasoning Arguments. For example, Figure 1 illustrates the argumentation scheme for the "Argument
from Position to Know/Authority" which belongs to the Source-Based Arguments category.
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Proposed solution</title>
      <p>The disinformation detection system2 comprises two interconnected modules (Figure 2), as follows:
2Link to the implemented web tool: http://desinformacion.gti-ia.upv.es/
• Module 1: "Classifier System in Argumentation Schemes" . This module takes a sentence
(written in English) representing an argument as input and classifies it according to an
argumentation scheme from argumentation theory. This module uses RASA3, an open-source framework
for developing conversational systems.
• Module 2: "Veracity Level Generator and Evaluator System". This module receives the
output from Module 1. Based on the argumentation scheme and a set of critical questions, the
system uses a LLM with external contextualization to finally provide a qualitative justification
and a quantitative value indicating the argument’s level of truthfulness. The LLAMA4 family was
investigated, with the LLAMA 3 70B model used as the LLM for this module.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Solution design and implementation</title>
      <sec id="sec-4-1">
        <title>4.1. Module 1: Classifier System in Argumentation Schemes</title>
        <p>
          The NLAS-MULTI corpus [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ], developed by the Centre for Argument Technology at the University
of Dundee, has been utilized for this project. This dataset was modified to create a specific version in
YAML (YAML Ain’t Markup Language) format [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ], compatible with RASA. It includes 2,188 arguments
in English covering both sides of 50 topics and associated with 19 argumentation schemes. A significant
modification was adding a " no scheme" class to handle arguments that don’t fit any specific scheme,
enhancing the system’s adaptability to real-world scenarios.
        </p>
        <p>Initially, a single-layer classifier was implemented to identify the argumentation scheme of an input
sentence from 19 possible classes. However, due to sub-optimal results (discussed in section 5.1), a
two-layer classifier was adopted, as Figure 3 illustrates. This new approach, based on Walton’s theory,
divides the 19 schemes into four groups, creating four classifiers in RASA, distributed across two layers.
The first layer classifies the sentence into one of these groups, and the second layer activates the
corresponding classifier to determine the specific argumentation scheme.</p>
        <p>
          To implement these classifiers, the RASA NLU module based on intent detection was developed, with
each class representing an intent defined by multiple examples. A consistent configuration was used
across all four classifiers, including the default pipeline: the WhitespaceTokenizer [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ], the
RegexFeaturizer [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ], the LexicalSyntacticFeaturizer [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ], the CountVectorsFeaturizer [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ], the DIETClassifier [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ],
the ResponseSelector [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ] and the FallbackClassifier [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]. The dataset was split using the holdout method,
allocating 80% for training across 100 epochs and 20% for evaluation.
        </p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Module 2: Veracity Level Generator and Evaluator System</title>
        <p>In this module, the quantized LLAMA 3 model with 70 billion parameters is employed using an
onpremise deployment of the model. The process begins with the creation of a client using the OpenAI
3https://rasa.com/
4https://llama.meta.com/
Python library, enabling interaction with the model through chat completions. Prompt engineering is
utilized to craft requests in JSON format, which instructs the model on the specific tasks to be performed.</p>
        <p>As shown in Figure 3, two workflows are defined depending on the previous classification—either
an argumentation scheme or a non-schema type. If the input sentence does not correspond to any
argumentation scheme, a context search is conducted using the sentence’s inherent information. On
the contrary, if the sentence aligns with an argumentation scheme, critical questions are generated and
tailored to the content of the sentence. A parallel context search then retrieves information from three
external sources (Google, Wikipedia, and Bing) for each critical question. Finally, with the gathered
context, the model addresses the defined critical questions and synthesizes all collected information
to provide a structured evaluation of the input argument’s veracity, acting as an expert assistant in
computational argumentation.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Experimentation and results</title>
      <sec id="sec-5-1">
        <title>5.1. Module 1: Classifier System in Argumentation Schemes</title>
        <p>In Module 1, a comparison of the unilayer and bilayer architectures reveals that the two-layer model
consistently outperforms the single-layer model across all metrics, including accuracy, recall, precision,
and F1-score, achieving values between 85% and 87% (Figure 4). The primary issue with the unilayer
approach was the error introduced by the non-schema class. This is evident from the confusion matrix
(Figure 5), where a prominent column in the non-schema class area indicates a tendency of the classifier
to misclassify arguments into this category. The two-layer classifier addresses this problem efectively,
reducing the noise associated with the non-schema class and improving the precision for this class
("group0") from 20.19% to 72.22%, as shown in Figure 4.</p>
      </sec>
      <sec id="sec-5-2">
        <title>5.2. Module 2: Veracity Level Generator and Evaluator System</title>
        <p>To evaluate the performance of module 2, a survey was conducted with the answers generated by the
system for 20 examples of arguments, covering the 19 classes of argumentation schemes. Responses from
a total of 80 adults between the ages of 18 and 65 were collected and analyzed. Each respondent evaluated
three specific aspects for each example: the quantitative justification of the level of truthfulness, the
qualitative justification of the level of truthfulness, and the adequacy of the sources.</p>
        <p>Figure 6 illustrates that all aspects of the system received similarly positive ratings. In terms of overall
satisfaction (Figure 6), a significant majority (83.8%) rated the system’s responses as satisfactory with a
high degree of contentment, indicating consistent coherence across all areas.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusions and future work</title>
      <p>In conclusion, this work successfully developed a tool for detecting disinformation in societal
arguments. This research has met its objectives through the creation of a web-based tool comprising two
interconnected modules that integrate computational argumentation techniques with LLMs.</p>
      <p>Looking ahead, for scaling the system, future work could involve integrating intelligent agents.
Implementing domain-specific expert agents or agents with access to diverse information sources
could enhance the system’s final responses through the use of advanced technologies and collaborative
approaches. Additionally, the veracity of the sources used to generate context should also be studied.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A.</given-names>
            <surname>Montoro-Montarroso</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Rosso</surname>
          </string-name>
          , Á.
          <string-name>
            <surname>Panizo-Lledot</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Calvo-Figueras</surname>
            ,
            <given-names>F. J.</given-names>
          </string-name>
          <string-name>
            <surname>Cantón-Correa</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Chulvi</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Huertas-Tato</surname>
            ,
            <given-names>M. J.</given-names>
          </string-name>
          <string-name>
            <surname>Rementeria</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Gómez-Romero</surname>
          </string-name>
          ,
          <article-title>Inteligencia artificial contra la desinformación: fundamentos, avances y retos (</article-title>
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <article-title>Lstm and gru neural network performance comparison study: Taking yelp review dataset as an example</article-title>
          , in: 2020
          <source>International workshop on electronic communication and artificial intelligence (IWECAI)</source>
          , IEEE,
          <year>2020</year>
          , pp.
          <fpage>98</fpage>
          -
          <lpage>101</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A.</given-names>
            <surname>Gillioz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Casas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Mugellini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. Abou</given-names>
            <surname>Khaled</surname>
          </string-name>
          ,
          <article-title>Overview of the transformer-based models for nlp tasks</article-title>
          ,
          <source>in: 2020 15th Conference on Computer Science and Information Systems (FedCSIS)</source>
          , IEEE,
          <year>2020</year>
          , pp.
          <fpage>179</fpage>
          -
          <lpage>183</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A. F.</given-names>
            <surname>Adoma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.-M.</given-names>
            <surname>Henry</surname>
          </string-name>
          , W. Chen,
          <article-title>Comparative analyses of bert, roberta, distilbert, and xlnet for text-based emotion recognition</article-title>
          ,
          <source>in: 2020 17th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)</source>
          , IEEE,
          <year>2020</year>
          , pp.
          <fpage>117</fpage>
          -
          <lpage>121</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>G.</given-names>
            <surname>Yenduri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ramalingam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. C.</given-names>
            <surname>Selvi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Supriya</surname>
          </string-name>
          , G. Srivastava,
          <string-name>
            <given-names>P. K. R.</given-names>
            <surname>Maddikunta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. D.</given-names>
            <surname>Raj</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. H.</given-names>
            <surname>Jhaveri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Prabadevi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Wang</surname>
          </string-name>
          , et al.,
          <article-title>Gpt (generative pre-trained transformer)-a comprehensive review on enabling technologies, potential applications, emerging challenges, and future directions</article-title>
          , IEEE Access (
          <year>2024</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>P.</given-names>
            <surname>Gofredo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Espinoza</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Villata</surname>
          </string-name>
          , E. Cabrio,
          <article-title>Argument-based detection and classification of fallacies in political debates</article-title>
          ,
          <source>in: Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, Association for Computational Linguistics</source>
          ,
          <year>2023</year>
          , pp.
          <fpage>11101</fpage>
          -
          <lpage>11112</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>R.</given-names>
            <surname>Ruiz-Dolz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Lawrence</surname>
          </string-name>
          ,
          <article-title>Detecting argumentative fallacies in the wild: Problems and limitations of large language models</article-title>
          ,
          <source>in: Proceedings of the 10th Workshop on Argument Mining, Association for Computational Linguistics</source>
          ,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>D.</given-names>
            <surname>Walton</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Reed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Macagno</surname>
          </string-name>
          , Argumentation schemes, Cambridge University Press,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>R.</given-names>
            <surname>Ruiz-Dolz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Taverner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Lawrence</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Reed</surname>
          </string-name>
          ,
          <article-title>Nlas-multi: A multilingual corpus of automatically generated natural language argumentation schemes</article-title>
          ,
          <source>arXiv preprint arXiv:2402.14458</source>
          (
          <year>2024</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>O.</given-names>
            <surname>Ben-Kiki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Evans</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Ingerson</surname>
          </string-name>
          ,
          <article-title>Yaml ain't markup language (yaml™) version 1</article-title>
          .1,
          <string-name>
            <surname>Working</surname>
            <given-names>Draft</given-names>
          </string-name>
          <year>2008</year>
          5 (
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>S.</given-names>
            <surname>Vijayarani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Janani</surname>
          </string-name>
          , et al.,
          <article-title>Text mining: open source tokenization tools-an analysis</article-title>
          ,
          <source>Advanced Computational Intelligence: An International Journal (ACII) 3</source>
          (
          <year>2016</year>
          )
          <fpage>37</fpage>
          -
          <lpage>47</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>M.-H. Hwang</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Shin</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Seo</surname>
            ,
            <given-names>J.-S.</given-names>
          </string-name>
          <string-name>
            <surname>Im</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Cho</surname>
          </string-name>
          , Korasa:
          <article-title>Pipeline optimization for open-source korean natural language understanding framework based on deep learning</article-title>
          ,
          <source>Mobile Information Systems</source>
          <year>2021</year>
          (
          <year>2021</year>
          )
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>D. S.</given-names>
            <surname>Mishra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Agarwal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Swathi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. C.</given-names>
            <surname>Akshay</surname>
          </string-name>
          ,
          <article-title>Natural language query formalization to sparql for querying knowledge bases using rasa</article-title>
          ,
          <source>Progress in Artificial Intelligence</source>
          <volume>11</volume>
          (
          <year>2022</year>
          )
          <fpage>193</fpage>
          -
          <lpage>206</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>T. T.</given-names>
            <surname>Nguyen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. D.</given-names>
            <surname>Le</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. T.</given-names>
            <surname>Hoang</surname>
          </string-name>
          , T. Nguyen,
          <article-title>Neu-chatbot: Chatbot for admission of national economics university</article-title>
          ,
          <source>Computers and Education: Artificial Intelligence</source>
          <volume>2</volume>
          (
          <year>2021</year>
          )
          <fpage>100036</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>W.</given-names>
            <surname>Astuti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. P. I.</given-names>
            <surname>Putri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. P.</given-names>
            <surname>Wibawa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Salim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ghosh</surname>
          </string-name>
          , et al.,
          <article-title>Predicting frequently asked questions (faqs) on the covid-19 chatbot using the diet classifier</article-title>
          ,
          <source>in: 2021 3rd East Indonesia Conference on Computer and Information Technology (EIConCIT)</source>
          , IEEE,
          <year>2021</year>
          , pp.
          <fpage>25</fpage>
          -
          <lpage>29</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>X.</given-names>
            <surname>Kong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nichol</surname>
          </string-name>
          ,
          <article-title>Conversational AI with Rasa: Build, test, and deploy AI-powered, enterprise-grade virtual assistants and chatbots</article-title>
          ,
          <source>Packt Publishing Ltd</source>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>F. S.</given-names>
            <surname>Khan</surname>
          </string-name>
          , M. Al Mushabbir,
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Irbaz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Al</surname>
          </string-name>
          <string-name>
            <surname>Nasim</surname>
          </string-name>
          ,
          <article-title>End-to-end natural language understanding pipeline for bangla conversational agents</article-title>
          ,
          <source>in: 2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA)</source>
          , IEEE,
          <year>2021</year>
          , pp.
          <fpage>205</fpage>
          -
          <lpage>210</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>