A Comprehensive Review on Gujarati-Text Summarization Through Different Features
DOI:
https://doi.org/10.32628/CSEIT2361051Keywords:
Gujarati-Text Summarization, Linguistic Features, Semantic Analysis, Syntactic Elements, Natural Language Processing, Machine Learning.Abstract
This comprehensive review delves into the intricacies of Gujarati-text summarization, exploring diverse features employed in the process. With a focus on the nuances of the Gujarati language, the paper investigates various techniques and methodologies applied to extract essential information from textual content. The review systematically examines the effectiveness of distinct features such as linguistic, semantic, and syntactic elements in the context of Gujarati summarization. Additionally, the study provides insights into the challenges specific to Gujarati-language summarization and discusses advancements in natural language processing and machine learning that contribute to the refinement of summarization models. This thorough examination serves as a valuable resource for researchers, practitioners, and enthusiasts seeking a deeper understanding of the complexities and advancements in Gujarati-text summarization.
References
- J. Bhayo, S. A. Shah, S. Hameed, A. Ahmed, J. Nasir, and D. Draheim, “Towards a machine learning-based framework for DDOS attack detection in software-defined IoT (SD-IoT) networks,” Engineering Applications of Artificial Intelligence, vol. 123, no. July 2022, p. 106432, 2023, doi: 10.1016/j.engappai.2023.106432.
- F. S. de Lima Filho, F. A. F. Silveira, A. de Medeiros Brito Junior, G. Vargas-Solar, and L. F. Silveira, “Smart detection: An online approach for DoS/DDoS attack detection using machine learning,” Secur. Commun. Netw., vol. 2019, pp. 1–15, 2019.
- S. U. Jan, S. Ahmed, V. Shakhov, and I. Koo, “Toward a lightweight intrusion detection system for the internet of things,” IEEE Access, vol. 7, pp. 42450–42471, undefined 2019.
- Y. Otoum and A. Nayak, “AS-IDS: Anomaly and signature-based IDS for the internet of things,” J. Netw. Syst. Manag., vol. 29, no. 3, 2021.
- R. Zagrouba and R. AlHajri, “Machine Learning based attacks detection and countermeasures in IoT,” International j. commun. netw. inf. secur., vol. 13, no. 2, 2021.
- B. K. Mohanta, D. Jena, U. Satapathy, and S. Patnaik, “Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology,” Internet of things, vol. 11, no. 100227, p. 100227, 2020.
- S. Pokhrel, R. Abbas, and B. Aryal, “IoT Security: Botnet detection in IoT using Machine learning,” arXiv [cs.LG], 2021.
- E. Anthi, L. Williams, M. Slowinska, G. Theodorakopoulos, and P. Burnap, “A supervised intrusion detection system for smart home IoT devices,” IEEE Internet Things J., vol. 6, no. 5, pp. 9042–9053, 2019.
- M. Essaid, D. Kim, S. H. Maeng, S. Park, and H. T. Ju, “A collaborative DDoS mitigation solution based on ethereum smart contract and RNN-LSTM,” in 2019 20th Asia-Pacific Network Operations and Management Symposium (APNOMS), 2019, pp. 1–6.
- U. Javaid, A. K. Siang, M. N. Aman, and B. Sikdar, “Mitigating loT Device based DDoS Attacks using Blockchain,” in Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, 2018.
- R. Singh, S. Tanwar, and T. P. Sharma, “Utilization of blockchain for mitigating the distributed denial of service attacks,” Secur. Priv., vol. 3, no. 3, 2020.
- K. Bhardwaj, J. C. Miranda, and A. Gavrilovska, “Towards IoT-DDoS prevention using edge computing,” Usenix.org. [Online]. Available: https://www.usenix.org/system/files/conference/hotedge18/hotedge18-papers-bhardwaj.pdf.
- P. Kumar, R. Kumar, G. P. Gupta, and R. Tripathi, “A Distributed framework for detecting DDoS attacks in smart contract‐based Blockchain‐IoT Systems by leveraging Fog computing,” Trans. emerg. telecommun. technol., vol. 32, no. 6, 2021.
- N.-N. Dao et al., “Securing heterogeneous IoT with intelligent DDoS attack behavior learning,” IEEE Syst. J., pp. 1–10, undefined 2021.
- V. Adat and B. B. Gupta, “A DDoS attack mitigation framework for internet of things,” in 2017 International Conference on Communication and Signal Processing (ICCSP), 2017, pp. 2036–2041.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.