Christopher Ifeanyi Eke

Christopher Ifeanyi Eke
University of Malaya | UM · Department of Computer System & Technology

About

28
Publications
21,729
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
397
Citations

Publications

Publications (28)
Article
Full-text available
Technological developments over the past few decades have changed the way people communicate, with platforms like social media and blogs becoming vital channels for international conversation. Even though hate speech is vigorously suppressed on social media, it is still a concern that needs to be constantly recognized and observed. The Arabic langu...
Article
Full-text available
Disaster-based tweets during an emergency consist of a variety of information on people who have been hurt or killed, people who are lost or discovered, infrastructure and utilities destroyed; this information can assist governmental and humanitarian organizations in prioritizing their aid and rescue efforts. It is crucial to build a model that can...
Article
Full-text available
The automatic speech identification in Arabic tweets has generated substantial attention among academics in the fields of text mining and natural language processing (NLP). The quantity of studies done on this subject has experienced significant growth. This study aims to provide an overview of this field by conducting a systematic review of litera...
Article
Full-text available
This study provides a systematic review of technology-assisted language learning. This study provides a summary content of the reviewed articles in the aspects of technology usage, language, and learning skills, and the benefits offered by technology in language learning. The study focused on the published articles between 2012 and 2022. Out of 571...
Preprint
Full-text available
In the field of disaster crisis management, the utilization of social media platforms has gained significant recognition. It helps in disseminating and gathering information during disasters, offering real-time updates on events, infrastructure damage reports, and casualty information. However, the information comes with a substantial amount of irr...
Article
Solar tracking systems have gained attention in recent years due to their potential to increase the efficiency of various solar energy applications. Both traditional machine learning (ML) and deep learning (DL) techniques have been employed in various solar tracking systems. However, traditional ML models have limitations in processing large datase...
Preprint
Full-text available
Although photovoltaic (PV) panels are extensively used to convert solar energy into electric energy, the continuous change in the sun's angle with reference to the earth's surface limits their capacity to collect sufficient energy. To improve efficiency, solar trackers are used to constantly adjust the PV panels towards the sun to maximize energy c...
Article
Full-text available
Bring your own device (BYOD) paradigm that permits employees to come with their own mobile devices to join the organizational network is rapidly changing the organizational operation method by enhancing flexibility, productivity, and efficiency. Despite these benefits, security issues remain a concern in organizational settings. A considerable numb...
Article
Sarcasm is one of the nonliteral languages usually employed in social networks and microblogging websites to convey implicit information in an individual communication message. This could lead to the misclassification of tweets. This paper focuses on sarcasm detection on tweets, which has been experimented with the use of textual features. The text...
Preprint
Full-text available
Bring your own device (BYOD) paradigm that permits employees to come with their own mobile devices to join the organizational network is rapidly changing the organizational operation method by enhancing flexibility, productivity, and efficiency. Despite these benefits, security issues remain a concern in organizational settings. A considerable numb...
Article
Full-text available
Adult learner performance has become a significant challenge in education. Adult learners are identified as being of productive age in engaging with multiple commitments, including studying. The multiple engagements make managing their time and focus difficult, contributing to a high institutional dropout rate. This situation has reduced the number...
Article
Full-text available
Sarcasm is the main reason behind the faulty classification of tweets. It brings a challenge in natural language processing (NLP) as it hampers the method of finding people’s actual sentiment. Various feature engineering techniques are being investigated for the automatic detection of sarcasm. However, most related techniques have always concentrat...
Article
Full-text available
Sarcasm is a complicated linguistic term commonly found in e-commerce and social media sites. Failure to identify sarcastic utterances in Natural Language Processing applications such as sentiment analysis and opinion mining will confuse classification algorithms and generate false results. Several studies on sarcasm detection have utilised differe...
Article
Full-text available
The Internet of Things (IoT) expects to improve human lives with the rapid development of resource-constrained devices and with the increased connectivity of physical embedded devices that make use of current Internet infrastructure to communicate. The major challenging in such an interconnected world of resource-constrained devices and sensors are...
Article
Full-text available
Sarcasm is a form of sentiment whereby people express the implicit information, usually the opposite of the message content in order to hurt someone emotionally or criticise something in a humorous way. Sarcasm identification in textual data, being one of the hardest challenges in natural language processing (NLP), has recently become an interestin...
Article
Full-text available
This systematic mapping literature aims to identify current research and directions for future studies in terms of combating cyber propaganda in the social media, which is used by both human effort and technological approaches (socio-technical) for mitigation. Out of 5176 retrieved articles, only 98 of them were selected for primary studies; classi...
Article
Full-text available
Advancements in information and communication technology, and online web users have given attention to the virtual representation of each user, which is crucial for effective service personalization. Meeting users need and preferences is an ongoing challenge in service personalization. This issue can be addressed through the building of a comprehen...
Article
Full-text available
Requirements analysis is the first technical step in the system engineering process. In most cases, it should capture what the users and the developers require. A survey is essential to ensure that the developer and the user have the same perception of the system. Global communications network Access techniques provide ubiquitous network access to...
Article
In recent years, the internet has become a very strong communication source around the globe more than ever before, businesses, financial institutions, the aviation sector, the healthcare sector, education sector and lots more rely on the internet as their backbone for functioning effectively and efficiently as we now live in what is referred to as...
Article
Full-text available
In this paper, the use of Java RMI on mobile devices for peer-to-peer computing is presented. An overview of the commonly used distributed middleware systems are described by looking into remote procedure call (RPC) and object oriented middleware java remote method invocation (Java RMI). The differences between this middleware are equally detailed...

Questions

Question (1)
Question
Where can I find a sarcastic data set?

Network

Cited By