Search Results - (( development communication mining algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- development communication »
- communication mining »
- implication based »
- mining algorithm »
- java implication »
-
1
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports -
2
Data mining using genetic algorithm in finance data / A. Noor Latiffah and A. B. Nordin
Published 2006“…This patterns or rules may help to develop better decision-making process. Data mining is primarily used in finance and business environment to extract knowledge from financial, retail, communication and marketing data. …”
Get full text
Get full text
Conference or Workshop Item -
3
-
4
-
5
An application of Malay short-form word conversion using levenshtein distance
Published 2020“…However, nowadays, short-form word has been widely used by many people, especially in online communication. These short-form words trigger problems in the field of data mining, especially those involving online text processing. …”
Get full text
Get full text
Get full text
Article -
6
An application of Malay short-form word conversion using Levenshtein distance / Azilawati Azizan, NurAine Saidin, Nurkhairizan Khairudin & Rohana Ismail
Published 2020“…However, nowadays, short-form word has been widely used by many people, especially in online communication. These short-form words trigger problems in the field of data mining, especially those involving online text processing. …”
Get full text
Get full text
Get full text
Article -
7
A hybrid approach to semi-supervised named entity recognition in health, safety and environment reports
Published 2009Get full text
Get full text
Conference or Workshop Item -
8
An analysis of text mining factors enhancing the identification of relevant studies
Published 2023“…The third process is the parsing that is operated by a text mining algorithm. The last part is the storage that is managed by Monitor Agent. …”
Article -
9
-
10
-
11
A simultaneous spam and phishing attack detection framework for short message service based on text mining approach
Published 2017“…This thesis addresses SMS Spam and Phishing attack detection framework development. 3 modules can be found in this framework, of which are Data Collection, Attack Profiling and Text Mining respectively. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
-
13
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
14
-
15
Extracting Tweets Using R in The Context of Ethical Issues
Published 2021Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines
Published 2020“…The ADR schemes also presented high computational time due to communication channel breakdown, latency, and susceptibility to the cyberattack since the communication channel is used for the trip command transmission and considering the high cost of communication medium. …”
Get full text
Get full text
Thesis
