Search Results - (( exploring consumer extraction algorithm ) OR ( java binary classification algorithm ))
Search alternatives:
- binary classification »
- extraction algorithm »
- consumer extraction »
- java »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
Get full text
Get full text
Thesis -
2
APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN
Published 2011“…In our research, extraction pattern from the first module will be fed to this algorithm and is used to make the prediction of named entity candidate category. …”
Get full text
Get full text
Thesis -
3
-
4
An efficient AdaBoost algorithm for enhancing skin cancer detection and classification
Published 2024“…These tools employ computer algorithms and deep neural networks to identify and categorize skin cancer. …”
Get full text
Get full text
Get full text
Article -
5
Understanding the sentiment on gig economy: good or bad?
Published 2022“…However, there are also safety concerns, lack of regulations, uncertainty, and unsatisfactory services, causing people to voice their opinion on social media. This paper aims to explore the sentiments of consumers concerning gig economy services (Grab, Foodpanda and Airbnb) through the analysis of social media. …”
Get full text
Get full text
Article -
6
A new mobile malware classification for SMS exploitation
Published 2024“…Mobile malware is ubiquitous in many malicious activities such as money stealing. Consumers are charged without their consent. This paper explores how mobile malware exploit the system calls via SMS. …”
Conference Paper -
7
Recommendation System Model For Decision Making in the E-Commerce Application
Published 2024thesis::doctoral thesis -
8
-
9
Car recognition using Bayes Classifier / Nur Atiqah Mat Samadi
Published 2017Get full text
Get full text
Thesis -
10
Halal authentication of alcohol in food and beverages products: a review
Published 2024“…Ease of access to information also misleads consumers into false facts on specific issues regarding halal products.…”
Get full text
Get full text
Get full text
Article -
11
Halal authentication of alcohol in food and beverages products: a review / Nur Hanisah Mohamad Ikhiwan and Nur Azira Tukiran
Published 2024“…Ease of access to information also misleads consumers into false facts on specific issues regarding halal products.…”
Get full text
Get full text
Article -
12
Multi-modality ontology semantic image retrieval with user interaction model / Mohd Suffian Sulaiman
Published 2020“…In addressing this problem, this research explores the techniques developed to combine textual description with visual features to form as multi-modality ontology. …”
Get full text
Get full text
Thesis -
13
Prediction of rice biomass using machine learning algorithms
Published 2022“…However, they are destructive, laborious, time-consuming, impractical for large fields, and subject to human error. …”
Get full text
Get full text
Thesis
