Search Results - (( exploring consumer extraction algorithm ) OR ( java binary classification algorithm ))

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
    Get full text
    Get full text
    Thesis
  2. 2

    APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN by SARI, YUNITA SARI

    Published 2011
    “…In our research, extraction pattern from the first module will be fed to this algorithm and is used to make the prediction of named entity candidate category. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    An efficient AdaBoost algorithm for enhancing skin cancer detection and classification by Gamil, Seham, Zeng, Feng, Alrifaey, Moath, Asim, Muhammad, Ahmad, Naveed

    Published 2024
    “…These tools employ computer algorithms and deep neural networks to identify and categorize skin cancer. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Understanding the sentiment on gig economy: good or bad? by Norazmi, Fatin Aimi Naemah, Mazlan, Nur Syazwani, Said, Rusmawati, Ok Rahmat, Rahmita Wirza

    Published 2022
    “…However, there are also safety concerns, lack of regulations, uncertainty, and unsatisfactory services, causing people to voice their opinion on social media. This paper aims to explore the sentiments of consumers concerning gig economy services (Grab, Foodpanda and Airbnb) through the analysis of social media. …”
    Get full text
    Get full text
    Article
  6. 6

    A new mobile malware classification for SMS exploitation by Zaizi N.J.M., Khailani A., Madihah Mohd Saudi

    Published 2024
    “…Mobile malware is ubiquitous in many malicious activities such as money stealing. Consumers are charged without their consent. This paper explores how mobile malware exploit the system calls via SMS. …”
    Conference Paper
  7. 7
  8. 8
  9. 9
  10. 10

    Halal authentication of alcohol in food and beverages products: a review by Mohamad Ikhiwan, Nur Hanisah, Tukiran, Nur Azira

    Published 2024
    “…Ease of access to information also misleads consumers into false facts on specific issues regarding halal products.…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Halal authentication of alcohol in food and beverages products: a review / Nur Hanisah Mohamad Ikhiwan and Nur Azira Tukiran by Mohamad Ikhiwan, Nur Hanisah, Tukiran, Nur Azira

    Published 2024
    “…Ease of access to information also misleads consumers into false facts on specific issues regarding halal products.…”
    Get full text
    Get full text
    Article
  12. 12

    Multi-modality ontology semantic image retrieval with user interaction model / Mohd Suffian Sulaiman by Sulaiman, Mohd Suffian

    Published 2020
    “…In addressing this problem, this research explores the techniques developed to combine textual description with visual features to form as multi-modality ontology. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Prediction of rice biomass using machine learning algorithms by Radhwane, Derraz

    Published 2022
    “…However, they are destructive, laborious, time-consuming, impractical for large fields, and subject to human error. …”
    Get full text
    Get full text
    Thesis