Search Results - (( java implementation using algorithm ) OR ( using tweet data algorithm ))
Search alternatives:
- implementation using »
- java implementation »
- using algorithm »
- data algorithm »
- using tweet »
- tweet data »
-
1
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Extracting Tweets Using R in The Context of Ethical Issues
Published 2021“…The simple algorithm is capable to facilitating the process of extracting data from Twitter, such that it easily known to the public tweets that exist in a given time period and this can be used as reference material for further development process. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Analysis of Sentiment Based on Opinions from the 2019 Presidential Election
Published 2024“…The Naive Bayes Classifier algorithm was employed to classify the tweet data. …”
Get full text
Get full text
Get full text
Article -
5
Sentiment Analysis of Sexual Harassment in Malaysia on Twitter Using Machine Learning Algorithms
Published 2023“…Hence, in this report, tweets regarding sexual harassment in Malaysia are extracted using a list of keywords by semi�autonomous data annotation to get the correct labelling of the data. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
6
Sentiment Analysis of Sexual Harassment in Malaysia on Twitter Using Machine Learning Algorithms
Published 2023Get full text
Get full text
Final Year Project Report / IMRAD -
7
Depression prediction system from Twitter’s tweet by using sentiment analysis / Nur Amalina Kamaruddin
Published 2020“…The classification model was built using Naïve Bayes algorithm. The number of data used in this project is 15952 with 1 independent variable and 1 dependent variables. …”
Get full text
Get full text
Thesis -
8
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
9
Robust tweets classification using arithmetic optimization with deep learning for sustainable urban living
Published 2024“…The goal of the AOADL-TC technique is to identify and discriminate different kinds of sentiments that exist in the tweet data. At the initial stage, the AOADL-TC model pre-processes tweet data to convert uniform data into a useful format. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Recognize Hate Speech On Twitter Using Machine Learning
Published 2024Get full text
Get full text
Get full text
Get full text
Article -
11
PREDICTION OF HFMD DISEASE OUTBREAK FROM TWITTER
Published 2019“…On the other hand, Naive Bayes and SVM algorithm is using in classification of the tweets related with HFMD disease. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
12
Predicting the popularity of tweets using the theory of point processes.
Published 2019“…We propose several prediction methodologies using the theory of point processes, where the prediction of the future popularity of a tweet is based on observing the retweet time sequence up to a certain censoring time, and the prediction performance is evaluated on a large Twitter data set. …”
Get full text
Get full text
UMK Etheses -
13
Fake news detection: A machine learning approach
Published 2021“…The data collected for the creation of the dataset is obtained in the form of tweets using a Twitter API. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Sentiment analysis of domestic violence prediction using Naive Bayes algorithm / Nurulizzah Mohd Rahiman
Published 2024“…The scope involves using English language tweets collected from March 2021 to November 2023, limiting the data to the topic of domestic violence. …”
Get full text
Get full text
Thesis -
15
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
16
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
17
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
18
A novel framework for identifying twitter spam data using machine learning algorithms
Published 2020“…This study introduces a novel framework for identifying Twitter spam data based on machine learning algorithms. By initializing data pre-processing for clean-up, noise removal, and unpredictable unfinished data, reducing the number of features in the tweet dataset using mutual information is the study's methods. …”
Get full text
Get full text
Get full text
Article -
19
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
20
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book
