A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Image Classification through Text Mining techniques: a Proposal
2014
Research in Computing Science
For this, a popular NLP technique is used to improve the BoVW; the Bag-of-Visual n-grams (BoVN). ...
Image classification is an important task for the organization and analysis of visual information. ...
The BoVW is somehow inspired by the Bag-of-Words (BoW) representation of text mining (see e.g., [16] ). ...
doi:10.13053/rcs-71-1-7
fatcat:s757hu5tozcrlidkiakl3sws54
A Proposed Arabic Text and Text Image Classification Technique Using a URL Address
2019
Journal of Southwest Jiaotong University
These two algorithms form a hybrid system that supports our needs, especially in this day of technological advances and frequent use of websites and sharing of text images through the internet. ...
In this study, the optical character recognition (OCR) algorithm was used, which is considered as a classification procedure of visual patterns that appear in the form of a digital image. ...
, and text typed on a document or text image. ...
doi:10.35741/issn.0258-2724.54.5.41
fatcat:zgq3gxlnwbac3mu4h4zmzk5wi4
A Smart Model for Web Phishing Detection Based on New Proposed Feature Selection Technique
2021
Menoufia Journal of Electronic Engineering Research
It consists of three phases, the first phase uses a new proposed method for evaluating and ranking the features of URL, HTML and JavaScript code, text, images and domain name of the web page. ...
Hackers use a lot of tricks through the internet, which make users to share data, download files or open links that attack a computer. ...
A new approach dependent on fuzzy logic integrated with a data-mining system was developed to detect the spoofed web pages of the E-banking systems, it implemented six models to select text features of ...
doi:10.21608/mjeer.2021.146286
fatcat:htppaf75vzcinjqxxmr5v4z2ry
A Smart Model for Web Phishing Detection Based on New Proposed Feature Selection Technique
2020
Menoufia Journal of Electronic Engineering Research
It consists of three phases, the first phase uses a new proposed method for evaluating and ranking the features of URL, HTML and JavaScript code, text, images and domain name of the web page. ...
Hackers use a lot of tricks through the internet, which make users to share data, download files or open links that attack a computer. ...
It consists of three phases, the first phase uses a new proposed method for evaluating and ranking the features of URL, HTML and JavaScript code, text, images and the web page domain name. ...
doi:10.21608/mjeer.2020.32404.1021
fatcat:tfk6wwd2zzhkpjqwdayexc5q4e
A Proposed Methodology on Predicting Visitor's Behavior based on Web Mining Technique
2018
International Journal of Advanced Computer Science and Applications
In this paper, we proposed a methodology on predicting users behavior based on the web mining technique by creating and executing analysis applications using a Deep Log Analyzer tool that applied on the ...
technique. ...
In this paper, we proposed a methodology on predicting user behavior based on the web mining technique. ...
doi:10.14569/ijacsa.2018.091236
fatcat:s4eybiyi5fgqxca55teqx6rtm4
A Proposed Model for Detecting Facebook News' Credibility
2019
International Journal of Advanced Computer Science and Applications
The proposed model focuses on applying an intelligent sentiment analysis using Vector Space Model (VSM) which is one of the most successful techniques on the users' comments and reactions through the emoji ...
Therefore, it is a fact that measuring the News' credibility is one of the important tasks that could control the propagation of the fake news as well as the number of News' followers. ...
Considering applying mining techniques in different fields to support text analysis as well as emotion analysis has been proposed by different research such as in [4] [5] [6] and in [7] . ...
doi:10.14569/ijacsa.2019.0100743
fatcat:2srean5ipjbxxexkeffofxnlnq
A proposed Novel Approach for Sentiment Analysis and Opinion Mining
2014
International Journal of UbiComp
We are proposing a Nobel approach for analyzing the Review for the customer opinion. ...
In order to solve this problem, a lot of research is being carried out in Opinion Mining. In order to solve this problem, a lot of research is being carried out in Opinion Mining. ...
sentiments from online reviews using this technique, most researchers treated opinion mining as a text classification problem. ...
doi:10.5121/iju.2014.5201
fatcat:236qgo4fqzgt3cngcalchrflsy
A Proposed Hybrid Feature Selection Method for Data Mining Tasks
2019
International Journal of Science and Applied Information Technology
Hence, this technique can improve several data mining techniques by increasing its performance and reduce its computational time. ...
Feature selection technique is one of the important data pre-processing steps in data mining; it is used to find the important features subset in order to create a new subset of informative features. ...
FS techniques are applied several applications such as image processing [24] , signal processing [7] , pattern recognition [26] , data mining [7] , and machine learning [26] . ...
doi:10.30534/ijsait/2019/218620198
fatcat:gcq6fadjnzew5iyozzlad3nkem
A Proposed Data Mining Framework for Higher Education System
2015
International Journal of Computer Applications
The proposed system helps to get sufficient results which consist of several steps in our case study starting with collected data, pre-processing, applying data mining techniques and visualization results ...
This study focuses on the way of applying data mining techniques for higher education system by using the most common techniques on most common application called Moodle system in education system. ...
HEDMS Shown in figure 5 .There are proposed system will describe and mining elearning data to apply the main DM techniques such as classification, clustering, association rule mining and visualization ...
doi:10.5120/19839-1693
fatcat:pirqntxlxvcmbbal2d6g2annia
A Proposed Method for Semantic Annotation on Social Media Images
2017
International Journal Of Engineering And Computer Science
A semantically annotated document is easy to interpret, combine and reuse by computers. In human history Web plays as the greatest information source. ...
Many researchers believe semantic annotations can be inserted in web-based documents for information extraction and knowledge mining. These annotations use terms defined in an ontology. ...
Automatic image annotation is a process of automatically assigning a text description (reduced to a set of semantic keywords) to a digital image through a computational model. ...
doi:10.18535/ijecs/v6i6.31
fatcat:pifx6v52lbcyfhgshdqq2rr6nq
Proposing a new clustering method to detect phishing websites
2017
Turkish Journal of Electrical Engineering and Computer Sciences
Then each new website is compared with the model and categorized into one of the model clusters by a probability. The analyses reveal that the proposed algorithm has high accuracy. ...
In the present study, a novel framework based on model-based clustering is introduced to fight against phishing websites. ...
Data mining techniques and clustering have been exploited to develop a new method for detecting phishing attacks against bank sites [23] . ...
doi:10.3906/elk-1612-279
fatcat:n4dq2dm7hzcitpeeknuhq7nw5i
A Proposal for Brand Analysis with Opinion Mining
[chapter]
2017
E-Business - State of the Art of ICT Based Challenges and Solutions
A Proposal for Brand Analysis with Opinion Mining http://dx. ...
We propose a system to extract information from Amazon product reviews, which focuses on a time-varying comparison among different brands in a given Amazon product department. ...
An image depicting the opinion mining stages can be found below (Figure 2 ). ...
doi:10.5772/66567
fatcat:zjx2mzrz6zhz3awkhozlza3wjy
Analysis of Bigdata Using Visualizing Technique
2016
International Journal Of Engineering And Computer Science
One of the main reason of using R is freely available and its comes with a lots of free packages and powerful tools through which we can easily analyse the large datasets in a sufficient time. ...
In this paper, we will use R packages to analyze unstructured text. ...
like Facebook, Twitter and LinkedIn.Data mining or Text mining plays a important role in decision making because through these mining techniques we can analyse the data and on the basis of result we can ...
doi:10.18535/ijecs/v5i10.53
fatcat:y2wi2vj4ivhifh4qfm4qhvfade
A new proposal for graph classification using frequent geometric subgraphs
2013
Data & Knowledge Engineering
Geometric graph mining has bees identified as a need in many applications. This technique detect patterns with some tolerance under a geometric transformation. ...
The experimentation on these collections shows that our proposal gets better results than graph-based image classification using non-geometric graph miners. ...
As example of this, in literature we can find classification of images [1, 8, 29, 30, 20] , texts [21] and chemical compounds [6, 18] . ...
doi:10.1016/j.datak.2013.04.001
fatcat:jjt7zzcvzzdk7et3l4scnsbdka
Study on Web Content Extraction Techniques
2019
Zenodo
Web Content mining refers to the discovery of useful information from web content such as text, images videos etc. ...
Web mining is a vivid research area closely related to Information Extraction IE . ...
The paper [9] proposed a semi-supervised web news extraction technique that uses unsupervised clustering technique and supervised classification technique. ...
doi:10.5281/zenodo.3591250
fatcat:2chw3ozbzndfhn7pfd7b5qyk3q
« Previous
Showing results 1 — 15 out of 50,396 results