Modified frequency-based term weighting schemes for text classification
With the rapid growth of textual content on the Internet, automatic text categorization is a
comparatively more effective solution in information organization and knowledge …
comparatively more effective solution in information organization and knowledge …
Hybridized term-weighting method for dark web classification
The role of intelligence and security informatics based on statistical computations is
becoming more significant in detecting terrorism activities proactively as the extremist …
becoming more significant in detecting terrorism activities proactively as the extremist …
Application of genetic algorithm-support vector machine (GA-SVM) for damage identification of bridge
HB Liu, YB Jiao - International Journal of Computational Intelligence …, 2011 - World Scientific
A support vector machine (SVM) optimized by genetic algorithm (GA)-based damage
identification method is proposed in this paper. The best kernel parameters are obtained by …
identification method is proposed in this paper. The best kernel parameters are obtained by …
Role of discourse information in Urdu sentiment classification: A rule-based method and machine-learning technique
DM Awais, DM Shoaib - ACM Transactions on Asian and Low-Resource …, 2019 - dl.acm.org
In computational linguistics, sentiment analysis refers to the classification of opinions in a
positive class or a negative class. There exist a lot of different methods for sentiment …
positive class or a negative class. There exist a lot of different methods for sentiment …
Plagiarism detection through internet using hybrid artificial neural network and support vectors machine
Currently, most of the plagiarism detections are using similarity measurement techniques.
Basically, a pair of similar sentences describes the same idea. However, not all like that …
Basically, a pair of similar sentences describes the same idea. However, not all like that …
[PDF][PDF] Plagiarism detection using artificial intelligence technique in multiple files
M Sahu - International Journal 0f Scientific and Technology …, 2016 - academia.edu
Plagiarism relates to the act of taking information or ideas of someone else and demand it as
your own. Basically it reproduce the existing information in modified format. In every field of …
your own. Basically it reproduce the existing information in modified format. In every field of …
[HTML][HTML] Word-length algorithm for language identification of under-resourced languages
A Selamat, N Akosu - Journal of King Saud University-Computer and …, 2016 - Elsevier
Abstract Language identification is widely used in machine learning, text mining, information
retrieval, and speech processing. Available techniques for solving the problem of language …
retrieval, and speech processing. Available techniques for solving the problem of language …
[PDF][PDF] DAD: A Detailed Arabic Dataset for Online Text Recognition and Writer Identification, a New Type
SS Saloum - Journal of Computer Science, 2021 - pdfs.semanticscholar.org
This paper presents a novel Arabic dataset that considers the characteristics of the Arabic
language filling some gaps not covered by existing datasets. Conventional datasets …
language filling some gaps not covered by existing datasets. Conventional datasets …
[PDF][PDF] Web page classification using an ensemble of support vector machine classifiers
S Zhong, D Zou - Journal of Networks, 2011 - Citeseer
Web Page Classification (WPC) is both an important and challenging topic in data mining.
The knowledge of WPC can help users to obtain useable information from the huge internet …
The knowledge of WPC can help users to obtain useable information from the huge internet …
Feature based watermarking scheme for image authentication
H Liu, J Rao, X Yao - 2008 IEEE International Conference on …, 2008 - ieeexplore.ieee.org
Our previous paper [1] proposed to use Zernike moments magnitudes (ZMMs) of the image
for authentication. We demonstrated the good robustness and discriminative capability of …
for authentication. We demonstrated the good robustness and discriminative capability of …