Method for detecting suspicious individuals in a friend list
A Rostampour, NBS Kindler, RD Fradin… - US Patent …, 2014 - Google Patents
US8725672B2 - Method for detecting suspicious individuals in a friend list - Google Patents
US8725672B2 - Method for detecting suspicious individuals in a friend list - Google Patents …
US8725672B2 - Method for detecting suspicious individuals in a friend list - Google Patents …
[PDF][PDF] Evaluation of topic identification methods on Arabic corpora.
Topic Identification is one of the important keys for the success of many applications. Indeed,
there are few works in this field concerning Arabic language because of lack of standard …
there are few works in this field concerning Arabic language because of lack of standard …
[PDF][PDF] Log-based chat room monitoring using text categorization: A comparative study
E Elnahrawy - The International Conference on Information and …, 2002 - Citeseer
The Internet has been utilized in several real life aspects such as online searching, distance
learning, and chatting. On the other hand, the Internet has been misused in communication …
learning, and chatting. On the other hand, the Internet has been misused in communication …
The influence of the benchmark corpus on keyword analysis
The growing popularity of keyword analysis as an applied linguistics methodology has not
been matched by an increase in the rigour with which the method is applied. While several …
been matched by an increase in the rigour with which the method is applied. While several …
Topic modelling: A comparison of the performance of latent Dirichlet allocation and LDA2vec model on Bangla newspaper
M Hasan, MM Hossain, A Ahmed… - … Conference on Bangla …, 2019 - ieeexplore.ieee.org
Topic modeling is a statistical data mining method for organizing the documents with
variable contents under similar topics. It is utilized to reveal the concealed topics from an …
variable contents under similar topics. It is utilized to reveal the concealed topics from an …
Automatic detection of undesirable users of an online communication resource based on content analytics
GN Ramaswamy, I Zitouni - US Patent 8,412,645, 2013 - Google Patents
An exemplary processor-implemented method of deter mining whether a user of an online
communication resource is an undesirable user includes the steps of building at least one …
communication resource is an undesirable user includes the steps of building at least one …
The SMarT classifier for Arabic fine-grained dialect identification
This paper describes the approach adopted by the SMarT research group to build a dialect
identification system in the framework of the Madar shared task on Arabic fine-grained …
identification system in the framework of the Madar shared task on Arabic fine-grained …
Boosting and combination of classifiers for natural language call routing systems
In this paper, we present different techniques to improve natural language call routing. We
first describe methods to improve a single classifier: boosting, discriminative training (DT) …
first describe methods to improve a single classifier: boosting, discriminative training (DT) …
Mining social network for semantic advertisement
Networked computers are expanding more and more around the world, and digital social
networks becoming of great importance for many people's work and leisure. Emails …
networks becoming of great importance for many people's work and leisure. Emails …
A natural-language-processing-based procedure for generating distractors for multiple-choice questions
One of the most challenging aspects of writing multiple-choice test questions is identifying
plausible incorrect response options—ie, distractors. To help with this task, a procedure is …
plausible incorrect response options—ie, distractors. To help with this task, a procedure is …