A review of text corpus-based tourism big data mining

Q Li, S Li, S Zhang, J Hu, J Hu - Applied Sciences, 2019 - mdpi.com
With the massive growth of the Internet, text data has become one of the main formats of
tourism big data. As an effective expression means of tourists' opinions, text mining of such …

Research trends on distance learning: a text mining-based literature review from 2008 to 2018

F Gurcan, NE Cagiltay - Interactive Learning Environments, 2023 - Taylor & Francis
Today's dynamic distance learning environments offer a flexible, comfortable, and lifelong
learning experience, independent of space and time. In this way, it also supports and …

Intelligent question and answer system for building information modeling and artificial intelligence of things based on the bidirectional encoder representations from …

TH Lin, YH Huang, A Putranto - Automation in Construction, 2022 - Elsevier
In recent years, building information modeling and artificial intelligence of things (BIM-
AIOTs) in the construction industry have gained much attention. Construction engineers and …

Automatic classification of national health service feedback

C Haynes, MA Palomino, L Stuart, D Viira, F Hannon… - Mathematics, 2022 - mdpi.com
Text datasets come in an abundance of shapes, sizes and styles. However, determining
what factors limit classification accuracy remains a difficult task which is still the subject of …

Threatzoom: Hierarchical neural network for cves to cwes classification

E Aghaei, W Shadid, E Al-Shaer - … Conference on Security and Privacy in …, 2020 - Springer
Abstract The Common Vulnerabilities and Exposures (CVE) represent standard means for
sharing publicly known information security vulnerabilities. One or more CVEs are grouped …

Enhancing source code refactoring detection with explanations from commit messages

R Krasniqi, J Cleland-Huang - 2020 IEEE 27th International …, 2020 - ieeexplore.ieee.org
We investigate the extent to which code commit summaries provide rationales and
descriptions of code refactorings. We present a refactoring description detection tool …

Machine learning approach for the detection of hate speech in sinhala unicode text

S Samarasinghe, RGN Meegama… - … on Advances in ICT …, 2020 - ieeexplore.ieee.org
Hate speech published online platforms has become a critical issue in Sri Lanka since this
has caused conflicts between different ethnic groups. One of the main barriers to stop this …

Evaluating an automated analysis using machine learning and natural language processing approaches to classify computer science students' reflective writing

H Alrashidi, N Almujally, M Kadhum… - … Computing and Social …, 2022 - Springer
Reflection writing is a common practice in higher education. However, manual analysis of
written reflections is time-consuming. This study presents an automated analysis of reflective …

Threatzoom: CVE2CWE using hierarchical neural network

E Aghaei, W Shadid, E Al-Shaer - arXiv preprint arXiv:2009.11501, 2020 - arxiv.org
The Common Vulnerabilities and Exposures (CVE) represent standard means for sharing
publicly known information security vulnerabilities. One or more CVEs are grouped into the …

Classify Alzheimer genes association using Naïve Bayes algorithm

S Raj, A Vishnoi, A Srivastava - Human Gene, 2024 - Elsevier
Background Alzheimer's disease, the most common form of dementia, accounts for 60–80%
of cases and its prevalence is projected to increase as aging populations grow. By 2050, the …