[HTML][HTML] Text categorisation in Quran and Hadith: Overcoming the interrelation challenges using machine learning and term weighting

NAP Rostam, NHAH Malim - Journal of King Saud University-Computer …, 2021 - Elsevier
Abstract Quran and Al-Hadith are interrelated in the sense that both often complement each
other in interpreting Islamic teachings. In order to gain comprehension of the Quran in detail …

[PDF][PDF] Cyberbullying identification in twitter using support vector machine and information gain based feature selection

N Purnamasari, MA Fauzi, LSD Indriati… - Indonesian Journal of …, 2020 - researchgate.net
Cyberbullying is one of the actions that violate the ITE Law where the crime is committed on
social media applications such as Twitter. This action is difficult to detect if no one is …

Dimensionality reduction for sentiment analysis using pre-processing techniques

M Mhatre, D Phondekar, P Kadam… - 2017 International …, 2017 - ieeexplore.ieee.org
Sentiment analysis is the study of people's opinions, sentiments, attitudes and emotions,
expressed in written language but this process is time consuming, inconsistent and costly in …

Translated vs non-translated method for multilingual hate speech identification in Twitter

MO Ibrohim, I Budi - … Journal on Advanced Science, Engineering and …, 2019 - scholar.ui.ac.id
Nowadays social media is often misused to spread hate speech. Spreading hate speech is
an act that needs to be handled in a special way because it can undermine or discriminate …

Align my curriculum: A framework to bridge the gap between acquired university curriculum and required market skills

A Almaleh, MA Aslam, K Saeedi, NR Aljohani - Sustainability, 2019 - mdpi.com
With the advancement of technology, academics and curriculum developers are always
under pressure to provide students with skills that match the market's requirements. A …

[PDF][PDF] Crawling and mining the dark web: A survey on existing and new approaches

MK Alshammery, AF Aljuboori - Iraqi Journal of Science, 2022 - iasj.net
The last two decades have seen a marked increase in the illegal activities on the Dark Web.
Prompt evolvement and use of sophisticated protocols make it difficult for security agencies …

NLP techniques, tools, and algorithms for data science

P Malik, V Mittal, L Nautiyal, M Ram - Artificial Intelligence for Signal …, 2022 - degruyter.com
Natural language processing (NLP) is the subdomain of artificial intelligence that explores
different methods of using computers to understand, analyze, and process the huge amount …

Identifikasi Tweet Cyberbullying pada Aplikasi Twitter menggunakan Metode Support Vector Machine (SVM) dan Information Gain (IG) sebagai Seleksi Fitur

NMGD Purnamasari, MA Fauzi, I Indriati… - … Teknologi Informasi Dan …, 2018 - j-ptiik.ub.ac.id
Cyberbullying merupakan salah satu tindakan yang melanggar UU ITE dimana kejahatan
ini dilakukan di media sosial salah satunya aplikasi Twitter. Tindakan ini sulit terdeteksi jika …

[PDF][PDF] Mining the dark web: A novel approach for placing a dark website under investigation

B Alkhatib, RS Basheer - International Journal of Modern …, 2019 - researchgate.net
In the last two decades, illicit activities have dramatically increased on the Dark Web. Every
year, Dark Web witnesses establishing new markets, in which administrators, vendors, and …

[PDF][PDF] Sentiment analysis of facebook data using machine learning

S Tiwari, A Sinha - International Journal of Innovative Research in …, 2020 - ijirase.com
In this paper, I propose a model that will analyze the person's sentiment and emotion using
social media. Face book, using machine learning and deep learning. Nowadays, most …