i-manager's Journal on Computer Science最新文献

筛选
英文 中文
EVOLUTION OF CUB TO PREDATOR (ECP) – LION'S INTELLECTUAL HUNTING ABILITY 从幼崽到捕食者的进化——狮子的智力狩猎能力
i-manager's Journal on Computer Science Pub Date : 1900-01-01 DOI: 10.26634/jcom.7.3.16543
S. Swamy., M. Marsaline Beno
{"title":"EVOLUTION OF CUB TO PREDATOR (ECP) – LION'S INTELLECTUAL\u0000 HUNTING ABILITY","authors":"S. Swamy., M. Marsaline Beno","doi":"10.26634/jcom.7.3.16543","DOIUrl":"https://doi.org/10.26634/jcom.7.3.16543","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127890282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RECOGNITION OF FACIAL EXPRESSION BASED ON LOCAL BINARY PATTERNS (LBP) 基于局部二值模式的面部表情识别
i-manager's Journal on Computer Science Pub Date : 1900-01-01 DOI: 10.26634/jcom.7.3.16861
O. Ayeni
{"title":"RECOGNITION OF FACIAL EXPRESSION BASED ON LOCAL\u0000 BINARY PATTERNS (LBP)","authors":"O. Ayeni","doi":"10.26634/jcom.7.3.16861","DOIUrl":"https://doi.org/10.26634/jcom.7.3.16861","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133491253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Analysis on Combined Datasets for Fake News Detection through Machine Learning Approach 基于机器学习的假新闻检测组合数据集分析
i-manager's Journal on Computer Science Pub Date : 1900-01-01 DOI: 10.26634/jcom.10.3.19104
Jaiswal Khushbu, Bansal Abhishek
{"title":"An Analysis on Combined Datasets for Fake News Detection through Machine Learning Approach","authors":"Jaiswal Khushbu, Bansal Abhishek","doi":"10.26634/jcom.10.3.19104","DOIUrl":"https://doi.org/10.26634/jcom.10.3.19104","url":null,"abstract":"Social media is a useful platform that facilitates the sharing of information and builds a virtual network among communities. This platform is sometimes useful to connect people and share useful information among friends and relatives. Nowadays, this platform is also used to share skills through short videos, transfer payments through the Unified Payments Interface (UPI), advertise and promote products to enhance businesses. However, social media platforms are connected through public networks, so a lot of hackers are connected to the network. The hackers want to steal personal information or manipulate the views of the users. Therefore, it applies various social engineering activities to gather personal information and spread a lot of fake news through various channels, apps, and social media pages. Therefore, it is a great challenge to detect fake news. Currently, many research communities are working to implement an algorithm that can detect fake news automatically based on an analysis of data. In an analysis of data, machine learning approaches such as regression, classification, and clustering methods may play an important role in detecting fake news from various datasets obtained from social media sites or the internet. In this paper, a deep analysis of combined datasets for fake news detection has been performed and this analysis is based on machine learning approaches. In addition, it compares the performance of machine learning models such as logistic regression, support vector machines, random forests, passive-aggressive classifiers, and decision trees.","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132239671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EXTRACTING OF FREQUENT WEB PAGE PATTERNS USING FPPM ALGORITHM 基于FPPM算法的频繁网页模式提取
i-manager's Journal on Computer Science Pub Date : 1900-01-01 DOI: 10.26634/jcom.7.3.15801
D. Gandhimathi, N. Anbazhagan
{"title":"EXTRACTING OF FREQUENT WEB PAGE PATTERNS USING\u0000 FPPM ALGORITHM","authors":"D. Gandhimathi, N. Anbazhagan","doi":"10.26634/jcom.7.3.15801","DOIUrl":"https://doi.org/10.26634/jcom.7.3.15801","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114802528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel technique of sign language recognition system using machine learning for differently abled person 一种基于机器学习的残疾人手语识别系统新技术
i-manager's Journal on Computer Science Pub Date : 1900-01-01 DOI: 10.26634/jcom.9.4.18594
Khan Rabia, H. Rashid, Kumar Tyagi Rajesh, Singh Juhi
{"title":"A novel technique of sign language recognition system using machine learning for differently abled person","authors":"Khan Rabia, H. Rashid, Kumar Tyagi Rajesh, Singh Juhi","doi":"10.26634/jcom.9.4.18594","DOIUrl":"https://doi.org/10.26634/jcom.9.4.18594","url":null,"abstract":"Sign language is a language used by deaf and dumb people to communicate through hand gestures or facial expressions combined with non-manual elements. Various automotive tools and software have been developed by many developers, but they require hardware and an Internet connection, which adds to the cost of the software. In this paper, the presented software captures the hand gesture, and with the help of various machine learning optimization algorithms such as Stochastic Gradient Descent (SGD) and Adam (optimizer), the accuracy will be determined to give predictive value. With the help of computers, it could be a new way of learning for deaf and dumb people. During such a pandemic, various group learning apps and software have been developed for the purpose of conducting online classes, but they are useful for ordinary people. Using this technique will help deaf and dumb people with online learning.","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124866821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Language detection using multinomial naïve bayes algorithm 语言检测使用多项naïve贝叶斯算法
i-manager's Journal on Computer Science Pub Date : 1900-01-01 DOI: 10.26634/jcom.10.2.19014
Vaghasiya Yashvi, Vora Diya, Nehayadav, Rana Manish
{"title":"Language detection using multinomial naïve bayes algorithm","authors":"Vaghasiya Yashvi, Vora Diya, Nehayadav, Rana Manish","doi":"10.26634/jcom.10.2.19014","DOIUrl":"https://doi.org/10.26634/jcom.10.2.19014","url":null,"abstract":"In this multilingual world, automatic detection of written or spoken language using Language Identification (LID) technology is a boon in the global communication with people using different languages in different countries. For simplicity and for the purpose of this research, the process of automatically identifying the language(s) from a document is thought of as LID. Lot of ongoing research projects are in the field of Natural Language Processing (NLP) that uses LID as a part of NLP. This field exploits several algorithms evolved in the field of computer science, individually or in combination to achieve accuracy in identifying a language. Among the different approaches adopted in LID,NaïveBayes Classification n-gram text processing seems to be promising.This paper proposes the concept for categorising multiple language texts using Naïve Bayesian algorithms using Machine Learning approaches. Using techniques from existing researches, this paper proposes a way to recognize multilingual documents and calculate the relative proportions of these languages.","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"237 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128807688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
COMPARATIVE STUDY OF VARIOUS MACHINE LEARNING ALGORITHMS FOR TWEET CLASSIFICATION 推文分类中各种机器学习算法的比较研究
i-manager's Journal on Computer Science Pub Date : 1900-01-01 DOI: 10.26634/jcom.6.4.15722
A. Umar, A. Sulaimon, B. Muhammad, S. A. Olawale
{"title":"COMPARATIVE STUDY OF VARIOUS MACHINE LEARNING\u0000 ALGORITHMS FOR TWEET CLASSIFICATION","authors":"A. Umar, A. Sulaimon, B. Muhammad, S. A. Olawale","doi":"10.26634/jcom.6.4.15722","DOIUrl":"https://doi.org/10.26634/jcom.6.4.15722","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"29 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129119417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A study of ransomware attacks on windows platform windows平台上的勒索软件攻击研究
i-manager's Journal on Computer Science Pub Date : 1900-01-01 DOI: 10.26634/jcom.9.4.18530
Fatim Ghulam, Mustafa Irfan, Farooq Hassan
{"title":"A study of ransomware attacks on windows platform","authors":"Fatim Ghulam, Mustafa Irfan, Farooq Hassan","doi":"10.26634/jcom.9.4.18530","DOIUrl":"https://doi.org/10.26634/jcom.9.4.18530","url":null,"abstract":"Ransomware is a type of new malware that is extremely dangerous and causes serious problems, affecting several organizations and individuals around the world. Ransomware attacks nearly doubled in the first half of 2021, according to statists. In 2020, there were approximately 304 million ransomware attacks worldwide in different parts of the world. The increase was 62% compared to last year and is the second largest increase since 2016. Many researchers are already talking about ransomware and its impact. However, much more research into ransomware is needed to provide further in-depth analysis and study of ransomware. This paper focuses specifically on the impact of ransomware on Windows platforms. Since Windows is the most widely used and well-known platform, it was chosen for the analysis. It monitors the infection process, how it occurs, as well as the various methods used by ransomware families to encrypt. In conclusion, this paper suggests that securing Windows is possible if system files and registry are closely monitored.","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"298 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132228881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PLAGIARISM DETECTION WITH OPTICAL CHARACTERRECOGNITION 基于光学字符识别的抄袭检测
i-manager's Journal on Computer Science Pub Date : 1900-01-01 DOI: 10.26634/jcom.9.1.18098
J. Srinidhi, Nagendran Nivetha, R. Gayathri, S. Gurusubramani
{"title":"PLAGIARISM DETECTION WITH OPTICAL CHARACTER\u0000RECOGNITION","authors":"J. Srinidhi, Nagendran Nivetha, R. Gayathri, S. Gurusubramani","doi":"10.26634/jcom.9.1.18098","DOIUrl":"https://doi.org/10.26634/jcom.9.1.18098","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133806487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SUPPORT VECTOR MACHINE AND RANDOM FOREST MACHINELEARNING ALGORITHMS FOR SENTIMENT ANALYSIS ONTOURISM REVIEWS: A PERFORMANCE ANALYSIS 支持向量机和随机森林机器学习算法用于旅游评论的情感分析:性能分析
i-manager's Journal on Computer Science Pub Date : 1900-01-01 DOI: 10.26634/jcom.9.3.18479
Kumar Sahu Manoj, Selot Smita
{"title":"SUPPORT VECTOR MACHINE AND RANDOM FOREST MACHINE\u0000LEARNING ALGORITHMS FOR SENTIMENT ANALYSIS ON\u0000TOURISM REVIEWS: A PERFORMANCE ANALYSIS","authors":"Kumar Sahu Manoj, Selot Smita","doi":"10.26634/jcom.9.3.18479","DOIUrl":"https://doi.org/10.26634/jcom.9.3.18479","url":null,"abstract":"","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114136746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信