Harassment Detection Using Machine Learning and Fuzzy Logic Techniques

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Trust Classification in Social Networks Using Combined Machine Learning Algorithms and Fuzzy Logic

Social networks have become the main infrastructure of today’s daily activities of people during the last decade. In these networks, users interact with each other, share their interests on resources and present their opinions about these resources or spread their information. Since each user has a limited knowledge of other users and most of them are anonymous, the trust factor plays an import...

متن کامل

Hand Written Character Detection by Using Fuzzy Logic Techniques

Now a day’s hand written character detection plays an important role. this paper presents an overview of future extraction method for offline detection of segmented characters selective of a feature extraction method. In this paper There are two techniques for identify hand written characters those are Active character detection(ACR) and contour Algorithms .These two techniques can be implement...

متن کامل

Does machine learning need fuzzy logic?

This article is a short position paper in which the author outlines his (necessarily subjective) perception of current research in fuzzy machine learning, that is, the use of formal concepts and mathematical tools from fuzzy sets and fuzzy logic in the field of machine learning. The paper starts with a critical appraisal of previous contributions to fuzzy machine learning and ends with a sugges...

متن کامل

Gender Detection using Machine Learning Techniques and Delaunay Triangulation

Data mining today is being used widely in diverse areas. For example: fraudulent systems, recommender systems, disease prediction, and numerous other applications. One such application is exploited in this article. This paper presents an approach to detect gender of a person through frontal facial image, using techniques of data mining and Delaunay triangulation. Gender prediction can prove to ...

متن کامل

Network Intrusion Detection using Machine Learning and Voting techniques

As the result of recent advent and rapid growth of the Internet, there have been an increasing number of corporations relying on computers and networks for communications and critical business transactions. Because of the network complexity and advanced hacking techniques, such reliance on computer networks often presents unanticipated risks and vulnerabilities. A huge volume of attacks on majo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings

سال: 2019

ISSN: 2504-3900

DOI: 10.3390/proceedings2019031027