Harassment Detection Using Machine Learning and Fuzzy Logic Techniques
نویسندگان
چکیده
منابع مشابه
Trust Classification in Social Networks Using Combined Machine Learning Algorithms and Fuzzy Logic
Social networks have become the main infrastructure of today’s daily activities of people during the last decade. In these networks, users interact with each other, share their interests on resources and present their opinions about these resources or spread their information. Since each user has a limited knowledge of other users and most of them are anonymous, the trust factor plays an import...
متن کاملHand Written Character Detection by Using Fuzzy Logic Techniques
Now a day’s hand written character detection plays an important role. this paper presents an overview of future extraction method for offline detection of segmented characters selective of a feature extraction method. In this paper There are two techniques for identify hand written characters those are Active character detection(ACR) and contour Algorithms .These two techniques can be implement...
متن کاملDoes machine learning need fuzzy logic?
This article is a short position paper in which the author outlines his (necessarily subjective) perception of current research in fuzzy machine learning, that is, the use of formal concepts and mathematical tools from fuzzy sets and fuzzy logic in the field of machine learning. The paper starts with a critical appraisal of previous contributions to fuzzy machine learning and ends with a sugges...
متن کاملGender Detection using Machine Learning Techniques and Delaunay Triangulation
Data mining today is being used widely in diverse areas. For example: fraudulent systems, recommender systems, disease prediction, and numerous other applications. One such application is exploited in this article. This paper presents an approach to detect gender of a person through frontal facial image, using techniques of data mining and Delaunay triangulation. Gender prediction can prove to ...
متن کاملNetwork Intrusion Detection using Machine Learning and Voting techniques
As the result of recent advent and rapid growth of the Internet, there have been an increasing number of corporations relying on computers and networks for communications and critical business transactions. Because of the network complexity and advanced hacking techniques, such reliance on computer networks often presents unanticipated risks and vulnerabilities. A huge volume of attacks on majo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings
سال: 2019
ISSN: 2504-3900
DOI: 10.3390/proceedings2019031027