DATA MINING FOR HADITH CLASSIFICATION KAWTHER A.ALDHLAN
|
|
- Brandon Williamson
- 7 years ago
- Views:
Transcription
1 DATA MINING FOR HADITH CLASSIFICATION BY KAWTHER A.ALDHLAN A thesis submitted in fulfilment of the requirement for the degree of Doctor of Philosophy in Information and Communication Technology Kulliyyah of Information and Communication Technology International Islamic University Malaysia FEBRUARY 2013
2 ABSTRACT The holy Qur'an and Hadith are the two fundamental resources of the legislation and law in Muslim community. Including the Islamic books, these resources can be used as the sole authoritative source of knowledge and wisdom. Besides, they stand out as the source of a large collection of analysis and interpretation texts, which could provide a gold standard for artificial intelligent (AI) knowledge extraction and knowledge representation experiments. Recently, there are increasing attentions to automate the Islamic resources Qur'an, Sunnah and tradition books, motivate researchers to look for mechanisms that can represent and discover the knowledge of these resources. In the present study, extracted Islamic knowledge representing the focal point of the research, three famous books in Hadith science framed the corpus of this study. The present study attempted to explore new approach to classify Hadith according to its validity degree (Sahih, Hasan, Da'eef and Maudoo') using data mining techniques, the proposed Hadith classifier (HC) model was built through learning process and was represented by the tree structure modeling. Moreover, the attributes of the instances originally were obtained from the source books directly. Whilst some of these attributes which is not mentioned in these books were indicated as null values, or missing values. A novel mechanism was employed to handle these missing data. This mechanism was generated based on the investigation methods of the Isnad in Hadith science. Representing or extracting Islamic knowledge is very critical step because it may affect life of Muslim, therefore, the results of the research were compared with the resource books, concurrently with the point of view of the expert in Hadith science. Indeed, the extracted knowledge shed light on the differences between Al-Imam Al-Bukhari, Al-Termithi and Al-Albani methods in takhareej AL-Hadith. Furthermore, the findings of the research showed that the performance of the proposed HC had significant effect with the proposed missing data detector method (MDD), the correct classification rate (CCR) was sharply increased from ( %) before using MDD to (97.597%) after applying it. Furthermore, the favorable results of comparing the performance of HC against naïve bayes classifier indicated that the decision tree (DT) Modeling is a viable approach to classify Hadith due to the excel performance, ease of implementation, and ease of rules induction and results interpretation. ii
3 HC HC CCR MDD MDD iii
4 APPROVAL PAGE The thesis of Kawther Binti Ali ALdhlan has been approved by the following: Akram M. Zeki Supervisor Ahmed M. Zeki Co-Supervisor Tengku Mohd Bin Tengku Sembok Internal Examiner Imad Fakhri Taha Alshaikhli Internal Examiner Hassanin M. Al-Barhamtoshy External Examiner Abdul Kabir Hussain Solihu Chairman iv
5 DECLARATION I hereby declare that this thesis is the result of my own investigations, except where otherwise stated. I also declare that it has not been previously or concurrently submitted as a whole for any other degrees at IIUM or other institutions. Kawther Binti Ali Dhlan Al-Dhlan Signature Date.. v
6 INTERNATIONAL ISLAMIC UNIVERSITY MALAYSIA DECLARATION OF COPYRIGHT AND AFFIRMATION OF FAIR USE OF UNPUBLISHED RESEARCH Copyright 3102 by Kawther Binti Ali Al-Dhlan. All rights reserved. DATA MINING FOR HADITH CLASSIFICATION No part of this upublished research may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise without prior written permission of the copyright holder except as provided below. 1. Any material contained in or derived from this unpublished research may only be used by others in their writing with due acknowledgement. 2. IIUM or its library will have the right to make and transmit copies (print or electronic) for institutional and academic purposes. 3. The IIUM library will have the right to make, store in a retrieval system and supply copies of this unpublished research if requested by other universities and research libraries. Affirmed by Kawther Binti Ali Dhlan Aldhlan.. Signature.. Date vi
7 To My Beloved Mother (May Allah Bless Her) To My Father To My Husband and My Family vii
8 ACKNOWLEDGEMENTS In the name of Allah, the Most Beneficent, the Most Merciful. All praise and gratitude to Almighty Allah S.W.T. for giving me an opportunity to undertake and complete this study. I felt very grateful for having an exceptional doctoral committee. Without their guidance and support, I may not be able to reach this far in my academic endeavor. First and foremost, my deepest gratitude goes to Dr. Akram M. Zeki, my major supervisor and my mentor. His dedication and patient in guiding me has helped me get through this study and make me what I am today. My deepest gratitude also goes to Dr. Ahmed M. Zeki, my co-supervisor, who have greatly contributed in assisting me to complete my work. I would to extent my thanks to the examiners committee for their valued notes. My personal thanks also go to all lecturers and staff of the Kulliyyah of Information and Communication Technology whose wisdom have shaped my way of looking at things one way or another. I am also grateful to the University Of Hail UOH for giving me this priceless opportunity to further my study in this doctoral program. And special thanks to Associate Prof. Dr. Naser Ismail from Islamic department in college of education in UOH for his efforts and guidance. Finally, I would like to extend my gratitude to my beloved husband, Hamad Alreshidi, for his understanding, collaborative and undivided support. To my children, Solaf, Turki and Wed may this success become an inspiration for their future. And to my mother (God bless her), father, sisters and brothers thank you for your unfailing faith, thank you for encouragements and prayers. viii
9 TABLE OF CONTENTS Abstract... ii Abstract in Arabic... iii Approval Page... v Declaration Page... vi Copyright Page... vii Dedication... viii Acknowledgement... ix List of Tables... xiii List of Figures... xv List of Abbreviations... xviii List of Symbols... xxi CHAPTER ONE: INTRODUCTION The Importance of Hadith Background of the Study Statement of the Problem Research Objectives Research Questions Research Hypotheses Significance of the Study Research Model The Research Framework Data Representation Models Hadith Structure The Representation of Hadith Structure Research Approach Organization of the Thesis CHAPTER TWO: OVERVIEW OF HADITH SCIENCE Introduction Definition of Hadith Component of Hadith Hadith Verification Classification of Hadith Summary CHAPTER THREE: LITRATURE REVIEW Introduction Overview of Data Mining What Is a Data Mining? Data Mining Approaches Supervised learning ix
10 Unsupervised Clustering Semi-supervised learning How to Mine Data The Knowledge Discovery Process Applications of Data Mining Why Data Mining The role of ICT in Islam Applications of DM in Hadith Science Summary CHAPTER FOUR: RESEARCH METHODOLOGY Introduction Research Framework Research Procedures The Sample of the Study Evaluation Strategy Confusion Matrix Correct Classification Rate Error Rate Sensitivity Specificity Precision F-Measure Receiver Operating Characteristic Area under the Curve Summary CHAPTER FIVE: DATA PRE-PROCESSING AND ALGORITHMS Introduction Corpus of the Study Data Pre-Processing Attributes Selection The Missing Data Detector Method (MDD) Decision Tree Construction Select the Attributes Entropy (Information Impurity) Information Gain Criterion Gain ratio Pruning Option Pre-Pruning Post-Pruning Comparisons of pre-pruning and post-pruning Rule Induction Based on the Pruned Tree C4.5 Algorithm Summary x
11 CHAPTER SIX: MODEL EVALUATION AND DISCUSSION Introduction Implementation Experiment Procedures Training Procedures Testing Procedures Trial#1: Test Phase with (33.3%) of the Sample size Trial#2: Test Phase with (33.3%) of the Sample size Trial#3: Test Phase with (11.1%) of the Sample size Trial#4: Test Phase with (11.1%) of the Sample size Comparing the Results of HC with the Expert Point View The Comparison between the HC and Naïve Bayes Classifier Summary CHAPTER SEVEN: CONCLUSION AND FUTURE WORKS Overview Summary of the proposed method Summary of Findings Comparative study with literature Conclusion Contributions Future Directions BIBLIOGRAPHY APPENDIX A GLOSSARY xi
12 LIST OF TABLES Table No. Page No. 3.1 Summarization of the previous works in Hadith The attributes of the sample set No. of Hadith in Al-Bukhari collection Al-Bukhari narrators' grade Confusion matrix AUC index and its effectiveness for discrimination Results of pre-processing phase for Al-Hadith in Figure Hadith attributes according to (Al-Suyutih, 1965,Tahan,1996) The Tracing Table of the Example (1) Hadith terms used to indicate the narrator's reliability The Tracing Table of the Example (2) Hadith terms used to indicate the narrator's retention (preservation) The Tracing Table of the Example (3) The Tracing Table of the Example (4) The rank of the attributes according to the entropy value The rank of the attributes according to the information gained Method The rank of the attributes according to gain ratio method The information gained of the Hadith features The evaluation results of Hadith Classifier (training phase) The evaluation results of HC of trial# The evaluation results of HC of trial# The evaluation results of HC of trial#3 138 xii
13 6.6 The evaluation results of HC of trial# The RS Between the Results of HC and the Expert Point View The comparison between Naïve Bayes classifier and HC classifier Comparative Study with the literature 155 xiii
14 LIST OF FIGURES Figure No. Page No. 1.1 The research framework The proposed Hadith Classifier HC Hadith components Bottom- Up approach Top- Down approach Components of Hadith Hadith classification Mursal م ر س ل (hurried) case Munqati م ن ق ط ع (broken) case Mu allaq م ع ل ق (hanging) case The boundary hyperplane in support vector machine Illustration of decision tree with replication An overview of the knowledge discovery process (KDP) Hadith classification without handling missing data The process of missing data detector MDD The proposed Hadith Classifier The research procedures The first stage of the experiment (Training phase) The second stage of the experiment (Testing phase I) The second stage of the experiment (Testing phase II) AL-Ahadith in Sahih Al-Bukhari Summary of Al-Bukhari narrators' grade 82 xiv
15 4.10 AL-Ahadith in Jami'u AL-Termithi AL-Ahadith in Silsilat Al-AHadith Al-Dae'ifah w' Al-Mawdu'ah The confusion matrix of the training model An ROC curve and different points of significance Example of Sahih Hadith Example of Hasan Hadith Example of Da'eef Hadith Example of Maudoo' Hadith The metadata of the Hadith narrators in narrator table The relationships between the narrators in the teacher table The flowchart of the first method The flowchart of the second method The flowchart of the narrators' reliability method (Part I) The flowchart of the narrators 'reliability method (Part II) The flowchart of the method of determining the narrator's preservation The flowchart of the method that determines the value of the Isnad defective Part of DT tree for HC The results of identification narrators of the Isnad chain The induced rules after parsing the path from the root to the leaf node The decision tree of the target Hadith Classifier The confusion matrix of the training model ROC curves of the classes in Hadith classifier (Training Phase) Test procedures The confusion matrix of Hadith Classifier of trial#1 130 xv
16 6.8 ROC curves of the classes in HC for trial# Isnad identification Process for 33.3% of test dataset Classification process of 33.3% of test dataset The confusion matrix of Hadith Classifier of trial# ROC curves of the classes in HC for trial# The confusion matrix of Hadith Classifier of trial# ROC curves of the classes in HC for trial# Isnad identification process for trial# Classification process of trial# The confusion matrix of Hadith Classifier of trial# ROC curves of the classes in Hadith Classifier for trial# ROC curves of the naïve Bayes classifier CCR of naïve Bayes classifier and DT classifier Summary of the research approach 152 xvi
17 LIST OF ABBREVIATIONS Acc ANN AUC CART CBR CCR CCRE CCRHC DFT DM DOB DOD DTs ER FN FP GA HC ICT ID ID3 KDP Accurate rate Artificial Neural Network Area Under the Curve Classification And Regression Trees Case-Based Reasoning Correct Classification Rate Correct Classification Rate according to the Expert Correct Classification Rate according to the HC. Document Frequency Thresholding Data Mining Date Of Birth Date Of Death Decision Trees Error Rate False Negative False Positive Genetic Algorithms Hadith Classifier Information Communication Technology Identification Interactive Dicotomizer Knowledge Discovery Process xvii
18 K-NN MAX MDD MIN NB NCP NOC NOCR NOP NOR NWP RI RS ROC SN SNoW SP SVD SVM TF/IDF TN TNR TP TPR K- Nearest Neighbor Maximum Missing Data Detector Minimum Naïve Bayes Number of Correct Prediction Total Number of Cases Number of Corrected Rules Total Number of Predictions Number of Rules Number of Wrong Predictions Rule Induction Rate of similarity. Receiver Operating Characteristic Sensitivity Sparse Network of Winnows Specificity Singular Value Decomposition Support Vector Machines Term Frequency Inverse Documentation Frequency True Negative True Negative Rate True Positive True Positive Rate xviii
19 UML VC VSM WWW Unified Modeling Language. Vapnik Chervonenkis Vector Space Model World Wide Web xix
20 LIST OF SYMBOLS C CCR ER FN FP H i I entropy IG J K L M N NCP NOC NOP NWP P(i) R cv R te SP TN Corpus Correct Classification Rate Error Rate False Negative False Positive Tested Hadith Information entropy Information Gain The total number of classes Attributes Dataset Feature Training instance/ sample size Number of Correct Prediction Total Number of cases Total Number of Predictions Number of wrong Predictions Probability The V-fold cross validation accuracy Validation accuracy Specificity True Negative xx
21 TNR TP TPR V v_best x i Y i True Negative Rate True Positive True Positive Rate Subsets The best attribute Instance Class xxi
22 CHAPTER ONE INTRODUCTION 1.1 THE IMPORTANCE OF HADITH The Qur'an is the last divine book, which was revealed from Allah as a declaration and guidance to mankind. It is an explanation of all things and means for men to be rightly guided. In many verses of the Qur'an, it is commanded to obey the prophet of Allah. (ق ل ا ط يع وا الل ه و ا ط يع وا الر س ول ف ا ن ت و ل و ا ف ا ن م ا ع ل ي ه م ا ح م ل و ع ل ي ك م م ا ح م ل ت م و ا ن ت ط يع وه ت ه ت د وا و م ا ع ل ى الر س ول ا لا ال ب لاغ ال م ب ين ) (سورة النور 54) Say: "Obey Allah and obey the Messenger, but if you turn away, he (Messenger Muhammad ) is only responsible for the duty placed on him (i.e. to convey Allah's Message) and you for that placed on you. If you obey him, you shall be on the right guidance. The Messenger's duty is only to convey (the message) in a clear way (i.e. to preach in a plain way)." (The Holy Qur'an 24: 54) 1 This is quite a significant point because understanding the Qur'an fully can only be possible with following the Sunnah of the prophet. Sunnah, means the actions, sayings and silent permissions (or disapprovals) of the Prophet. The word Sunnah is also used to refer to religious duties that are optional. Furthermore, Sunnah means the recorded sayings (Hadith) of Prophet Muhammad. In this sense, Muslims believe that the Sunnah of the Prophet Muhammad is the second of the two revealed fundamental sources of Islam, after the Holy Qur'an (Hasan, 2004). It is impossible to 1 Translation of the meaning of the Nobel Qur'an was taken from ussalam.com/thenoblequran/, The Nobel Qur'an. 1
23 understand the Qur'an without reference to the Hadith; and it is impossible to explain Hadith without relating it to the Qur'an. Where the Quran gives Muslims a broad framework for how they should live, the Hadith gives them specific information. For instance: Qur'an commands Muslim to pray, prophet Muhammad explained when and how to pray: (ص ل وا ك م ا ر ا ي ت م ون ي ا ص ل ي). ا خ ر ج ه الش ي خ ان Perform your prayer in the same manner you had seen me doing [Reported by Al-Bukhai& Muslim]. 2 Qur'an commands Muslim to make Hajj, prophet Muhammad explained how to perform Hajj (خ ذ وا ع ن ي م ن اس ك ك م) ا خ ر ج ه م س ل م Take from me your rituals (of Hajj) [Reported by Muslim] 3 Moreover, Allah has informed in the surah Al-e Imran that the Prophet had the characteristic of teaching the Qur'an and purifying mankind: (ل ق د م ن الل ه ع ل ى ال م و م ن ين ا ذ ب ع ث ف يه م ر س ولا م ن ا ن ف س ه م ي ت ل و ع ل ي ه م ا ي ات ه و ي ز ك يه م و ي ع ل م ه م ال ك ت اب و ال ح ك م ة و ا ن ك ان وا م ن ق ب ل ل ف ي ض لال م ب ين ) (سورة ا ل عمران 164) Indeed Allah conferred a great favor on the believers when He sent among them a Messenger (Muhammad ) from among themselves, reciting unto them His Verses (the Qur'an), and purifying them (from sins by their following him), and instructing them (in) the Book (the Qur'an) and Al-Hikmah [the wisdom and the Sunnah of the Prophet (i.e. his legal ways, statements, acts of worship, etc.)], while before that they had been in manifest error (The Holy Qur'an 2: 164) 2 Translation of the Hadith was taken from The official website of Dr.Al-Ereefi 3 Translation of the Hadith was taken from wathakker.com 2
24 It would be useful to attract attention to the phrase "teaching the book and the wisdom which emphasizes the relationship between Qur'an and Hadith and indicates Hadith as the second resource of the knowledge and wisdom, therefore, Hadith is an important source of reference for the development of Islamic laws, the Muslim community recorded prophet Muhammad's words and actions for posterity, and as the number of these reported conversations grew exponentially in the century after his death, the community developed sophisticated methods to evaluate their veracity to know which traditions were reliable, and which were clearly fraudulent. While the early collections of Hadith often contained Hadith that were of questionable origin, collections of authenticated Hadith called Sahih (sound, true, correct) were compiled, gradually by many Hadith scientists such as Al-Bukhari, Muslim, Al-Tirmidhi, Al- Nasa'i, Ibnu Majah, Abu Daud, Al-Darimi, Malek and Ibnu Hanbal (Hadithtraditional books, 2009). 1.2 BACKGROUND OF THE STUDY Nowadays, many studies are published and much software are developed to serve the prophetic tradition through several channels that can help students and scientists to find tremendous amount of information in the simplest and the easiest way. Furthermore, such software introduce quick electronic search instead of the manual search (Aldhlan et al., 2010). Most initial studies concentrated on transferring the Hadith resources books such as Al-Bukhari collection, Muslim collection and other books into databases either on websites or as software. However, it has become necessary to find smart approaches that can adopt Hadith literature rather than simply storing Hadith resources on a compact disk or websites with all probabilities of having negative 3
Islamic Studies. Student Workbook. Level 1. Name. 2 Dudley Street Cheetham Hill Manchester, M89DA. manchestersalafischool.
Islamic Studies Level 1 Student Workbook Name 2 Dudley Street Cheetham Hill Manchester, M89DA manchestersalafischool.com 0161 317 1481 Islamic Studies Level 1 Student Workbook Overview Coming to the Masjid
More informationWhy Won t you Think?
Why Won t you Think? www.detailedquran.com إ ن ش ر الد و اب ع ند الل ه الص م ال ب ك م ال ذ ين ل ي ع ق ل ون Truly, the worst of all creatures in the sight of Allah are the deaf, the dumb, those who do not
More informationPrayer Book for. Children &
Prayer Book for Muslim Children & New Muslims s (Prayer Book for Muslim Children & New Muslims) Designed and compiled by the one in need of Allah s pardon Aboo Imraan Abdus-Saboor bin Tomas Maldonado al-mekseekee
More informationﺮﺋﺎ ﻤﱠﻀﻟا The Arabic Pronouns
ر الض م اي ر The Arabic Pronouns (The Arabic Pronouns) Designed and compiled by the one in need of Allah s pardon Aboo Imraan Abdus-Saboor bin Tomas Maldonado al-mekseekee -may Allah forgive him, his family,
More informationOverview. Map of the Arabic Languagge. Some tips. Need to over-learn to reach a stage of unconscious competence. Recap Parts of Speech
Map of the Arabic Languagge Recap Parts of Speech Overview in Understanding the Qur an Start-up Initial growth Rapid growth Continuous growth Some tips Don t take furious notes Videos will be downloadable
More informationRecite with the Heart
Recite with the Heart We have now completed al-fatihah and move on to the Quran recitation after it. Did you ever notice that any Quran recited in Salah is always recited when we are in the standing position?
More information. / # 0 %! 1 2 3 ( 3 3 1 3 4 5 # ( )
! # %!& ( )! +,! &. / # 0 %! 1 2 3 ( 3 3 1 3 4 5 # ( ) # 6. 17 ( ( 3 3 1 3 4 10 ( ) 7 5 # ( ) # 6.! 8 7 5 9 A Proposed Model for Quranic Arabic WordNet Manal AlMaayah 1, Majdi Sawalha 2, Mohammad A. M.
More informationTEACHING ARABIC AS A SECOND LANGUAGE
بسم االله الرحمن الرحيم TEACHING ARABIC AS A SECOND LANGUAGE و م ن ا ي ات ه خ ل ق ال سم او ات و ال ا ر ض و اخ ت ل اف أ ل س ن ت ك م و أ ل و ان ك م إ ن ف ي ذ ل ك ل ا ي ات لل ع ال م ين 22 الروم 30 And among
More informationIndexing of Arabic documents automatically based on lexical analysis
Indexing of Arabic documents automatically based on lexical analysis Abdulrahman Al_Molijy, Ismail Hmeidi, and Izzat Alsmadi IT faculty, JUST University and Yarmouk University, Jordan ABSTRACT The continuous
More informationHow to Convert to Islam and Become a Muslim
How to Convert to Islam and Become a Muslim كيف تدخل ف الا سلام وتصبح مسلما ] إ ل ي - English [ www.islamreligion.com website موقع دين الا سلام 2013-1434 The word Muslim means one who submits to the will
More informationIslamic Copywork An-Nawawi s Forty Hadith Part 4
~ 1 ~ Islamic Copywork An-Nawawi s Forty Hadith Part 4 Translated by Ezzeddin Ibrahim Denys Johnson-Davies ~ 2 ~ Hadith 31 On the authority of Abu l-abbas Sahl ibn Sa d as-sa idi (may Allah be pleased
More informationCOMP3420: Advanced Databases and Data Mining. Classification and prediction: Introduction and Decision Tree Induction
COMP3420: Advanced Databases and Data Mining Classification and prediction: Introduction and Decision Tree Induction Lecture outline Classification versus prediction Classification A two step process Supervised
More informationData Mining - Evaluation of Classifiers
Data Mining - Evaluation of Classifiers Lecturer: JERZY STEFANOWSKI Institute of Computing Sciences Poznan University of Technology Poznan, Poland Lecture 4 SE Master Course 2008/2009 revised for 2010
More informationArabic Grammar Rules for Madeenah Book One
ب س م ا ه لل الر ح من الر ح ي م Arabic Grammar Rules for Madeenah Book One The three vowel markings ال ح ر ك ات الث الث ة kasrah - - ض م ة mmmhddh ف ت ح ة - fathah ك س ر ة (i) (u) (a) Sukoon س ك و ن -
More informationSome issues in Translating Nouns in Abdullah Yusuf Ali s Translation. of the Meanings of the Holy Quran. Adnan Abu-Mahfouz
JJMLL Jordan Journal of Modern Languages and Literature Vol. 3 No.1, 2011, pp. 65-83 Some issues in Translating Nouns in Abdullah Yusuf Ali s Translation of the Meanings of the Holy Quran Adnan Abu-Mahfouz
More informationDetection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup
Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor
More informationAn Introduction to an Islamic Theory of Economic Development
8 th International Conference on Islamic Economics and Finance An Introduction to an Islamic Theory of Economic Development Dr. Abdel-Rahman Yousri Ahmed Qatar Faculty of Islamic Studies, Qatar Foundation
More informationالطريقة المثلى لتعبير الرؤيا. dream INTERPRETATION. according to the qur aan and sunnah. by Dr. Abu Ameenah Bilal Philips
الطريقة المثلى لتعبير الرؤيا dream INTERPRETATION according to the qur aan and sunnah by Dr. Abu Ameenah Bilal Philips 1 Copyright 1996 Dar Al Fatah All rights reserved. No portion of this book may be
More informationSocial Media Mining. Data Mining Essentials
Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers
More informationPractical Applications of DATA MINING. Sang C Suh Texas A&M University Commerce JONES & BARTLETT LEARNING
Practical Applications of DATA MINING Sang C Suh Texas A&M University Commerce r 3 JONES & BARTLETT LEARNING Contents Preface xi Foreword by Murat M.Tanik xvii Foreword by John Kocur xix Chapter 1 Introduction
More informationWord Repetition in the Qur an Translating Form or Meaning?
J. King Saud Univ., Vol. 19, Lang. & Transl., pp. 17-34, Riyadh (A.H. 1427/2006) Word Repetition in the Qur an Translating Form or Meaning? Assistant Professor, Department of English, Faculty of Languages
More informationHow To Cluster
Data Clustering Dec 2nd, 2013 Kyrylo Bessonov Talk outline Introduction to clustering Types of clustering Supervised Unsupervised Similarity measures Main clustering algorithms k-means Hierarchical Main
More informationAnthology of Arabic poems About the Prophet and the faith of Islam Containing the famous poem of Sharfuddin Abi Abdullah Mohammed al-busiri
Anthology of Arabic poems About the Prophet and the faith of Islam Containing the famous poem of Sharfuddin Abi Abdullah Mohammed al-busiri Qasidat al-burdah The Poem Of The Mantle Collected by Syed Mohiuddin
More informationChapter 12 Discovering New Knowledge Data Mining
Chapter 12 Discovering New Knowledge Data Mining Becerra-Fernandez, et al. -- Knowledge Management 1/e -- 2004 Prentice Hall Additional material 2007 Dekai Wu Chapter Objectives Introduce the student to
More informationWhat are some of the virtues of Surah Al Baqarah?
Lessons from Surat al Baqarah (Ayaat 1-7) What are some of the virtues of Surah Al Baqarah? * Virtues of learning it... Learn Surat Al-Baqarah and Al `Imran because they are two lights and they shade their
More informationTHE GOLD DINĀR AND SILVER DIRHAM: ISLAM AND THE FUTURE OF MONEY
THE GOLD DINĀR AND SILVER DIRHAM: ISLAM AND THE FUTURE OF MONEY Imrān N. Hosein MASJID JĀMI AH CITY OF SAN FERNANDO TRINIDAD AND TOBAGO 1 Published by Masjid Jāmi ah, City of San Fernando. 76 Mucurapo
More informationCUSTOMER ONLINE PURCHASE INTENTION TOWARDS AIRLINE E-TICKETING IN KLANG VALLEY CHEW YUH YIING CHONG CHOOI SUN MICHELLE SIM KAI FERN YONG SOOK HUOI
CUSTOMER ONLINE PURCHASE INTENTION TOWARDS AIRLINE E-TICKETING IN KLANG VALLEY BY CHEW YUH YIING CHONG CHOOI SUN MICHELLE SIM KAI FERN YONG SOOK HUOI A research project submitted in partial fulfillment
More informationData Mining Classification: Decision Trees
Data Mining Classification: Decision Trees Classification Decision Trees: what they are and how they work Hunt s (TDIDT) algorithm How to select the best split How to handle Inconsistent data Continuous
More informationData Mining for Customer Service Support. Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin
Data Mining for Customer Service Support Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin Traditional Hotline Services Problem Traditional Customer Service Support (manufacturing)
More information30 Hadith for Children
30 Hadith for Children Compiled By: Ali Ateeq Al-Dhaheri Translated By: Sakinah Mohamed Published by: Dakwah Corner Publications Sdn. Bhd. ALL RIGHTS RESERVED Copyright 2013 Dakwah Corner Publications
More informationData Mining for Knowledge Management. Classification
1 Data Mining for Knowledge Management Classification Themis Palpanas University of Trento http://disi.unitn.eu/~themis Data Mining for Knowledge Management 1 Thanks for slides to: Jiawei Han Eamonn Keogh
More informationTable of Contents. Chapter No. 1 Introduction 1. iii. xiv. xviii. xix. Page No.
Table of Contents Title Declaration by the Candidate Certificate of Supervisor Acknowledgement Abstract List of Figures List of Tables List of Abbreviations Chapter Chapter No. 1 Introduction 1 ii iii
More informationData quality in Accounting Information Systems
Data quality in Accounting Information Systems Comparing Several Data Mining Techniques Erjon Zoto Department of Statistics and Applied Informatics Faculty of Economy, University of Tirana Tirana, Albania
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
More informationFeature Subset Selection in E-mail Spam Detection
Feature Subset Selection in E-mail Spam Detection Amir Rajabi Behjat, Universiti Technology MARA, Malaysia IT Security for the Next Generation Asia Pacific & MEA Cup, Hong Kong 14-16 March, 2012 Feature
More informationHow to Discipline Children the Islamic Way
Grandma Jeddah s Library How to Discipline Children the Islamic Way New Revised Edition By Grandma Jeddah How to Discipline Children the Islamic Way By Grandma Jeddah Please Click the following links below
More informationData Mining Algorithms Part 1. Dejan Sarka
Data Mining Algorithms Part 1 Dejan Sarka Join the conversation on Twitter: @DevWeek #DW2015 Instructor Bio Dejan Sarka (dsarka@solidq.com) 30 years of experience SQL Server MVP, MCT, 13 books 7+ courses
More informationThe Right to Decide. to the health care professionals who provide the care? All persons have the fundamental right to
The Right to Decide We have the right to make health care decisions, but how do we communicate them clearly to the health care professionals who provide the care? All persons have the fundamental right
More informationC ONTENTS. Acknowledgments
kincaidtoc.fm Page vii Friday, September 20, 2002 1:25 PM C ONTENTS Preface Acknowledgments xxi xxvii Part 1 CRM: Is It Right for Your Company? 1 Chapter 1 Commerce in the 21st Century 3 1.1 Understanding
More informationPROPHETHOOD IN ISLAM
PROPHETHOOD IN ISLAM WAMY Series on Islam No. 7 The concept of prophethood is found in the three great monotheistic religions of Christianity, Judaism, and Islam. In Islam, however, it has a special status
More informationAUTOMATION OF ENERGY DEMAND FORECASTING. Sanzad Siddique, B.S.
AUTOMATION OF ENERGY DEMAND FORECASTING by Sanzad Siddique, B.S. A Thesis submitted to the Faculty of the Graduate School, Marquette University, in Partial Fulfillment of the Requirements for the Degree
More informationThe Prohibition of. A Fatwa Issued By Shaykh M. Hisham Kabbani and Dr. Homayra Ziad
The Prohibition of A Fatwa Issued By Shaykh M. Hisham Kabbani and Dr. Homayra Ziad Published By World Organization for Resource Development and Education www.worde.org Copyright 2011 by World Organization
More informationElectronic Payment Fraud Detection Techniques
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 2, No. 4, 137-141, 2012 Electronic Payment Fraud Detection Techniques Adnan M. Al-Khatib CIS Dept. Faculty of Information
More informationLearning Example. Machine learning and our focus. Another Example. An example: data (loan application) The data and the goal
Learning Example Chapter 18: Learning from Examples 22c:145 An emergency room in a hospital measures 17 variables (e.g., blood pressure, age, etc) of newly admitted patients. A decision is needed: whether
More information1 of 7 31/10/2012 18:34
Regulatory Story Go to market news section Company TIDM Headline Released Number Ironveld PLC IRON Holding(s) in Company 18:01 31-Oct-2012 0348Q18 RNS Number : 0348Q Ironveld PLC 31 October 2012 TR-1:
More informationKnowledge Management Strategic Alignment in the Banking Sector at the Gulf Cooperation Council (GCC) Countries
Knowledge Management Strategic Alignment in the Banking Sector at the Gulf Cooperation Council (GCC) Countries A thesis submitted in fulfillment of the requirement of the degree of DOCTOR OF PHILOSOPHY
More informationHow To Prevent Network Attacks
Ali A. Ghorbani Wei Lu Mahbod Tavallaee Network Intrusion Detection and Prevention Concepts and Techniques )Spri inger Contents 1 Network Attacks 1 1.1 Attack Taxonomies 2 1.2 Probes 4 1.2.1 IPSweep and
More informationAn Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015
An Introduction to Data Mining for Wind Power Management Spring 2015 Big Data World Every minute: Google receives over 4 million search queries Facebook users share almost 2.5 million pieces of content
More informationDATA MINING TECHNIQUES AND APPLICATIONS
DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,
More informationFINAL JOINT PRETRIAL ORDER. This matter is before the Court on a Final Pretrial Conference pursuant to R. 4:25-1.
SUPERIOR COURT OF NEW JERSEY MIDDLESEX COUNTY:LAW DIVISION Docket No. Plaintiff(s), v. Defendant(s). FINAL JOINT PRETRIAL ORDER This matter is before the Court on a Final Pretrial Conference pursuant to
More informationContents. Dedication List of Figures List of Tables. Acknowledgments
Contents Dedication List of Figures List of Tables Foreword Preface Acknowledgments v xiii xvii xix xxi xxv Part I Concepts and Techniques 1. INTRODUCTION 3 1 The Quest for Knowledge 3 2 Problem Description
More informationAnalysis of WEKA Data Mining Algorithm REPTree, Simple Cart and RandomTree for Classification of Indian News
Analysis of WEKA Data Mining Algorithm REPTree, Simple Cart and RandomTree for Classification of Indian News Sushilkumar Kalmegh Associate Professor, Department of Computer Science, Sant Gadge Baba Amravati
More informationMeasuring Data Quality for Ongoing Improvement
Measuring Data Quality for Ongoing Improvement A Data Quality Assessment Framework Laura Sebastian-Coleman ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE
More informationData Mining as a tool to Predict the Churn Behaviour among Indian bank customers
Data Mining as a tool to Predict the Churn Behaviour among Indian bank customers Manjit Kaur Department of Computer Science Punjabi University Patiala, India manjit8718@gmail.com Dr. Kawaljeet Singh University
More informationIdentifying At-Risk Students Using Machine Learning Techniques: A Case Study with IS 100
Identifying At-Risk Students Using Machine Learning Techniques: A Case Study with IS 100 Erkan Er Abstract In this paper, a model for predicting students performance levels is proposed which employs three
More informationWebsite Localization in Iran: A Comparative-Descriptive Approach
Islamic Azad University Tehran Central Branch Graduate School English Department A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Arts in Translation Studies Website
More informationCERTIFICATE. University, Mullana (Amabala) for the award of the degree of Doctor of Philosophy in
CERTIFICATE This is to certify that the thesis titled Data Mining in Retailing in India : A Model Based Approach submitted by Ruchi Mittal to Maharishi Markandeshwar University, Mullana (Amabala) for the
More informationFactors Influencing the Adoption of Biometric Authentication in Mobile Government Security
Factors Influencing the Adoption of Biometric Authentication in Mobile Government Security Thamer Omar Alhussain Bachelor of Computing, Master of ICT School of Information and Communication Technology
More informationDECISION TREE INDUCTION FOR FINANCIAL FRAUD DETECTION USING ENSEMBLE LEARNING TECHNIQUES
DECISION TREE INDUCTION FOR FINANCIAL FRAUD DETECTION USING ENSEMBLE LEARNING TECHNIQUES Vijayalakshmi Mahanra Rao 1, Yashwant Prasad Singh 2 Multimedia University, Cyberjaya, MALAYSIA 1 lakshmi.mahanra@gmail.com
More informationMachine Learning. Chapter 18, 21. Some material adopted from notes by Chuck Dyer
Machine Learning Chapter 18, 21 Some material adopted from notes by Chuck Dyer What is learning? Learning denotes changes in a system that... enable a system to do the same task more efficiently the next
More informationBing Liu. Web Data Mining. Exploring Hyperlinks, Contents, and Usage Data. With 177 Figures. ~ Spring~r
Bing Liu Web Data Mining Exploring Hyperlinks, Contents, and Usage Data With 177 Figures ~ Spring~r Table of Contents 1. Introduction.. 1 1.1. What is the World Wide Web? 1 1.2. ABrief History of the Web
More informationMining. Practical. Data. Monte F. Hancock, Jr. Chief Scientist, Celestech, Inc. CRC Press. Taylor & Francis Group
Practical Data Mining Monte F. Hancock, Jr. Chief Scientist, Celestech, Inc. CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor Ei Francis Group, an Informs
More informationChapter 6. The stacking ensemble approach
82 This chapter proposes the stacking ensemble approach for combining different data mining classifiers to get better performance. Other combination techniques like voting, bagging etc are also described
More informationBIDM Project. Predicting the contract type for IT/ITES outsourcing contracts
BIDM Project Predicting the contract type for IT/ITES outsourcing contracts N a n d i n i G o v i n d a r a j a n ( 6 1 2 1 0 5 5 6 ) The authors believe that data modelling can be used to predict if an
More informationBy Abdullah Yusuf Ali. Al Fatihah. Introduction and Summary. C.42 - The running Commentary, in Rhythmic Prose
Praise be to Allah, the Cherisher and Sustainer of the Worlds; By Abdullah Yusuf Ali Al Fatihah Introduction and Summary C.42 - The running Commentary, in Rhythmic Prose First comes that beautiful Surah,
More informationClassification algorithm in Data mining: An Overview
Classification algorithm in Data mining: An Overview S.Neelamegam #1, Dr.E.Ramaraj *2 #1 M.phil Scholar, Department of Computer Science and Engineering, Alagappa University, Karaikudi. *2 Professor, Department
More informationA Two-Pass Statistical Approach for Automatic Personalized Spam Filtering
A Two-Pass Statistical Approach for Automatic Personalized Spam Filtering Khurum Nazir Junejo, Mirza Muhammad Yousaf, and Asim Karim Dept. of Computer Science, Lahore University of Management Sciences
More informationIDENTIFIC ATION OF SOFTWARE EROSION USING LOGISTIC REGRESSION
http:// IDENTIFIC ATION OF SOFTWARE EROSION USING LOGISTIC REGRESSION Harinder Kaur 1, Raveen Bajwa 2 1 PG Student., CSE., Baba Banda Singh Bahadur Engg. College, Fatehgarh Sahib, (India) 2 Asstt. Prof.,
More informationWord-for-Word Translation to facilitate learning of Qur anic Arabic
Word-for-Word Translation to facilitate learning of Qur anic Arabic In the name of Allah, the Most Gracious, the Most Merciful PREFACE Praise be to Allah, the Lord of the Worlds, Who has said in His Noble
More informationLUGHAT-UL-QURAN DICTIONARY OF QURAN VOLUME I. Ebook edition. Originally compiled in Urdu by Allama Ghulam Ahmad Parwez
LUGHAT-UL-QURAN DICTIONARY OF QURAN ح ج ث ت ب VOLUME I Ebook edition Originally compiled in Urdu by Allama Ghulam Ahmad Parwez Edited/Translated by: Sheraz Akhtar - Quranic Education Society Norway www.qes.no
More informationIntroduction FASTING IN ISLAM 1
Introduction There are many different views of the onlooker to the society that practices fasting. In many of the Gulf States the society suddenly changes for a whole month; with the working hours reduced
More informationUnit 5: KS2 Key Theme: Religion and the Individual Year 4 Spring Term
Unit 5: KS2 Key Theme: Religion and the Individual Year 4 Spring Term ABOUT THIS UNIT: Work in this unit will enable children to explore aspects of, Christianity and Islam and to discover what is expected
More informationExperiments in Web Page Classification for Semantic Web
Experiments in Web Page Classification for Semantic Web Asad Satti, Nick Cercone, Vlado Kešelj Faculty of Computer Science, Dalhousie University E-mail: {rashid,nick,vlado}@cs.dal.ca Abstract We address
More informationMachine Learning: Overview
Machine Learning: Overview Why Learning? Learning is a core of property of being intelligent. Hence Machine learning is a core subarea of Artificial Intelligence. There is a need for programs to behave
More informationData mining techniques: decision trees
Data mining techniques: decision trees 1/39 Agenda Rule systems Building rule systems vs rule systems Quick reference 2/39 1 Agenda Rule systems Building rule systems vs rule systems Quick reference 3/39
More informationActive Learning SVM for Blogs recommendation
Active Learning SVM for Blogs recommendation Xin Guan Computer Science, George Mason University Ⅰ.Introduction In the DH Now website, they try to review a big amount of blogs and articles and find the
More informationNetworks Using Data Mining
Recommending People in Social Networks Using Data Mining Slah A. Alsaleh MIT. Hons. (Griffith University, Australia), BEd. (CS) (King Saud University, Saudi Araibia) Thesis submitted in fulfilment of the
More informationIslamic Concept of Knowledge
Islamic Concept of Knowledge Shaykh-ul-Islam Dr Muhammad Tahir-ul-Qadri Minhaj-ul-Quran Publications Lahore, Pakistan Copyright 2007 by Minhaj-ul-Quran International, Lahore, Pakistan. All rights reserved.
More informationMachine Learning Algorithms and Predictive Models for Undergraduate Student Retention
, 225 October, 2013, San Francisco, USA Machine Learning Algorithms and Predictive Models for Undergraduate Student Retention Ji-Wu Jia, Member IAENG, Manohar Mareboyana Abstract---In this paper, we have
More informationCUSTOMER RELATIONSHIP MANAGEMENT AND ITS INFLUENCE ON CUSTOMER LOYALTY AT LIBERTY LIFE IN SOUTH AFRICA. Leon du Plessis MINOR DISSERTATION
CUSTOMER RELATIONSHIP MANAGEMENT AND ITS INFLUENCE ON CUSTOMER LOYALTY AT LIBERTY LIFE IN SOUTH AFRICA by Leon du Plessis MINOR DISSERTATION Submitted in partial fulfilment of the requirements for the
More informationThe HADITH - How it was Collected and Compiled
The HADITH - How it was Collected and Compiled By Dr. Mohammad Shafi Based on Lectures given at the Dar al Islam Teachers Institutes SOME DEFINITIONS Al-Qur an: The book that consists entirely of the words
More informationLetter position dyslexia in Arabic: From form to position
In press in Behavioural Neurology Letter position dyslexia in Arabic: From form to position Naama Friedmann and Manar Haddad-Hanna Language and Brain Lab, School of Education, Tel Aviv University Abstract.
More informationData Mining: A Preprocessing Engine
Journal of Computer Science 2 (9): 735-739, 2006 ISSN 1549-3636 2005 Science Publications Data Mining: A Preprocessing Engine Luai Al Shalabi, Zyad Shaaban and Basel Kasasbeh Applied Science University,
More informationClassification and Prediction
Classification and Prediction Slides for Data Mining: Concepts and Techniques Chapter 7 Jiawei Han and Micheline Kamber Intelligent Database Systems Research Lab School of Computing Science Simon Fraser
More informationPerfecting the Journey Spiritual and Legal Dimensions of Hajj 2013 DRAFT. Spiritual Insights from. Shaykh Zulfiqar Ahmad
Perfecting the Journey Spiritual and Legal Dimensions of Hajj 2013 DRAFT Spiritual Insights from Shaykh Zulfiqar Ahmad Compiled by Shaykh Husain Abdul Sattar Sacred Learning NFP 2013 All rights reserved.
More informationUniversiti Teknologi MARA. User Perception on Electronic Customer Relationship Management (E-CRM) Features in Online Hotel Reservation
Universiti Teknologi MARA User Perception on Electronic Customer Relationship Management (E-CRM) Features in Online Hotel Reservation HasUza Binti Azizan Thesis submitted in fulfillment of the requirements
More informationUniversité de Montpellier 2 Hugo Alatrista-Salas : hugo.alatrista-salas@teledetection.fr
Université de Montpellier 2 Hugo Alatrista-Salas : hugo.alatrista-salas@teledetection.fr WEKA Gallirallus Zeland) australis : Endemic bird (New Characteristics Waikato university Weka is a collection
More informationCONTENTS PREFACE 1 INTRODUCTION 1 2 DATA VISUALIZATION 19
PREFACE xi 1 INTRODUCTION 1 1.1 Overview 1 1.2 Definition 1 1.3 Preparation 2 1.3.1 Overview 2 1.3.2 Accessing Tabular Data 3 1.3.3 Accessing Unstructured Data 3 1.3.4 Understanding the Variables and Observations
More informationKeywords Data mining, Classification Algorithm, Decision tree, J48, Random forest, Random tree, LMT, WEKA 3.7. Fig.1. Data mining techniques.
International Journal of Emerging Research in Management &Technology Research Article October 2015 Comparative Study of Various Decision Tree Classification Algorithm Using WEKA Purva Sewaiwar, Kamal Kant
More informationMachine Learning Final Project Spam Email Filtering
Machine Learning Final Project Spam Email Filtering March 2013 Shahar Yifrah Guy Lev Table of Content 1. OVERVIEW... 3 2. DATASET... 3 2.1 SOURCE... 3 2.2 CREATION OF TRAINING AND TEST SETS... 4 2.3 FEATURE
More informationData Mining and Knowledge Discovery in Databases (KDD) State of the Art. Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland
Data Mining and Knowledge Discovery in Databases (KDD) State of the Art Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland 1 Conference overview 1. Overview of KDD and data mining 2. Data
More informationAn Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
More informationViewpoints in the Translation of the Holy QURAN
Viewpoints in the Translation of the Holy QURAN Ahmed Gumaa Siddiek Dawadami Community College Shaqra University - KSA 11911 E-mail: aahmedgumaa@yahoo.com Received: 30-05- 2012 Accepted: 09-06- 2012 Published:
More informationProfessor Anita Wasilewska. Classification Lecture Notes
Professor Anita Wasilewska Classification Lecture Notes Classification (Data Mining Book Chapters 5 and 7) PART ONE: Supervised learning and Classification Data format: training and test data Concept,
More information15 Organisation/ICT/02/01/15 Back- up
15 Organisation/ICT/02/01/15 Back- up 15.1 Description Backup is a copy of a program or file that is stored separately from the original. These duplicated copies of data on different storage media or additional
More informationEFFICIENCY OF DECISION TREES IN PREDICTING STUDENT S ACADEMIC PERFORMANCE
EFFICIENCY OF DECISION TREES IN PREDICTING STUDENT S ACADEMIC PERFORMANCE S. Anupama Kumar 1 and Dr. Vijayalakshmi M.N 2 1 Research Scholar, PRIST University, 1 Assistant Professor, Dept of M.C.A. 2 Associate
More informationA Secured Approach to Credit Card Fraud Detection Using Hidden Markov Model
A Secured Approach to Credit Card Fraud Detection Using Hidden Markov Model Twinkle Patel, Ms. Ompriya Kale Abstract: - As the usage of credit card has increased the credit card fraud has also increased
More informationUniversiti Teknologi MARA. Requirement Analysis Using UML Approach for Research Management System (RMS)
C^tJ O19OO(^'J.Tfi^'i- Universiti Teknologi MARA Requirement Analysis Using UML Approach for Research Management System (RMS) Enamul Hasan Bin Rusly Thesis submitted in fulfillment of the requirements
More informationA Content based Spam Filtering Using Optical Back Propagation Technique
A Content based Spam Filtering Using Optical Back Propagation Technique Sarab M. Hameed 1, Noor Alhuda J. Mohammed 2 Department of Computer Science, College of Science, University of Baghdad - Iraq ABSTRACT
More informationVolume 4, Issue 1, January 2016 International Journal of Advance Research in Computer Science and Management Studies
Volume 4, Issue 1, January 2016 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com Spam
More information