POST GRADUATE STUDENT
|
|
|
- Elijah Baker
- 9 years ago
- Views:
Transcription
1 POST GRADUATE STUDENT DOCTOR OF PHILOSOPHY IN INFORMATION TECHNOLOGY (PIT) NO. NAME MAIN SUPERVISOR / CO-SUPERVISOR RESEARCH AREA RESEARCH TITLE 1 AHMAD NAZARI BIN MOHD ROSE Prof. Dr. Mustafa Mat Deris Data Mining Accomplishing Better Reduction Through Hybrid Reduction in Softset Theory 2 MOHD ISA BIN AWANG Prof. Dr. Mustafa Mat Deris Data Mining Soft Set Based Approach for Categorical Data Clustering 3 ABDULLAH KHAN SHAH ZULLAH Assoc. Prof. Dr. Nazri Mohd Nawi / Assoc. Prof. Dr. Rozaida Ghazali Neural Network An Improved Cuckoo Search Based Neural Network Learning Algorithms For Data Classification 4 NORYUSLIZA BINTI ABDULLAH Prof. Dr. Rosziati Ibrahim Knowledge Management & Cloud Computing Artificial Bee Colony - Functional Link Neural Network for Classification Problems 5 SHAMSUL KAMAL BIN AHMAD KHALID Prof. Dr. Mustafa Mat Deris / Dr. Kamaruddin Malik Mohamad Security Reverse Engineering : From XML to UML For Generating of Requirement Specification Document Changes 6 YANA MAZWIN BINTI MOHMAD HASSIM Assoc. Prof. Dr. Rozaida Ghazali / Dr. Noorhaniza Wahid Neural Network Artificial Bee Colony - Functional Link Neural Network for Classification Problems 7 HANNANI BINTI AMAN Prof. Dr. Rosziati Ibrahim Engineering Reverse Engineering : From XML to UML For Generating of Requirement Specification Document Changes 8 NURUL ASWA BINTI OMAR Prof. Madya Dr. Rathiah Hashim / Dr.Shahreen Kasim Web Technology Semantic Similarity Features based for Integration Multiple Ontology 9 UMI KALSUM BINTI HASSAN Assoc. Prof. Dr. Nazri Mohd Nawi / Dr. Shahreen Kasim Neural Network New Approach Protein Domain Prediction Using Tan's Support Vector Machine 10 AZIZAN BIN ISMAIL Prof. Dr. Rosziati Ibrahim / Assoc. Prof. Dr. Mohd Najib Mohd Salleh Image Processing Indoor and Outdoor Image Classification using Soft Set Theory 11 NORLIDA BINTI HASSAN Assoc. Prof. Dr. Rozaida Ghazali Neural Network A Hybrid of Adaptive Neuro-Fuzzy Inference System (ANFIS) with Swarm Intelligence (SI) for Classification 1/15
2 12 LASISI AYODELE NOJEEM Assoc. Prof. Dr. Rozaida Ghazali / Dr. Kamaruddin Malik Mohamad Neural Network Anomaly Detection using Artificial Immune System 13 MOHD NORASRI BIN ISMAIL Prof. Dr. Rosziati Ibrahim / Dr. Mohd Farhan Md. Fudzee Multimedia Computing A Multi-Objectives Video Adaptation Decision Taking Engine for Optimizing Device Energy Consumption 14 SAIMA ANWAR LASHARI Prof. Dr. Rosziati Ibrahim / Dr. Norhalina Senan Data Mining FussCyier : An Efficient Medical Images Classification Using Fuzzy Soft Set 15 MUNIRAH BINTI MOHD YUSOF Assoc. Prof. Dr. Nazri Mohd Nawi / Dr. Noorhaniza Wahid Artificial Intelligence A Hybrid Technique of Case Based Reasoning and Bat Algorithm for Medical Data Classification 16 MARYAM TEMITAYO AHMED Prof. Dr. Rosziati Ibrahim Soft Engineering Improving The Effectiveness and Reliability of Mobile Application using the Concept of Reusability 17 NOOR AIDA BINTI HUSAINI Assoc. Prof. Dr. Rozaida Ghazali / Dr. Nureize Arbaiy Neural Network An Efficient Cuckoo Search Algorithm Using MCMC Random Walk 18 NORHAMREEZA BINTI ABDUL HAMID Assoc. Prof. Dr. Nazri Mohd Nawi / En. Azizul Azhar Ramli Neural Network An Improvement of Back Propagation Algorithm using Halley Optimisation Mehod For Classification Problems 19 SYED MUHAMMAD ZUBAIR REHMAN GILLANI Assoc. Prof. Dr. Nazri Mohd Nawi Neural Network An Improved BAT Algorithm With Guassian Distribution Random Walk 20 NIK SHAHIDAH AFIFI MD. TAJUDDIN Prof. Dr. Rosziati Ibrahim Image Processing Improvement of Image Compression by Using a New Wavelet Thresholding Algorithm 21 AHMED KHALAF ZAGER Assoc. Prof. Dr. Rozaida Ghazali / Prof. Dr. Mustafa bin Mat Deris Soft computing An Efficient Multi Join Query Optimization for RDBMS using Swarm Intelligent Approach 22 MUFTAH MOHAMED JOMAH BAROUD Assoc. Prof. Dr. Mohd Najib Mohd Salleh E-Learning Application using web-using technology An Architectural Framework for Designing user_specific Integrated Knowledge_based E Learning System 23 YUSOOF MOHAMMED HASHEEM Dr. Kamaruddin Malik Mohamad / Dr. Adeshina Adekunle Micheal Digital Forensic An Efficient Mobile Triage using Minimum Extractor 24 ROZLINI BINTI MOHAMED Assoc. Prof. Dr. Nazri Mohd Nawi Data Mining A Hybrid BAT Algorithm with k-nearest Neighbor for Classification of High Dimensional Problems 2/15
3 25 SALIHU IBRAHIM ANKA Prof. Dr. Rosziati Ibrahim Engineering A Hybrid Approach for Generating Requirement Specification from Mobile Apps using Reverse Engineering 26 YOUSIF HAMAD AHMED Prof.Dr. Rosziati Ibrahim Digital Forensics Carving of Tri-Fragmented Non-linear JPEG Images 27 RASHID NASEEM Prof. Dr. Mustafa Mat Deris Clustering Modularization using The Combination Of Multiple Clustering 28 OMOTUNDE HABEEB OLADAPO Prof. Dr. Rosziati Ibrahim Security A Hybrid Threat Modeling Approach using Attack Trees, Misuse Cases & Behavioral State Machines for Security Testing 29 ZAHRADDEEN ABUBAKAR PINDAR Dr. Sapi'ee Jamel Check Digit Systems A Message Authentication Code Based on 3D Nonassociative Quasigroups and Permutations (2-QMAC) 30 JAMAL UDDIN Assoc. Prof. Dr. Rozaida Ghazali / Prof. Dr. Mustafa Mat Deris Data Mining Bug Prioritization Using ABC Clustering with Rough Set Classification (CWC) 31 MOHD ZAKI BIN MOHD SALIKON Dr. Nureize Arbaiy / Prof. Dr. Mustafa Mat Deris Multi-Variate Analysis and Fuzzy Random Regression Multivariate Fuzzy Random Regression Analysis to Improve Prediction Ability in Simulatenous Uncertainties 32 HAZALILA BINTI KAMALUDIN Dr. Hairulnizam Mahdin RFID Data Management Data Management Issues in Radio Frequency Identification (RFID) 33 ABDULKADIR HASSAN DISINA Dr. Sapi'ee Jamel Security Dihedral Hybrid Cube Encryption Algorithm with the Data Set of Order 8 3/15
4 MASTER OF INFORMATION TECHNOLOGY - BY RESEARCH (KIT) NO. NAME MAIN SUPERVISOR RESEARCH AREA RESEARCH TITLE 1 W. NOR HAIZAN BINTI W. MOHAMED Assoc. Prof. Dr. Mohd Najib Mohd Salleh Data Mining A Hybrid Approach of Graph-based Reduced Error Pruning (GREP) for Pruning Decision Tree 2 ABDUL HALIM BIN OMAR Assoc. Prof. Dr. Mohd Najib Mohd Salleh Data Mining Improving Text Clustering Accuracy Based on Syngram Algorithm 3 SITI ZULAIKHA BINTI ABU BAKAR Assoc. Prof. Dr. Rozaida Ghazali Technology A Functional Link Neural Network For the Prediction of Daily Temperatures for Climate Changes Scenarios over malaysia 4 NURNABILAH BINTI SAMSUDIN Assoc. Prof. Dr. Rathiah Hashim / Dr. Noor Elaiza Abdul Khalid Technology Microarray Image Analysis Using Mathematical Morphology and Signal Processing 5 MOHAMMED RIYAD ABDULLAH Prof. Dr. Rosziati Ibrahim UML Specification GenSRS : Generation Of Requirements Specification (SRS) From Use Case Diagram And Sequence Diagram 6 ZURAIDA BINTI ABD. GHANI Assoc. Prof. Dr. Rathiah Hashim / Dr. Sarina Sulaiman Web Technology Enhancing Performance of Web Document Clustering for Search Based on SSC-KM 7 KOHSHELAN A/L SUNDARARAJOO Dr. Noorhaniza Wahid Soft Computing Improvement of Audio Feature Extraction Techniques in Traditional Indian Musical Instrument 8 SITI SALWANI YAACOB Dr. Hairulnizam Mahdin RFID RFID Data Reliability Optimizer Based on Two Dimension Bloom Filter 9 ZAHIDAH ISKANDAR SHAH Prof. Dr. Rosziati Ibrahim Engineering The Reusability For Android Development Using Reverse Engineering UML 10 CHIENG HOCK HUNG Dr. Noorhaniza Wahid Soft Computing The Genetic Simplified Swarm Algorithm for n-cites Open Loop Travelling Salesman Problem (notsp) 11 EINAS ALMARGHNI MOH. AZZOUBI Prof. Dr. Rosziati Ibrahim Image Processing An Enhancement Algorithm Using Gabor Filter For Fingerprint Recognition 12 JULIANA BINTI MOHAMED Dr. Mohd Farhan Md. Fudzee Service Level Agreement- (Sla) [Multimedia Computing] Managing The Quality of Service (QOS) Negotiation Strategy for Content Adaption Services to Improve (SLA) Acceptance Rate 4/15
5 13 MUHAMAD HANIF JOFRI Dr. Mohd Farhan Md. Fudzee Multimedia : Profiler - Content Adaptation A Hybrid Profiler to Minimize Energy Consumption Via Content Adaptation 14 KASHIF HUSSAIN TALPUR Assoc. Prof. Dr. Mohd Najib Mohd Salleh Fuzzy Neural Network Optimization Of Fuzzy Neural Networks Using Mine Blast Algorithm For Predicting Strength of Malaysian SMEs 15 NURUL ASHIKIN BINTI SAMAT Assoc. Prof. Dr. Mohd Najib Mohd Salleh Data Mining Improve Decision Tree Classifier with Particle Swarm Opitmization for Detecting Heart Disease 16 NG PUI XIANG Dr. Nureize Arbaiy Technology A Risk Based Multi-Level Multi-Objective Model for Production Planning Problem Under Uncertainties 17 AHMED NUR ELMI ABDI Dr. Kamaruddin Malik Mohamad Technology An Improved Stream Carving for MPEG-4 5/15
6 MASTER OF COMPUTER SCIENCE (SOFT COMPUTING) - MIXED MODE (CIS) NO. NAME MAIN SUPERVISOR RESEARCH TITLE 1 WADDAH WAHEEB HASSAN Assoc. Prof. Dr. Rozaida Ghazali The Performance of Soft Computing Techniques on Content Based SMS Spam Filtering 2 RIHAB SALAH KHAIRY Assoc. Prof. Dr. Rozaida Ghazali Artificial Immune System Based on Real Valued Negative Selection Algorithms For Anomlay Detection 3 AMEER SALEH HUSSEIN Assoc. Prof. Dr. Nazri Mohd Nawi The Effect Of Pre-Processing Techniques And Optimal Parameters On BPNN For Data Classification 6/15
7 MASTER OF COMPUTER SCIENCE (SOFTWARE ENGINEERING) - MIXED MODE (CIE) NO. NAME MAIN SUPERVISOR RESEARCH TITLE 1 AMANI SALEH ALIJA Prof. Dr. Rosziati Ibrahim Finding The Shortest Path Comparative Study 2 AMIT ROY Prof. Dr. Rosziati Ibrahim An Translation Algorithm from Bengali to English using Idioms based on Parsing and Tagging 3 AMERA H. M ALZOUBI Prof. Dr. Rosziati Ibrahim An Efficient Images Searching Algorithm using Histogram Extraction 4 SAIF KHALID ABDULLAH Prof. Dr. Rosziati Ibrahim Generating UML Class Diagram From Source Codes Using Multi-Threading Technique 5 NURAINI ABDULGANIYYI Dr. Noraini Ibrahim Specification of Vertical Semantic Consistency Rules of UML Class Diagram Refinement Using Logical Approach 6 SALIM TAHIR ALAKARI Dr. Mohd Zainuri Saringat Study on Schema Table Design Based on Entity Relationship Diagram and Class Diagram 7 MOSTAFA NSRE BRKA Dr. Noraini Ibrahim Comparative Study on Correctness of Test Case Generation Techniques for GUI Application 8 BESHAR DHAYA NOR Prof. Dr. Rosziati Ibrahim Comparative Analysis of Reusability Factors in Web and Mobile Applications 9 ZAINAB HASSAN MUHAMAD Prof. Dr. Rosziati Ibrahim Comparative Analysis of Testing : Mobile Applications Versus Web Applications 10 DHAFER ABDULAMEER ABDULMONIM Assoc.Prof. Dr. Mohd Najib Mohd Salleh A Comparative Analysis of Web-Based GIS Applicaton Using Usability Metric 11 IDA ARYANIE BINTI BAHRUDIN Dr. Noraini Ibrahim A Comparative Study on Testing Between Modified Waterfall Model and Extreme Programming In Small-Scale Project 12 KHALED ALHADI MEFTAH Dr. Mohd Zainuri Saringat Assesing Reusability Open Source 7/15
8 13 AHMED ESHTEWI S. GIUMA Dr. Mohd Zainuri Saringat Comparative Study on Database Speed Searching using linked list and B-TREE techniques 14 ABDOASSALAM HATAB M. KATY Pn. Ruhaya Ab Aziz Evaluating Usability of Open Source Using (QuIM) Model 15 ZEYAD ADNAN ABBAS Prof. Dr. Mustafa Mat Deris 16 OMRAN MAKI ABDELSALAM ALSSAHELI Pn. Siti Mahfuzoh Wasikon Comparative Study on Load Testing In Loadrunner and Loadui 17 ANWAR NASER FARK - - 8/15
9 MASTER OF COMPUTER SCIENCE (INFORMATION SECURITY) - MIXED MODE (CII) NO. NAME MAIN SUPERVISOR RESEARCH TITLE 1 LAU WEI KHANG Dr. Kamaruddin Malik Mohamad A Robust Android Based Watermaking with Micro QR Code 2 MOHAMED ABDISALAN SAID En. Shamsul Kamal Ahmad Khalid A Comparison Of Discrete Cosine Transform (DCT) And Discrete Wavelet Transform (DWT) Algorithm In Watermarking 3 ABDULLAHI MOHAMUD HASSAN En. Shamsul Kamal Ahmad Khalid A Robust Digital Image Watermarking Using Repetition Codes 9/15
10 MASTER OF COMPUTER SCIENCE (WEB TECHNOLOGY) - MIXED MODE (CIW) NO. NAME MAIN SUPERVISOR RESEARCH TITLE 1 MUHAMAD RAIS BIN ABD HALIM Dr. Hairulnizam Mahdin Web Transcript Verification Using Check Digit as Secure Number 2 SALMAN ABDULLAHI ALI Dr. Hairulnizam Mahdin Comparison of Web Development Technologies between ASP. NET and PHP using Customer Forum 3 HASIMAHWATI BINTI ABU YAMIN MOHAMUD MOHAMED HASSAN Dr. Mohd Farhan Mohd Fudzee A Quality of Service (Qos) Analysis of Web Content Adaptation Services 5 TAN MEE TING Assoc. Prof. Dr. Rathiah Hashim Consistent Representation of Family Ontology 10/15
11 LIST OF GRADUATES Doctor Of Philosophy In Technology (Graduated) NO. NAME MAIN SUPERVISOR RESEARCH AREA YEAR OF GRADUATION 1 Dr. Mohd Zainuri bin Saringat Prof. Dr. Rosziati Ibrahim Engineering Dr. Nurul Azma binti Abdullah Prof. Dr. Rosziati Ibrahim / Dr. Kamaruddin Malik Mohamad Security Dr. Muhammad Imran Prof. Madya Dr. Rathiah Hashim / Dr. Noor Elaiza Abdul Khalid Content Based Image Retrieval Dr. Rabiei b. Mamat Prof. Dr. Mustafa Mat Deris / Dr. Tutut Herawan Data Mining Dr. Habib Shah Prof. Madya Dr. Rozaida Ghazali Neural Network Dr. Adeshina Adekunle Micheal Prof. Madya Dr. Rathiah Hashim Medical Volume Visualization Dr. Bana Handaga Prof. Dr. Mustafa Mat Deris Data Mining Dr. Noraini Binti Ibrahim Prof. Dr. Rosziati Ibrahim Engineering (Model Driven Development) Dr. Norhalina Binti Senan Prof. Dr. Rosziati Ibrahim Data Mining and Multimedia Dr. Zarina Binti Mohamad Prof. Dr. Mustafa Mat Deris Grid Computing Dr. Ahmad Shukri Bin Mohd Noor Prof. Dr. Mustafa Mat Deris Grid Computing Dr. Zailani Bin Abdullah Prof. Dr. Mustafa Mat Deris Data Mining /15
12 13 Dr. Sapi'ee Bin Hj Jamel Prof. Dr. Mustafa Mat Deris Security Dr. Kamaruddin Malik Bin Mohamad Prof. Dr. Mustafa Mat Deris Digital Forensics Dr. Tutut Herawan Prof. Dr. Mustafa Mat Deris Data Mining /15
13 Master Of Technology - By Research (Graduated) NO. NAME MAIN SUPERVISOR RESEARCH AREA YEAR OF GRADUATION 1 Ashikin binti Ali Prof. Madya Dr. Rozaida Ghazali Neural Network Saima Anwar Lashari Prof. Dr. Rosziati Ibrahim Engineering Saadi Younes Prof. Madya Dr. Rathiah Hashim Engineering Syed Muhammad Zubair Rehman Gillani Prof. Madya Dr. Nazri Mohd Nawi Neural Networks Noor Aida Binti Husaini Prof. Madya Dr. Rozaida Ghazali Neural Network Norhamreeza Binti Abdul Hamid Prof. Madya Dr. Nazri Mohd Nawi Neural Networks Abdullah Omar Abdullah Bamatraf Prof. Dr. Rosziati Ibrahim Watermarking Iwan Tri Riyadi Yanto Prof. Dr. Mustafa Mat Deris Rough Set & Mathematics Helmi Adly Bin Mohd Noor Prof. Dr. Rosziati Ibrahim Image Processing Nurul Huda Binti Ahmad Zahari Prof. Madya Dr. Mohd Najib Mohd Salleh System Electronic Commerce Siti Mahfuzoh Binti Wasikon Prof. Dr. Mustafa Mat Deris Data Management Darenna Syahida Binti Suib Prof. Dr. Mustafa Mat Deris Cluster Computing /15
14 Master of Computer Science Mixed Mode (Graduated) NO. NAME MAIN SUPERVISOR RESEARCH AREA YEAR OF GRADUATION 1 ZAMZAM MOHAMED AHMED Dr. Kamaruddin Malik Mohamad CII ABDULADHIM MOHAMAD ALI ALAMARI Dr. Kamaruddin Malik Mohamad CII ABUBAKER ALI MOFTAH YAKHLEF Dr. Noraini Ibrahim CIE MUHD HANIS BIN HARUN Prof. Dr. Mustafa Mat Deris CIE SITI HALIMAH BAKORI@BAKRI Prof. Dr. Rosziati Ibrahim CIE MAISARAH BINTI YAMAN Prof. Dr. Rosziati Ibrahim CIE HAMIJAH MOHD RAHMAN Dr. Nureize Arbaiy CIS ABDULKADIR HASSAN DISINA Dr. Sapi'ee Jamel CII ZAHRADDEEN ABUBAKAR PINDAR Dr. Sapi'ee Jamel CII ELHADI ELFITORY ALGARAI Dr. Noraini Ibrahim CIE SENAN A MAWLOOD Dr. Sapi'ee Jamel CIE ABDULGADER A.B SINUSI Dr. Sapi'ee Jamel CIE /15
15 13 ABDULRAHMAN AHMED KHUDHUR Prof. Dr. Rosziati Ibrahim CIE ZAID QAYS ABDULLAH Dr. Sapi'ee Jamel CIE AMJED KHALEEL IBRAHEEM Prof. Madya Dr. Rozaida Ghazali CIS Mohammad Rabiul Islam En. Azizul Azhar Ramli CIS Walid Hasen Muftah Atomi Prof. Madya Dr. Nazri Mohd Nawi CIS 2013 update : february 2015 / ummu. 15/15
Master s Program in Information Systems
The University of Jordan King Abdullah II School for Information Technology Department of Information Systems Master s Program in Information Systems 2006/2007 Study Plan Master Degree in Information Systems
Course 803401 DSS. Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization
Oman College of Management and Technology Course 803401 DSS Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization CS/MIS Department Information Sharing
01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours.
(International Program) 01219141 Object-Oriented Modeling and Programming 3 (3-0) Object concepts, object-oriented design and analysis, object-oriented analysis relating to developing conceptual models
Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization
Turban, Aronson, and Liang Decision Support Systems and Intelligent Systems, Seventh Edition Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization
A Proposal for Constructing Relational Database from Class Diagram
A Proposal for Constructing Relational Database from Class Diagram Mohd Zainuri Saringat Faculty of Information Technology and Multimedia Universiti Tun Hussein Onn Malaysia Parit Raja, Batu Pahat, 86400,
life science data mining
life science data mining - '.)'-. < } ti» (>.:>,u» c ~'editors Stephen Wong Harvard Medical School, USA Chung-Sheng Li /BM Thomas J Watson Research Center World Scientific NEW JERSEY LONDON SINGAPORE.
Course Syllabus For Operations Management. Management Information Systems
For Operations Management and Management Information Systems Department School Year First Year First Year First Year Second year Second year Second year Third year Third year Third year Third year Third
Chapter 5. Warehousing, Data Acquisition, Data. Visualization
Decision Support Systems and Intelligent Systems, Seventh Edition Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization 5-1 Learning Objectives
The Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
Face Recognition For Remote Database Backup System
Face Recognition For Remote Database Backup System Aniza Mohamed Din, Faudziah Ahmad, Mohamad Farhan Mohamad Mohsin, Ku Ruhana Ku-Mahamud, Mustafa Mufawak Theab 2 Graduate Department of Computer Science,UUM
How To Create A Text Classification System For Spam Filtering
Term Discrimination Based Robust Text Classification with Application to Email Spam Filtering PhD Thesis Khurum Nazir Junejo 2004-03-0018 Advisor: Dr. Asim Karim Department of Computer Science Syed Babar
Doctor of Philosophy in Computer Science
Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects
LIST OF EXPERTISE FACULTY OF ELECTRICAL ENGINEERING
LIST OF EXPERTISE FACULTY OF ELECTRICAL ENGINEERING : Ahmad Aizan bin Zulkefle Kelayakan Akademik : M.Sc. in Elect. Engineering & Power Electronics, Univ. of Bradford, UK. B.Eng in Electrical Engineering,
Computer Information Systems
Computer Information System Courses Description 0309331 0306331 0309332 0306332 0309334 0306334 0309341 0306341 0309353 0306353 Database Systems Introduction to database systems, entity-relationship data
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet
An Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
The University of Jordan
The University of Jordan Master in Web Intelligence Non Thesis Department of Business Information Technology King Abdullah II School for Information Technology The University of Jordan 1 STUDY PLAN MASTER'S
A Content based Spam Filtering Using Optical Back Propagation Technique
A Content based Spam Filtering Using Optical Back Propagation Technique Sarab M. Hameed 1, Noor Alhuda J. Mohammed 2 Department of Computer Science, College of Science, University of Baghdad - Iraq ABSTRACT
ATHENS 2013 SUMMIT HELLAS IRAQ B2B 19-20 Νοεμβρίου METROPOLITAN HOTEL
ATHENS 2013 SUMMIT HELLAS IRAQ B2B 19-20 Νοεμβρίου METROPOLITAN HOTEL Στοιχεία Εταιρείας Mr. Bashar Ali Mohammed Head of delegation Delta Company Vice President of the Iraq Contractors Union, Erbil Branch
Data Mining: Concepts and Techniques. Jiawei Han. Micheline Kamber. Simon Fräser University К MORGAN KAUFMANN PUBLISHERS. AN IMPRINT OF Elsevier
Data Mining: Concepts and Techniques Jiawei Han Micheline Kamber Simon Fräser University К MORGAN KAUFMANN PUBLISHERS AN IMPRINT OF Elsevier Contents Foreword Preface xix vii Chapter I Introduction I I.
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING USING NEURAL NETWORKS JothiKumar.R 1, Sivabalan.R.V 2 1 Research scholar, Noorul Islam University, Nagercoil, India Assistant Professor, Adhiparasakthi College
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
DATA MINING TECHNIQUES AND APPLICATIONS
DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software
A Review of Data Mining Techniques
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks
A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks Text Analytics World, Boston, 2013 Lars Hard, CTO Agenda Difficult text analytics tasks Feature extraction Bio-inspired
Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008
Professional Organization Checklist for the Computer Science Curriculum Updates Association of Computing Machinery Computing Curricula 2008 The curriculum guidelines can be found in Appendix C of the report
Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016
Network Machine Learning Research Group S. Jiang Internet-Draft Huawei Technologies Co., Ltd Intended status: Informational October 19, 2015 Expires: April 21, 2016 Abstract Network Machine Learning draft-jiang-nmlrg-network-machine-learning-00
How To Use Neural Networks In Data Mining
International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and
PCB DETECTION AND CLASSIFICATION USING DIGITAL IMAGEPROCESSING
PCB DETECTION AND CLASSIFICATION USING DIGITAL IMAGEPROCESSING 1 Shashikumar Vishwakarma, 2 SahilTikke, 3 Chinmay Manurkar, 4 Ankit Thanekar 1,2,3,4 Electronics and Telecommunication (B.E), KJSIEIT, (India)
CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing
CS Master Level Courses and Areas The graduate courses offered may change over time, in response to new developments in computer science and the interests of faculty and students; the list of graduate
An Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015
An Introduction to Data Mining for Wind Power Management Spring 2015 Big Data World Every minute: Google receives over 4 million search queries Facebook users share almost 2.5 million pieces of content
Integrated Data Mining and Knowledge Discovery Techniques in ERP
Integrated Data Mining and Knowledge Discovery Techniques in ERP I Gandhimathi Amirthalingam, II Rabia Shaheen, III Mohammad Kousar, IV Syeda Meraj Bilfaqih I,III,IV Dept. of Computer Science, King Khalid
Quality Guideline : TMR&D/QMS/GL/018. Handling Customer Satisfaction Survey For Project, Product and Services
PROCESS PROFILE Process Name Process Lead Process Author Process Owner Asst. General Manager Strategy Management Asst. General Manager Strategy Management Asst. General Manager Strategy Management Version
ICSES Journal on Image Processing and Pattern Recognition (IJIPPR), Aug. 2015, Vol. 1, No. 1
2 ICSES Journal on Image Processing and Pattern Recognition (IJIPPR), Aug. 2015, Vol. 1, No. 1 1. About ICSES Journal on Image Processing and Pattern Recognition (IJIPPR) The ICSES Journal on Image Processing
Spatial Data Mining Methods and Problems
Spatial Data Mining Methods and Problems Abstract Use summarizing method,characteristics of each spatial data mining and spatial data mining method applied in GIS,Pointed out that the space limitations
Introduction to Pattern Recognition
Introduction to Pattern Recognition Selim Aksoy Department of Computer Engineering Bilkent University [email protected] CS 551, Spring 2009 CS 551, Spring 2009 c 2009, Selim Aksoy (Bilkent University)
Keywords: Information Retrieval, Vector Space Model, Database, Similarity Measure, Genetic Algorithm.
Volume 3, Issue 8, August 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Effective Information
REVIEW OF HEART DISEASE PREDICTION SYSTEM USING DATA MINING AND HYBRID INTELLIGENT TECHNIQUES
REVIEW OF HEART DISEASE PREDICTION SYSTEM USING DATA MINING AND HYBRID INTELLIGENT TECHNIQUES R. Chitra 1 and V. Seenivasagam 2 1 Department of Computer Science and Engineering, Noorul Islam Centre for
Database Marketing, Business Intelligence and Knowledge Discovery
Database Marketing, Business Intelligence and Knowledge Discovery Note: Using material from Tan / Steinbach / Kumar (2005) Introduction to Data Mining,, Addison Wesley; and Cios / Pedrycz / Swiniarski
Graduate Co-op Students Information Manual. Department of Computer Science. Faculty of Science. University of Regina
Graduate Co-op Students Information Manual Department of Computer Science Faculty of Science University of Regina 2014 1 Table of Contents 1. Department Description..3 2. Program Requirements and Procedures
Knowledge Discovery from patents using KMX Text Analytics
Knowledge Discovery from patents using KMX Text Analytics Dr. Anton Heijs [email protected] Treparel Abstract In this white paper we discuss how the KMX technology of Treparel can help searchers
Semantically Steered Clinical Decision Support Systems
Semantically Steered Clinical Decision Support Systems By Eider Sanchez Herrero Department of Computer Science and Artificial Intelligence University of the Basque Country Advisors Prof. Manuel Graña Romay
GUIDELINE TALENT GROOMING PROGRAMME FOR TECHNICAL HEALTHCARE PROFESSIONALS
D GUIDELINE TALENT GROOMING PROGRAMME FOR TECHNICAL HEALTHCARE PROFESSIONALS Institute for Health Management Ministry of Health Malaysia http://www.ihm.moh.gov.my e-mail: [email protected] PUBLICATION
Master of Science in Health Information Technology Degree Curriculum
Master of Science in Health Information Technology Degree Curriculum Core courses: 8 courses Total Credit from Core Courses = 24 Core Courses Course Name HRS Pre-Req Choose MIS 525 or CIS 564: 1 MIS 525
14.10.2014. Overview. Swarms in nature. Fish, birds, ants, termites, Introduction to swarm intelligence principles Particle Swarm Optimization (PSO)
Overview Kyrre Glette kyrrehg@ifi INF3490 Swarm Intelligence Particle Swarm Optimization Introduction to swarm intelligence principles Particle Swarm Optimization (PSO) 3 Swarms in nature Fish, birds,
A Demonstration of a Robust Context Classification System (CCS) and its Context ToolChain (CTC)
A Demonstration of a Robust Context Classification System () and its Context ToolChain (CTC) Martin Berchtold, Henning Günther and Michael Beigl Institut für Betriebssysteme und Rechnerverbund Abstract.
INFORMATION SECURITY STANDARDS DEVELOPMENT IN MALAYSIA
INFORMATION SECURITY STANDARDS DEVELOPMENT IN MALAYSIA By THAIB MUSTAFA, CHAIRMAN TECHNICAL COMMITTEE FOR INFORMATION SECURITY (TC/G/5) INDUSTRY STANDARDS COMMITTEE FOR INFORMATION TECHNOLOGY, COMMUNICATION
SYLLABUSES FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (applicable to students admitted in the academic year 2015-2016 and thereafter)
MSc(CompSc)-1 (SUBJECT TO UNIVERSITY S APPROVAL) SYLLABUSES FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (applicable to students admitted in the academic year 2015-2016 and thereafter) The curriculum
REVIEW ON PREDICTION SYSTEM FOR HEART DIAGNOSIS USING DATA MINING TECHNIQUES
International Journal of Latest Research in Engineering and Technology (IJLRET) ISSN: 2454-5031(Online) ǁ Volume 1 Issue 5ǁOctober 2015 ǁ PP 09-14 REVIEW ON PREDICTION SYSTEM FOR HEART DIAGNOSIS USING
Non-negative Matrix Factorization (NMF) in Semi-supervised Learning Reducing Dimension and Maintaining Meaning
Non-negative Matrix Factorization (NMF) in Semi-supervised Learning Reducing Dimension and Maintaining Meaning SAMSI 10 May 2013 Outline Introduction to NMF Applications Motivations NMF as a middle step
Students who successfully complete the Health Science Informatics major will be able to:
Health Science Informatics Program Requirements Hours: 72 hours Informatics Core Requirements - 31 hours INF 101 Seminar Introductory Informatics (1) INF 110 Foundations in Technology (3) INF 120 Principles
THE FORMAL SPECIFICATION FOR THE INVENTORY SYSTEM USING Z LANGUAGE
THE FORMAL SPECIFICATION FOR THE INVENTORY SYSTEM USING Z LANGUAGE Siti Halimah Bakri 1, Hanis Harun 2, Amera Alzoubi 3, and Rosziati Ibrahim 4 1 [email protected], 2 [email protected], 3
Master of Science in Computer Science
Master of Science in Computer Science Background/Rationale The MSCS program aims to provide both breadth and depth of knowledge in the concepts and techniques related to the theory, design, implementation,
An Algorithm for Classification of Five Types of Defects on Bare Printed Circuit Board
IJCSES International Journal of Computer Sciences and Engineering Systems, Vol. 5, No. 3, July 2011 CSES International 2011 ISSN 0973-4406 An Algorithm for Classification of Five Types of Defects on Bare
REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])
305 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference
An Introduction to Health Informatics for a Global Information Based Society
An Introduction to Health Informatics for a Global Information Based Society A Course proposal for 2010 Healthcare Industry Skills Innovation Award Sponsored by the IBM Academic Initiative submitted by
CHAPTER 7 CONCLUSION AND FUTURE WORK
158 CHAPTER 7 CONCLUSION AND FUTURE WORK The aim of this thesis was to present robust watermarking techniques for medical image. Section 7.1, consolidates the contributions made by the researcher and Section
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic
International Journal of Research in Advent Technology Available Online at: http://www.ijrat.org
IMPROVING PEFORMANCE OF BAYESIAN SPAM FILTER Firozbhai Ahamadbhai Sherasiya 1, Prof. Upen Nathwani 2 1 2 Computer Engineering Department 1 2 Noble Group of Institutions 1 [email protected] ABSTARCT:
Smart Security by Predicting Future Crime with GIS and LBS Technology on Mobile Device
Smart Security by Predicting Future Crime with GIS and LBS Technology on Mobile Device Gaurav Kumar 1, P. S. Game 2 1 Pune Institute of Computer Technology, Savitribai Phule Pune University, Pune, India
Contents. Dedication List of Figures List of Tables. Acknowledgments
Contents Dedication List of Figures List of Tables Foreword Preface Acknowledgments v xiii xvii xix xxi xxv Part I Concepts and Techniques 1. INTRODUCTION 3 1 The Quest for Knowledge 3 2 Problem Description
Data Mining and Knowledge Discovery in Databases (KDD) State of the Art. Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland
Data Mining and Knowledge Discovery in Databases (KDD) State of the Art Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland 1 Conference overview 1. Overview of KDD and data mining 2. Data
USTC Course for students entering Clemson F2013 Equivalent Clemson Course Counts for Clemson MS Core Area. CPSC 822 Case Study in Operating Systems
USTC Course for students entering Clemson F2013 Equivalent Clemson Course Counts for Clemson MS Core Area 398 / SE05117 Advanced Cover software lifecycle: waterfall model, V model, spiral model, RUP and
Fluency With Information Technology CSE100/IMT100
Fluency With Information Technology CSE100/IMT100 ),7 Larry Snyder & Mel Oyler, Instructors Ariel Kemp, Isaac Kunen, Gerome Miklau & Sean Squires, Teaching Assistants University of Washington, Autumn 1999
ANALYTICS IN BIG DATA ERA
ANALYTICS IN BIG DATA ERA ANALYTICS TECHNOLOGY AND ARCHITECTURE TO MANAGE VELOCITY AND VARIETY, DISCOVER RELATIONSHIPS AND CLASSIFY HUGE AMOUNT OF DATA MAURIZIO SALUSTI SAS Copyr i g ht 2012, SAS Ins titut
Improving Decision Making and Managing Knowledge
Improving Decision Making and Managing Knowledge Decision Making and Information Systems Information Requirements of Key Decision-Making Groups in a Firm Senior managers, middle managers, operational managers,
GSM Based Electrical Control System for Smart Home Application
Journal of Convergence Information Technology GSM Based Electrical Control System for Smart Home Application Faculty of Electrical and Electronic Engineering Universiti Tun Hussein Onn Malaysia, 86400
FEATURE SELECTIONS AND CLASSIFICATION MODEL FOR CUSTOMER CHURN
FEATURE SELECTIONS AND CLASSIFICATION MODEL FOR CUSTOMER CHURN 1 SYAFIQAH NAFIS, 2 MOKHAIRI MAKHTAR, 3 MOHD KHALID AWANG, 4 M. NORDIN A.RAHMAN, 5 MUSTAFA MAT DERIS 1, 2, 3, 4 Faculty of Informatics and
Big Data Analytics and Optimization
Big Data Analytics and Optimization C e r t i f i c a t e P r o g r a m i n E n g i n e e r i n g E x c e l l e n c e e.edu.in http://www.insof LIST OF COURSES Essential Business Skills for a Data Scientist...
Engineering Conference
2014 8th Malaysian Software Engineering Conference (MySEC 2014) Langkawi, Malaysia 23-24 September 2014 IEEE Catalog Number: CFP1401R-POD ISBN: 978-1-4799-5440-7 TABLE OF CONTENTS Front Cover i Welcome
FINAL RESULTS - SPRING SEMESTER 2012 ISLAMABAD CAMPUS
FINAL RESULTS - SPRING SEMESTER 202 BBA/MBA/MS/MSc/MCS/BCS Programs Issue Date: June 30, 202 BBA Program Zahra Malik 0-200 Basic Management 82 B Pakistan Studies 96 A Basic Marketing 93 A English Grammar
Machine Learning and Data Mining. Fundamentals, robotics, recognition
Machine Learning and Data Mining Fundamentals, robotics, recognition Machine Learning, Data Mining, Knowledge Discovery in Data Bases Their mutual relations Data Mining, Knowledge Discovery in Databases,
Analysis of Data Mining Concepts in Higher Education with Needs to Najran University
590 Analysis of Data Mining Concepts in Higher Education with Needs to Najran University Mohamed Hussain Tawarish 1, Farooqui Waseemuddin 2 Department of Computer Science, Najran Community College. Najran
A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING
A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING AZRUDDIN AHMAD, GOBITHASAN RUDRUSAMY, RAHMAT BUDIARTO, AZMAN SAMSUDIN, SURESRAWAN RAMADASS. Network Research Group School of
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
Towards applying Data Mining Techniques for Talent Mangement
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Towards applying Data Mining Techniques for Talent Mangement Hamidah Jantan 1,
Big Data: Image & Video Analytics
Big Data: Image & Video Analytics How it could support Archiving & Indexing & Searching Dieter Haas, IBM Deutschland GmbH The Big Data Wave 60% of internet traffic is multimedia content (images and videos)
Research-based Learning (RbL) in Computing Courses for Senior Engineering Students
Research-based Learning (RbL) in Computing Courses for Senior Engineering Students Khaled Bashir Shaban, and Mahmoud Abdulwahed Computer Science and Engineering Department; and CRU, Dean s Office Best
Search and Information Retrieval
Search and Information Retrieval Search on the Web 1 is a daily activity for many people throughout the world Search and communication are most popular uses of the computer Applications involving search
A Survey on Web Mining From Web Server Log
A Survey on Web Mining From Web Server Log Ripal Patel 1, Mr. Krunal Panchal 2, Mr. Dushyantsinh Rathod 3 1 M.E., 2,3 Assistant Professor, 1,2,3 computer Engineering Department, 1,2 L J Institute of Engineering
Sanjeev Kumar. contribute
RESEARCH ISSUES IN DATAA MINING Sanjeev Kumar I.A.S.R.I., Library Avenue, Pusa, New Delhi-110012 [email protected] 1. Introduction The field of data mining and knowledgee discovery is emerging as a
Supply Chain Management in Telecommunication Industry: The Mediating Role of Logistics Integration
Supply Chain Management in Telecommunication Industry: The Mediating Role of Logistics Integration Noraini Ahmad 1, Adam Mohd Saifudin 2 1 Othman Yoep Abdullah Graduate School of Business Universiti Utara
Web Mining. Margherita Berardi LACAM. Dipartimento di Informatica Università degli Studi di Bari [email protected]
Web Mining Margherita Berardi LACAM Dipartimento di Informatica Università degli Studi di Bari [email protected] Bari, 24 Aprile 2003 Overview Introduction Knowledge discovery from text (Web Content
Welcome. Data Mining: Updates in Technologies. Xindong Wu. Colorado School of Mines Golden, Colorado 80401, USA
Welcome Xindong Wu Data Mining: Updates in Technologies Dept of Math and Computer Science Colorado School of Mines Golden, Colorado 80401, USA Email: xwu@ mines.edu Home Page: http://kais.mines.edu/~xwu/
Principles of Data Mining by Hand&Mannila&Smyth
Principles of Data Mining by Hand&Mannila&Smyth Slides for Textbook Ari Visa,, Institute of Signal Processing Tampere University of Technology October 4, 2010 Data Mining: Concepts and Techniques 1 Differences
Knowledge Based System for Detection and Prevention of DDoS Attacks using Fuzzy logic
Knowledge Based System for Detection and Prevention of DDoS Attacks using Fuzzy logic Amit Khajuria 1, Roshan Srivastava 2 1 M. Tech Scholar, Computer Science Engineering, Lovely Professional University,
Data Mining Analytics for Business Intelligence and Decision Support
Data Mining Analytics for Business Intelligence and Decision Support Chid Apte, T.J. Watson Research Center, IBM Research Division Knowledge Discovery and Data Mining (KDD) techniques are used for analyzing
Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup
Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor
How To Get A Computer Engineering Degree
COMPUTER ENGINEERING GRADUTE PROGRAM FOR MASTER S DEGREE (With Thesis) PREPARATORY PROGRAM* COME 27 Advanced Object Oriented Programming 5 COME 21 Data Structures and Algorithms COME 22 COME 1 COME 1 COME
BIG DATA IN HEALTHCARE THE NEXT FRONTIER
BIG DATA IN HEALTHCARE THE NEXT FRONTIER Divyaa Krishna Sonnad 1, Dr. Jharna Majumdar 2 2 Dean R&D, Prof. and Head, 1,2 Dept of CSE (PG), Nitte Meenakshi Institute of Technology Abstract: The world of
Data Mining mit der JMSL Numerical Library for Java Applications
Data Mining mit der JMSL Numerical Library for Java Applications Stefan Sineux 8. Java Forum Stuttgart 07.07.2005 Agenda Visual Numerics JMSL TM Numerical Library Neuronale Netze (Hintergrund) Demos Neuronale
Learning is a very general term denoting the way in which agents:
What is learning? Learning is a very general term denoting the way in which agents: Acquire and organize knowledge (by building, modifying and organizing internal representations of some external reality);
IEEE 2015-2016 JAVA TITLES
ECWAY ECHNOLGIES IEEE 2015-2016 JAVA TITLES BE, B.TECH, ME, M.TECH, MSC, MCA PROJECTS Abstract: Introduction: Literature Survey: System Analysis: Existing System: Disadvantages: Proposed System: Advantages:
SURVEY OF TEXT CLASSIFICATION ALGORITHMS FOR SPAM FILTERING
I J I T E ISSN: 2229-7367 3(1-2), 2012, pp. 233-237 SURVEY OF TEXT CLASSIFICATION ALGORITHMS FOR SPAM FILTERING K. SARULADHA 1 AND L. SASIREKA 2 1 Assistant Professor, Department of Computer Science and
A Partially Supervised Metric Multidimensional Scaling Algorithm for Textual Data Visualization
A Partially Supervised Metric Multidimensional Scaling Algorithm for Textual Data Visualization Ángela Blanco Universidad Pontificia de Salamanca [email protected] Spain Manuel Martín-Merino Universidad
INFORMATION TECHNOLOGY (INFO)
INFORMATION TECHNOLOGY (INFO) This is a list of the Information Technology (INFO) available at KPU. Please note: Access to 1000-level is limited to Bachelor of Technology in Information Technology, Computer
