Results 41 to 50 of about 1,564 (123)

ALGORITMA COCKE YOUNGER KASAMI UNTUK DETEKSI STRUKTUR KALIMAT DAN MEREKOMENDASIKANYA MENGGUNAKAN ALGORITMA DAMERAU LEVENSHTEIN DISTANCE

open access: yesTelematika, 2020
Penggunaan kata baku dan struktur kalimat merupakan salah satu syarat dalam penulisan laporan penelitian, tanpa disadari kesalahan penulisan dapat terjadi baik berupa kesalahan pengetikan maupun pada struktur kalimat, beberapa penyebabnya ialah kebiasaan saat menulis pesan pendek, berkembangnya bahasa yang digunakan sehari-hari dan susunan keyboard ...
Budi Prabowo   +2 more
openaire   +2 more sources

Natural Language Processing Algorithms to Improve Digital Marketing Data Quality and Its Ethical Implications

open access: yesPsychology &Marketing, Volume 42, Issue 7, Page 1946-1957, July 2025.
ABSTRACT The ethical implications of personalization in digital marketing are significantly greater when companies adapt their marketing actions to individual consumer preferences. While this approach helps to reduce oversaturation and a sense of irrelevance among consumers, it also raises concerns about privacy and potential algorithmic bias. One form
Sergi Pons   +3 more
wiley   +1 more source

Reasoning about Social Semantic Web Applications using String Similarity and Frame Logic [PDF]

open access: yes, 2010
Social semantic Web or Web 3.0 application gained major attention from academia and industry in recent times. Such applications try to take advantage of user supplied meta data, using ideas from the semantic Web initiative, in order to provide better ...
Cubrilo, Mirko   +2 more
core  

MSFA: Multiple System Fingerprint Attack Scheme for IoT Anonymous Communication

open access: yesSecurity and Communication Networks, Volume 2019, Issue 1, 2019., 2019
For the past few years, Internet of Things (IoT) has developed rapidly and been extensively used. However, its transmission security and privacy protection are insufficient, which limits the development of IoT to a certain extent. As a technology of IoT information transmission, anonymous communication technology comes into being as an important means ...
Tianbo Lu   +7 more
wiley   +1 more source

Distance Measurement Methods for Improved Insider Threat Detection

open access: yesSecurity and Communication Networks, Volume 2018, Issue 1, 2018., 2018
Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can provide a solution, but these methods often fail to take into account changes of behaviour of users. This work builds on a published method of detecting insider threats and applies
Owen Lo   +4 more
wiley   +1 more source

Koreksi Ejaan Query Bahasa Indonesia Menggunakan Algoritme Damerau Levenshtein [PDF]

open access: yes, 2010
Query spelling on search engine is important to improve the quality information searching result. When user types query for search engine input, sometime spelling mistakes occurred due to position of keyboard and finger movement while typing.
Adisantoso, J. (Julio)   +1 more
core  

Context-sensitive Spelling Correction Using Google Web 1T 5-Gram Information

open access: yes, 2012
In computing, spell checking is the process of detecting and sometimes providing spelling suggestions for incorrectly spelled words in a text. Basically, a spell checker is a computer program that uses a dictionary of words to perform spell checking. The
Alwani, Mohammad, Bassil, Youssef
core   +2 more sources

Seamless and Secure VR: Adapting and Evaluating Established Authentication Systems for Virtual Reality [PDF]

open access: yes, 2017
Virtual reality (VR) headsets are enabling a wide range of new opportunities for the user. For example, in the near future users may be able to visit virtual shopping malls and virtually join international conferences.
Alt, Florian   +6 more
core   +1 more source

Text‐to‐speech and virtual reality agents in primary school classroom environments

open access: yesJournal of Computer Assisted Learning, Volume 40, Issue 6, Page 2964-2984, December 2024.
Abstract Background The integration of Text‐to‐Speech (TTS) and virtual reality (VR) technologies in K‐12 education is an emerging trend. However, little is known about how students perceive these technologies and whether these technologies effectively facilitate learning.
Laduona Dai   +7 more
wiley   +1 more source

Action Selection in Everyday Activities: The Opportunistic Planning Model

open access: yesCognitive Science, Volume 48, Issue 4, April 2024.
Abstract While action selection strategies in well‐defined domains have received considerable attention, little is yet known about how people choose what to do next in ill‐defined tasks. In this contribution, we shed light on this issue by considering everyday tasks, which in many cases have a multitude of possible solutions (e.g., it does not matter ...
Petra Wenzl, Holger Schultheis
wiley   +1 more source

Home - About - Disclaimer - Privacy