Results 41 to 50 of about 1,592 (146)

ALGORITMA COCKE YOUNGER KASAMI UNTUK DETEKSI STRUKTUR KALIMAT DAN MEREKOMENDASIKANYA MENGGUNAKAN ALGORITMA DAMERAU LEVENSHTEIN DISTANCE

open access: yesTelematika, 2020
Penggunaan kata baku dan struktur kalimat merupakan salah satu syarat dalam penulisan laporan penelitian, tanpa disadari kesalahan penulisan dapat terjadi baik berupa kesalahan pengetikan maupun pada struktur kalimat, beberapa penyebabnya ialah kebiasaan saat menulis pesan pendek, berkembangnya bahasa yang digunakan sehari-hari dan susunan keyboard ...
Budi Prabowo   +2 more
openaire   +2 more sources

Reasoning about Social Semantic Web Applications using String Similarity and Frame Logic [PDF]

open access: yes, 2010
Social semantic Web or Web 3.0 application gained major attention from academia and industry in recent times. Such applications try to take advantage of user supplied meta data, using ideas from the semantic Web initiative, in order to provide better ...
Cubrilo, Mirko   +2 more
core  

A Bibliometric Analysis to Study the Evolution of Artificial Intelligence in Business Ethics

open access: yesBusiness Ethics, the Environment &Responsibility, Volume 35, Issue 2, Page 655-677, April 2026.
ABSTRACT The contemporary world is witnessing the pervasive diffusion of artificial intelligence (AI) across diverse societal domains. Concurrently, the implementation of these technologies in numerous management areas raises novel and critical ethical considerations.
Mario Tani   +3 more
wiley   +1 more source

Constructed Response Paragraph Jigsaw Puzzle Test for Measuring Structure Building Ability

open access: yesApplied Cognitive Psychology, Volume 40, Issue 1, January/February 2026.
ABSTRACT This study examined whether paragraph jigsaw puzzle (PJP) test can be used to measure structure building ability, the ability to construct cohesive mental representations. We developed a constructed‐response version of the PJP test and scored it with a string‐similarity algorithm that allows for partial credit.
Hwimin Kim   +3 more
wiley   +1 more source

Koreksi Ejaan Query Bahasa Indonesia Menggunakan Algoritme Damerau Levenshtein [PDF]

open access: yes, 2010
Query spelling on search engine is important to improve the quality information searching result. When user types query for search engine input, sometime spelling mistakes occurred due to position of keyboard and finger movement while typing.
Adisantoso, J. (Julio)   +1 more
core  

Natural Language Processing Algorithms to Improve Digital Marketing Data Quality and Its Ethical Implications

open access: yesPsychology &Marketing, Volume 42, Issue 7, Page 1946-1957, July 2025.
ABSTRACT The ethical implications of personalization in digital marketing are significantly greater when companies adapt their marketing actions to individual consumer preferences. While this approach helps to reduce oversaturation and a sense of irrelevance among consumers, it also raises concerns about privacy and potential algorithmic bias. One form
Sergi Pons   +3 more
wiley   +1 more source

MSFA: Multiple System Fingerprint Attack Scheme for IoT Anonymous Communication

open access: yesSecurity and Communication Networks, Volume 2019, Issue 1, 2019., 2019
For the past few years, Internet of Things (IoT) has developed rapidly and been extensively used. However, its transmission security and privacy protection are insufficient, which limits the development of IoT to a certain extent. As a technology of IoT information transmission, anonymous communication technology comes into being as an important means ...
Tianbo Lu   +7 more
wiley   +1 more source

Context-sensitive Spelling Correction Using Google Web 1T 5-Gram Information

open access: yes, 2012
In computing, spell checking is the process of detecting and sometimes providing spelling suggestions for incorrectly spelled words in a text. Basically, a spell checker is a computer program that uses a dictionary of words to perform spell checking. The
Alwani, Mohammad, Bassil, Youssef
core   +2 more sources

Seamless and Secure VR: Adapting and Evaluating Established Authentication Systems for Virtual Reality [PDF]

open access: yes, 2017
Virtual reality (VR) headsets are enabling a wide range of new opportunities for the user. For example, in the near future users may be able to visit virtual shopping malls and virtually join international conferences.
Alt, Florian   +6 more
core   +1 more source

Distance Measurement Methods for Improved Insider Threat Detection

open access: yesSecurity and Communication Networks, Volume 2018, Issue 1, 2018., 2018
Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can provide a solution, but these methods often fail to take into account changes of behaviour of users. This work builds on a published method of detecting insider threats and applies
Owen Lo   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy