Kluster Bag of Word Menggunakan Weka
Dalam bidang pengolahan bahasa alami dan sistem temu balik informasi, representasi sebuah data teks sangat penting untuk mendukung proses analisis data statistik di dalamnya.
Tari Mardiana, Rudy Dwi Nyoto
doaj +1 more source
Mining Bad Credit Card Accounts from OLAP and OLTP
Credit card companies classify accounts as a good or bad based on historical data where a bad account may default on payments in the near future. If an account is classified as a bad account, then further action can be taken to investigate the actual ...
Eberle, William +2 more
core +1 more source
The Electrical and Morphological Characteristics of Networks of Mechanically Exfoliated Nanosheets
MoS2 nanosheet networks made via dry exfoliation offer strong alignment, low porosity, and good conductivity. But charge mobility is held back by resistance at nanosheet junctions. Thinner sheets and better intersheet transport could boost performance, making these networks a strong contender for future printed electronics. Solution‐processed nanosheet
Luke Doolan +11 more
wiley +1 more source
Applications of Artificial Intelligence in Neurological Voice Disorders
ABSTRACT Neurological voice disorders, such as Parkinson's disease, laryngeal dystonia, and stroke‐induced dysarthria, significantly impact speech production and communication. Traditional diagnostic methods rely on subjective assessment, whereas artificial intelligence (AI) offers objective, noninvasive, and scalable solutions for voice analysis. This
Dongren Yao +2 more
wiley +1 more source
Evaluating pasture forage plant breeding achievements: a review
ABSTRACT Forage plant breeding aims to deliver cultivars that increase on‐farm productivity through improved seasonal and annual yield, persistence of yield in perennials, and nutritive and feeding value. Breeding is generally undertaken in highly controlled field trials with individual plants or rows.
John R. Caradus, David F. Chapman
wiley +1 more source
SQL Injection Detection Using Machine Learning Techniques and Multiple Data Sources [PDF]
SQL Injection continues to be one of the most damaging security exploits in terms of personal information exposure as well as monetary loss. Injection attacks are the number one vulnerability in the most recent OWASP Top 10 report, and the number of ...
Ross, Kevin
core +1 more source
Graph-RAT: Combining data sources in music recommendation systems [PDF]
The complexity of music recommendation systems has increased rapidly in recent years, drawing upon different sources of information: content analysis, web-mining, social tagging, etc.
Bainbridge, David, McEnnis, Daniel
core +1 more source
Segurança da informação na rede educacional do IFF
Com o avanço e disseminação dos serviços on-line, as redes de computadores ficaram vulneráveis. Nos dias de hoje, praticamente todos os computadores e dispositivos móveis estão conectados a grande rede mundial, a Internet, deixando o maior patrimônio das
Andre de Azevedo Cunha +2 more
doaj
Penilaian Kepuasan Karyawan pada Sistem Pengelolaan Organisasi di RSUD Dr. Soetomo Surabaya
Background: Assessment of employee’s job satisfaction in an organization management system was conducted periodically by Dr. Soetemo Hospital. The data can be an archive of organizational value, supervision reinforcement, and effective communication for ...
Maya Weka Santi, Thinni Nurul Rochmah
doaj +1 more source
Whanaketanga/Evolution : exhibition report for Masters of Māori Visual Arts at Massey University, Palmerston North, New Zealand [PDF]
"Whanaketanga | Evolution, focused on technical construction and application using various materials. As art evolves, we find new ways to express concept, thought and imagination.
Morgan, Tracey
core

