1,921 research outputs found

    Improving the Major Recommendation Systems: Analysis of Hybrid NaĂŻve Bayes-based Collaborative Filtering and Fuzzy Logic

    Get PDF
    Major recommendation systems have been widely used to assist prospective students in choosing major that matches their interests and potential. In an effort to improve the performance of the recommendation system, this study proposed to use collaborative filtering techniques with naïve Bayes approach. In addition, this study improved the input parameters using fuzzy logic in determining the recommended majors. The methodology used started from collecting user data, including gender, academic history, interests, and other relevant attributes. The data were used to train the naïve Bayes technique by estimating the probability of feature conformity between users and students in the recommended majors. However, there were problems such as uncertainty and ambiguity in user preferences for input data. The fuzzy logic method aimed to improve the input parameters to more accurately reflect the user preferences. The results of improving the input parameters by using fuzzy logic were then used in the naïve Bayes technique to obtain recommendations for the direction that best suits the user’s preferences. The final stage of this study used evaluation metrics such as precision, recall, and f1-score to measure the performance of the recommendation system in providing accurate recommendations. The use of a hybrid of naïve Bayes and fuzzy logic algorithms obtains an accuracy value of 87.27%, a precision value of 87.33%, a recall value of 87.24%, and an f1-score value of 87.26%. These results are higher than the usual naïve Bayes model applied in major recommendation systems

    Naive Bayes vs. Decision Trees vs. Neural Networks in the Classification of Training Web Pages

    Get PDF
    Web classification has been attempted through many different technologies. In this study we concentrate on the comparison of Neural Networks (NN), NaĂŻve Bayes (NB) and Decision Tree (DT) classifiers for the automatic analysis and classification of attribute data from training course web pages. We introduce an enhanced NB classifier and run the same data sample through the DT and NN classifiers to determine the success rate of our classifier in the training courses domain. This research shows that our enhanced NB classifier not only outperforms the traditional NB classifier, but also performs similarly as good, if not better, than some more popular, rival techniques. This paper also shows that, overall, our NB classifier is the best choice for the training courses domain, achieving an impressive F-Measure value of over 97%, despite it being trained with fewer samples than any of the classification systems we have encountered

    Detection of Offensive Tweets: A Comparative Study

    Get PDF
    With the growing popularity, Twitter has become a major platform for posting views via tweets. Tweets contain useful, relevant and offensive content as well. More than a decade of research has resulted in numerous techniques and models to detect offensive content. However, little is known about lexically offensive and contextual offensive content. In this research paper, lexical offensive contents have been identified using two techniques- Rule-Based Naive Bayes (RNB) and a collaborative model of LDA with NaĂŻve Bayes (LDANB). LDANB provides better results as compared to RNB for lexical offensive tweet detection. Further, contextually offensive contents are detected using newly devised Adjective Based approach. Contextual offensive content results prove to be better with Adjective based approach than Cosine similarity based results. To validate results of applied offensive tweet detection techniques three performance metrics- precision, Accuracy and recall are used

    Testing Market Response to Auditor Change Filings: a comparison of machine learning classifiers

    Get PDF
    The use of textual information contained in company filings with the Securities Exchange Commission (SEC), including annual reports on Form 10-K, quarterly reports on Form 10-Q, and current reports on Form 8-K, has gained the increased attention of finance and accounting researchers. In this paper we use a set of machine learning methods to predict the market response to changes in a firm\u27s auditor as reported in public filings. We vectorize the text of 8-K filings to test whether the resulting feature matrix can explain the sign of the market response to the filing. Specifically, using classification algorithms and a sample consisting of the Item 4.01 text of 8-K documents, which provides information on changes in auditors of companies that are registered with the SEC, we predict the sign of the cumulative abnormal return (CAR) around 8-K filing dates. We report the correct classification performance and time efficiency of the classification algorithms. Our results show some improvement over the naĂŻve classification method

    Automating user privacy policy recommendations in social media

    Get PDF
    Most Social Media Platforms (SMPs) implement privacy policies that enable users to protect their sensitive information against privacy violations. However, observations indicate that users find these privacy policies cumbersome and difficult to configure. Consequently, various approaches have been proposed to assist users with privacy policy configuration. These approaches are however, limited to either protecting only profile attributes, or only protecting user-generated content. This is problematic, because both profile attributes and user-generated content can contain sensitive information. Therefore, protecting one without the other, can still result in privacy violations. A further drawback of existing approaches is that most require considerable user input which is time consuming and inefficient in terms of privacy policy configuration. In order to address these problems, we propose an automated privacy policy recommender system. The system relies on the expertise of existing social media users, as well as the user's privacy policy history in order to provide him/her with personalized privacy policy suggestions for both profile attributes, and user-generated content. Results from our prototype implementation indicate that the proposed recommender system provides accurate privacy policy suggestions, with minimum user input

    On the use of Locality for Improving SVM-Based Spam Filtering

    Get PDF
    Recent growths in the use of email for communication and the corresponding growths in the volume of email received have made automatic processing of emails desirable. In tandem is the prevailing problem of Advance Fee fraud E-mails that pervades inboxes globally. These genres of e-mails solicit for financial transactions and funds transfers from unsuspecting users. Most modern mail-reading software packages provide some forms of programmable automatic filtering, typically in the form of sets of rules that file or otherwise dispose mails based on keywords detected in the headers or message body. Unfortunately programming these filters is an arcane and sometimes inefficient process. An adaptive mail system which can learn its users’ mail sorting preferences would therefore be more desirable. Premised on the work of Blanzieri & Bryl (2007), we proposes a framework dedicated to the phenomenon of locality in email data analysis of advance fee fraud e-mails which engages Support Vector Machines (SVM) classifier for building local decision rules into the classification process of the spam filter design for this genre of e-mails
    • …
    corecore