4 research outputs found
Recommended from our members
ENHANCING EMAIL SPAM DETECTION THROUGH ENSEMBLE MACHINE LEARNING: A COMPREHENSIVE EVALUATION OF MODEL INTEGRATION AND PERFORMANCE
Email spam detection and filtering are crucial security measures in all organizations. It is applied to filter unsolicited messages; most of the time, they comprise a large portion of harmful messages. Machine learning algorithms, specifically classification algorithms, are used to filter and detect if the email is spam or not spam. These algorithms entail training models on labelled data to predict whether an email is spam or not based on its features. In particular, traditional classification machine learning algorithms have been applied for decades but proved ineffective against fast-evolving spam emails. In this research, ensemble techniques by using the meta-learning approach are introduced to reduce the problem of misclassification of spam email and increase the performance of the combined model. This approach is based on combining different classification models to enhance the performance of detecting the spam emails by aggregating different algorithms to reduce false positives and false negative rates, and increase the accuracy of the combined model.
The paper proposed ensemble techniques where various machine-learning algorithms are combined to improve the accuracy and strength of spam detection systems. Using different algorithms, it tries to create an appropriate systematic behaviour to increase the detection rates and reduce the number of misclassification cases. In this research, four machine learning algorithms were selected to build the meta-learning model; these algorithms have been chosen based on their proven effectiveness in spam detection systems, such as Naive Bayes (NB), Support Vector Machine (SVM), Decision Tree (DT), and K-Nearest Neighbours (KNN). The selected algorithms were applied individually on different datasets. Subsequently, an ensemble model was created using the stacking method to collect all the predictions of the models then aggregate and use them as input features for the final classifier that is based on the Logistic Regression algorithm.
This study demonstrates the effectiveness of an ensemble approach for email spam detection by aggregating multiple weak machine learning algorithms to produce a strong machine learning model. The purpose of this research is to enhance the accuracy and robustness of the predictive model to detect spam emails. As a result, the proposed approach produced a better performance with 95.8% accuracy
The adoption of big data analytics in Jordanian SMEs: An extended technology organization environment framework with diffusion of innovation and perceived usefulness
While many small and medium enterprises (SMEs)recognize the benefits of Big Data Analytics (BDA) for digital transformation, they face challenges in implementing this technology, highlighting the need for more research on its adoption by SMEs. The objective of this study is to amalgamate the Technology Organization Environment (TOE) framework with the Diffusion of Innovation (DOI) theory, aiming to dissect the factors that sway BDA adoption in Jordanian SMEs. Additionally, the study delves into how perceived usefulness impacts this adoption process. Utilizing structural equation modeling, the study examined data from 388 managers in Jordan. The study validates all its hypotheses, revealing that variables like relative advantage, compatibility, complexity, top management support, competitive pressure, and security influence perceived usefulness, which subsequently has a positive impact on BDA adoption. This research presents a range of theoretical and practical insights
Artificial intelligence in Jordanian education: Assessing acceptance via perceived cybersecurity, novelty value, and perceived trust
The growing significance of Artificial Intelligence (AI) across different fields highlights the essential role of user acceptance, as the success of this technology largely depends on its adoption and practical use by individuals. This research aims to examine how perceived cybersecurity, novelty value, and perceived trust affect students' willingness to accept AI in educational settings. The study's theoretical basis is the AI Device Use Acceptance (AIDUA) model. Using structural equation modeling, the study tested hypothesized relationships using data from 526 students at Jordanian universities. The results showed that social influence is positively associated with performance expectancy, while perceived cybersecurity is positively related to both performance and effort expectancy. Novelty value is positively associated with performance expectancy but a negative one with effort expectancy. Additionally, effort and performance expectancy significantly influence perceived trust and the willingness to accept AI. Moreover, perceived trust has a notable positive effect on the willingness to accept AI in education. These findings provide valuable guidance for the creation and improvement of AI-driven educational systems in universities, contributing to the broader understanding of AI technology acceptance in the educational field
Natural Language Processing and Parallel Computing for Information Retrieval from Electronic Health Records
In this paper, we review the literature to find suitable information retrieval techniques for EHealth. Also discussed NLP techniques that have been proved their capability to extract valuable information in unstructured data from EHR. One of the best NLP techniques used for searching free text is LSI, due to its capability of finding semantic terms and in rich the search results by finding the hidden relations between terms. LSI uses a mathematical model called SVD, which is not scalable for large amounts of data due to its complexity and exhausts the memory, and a review for recent applications of LSI was discussed