7 research outputs found

    News’ Credibility Detection on Social Media Using Machine Learning Algorithms

    Get PDF
    Social media is essential in many aspects of our lives. Social media allows us to find news for free. anyone can access it easily at any time. However, social media may also facilitate the rapid spread of misleading news. As a result, there is a probability that low-quality news, including incorrect and fake information, will spread over social media. As well as detecting news credibility on social media becomes essential because fake news can affect society negatively, and the spread of false news has a considerable impact on personal reputation and public trust. In this research, we conducted a model that detects the credibility of Arabic news from social media; particularly Arabic tweets. The content of the tweets revolves around the COVID-19 pandemic. The proposed model applied to detect news credibility using text mining techniques and one of the well-known machine learning classifiers, Decision tree which has the best accuracy equal to 86.6

    Risk Assessment Approaches in Banking Sector –A Survey

    Get PDF
    Prediction analysis is a method that makes predictions based on the data currently available. Bank loans come with a lot of risks to both the bank and the borrowers. One of the most exciting and important areas of research is data mining, which aims to extract information from vast amounts of accumulated data sets. The loan process is one of the key processes for the banking industry, and this paper examines various prior studies that used data mining techniques to extract all served entities and attributes necessary for analytical purposes, categorize these attributes, and forecast the future of their business using historical data, using a model, banks\u27 business, and strategic goals

    Key Performance Indicators Detection Based Data Mining

    Get PDF
    One of the most prosperous domains that Data mining accomplished a great progress is Food Security and safety. Some of Data mining techniques studies applied several machine learning algorithms to enhance and traceability of food supply chain safety procedures and some of them applying machine learning methodologies with several feature selection methods for detecting and predicting the most significant key performance indicators affect food safety. In this research we proposed an adaptive data mining model applying nine machine learning algorithms (Naive Bayes, Bayes Net Key -Nearest Neighbor (KNN), Multilayer Perceptron (MLP), Random Forest (RF), Support Vector Machine (SVM), J48, Hoeffding tree, Logistic Model Tree) with feature selection wrapper methods (forward and backward techniques) for detecting food deterioration’s key performance indicators. In conclusion the proposed model applied effectively and successfully detected the most significant indicators for meat safety and quality with the aim of helping farmers and suppliers for being sure of delivering safety meat for consumer and diminishing the cost of monitoring meat safety

    Credit Card Fraud Detection Using Machine Learning Techniques

    Get PDF
    This is a systematic literature review to reflect the previous studies that dealt with credit card fraud detection and highlight the different machine learning techniques to deal with this problem. Credit cards are now widely utilized daily. The globe has just begun to shift toward financial inclusion, with marginalized people being introduced to the financial sector. As a result of the high volume of e-commerce, there has been a significant increase in credit card fraud. One of the most important parts of today\u27s banking sector is fraud detection. Fraud is one of the most serious concerns in terms of monetary losses, not just for financial institutions but also for individuals. as technology and usage patterns evolve, making credit card fraud detection a particularly difficult task. Traditional statistical approaches for identifying credit card fraud take much more time, and the result accuracy cannot be guaranteed. Machine learning algorithms have been widely employed in the detection of credit card fraud. The main goal of this review intends to present the previous research studies accomplished on Credit Card Fraud Detection (CCFD), and how they dealt with this problem by using different machine learning techniques

    A Statistical-Mining Techniques’ Collaboration for Minimizing Dimensionality in Ovarian Cancer Data

    Get PDF
    A feature is a single measurable criterion to an observation of a process. While knowledge discovery techniques successfully contribute in many fields, however, the extensive required data processing could hinder the performance of these techniques. One of the main issues in processing data is the dimensionality of the data. Therefore, focusing on reducing the data dimensionality through eliminating the insignificant attributes could be considered one of the successful steps for raising the applied techniques’ performance. On the other hand, focusing on the applied field, ovarian cancer patients continuously suffer from the extensive analysis requirements for detecting the disease as well as monitoring the treatment progress. Therefore, identifying the most significant required analysis could be a positive step to reduce the emotional and financial suffering. This research aims to reduce the data dimensionality of the ovarian cancer disease and highlight the most significant analysis using the collaboration of clustering techniques and statistical techniques. The research succeeded to identify twelve significant analysis out of forty-four with a total of fourteen significant attributes for ovarian cancer data

    A Configurable Mining Approach for Learning Services Customization

    Get PDF
    There is no doubt that this age is the age of data and technology. Moreover, there is tremendous development in all fields. The personalized material is a good approach in the different fields. It provides a fit material that matches the styles of readers. It supports readers in various reading domains. This research paper aims to support students in the educational system. Additionally, the research paper designs to increase education values for students. Furthermore, the research paper builds the smart appropriate materials through Egyptian Knowledge Banking (EKB) based on the learner question. The Egyptian Knowledge Bank (EKB) is a rich platform for data. The research paper is implemented in the faculty of Commerce and Business Administration, Business Information System program (BIS) at Helwan University, Egypt

    A Literature Review for Contributing Mining Approaches for Business Process Reengineering

    Get PDF
    Due to the changing dynamics of the business environment, organizations need to redesign or reengineer their business processes in order to provide services with the lowest cost and shortest response time while increasing quality. Thence, Business Process Re-engineering (BPR) provides a roadmap to achieve operational goals that leads to enhance flexibility and productivity, cost reduction, and quality of service/product. In this paper, we propose a literature review for the different proposed models for Business Process Reengineering. The models specify where the breakdowns occur in BPR implementation, justifies why such breakdowns occur, and propose techniques to prevent their occurrence again. The discussed models have been built based on different perspectives which are discussed, and consequently, different research gaps and issues have arisen which are also highlighted in this researc
    corecore