Results (7)
Search Parameters:
Keyword: Word2vecAn Overview on CryptDb and Word2vec Approaches
Big data is a vast data set that was used in many areas. Online applications are subject to theft of confidential information because opponents can exploit software errors to access private data, and because curious or malicious officials can capture and lose data. CryptDB is a functional system that provides security and confidentiality through a…
Read MoreSurvey Analysis: Enhancing the Security of Vectorization by Using word2vec and CryptDB
Vectorization is extracting data from strings through Natural Language Processing by using different approaches; one of the best approaches used in vectorization is word2vec. To make the vectorized data secure, we must apply a security method, which will be CryptDB. The paper is analyzing the survey, which is created to interview security engineers through the…
Read MoreIdentifying Comprehension Faults Through Word Embedding and Multimodal Analysis
This study establishes a method for determining whether learners have an understanding of data science. Data science requires knowledge in various fields, which makes many learners give up. To prevent learners from being discouraged, it is necessary to judge the comprehension of the principles in each specified skill. It is important to assess not only…
Read MoreContextual Word Representation and Deep Neural Networks-based Method for Arabic Question Classification
Contextual continuous word representation showed promising performances in different natural language processing tasks. It stems from the fact that these word representations consider the context in which a word appears. But until recently, very little attention was paid to the contextual representations in Arabic question classification task. In the present study, we employed a contextual…
Read MoreMalware Classification Based on System Call Sequences Using Deep Learning
Malware has always been a big problem for companies, government agencies, and individuals because people still use it as a primary tool to influence networks, applications, and computer operating systems to gain unilateral benefits. Until now, malware detection with heuristic and signature-based methods are still struggling to keep up with the evolution of malware. Machine…
Read MoreClassification Model of Contact Center Customers Emails Using Machine Learning
E-mail is one of the media services used at the contact center. The challenge faced by e-mail services is how to handle e-mails that enter large quantities every day efficiently to provide fast and appropriate service to customers. The purpose of this study is to find which method has the best accuracy in classifying emails…
Read MoreTalk Show’s Business Intelligence on Television by Using Social Media Data in Indonesia
Knowing how and types of talk shows discussed in social media is significant to all stakeholders in a talk show’s program. There are many messages that can be found in social media that need to be noticed so the messages from the user could reach the viewer. Social media provides promising as well as challenging…
Read More
