Author of the publication

Cyberbullying Predictive Model: Implementation of Machine Learning Approach.

, , and . CAMP, page 65-69. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pseudo Relevance Feedback Technique and Semantic Similarity for Corpus-based Expansion., , and . KDIR, page 445-450. SciTePress, (2015)Natural User Interface for Children: From Requirement to Design., , and . IVIC, volume 10645 of Lecture Notes in Computer Science, page 612-624. Springer, (2017)A Study on the Naturalness of Gesture-Based Interaction for Children., , and . IVIC, volume 8237 of Lecture Notes in Computer Science, page 718-728. Springer, (2013)Comparison of Fake News Detection using Machine Learning and Deep Learning Techniques., and . CRC, page 1-6. IEEE, (2021)A Trusted User Model for Collaborative Multi-Criteria Recommendation using User Review Elements., , , , and . ICAAI, page 48-53. ACM, (2023)Distance Measures and Stemming Impact on ‎Arabic Document Clustering., , , and . AIRS, volume 8870 of Lecture Notes in Computer Science, page 327-339. Springer, (2014)Sentiment Lexicon Interpolation and Polarity Estimation of Objective and Out-Of-Vocabulary Words to Improve Sentiment Classification on Microblogging., , and . PACLIC, page 204-213. The PACLIC 28 Organizing Committee and PACLIC Steering Committee / ACL / Department of Linguistics, Faculty of Arts, Chulalongkorn University, (2014)The effectiveness of Women 4IR Cyber 3A #Aware, Avoid, Act Program in Malaysia., , , , , , , and . ICCR, page 1-5. IEEE, (2022)Exploring the Role of Named Entities for Uncertainty Recognition in Event Detection., and . KMIS, page 335-341. SciTePress, (2015)A Comparison of Named Entity Patterns from a User Analysis and a System Analysis., , and . ECIR, volume 4956 of Lecture Notes in Computer Science, page 679-683. Springer, (2008)