Please use this identifier to cite or link to this item:
http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/5837
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jain, Rajat | - |
dc.contributor.author | Singh, Sanjana [Guided by] | - |
dc.date.accessioned | 2022-08-18T04:39:58Z | - |
dc.date.available | 2022-08-18T04:39:58Z | - |
dc.date.issued | 2015 | - |
dc.identifier.uri | http://ir.juit.ac.in:8080/jspui//xmlui/handle/123456789/5837 | - |
dc.description.abstract | Many data mining techniques have been proposed for mining useful patterns in text documents. However, how to effectively use and update discovered patterns is still an open research issue, especially in the domain of text mining. Since most existing text mining methods adopted termbased approaches, they all suffer from the problems of polysemy and synonymy. Over the years, people have often held the hypothesis that pattern (or phrase)-based approaches should perform better than the term-based ones, but many experiments do not support this hypothesis. In the i try to implement pattern discovery technique which includes the processes of pattern deploying and pattern evolving, to improve the effectiveness of using and updating discovered patterns for finding relevant and interesting information. Many factors encourages towards its use due to huge potential in it and can give excellent results in terms of pattern finding which is highly effective and can put to test in various critical situations. While seeking help for while planning a software project one faces various troubles and need for guidance the obvious choice for such situations is looking up blog sites that can give us some insight into our problem. As we know that the solution threads posted on the blogs are contributions of users and hence might give us a completely untrue result especially when we go beyond the basic coding. The blog threads also tend to deviate from the topic giving us no fruitful conclusions. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Jaypee University of Information Technology, Solan, H.P. | en_US |
dc.subject | Data mining | en_US |
dc.subject | Text mining | en_US |
dc.subject | Hyper text markup language | en_US |
dc.subject | Support vector machine | en_US |
dc.title | Analysis of Inbox for Fraudulent Activity | en_US |
dc.type | Project Report | en_US |
Appears in Collections: | B.Tech. Project Reports |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Analysis of Inbox for Fraudulent Activity.pdf | 3.66 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.