Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/5837
Title: Analysis of Inbox for Fraudulent Activity
Authors: Jain, Rajat
Singh, Sanjana [Guided by]
Keywords: Data mining
Text mining
Hyper text markup language
Support vector machine
Issue Date: 2015
Publisher: Jaypee University of Information Technology, Solan, H.P.
Abstract: Many data mining techniques have been proposed for mining useful patterns in text documents. However, how to effectively use and update discovered patterns is still an open research issue, especially in the domain of text mining. Since most existing text mining methods adopted termbased approaches, they all suffer from the problems of polysemy and synonymy. Over the years, people have often held the hypothesis that pattern (or phrase)-based approaches should perform better than the term-based ones, but many experiments do not support this hypothesis. In the i try to implement pattern discovery technique which includes the processes of pattern deploying and pattern evolving, to improve the effectiveness of using and updating discovered patterns for finding relevant and interesting information. Many factors encourages towards its use due to huge potential in it and can give excellent results in terms of pattern finding which is highly effective and can put to test in various critical situations. While seeking help for while planning a software project one faces various troubles and need for guidance the obvious choice for such situations is looking up blog sites that can give us some insight into our problem. As we know that the solution threads posted on the blogs are contributions of users and hence might give us a completely untrue result especially when we go beyond the basic coding. The blog threads also tend to deviate from the topic giving us no fruitful conclusions.
URI: http://ir.juit.ac.in:8080/jspui//xmlui/handle/123456789/5837
Appears in Collections:B.Tech. Project Reports

Files in This Item:
File Description SizeFormat 
Analysis of Inbox for Fraudulent Activity.pdf3.66 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.