2016
DOI: 10.1007/978-3-319-42706-5_6
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced Rules Application Order to Stem Affixation, Reduplication and Compounding Words in Malay Texts

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…In the beginning, text mining was to provide government intelligence and security agencies to detect terrorist activities and other security threats. To improve its performance, text mining utilized text analysis components and technologies from external disciplines such as computer science [19], [20], management science, machine learning, and statistics [21]. These improvements are very important for carrying out practical research, and these techniques have since been widely used in related fields [22].…”
Section: B Text Mining and Text Classificationmentioning
confidence: 99%
“…In the beginning, text mining was to provide government intelligence and security agencies to detect terrorist activities and other security threats. To improve its performance, text mining utilized text analysis components and technologies from external disciplines such as computer science [19], [20], management science, machine learning, and statistics [21]. These improvements are very important for carrying out practical research, and these techniques have since been widely used in related fields [22].…”
Section: B Text Mining and Text Classificationmentioning
confidence: 99%