Venn Diagram-Based Feature Ranking Technique for Key Term Extraction

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International Conference on Frontiers of Intelligent Computing: Theory and Applications (5. : 2016 : Bhubaneswar) Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications ; Volume 1
1. Verfasser: Chakraborty, Neelotpal (VerfasserIn)
Weitere Verfasser: Mukherjee, Sambit (VerfasserIn), Naskar, Ashes Ranjan (VerfasserIn), Malakar, Samir (VerfasserIn), Sarkar, Ram (VerfasserIn), Nasipuri, Mita (VerfasserIn)
Pages:5
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2017
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Feature Optimality-Based Semi-supervised Face Recognition Approach 2017 Taqdir
Fuzzy-Based Algorithm for Resource Allocation 2017 Saini, Gurpreet Singh
Energy Efficient Resource Allocation for Heterogeneous Workload in Cloud Computing 2017 Malik, Surbhi
Efficient and Parallel Framework for Analyzing the Sentiment 2017 Sharma, Ankur
PDA-CS: Profile Distance Assessment-Centric Cuckoo Search for Anomaly-Based Intrusion Detection in High-Speed Networks 2017 Gariga, Kanaka Raju
Evaluation of Barriers of Health Care Waste Management in India—A Gray Relational Analysis Approach 2017 Swain, Suchismita
Performance Analysis of Compressed Sensing in Cognitive Radio Networks 2017 Swetha, N.
Adaptive Huffman Coding-Based Approach to Reduce the Size of Power System Monitoring Parameters 2017 Sarkar, Subhra J.
A Comparative Analysis of PWM Methods of Z-Source Inverters Used for Photovoltaic System 2017 Panda, Babita
Bangla Handwritten City Name Recognition Using Gradient-Based Feature 2017 Barua, Shilpi
A Modified Genetic Algorithm Based FCM Clustering Algorithm for Magnetic Resonance Image Segmentation 2017 Das, Sunanda
Load Flow Analysis of Distribution System Using Artificial Neural Networks 2017 Suresh, M.
An Enhanced Bug Mining for Identifying Frequent Bug Pattern Using Word Tokenizer and FP-Growth 2017 Divyavarma, K.
A Framework for Dynamic Malware Analysis Based on Behavior Artifacts 2017 Paul, T. G. Gregory
Snort Rule Detection for Countering in Network Attacks 2017 Somu, Venkateswarlu
Trust and Energy-Efficient Routing for Internet of Things—Energy Evaluation Model 2017 Kharkongor, Carynthia
A Quality-Concordance Metric Based Contour Detection by Utilizing Composite-Cue Information and Particle Swarm Optimisation 2017 Choudhuri, Sandipan
Theoretical Validation of Object-Oriented Metrics for Data Warehouse Multidimensional Model 2017 Gosain, Anjana
SQLI Attacks: Current State and Mitigation in SDLC 2017 Kaur, Daljit
Cognitive Architectural Model for Solving Clustering Problem 2017 Sahu, Meenakhi
Alle Artikel auflisten