Search Results - (( topic identification task algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Topic identification method for textual document by Jamil, Nurul Syafidah, Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2017
    “…Abstract— Topic identification is a crucial task for discovering knowledge from textual document. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…The algorithm simulates two important tasks that are frequently used by the human experts to identify summarizing strategies used to produce the summary sentences: 1) sentences relevance identification; and 2) summarizing strategies identification. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Key concept identification: A comprehensive analysis of frequency and topical graph-based approaches by Aman, M., Said, A.M., Kadir, S.J.A., Ullah, I.

    Published 2018
    “…The objective of the study presented in this paper is to perform a comprehensive empirical analysis of selected frequency and topical graph-based algorithms for key concept extraction on three different datasets, to identify the major sources of error in these approaches. …”
    Get full text
    Get full text
    Article
  4. 4

    Key concept identification: A comprehensive analysis of frequency and topical graph-based approaches by Aman, M., Said, A.M., Kadir, S.J.A., Ullah, I.

    Published 2018
    “…The objective of the study presented in this paper is to perform a comprehensive empirical analysis of selected frequency and topical graph-based algorithms for key concept extraction on three different datasets, to identify the major sources of error in these approaches. …”
    Get full text
    Get full text
    Article
  5. 5

    KP-Rank: a semantic-based unsupervised approach for keyphrase extraction from text data by Aman, M., Abdulkadir, S.J., Aziz, I.A., Alhussian, H., Ullah, I.

    Published 2021
    “…Automatic key concept identification from text is the main challenging task in information extraction, information retrieval, digital libraries, ontology learning, and text analysis. …”
    Get full text
    Get full text
    Article
  6. 6

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Strategic Profiling and Analytic Modelling of Node Misbehaviour in Adhoc Networks via Game Theory by Olanrewaju, Rashidah Funke, Hassan Abdalla Hashim, Aisha, Yusoff, Siti Hajar

    Published 2018
    “…Coordination among nodes during communication and working without control of any central manager truly ensembles them to be applied in IoT. However, the identification and later mitigation of malicious nodes becomes an immensely difficult task especially when Selfish/Erroneous nodes exist along with normal Collaborative nodes in the Regular camp. …”
    Get full text
    Get full text
    Monograph
  8. 8

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item