Author of the publication

Analyzing the Effectiveness of Pruning and Grouping Methods Used in Literature-Based Discovery Tools.

, , , , and . Web Intelligence/IAT Workshops, page 304-308. IEEE Computer Society, (2010)978-0-7695-4191-4.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved Rule Discovery Performance on Uncertainty., , and . PAKDD, volume 1394 of Lecture Notes in Computer Science, page 310-321. Springer, (1998)Introduction (Special Topic Issue: Knowledge Discovery and Data Mining)., , and . JASIS, 49 (5): 397-402 (1998)Binary background model with geometric mean for author-independent authorship verification., , and . J. Inf. Sci., 49 (2): 448-464 (April 2023)Application of Cascading Rough Set-Based Classifiers on Authorship Attribution., , , and . GrC, page 656-660. IEEE Computer Society, (2010)Small and Unbalanced Data Set Problem in Classification., , and . SIU, page 1-4. IEEE, (2019)Extending a sentiment lexicon with synonym-antonym datasets: SWNetTR++., , and . Turkish J. Electr. Eng. Comput. Sci., 27 (3): 1806-1820 (2019)Identifying criminal organizations from their social network structures., , and . Turkish J. Electr. Eng. Comput. Sci., 27 (1): 421-436 (2019)Use of Preference Relation for Text Categorization., , and . Rough Sets and Current Trends in Computing, volume 3066 of Lecture Notes in Computer Science, page 708-713. Springer, (2004)Ila-2: an Inductive Learning Algorithm for Knowledge Discovery., , , and . Cybern. Syst., 30 (7): 609-628 (1999)The Effect of Clustering on Data Privacy., and . ICMLA, page 277-282. IEEE, (2015)