Author of the publication

Constructing tree-based knowledge structures from text corpus.

, and . Appl. Intell., 33 (1): 67-78 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Noise control in document classification based on fuzzy formal concept analysis., and . FUZZ-IEEE, page 2583-2588. IEEE, (2011)The Visualized Analysis of Bitcoin Change Wallets in the Coin Flow Network., , and . ICACT, page 35-41. IEEE, (2021)The Visualized Analysis of Bitcoin Change Wallets in the Coin Flow Network., , and . ICACT, page 35-41. IEEE, (2022)Exploring drug-related crimes with social network analysis., , , and . KES, volume 159 of Procedia Computer Science, page 1907-1917. Elsevier, (2019)Heuristic-Based Approach for Constructing Hierarchical Knowledge Structures., , , and . IEA/AIE, volume 5579 of Lecture Notes in Computer Science, page 439-448. Springer, (2009)Concept-Guided Query Expansion for Knowledge Management with Semi-Automatic Knowledge Capturing., and . J. Comput. Inf. Syst., 49 (4): 53-65 (2009)A Systematic Literature Review of Law Enforcement Image Recognition Methods based on Generative Adversarial Networks Framework., and . KES, volume 207 of Procedia Computer Science, page 3635-3644. Elsevier, (2022)A Systematic Review of Detecting Illicit Bitcoin Transactions., , and . KES, volume 207 of Procedia Computer Science, page 3217-3225. Elsevier, (2022)Extracting Suspicious IP Addresses from WhatsApp Network Traffic in Cybercrime Investigations., , and . ICACT, page 1108-1115. IEEE, (2019)Tool Mark Identification of Skype Traffic., , and . ICACT, page 361-366. IEEE, (2020)