Author of the publication

Feature Reduction Using Standard Deviation with Different Subsets Selection in Sentiment Analysis.

, , , and . ACIIDS (2), volume 8398 of Lecture Notes in Computer Science, page 33-41. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ReproTizer: A Fully Implemented Software Requirements Prioritization Tool., , and . Trans. Comput. Collect. Intell., (2016)Incorporating Users Satisfaction to Resolve Sparsity in Recommendation Systems., , , and . SoMeT (Selected Papers), volume 513 of Communications in Computer and Information Science, page 134-146. Springer, (2014)Twitter Hate Aspect Extraction Using Association Analysis and Dictionary-Based Approach., , and . SoMeT, volume 297 of Frontiers in Artificial Intelligence and Applications, page 641-651. IOS Press, (2017)Ontology-Based Applications In Information Systems Research: Through The Lens Of Design Science Research Methodology., , , and . PACIS, page 177. (2012)A Web-Based Multi-Criteria Decision Making Tool for Software Requirements Prioritization., , and . ICCCI, volume 8733 of Lecture Notes in Computer Science, page 444-453. Springer, (2014)Enhanced Approach Using Reduced SBTFD Features and Modified Individual Behavior Estimation for Crowd Condition Prediction., , , and . Entropy, 21 (5): 487 (2019)Discovering the Impact of Knowledge in Recommender Systems: A Comparative Study, , and . (2011)cite arxiv:1109.0166Comment: 14 pages, 3 tables; International Journal of Computer Science & Engineering Survey (IJCSES) Vol.2, No.3, August 2011.Capturing scholar's knowledge from heterogeneous resources for profiling in recommender systems., , , and . Expert Syst. Appl., 41 (17): 7945-7957 (2014)A Process Model for Efficient Software Engineering Practice., , and . SoMeT, volume 265 of Frontiers in Artificial Intelligence and Applications, page 721-735. IOS Press, (2014)An Investigation of Information Granulation Techniques in Cybersecurity., , , and . ACIIDS (Extended Posters), volume 830 of Studies in Computational Intelligence, page 151-163. Springer, (2019)