Author of the publication

Building of the Predicate Recognition System for the NLP Ontology Learning Module.

, , , , , and . IDAACS, page 802-808. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A bibliometric study of China's science and technology policies: 1949-2010., , , , , , and . Scientometrics, 102 (2): 1521-1539 (2015)Roadmapping an emerging technology in clean energy industry: A case study of dimethyl ether development in China., , , , and . IEEM, page 1048-1052. IEEE, (2011)A data-driven approach based on LDA for identifying duplicate bug report., , and . IEEE Conf. on Intelligent Systems, page 686-691. IEEE, (2016)Managing knowledge sharing in distributed innovation from the perspective of developers: empirical study of open source software projects in China., , , and . Technol. Anal. Strateg. Manag., (2017)Identifying core policy instruments based on structural holes: A case study of China's nuclear energy policy., , and . J. Informetrics, 15 (2): 101145 (2021)Integration of Information Models for Industrial Intemet Based on Extenics., , , and . IDAACS-SWS, page 1-6. IEEE, (2020)Improved method of ant colonies to search independent data transmission routes in WSN., , , and . IDAACS-SWS, page 52-57. IEEE, (2012)Application of Elephant Herd Optimization Algorithm Based on Levy Flight Strategy in Intrusion Detection., , , , , , and . IDAACS-SWS, page 16-20. IEEE, (2018)Network Intrusion Detection Based on Hybrid Rice Algorithm Optimized Extreme Learning Machine., , , , and . IDAACS-SWS, page 149-153. IEEE, (2018)An Indoor Localization Method Based on Cauchy Inverse Whale Optimization Algorithm., , , , , and . ICCSE, page 617-621. IEEE, (2021)