Author of the publication

SwiftRank: An Unsupervised Statistical Approach of Keyword and Salient Sentence Extraction for Individual Documents.

, , , and . EUSPN/ICTH, volume 113 of Procedia Computer Science, page 472-477. Elsevier, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Packer identification method based on byte sequences., , , and . Concurr. Comput. Pract. Exp., (2020)Interference cancellation for non-orthogonal multiple access used in future wireless mobile networks., , , , and . EURASIP J. Wireless Comm. and Networking, (2016)Detection of cross site scripting attack in wireless networks using n-Gram and SVM., , , and . Mob. Inf. Syst., 8 (3): 275-286 (2012)A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment., , , and . Soft Comput., 18 (9): 1697-1703 (2014)Malicious behavior pattern mining using control flow graph., , , , and . RACS, page 119-122. ACM, (2015)Trajectory Annotation and Retrieval Based on Semantics., , , , and . Adaptive Multimedia Retrieval, volume 4918 of Lecture Notes in Computer Science, page 251-264. Springer, (2007)A LoRaWAN monitoring system for large buildings based on embedded edge computing in indoor environment., , , , and . Concurr. Comput. Pract. Exp., (2023)Evaluation and Comparative Analysis of Semantic Web-Based Strategies for Enhancing Educational System Development., , , and . Int. J. Semantic Web Inf. Syst., 18 (1): 1-14 (2022)A Classification method of Fake News based on Ensemble Learning., , , , , and . ICEA, page 51:1-51:4. ACM, (2020)Efficient data processing method for edge intelligence based on SVM., , , , , and . ICEA, page 29:1-29:6. ACM, (2020)