A review: Information extraction techniques from research papers

K Jayaram, K Sangeeta - 2017 International conference on …, 2017 - ieeexplore.ieee.org
Text extraction is a crucial stage of analyzing Journal papers. Journal papers generally are
in PDF format which is semi structured data. Journal papers are presented into different …

Information extraction applications for clinical trials: A survey

S Alves, J Costa, J Bernardino - 2019 14th Iberian Conference …, 2019 - ieeexplore.ieee.org
Many Information Extraction (IE) applications are available, in several domains, to handle
the increasingly volume of data. This paper reviews applications and methods used for IE …

Packet length covert channel: A detection scheme

MA Elsadig, YA Fadlalla - 2018 1st International Conference on …, 2018 - ieeexplore.ieee.org
A covert channel is a communication channel that is subjugated for illegal flow of information
in a way that violates system security policies. It is a dangerous, invisible, undetectable, and …

A comparative study of the current technologies and approaches of relation extraction in biomedical literature using text mining

F Alshuwaier, A Areshey, J Poon - 2017 4th IEEE International …, 2017 - ieeexplore.ieee.org
Many techniques in Relation Extraction (RE) require an understanding of the concept and
association of relations between entities. This paper presents advanced approaches that …

NLP methods' information extraction for textual data: an analytical study

B Benkassioui, N Kharmoum, MY Hadi… - … Conference on Advanced …, 2022 - Springer
Abstract Information Extraction (IE) is the process of automatically extracting pertinent
information from unstructured or semi-structured data, and it typically involves the analysis of …

Uttokb: a model for semantic relation extraction from unstructured text

MN Salim, BS Mustafa - 2021 5th International Symposium on …, 2021 - ieeexplore.ieee.org
In this paper, a model prototype called UTtoKB has been built. It extracts semantic
relationships from an unstructured text based on ontology. The model is a pipeline steps …

[PDF][PDF] Packet length covert channels crashed

MA Elsadig, YA Fadlalla - J Comput Sci Comput Math, 2018 - jcscm.net
Advanced developments in network security tools and techniques have inspired attackers to
find alternative ways to bypass them. A network covert channel is a wide-open door for …

[PDF][PDF] A machine learning approach for breast cancer early detection

MA Elsadig - J Theor Appl Inf Technol, 2021 - jatit.org
The rapid increase in incidence of breast cancer is clearly noticeable. The cause of the
disease is not clear and the reasons behind the increase of incidence are not well identified …

[PDF][PDF] Ensemble Classifier for Breast Cancer Detection

MA ELSADIG - Journal of Theoretical and Applied Information …, 2022 - jatit.org
The late discovery of breast cancer is the main reason for the low survival rate, so its early
detection can lessen the risk and prevent progression, thus reducing mortality rates …

An information extraction model using a graph database to recommend the most applied case

T Padayachy, B Scholtz… - … Conference on Computing …, 2018 - ieeexplore.ieee.org
Legal researchers spend too much time on locating the most applied case. The purpose of
this paper is to present a comprehensive model to assist legal researchers in accessing …