Keyword Extractor v.1.0

The aim of this project is to highlight the effect of lexical chain scoring metrics and keyword extraction techniques on summary generation. We present our own chain-based keyword extraction system using WordNet lexical database.

The aim of this project is to highlight the ...

 
  • Keyword Extractor
  • 1.0
  • AgustinJLopez
  • Windows
  • Freeware
  • 245
  • Free
 
 

Review Keyword Extractor

  • captcha
 

Other software of AgustinJLopez
  • Scrumaster  v.1.0The aim of this project is to develop a Java web based application to track projects with rapidly changing or highly emergent requirements using scrum as an agile process for developing software.
    
    New Science software
    • GHC Timetables generator EN  v.19.2.86Penalara GHC is an automatic software to generate timetables for schools of different levels: primary schools, high schools, vocational schools, universities and all other academic institutions.
    • GHC Timetables EN  v.19.2.72Penalara GHC is an automatic software to generate timetables for schools of different levels: primary schools, high schools, vocational schools, universities and all other academic institutions.
    • Relief valve sizing calculator  v.1.2.0.3Relief valve sizing calculator mainly carries out calculations based on equations specified by American petroleum institute. The equations allow engineers to size relieve devices that can be used for different industrial applications ...
    • Nature Simulations  v.7.72Nature Simulations is a collection of Small Business Planners around Nature, Humans, Plants and Animals. It starts with a children's model simulating a small river from Black to Caspian Sea, at 0 m above ground. See Trees around Aral Sea, diplomacy.
    • Kall conversion  v.1.0Java based application that convert English to hindi calendar.it would be on java and PHP based.
    • Knowledge Flow Checker  v.1.0KF Checker infers information flow rules from source code. The rules obtained in this way are used to create a theory which it then exploited to prove that information flow policies are respected.