Constructing an ontology-based and graph-based knowledge representation of English Quran
This paper describes a work in constructing two models of knowledge representation (KR) in aiming to do evaluation of their achievement in contributing to increase performance of retrieving information on English Quran domain. Due to many approaches available to construct a KR in providing data for...
| Main Authors: | Noordin, Mohamad Fauzan, Tengku Sembok, Tengku Mohd., Othman, Roslina, Gusmita, Ria Hari |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Penerbit UTM Press
2016
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/51545/ http://irep.iium.edu.my/51545/1/51545_Constructing%20an%20ontology-based.pdf http://irep.iium.edu.my/51545/2/51545_Constructing%20an%20ontology-based_SCOPUS.pdf |
Similar Items
System architecture for applying Malik Bennabi’s ruler on intellectual property of Islamic finance and banking
by: Othman, Roslina, et al.
Published: (2016)
by: Othman, Roslina, et al.
Published: (2016)
A rule-based question answering system on relevant documents of Indonesian Quran translation
by: Gusmita, Ria Hari, et al.
Published: (2014)
by: Gusmita, Ria Hari, et al.
Published: (2014)
Unstructured source artifacts ontology for requirement validation in GDSD
by: Altaf, Sohaib, et al.
Published: (2018)
by: Altaf, Sohaib, et al.
Published: (2018)
Using lexical ontology for semi-automatic logical data warehouse design
by: Mior Nazri, Mior Nasir, et al.
Published: (2010)
by: Mior Nazri, Mior Nasir, et al.
Published: (2010)
Visualization representation benefits of pre-requirement specification tractability
by: Altaf, Sohaib, et al.
Published: (2018)
by: Altaf, Sohaib, et al.
Published: (2018)
Approximate methods for minimum vertex cover fail to provide optimal results on small graph instances: A review
by: Fayaz, Muhammad, et al.
Published: (2018)
by: Fayaz, Muhammad, et al.
Published: (2018)
A model for real-time recognition and textual representation of Malaysian sign language through image processing
by: Karabasi, Mostafa, et al.
Published: (2013)
by: Karabasi, Mostafa, et al.
Published: (2013)
The intention to cyberbully and cyberbullying behaviour among undergraduate students
by: Abdul Rashid, Muhammad Shawal, et al.
Published: (2017)
by: Abdul Rashid, Muhammad Shawal, et al.
Published: (2017)
Approach for successful knowledge management system deployment for organizations
by: Gharamah, Abdulrahman, et al.
Published: (2018)
by: Gharamah, Abdulrahman, et al.
Published: (2018)
Compact and wide-band bismuth-based erbium-doped
fibre amplifier based on two-stage and double-pass
approaches
by: Cheng, X.S., et al.
Published: (2012)
by: Cheng, X.S., et al.
Published: (2012)
The effect of web-based social networking on consultancy
by: Shaikh, Humaiz, et al.
Published: (2019)
by: Shaikh, Humaiz, et al.
Published: (2019)
Performance analysis of clustering based genetic
algorithm
by: Najeeb, Athaur Rahman, et al.
Published: (2016)
by: Najeeb, Athaur Rahman, et al.
Published: (2016)
ISB watermarking embedding: block based model
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Similarities and dissimilarities between character frequencies of written text of Melayu, English and Indonesian languages
by: Shah, Asadullah, et al.
Published: (2013)
by: Shah, Asadullah, et al.
Published: (2013)
Performance evaluation of human identification based on ECG signal
by: Amiruddin, Ainunjariah, et al.
Published: (2015)
by: Amiruddin, Ainunjariah, et al.
Published: (2015)
Issues in location based marketing: a review of literature
by: Jaradat, Ahmad, et al.
Published: (2015)
by: Jaradat, Ahmad, et al.
Published: (2015)
Ethical based mathematical model to evaluate software engineering
by: Hameed, Shihab A., et al.
Published: (2013)
by: Hameed, Shihab A., et al.
Published: (2013)
Ethical based mathematical model to evaluate software engineering
by: Hameed, Shihab A., et al.
Published: (2012)
by: Hameed, Shihab A., et al.
Published: (2012)
Template based procedural rigging of quadrupeds with custom manipulators
by: Bhatti, Zeeshan, et al.
Published: (2013)
by: Bhatti, Zeeshan, et al.
Published: (2013)
Social media and knowledge management disruptive technology
by: Noordin, Mohamad Fauzan, et al.
Published: (2018)
by: Noordin, Mohamad Fauzan, et al.
Published: (2018)
Robust and secure image steganography based on elliptic curve cryptography
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
Prediction-based resource allocation model for real time tasks
by: Qureshi, Muhammad Shuaib, et al.
Published: (2018)
by: Qureshi, Muhammad Shuaib, et al.
Published: (2018)
Bayesian signaling game based efficient security model for MANETs
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
Offline OTP based solution for secure internet banking access
by: Khan, Burhan ul Islam, et al.
Published: (2019)
by: Khan, Burhan ul Islam, et al.
Published: (2019)
Poincare based PPG signal analysis for varying physiological states
by: Kazmi , Syed Absar, et al.
Published: (2016)
by: Kazmi , Syed Absar, et al.
Published: (2016)
A novel clustering based genetic algorithm for route optimization
by: Aibinu, Abiodun Musa, et al.
Published: (2016)
by: Aibinu, Abiodun Musa, et al.
Published: (2016)
Visualization of job availability based on text analytics localization approach
by: Mohamad Zamani, Nur Azmina, et al.
Published: (2019)
by: Mohamad Zamani, Nur Azmina, et al.
Published: (2019)
New estimates of single photon parameters for satellite-based QKD
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Mobility based surveillance model to facilitate security of individuals’ properties
by: Hameed, Shihab A.
Published: (2013)
by: Hameed, Shihab A.
Published: (2013)
Information sharing in governance of flood management in Malaysia: COBIT based framework
by: Maidin, Siti Sarah, et al.
Published: (2014)
by: Maidin, Siti Sarah, et al.
Published: (2014)
The semantics in GPS based mobile applications for blind users navigation outdoor
by: Akbar, Israh, et al.
Published: (2019)
by: Akbar, Israh, et al.
Published: (2019)
Evaluation of classifiers in a pressure and latency-based typing biometric system
by: Moez Khan, Imran, et al.
Published: (2011)
by: Moez Khan, Imran, et al.
Published: (2011)
CRF based feature extraction applied for supervised automatic text summarization
by: K. Batcha, Nowshath, et al.
Published: (2013)
by: K. Batcha, Nowshath, et al.
Published: (2013)
Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
Highly efficient short length Bismuth-based erbium-doped fiber amplifier
by: Cheng, X.S., et al.
Published: (2011)
by: Cheng, X.S., et al.
Published: (2011)
Mobile agent based multi-layer security framework for cloud data centers
by: Uddin, Mueen, et al.
Published: (2015)
by: Uddin, Mueen, et al.
Published: (2015)
Important attributes of customer satisfaction in telecom industry: a survey based study
by: Khan, Nusratullah, et al.
Published: (2017)
by: Khan, Nusratullah, et al.
Published: (2017)
Thermal imaging-based human emotion detection: GLCM feature extraction approach
by: Md Yusof, Hazlina
Published: (2015)
by: Md Yusof, Hazlina
Published: (2015)
The suitability of native application for university e-learning compared to web-based application
by: Sari, Maya Novia, et al.
Published: (2015)
by: Sari, Maya Novia, et al.
Published: (2015)
WSN based sensing model for smart crowed movement with identification: an extended study
by: Nawaz, Naeem A., et al.
Published: (2017)
by: Nawaz, Naeem A., et al.
Published: (2017)
Similar Items
-
System architecture for applying Malik Bennabi’s ruler on intellectual property of Islamic finance and banking
by: Othman, Roslina, et al.
Published: (2016) -
A rule-based question answering system on relevant documents of Indonesian Quran translation
by: Gusmita, Ria Hari, et al.
Published: (2014) -
Unstructured source artifacts ontology for requirement validation in GDSD
by: Altaf, Sohaib, et al.
Published: (2018) -
Using lexical ontology for semi-automatic logical data warehouse design
by: Mior Nazri, Mior Nasir, et al.
Published: (2010) -
Visualization representation benefits of pre-requirement specification tractability
by: Altaf, Sohaib, et al.
Published: (2018)