Search Results - (( based constructing stem algorithm ) OR ( java application during algorithm ))
Search alternatives:
- based constructing »
- application during »
- constructing stem »
- java application »
- during algorithm »
- stem algorithm »
-
1
Building a French Stemmer Using a Dictionary of French Root Words
Published 1999“…In this thesis, a strong French stemming algorithm based on a dictionary of French root words is developed. …”
Get full text
Get full text
Thesis -
2
Incorporation of interference fit and cyclic loading in simulation algorithm for better prediction of micromotion of femoral stems
Published 2007“…Interface micromotion beyond a certain threshold limit inhibits bone ingrowth and favours the formation of fibrous tissue. In this study, an algorithm was constructed to predict micromotion and therefore instability of femoral stems. …”
Get full text
Get full text
Get full text
Article -
3
Development of an open-source and low-cost robotic arm based on STM32 microcontroller for promoting STEM education
Published 2023“…The forward kinematic has also been constructed and validated in a simulation-based environment in MATLAB and SolidWorks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
5
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Finite element study of metacarpophalangeal joint silicone implants
Published 2008“…An inhouse experimentally validated algorithm was used to calculate and display interface micromotion between the implant and the bone. …”
Get full text
Get full text
Book Section -
7
-
8
-
9
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
10
Predicting the popularity of tweets using the theory of point processes.
Published 2019“…The knowledge is combined using a novel empirical Bayes type approach, where the prior distribution for the model parameter is constructed based on the external knowledge, and the likelihood is calculated based on the internal knowledge. …”
Get full text
Get full text
UMK Etheses -
11
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
12
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Multi depot dynamic vehicle routing problem with stochastic road capacity for emergency medical supply delivery in humanitarian logistics
Published 2022“…Specifically a PDS - Rollout Algorithm (PDS-RA) is adopted. Five variants of constructive base heuristics, Teach Based Insertion Heuristic (TBIH-1 - TBIH-5) are proposed complementing the PDSRA when dealing with the lookahead rollout involving stochastic road capacity. …”
Get full text
Get full text
Thesis -
14
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
16
Enhancement of compound word extraction in Malay sentences using modified linguistics approaches / Zamri Abu Bakar
Published 2023“…Several preprocessing steps were involved which include normalization, tokenization, stemming and tagging. Finally, this study described several rules-based and modified the rules to get the most relevant relation between the first word and the second word in order to assist this study in solving the problems.…”
Get full text
Get full text
Thesis -
17
Compression of Three-Dimensional Terrain Data Using Lifting Scheme Based on Second Generation Wavelets
Published 2006“…Moreover, most of these algorithms are based either on Fourier transmission or on first order wavelet techniques. …”
Get full text
Get full text
Thesis
