Search Results - (( developing effective stemming algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- application matching »
- stemming algorithm »
- java application »
-
1
-
2
loformation Retrieval - using Porter Stemming Algorithm
Published 2006“…There are many stemming method that have been developed. However, the main focus of this project is on Porter Stemming Algorithm which has been developed by M.F Porter in 1980. …”
Get full text
Get full text
Final Year Project -
3
Monolingual and Cross-language Information Retrieval Approaches for Malay and English Language Document
Published 2006“…An improved Malay stemming algorithm has been developed to stem the various word forms into their common root for the purpose of indexing and retrieving of Malay documents. …”
Get full text
Get full text
Thesis -
4
Arabic word stemming algorithms and retrieval effectiveness
Published 2023“…We have developed algorithms for Arabic stemming and incorporated it in our experimental system in order to measure retrieval effectiveness. …”
Conference Paper -
5
Incorporating stemming algorithm in the Malay information retrieval that employs Thesaurus aproach / Mohd Rosmadi Mokhtar
Published 2001“…This project incorporates the ROA stemming algorithm with thesaurus approach by Rapizal. …”
Get full text
Get full text
Thesis -
6
Stemming Hausa text: using affix-stripping rules and reference look-up
Published 2016“…Currently, there are a few stemming algorithms which have been developed for languages such as English, Arabic, Turkish, Malay and Amharic. …”
Get full text
Get full text
Get full text
Article -
7
Stemming Hausa text: using affix-stripping rules and reference look-up
Published 2016“…Currently, there are a few stemming algorithms which have been developed for languages such as English, Arabic, Turkish, Malay and Amharic. …”
Get full text
Get full text
Article -
8
Incorporating thesaurus in searching relevant ayat from the translated Al-Quran / Wan Iznif Wan Ibrahim
Published 2002“…This project incorporates the Rules Application Order (RAO) stemming algorithm with thesaurus approach by Rapizal. …”
Get full text
Get full text
Thesis -
9
-
10
-
11
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
12
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Predicting STEM academic performance in secondary schools: data mining approach
Published 2019“…Skills developed in students through STEM provide them with strong foundation to succeed in school and beyond. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
-
15
-
16
-
17
Prospects for basal stem rot disease based on soil apparent electrical conductivity in oil palm plantation
Published 2020“…Furthermore, the software was developed by using MATLAB to produce a predicted BSR map in oil palm plantation based on the developed algorithm. …”
Get full text
Get full text
Thesis -
18
Evaluation of the effectiveness of clustering algorithm in retrieving Malay documents / Aminah Mahmood
Published 2004“…This has led to an increased interest in developing methods that can help users to effectively navigate, summarize and organize this information with the ultimate goal of helping them to find what they are looking for. …”
Get full text
Get full text
Thesis -
19
-
20
Determination of tree stem volume : A case study of Cinnamomum
Published 2013“…A modeling approach is developed which focuses on the phases in the model-building procedures, effects of interactions variables on the model, minimizing the effects of multicollinearity on the variables and recommending remedial techniques to overcome them, identification of the significant variables by removing insignificant variables, selecting the best model using the eight selection criteria (8SCs), and finally using the residual analysis to validate the chosen best model. …”
Get full text
Get full text
Get full text
Thesis
