Search Results - (( developing using stemming algorithm ) OR ( java application model algorithm ))
Search alternatives:
- stemming algorithm »
- application model »
- developing using »
- java application »
- model algorithm »
- using stemming »
-
1
-
2
loformation Retrieval - using Porter Stemming Algorithm
Published 2006“…The objective of this project is to develop a system that will demonstrate the information retrieval using Porter Stemming Algorithm. …”
Get full text
Get full text
Final Year Project -
3
Monolingual and Cross-language Information Retrieval Approaches for Malay and English Language Document
Published 2006“…An improved Malay stemming algorithm has been developed to stem the various word forms into their common root for the purpose of indexing and retrieving of Malay documents. …”
Get full text
Get full text
Thesis -
4
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
5
Pashto language stemming algorithm
Published 2015“…The Pashto corpus is directly used as the input and the stemming algorithm uses both inflectional and derivational morphemes. …”
Get full text
Get full text
Get full text
Article -
6
The study of stemming algorithm for Malay words that start with the letter 'B' from translated Quran documents / Azriana Ahmad
Published 1999“…Stemming algorithm have been developed in many different languages. …”
Get full text
Get full text
Thesis -
7
Building a French Stemmer Using a Dictionary of French Root Words
Published 1999“…In this thesis, a strong French stemming algorithm based on a dictionary of French root words is developed. …”
Get full text
Get full text
Thesis -
8
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
9
Component-based stemming engine for malay text / Juhari ljam
Published 2003“…The developer has just to use the component engine and get the output easily. …”
Get full text
Get full text
Thesis -
10
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Incorporating stemming algorithm in the Malay information retrieval that employs Thesaurus aproach / Mohd Rosmadi Mokhtar
Published 2001“…One of well-known conflation methods is stemming algorithms, where it is used to identify morphological variants. …”
Get full text
Get full text
Thesis -
12
Stemming Hausa text: using affix-stripping rules and reference look-up
Published 2016“…Unfortunately, no algorithm has been used to stem text in Hausa, a Chadic language spoken in West Africa. …”
Get full text
Get full text
Get full text
Article -
13
Arabic word stemming algorithms and retrieval effectiveness
Published 2023“…We have developed algorithms for Arabic stemming and incorporated it in our experimental system in order to measure retrieval effectiveness. …”
Conference Paper -
14
Stemming Hausa text: using affix-stripping rules and reference look-up
Published 2016“…Unfortunately, no algorithm has been used to stem text in Hausa, a Chadic language spoken in West Africa. …”
Get full text
Get full text
Article -
15
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
16
-
17
Incorporating thesaurus in searching relevant ayat from the translated Al-Quran / Wan Iznif Wan Ibrahim
Published 2002“…One of the well-known conflation algorithms, stemming, is only used to identify morphological variants. …”
Get full text
Get full text
Thesis -
18
-
19
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
Get full text
Get full text
Final Year Project -
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item
