Search Results - (( development process stemming algorithm ) OR ( java implementation based algorithm ))
Search alternatives:
- implementation based »
- java implementation »
- stemming algorithm »
- process stemming »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
loformation Retrieval - using Porter Stemming Algorithm
Published 2006“…There are many stemming method that have been developed. However, the main focus of this project is on Porter Stemming Algorithm which has been developed by M.F Porter in 1980. …”
Get full text
Get full text
Final Year Project -
4
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
5
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
6
Arabic word stemming algorithms and retrieval effectiveness
Published 2023“…We have developed algorithms for Arabic stemming and incorporated it in our experimental system in order to measure retrieval effectiveness. …”
Conference Paper -
7
Café Web Based System Using Priority Scheduling Approach
Published 2017“…The priority scheduling algorithm is based on Control Processing Unit scheduling algorithm where it has a priority to execute tasks. …”
Get full text
Get full text
Conference or Workshop Item -
8
Pashto language stemming algorithm
Published 2015“…Therefore, the objective of the current thesis is to develop a rule-based stemming algorithm for the Pashto language. …”
Get full text
Get full text
Get full text
Article -
9
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Java based expert system for selection of natural fibre composite materials
Published 2013“…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
Get full text
Get full text
Get full text
Article -
11
A word stemming algorithm for Hausa language
Published 2015“…As such, this study inspirationally presents an automatic word stemming system for Hausa language with a view to contributing to the field of electronic text processing, as well as NLP, in general. …”
Get full text
Get full text
Article -
12
Building a French Stemmer Using a Dictionary of French Root Words
Published 1999“…In this thesis, a strong French stemming algorithm based on a dictionary of French root words is developed. …”
Get full text
Get full text
Thesis -
13
Stemming and lemmatization: A comparison of retrieval performances
Published 2014“…Comparisons were also made between these two techniques with a baseline ranking algorithm (i.e. with no language processing). A search engine was developed and the algorithms were tested based on a test collection. …”
Get full text
Get full text
Conference or Workshop Item -
14
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
15
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Component-based stemming engine for malay text / Juhari ljam
Published 2003“…These projects are studied and a new algorithm is being proposed to improve the performance of the stemming process. …”
Get full text
Get full text
Thesis -
17
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…In this paper, the blood vessel detection system is implemented and optimized in a portable device running Android OS on an ARM-based processor. …”
Get full text
Get full text
Conference or Workshop Item -
18
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. …”
Get full text
Get full text
Conference or Workshop Item -
19
Stemming Hausa text: using affix-stripping rules and reference look-up
Published 2016“…Stemming is a process of reducing a derivational or inflectional word to its root or stem by stripping all its affixes. …”
Get full text
Get full text
Get full text
Article -
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item
