Search Results - (( software information data algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- software information »
- application stemming »
- stemming algorithm »
- information data »
- java application »
- data algorithm »
-
1
DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE
Published 2019“…Previously, many encryption algorithms have been investigated. The Cryptography Algorithm is used to protect data through encryption that allows sensitive information to be passed through the network safely. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
2
-
3
PSAT : a pairwise test data generation tool based on simulated annealing algorithm
Published 2015“…In this information technology era, there is a huge influence of high technology and artificial intelligence when creating new software products in the whole world. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Automatic document clustering and indexing of multiple documents using KNMF for feature extraction through Hadoop and lucene on big data
Published 2023“…Automatic indexing; Big data; Cluster analysis; Extraction; Factorization; Indexing (of information); Information retrieval; K-means clustering; Natural language processing systems; Open source software; Open systems; Pattern matching; Software quality; Software testing; Text mining; Hadoop; Key phrase extractions; Map-reduce; Pattern-matching technique; Porters; Pre-processing algorithms; Software environments; Unlabeled; Matrix algebra…”
Article -
5
-
6
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007Get full text
Get full text
Conference or Workshop Item -
7
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017“…Big Data Management includes storing, retrieving and analyzing the data to provide meaningful and relevant information. …”
Get full text
Get full text
Conference or Workshop Item -
8
Application of the bees algorithm to the selection features for manufacturing data
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
Convolution coder software implementation using VIiterbiDecoding algorithm
Published 2008Get full text
Get full text
Get full text
Proceeding Paper -
11
Jogging activity recognition using k-NN algorithm
Published 2022“…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
Get full text
Get full text
Get full text
Academic Exercise -
12
-
13
DESIGN AND IMPLEMENTATION OF RIPEMD-160 HASH FUNCTION USING VERILOG HDL
Published 2022“…Now, sensitive data can be safely transmitted via the network thanks to the Cryptography Algorithm's usage of encryption to safeguard data. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
14
-
15
Using language-based search in mining large software repositories
Published 2011“…Language component plays an important role in data/information retrieval. Data retrieval in software engineering is often hindered by the difficulty of getting data from commercial software. …”
Get full text
Get full text
Get full text
Proceeding Paper -
16
-
17
Pattern discovery using k-means algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Application Of Bibliometric Analysis on Root Growth Algorithm
Published 2024“…An article reviewed and analyzed bibliographic data on metaheuristics but is not specific on the topic of root growth algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
-
20
