Search Results - (( using application stemming algorithm ) OR ( java application system algorithm ))
Search alternatives:
- application stemming »
- stemming algorithm »
- using application »
- java application »
- system algorithm »
-
1
-
2
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
3
-
4
loformation Retrieval - using Porter Stemming Algorithm
Published 2006“…The scope of the project is to implement the original Porter Stemming Algorithm in the application to improved the precision and recall in the retrieving document process. …”
Get full text
Get full text
Final Year Project -
5
Monolingual and Cross-language Information Retrieval Approaches for Malay and English Language Document
Published 2006“…The results show that there is an improvement in performance from non-stemmed Malay to stemmed Malay, and also from previous stemming algorithm to the new stemming algorithm. …”
Get full text
Get full text
Thesis -
6
Study of stemming algorithm for Malay words which begin with alphabets 'M' / Mohd Zawawi Mohd Yunus
Published 2000“…These stemming algorithm problems will be solved by doing five experiments such as analysis the existing algorithm, do correction in the file, adding rules, correct the stemming algorithm and use two combination rules. …”
Get full text
Get full text
Thesis -
7
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Enhancement of stemming process for malay illicit web content
Published 2012Get full text
Get full text
Thesis -
9
To study the performance of stemming algorithm on Malay words beginning with the letter "S" / Rohana Jantan
Published 2000“…A Malay stemming algorithm known as RulesApplication-Order (RAO) is applied in the experiment. …”
Get full text
Get full text
Thesis -
10
Pashto language stemming algorithm
Published 2015“…Therefore, the objective of the current thesis is to develop a rule-based stemming algorithm for the Pashto language. The Pashto corpus is directly used as the input and the stemming algorithm uses both inflectional and derivational morphemes. …”
Get full text
Get full text
Get full text
Article -
11
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
12
Stemming Algorithm in Searching Malay Text
Published 2004Get full text
Get full text
Get full text
Thesis -
13
-
14
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
15
-
16
The study of stemming algorithm for Malay words that start with the letter 'B' from translated Quran documents / Azriana Ahmad
Published 1999“…The performance of this Malay stemming algorithm is tested using translated Quran documents and Malay dictionary. …”
Get full text
Get full text
Thesis -
17
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
18
Searching Malay text using stemming algorithm
Published 2004Get full text
Get full text
Get full text
Article -
19
Enhancement of rules-application-order (RAO) stemming algorithm based on the first character of Malay word / Edatul Muliana Ghazalli
Published 2005“…Stemming is used to reduce the size of indexing file for relevancy of document retrieval. …”
Get full text
Get full text
Thesis -
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item
