Search Results - (( _ application stemming algorithm ) OR ( web application tools algorithm ))*

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project is developed by using Rapid Application Development methodology as it is the model that is most suitable for developing this web tools. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Web based clustering tool using K-MEAN++ algorithm / Muhammad Nur Syazwanie Aznan by Aznan, Muhammad Nur Syazwanie Aznan

    Published 2019
    “…Which is why this project objective is to develop a web based clustering tool using K-MEAN++ algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Monolingual and Cross-language Information Retrieval Approaches for Malay and English Language Document by Abdullah, Muhamad Taufik

    Published 2006
    “…The results show that there is an improvement in performance from non-stemmed Malay to stemmed Malay, and also from previous stemming algorithm to the new stemming algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    loformation Retrieval - using Porter Stemming Algorithm by Zulkifly, Zurida Azita

    Published 2006
    “…The scope of the project is to implement the original Porter Stemming Algorithm in the application to improved the precision and recall in the retrieving document process. …”
    Get full text
    Get full text
    Final Year Project
  7. 7
  8. 8

    Study of stemming algorithm for Malay words which begin with alphabets 'M' / Mohd Zawawi Mohd Yunus by Mohd Yunus, Mohd Zawawi

    Published 2000
    “…These stemming algorithm problems will be solved by doing five experiments such as analysis the existing algorithm, do correction in the file, adding rules, correct the stemming algorithm and use two combination rules. …”
    Get full text
    Get full text
    Thesis
  9. 9

    To study the performance of stemming algorithm on Malay words beginning with the letter "S" / Rohana Jantan by Jantan, Rohana

    Published 2000
    “…A Malay stemming algorithm known as RulesApplication-Order (RAO) is applied in the experiment. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Pashto language stemming algorithm by Aslamzai, Sebghatullah, Saidah Saad

    Published 2015
    “…Therefore, the objective of the current thesis is to develop a rule-based stemming algorithm for the Pashto language. The Pashto corpus is directly used as the input and the stemming algorithm uses both inflectional and derivational morphemes. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    An improved framework for content and link-based web spam detection: a combined approach by Shahzad, Asim

    Published 2021
    “…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms by Hydara, Isatou

    Published 2024
    “…Cross-site scripting (XSS) vulnerabilities are a major security threat for both desktop and mobile web applications. They occur due to lack of proper verification of the user inputs, which enables hackers to inject and execute malicious scripts in the web pages of an application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Image steganography using web application / Nor Arzami Othman ... [et al.] by Othman, Nor Arzami, Shariffudin, Muhammad Nur Harith, Osman, Mohd Nizam, Sedek, Khairul Anwar

    Published 2023
    “…The web application proved to be a versatile and practical tool with applications in various fields such as cryptography and digital forensics. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20

    Enhancement of rules-application-order (RAO) stemming algorithm based on the first character of Malay word / Edatul Muliana Ghazalli by Ghazalli, Edatul Muliana

    Published 2005
    “…The resuhs of experiment B, which is enhance project is better than experiment A, which is Rules-Application-Order (RAO) by Fatimah (1995) because that algorithm has successfully stemmed all word begin with alphabet "A" until "Z" that extracted fi-om Quran documents.…”
    Get full text
    Get full text
    Thesis