Search Results - (( data application stemming algorithm ) OR ( java application during algorithm ))
Search alternatives:
- application stemming »
- stemming algorithm »
- application during »
- data application »
- java application »
- during algorithm »
-
1
Pashto language stemming algorithm
Published 2015“…Therefore, the objective of the current thesis is to develop a rule-based stemming algorithm for the Pashto language. The Pashto corpus is directly used as the input and the stemming algorithm uses both inflectional and derivational morphemes. …”
Get full text
Get full text
Get full text
Article -
2
The study of stemming algorithm for Malay words that start with the letter 'B' from translated Quran documents / Azriana Ahmad
Published 1999“…Stemming algorithm have been developed in many different languages. …”
Get full text
Get full text
Thesis -
3
-
4
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
5
Classification of basal stem rot disease in oil palm using dielectric spectroscopy
Published 2018“…However, studies on its application on basal stem rot (BSR) disease in oil palm are yet to be explored. …”
Get full text
Get full text
Thesis -
6
-
7
A knowledge based system for automatic classification of web pages
Published 2006Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants
Published 2019“…Information about chili pests is collected so that it becomes a database that can be used to identify disease pests using the data mining method. The use of data mining algorithms is expected to help in the identification of pests and diseases in chili plants. …”
Get full text
Get full text
Conference or Workshop Item -
9
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
10
E-Hadith DV: Hadith scriptures in Syafie Madhhab retrieval using data visualization / Nor Faezahtul Salme Norhisam
Published 2020“…Next, the TF-IDF algorithm is performed on the processed data to find the relevant hadith based on the user’s query. …”
Get full text
Get full text
Thesis -
11
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004Get full text
Get full text
Thesis -
12
-
13
-
14
-
15
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
16
A hybrid Method Of Centroid-Based Clustering And Meta-Heuristic For Personalized Web Search
Published 2024thesis::doctoral thesis -
17
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
18
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Computational analysis of biological data: Where are we?
Published 2024Get full text
Get full text
Get full text
Get full text
Book Chapter -
20
FT-IR absorbance data for early detection of oil palm fungal disease infestation
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item
