Search Results - (( its application stemming algorithm ) OR ( based application designing algorithm ))*

Refine Results
  1. 1

    Performance Analysis in Mesh Network-on-Chip Topology by using Multilevel Network Partitioning by Asrani, Lit, M. Q., Edanan, H. H. A., Halim, Fariza, Mahyan, Termimi Hidayat, Mahyan

    Published 2015
    “…This technique is applied in a case study using MPEG-4 video application with four famous partitioning algorithms (Linear, Spectral, Tailor-Made and Kerninghan-Lin). …”
    Get full text
    Get full text
    Proceeding
  2. 2

    Pashto language stemming algorithm by Aslamzai, Sebghatullah, Saidah Saad

    Published 2015
    “…Therefore, the objective of the current thesis is to develop a rule-based stemming algorithm for the Pashto language. The Pashto corpus is directly used as the input and the stemming algorithm uses both inflectional and derivational morphemes. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    REGION-BASED ADAPTIVE DISTRIBUTED VIDEO CODING CODEC by ABDELRAHMAN ELAMIN, ABDELRAHMAN ELAMIN

    Published 2011
    “…The recently developed Distributed Video Coding (DVC) is typically suitable for the applications where the conventional video coding is not feasible because of its inherent high-complexity encoding. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Stemming Hausa text: using affix-stripping rules and reference look-up by Andrew Bimba, Norisma Idris, Norazlina Khamis, Nurul Fazmidar Mohd Noor

    Published 2016
    “…Stemming is a process of reducing a derivational or inflectional word to its root or stem by stripping all its affixes. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Stemming Hausa text: using affix-stripping rules and reference look-up by Bimba, A.T., Idris, N., Khamis, N., Mohd Noor, N.F.

    Published 2016
    “…Stemming is a process of reducing a derivational or inflectional word to its root or stem by stripping all its affixes. …”
    Get full text
    Get full text
    Article
  6. 6

    Camera geometry determination based on circular's shape for peg-in-hole task by Farah Adiba, Azman

    Published 2019
    “…However, the holder design is not universal and not applicable to other companies. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Malay-language stemmer by Sankupellay, Mangalam, Valliappan, Subbu

    Published 2006
    “…Stemming is the removal of affixes (prefixes and suffixes) in a word in order to generate its root word. …”
    Get full text
    Get full text
    Article
  10. 10

    Bahasa Melayu Stemmer / Subbu Valliappan by Subbu , Valliappan

    Published 2004
    “…This Stemmer has a wide variety of applications and it caters for a vast age group. It is expected that when this system is developed and fully utilized, it will benefit its users and customers tremendously withh all of its powerful features. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Classification of basal stem rot disease in oil palm using dielectric spectroscopy by Al-Khaled, Al-Fadhl Yahya Khaled

    Published 2018
    “…Dielectric spectroscopy method has been identified to be able to classify plant diseases. However, studies on its application on basal stem rot (BSR) disease in oil palm are yet to be explored. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Compiler-based prefetching algorithm for recursive data structure by Anuar, Nurulhaini

    Published 2007
    “…This project investigates compiler-based prefetching for pointer based applications particularly those containing Recursive Data Structures (RDS) and designs the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Fast decryption method for a Rabin primitive-based cryptosystem by Asbullah, Muhammad Asyraf, Kamel Ariffin, Muhammad Rezal

    Published 2014
    “…Hence faster decryption algorithms are sought-after. In this paper we design a fast and efficient algorithm for the decryption of the new cryptosystem based on the Rabin primitive. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20