Search Results - (( its application stemming algorithm ) OR ( some applications usage algorithm ))*

Refine Results
  1. 1

    Pashto language stemming algorithm by Aslamzai, Sebghatullah, Saidah Saad

    Published 2015
    “…Therefore, the objective of the current thesis is to develop a rule-based stemming algorithm for the Pashto language. The Pashto corpus is directly used as the input and the stemming algorithm uses both inflectional and derivational morphemes. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Stemming Hausa text: using affix-stripping rules and reference look-up by Andrew Bimba, Norisma Idris, Norazlina Khamis, Nurul Fazmidar Mohd Noor

    Published 2016
    “…Stemming is a process of reducing a derivational or inflectional word to its root or stem by stripping all its affixes. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Stemming Hausa text: using affix-stripping rules and reference look-up by Bimba, A.T., Idris, N., Khamis, N., Mohd Noor, N.F.

    Published 2016
    “…Stemming is a process of reducing a derivational or inflectional word to its root or stem by stripping all its affixes. …”
    Get full text
    Get full text
    Article
  4. 4

    Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks by Mohamed, Mohamed Awad Elshaikh

    Published 2006
    “…This thesis investigates the effect of different scheduling mechanisms and usage of a different marker algorithms then develop and implement a fair scheduling mechanism and integrate it with a shaper with the usage of a very fair efficient marker at the edge of the DiffServ networks with the usage of simulation and analytical techniques. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Malay-language stemmer by Sankupellay, Mangalam, Valliappan, Subbu

    Published 2006
    “…Stemming is the removal of affixes (prefixes and suffixes) in a word in order to generate its root word. …”
    Get full text
    Get full text
    Article
  7. 7

    Bahasa Melayu Stemmer / Subbu Valliappan by Subbu , Valliappan

    Published 2004
    “…This Stemmer has a wide variety of applications and it caters for a vast age group. It is expected that when this system is developed and fully utilized, it will benefit its users and customers tremendously withh all of its powerful features. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10
  11. 11

    Classification of basal stem rot disease in oil palm using dielectric spectroscopy by Al-Khaled, Al-Fadhl Yahya Khaled

    Published 2018
    “…Dielectric spectroscopy method has been identified to be able to classify plant diseases. However, studies on its application on basal stem rot (BSR) disease in oil palm are yet to be explored. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof by Md Taujuddin, Nik Shahidah Afifi, Abdullah, Abdul Hanan, Maarof, Mohd Aizaini

    Published 2006
    “…But the major treat of the IPSec is caused by the usage or the algorithm that has weak keys. The algorithms are DES, 3DES, Blowfish, Cast128 and RC5. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    E-Hadith DV: Hadith scriptures in Syafie Madhhab retrieval using data visualization / Nor Faezahtul Salme Norhisam by Norhisam, Nor Faezahtul Salme

    Published 2020
    “…Implementation of sentence-based searching and the usage of the stemming algorithm would be considered to produce more meaningful results for future work.…”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil by Shahrul Kamil, Aiman Nurrasyid

    Published 2020
    “…There are four experiment conducted such as processing time, power usage, memory usage and data modification attack. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20