Zobrazeno 1 - 2
of 2
pro vyhledávání: '"BELAL M. ABU ATA"'
Publikováno v:
Journal of Engineering Science and Technology, Vol 13, Iss 11, Pp 3473-3488 (2018)
Recently, Information hiding has an important role to protect data via the Internet from malicious attack, Steganography - which is the art of hiding data- uses a cover file to hide data by utilizing different schemas to prevent it from being detecte
Externí odkaz:
https://doaj.org/article/7caf787416204bd3895371b8ce5fdb0d
Autor:
Mohammed N. Al-Kabi, Saif A. Kazakzeh, Belal M. Abu Ata, Saif A. Al-Rababah, Izzat M. Alsmadi
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 27, Iss 2, Pp 94-103 (2015)
Stemming algorithms are used in information retrieval systems, indexers, text mining, text classifiers etc., to extract stems or roots of different words, so that words derived from the same stem or root are grouped together. Many stemming algorithms
Externí odkaz:
https://doaj.org/article/ffef950855b54d11b7faa298efb9dc11