A survey of Stemming Algorithms for Information Retrieval
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract:Now a day’s text documents is advancing over internet, e-mails and web pages. As the use of internetis exponentially growing, the need of massive data storage is increasing. Normally many of the documentscontain morphological variables, so stemming which is a preprocessing technique gives a mapping of differentmorphological variants of words into their base word called the stem. Stemming process is used in informationretrieval as a way to improve retrieval performance based on the assumption that terms with the same stemusually have similar meaning. To do stemming operation on large data, we require normally more computationtime and power, to cope up with the need to search for a particular word in the data. In this paper, variousstemming algorithms are analyzed with the benefits and limitation of the recent stemming technique.
Authors and Affiliations
Brajendra Singh Rajput
Secure and Reliable Document Faxing through Wi-Fi using Cloud
Secure and reliable document faxing through Wi-Fi using cloud is android based application where one can send documents through Wi-Fi within an organization. Organizations mostly use Gmail, Yahoo etc. for sending documen...
Penetrating Windows 8 with syringe utility
: Windows 8, the most popular operating system by Microsoft launched in October 2012. It is developed for use of desktops, laptops, tablets, home theatre PC’s. Windows 8 is more secure than previous version...
DCT based Steganographic Evaluation parameter analysis inFrequency domain by using modified JPEG luminanceQuantization Table
Abstract : Steganography is the process of hiding one file inside another such that others can neither identifythe meaning of the embedded object, nor even recognize its existence. In this paper we want to increase...
Adaptive Discrimination Detection for DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient with Collective Feedback
A Distributed denial of service (DDoS) attack is a most popular and crucial attack in the internet. Its motive is to make a network resource unavailable to the legitimate users. Botnets are commonly the engine...
Artificial Neural Network For Recognition Of HandwrittenDevanagari Character
Abstract: Information gathering is one of the most important thing in the digital world, manyorganizationsstill use handwritten documents for storing their information. So it is important task to convert this infor...