Implementation of Document Management System using Levenshtein Distance Algorithm
نویسندگان
چکیده
منابع مشابه
Effective and Efficient XML Duplicate Detection Using Levenshtein Distance Algorithm
There is big amount of work on discovering duplicates in relational data; merely elite findings concentrate on duplication in additional multifaceted hierarchical structures. Electronic information is one of the key factors in several business operations, applications, and determinations, at the same time as an outcome, guarantee its superiority is necessary. Duplicates are several delegacy of ...
متن کاملEmail Hoax Detection System Using Levenshtein Distance Method
Hoaxes are non-malicious viruses. They live on deceiving human’s perception by conveying false claims as truth. Throughout history, hoaxes have actually able to influence a lot of people to the extent of tarnishing the victim’s image and credibility. Moreover, wrong and misleading information has always been a distortion to a human’s growth. Some hoaxes were created in a way that they can even ...
متن کاملMeasuring Dialect Pronunciation Differences using Levenshtein Distance
The work in this thesis has been carried out under the auspices of the Behavioral and Cognitive Neurosciences (BCN) research school, Groningen. Acknowledgements This thesis is attributed to exactly one author as can be seen on both the cover and the title pages. The author is the one who is responsible for the content. But it should be emphasized that many people contributed to the coming about...
متن کاملApproximate Periods with Levenshtein Distance
We present a new algorithm deciding for strings t and w whether w is an approximate generator of t with Levenshtein distance at most k. The algorithm is based on finite state transducers.
متن کاملStatistical Analysis in Signature Recognition System Based on Levenshtein Distance
The study being presented is a continuation of the previous studies that consisted in the adaptation and use of the Levenshtein method in a signature recognition process. Three methods based on the normalized Levenshtein measure were taken into consideration. The studies included an analysis and selection of appropriate signature features, on the basis of which the authenticity of a signature w...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2020
ISSN: 0975-8887
DOI: 10.5120/ijca2020920091