SlideShare une entreprise Scribd logo
1  sur  13
Importance of String in
Programming Language
Introduction
What Are Strings
Categories of string algorithms
❏ String Searching
❏ String Manipulation
❏ String Sorting
❏ String Parsing
Pic
Applications of String
User Communication
❏ Displaying messages
❏ Taking input
Text Editors
❏ Writing large amounts of text
❏ Finding, replacing and modifying text
Pic
Techniques:
❏ Tokenization
❏ Normalization (Stemming,
Lemmatization)
❏ Filtering Stop Words
❏ Using Regular Expressions
❏ Feature Extraction (Bag of Words)
❏ Term Frequency – Inverse Document
Frequency (TF-IDF)
Applications:
❏ Chatbots
❏ Translation Tools
❏ Spam Filtration
❏ Text Summarization
❏ Named Entity Recognition
❏ Autocomplete Features
❏ Social Media Mining
Natural Language Processing
Topic
Joseph Weizenbaum, creator of ELIZA, one of the first
chatbots, and considered a father of modern AI
Applications of String
Plagiarism and Spelling Checker
Plagiarism Checker:
❏ String matching is an approach for
plagiarism detection in programming.
This approach is a “character by
character” matching method
❏ A string of text from one document is
taken and then that same string is tried to
find in other documents
Spelling Checker:
❏ Trie is built based on a predefined set of
patterns. Then, this trie is used for string
matching
❏ The text is taken as input, and if any such
pattern occurs, it is shown by reaching
the acceptance state
❏ String contains() method is used to
check the passwords
❏ This method accepts a CharSequence
as an argument and returns true if the
argument is present in a string
otherwise returns false
❏ Firstly the length of the password has
to be checked then whether it contains
uppercase, lowercase, digits and
special characters
❏ If all of them are present then the
method returns true
Password Checker
Intrusion Detection System
❏ The data packets containing
intrusion-related keywords
are found by applying string
matching algorithms
❏ All the malicious code is
stored in the database, and
every incoming data is
compared with stored data
❏ If a match is found, then the
alarm is generated
❏ It is based on exact string
matching algorithms where
each intruded packet must
be detected
More Applications of String
Google Suggestions
When a user makes a Google
Search, Google adds that search
to a list of similar searches (with
same/similar keywords). It then
recommends the top 10-15 most
searched google searches related
to what the user has already
typed. String is used in Google
Suggestions for identifying those
keywords, so that Google can show
the user a relevant
recommendation
Digital Forensics
Digital forensics is the acquisition, analysis,
and preservation of data contained in
electronic devices whose information can
be used as evidence in a court of law.
Advanced digital forensic text string search
tools use match and indexing algorithms to
search for digital evidence to locate
specific text strings. They are designed to
achieve 100% query recall (find all instances
of the text strings).
Strings can be used for predicting the
composition of DNA and its pattern. DNA is
made of 4 hydrocarbons:
❏ Cytosine [C]
❏ Guanine [G]
❏ Adenine[A]
❏ Thymine [T]
DNA bases pair up with each other, A with T
and C with G, to form units called base pairs
and string programs can predict how they
pair up together based on data from other
similar strings containing information
about DNA
Prediction of DNA Sequences

Contenu connexe

Similaire à Importance of String in Programming Languages.pptx

INTRODUCTION TO Natural language processing
INTRODUCTION TO Natural language processingINTRODUCTION TO Natural language processing
INTRODUCTION TO Natural language processing
socarem879
 
บริการต่างๆบนอินเทอร์เน็ต
บริการต่างๆบนอินเทอร์เน็ตบริการต่างๆบนอินเทอร์เน็ต
บริการต่างๆบนอินเทอร์เน็ต
bukytk
 

Similaire à Importance of String in Programming Languages.pptx (20)

INTRODUCTION TO Natural language processing
INTRODUCTION TO Natural language processingINTRODUCTION TO Natural language processing
INTRODUCTION TO Natural language processing
 
Ijarcet vol-3-issue-1-9-11
Ijarcet vol-3-issue-1-9-11Ijarcet vol-3-issue-1-9-11
Ijarcet vol-3-issue-1-9-11
 
NLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptx
NLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptxNLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptx
NLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptx
 
Combining Approximate String Matching Algorithms and Term Frequency In The De...
Combining Approximate String Matching Algorithms and Term Frequency In The De...Combining Approximate String Matching Algorithms and Term Frequency In The De...
Combining Approximate String Matching Algorithms and Term Frequency In The De...
 
Sentiment analysis
Sentiment analysisSentiment analysis
Sentiment analysis
 
Ijetcas14 624
Ijetcas14 624Ijetcas14 624
Ijetcas14 624
 
A FILM SYNOPSIS GENRE CLASSIFIER BASED ON MAJORITY VOTE
A FILM SYNOPSIS GENRE CLASSIFIER BASED ON MAJORITY VOTEA FILM SYNOPSIS GENRE CLASSIFIER BASED ON MAJORITY VOTE
A FILM SYNOPSIS GENRE CLASSIFIER BASED ON MAJORITY VOTE
 
Top 10 Must-Know NLP Techniques for Data Scientists
Top 10 Must-Know NLP Techniques for Data ScientistsTop 10 Must-Know NLP Techniques for Data Scientists
Top 10 Must-Know NLP Techniques for Data Scientists
 
5 Algorithms Every Web Developer Can Use and Understand
5 Algorithms Every Web Developer Can Use and Understand5 Algorithms Every Web Developer Can Use and Understand
5 Algorithms Every Web Developer Can Use and Understand
 
Python NLTK
Python NLTKPython NLTK
Python NLTK
 
Phrase Based Indexing
Phrase Based IndexingPhrase Based Indexing
Phrase Based Indexing
 
Phrase Based Indexing and Information Retrivel
Phrase Based Indexing and Information RetrivelPhrase Based Indexing and Information Retrivel
Phrase Based Indexing and Information Retrivel
 
A FILM SYNOPSIS GENRE CLASSIFIER BASED ON MAJORITY VOTE
A FILM SYNOPSIS GENRE CLASSIFIER BASED ON MAJORITY VOTEA FILM SYNOPSIS GENRE CLASSIFIER BASED ON MAJORITY VOTE
A FILM SYNOPSIS GENRE CLASSIFIER BASED ON MAJORITY VOTE
 
Research Report
Research ReportResearch Report
Research Report
 
บริการต่างๆบนอินเทอร์เน็ต
บริการต่างๆบนอินเทอร์เน็ตบริการต่างๆบนอินเทอร์เน็ต
บริการต่างๆบนอินเทอร์เน็ต
 
NLP PPT.pptx
NLP PPT.pptxNLP PPT.pptx
NLP PPT.pptx
 
A Review Of Plagiarism Detection Based On Lexical And Semantic Approach
A Review Of Plagiarism Detection Based On Lexical And Semantic ApproachA Review Of Plagiarism Detection Based On Lexical And Semantic Approach
A Review Of Plagiarism Detection Based On Lexical And Semantic Approach
 
Internet Identifier SSR
Internet Identifier SSRInternet Identifier SSR
Internet Identifier SSR
 
Classification with R
Classification with RClassification with R
Classification with R
 
Improving Intrusion Detection with Deep Packet Inspection and Regular Express...
Improving Intrusion Detection with Deep Packet Inspection and Regular Express...Improving Intrusion Detection with Deep Packet Inspection and Regular Express...
Improving Intrusion Detection with Deep Packet Inspection and Regular Express...
 

Dernier

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Dernier (20)

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 

Importance of String in Programming Languages.pptx

  • 1. Importance of String in Programming Language
  • 3. What Are Strings Categories of string algorithms ❏ String Searching ❏ String Manipulation ❏ String Sorting ❏ String Parsing Pic
  • 4. Applications of String User Communication ❏ Displaying messages ❏ Taking input Text Editors ❏ Writing large amounts of text ❏ Finding, replacing and modifying text Pic
  • 5. Techniques: ❏ Tokenization ❏ Normalization (Stemming, Lemmatization) ❏ Filtering Stop Words ❏ Using Regular Expressions ❏ Feature Extraction (Bag of Words) ❏ Term Frequency – Inverse Document Frequency (TF-IDF) Applications: ❏ Chatbots ❏ Translation Tools ❏ Spam Filtration ❏ Text Summarization ❏ Named Entity Recognition ❏ Autocomplete Features ❏ Social Media Mining Natural Language Processing Topic Joseph Weizenbaum, creator of ELIZA, one of the first chatbots, and considered a father of modern AI
  • 7. Plagiarism and Spelling Checker Plagiarism Checker: ❏ String matching is an approach for plagiarism detection in programming. This approach is a “character by character” matching method ❏ A string of text from one document is taken and then that same string is tried to find in other documents Spelling Checker: ❏ Trie is built based on a predefined set of patterns. Then, this trie is used for string matching ❏ The text is taken as input, and if any such pattern occurs, it is shown by reaching the acceptance state
  • 8. ❏ String contains() method is used to check the passwords ❏ This method accepts a CharSequence as an argument and returns true if the argument is present in a string otherwise returns false ❏ Firstly the length of the password has to be checked then whether it contains uppercase, lowercase, digits and special characters ❏ If all of them are present then the method returns true Password Checker
  • 9. Intrusion Detection System ❏ The data packets containing intrusion-related keywords are found by applying string matching algorithms ❏ All the malicious code is stored in the database, and every incoming data is compared with stored data ❏ If a match is found, then the alarm is generated ❏ It is based on exact string matching algorithms where each intruded packet must be detected
  • 11. Google Suggestions When a user makes a Google Search, Google adds that search to a list of similar searches (with same/similar keywords). It then recommends the top 10-15 most searched google searches related to what the user has already typed. String is used in Google Suggestions for identifying those keywords, so that Google can show the user a relevant recommendation
  • 12. Digital Forensics Digital forensics is the acquisition, analysis, and preservation of data contained in electronic devices whose information can be used as evidence in a court of law. Advanced digital forensic text string search tools use match and indexing algorithms to search for digital evidence to locate specific text strings. They are designed to achieve 100% query recall (find all instances of the text strings).
  • 13. Strings can be used for predicting the composition of DNA and its pattern. DNA is made of 4 hydrocarbons: ❏ Cytosine [C] ❏ Guanine [G] ❏ Adenine[A] ❏ Thymine [T] DNA bases pair up with each other, A with T and C with G, to form units called base pairs and string programs can predict how they pair up together based on data from other similar strings containing information about DNA Prediction of DNA Sequences