Simple program for bulk spell-checking

Assignment Help Basic Computer Science
Reference no: EM131441593

Bulk Spell Checker (Java)

This is a relatively simple program for bulk spell-checking and correcting an entire website. It has several pieces:

1. A parser that scans a local copy of the entire website, ignoring HTML (Hypertext Markup Language)markup, creating a HashMap off all the words used anywhere on the entire website, with a count of how many times each word was used. The list is case-sensitive.

2. An interface to a traditional spell check program to mark the words in the list as good or bad and provide a list of likely alternates for bad words.

3. You then remove the good words from the list.

4. Then you display the words sorted in order by frequency, most infrequently used first.

5. The user can peruse the list and select a replacement word, or type one in.

6. The user runs a batch replace program that replaces the uses of the bad words with replacements.

7. That deals with the errors that do not depend on context.

8. Then the user prepares a list of bad words remaining, in context.

9. The user can peruse the list and select a replacement word, or type one in.

10. The user runs a batch replace program that replaced the uses of the bad words with replacement, but only in the one context.

A large website might overflow RAM (Random Access Memory). So you might implement this with a 64-bit JVM (Java Virtual Machine) and a ton of RAM, and offer it as a service on the web.

Reference no: EM131441593

Questions Cloud

Create a linked list of objects : 1. Write a Java program that addresses a real world problem that needs a linked list. Create a linked list of objects (the object should be a realistic entity). Do NOT use the Java api libraries for this.
What sources are not acceptable for academic research : TOPIC CHOSEN - Present how strategic planning, performance improvement, and information systems are interrelated and fundamental to the delivery of quality health care. What sources are not acceptable for academic research and referencing
What is amortization schedule : Amortization schedule a. Complete an amortization schedule for a $23,000 loan to be repaid in equal installments at the end of each of the next three years.
Determining the direction of your project : HIS206 (HIR1709E)- Determining the direction of your project by writing a thesis statement. Choosing the events that you will discuss in your Final Project.
Simple program for bulk spell-checking : Bulk Spell Checker (Java) This is a relatively simple program for bulk spell-checking and correcting an entire website. It has several pieces:
Describe three interesting aspects about this culture : In a paragraph, introducethe cultural group you researched online. Be sure to give the location of the group, why you chose the group, and what you hope to learn. In one to two paragraphs, describe three interesting aspects about this culture.
What are you willing to pay for this bond for given data : Ford Motors issues a 6% coupon bond, with a maturity of 10 years. The face value (par) of the bond, payable at maturity, is $1,000. What are you willing to pay for this bond if your required rate of return is 7.5%?
What are the characteristics of a non profit organization : What are the characteristics of a non profit organization? Provide examples.What are the charateristics of a for profit organizations?  Provide examples.What are the benefits to the community of having for-profit organization and nonprofit organizat..
Examples of applying distance vector routing protocols : What is the sweet spot for DV routing protocols? Are we on the right track with suggesting small businesses are a good candidate for DV networks? What are some real-world examples of applying Distance Vector routing protocols?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Principles of logical design

Explain the principles of logical design. Discuss the strengths and weaknesses of various network designs. Demonstrate an understanding of network design by presenting their own designs and share and promote own design by means of written communic..

  Added values in formatting a documenting

What might be some challenges in formatting a 2013 document? What are the added values in formatting a documenting?

  Which service to select to achieve operational excellence

Consider not only costs but also such issues as delivery speed, pickup schedules, drop-off locations, tracking ability, and ease of use of the website. Which service did you select? Explain why.

  Attacks coming from packets to internal networks

1. Firewall doesn't provide 100% protection against any attacks coming from packets to internal networks? Do you agree? Why?

  Find the measure of displacement

Suppose a biologist is trying to net a fish under water. Find the measure of displacement if t measures 10 centimeters, the measure of angle A is 41°, and the measure of angle B is 60°.

  Disadvantages of allowing employees of an organization

Consider two (2) advantages and two (2) disadvantages of allowing employees of an organization, other than systems administrators and security personnel, to create and modify group policy objects in an organization and whether you believe the advanta..

  Corporate agency policy on employee use of instant messaging

What specific questions should a corporate or government agency policy on "Employee use of Instant Messaging (IM) using corporate computers" address?

  Components of a warehouse management system

components of a warehouse management system

  Describe how single-user system scheme works

Give a real-life example of a single-user system scheme, fixed partitions, dynamic partitions, and relocatable dynamic partitions. Describe how process works.

  Identify the advantages and disadvantages of circuit switch

Identify the advantages and disadvantages of circuit switching and packet switching-X.25, Frame Relay, Asynchronous Transfer Mode2, and Transmission Control Protocol/Internet Protocol (TCP/IP)-regarding performance, speed and throughput potential, an..

  Estimating software projects

Summarize the two most important tools and techniques used in estimating software projects. Provide an example of how these tools were applied in your work environment.

  Transit in a variety of applications

___________ is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet, and on cellular phone networks.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd