Search Results - (( basic separation selection algorithm ) OR ( java application stemming algorithm ))

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    A Comprehensive Study on CO2-CH4 Gas Separation Using γ-Alumina Membrane and Parameters Affecting Permeability and Separation Behavior by AHMAD, FATIN MUNIRAH

    Published 2012
    “…This report comprises the basic introduction of research area which includes background on membrane usage, types of membrane for intended separation and problems associated with this separation. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    SEGMENTATION OF ANTI-NUCLEAR ANTIBODY IMAGES BASED ON WATERSHEDS AND FAST REGION MERGING by Mehfar, Noor Liyana

    Published 2013
    “…Furthermore, watershed segmentation algorithm has several drawbacks which are the image to be over segmented and separation of homogenous region. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Fuzzy C means imputation of missing values with ant colony optimization by Mausor, F.H., Jaafar, J., Mohdtaib, S.

    Published 2020
    “…The advantage of FCM is it can provide a better separation of instances where it is not well separated. …”
    Get full text
    Get full text
    Article
  4. 4

    Backtracking search algorithm for optimal power dispatch in power system / Mostafa Modiri Delshad by Mostafa, Modiri Delshad

    Published 2016
    “…Backtracking search algorithm (BSA) as the new evolutionary technique of optimization is used for solving the problems. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Satellite Image Segmentation Using Thresholding Technique by Khalik, Mohd Haffez

    Published 2017
    “…The basic idea of automatic thresholding is to automatically select an optimal or several optimal grey-level threshold values for separating objects of interest in an image from the background based on their grey-level distribution. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks by Najmun, Najmun

    Published 2024
    “…Through effective separation of benign from harmful packet flows, this method lessens the burden on the control plane while preserving communication bandwidth. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Deterministic phase sequence approach for peak to average power ratio reduction in orthogonal frequency division multiplexing systems by Kazemian, Mohsen

    Published 2016
    “…This thesis has studied based on two distortion-less methods called Conventional Selected Mapping (CSLM), and Conventional Partial Transmit Sequence (CPTS) which are two of the most efficient techniques in this research area.In this thesis, a unique idea is proposed and applied in the time domain and frequency domain, separately. …”
    Get full text
    Get full text
    Thesis