Search Results - (( developing memory information algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Quantum-inspired associative memories for incorporating emotion in a humanoid / Naoki Masuyama by Naoki, Masuyama

    Published 2016
    “…In regards to the ability improvements in terms of memory capacity and noise tolerance, the quantum-inspired hetero-association models with batch/incremental learning algorithm are developed based on QHAM. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Taxonomy of memory usage in swarm intelligence-based metaheuristics by Yasear, Shaymah Akram, Ku-Mahamud, Ku Ruhana

    Published 2019
    “…Based on the usage of memory, metaheuristics can be classified into algorithms with memory and without memory (memory-less). …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The focus of this study is to propose an enhancement on memory consumption by reducing the number of candidates generated for the existing FLEX algorithm which will reduce the amount of memory needed to execute the algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    New Quasi-Newton Equation And Method Via Higher Order Tensor Models by Gholilou, Fahimeh Biglari

    Published 2010
    “…Moreover, a new limited memory QN method to solve large scale unconstrained optimization is developed based on the modified BFGS updated formula. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    An adaptive density-based method for clustering evolving data streams / Amineh Amini by Amini, Amineh

    Published 2014
    “…Recently, a number of density-based algorithms have been developed for clustering data streams. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12
  13. 13

    Securing password authentication using MD5 algorithm by Siti Nabilah , Mohammad Zain

    Published 2014
    “…Process of authentication can be defined as developing a unique mapping process from given password to some other unique information in a defined domain. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Quantum-Inspired Multidirectional Associative Memory With a Self-Convergent Iterative Learning by Masuyama, Naoki, Loo, Chu Kiong, Seera, Manjeevan, Kubota, Naoyuki

    Published 2018
    “…Quantum-inspired computing is an emerging research area, which has significantly improved the capabilities of conventional algorithms. In general, quantum-inspired hopfield associative memory (QHAM) has demonstrated quantum information processing in neural structures. …”
    Get full text
    Get full text
    Article
  15. 15

    Boyer-Moore horspool algorithm used in content management system of data fast searching by Chan, Chung Hoong, M. A., Ameedeen

    Published 2017
    “…After a deep view on few fast searching algorithm as Boyer-Moore algorithm, Boyer-Moore Horspool algorithm, Brute-Force Algorithm, Knuth-Morris-Pratt algorithm and Rabin-Karp algorithm, this research paper chooses Boyer-Moore Horspool algorithm to used in the content management system in term of data Fast Searching. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Towards developing a web application with text filtering for FTMSK : A case study for electronic exchange board / Sumardi Shukor by Shukor, Sumardi

    Published 2006
    “…Hence, this study is conducted to identify potential techniques can be used to mask the offensive words and a new textual filtering algorithm will be developed to resolve this problems. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Embedded vision system development using 32-bit Single Board Computer and GNU/Linux by Nur Farhan, Kahar

    Published 2011
    “…The increasing affordability of powerful processors and memory chips, availability of real-time operating systems, low complexity intelligent algorithms and the coming-of-age of system development software are the key factor that makes this development possible. …”
    Get full text
    Thesis
  18. 18

    Hardware Implementation Of Rc4a Stream Cipher Algorithm by Al Noman, Abdullah

    Published 2007
    “…Therefore, a mechanism is required to guarantee the security and privacy of information. Under the existing circumstances cryptography is the only convenient method for protecting information transmitted through communication networks. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Forecasting of fine particulate matter based on LSTM and optimization algorithm by Zaini N., Ahmed A.N., Ean L.W., Chow M.F., Malek M.A.

    Published 2024
    “…The proposed models predict the hourly air pollutant concentration based on 4-h historical input based on six air pollutant data, meteorology parameters, and PM2.5 concentration data from the neighboring air quality monitoring stations. Long short-term memory based on metaheuristic algorithms, namely particle swarm optimization and sparrow search algorithm (PSO-LSTM and SSA-LSTM), are first developed and applied to determine the significance input combination to the changes of PM2.5 concentration at respective target stations. …”
    Article