Search Results - (( developing memory information algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- information algorithm »
- memory information »
- developing memory »
- implication based »
- java implication »
-
1
-
2
An efficient fault syndromes simulator for SRAM memories
Published 2009Get full text
Get full text
Get full text
Article -
3
-
4
Quantum-inspired associative memories for incorporating emotion in a humanoid / Naoki Masuyama
Published 2016“…In regards to the ability improvements in terms of memory capacity and noise tolerance, the quantum-inspired hetero-association models with batch/incremental learning algorithm are developed based on QHAM. …”
Get full text
Get full text
Thesis -
5
Taxonomy of memory usage in swarm intelligence-based metaheuristics
Published 2019“…Based on the usage of memory, metaheuristics can be classified into algorithms with memory and without memory (memory-less). …”
Get full text
Get full text
Get full text
Article -
6
Direct approach for mining association rules from structured XML data
Published 2012“…The focus of this study is to propose an enhancement on memory consumption by reducing the number of candidates generated for the existing FLEX algorithm which will reduce the amount of memory needed to execute the algorithm. …”
Get full text
Get full text
Thesis -
7
New Quasi-Newton Equation And Method Via Higher Order Tensor Models
Published 2010“…Moreover, a new limited memory QN method to solve large scale unconstrained optimization is developed based on the modified BFGS updated formula. …”
Get full text
Get full text
Thesis -
8
-
9
An adaptive density-based method for clustering evolving data streams / Amineh Amini
Published 2014“…Recently, a number of density-based algorithms have been developed for clustering data streams. …”
Get full text
Get full text
Get full text
Thesis -
10
-
11
-
12
Rabies Outbreak Prediction Using Deep Learning with Long Short-Term Memory
Published 2020Get full text
Get full text
Get full text
Book Chapter -
13
Securing password authentication using MD5 algorithm
Published 2014“…Process of authentication can be defined as developing a unique mapping process from given password to some other unique information in a defined domain. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Quantum-Inspired Multidirectional Associative Memory With a Self-Convergent Iterative Learning
Published 2018“…Quantum-inspired computing is an emerging research area, which has significantly improved the capabilities of conventional algorithms. In general, quantum-inspired hopfield associative memory (QHAM) has demonstrated quantum information processing in neural structures. …”
Get full text
Get full text
Article -
15
Boyer-Moore horspool algorithm used in content management system of data fast searching
Published 2017“…After a deep view on few fast searching algorithm as Boyer-Moore algorithm, Boyer-Moore Horspool algorithm, Brute-Force Algorithm, Knuth-Morris-Pratt algorithm and Rabin-Karp algorithm, this research paper chooses Boyer-Moore Horspool algorithm to used in the content management system in term of data Fast Searching. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Towards developing a web application with text filtering for FTMSK : A case study for electronic exchange board / Sumardi Shukor
Published 2006“…Hence, this study is conducted to identify potential techniques can be used to mask the offensive words and a new textual filtering algorithm will be developed to resolve this problems. …”
Get full text
Get full text
Thesis -
17
Embedded vision system development using 32-bit Single Board Computer and GNU/Linux
Published 2011“…The increasing affordability of powerful processors and memory chips, availability of real-time operating systems, low complexity intelligent algorithms and the coming-of-age of system development software are the key factor that makes this development possible. …”
Get full text
Thesis -
18
Hardware Implementation Of Rc4a Stream Cipher Algorithm
Published 2007“…Therefore, a mechanism is required to guarantee the security and privacy of information. Under the existing circumstances cryptography is the only convenient method for protecting information transmitted through communication networks. …”
Get full text
Get full text
Thesis -
19
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005Get full text
Get full text
Final Year Project -
20
Forecasting of fine particulate matter based on LSTM and optimization algorithm
Published 2024“…The proposed models predict the hourly air pollutant concentration based on 4-h historical input based on six air pollutant data, meteorology parameters, and PM2.5 concentration data from the neighboring air quality monitoring stations. Long short-term memory based on metaheuristic algorithms, namely particle swarm optimization and sparrow search algorithm (PSO-LSTM and SSA-LSTM), are first developed and applied to determine the significance input combination to the changes of PM2.5 concentration at respective target stations. …”
Article
