用algorithm造句子,“algorithm”造句

来源:国语帮 4.88K

Then a configuration algorithm based on the model is presented.

This is about 01 knapsack problem dynamic programming algorithm.

An algorithm will mete out the offers by weighing customers' past purchases and geographic locations.

Perhaps the most cunning use of an evolutionary algorithm, though, is by Dr Koza himself.

The coordinates and the orientations of the minutia are utilized for identification in matching algorithm based on minutiae.

Where have we implemented a greedy algorithm, or have been asked to do a greedy algorithm? Well, there are not that many things you guys have been working on this semester.

A modified phase shifting algorithm is used in our testing system to improve the measurement accuracy, which decreases the errors from phase shifter and detector's nonlinearity.

Search algorithm, definition of sort, insertion sort, quick sort, optimal sort time, merge sort, Heap sort, radix sort, summarize of sort algorithms.

Subversion and other version control systems can save files using an algorithm that stores only the differences between a new version and the previous one, not the entire file.

On the analysis of image cutting problem caused by the cutting aperture during the course of computer display for large size and stripling railway top view maps, this paper puts forward a direct local patching method, which is a special resolution algorithm.

This follows the standard root insertion algorithm.

The numerical experiments show the effectiveness of the algorithm.

Theseus's strategy represents an algorithm for escaping from a maze, but it is not the only algorithm he could have used to solve this problem.

Complexity algorithm and wavelet package transform are discussed in this paper.

So far, the examples have taken a procedural approach: the algorithm is akin to a loop over the entire document.

Decision tree algorithms are applied to the data mining of the mammography classification, proposes a medical images classifier based on decision tree algorithm, the experiment results are given.

This tutorial does not purport to be an example of security in user authentication; instead, it will demonstrate the usage of XForms in the well-known algorithm for logging in and account creation.

planarity testing algorithm

This follows the same idea as the decimal multiplication algorithm.

An option is passing a numeric key to an algorithm and computing a relative record number.

The check code algorithm was adopted by batch upgrading program of citizenship numbers. The algorithm includes weighting sums of 17-bit digital code, module calculation, achieving corresponding check codes C according to module and so on.

An algorithm was designed to sort the headset EEG signals into either meditation or attention inputs, each with their own distinct pattern.

This paper designs an algorithm for mining a kind of as- sociation rules that the antecedent and action of such a rule belong to different conceptual classes, referred to class bridges.

We saw this with the sock algorithm a moment ago.

The new robust PCA algorithm can recognize the outliers in the sample set automatically and exterminate their effects to the accuracy of the PCA algorithm through proper processing to the outliers.

It sends information up to our server, and our server does this global matching algorithm to figure out which two phones in the world got the same bump at the same time in the same place.

Algorithm Type defines whether the cryptography algorithm is symmetric, asymmetric, or a message digest.

The algorithm dislocates the explicit request from any specific revision; they destroy the feedback required and are not suitable.

algorithm造句

radix sorting algorithm

In order to improve the speed of division, a novel algorithm of radix-16 high speed divider and its ASIC implementation are presented.

The SSL Server responds with the encryption algorithm and hash function to be used.

So it is necessary to adopt one encrypt intensity high algorithm encrypt some important data, in order to prevent that legal users operate over authority, illegal user attack viciously.

Secondly, the dichotomous search algorithm is introduced in this paper. Then the establishment process and utilization of the IDS algorithm are presented.

热门标签