英语人>网络例句>algorithms 相关的网络例句
algorithms相关的网络例句

查询词典 algorithms

与 algorithms 相关的网络例句 [注:此内容来源于网络,仅供参考]

Proffesor Nengchao Wang's works show that the bisection technique can describe the character and mechanism of the natural's evolution, and it is the basic pattern of evolutionary analization and the powerful flat to design high efficient algorithms.

王能超教授的一系列工作表明,二分技术可以刻画自然演化的基本特征和机制,是演化分析的基本模式,是研制高效算法的强大平台。

This paper extends the concept of multi level bitmap catalogue proposed in paper 〔1〕,by introducing multi word bit operation into the algorithms related to the catalogue structure .

本文推广多级位示图的概念,并在其有关算法中引入多倍字位操作;分析分配算法的时间复杂度和位示图目录相对的空间管理开销;分析存储池容量和分配算法的空间??

LAPACK's block algorithms also make use of Level 2 and Level 3 BLAS, which operate on larger portions of entire matrices.

LAPACK's 的区段运算法则也利用水平 2 和水平 3 BLAS,在整个矩阵的较大部分上操作。

In addition, algorithms used in PBE were discussed in details, including International Data Encryption Algorithm, Advanced Encryption Standard of U.S., safe Hash function named SHA-1, Pseudo Random Number Generator.The modes of operation in blok cipher,such as Electronic Code Book, Cipher Block Chaining, Cipfertext Feedback and Output Feedback,are described in the thesis.

采用DSP TMS320C5409汇编语言编制了以上各种算法,在DSP上实现了一个口令加密系统,数据加密速度达到3Mb/s以上,并实现密钥的安全管理,能满足个人PC机脱离主CPU加密大量数据的需要。

This dissertation adopted a new block pattern analyze algorithms to design simulation software.

文中采用了新的花纹块分析算法设计仿真软件,编制了与TNS/ODS配套的仿真校验软件。

Take a deep insight into community detection algorithms that are applied to unipartite graph and bipartite graph. We especially analyzed a greedy community detection algorithm designed by Blondel and the definition of modularity proposed by Barber.

对单元图和二分图中的社团检测算法进行研究,并着重剖析了 Blondel 等人提出的一种针对网络模块度的贪婪优化算法以及 Barber 等人提出的适用于二分图的模块度定义。

This program encrypts your personal data using strong encryption algorithms like Triple DES and Blowfish.

此程序加密您的个人资料,使用强大的加密算法,像三重DES和河豚。

A code for encryption, AES, BLUEFISH a very wide variety of encryption algorithms.

一个加密库代码,有AES,BLUEFISH的很多种加密算法。

After all, this is their own algorithms in Bola, has not see concrete implementation of the provisions.

这种算法毕竟只是自己在拨拉,一直还没见具体实施的条文。

During the study of the subject, I have an all-around understanding about the theory and application of Data Mining through reading bookmaking and papers in this field.Based on the research on algorithms, we realized one example following the workflow of Data Mining, which helps us understand the application of the technology.KEYWORDS: data mining , association rule , apriori algorithm

在课题的研究过程中,我通过阅读大量国内外著作、论文,对数据挖掘技术的理论和应用有了一个较为全面的了解,在理论上对关联规则的挖掘算法进行了深入的研究,对于数据挖掘的应用通过实现具体的实例进行研究,并且对挖掘结果进行评价,从而对数据挖掘的应用步骤有了更加深刻的理解。

第43/100页 首页 < ... 39 40 41 42 43 44 45 46 47 ... > 尾页
推荐网络例句

We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.

索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。

The relationship between communicative competence and grammar teaching should be that of the ends and the means.

交际能力和语法的关系应该是目标与途径的关系。

This is not paper type of business,it's people business,with such huge money involved.

这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。