网站首页  词典首页

请输入您要查询的英语单词:

 

单词 Algorithm
例句
1. The most rudimentary algorithm repeats a single instruction.
2. The full genetic algorithm will be described below.
3. An algorithm for ordering ideal hybridisation data.
4. That is no algorithm at all.
5. This is a hill climbing algorithm.
6. The method involved forms half of a genetic algorithm.
6. try its best to gather and create good sentences.
7. An extremely simple algorithm which does this runs thus.
8. Such an algorithm can provide an alternative learning mechanism in a neural network.
9. Neural networks may be used for algorithm development as well.
10. Then a basic algorithm for division is shown in Figure 2.4, again derived from the normal pencil-and paper method.
11. The basic search algorithm is as before, except that actions are of two sorts.
12. For that we need an algorithm for generating the complementary set.
13. What does it mean to activate an algorithm, or to embody it in physical form?
14. An island-driving algorithm will explore those paths that ultimately fail to match the beginning and ending of the utterance.
15. It becomes critical that the algorithm or program approximates sufficiently, or disaster can occur Smart materials make the situation even worse.
16. What is more, in the hierarchical algorithm, early rules gain much more credit.
17. Parsing Algorithm A grammar is simply a declarative statement of what forms a valid sentence.
18. But the algorithm is the same finite set of instructions no matter how big the numbers.
19. The algorithm used is best described by considering an example.
20. The principal datum input to any search algorithm is a description of its search space.
21. Are there any absolute limitations to what an algorithm could in principle achieve?
22. When files are randomly organized using an algorithm, the device must first be initialized to remove all prior data.
23. This method, which is commonly known as staged search, does affect the admissibility of the algorithm.
24. Its use of mutation and chance seems to occur within restraints; within an algorithm that we are still trying to decipher.
25. According to the Forum, these can also be used to develop algorithm applications.
26. How the interconnection weights are changed is the function of the learning algorithm.
27. To help prove this theorem we shall need to call upon the following result, which is known as the Division Algorithm.
28. They thus show the number of synonyms created, assuming a perfect randomizing algorithm, for various packing factors.
29. The mind-stuff of strong Al is the logical structure of an algorithm.
30. If the costs on the paths are non-decreasing with length then this algorithm is guaranteed to find the cheapest path first.
31. Most speech systems have used variations on these two types of admissible search algorithm.
32. The major limitation of this algorithm is the quality of the simulation in the planning stage.
33. If the complex number c is in the white region, then there is an algorithm for ascertaining that fact.
34. His analysis was more like the algorithm embodied in one of the later versions of Bacon.
35. Conclusions Thus it does appear that the search space can be such that an admissible algorithm will perform in an excessively breadth-first manner.
36. We could, of course, defeat this improved algorithm too, by simply applying the foregoing procedure all over again.
36. try its best to collect and make good sentences.
37. It might seem that a suitable algorithm could be found which would not generate synonyms.
38. The traversal algorithm also allows users to specify link-type priorities.
39. Would changing an algorithm be different in any sense from merely discarding one algorithm and replacing it with another?
40. This f is used only to detect when the algorithm has reached a summit or plateau.
41. An algorithm purporting to match what is presumed to be operating in a human brain would need to be a stupendous thing.
42. The actual algorithm is easily obtained from the above formula.
43. This is sheer chance, but suggests a good average result from the use of the algorithm!
44. Then we should have some algorithm for generating the elements of this complementary set.
45. There are even certain particular selections of initial list for which there is no algorithm for deciding when two words are unequal.
46. An unsupervised learning algorithm might emphasize cooperation among clusters of processing elements.
47. The W algorithm was designed to be more breadth-first, and more consistent results were expected regardless of the input conditions.
48. At least, there appears to be no known algorithm for the black region.
49. It uses a Wavelet algorithm for video compression and provides compact disk quality audio and broadcast quality video.
50. Indeed, some operating systems are geared to handling queues by offering the user a choice of queuing algorithm.
51. It would differ very greatly in degree from the simple algorithm of the thermostat, but need not differ in principle.
52. I do not require that there be any algorithm, known or unknown, for presenting these digits.
53. Several flaws in the simple bucket brigade algorithm arise only if the search path is long.
54. Figure 9b shows the space which a naive search algorithm will explore for this task.
55. If the algorithm is to do all we want, contexts should be allowed to include some variables too.
56. As l have just remarked, the particular physical embodiment of an algorithm is something totally irrelevant.
57. An algorithm which performs this trick before it starts searching is said to be goal directed, or a backwards searcher.
58. The probability score can also improve the efficiency of the parsing algorithm by pruning out low-probability alternatives.
59. The algorithm or the general calculational procedure-is just the same no matter how large the numbers are.
60. There is, in principle, no limit to the size of the numbers on which that algorithm can act.
61. If the quality of bottom-up information was good, the algorithm could quickly home in on the correct sequence of words.
62. The new algorithm is being tested by executives in the finance department of large multinational companies.
63. Woods solution was to use this algorithm with the island-driving search strategy.
64. To see how this arises in detail suppose we have such an algorithm that is sometimes effective.
65. It may thus transpire that a marginal improvement is insufficient to justify the increase in complexity associated with this algorithm.
66. Fractals, using simple mathematical algorithm to produce complex objects typical of those which occur naturally.
67. In that eventuality, such an algorithm, if it could be found, would presumably pass the Turing test.
68. The purpose of this research is to develop a more adaptive algorithm which can be run on a micro- computer.
69. However, if certain conditions hold, it can be shown that the algorithm is near admissible.
70. It is a set of simple rules - a program or algorithm - that tells the developing organism what to do next.
71. Suppose that we are simply given an algorithm which generates the digits of the real and imaginary part of some complex number.
72. To determine the derivation of a sentence it is necessary to use a parsing algorithm.
73. Direct files require extensive design work, because every file and every algorithm will differ slightly from every other.
74. There is a well known simple algorithm for doing this.
75. Thus, banks suggest that each private key password also be used as an integral part of the encryption algorithm.
76. This algorithm is applied every time it is the program's turn to move.
77. But first they have to decode the scanner's algorithm.
78. Can use blowfish algorithm to securely encrypt files.
79. A new hyperstable adaptive recursive filter algorithm is proposed.
80. A commonly used microcomputer algorithm for multiplication.
81. A heuristic algorithm for rapid formation of the explosion fragments is proposed.
82. In this paper, the geometric distortion correction method for the SAR image obtained by the sub-aperture RD algorithm is proposed. The validity of the method is demonstrated by simulation.
83. Then, an contour extraction algorithm was used to remove the inner pixel of image, and the last part was image edge.
84. A new mesh auto - generation algorithm of arbitrary quadrilateral is presented.
85. The result proves that genetic algorithm settles the problem of original model that run into the local least value end enhance the success ratio of the object extraction.
86. A statement of fact to be tested for truth or falsehood within an algorithm.
87. The translating algorithm which converts the RCC8, cardinal direction and size relations into extended rectangle relations is given.
88. This paper describes a new nonlinear filtering algorithm (NLF) for tracking maneuvering targets, presents reasonable maneuvering likelihood function, derives estimating equations.
89. To learn a classifier, a semisupervised Bayesian approach is adopted. An EM algorithm is derived to compute maximum likelihood estimate. Experimental results demonstrate appropriate accuracy.
90. Numerical simulation of single charge explosion on seabed in shallow water was implemented with ALE algorithm.
91. This paper presents a fast demodulation algorithm of a 2FSK signal based on short time cycle autocorrelation.
92. Then the numerical results show that new algorithm effectively overcomes the shortcomings of secant method, and evidently improves the convergent speed, convergent range and algorithm stability.
93. In this paper, a new approach, which is based on simulated annealing algorithm for solving a class of diffusion equation of parameter operator identification of inverse problem, is presented.
94. In this paper, a parthenogenetic algorithm for solving the degree-constrained minimum spanning tree problem is proposed.
95. By use of the properties of pheromone of ant colony algorithm, an ant colony algorithm based on multiplicate pheromone is proposed to solve the traveling salesman problems(TSP).
96. Baby-step-giant-step attack algorithm is universally suitable to solve all discrete logarithm problems, but its relatively larger storage cost is an obvious defect.
97. Finally, a heuristic algorithm is proposed to move the wires out of the obstacles.
98. A liquid level process control system is designed for the purpose of control algorithm research in this paper, including liquid level tank device, communication hardware and control software.
99. In the interactive rendering, viewers can control the resolution distribution of points on the whole surfaces by defining current view parameters and using a paging algorithm.
100. Simulation results show that the algorithm has a good equalization performance.
101. A new algorithm for computing correlation and convolution is introduced.
102. Also, an auxiliary line algorithm for solving branching problem was given.
103. Furthermore, through the maximum likelihood used for evaluating three parameters of wavelet coefficients' probability model, the adaptive algorithm is derived in the article.
104. Idea of the algorithm is to induce three kinds of trees from lexicalized tree bank. Then the method of Head-driven Phrase Structure Grammar(HPSG) was applied to extract lexicalized tree from corpus.
105. Based on the analysis of the symbolic substitution algorithm, an optoelectronic hybrid computer(OEHCBSS) architecture which is based on the algorithm is proposed.
106. In order to get the command diagram, a new functor was adopted in the PLS algorithm.
107. A novel mission planning algorithm for space surveillance phased array radar systems is presented.
108. From these data a tree induction algorithm builds decision trees.
109. This paper discusses the parallel FFT algorithm on the hypercube architecture. Based on the analysis of the communication complexity, the speedup of the algorithm is derived.
110. The system implemented with the algorithm has been tested on TDT4 corpus and got satisfactory results while reducing time and space complexity of algorithm remarkably.
111. Secondly, the problem of the minimum weight design is resolved by using the optimum vector algorithm under the constraint of the structure system reliability.
112. Secondly, we should account for the influence of different task synchronization protocols to schedulability analysis algorithm.
113. Lagrangian relaxation heuristic algorithm is designed to solve the model by equivalent transformation.
114. This algorithm employed full-enclosing prediction based on a new high efficient sorting technique and results in a forecast error set after sorting, which could embed data with a low distortion.
115. This algorithm can decide automatically the number of clusters in the target data set, and find any clusters with arbitrary forms and filter the noisy data.
116. This paper designs a RSA crypto-coprocessor based on the research of RSA cryptographic algorithm.
117. Also analysising the joint localization of multi - CCD and CCD chromatic aberration, proposed the corresponding algorithm.
118. Experiment results show that this algorithm conquers the unsmoothed clustering and deals with clustering boundary well.
119. According to the characteristics of low voltage power line, the automatic relay routing algorithm with relay constraints is employed in user data receiving.
120. Experimental results show the algorithm is more accurate than the conventional RS method, and has a lower missing error rate and false alarm rate.
121. The simulation results of a robot control system show the good performance of the proposed algorithm.
122. The RS Algorithm is also applicable for the same type of problems in management engineering.
123. The process of selection of multi-level threshold gray based on fuzzy entropy makes the algorithm adaptive and practicable.
124. It needs some effective noise reduction algorithm to optimize the image contaminated by noise.
125. Based on the background of the research on the inter-satellite laser communication system, design and simulation of the laser beam pointing control algorithm have been done.
126. A quick synchronous algorithm of connected component label and denoising was given.http://
127. FP - Growth algorithm adopts pattern fragment growth method and only scans database twice.
128. The model - based reconstruction algorithm is adopted in order to conquer the ill-posedness in optical tomography.
129. The computation results show that parallel genetic algorithm is fit for data reduction problem with large scale and large data sample point.
130. In addition, a kind of statistical filter algorithm fit to shingle chip microprocessor system and its program configuration used by this PCR instrument are presented.
131. For the study of symbol timing recovery, this thesis presents a new feedforward data-aided estimation algorithm using a PN preamble based on the maximum likelihood estimation theory.
132. In this paper, a parallel collision detection algorithm is presented.
133. This paper uses the improvement genetic algorithm NSGA-II to solve this question, obtains a series of most superior scheme of arrangement.
134. The performance time of an algorithm is a function of the size of the computational problem to be solved.
135. The two level address mapping algorithm and the best-fit algorithm of logic volume management are designed.
136. We propose an retiming algorithm which can quickly optimize sequential circuits. We have conducted some experiments on the ISCAS89 benchmarks and the results sustain our opinion.
137. A dynamic programming approach is good for this problem. For further improvement,() it can be combined with a shortest path algorithm for graphs with nonnegative arc lengths .
138. This paper presents the model of AND/OR network in detail as well as feasibility test algorithm for AND/OR precedence constraint tasks.
139. Evolutional multi - agent system frame and evolutional genetic algorithm are mainly discussed in this paper.
140. An algorithm with polynomial complexity was presented to generate the public part of the process from its private one.
141. The energy functional is developed through the analysis of imaging process of lower-resolution images. An alternating minimization (AM) algorithm is used in the technique.
142. After preprocessing the sampled real-time image sequences, moving target tracking is realized by combining improved Ostu algorithm and adaptive window tracing method.
143. In this paper, a DISPAR algorithm for dense liquid-solid two-phase flow is developed.
144. A hybrid GA-BP learning algorithm is applied to a real condensation process. The computer aided optimum design is realized.
145. Then, based on the RSA digital signature algorithm, we design an undeniable RSA encryption protocol with small public key for both sides.
146. Results dedicate that this algorithm is robust and has a high accuracy.
147. In this paper, the algorithm of using B spline function for geometric transformation of digital image is presented.
148. createDFA() is a direct implementation of the DFA construction algorithm discussed in the previous column.
149. A highly efficient algorithm for finding out the Euler circle is given.
150. Constant modulus algorithm ( CMA ), which was used in blind equalization, is introduced in this paper.
151. Moreover, genetic operators were selected by adaptive algorithm to avoid unwanted early convergence.
152. Definition of Low Density Parity Check Codes, its classification, graph representation, and a decoding algorithm based on the graph structure are described.
153. Based on simulation, the conclusion is drawn that computation complexity of the novel algorithm is reduced with favorable performance in frequency selectivity channel.
154. The paper analyzed the algorithm of the second discharge circuit based on any double-exponential fitting, introduced the method of the parameters evaluation of impulse voltage generator using MATLAB .
155. And designing the PID algorithm with pressure adjustable, proceeded the overall digIt'simulation.
156. Two kinds of NSS self-protections mechanism and the related algorithm was introduced in this article.
157. In comparison with other algorithms[ ], the parallel algorithm methodrouting problem.
158. The data channel scheduling algorithm of traditional algorithm in optical burst switch is analyzed.
159. In Listing 2, I use a classical merge algorithm to merge the lists from both documents.
160. The proposed hybrid algorithm had the global search ability of chaotic search as well as local search ability of pattern search method.
161. Let us start with an immediate consequence of the algorithm.
162. More importantly, there are details of the chart of the algorithm.
163. A parabolic interpolation algorithm based on time division is developed in the article.
164. This paper presents a strongly polynomial algorithm for a class of linear programming problems.
165. Incorporating 8PSK. demodulation system, Interpolator, Timing Error Detector, Loop Filter and Numerically Controlled Oscillator in DTTL Algorithm are analyzed in detail.
166. Voronoi diagram is a commonly used algorithm for contour - parallel tool path generation.
167. Will be studied in speech recognition (dynamic time warping) algorithm for voiceprint identification technology.
168. To protect the copyright of large raster maps, a fast robust digitalwatermark algorithm is proposed.
169. The algorithm used to create this free logical topology is the spanning - tree algorithm.
170. Best replacement algorithm: From 1988 to eliminate those pages will never use.
171. Aiming at the disadvantages of analog frequency estimation in traditional receiver, this article proposes an algorithm of digital frequency discrimination based on distributed arithmetic.
172. First form feature model of automobile panel is established. Then a new heuristic rule-based feature recognition algorithm is present ad to recognize hole features and flange features.
173. Fifthly, automatic employing is studied on all kinds of windings and optimized by Exhaust Algorithm.
174. This algorithm is simpler than analytic simulation programming, and needs lesser storage and has higher precision in contrast to the discrete simulation.
175. It is, of course, very easy to improve the efficiency of the greedy algorithm.
176. This algorithm can simplify the data association and has polynomial complexity.
177. A cryptographic service provider could not be found for this algorithm.
178. The practice of engineering project shows that it is the key of improving performance to choose correct control strategy and control algorithm for gas pressurization station.
179. The results show that the algorithm has good imperception and robustness.
180. Additionally, this algorithm was tested with regard to gender differences.
181. In this paper, a new algorithm samplingaction and short - term memory is presented.
182. These show that tool - status - recognition rule can be well obtained with this algorithm.
183. The real-time performance is improved by establishing a real-time task queue and executing a task rotation priority scheduling algorithm.
184. Without any other additional circuit, the algorithm achieved a pipelined architecture of rounding method by adjusting the quantization level, the quantization error ranged from -1/2LSB to 1/2LSB.
185. The power feedback control system consists oft he power detection unit and DSP unit. In this paper the design ofp ower detection circuit and the power control algorithm flow are focused.
186. The disturbance decoupling problem for nonlinear generalized time varying control systems is discussed. A new decoupling algorithm is proposed.
187. The efficiency of this algorithm is testified by numerical experimentation.
188. As application field of cryptography, nonreversible algorithm and hardware encryption technique will also be the essential technology in future.
189. The algorithm can efficiently overcome the shortcomings of the classical FFT and cross- periodogram methods for cross-spectral estimation.
190. A simplified objective function and a modified clonal algorithm ( CLONALG ) based on memory are proposed.
191. This paper proposes CF - WFCM algorithm including feature weight learning algorithm and clustering algorithm.
192. A dynamic resouces chain algorithm is proposed to support concurrent services in the distributed communication network circumstances.
193. In this paper, convolution code is carried out by the structure of coder,[] and decoding is carried out by Viterbi decoding algorithm.
194. Recently, BCI developed rapidly, and its researches mostly concentrated on feature extraction and translation algorithm.
195. The condition of existence of solution and its algorithm are given, the rounding error of the solution process is analyzed and the convergence of the spline is proved.
196. Based on different properties of the coefficient modulus of the signal in different scale wavelet transform, conjunction the best estimate of gradient algorithm an edge detecting method is proposed.
随便看

 

英语例句大全共收录104207条中英例句词条,基本覆盖所有常用英文单词的例句、长难句及中文翻译,是不可多得的英语学习材料。

 

Copyright © 2000-2024 Suppus.net All Rights Reserved
更新时间:2024/10/7 0:28:34