| 1. | It is, of course, very easy to improve the efficiency of the greedy algorithm . 当然,贪婪算法的有效性是很容易改进的。 |
| 2. | In many earlier studies simplicity of the algorithms used has been emphasized . 在许多早期的研究中往往重视算法的简单性。 |
| 3. | Represents the secret key for the symmetric algorithm 表示对称算法的机密密钥。 |
| 4. | Trigonometric function generator based on pipelined cordic 算法的三角函数发生器 |
| 5. | Fuzzy neural controller based on genetic algorithm 基于遗传算法的模糊神经控制器 |
| 6. | Pattern learning with the back - propagation algorithm 利用反向传播算法的模式学习 |
| 7. | On intrusion - detecting system based on bp net algorithm 网络算法的入侵检测系统 |
| 8. | A data fitness method based on genetic algorithm 基于遗传算法的一种数据拟合方法 |
| 9. | The research of crossover operator of genetic algorithms 遗传算法的交叉算子研究 |
| 10. | An unsigned integer representing the hash algorithm 表示哈希算法的无符号整数。 |