The Efficiency Of Algorithms

Concept of algorithm and its appointment. Algorithmic method - precisely established procedure or a set of instructions which can be applied to all cases of a problem. Mathematical properties of algorithms described by the British mathematician Turing.

Подобные документы

  • Robots and controllers: interfaces, operating system. Binary, analog, position sensor. Kinematics, driving program. Balancing robots: simulation, double inverted pendulum. Micro mouse contest. Maze exploration algorithms. Real-time image processing.

    учебное пособие, добавлен 25.11.2013

  • Hereditary Information and Protein Biosynthesis. Gel Electrophoresis and Direct Sequencing. Generalized Sux Trees and the Substring Problem. Ecient Computation of Overlaps. Denition and Scoring of Multiple Alignments. The FASTA and BLAST Heuristic.

    учебное пособие, добавлен 25.11.2013

  • Motivation from Genetic and Evolutionary Computation. Factorization of the Search Distribution. The Convex and Concave Lagrangian. FDA Factorizations and Region Graphs. Probabilistic Optimization and Linkage Learning. Learning Bayesian Networks from Data.

    учебное пособие, добавлен 25.11.2013

  • The technical aspects of building a solution to our problem of predicting advertisement banner efficiency. Rectified Linear Units activation function. A simple neural network architecture, trustworthy model. Visualizing convolutional neural networks.

    дипломная работа, добавлен 13.07.2020

  • Study of method of the adaptive shaping of flows of network traffic and method of tuning of the control systems with an indirect feedback. Analysis of algorithm of multivariable adaptation of shaper to changing the set of parameters of input traffic.

    статья, добавлен 27.12.2016

  • Simulation modeling for solving problems of mathematical physics. Usage cellular neural networks as means of modeling. Usage locally asynchronous methods as algorithmic software and tool optimization of neural network. The block diagram of the software.

    статья, добавлен 26.06.2016

  • Comparative analysis of the ways to reduce the contingency of loss of access. The secret key - the main part of the protection system in most cryptographic algorithms. Homomorphism property as one of the basic features of Shamir threshold scheme.

    статья, добавлен 06.05.2018

  • The presenting online system for symbolic differentiation that calculate derivatives. The trees are used for representation of formulas. Derivatives are generated by tree transformations. Presented algorithms are part of the microsystems simulator Dero.

    статья, добавлен 10.05.2018

  • Biological Data in Digital Symbol Sequences. Machine-Learning Foundations: The Probabilistic Framework. Probabilistic Modeling and Inference. Machine Learning Algorithms. Hidden Markov Models and probabilistic Models of Evolution: Phylogenetic Trees.

    учебное пособие, добавлен 25.11.2013

  • An elementary technique which leads to a linear algorithm for solving the discrete logarithm problem on elliptic curves of trace one. Using elliptic curves in cryptography to eliminate curves whose group orders are equal to the order of the finite field.

    статья, добавлен 15.09.2012

  • The issue of necessity of monitoring circumstance of software systems implemented through service-based principle in conditions of continuous development and enhancement. Pattern and antipattern detection. Metric calculation algorithms. Response time.

    дипломная работа, добавлен 31.10.2016

  • Характеристика социального и медийного контекста проекта, отличительные черты нарратива в видеоиграх. Основные средства создания нелинейности The Spirit Cases. Написание истории и разработка демоверсии. Нелинейное повествование в The Spirit Cases.

    дипломная работа, добавлен 19.08.2020

  • Machine learning is a set of algorithms and tools that help machines understand hidden patterns in data and exploit the structure and substance of those hidden patterns. The history of the emergence of architectures of increased computing power.

    статья, добавлен 24.02.2024

  • The problem is to find the reliable sensor for detection of dangerous tilt angle. Task is to identify the sensor properties as sensitivity, zero shift and also uncertainty of measurement. Before using it is necessary to identify sensor properties.

    статья, добавлен 26.08.2020

  • Consideration of new forms of binary representations of Boolean functions. Analysis of single algebraic and non-inverting classic models of the Reed-Muller. Using technology "EDM - Extended Data Mining". Characteristics of main data mining algorithms.

    статья, добавлен 14.07.2016

  • Network monitoring methodology development as stage of data center infrastructure organizing due to requirements of services efficiency and stability. Process of hot-spot evaluation of the network data indexes. Comparative judgment matrix forming method.

    статья, добавлен 27.01.2019

  • Development of an optimal full-text search patterns for keywords, taking into account morphological features of Russian and algorithms indexing and full-text search on relational databases fulltext index, MySQL database and PHP programming language.

    статья, добавлен 29.01.2016

  • The information technology for graphical data from unmanned aircraft real time processing. The structure and functionality of the automated system, image processing algorithms and video. The used of technology in the development of a pilot workplace.

    статья, добавлен 28.01.2017

  • Spectral embedding and spectral clustering as common methods for non-linear dimensionality reduction and clustering of complex high dimensional datasets. Asymptotics of the diffusion distances and diffusion maps. Clustering of a mixture of gaussians.

    учебное пособие, добавлен 08.02.2013

  • Criteria for desirable cryptographic systems and protocols. Security properties for authenticated key establishment. Standard notation of mathematical foundations. Classical ciphers: usefulness and security. The optimal asymmetric encryption padding.

    книга, добавлен 13.03.2014

  • Private versus public key cryptography. Variable changes and normal forms. Elliptic curves over finite fields. The baby-step giant-step algorithm. Counting points on elliptic curves. Isogenies and modular polynomials. The Schoof-Elkies-Atkin algorithm.

    книга, добавлен 08.03.2014

  • Improved algorithm for object tracking is for using as part of the machine vision system of image acquisition and processing capable mobile robots. Classical implementation of normalized cross-correlation for face tracking. Experimental results.

    статья, добавлен 01.02.2013

  • Analysis of information technology monitoring and correction of the functional state of students in the process learning created based on developed models, complex criteria classification of constituent states models, algorithms normalized estimates.

    статья, добавлен 23.06.2016

  • Development and implementation of new technologies in banking services. The ability to improve the existing anti-fraud model used in real banking practice. Clusters and their impact on the assessment of the existing anti-fraud model. Data Chart Analysis.

    дипломная работа, добавлен 10.12.2019

  • A new algorithm for parallel fault simulation of VLSI on multicore workstations with common memory was proposed. The results of computational experiments on ISCAS-89 benchmarks circuits, which are obtained on the 12-core workstation, were reported.

    статья, добавлен 28.02.2016

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.