| encryption algorithm | 10 |
| genetic algorithm | 3 |
| greedy algorithm | 3 |
| search algorithm | 2 |
| sorting algorithm | 2 |
| learning algorithm | 1 |
| complexity | 16 |
| the literature | 0.47 |
| public domain | 0.45 |
| the core | 0.30 |
| local storage device | 0.30 |
| analyze datum | 0.69 |
| make decision | 0.69 |
| perform calculation | 0.68 |
| determine | 0.66 |
| produce result | 0.65 |
| process datum | 0.64 |
| take input | 0.63 |
| use machine learning | 0.63 |
| run in real time | 0.62 |
| compute score | 0.61 |
| More » |
| a set of rules | 0.30 |
| parameter | 0.57 |
| two parts | 0.54 |
| bias | 0.54 |
| output | 0.53 |
| better performance | 0.52 |
| weakness | 0.52 |
| finite number of steps | 0.50 |
| similar performance | 0.50 |
| linear complexity | 0.48 |
| complexity | 0.48 |
| More » |
| desired result | 0.34 |
| rule | 0.54 |
| information | 0.46 |
| real-world learning | 0.37 |
| adaptation | 0.37 |
| other apparatus | 0.46 |
| particular computer | 0.46 |
| classification | 0.54 |
| authentication | 0.50 |
| regression | 0.50 |
| calculation | 0.47 |
| clustering | 0.47 |
| encryption | 0.45 |
| key exchange | 0.43 |
| prediction | 0.41 |
| decryption | 0.39 |
| signature generation | 0.37 |
| More » |