encryption algorithm | 10 |
genetic algorithm | 3 |
greedy algorithm | 3 |
search algorithm | 2 |
sorting algorithm | 2 |
learning algorithm | 1 |
complexity | 16 |
the literature | 0.47 |
public domain | 0.45 |
the core | 0.30 |
local storage device | 0.30 |
analyze datum | 0.69 |
make decision | 0.69 |
perform calculation | 0.68 |
determine | 0.66 |
produce result | 0.65 |
process datum | 0.64 |
take input | 0.63 |
use machine learning | 0.63 |
run in real time | 0.62 |
compute score | 0.61 |
More » |
a set of rules | 0.30 |
parameter | 0.57 |
two parts | 0.54 |
bias | 0.54 |
output | 0.53 |
better performance | 0.52 |
weakness | 0.52 |
finite number of steps | 0.50 |
similar performance | 0.50 |
linear complexity | 0.48 |
complexity | 0.48 |
More » |
desired result | 0.34 |
rule | 0.54 |
information | 0.46 |
real-world learning | 0.37 |
adaptation | 0.37 |
other apparatus | 0.46 |
particular computer | 0.46 |
classification | 0.54 |
authentication | 0.50 |
regression | 0.50 |
calculation | 0.47 |
clustering | 0.47 |
encryption | 0.45 |
key exchange | 0.43 |
prediction | 0.41 |
decryption | 0.39 |
signature generation | 0.37 |
More » |