Példák az Algorithms are used használatára angolul és azok Magyar nyelvű fordításai
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Financial
-
Programming
-
Official/political
-
Computer
Different algorithms are used.
During the computation, the MD5 and RC4 algorithms are used.
These algorithms are used in LanguageKit.
Data will be inaccessible if ransomware has locked them,for which powerful encryption algorithms are used.
Machine learning algorithms are used in evaluation.
Exchange Server 2019 is more secure than any previous version out of the box,ensuring only the newest ciphers and hashing algorithms are used to protect your data.
More recently, genetic algorithms are used to evolve the neural structure.
Exchange Server 2019 is more secure than any previous version out of the box,ensuring only the newest ciphers and hashing algorithms are used to protect your data.
These algorithms are used in the Rectilinear Crossing Number distributed computing project.
Strong encryption algorithms are used to encrypt your files, and if yours are indeed locked, you will be unable to access them any longer.
Powerful encryption algorithms are used for file encryption, and if yours are indeed locked, you will be unable to access them any longer.
Powerful encryption algorithms are used for encrypting, and if it successfully encrypts your files, you you won't be able to access them any longer.
Bellman-Ford algorithm is used to remove negative edge weights.
Triple encryption and AES25 algorithm are used.
The Bellman-Ford algorithm is used for finding negative cycles.
Unfortunately, it isn't alwayspossible to decode files if powerful encryption algorithms were used.
An Optimization algorithm is used to determine what donors are best suited for each patient.
If a strong encryption algorithm was used, it could make decrypting files potentially impossible.
This algorithm is used in Monero, ByteCoin, Dashcoin et al.
An encryption algorithm is used, this ensures the confidentiality of the dialogue.
Here, the algorithm is used only for the visualization of init() execution.
Here are several other examples where the SHA-256 algorithm is used.
At first I present the signal processing algorithms being used for detecting the snore[2,3], and then I'm going to analyse it in terms of the real-time reliability.
Finally, q is removed, and Dijkstra's algorithm is used to find the shortest paths from each node s to every other vertex in the reweighted graph.
While an algorithm was used to develop the underlying framework, humans used that framework to design the final result.
On Blockchain, Proof-of-Work algorithm is used to confirm transactions and create new blocks in a chain.
If a strong encryption algorithm was used, it could make decrypting files very difficult, if not impossible.
An expectation-maximization(EM) algorithm is used in statistics for finding maximum likelihood estimates of parameters in probabilistic models, where the model depends on unobserved latent variables.
A proof-of-work algorithm is used to confirm transactions and produce new blocks to the chain.
Second, the Bellman- Ford algorithm is used, starting from the new vertex q, to find for each vertex v the minimum weight h(v) of a path from q to v. If this step detects a negative cycle, the algorithm is terminated.