I. The method of exhaustive
Enumerate all the possibilities and go on to get the best results. As figure one, you need to go straight from point A to point G to know that F is the highest (best solution). The optimal solution obtained by this algorithm is certainly the best, but it is also the least efficient. Although the best solution can be obtained by exhaustive method, the efficiency is extremely low. In order to improve efficiency, you can not
Second, scan line algorithm (Scan-line Filling)
The scan line algorithm is suitable for the area filling of the vector graphics, only need to the geometric position of the polygon area, no need to specify the seed point, suitable for the computer automatic graphics processing occasions use, such as computer games and three-dimensional CAD software rendering and so on.
To fill the vector polygon region, th
The essence of the "algorithm path" is the classic algorithm, and the "algorithm path" AlgorithmThe essence of "algorithm path" in the classic algorithm Section
This book is written by Yan hengming, the author has another book, "The string of data structures", and "the phi
In the greedy algorithm (greedy method), the methods of constructing the optimal solution gradually are adopted. At each stage, a seemingly optimal decision is made (under certain criteria). Once a decision is made, it cannot be changed. The basis for making greedy decisions is called the greedy rule (greedy criterion).
Example 1-4 [for change] a child buys less than 1 dollars of sugar and gives 1 dollars to a salesperson. The salesman hopes to find
Sort Categories
sort by whether in memory
Depending on whether the records to be sorted in the sort process are all placed in memory, the sort is divided into: inner and outer sort.
For internal sorting, the performance of the sorting algorithm is mainly affected by 3 aspects:Time performance, auxiliary space, algorithmic complexity. according to the algorithm to achieve the complexity of classification S
Dijkstra algorithm
definition
The Dykstra algorithm (Dijkstra ' s algorithm) was presented by the Dutch computer scientist Eizhor Dextra. The Dicos algorithm uses breadth-first search to solve the single-source shortest path problem of nonnegative weighted graphs, and the algorit
In large data high concurrent access, there is often a service or interface in the face of the explosion of the request is not available, or even triggered a chain reaction caused the entire system crashes. At this point you need to use one of the technical means to limit the flow, when the request reached a certain number of concurrent or rate, it is waiting, queuing, demotion, denial of service and so on. In the current limit, the two common algorithms are leaky bucket and token bucket
1. Overview
The sorting algorithm is the most basic algorithm in the computer technology, and many complex algorithms use the sort. Although all sorts of sorting algorithms have been encapsulated into library functions for programmers to use, it is important to understand the idea and principle of sorting algorithm for writing high quality software.
This paper
Reprint please add:http://www.cnblogs.com/courtier/p/4273193.html
Before starting this article, the nagging words:
1: First, before reading this article, you should at least understand, what is the finite state machine, what is the KMP algorithm, because, this article is from the source of KMP, finite stateMachine, because, KMP is the DFA (deterministic finite automaton) on the simplification.2: Many KMP articles (limited automata
The general minimum spanning tree algorithm is divided into two kinds of algorithms:One is the Kruskal algorithm: the idea of this algorithm is to use the idea of greed, the weight of each side of the first order, and then each time to select the current minimum edge, to determine whether this side of the point has been selected, that is already in the tree, is g
1.3 scanning line Seed FillingAlgorithm
The two seed filling algorithms described in sections 1.1 and 1.2 have the advantage of being very simple. The disadvantage is that recursive algorithms are used, which not only requires a large amount of stack space to store adjacent points, and the efficiency is not high. In order to reduce recursive calls in algorithms and reduce stack space usage, many improved algorithms are proposed, one of which is the scanning line Seed Filling
Reference: http://blog.csdn.net/hguisu/article/details/7996185more data mining algorithms :https://github.com/linyiqun/DataMiningAlgorithmLink AnalysisIn the link analysis there are 2 classic algorithms, one is the PageRank algorithm, and the other is the hits algorithm, plainly speaking, are doing link analysis. How to do it, continue to look down.PageRank algorithmTo talk about the function of the PageRan
One, knapsack problem description:There are n items and a backpack with a weight of M, the weight of the article I is w[i], the value is p[i]. The solution of which items are loaded into the backpack allows the sum of the costs of these items to be no more than the backpack weight and the maximum value.Second, the solution:1, greedy algorithm: Greedy algorithm based on the idea is that every choice is the b
A * algorithm
is a heuristic search algorithm.
People who understand BFS, DFS, or Dijkstra algorithms should know that. These algorithms are a way of blindly searching around.
Heuristic Search:
Heuristic search is the search in the state space to evaluate the location of each search, get the best location, and then from this location to search until the target. This can omit a lot of fearless search path,
Optimization Algorithm Starter series article catalog (in update):1. Simulated annealing algorithm2. Genetic algorithmsGenetic Algorithms (GA, Genetic algorithm), also known as evolutionary algorithms. Genetic algorithm is a heuristic search algorithm, which is inspired by Darwin's theory of evolution and used for refe
I. OverviewNearest Neighbor Rule classification (k-nearest Neighbor) KNN algorithmThe initial proximity algorithm was proposed by cover and Hart in 1968,This is a classification (classification) algorithmInput instance-based learning (instance-based learning), lazy learning (lazy learning)Second, the principle in a sample data set, also known as the training sample set, and each data in the sample set has a label, that is, we know the corresponding r
Pattern matching algorithm for strings
The locating operation of a substring is often called a pattern match of a string, where T is called a pattern string .
General positioning function for substring position (Brute force)That's what I write Java code for.int Index(String s,string T,int POS) {char[] S_arr = S.tochararray (); char[] T_arr = T.tochararray ();intI,j,k;//iIs the pointer to the main string s, and J is the pointer to the pat
Chapter of
Basic Statement
This poster of algorithms are based on the book and the lecture of algorithms on Coursera which are taught by Robert Sedgewi CK and Kevin Wayne, writers of the book mentioned above.
Chapter of "algorithm" is the fundamental of Java programming language and a brief introduction to Algorithms and DA TA structure, including their concepts. Some interesting problems and the basic implementations of them. Introduction Why We s
Dijkstra algorithm
Also known as Dijkstra algorithm, is a classical shortest path algorithm, the main feature is to expand from the starting point to the outer layer, until the extension to the end point, the use of breadth-first search to solve the problem of the single source shortest path of the weighted direction graph, the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.