Examples of using Algorithm used in English and their translations into French
{-}
-
Colloquial
-
Official
The algorithm used within the DiamondSure machines takes account of the possibility of heat treatments being applied to synthetics
The algorithm used to determine whether an account is professional
The basic operating constant and the algorithm used in processing the measured quantities shall be stored within the EVT in such manner that they cannot be altered without breaking the device's physical seal clause 3-2.6 of LMB-EG-07.
4 images per modulation period are acquired, depending on the algorithm used.
while Section 3 describes the algorithm used to apply the criteria.
specific software calculations and will supply a detailed explanation of each algorithm used to calculate a result as part of this service.
results can vary depending on the algorithm used, and in particular on the length of assumed time intervals daily,
otherwise we can retrieve last access to domain with the algorithm used in the script.
Sealing Requirements 10.1 Programming Security The basic operating constant and the algorithm used in processing the measured quantities shall be stored within the EVT in such manner that they cannot be altered without breaking the device's physical seal clause 3-2.6 of LMB-EG-07.
The algorithm used to identify dementia was three physician visits with 30 days
Programming security The basic operating/metering constants and the algorithm used in processing the measured quantities shall be stored within the ECT in such manner that they cannot be altered by any external device, communication signal,
were left to populate themselves more liberally according to the assignment suggested by the algorithm used by Science-Metrix.(A peer-reviewed conference paper providing a full description of the methods was published in the conference proceedings of the 13th ISSI Conference 2011.)
The algorithms used for the cohort projections are as shown in WG-FSA-91/15.
Development of new algorithms using Artificial Intelligence.
Different algorithms use different methods for determining whether a jump is safe.
The announcement of the news was delayed until 27 January 2016 to coincide with the publication of a paper in the journal Nature describing the algorithms used.
When creating a presigned URL, you must specify the algorithm using the x-amz-server-side-encryption-customer-algorithm in the signature calculation.
The purpose of this demonstration is to illustrate the algorithms used to correlate security alerts emitted by Intrusion Detection Systems
The algorithms used in statistical model development usually fall into three categories.
The algorithm uses a Lai-Massey scheme based on IDEA's,