当前位置:网站首页>Chapter I Introduction
Chapter I Introduction
2022-07-19 03:37:00 【isxhyeah】
Professional term
1. data
Data is a general term for all symbols that can be input into a computer and processed by a computer program .
2. data elements
Data elements are data Basic unit .
3. Data item
A data item is a data element Smallest unit .
4. Data objects
Data object refers to Of the same nature Of Set of data elements .
5. data type
A data type is a collection of values and some operations defined on the collection of values .
( for example :int ,char,float,double...)
6. Abstract data types (ADT)
Usually use ( Data objects 、 Data relation 、 Basic operation ) Such triples represent abstract data types .
data structure
data structure = Logical structure + Storage structure + operation
1. Logical structure : Refers to the logical relationship between data elements .
branch 4 Class basic structure :
(1) Set structure
(2) Linear structure ( One to one relationship )
(3) A tree structure ( One-to-many relation )
(4) A pictorial or reticular structure ( Many to many relationship )
| Linear structure | Nonlinear structure |
| The linear table 、 Stack 、 queue | Trees 、 chart 、 aggregate |
2. Storage structure ( Also known as physical structure ): There are mainly sequential storage , Chain store , Index storage , Hash store .
3. operation : Data operation is an operation algorithm defined on the logical structure of data ( Such as : Additions and deletions ).
Algorithm
Algorithm is a description of the solving steps of a specific problem .
Five big characteristic :
(1) Input : An algorithm has zero or more inputs ;
(2) Output : An algorithm has one or more outputs , They are quantities that have a specific relationship to the input ;
(3) deterministic : Each instruction must have a precise meaning ;
(4) The feasibility of : The operations described in the algorithm can be realized by available basic operations ;
(5) Fineness : Algorithm instructions are finite sequences , And the algorithm can be completed in a certain period of time .
memory :“ Access is indeed poor ”
Evaluate the advantages and disadvantages of the algorithm Basic standards :
(1) correctness : It can ensure the correct output for a certain degree of random input ;
(2) Rapidity : The algorithm design is reasonable , Efficient execution time , Time complexity can be used to measure ;
(3) Readability : The algorithm description is clear and easy to understand , Easy to modify and transplant ;
(4) Robustness, : When entering illegal data , The algorithm can make appropriate response and processing ;
(5) Economy : The algorithm occupies reasonable storage capacity , Space complexity or storage density can be used to measure .
memory :“ Read the key section correctly ”
Algorithm analysis
1. The time complexity of the algorithm : It refers to the time when the algorithm is executed in the computer The elapsed time The measurement .
Write it down as :T(n)=O(f(n)), among n Is the size of the problem .
2. The spatial complexity of the algorithm : It refers to the time when the algorithm is executed in the computer Storage space The measurement .
Write it down as :S(n)=O(f(n)), among n Is the size of the problem .
边栏推荐
- Game theory of catching lice
- Simple usage and interface introduction of labelme
- Chengxin University envi_ The second week of IDL experiment content: extract aod+ in all MODIS aerosol products for detailed analysis
- 第二章 线性表
- The WinRAR command copies the specified folder as a compressed file, and calls the scheduled task for backup.
- The installation software prompts that the program input point adddlldirectory cannot be located in the dynamic link library kernel32 DLL (download address at the end of the text)
- 论文阅读:U-Net++: Redesigning Skip Connections to Exploit Multiscale Features in Image Segmentation
- Wdog and power mode of fs32k148 commissioning
- Rewrite equals why rewrite hashcode
- By voting for the destruction of STI by Dao, seektiger is truly community driven
猜你喜欢

Browser cannot open tensorboard

MySQL log management and full backup incremental backup and recovery

箭头函数与this指向详解
![Monte Carlo based reinforcement learning method [with code implementation]](/img/39/346b2f4122238eb0d51ca164ab6d86.png)
Monte Carlo based reinforcement learning method [with code implementation]

Es6 notes d'étude - station B Xiao Ma Ge

GNOME-BOXES虚拟机创建安装

Vscode+ros2 environment configuration

VGG (Visual Geometry Group)

Envi: (the most detailed tutorial in 2022) custom coordinate system

Yolov5 opencv DNN reasoning
随机推荐
Gdb+vscode for debugging 8 - use core to analyze dead cycles, deadlocks, and segment errors
Unicast、Multicast、Broadcast
Leetcode: dynamic programming [basic problem solving]
机器学习库Scikit-Learn(线性模型、岭回归、插入一列数据(insert)、提取所需列、向量机(SVM)、聚类)
Thinkphp5.0模型操作使用page进行分页
Win10 network connection shows no network but Internet access
Ncnn thread
In depth understanding of machine learning - unbalanced learning: sample sampling technology - [adasyn sampling method of manual sampling technology]
D. Permutation restoration (greedy / double pointer /set)
Pure virtual function
Automatic assembly & set injection
Basic IDL content of note 1: common data types_ Create array_ Type conversion_ Print output_ Basic operation_ Relational operation
mysqldump: [Warning] Using a password on the command line interface can be insecure.
KubeCon + CloudNativeCon Europe 2022
Oracle queries the maximum partition of non self growing partition
第一章 绪论
The fifth day of the third question of Luogu daily
leetcode 222. Number of nodes of a complete binary tree (required)
Envi: (the most detailed tutorial in 2022) custom coordinate system
Several methods of face detection