permute


Also found in: Dictionary, Thesaurus, Medical, Encyclopedia, Wikipedia.
Mentioned in ?
References in periodicals archive ?
We used a cross-validation technique that permutes the variables randomly for comparison.
Note that the proposed global permutation and 3D permutation at bit-level data or DNA-level data can change the positions of bits or DNAs to lead the values of pixels changed, and thus they can simultaneously permute and diffuse the images at bit-level or DNA-level data.
Whenever a move labeling an edge e of a James-Peel tree just permutes rows or columns, we can eliminate that move from the tree at the cost of relabeling rows and columns of James-Peel moves below e.
Based on the previous idea, Langville and Meyer come out with a method that recursively permutes the top lett block until the final [P.sub.11] hasnozerorows.
In this case, the encryption process may not need to be arbitrarily reversible, but instead is used to permute the data, then the key is thrown away.
(1981) showed how the barycenter heuristic can be used as a subalgorithm of a larger algorithm to permute the vertices in the hierarchical layers so that the number of crossings is minimized.
The permute program involves producer/consumer communication over a pipe.
In order not to obscure the issues through the complexity of the example, and to facilitate comparison with other approaches, we select the very "standard" permute example.
This, he thinks, goes against the Joycean grain, for Joyce's textual strategies "depend upon the perception of a material human `subject,' a character whose experience materializes in space and time and whose ontological boundaries permute, on the narrative level, from the identity to affinity with the `outside' world" (20).
The "secondary grammar" proposed by the title would "model intuitions about how to decompose, permute, reassemble, and more generally manipulate text-sized structures" (191).
Suppose that S is the secret message bits stream to be embedded, and a private key k is used to permute the secret message to be a pseudo-random message s'.
Let all controllable units permute on 0 [less than or equal to] [b.sub.1] [less than or equal to] [b.sub.2] [less than or equal to] ...