英语人>网络例句>algorithm theory 相关的网络例句
algorithm theory相关的网络例句

查询词典 algorithm theory

与 algorithm theory 相关的网络例句 [注:此内容来源于网络,仅供参考]

This paper briefly introduces the homotopy theory and algorithm of tracking zero curves. At the same time, the paper gives the example of the impedance inversion in the seismic exploration. In the end, the advantages and disadvantages of the homotopy method are pointed out in this paper.

本讲座概要地介绍了同伦方法的基本原理,跟踪同伦曲线的具体算法,并给出了同伦方法在地展勘探波阻抗反演中的应用实例,最后归纳总结了同伦方法的特点及目前存在的不足。

The goal is to simplify the neural-computing of biovision process modeled inthe Boundary Contour System of FACADE theory, and to extract subjective contour in.a new way. The procedure consists of DOG filtering, cooperative filtering,post-processing of cooperative cues and regrouping of endpoints, corresponding to theoriented edge filtering by simple cells, cooperative filtering by bipole cells and end-stopeffect formulated by hypercomplex cells in biovision system respectively. The last oneis an algorithm based on connection relation graph, which judges whether two keypoints should be connected according to their positions and orientations and thenconnect the key points that Should be connected to complete the subjective contour.

本文主要完成了以下工作:一是针对张量投票方法处理主观轮廓时出现的问题进行了改进,并依据矩阵的特征值摄动理论分析了该方法误差产生的原因以及迭代对其影响;二是用图像处理方法代替FACADE理论中复杂的细胞动力学方程,提出了一种基于视觉竞争合作机制的轮廓组织及缺口修复算法,该方法通过DOG滤波器组、合作滤波器组和张量投票等方法分别模拟视觉系统中的简单细胞有向滤波、双极细胞合作滤波和终端截断后端点重组等主观轮廓形成过程;三是提出了一种基于可连接关系图的算法解决轮廓组织及缺口修复问题,该方法在轮廓特征提取的基础上,根据关键点的位置和取向信息判断其可连接关系,进而连接具有可连接关系但没有实际连接的关键点,最终完成轮廓缺口的修复。

The book is divided into eight chapters, mainly introduced the super-elliptic curve cryptography algorithms of number theory based on hyperelliptic curve cryptography system, in addition to the core algorithm for computing sub-groups, from the ECC's technical standards to the super-elliptic curve cryptosystem implementation technology, but also on the super-elliptic curve cryptography and ECC and RSA in the security strength, complexity and the realization on the comparison.

全书共分八章,主要介绍了超椭圆曲线密码体制的算法数论基础、超椭圆曲线的密码学体系、除子群运算的核心算法、从ECC的技术标准到超椭圆曲线密码体制的实现技术,同时也对超椭圆曲线密码体制与ECC及RSA在安全强度、复杂度以及实现上进行了比较。

The research background of this thesis is modified reputation evaluation algorithms in distributed environment in order to utilize them into Grid environment, Presenting a new Dempster-Shafer-Theory-Based Grid-Supported Reputation Management Model combined with the Grid environment and advanced research work in point, in order to adapt to the requirements of Grid entities reputation quantitative evaluation, the immeasurability and fuzzy problems of Grid credibility description are resolved, further put forward the relevant reputation evaluation algorithm.

将在分布式环境下适应的信誉评价算法进行改进使其适用于网格环境中,以网格环境下的安全合作为目标,结合网格环境以及在此方面同行所做的前沿工作,提出一种新的基于Dempster-Shafer证据理论的支持网格的信誉评价算法,以适应网格实体信誉定量评价的要求,解决网格信誉描述的不可测量性和模糊性问题,并给出相应的信誉管理模型。

In the case of inapplicability of hammering excitation to the arm of industrial robot for extracting its dynamic characteristics,according to the Duharmal integral theory and applying the specific upper triangle construction of input matrix of system as well as the technique of time average ,an efficient de-noising average recursive algorithm is presented in this paper.

针对锤击激励方式不适用于工业机器人操作臂动态性能测试的情况,根据Duharm a l积分理论,利用系统输入矩阵的上三角形的特殊结构,并结合时域平均技术,导出了具有抗噪性能的高效的求取系统脉冲响应函数的平均递推算法。

Firstly, by means of wavelet de-noising the pseudo data and noises in both load and meteorological data are eliminated; then by use of gray correlation theory the incidence relation among power load and meteorological indices is analyzed; and then the meteorological indices and load which possess best relevance one another are chosen to perform sensitivity analysis, and using support vector machine algorithm the daily peak load is forecasted.

首先通过小波去噪消除负荷和气象数据中的伪数据和噪声,然后采用灰色关联理论分析了负荷与各气象指数之间的关联关系,选择其中关联性最好的气象指数和负荷进行敏感度分析,并采用支持向量机算法对电力日峰荷进行预测。

In this paper a discretization algorithm based on importance of cut point. Firstly, the paper gives some concept of rough set theory:decision table,indiscernible relation,information entropy and condition entropy.

粗糙集理论可以用在数据挖掘的各个阶段,该文研究了粗糙集理论在数据挖掘的数据离散化阶段的应用,并提出了一个新的决策表离散化算法。l 基本概念及离散化问题的描述定义1 。

An identification algorithm for tool interference in NC machining is presented based on the fuzzy inference techniques and pattern recognition theory.

基于模糊推理的自由曲面描述方法和模式识别理论,提出一种适用于不同刀具类型并可同时考虑刀具底面干涉和侧面干涉的刀具干涉判别算法。

The whole algorithm was based on generalized instantaneous reactive power theory.

整个谐波处理方法基于瞬时无功理论。

Firstly, Wavelet-Galerkin algorithm for solving the first kind of singular integral equation with the Hilbert kernel is proposed, we use the characteristic of periodic wavelet on L~2([0,1]) and Hilbert kernel to solve and make stiff matrix lower dimensions and become sparser through thresholding,thus the cost of computation is reduced. Because of the singularity of Hilbert kernel we use Tikhonov regularization method to solve the system of stiff equation. At last the convergence and numerical result of approximate solution are given. Secondly, an approach of regularization based on Fourier is presented for sideways heat equation; we give the theory proof and error estimate.

首先,提出了含Hilbert核的第一类奇异积分方程的小波伽辽金(Wavelet-Galerkin)数值算法,该算法中利用了L~2([0,1])上的周期小波和Hilbert核的特点进行处理,使得刚性矩阵维数降低并且通过阈值使得它更加稀疏,减少了计算量;由于Hilbert核的奇异性,通过Tikhonov正则化方法求解所得到的刚性方程组,给出了收敛性和数值结果;其次,对标准的一维逆热传导方程给出了一种基于Fourier正则化方法,给出了理论证明及其误差估计,解决了文献中算法与理论误差估计的不相匹配的现象,该正则化方法不仅保留了测量数据的部分高频成份,且与文献中的算法具有同样的计算量和误差估计。

第30/54页 首页 < ... 26 27 28 29 30 31 32 33 34 ... > 尾页
推荐网络例句

They weren't aggressive, but I yelled and threw a rock in their direction to get them off the trail and away from me, just in case.

他们没有侵略性,但我大喊,并在他们的方向扔石头让他们过的线索,远离我,以防万一。

In slot 2 in your bag put wrapping paper, quantity does not matter in this case.

在你的书包里槽2把包装纸、数量无关紧要。

Store this product in a sealed, lightproof, dry and cool place.

密封,遮光,置阴凉干燥处。