查询词典 fuzzy-wuzzy
- 与 fuzzy-wuzzy 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
To overcome the bad effect resulting from the nonlinearity time-variability and uncertainty on autopilot system performance during the motion process of aerodynamics missile, and to further improve the flight quality of missile, the autopilot system and used control method are researched. Firstly the integrant structure of system is discussed; then baaed un introducing the traditional PID method, controllers for missile attitude motion are designed respectively using fuzzy self-turning PID method and neural network self-adaptive PID method; at last a simulation experiment is finished. By comparing the simulation results that the designed controllers have good qualities is showed, and the feasibility and validity of applying fuzzy control and neural network into automatic control of aerodynamics missile is confirmed, and the base that other nonlinear control theory can be combined with the traditional control for missile to further improve the performance of missile control system is established.
为了克服飞航导弹运动过程中的非线性、时变性和不确定性对自动驾驶仪系统性能的不良影响,进一步提高导弹的飞行质量,对自动驾驶仪系统及其采用的控制方案进行了研究;首先对系统的整体结构进行了分析,然后在介绍经典PID方案的基础上,分别采用模糊自调整PID方案和神经网络自适应PID方案设计了导弹姿态运动控制器,最后进行了仿真实验;仿真结果的对比展示了所设计控制器良好的品质,验证了将模糊控制和神经网络应用于飞航导弹自动控制中的可行性和有效性,为其它非线性控制理论与导弹传统控制相结合以进一步提高导弹控制系统的性能奠定了基础。
-
Utilizing information exchanging way such as Internet, security of fuzzy management decision in transferring is becoming a new research direction, engrafting information security with fuzzy management decision, this paper gives concept of information security and algorithm, applications.
因为随着信息交换手段的使用,双向模糊管理决策传递的安全性已成为一个新的研究方向,利用信息安全与双向模糊管理决策交叉,渗透,给出模糊管理安全的概念和算法;应用。
-
Creative point 3. Engrafting fuzzy recognition theory with information security theory, on the basis of elliptic curve cryptographic algorithm in information security theory, this paper presents t'-order iteration encryption, t-order iteration decryption algorithm of fuzzy recognition and authentication.
创新点3。将模糊识别理论与信息安全理论相互嫁接,相互交叉,以信息安全理论中的椭圆曲线加密算法为依据,提出模糊识别的t-阶迭代加密,t-阶迭代解密算法和对加密者的认证。
-
This paper creatively engrafts elliptic curve encryption algorithm with fuzzy recognition theory, puts forward t-order iteration encryption and t-order iteration decryption algorithm of fuzzy recognition based on elliptic curve.
本文别具心裁地将椭圆曲线加密算法与模糊识别理论相互嫁接,提出基于椭圆曲线的模糊识别t-阶迭代加密与t-阶迭代解密算法。
-
Firstly, the RFCM algorithm and Apriori algorithm were expounded. The production parameters were fuzzed by fuzzy clustering algorithm. Depending on Fuzzy_ClustApriori algorithm, the fuzzy association rules were studied and implemented in processing industry.
首先阐述了模糊聚类的RFCM算法和关联规则的Apriori算法的内容,分析了实现模糊关联规则的Fuzzy_ClustApriori算法流程,并用RFCM算法对实际数据进行分析,得到不同类别的模糊数。
-
Based on the knowledge system of fuzzy mathematics theories,fuzzy identify theories model which is an intergraded method of water quality assessment isformed.
根据模糊数学理论等知识体系,构建了水质的综合评价方法—模糊识别理论模型。
-
Meanwhile, some weaknesses of neural network and fuzzy system can be made up, such as defining structure of network, giving initial weights, improving leafing speed, decreasing the dependence of fuzzy system on experience and so forth.
另一方面,作为智能控制的一个重要分支,模糊控制充分利用人的思维活动特点,用于实现难以建立精确数学模型的复杂对象的控制,已经获得了相当多的成功,并显示了其巨大的优越性。
-
Under the precondition of lucubrating the work process and arithmetic of fuzzy inference, the paper made a graphical characteristic analysis of fuzzy inference function and its subject. We got a better effect using the improved system in contrast to the old system.
在深入研究专家系统模糊推理机的工作过程及算法的前提下,对模糊推理运算函数及隶属函数进行了图形特性分析改进,在实现改进后的专家系统的基础上与改进前系统作了运行实力对比,得到较好的效果。
-
Then a dynamic inversion tracing control method and a dynamic inversion fuzzy integrated control method are used to design depth control systems for a torpedo respectively. The simulation results illustrate that dynamic inversion fuzzy integrated control method can solve the problem of torpedo depth control more satisfactorily than the dynamic inversion tracing control method can.
提出了基于动态逆的跟踪控制方法和动态逆模糊集成控制方法,并分别将这两种方法用于鱼雷深度控制中,通过仿真说明动态逆模糊集成控制方法比基于动态逆的跟踪控制方法更好地解决了鱼雷的深度控制问题。
-
By introducing the real valued code, deteminstic crowding niching algorithm, improving the genetic algorithm, we present an evolutionary algorithm that generates Hypercube detector - Deviation Levels based Detection Algorithm and an evolutionary algorithm that generates fuzzy rule detectors - Fuzzy Rules based Anomaly Detection Algorithm.
通过引入实数编码,精确排挤小生态算法,对遗传算法进行改进,研究了基于背离等级的检测算法(Deviation Levels based Detection Algorithm,简称DLDA),同时为了提高检测的准确性,引入了一种生成模糊检测规则的演进算法,使用模糊异常检测算法,对网络中的异常行为进行模糊检测。
- 相关中文对照歌词
- Warm & Fuzzy
- Fuzzy Was An Outlaw
- Fuzzy
- Kinda Fuzzy
- Warm Fuzzy Feeling
- Fuzzy Fuzzy Cute Cute
- Fuzzy Blue Lights
- Fuzzy
- 推荐网络例句
-
This one mode pays close attention to network credence foundation of the businessman very much.
这一模式非常关注商人的网络信用基础。
-
Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.
扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。
-
There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.
双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。