英语人>网络例句>solution set 相关的网络例句
solution set相关的网络例句

查询词典 solution set

与 solution set 相关的网络例句 [注:此内容来源于网络,仅供参考]

It is proved that strictly efficient point set of the objective space is connected when objective function is cone convex-like,and that if objective function is cone convex set-valued mapping,then strictly efficient solution set is also connected.

证明了当目标函数为锥类凸的集值映射时,其目标空间里的严有效点集是连通的;若目标函数为锥凸的集值映射时,其严有效解集也是连通的。

In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.

本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。

Based on genetic algorithm,a new hybrid coding method using the integer and floating number was presented. The enumerable method guarantees each individual in the population to satisfy the constrains, thus the punishment function was avoided. The two adjustable parameters made the evolution process jump out of the local best solution perfectly.The application of the fitness assignment based on Pareto ranking attained inferior solution set of the multi-objective and multiple options were provided to the decision-maker.

设计了一种新的整数和浮点数结合的编码方式;通过列举法使得每代个体满足约束条件,避免了罚函数的使用;可调整的双参数变异算子使进化过程能够较好地跳出局部最优解;应用基于Pareto排序的适应值分配方式得到目标函数的非劣解集,为决策者提供了多种选择方式。

As using binary code, a feasible route are look upon a positive integer, for example, the route from shelve 1 then to shelve 2 and last to 3 is integer 123 and feasible route solution set are the set of all feasible integers which arrange according its value.

二进制编码时,将可行路径看作是一个整数(如从货格1到2再到3看作整数123),可行路径集看作是所有这些可行整数从小到大的排列而成的集合。

In addition, in the solution set of corresponding equation, the expression of the optimalapproximation solution to given matrix is derived.

另外,导出了在线性流形上矩阵方程的解集合中与给定矩阵的最佳逼近解的表达式。

In addition, in the solution set of corresponding equation, the expression of the optimal approximation solution to given matrix is derived.

另外,导出了在矩阵方程的解集合中与给定矩阵的最佳逼近解的表达式。

Further, when the solution setis nonempty, the structure of the solution set of the equation is given.

进一步,当方程解集非空时,给出了方程解集的结构。

The structure of exact solution set of multi pantograph delay differential equation is studied and existence and uniqueness of an exact solution is proved.

研究了多比例延迟微分方程y=ay+by(q1t)+cy(q2t)的精确解的结构,探讨了初值问题解的唯一性和存在性。

The notes of essential solution and essential components of solution set for vector optimization are introduced in order to research the stability of weak efficient solution of general vector optimization including the infinite dimensional problems.

对向量优化引入本质解和解集的本质连通区的概念,研究一般向量优化问题弱有效解集的稳定性。

Optimization; parametric quadratic convex programming; set-valued map; directional derivative; linear stability; solution-set map; parametric linear programming; error bound; subdifferential map; lower locally directionally Lipschitzian; upper locally di-rectionally Lipschitzian; locally directionally Lipschitzian; convex function; quasidiferential; kernelled quasidiferential; quasi-kernel; star-kernel; star-diferential; Penot diferential; subderivative; superderivative; epiderivative; set-valued optimization; set-valued analysis; subdifferential; optimization condition;ε-dual; scalization; generalized subconvexlike-cone;ε-Lagrange multiplier

基础科学,数学,运筹学最优化;集值映射;方向导数;线性稳定;最优解集映射;参数线性规划;参数凸二次规划;误差界;次微分映射;下局部方向Lipschitzian;上局部方向Lipschitzian;局部方向Lipschitzian;凸函数;拟微分;核拟微分;拟核;星核;星微分; Penot-微分;上导数;下导数; Epi-导数;集值优化;集值分析;集值映射的次微分;最优性条件;广义锥次类凸;ε-对偶;数乘;ε-Lagrange乘子

第2/29页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

As she looked at Warrington's manly face, and dark, melancholy eyes, she had settled in her mind that he must have been the victim of an unhappy attachment.

每逢看到沃林顿那刚毅的脸,那乌黑、忧郁的眼睛,她便会相信,他一定作过不幸的爱情的受害者。

Maybe they'll disappear into a pothole.

也许他们将在壶穴里消失

But because of its youthful corporate culture—most people are hustled out of the door in their mid-40s—it had no one to send.

但是因为该公司年轻的企业文化——大多数员工在40来岁的时候都被请出公司——一时间没有好的人选。