英语人>网络例句>交换算法 相关的搜索结果
网络例句

交换算法

与 交换算法 相关的网络例句 [注:此内容来源于网络,仅供参考]

With the object of bettering the efficiency of the crossover operator of genetic algorithms, an improved crossover strategy is proposed. The genetic algorithm with this strategy is capable of preventing incest, caducous crossover and, to some extent, premature convergence.

从提高遗传算法交换操作效率的角度出发,提出一种改进交换策略;采用该交换策略的遗传算法可以防止近亲繁殖和失效交换的出现,在一定程度上避免早熟收敛的发生。

This paper extends the ant colony algorithm which is used for solving 0-1 knapsack problem in reference [7], and gets enlightenment from the ant colony algorithm with 2-opt local optimization for solving traveling salesman problems: Exchange strategy can make the algorithm have faster convergence rate and get better quality solution. So this paper presents the ant colony algorithm based on exchange stragegy.

本文推广了文献[7]中求解单维0-1背包问题的蚁群算法,并从结合2-opt等局部优化的蚁群算法求解旅行商问题中得到启示:通过交换策略可以加快算法的收敛速度和获取更高质量的解,因此提出了基于交换策略的蚁群算法。

So the priority that combines packet delay and dynamic queue length is obtained. A packet scheduling algorithm based on this priority scheme is proposed for the input memory switch. The scheduling algorithm supports both packet delay and packet queue length. The application of this scheduling algorithm in Crossbar and Clos networks is presented.

在此优先级的基础上,提出了输入缓存交换结构中能够兼顾分组时延与分组队长的分组调度算法,将此调度算法用于单Crossbar交换单元和Clos网络,并提出了在Clos网络中按照优先级均衡负载的路由算法。

We use round robin algorithm and neural network scheduling algorithm to scheduling cells and simulation results show its performance is satisfactory.

分别采用轮询调度算法和人工神经网络优化调度算法来实现信元交换调度仿真,仿真结果表明VOQs和EMIN相结合的交换系统可以取的满意的性能。

In chapter 4, basing theories and methods of scientific visualization, and artificial neural network BP algorithm, we integrate the Visual C++, OpenGL graphics library and Excel VBA technique to develop the program of artificial neural network and to make the BP algorithm visually, this program works can be divided into four parts: Using C language to develop program about BP algorithm; Using Visual C++, develop the GUI Interface, make input parameter visually; Using OpenGL graphic technique to display the training sample point in three dimension; at last using Excel DDE technique display the error graphic tables in Excel system In chapter 5, on the view of engineering application, we establish new method of surface reconstruction basing artificial neural network, develop interface program between module and commercial CAD/CAM system, meantime deeply discuss some key problems, for example, setting up the base plane, using the API technique, cutting and editing surface boundary, and also discuss the more compliant problem: how to intersect surface, at end we finish the work of translation from our surface reconstruction module to commercial CAD/CAM system, then make reverse engineering system basing artificial neural network more useful.

第四章基于科学计算可视化理论,依据人工神经网络BP算法理论模型,综合Visual C++,OpenGL图形库以及Excel VBA等多项软件开发技术,编制了人工神经网络程序,实现了BP算法的可视化映射。具体工作分为四部分:利用C语言实现人工神经网络BP算法;利用VisualC++的GUI技术开发图形用户界面,实现参数设置可视化;利用OpenGL图形技术进行三维映射,显示学习样本及训练样本点;利用微软电子表格DDE动态数据交换技术,在Excel上动态显示学习误差曲线图。第五章从工程应用的角度出发,提出了一种新的基于人工神经网络算法的曲面裁剪重构方法,完成了曲面重建模块与通用CAD/CAM系统的接口设计工作,对其中的若干关键问题进行了深入讨论,例如基平面设定、API技术的应用、边界裁剪等问题,同时,对曲面计算中较为困难的曲面相交问题也进行的专门探讨,最终完成了曲面重建模块向CAD/CAM系统的数据传输工作,使人工神经网络逆向工程系统趋向实用。

The design includes many new technologies in data exchange and data security, they are: Converting non-XML data to XML in order to apply the XML security technology to more data types; Using the technology of XKMS and PKI to manage the public key in order to overcome the shortage of complexity and difficulty in using PKI and improve the efficiency of the public key management; Using Diffe-Hellman algorithm combining with the public key technology to exchange secret key in order to furthest increase the security of the key; Using the technology of XML digital signature algorithm to ensure the integrity, message authentication and signer authentication of the data; Using the technology of XML encryption to ensure confidentiality of the data; Defining delegable access rules on the structure and content of the XML documents to provide fine-grained access control. According to the XML security framework, a XML security library is designed and implemented.

在对XML及其安全技术主要包括XML加密技术、XML数字签名、公钥管理、密钥产生和交换进行研究的基础上,结合传统密码技术和XML安全技术提出了一种基于XML的数据安全模型,模型中包含了目前网络数据交换和安全领域的一系列最新技术,主要有:将非XML格式数据转换为XML格式数据的方法,以保证现有的大部分网络数据能够应用XML安全技术;使用XML公钥管理技术结合PKI技术管理公钥,以克服PKI技术实施和部署复杂、难度大等问题,提高公钥管理的效率;使用Diffie-Hellman算法结合公钥技术交换密钥,以最大限度保证密钥的安全;使用XML数字签名技术保证数据的完整性、不可否认性和发送方身份认证;使用XML加密技术保证数据的机密性;根据XML文档的内容和结构定义授权访问规则进行良好的访问控制。

At the same time, to overcome the limitations inherit in traditional optimal algorithms, an immune genetic algorithm is developed, and in addition, it is applied to the optimal thermal design of louvered panels.

摘 要 考虑优化过程中辐射能量交换的特殊性,为了加速优化过程的进行,通过引入漫反射系统单元表面间辐射传递系数与角系数之间的关系来处理百叶窗的辐射能量交换;同时为了克服传统优化算法存在的缺陷,提出了一种免疫遗传算法,并且应用于百叶窗最优化热设计中。

The main features of this paper is: nothing to do with the platform, this system can be compatible with the majority of software and hardware used by the platform, as well as various database platform, shielding the differences of hardware and software platform such as network, operating systems, databases, application systems and so on, so that enterprises and institutions could achieve seamless, transparent data exchange through data exchange system; Java technology used to develop the system transplantability; using data exchange center to achieve centralized data processing, different data format conversion, increased system scalability; from data transmission, authentication, access control, encryption and more news content log-class areas enhanced data exchange system security; using DES and RSA algorithm , increased the confidentiality of data transmission; create WrapperTimer category achieved data transmission timing implementation and reduce the dependence on artificial.

设计的系统与平台无关,能兼容企业所用的大多数软硬件平台,以及各种数据库平台,屏蔽网络、操作系统、数据库、应用系统等软硬平台的差异,使企事业单位通过数据交换系统实现无缝的、透明的交换数据;采用数据交换中心来实现数据的集中处理、不同数据格式的转换,增加了系统的可扩展性;从数据传输、身份认证、权限控制、消息内容加密和多级日志等多方面增强数据交换系统的安全性;用DES和RSA算法对XML文件或XML文件中的元素进行加密,增加传输数据的保密性;创建WrapperTimer类实现了数据传输的定时执行,降低了对人工的依赖性。

Crosstalk characteristic in dilated Benes switching network, principally in a special architecture of modified dilated Benes is investigated in this section.

通过本算法,选择合适光交换网络路由方式实现消除8×8光交换网络带内串扰,并把算法扩展到N×N DB结构。

Compared with the exchange and mutation operation in genetic algorithm ,crossover operation becomes helpless when adaptive value of most individules in demes have little difference.The algorithm falls into local solution and can't be solved by exchange. Although mutation can make it shake off local convergence and jump out of local solution, denteric mutation may destroy the produced module that is constructive to form the optimal solution.

相比遗传算法中的交换和变异操作,当种群的多数个体适应值相差不大时交叉操作就显得无能为力,算法陷入局部解而不能由交换解决,突然变异能够使之摆脱局部收敛而跃出局部解,但是后期的变异可能破坏已产生的对形成最优解有建设性作用的模块。

第2/9页 首页 < 1 2 3 4 5 6 7 8 9 > 尾页
推荐网络例句

This one mode pays close attention to network credence foundation of the businessman very much.

这一模式非常关注商人的网络信用基础。

Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.

扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。

There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.

双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。