英语人>网络例句>交换算法 相关的搜索结果
网络例句

交换算法

与 交换算法 相关的网络例句 [注:此内容来源于网络,仅供参考]

In the solution process the initialization two populations, separately will select the different overlapping variation probability, after each time will iterate the sufficiency high individual carries on the first population's in sufficiency low individual with the second population in the exchange, and will preserve each center group the optimal solution to the outstanding person population, by will solve the tradition genetic algorithms to be easy to appear precociously, will be easy to fall into the partial optimal solution question.

即在求解过程中将初始化两个种群,分别选取不同的交叉变异概率,在每一次迭代完后将第一个种群之中的适应度较低的个体与第二个种群中适应度较高的个体进行交换,并且保存每个种群的最优解到精英种群,以解决传统遗传算法容易出现早熟,容易陷入局部最优解的问题。

It can be found that the algorithm can obviously improve the performance of loss rate and the delay for the OBS networks and hold real-time data service.

通过仿真结果可以得知,该算法可以明显改善光突发交换网络的丢包率和时延性能,能够很好地支持实时性要求很高的数据业务。

ATM switch fabric based on the algorithm of speediness lookup table and VHDL is designed by this method.

并利用该设计方法设计了一种基于快速查表算法的由VHDL描述的ATM交换单元。

As for performance my theory is that Microsoft has implemented a fairly good caching algorithm for it's swap file, so it should prove good enough for me.

至于性能,我的理论是,微软已经执行了它的交换文件较好的缓存算法,所以它应该证明我不够好。

In allusion to the energy-concentrated property of LFM signal in the fractional Fourier domain, the data model of array matrix is constructed by the algorithm and the decorrelation ability is obtained by establishing a new Toeplitz matrix. After performing a spectrum peak research, DOA estimation of coherent wideband LFM signals is obtained.

针对分数阶傅里叶交换的谱峰聚集特点,该算法构造了分数阶傅里叶域的宽带LFM信号的阵列数据模型,在FRF域内利用Toeplitz矩阵重构特性,实现对相干信号的解相干,最后通过谱峰搜索完成入射信号的DOA估计。

The safety path vector is an approximate measure of the number and distribution of the faults in the neighborhood and can be setup or updated through the n?1 rounds of information exchanges among neighboring nodes by consuming only n bits storage space.

其中SPVs的赋值可以通过n-1轮邻节点之间的信息交换来完成,且算法中各节点的存储开销仅为n bits,因此,SPVs是安全向量与扩展安全向量的一种扩展,具有比SVs和ESVs更好的记录最优通路的能力。

We could begin preparing for this future change in the search engine algorithm by being choosier with which we exchange links right now.

我们可以开始为这个未来的搜索引擎算法的改变而挑剔准备同我们交换链接现在。

Utilizing information exchanging way such as Internet, security of fuzzy management decision in transferring is becoming a new research direction, engrafting information security with fuzzy management decision, this paper gives concept of information security and algorithm, applications.

因为随着信息交换手段的使用,双向模糊管理决策传递的安全性已成为一个新的研究方向,利用信息安全与双向模糊管理决策交叉,渗透,给出模糊管理安全的概念和算法;应用。

A commutation error is then considered in addition to the conventional residual error to generate the innovative residual error. Such an error is applied into cost functions to derive finite impulse response and infinite impulse response filter-based adaptive algorithms for ANC applications, referred to as FxRLS/CE and FuRLS/FRE+CE algorithms, respectively. Convergence analyses based on Lyapunov stability criteria for time-varying discrete-time systems can be carried out for the FxLMS/CE, FxRLS/CE and FuRLS/ FRE+CE algorithms to ensure stability. Computer simulations and experiments demonstrate that the innovative residual error-based adaptive algorithms can free the restriction of the slow-adaptation assumption in the conventional ANC approaches.

本文中也定义一交换误差并且加入到传统残留误差行形成新残留误差来改善适应性演算法的收敛速度,使用新残留误差推导出了有限脉冲响应滤波器与无限脉冲响应滤波器之适应演算法的新适应性演算法分别为: FxLMS/CE、 FxRLS/CE 和 FuRLS/FRE+CE 演算法,并且以离散时间的 Lyapunov 稳定性准则来证明演算法的收敛性,电脑模拟与实验也显示新演算法免除以往滤波器的参数必须缓慢更新的条件。

Experiments show that the algorithm has a good invisibility and resistance to most geometry attacks, such as rotation, small rescaling, shifting, and MPEG compression. Experiments also show that the algorithm has a good robustness against temporal synchronization attacks, such as frame insertion attack, frame drop attack, frame transposition attack.

实验表明算法具有不错的不可见性,并能很好的抵抗诸如旋转、放大、平移、压缩编码等几何攻击和帧插入、帧删除、帧交换等时域同步攻击。

第8/9页 首页 < 1 2 3 4 5 6 7 8 9 > 尾页
推荐网络例句

This one mode pays close attention to network credence foundation of the businessman very much.

这一模式非常关注商人的网络信用基础。

Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.

扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。

There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.

双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。