基本算法
- 与 基本算法 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The interpolation algorithm for cycloid is proposed in accordance with the principle of time-sharing. The interpolation contour error is analyzed in detail.
根据时间分割法的基本思想,提出了一种摆线的插补算法,介绍了该方法的基本原理及实现方法,对插补的轮廓误差进行了详细分析。
-
The principles of Partially Observable Markov Decision Processes and the basic procedure of Perseus approximate algorithm were introduced.
为了诊断状态不完全可观条件下的设备状况,介绍了部分可观察的马尔可夫决策过程的基本原理和Perseus近似算法的基本流程。
-
The paper introduces the Points of Knowledge Inaugurated on the contribution of 《Groundwork of ZiBenWei and Chinese Information Processing》,namely: the Definiens and Taxonomy of Information,and that of Intelligence, the Rationale on Chinese, the Principle of Memory Coordinated Bilingually in Cognitive Psychology, the Principle Restricted on the Formal Theory, the Principle on Logic with Bit-List Tool,the Universal Arithmetic and Measure for language and knowledge,the Producing Teaching cooperated with the training system as Man-Com-Net, the Integrative[1] Management (of knowledge, information and data).
本文介绍《字本位与中文信息处理的基础》[3]贡献的十个知识创新点,即:信息和智的本质定义及基本分类,汉语及中文的基本原理,认知心理学双语协同存储原理,形式理论的受限原理,序位逻辑原理及工具,语言和知识的通用算法和量具,生产式教学及协同智能训练体系,(产、学、研、教、用、算)一体化管理。
-
In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.
本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。
-
The uncertainty of basic events' probabilities could not be taken into account in an ordinary event tree method.
针对常规事件树不能考虑基本事件发生概率的不确定性这一现状,通过引入模糊集的概念,将常规事件树中基本事件的发生概率模糊化,推导了模糊事件树的相关算法。
-
This paper consists of four parts. In the first part, we explain some basic knowledge about evolutionism of biology, and then demonstrate the origin, the process, the development and the characteristics of GA by giving some practical examples.
本文共分为4个部分:第一部分首先介绍了生物学中关于进化论的一些基本知识,然后引申出遗传算法的思想来源、基本流程以及发展过程和本身的特点,并通过实际的例子做了说明。
-
Good capability of searching global extremum of genetic algorithm is induced into resolve of fundamental matrix and good experiment results are obtained.
为此,在研究了大量关于基本矩阵的求解方法后,提出了一种基于遗传算法的基本矩阵鲁棒性求解方法。
-
This paper is to VisualC++ tool for digital image processing techniques, the basic theory, algorithm modules, thus realize thorough understanding of the basic function of image processing, including images of gray histogram equalization, image transformation, the Fourier transform and discrete cosine transform, the image enhancement processing low-pass filter high-pass filter and transformation.
本文是以VisualC++为工具,对数字图像处理技术的基本理论、模块算法做了深入的了解,从而实现图像处理基本功能,其中包括图像的灰度变换,直方图均衡,图像傅里叶变换和离散余弦变换,图像增强处理中的低通滤波和高通滤波变换。
-
From the point of object feature measurement, the fundamental principle, algorithm and technology of measuring two and three dimensional object characters are analyzed systematically.
分析了计算机视觉在国内外交通工程中的应用,给出了计算机视觉系统的基本设计要点,以形状特征测量分析为目标,系统分析了计算机视觉进行二维和三维特征分析、测量的各种基本原理、算法和技术实现。
-
Bezier and NURBS are chosen as the fundamental method to achieve surface reconstruction on the basis of fundamental theory of sculpture surface reconstruction. Then the fitting method of Bezier and NURBS surface reconstruction is given after the reconstruction algorism is discussed.
作者研究了复杂曲面重建的基本理论,选择Bézier和NURBS作为曲面重建的基本方法,同时对曲面重建的算法进行研究,给出Bézier和NURBS曲面拟合的不同方法,并对求交、拼接和光顺等方法进行了深入研究。
- 推荐网络例句
-
This one mode pays close attention to network credence foundation of the businessman very much.
这一模式非常关注商人的网络信用基础。
-
Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.
扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。
-
There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.
双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。