英语人>网络例句>多函数 相关的搜索结果
网络例句

多函数

与 多函数 相关的网络例句 [注:此内容来源于网络,仅供参考]

Optimal algorithm of combined nonlinear Hopfield network appears powerful validity in solving nonlinear planning, which includes nonlinear objective function, linear constrains and high-demension of decision-making variants, for its ability of nonlinear parallel computation. It is prominent among optimal algorithms because of its function of simply implement with electrocircuit hardware. Genetic algorithm is expressly suitable for optimal calculation regarding the planning of massive, highly nonlinear, inconsecutively differentiable and multiobjective function as well as objective function without analytical expression. However, it inclines to prematurity, as well as its limitation in ability of partial optimal search. Introducing the optimal algorithm of niche genetic simulated annealing to standard Genetic algorithm, can therefore improve the full-scale or partial search ability of Genetic algorithm effectively. It has a far-flung perspective in the field of systemic planning of water pollution control.

组合式非线性Hopfield网络优化算法所具有的非线性大规模并行计算能力在求解具有非线性目标函数、线性约束条件及高维决策变量的非线性规划问题方面显示出了强大的生命力,它易于电路硬件实现的功能更是在优化算法中独树一帜;遗传算法采用概率搜索技术,不受目标函数与约束条件的限制,特别适合大规模、高度非线性的不连续可微的多峰目标函数及无解析表达式的目标函数的规划问题的优化计算,但其存在容易早熟、局部寻优能力较差等缺点,本文在标准遗传算法中引入小生境技术及模拟退火算法有效地改善遗传算法的全局和局部搜索性能,提高了全局最优解的寻优质量,小生境遗传退火模拟优化算法在水污染控制系统规划中的应用前景极为广阔。

Owing to the complexity of CIMS' missions,the reliability modeling should adapt the production processes accurately.Conventional reliability model method can not reflect the time dynamic behavior of CIMS,so the multitask reliability model based on generalized stochastic Petri nets is established for a CIMS manufacturing shop with multiple missions and the process times of the machines with exponential distributions.Furthermore,analysis of GSPN model based on behavior expression and moment generating function is presented,then can compute the transfer functions.Finally,the multitask reliability can be easily obtained without the reachability graph of Petri nets,which measure can reflect the operating performance of the whole multitask CIMS more intuitively.

CIMS生产的复杂性要求其可靠性模型可以精确地反映生产过程,由于传统的可靠性建模方法无法兼顾CIMS的时间动态特性,所以针对一个复杂的有多个加工任务的CIMS制造单元,由于其机器加工工件的时间均为指数分布,则采用广义随机Petri网进行多任务可靠性建模,在此基础上基于Petri网行为表达式,将矩母函数思想引入其中,不必生成可达标识图就可通过计算模型的传递函数,进而得到整个系统的多任务可靠度,该可靠性指标可以更直观地反映具有多种加工任务的整个CIMS的运行性能。

Based on the method of multi-objective fuzzy optimization and the overhead traveling crane design, a mathematical model of fuzzy optimization for main box beam section is established. A fuzzy goal anthology is constructed. The fuzziness of multi-objective function and constraints is defined. The transformation of the fuzzy constraints set to normal constraints set in real number domain is realized by applying optimal level cut set method. The optimal solution and optimal constraint value of sub-objective function in the feasible field are found using the genetic algorithms.

应用多目标模糊优化方法,以工程设计中桥式起重机箱形主梁设计为实例,建立了桥式起重机箱形主梁多目标模糊优化设计的数学模型,构造了模糊目标集,确定了多目标函数的模糊性和约束的模糊性,并应用最优水平截集法实现了模糊约束到实数论域上的集合转换,从而用遗传算法寻求到子目标函数在可行域空间的最优解和约束最优值。

Compared with gompertz growth function, logistic growth function has the inflection point high and the symmetry characteristics.

逻辑生长函数相对于龚珀兹生长函数具有拐点高和对称性的特点,采用逻辑生长函数形式的功效函数法求解混合多目标规划问题具有形式简单、计算量小、符合实际的优点。

Comparisons are made between the Henyey-Greenstein phase function, the modified Henyey-Greenstein phase function, the direct sample phase function presented in this paper and the polydisperse Mie phase function.

比较了H-G相函数、改进的H-G相函数及随机抽样拟合的相函数与多分散系Mie相函数的偏离程度。

Along with the password attack method unceasing renewal, the computation ability unceasing enhancement as well as to the operating speed request, the tradition disperses row algorithm MD5, SHA has demonstrated their shortcoming and the insufficiency day by day, and thestructure of hash function is mostly based on block cipher algorithm DES, but the HASH function security is established above the grouping function security, because the DES operand is very big, the operating speed very slowly by and its itself some characteristics, therefore disperses a row function based on the DES algorithm to have potential unsecurity.

随着密码攻击手段的不断更新、计算能力的不断提高以及对运算速度的要求,传统的散列算法MD5,SHA已日益显示出它们的缺点和不足,并且过去hash函数的构造多是基于分组密码算法DES的,而hash函数的安全性是建立在分组函数的安全性之上的,由于DES运算量很大、运算速度很慢以及其本身的一些特性,因此基于DES算法的散列函数具有潜在的不安全性。

Along with the password attack method unceasing renewal,the computation ability unceasing enhancement as well as to theoperating speed request, the tradition disperses row algorithm MD5,SHA has demonstrated their shortcoming and the insufficiency day byday, and thestructure of hash function is mostly based on block cipheralgorithm DES, but the HASH function security is established above the grouping function security,because the DES operand is very big, the operating speed veryslowly by and its itself some characteristics, thereforedisperses a row function based on the DES algorithm to havepotential unsecurity.

摘要随着密码攻击手段的不断更新、计算能力的不断提高以及对运算速度的要求,传统的散列算法MD5,SHA已日益显示出它们的缺点和不足,并且过去hash函数的构造多是基于分组密码算法DES的,而hash函数的安全性是建立在分组函数的安全性之上的,由于DES运算量很大、运算速度很慢以及其本身的一些特性,因此基于DES算法的散列函数具有潜在的不安全性。

The first-part of this paper evaluates the main stability theories concerned and concludes the conceptualization steps and essentials covering the various methods. Different disturbed-measure functions are studied in terms of their formulations and characteristics. Both Lyapunov functions and TEFs can be constructed only in a heuristic way of case-by-case. Ignoring changes in the disturbed-measure function's value after clearing the fault, Lyapunov functions and TEFs are applicable to neither nonautonomous one-machine infinite-bus systems nor any multimachine systems. Moreover, TEFs cannot guarantee the sign of errors because they don't satisfy the conditions for Lyapunov functions.

作为第1篇,文中归纳出这3种方法的共同分析步骤和要素,并比较各种受扰程度函数,指出:李雅普诺夫函数和TEF的建立都必须从具体模型出发并只能依靠启发的方式,它们没有考虑受扰程度函数的值在故障清除后的变化,因此既不适用于复杂模型的单机系统,也不适用于任何多机系统;又由于这2种方法都基于很强的假设,故分析的误差可能非常大,而TEF法更是由于不满足李雅普诺夫函数的条件而可能得到冒进的结果。

In the training of HMM, referring to the auxiliary function in reference〓, and the method in reference〓 to get the estimations of the parameters of Markov chain, we define the likelihood function and auxiliary function for the maximum likelihood estimation of CDHMM, and then induce systematically the forward-backward algorithm and the re-estimation formulas for parameters of CDHMM.

在HMM的建模方面,本文借鉴文献〓中求多变量观测值马尔可夫链参数时辅助函数的选取方法,定义了CDHMM的似然函数和辅助函数;借鉴文献〓中求解马尔可夫链参数时的求偏导方法,并针对本文辅助函数加以简化和改进,系统地推导了HMM的前向—后向算法,以及CDHMM各参数的极大似然估计公式。

The theoretical removal function of a grinding/polishing tool is given and the optimal technological parameters is achieved by experiments.

介绍了计算机控制光学表面成型技术的基本原理,对双旋转磨头的去除函数进行研究,研究了不同形状的磨头的去除函数特性,并在多次实验的基础上得到了最优的加工参数,在去除函数的基础上提出了模板函数的概念及算法。

第5/76页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

I will endeavour to find you some assistance.

我尽力帮你找人帮忙。

At first I only know bruck is the idol of American younglings, afterwards I returned back to Taiwan ,even in Beijing last year ,I saw her poster everywhere, I was so surprised at her charm.

起初我只晓得布鲁克雷德丝是美国少男少女崇拜的偶像,后来回台湾,甚至去年在北京,居然也四处看见她的海报,才惊讶她的魅力之大。

Ah may dee:You are chinese living in a democratic country.

你是居住在民主国家的中国人吧。