最优化
- 与 最优化 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The theory of maximal monotone operator is one of the most importance successes in the area of nonlinear analysis.
极大单调算子理论是非线性分析领域的有效工具之一,已被广泛应用于非线性偏微分方程、非线性积分方程、控制论、最优化理论等学科,在物理学、经济。。。
-
The theory of maximal monotone operator is one of the most importance successes in the area of nonlinear analysis. It provides a powerful general framework for the study of nonlinear partial differential equations, nonlinear integral equations, control theory, optimization. Practically, it has be applied abroad in physics, economics and engineering.
极大单调算子理论是非线性分析领域的有效工具之一,已被广泛应用于非线性偏微分方程、非线性积分方程、控制论、最优化理论等学科,在物理学、经济学、工程学等应用学科也有着广泛的应用。
-
Chapter on dynamic optimization and the maximum principle.
有关动态最优化和最大化理论的章节)。
-
Based on the second PA derivative of mean steady-state system time with respect to a parameter of the service time distribution, we give the second-order stochastic approximation algorithm.
当最优化问题过于复杂,无法使用解析方法分析时,一个可行的方法是在参数的取值范围内用逐次逼近法找到最优点;在使用此类优化算法时,目标函数的样本导数是必需的。
-
The security of PKI system itself is especially emphasized during the system design and implementation process, which is in accordance with the pervasive characteristic of PKI. Second, the concept of a Trusted Key Management Center is introduced for the first time. This technology greatly strengthens key management practices and allows for smooth transition from PKI to Key Management Infrastructure. Third, certificate status mechanisms are investigated in depth, and a certificate revocation performance simulation system is devised. All these work will provide guides to practice and employment of PKI applications. Based on time constraints, a new taxonomy for authenticated dictionaries is proposed. Fourth, formal analysis ofOCSP protocol is carried out; then an efficient and scalable OCSP system is developed. Fifth, the special requirements caused by the working environments of Wireless PKI are analyzed. Based on communicative hashing and dynamic Merkle hash tree, an efficient certificate status validation method suitable for WPKI is presented. Sixth, one important kind of fair exchange protocols is studied, and a new CEMBS based on RSA cryptosystem is proposed. Afterwards, a novel fair exchange protocol totally based on RSA signature scheme is devised.
在系统设计和实现的过程中,考虑到PKI作为普适性安全基础平台的特点,特别强调PKI系统自身的安全性;第二,首次在PKI系统的设计中提出了"可信密钥管理中心"的概念,这一独特设计大大地强化了密钥管理功能的实施,为PKI向密钥管理基础设施的平滑过渡提供了良好的技术准备;第三,对证书状态验证机制进行了深入研究,设计了证书状态模拟系统,以指导PKI系统和应用的部署和实施;在此基础上,基于时间约束首次给出了认证字典的一种新的分类方法;第四,对OCSP协议进行了形式化分析,设计和实现了一种高效、可扩展的OCSP系统;第五,分析了WPKI工作环境对设计安全基础平台提出的特殊要求,结合无线移动设备的具体特点,基于可交换杂凑函数和动态Merkle杂凑树设计出了一种适用于WPKI环境的高效证书状态查询机制;第六,对一类公平交换协议进行了深入的研究,从设计公平交换协议的密码基础结构出发,提出了一种新型的基于RSA密码体制的高效CEMBS;在此工作的基础上,设计了一种基于RSA密码体制的最优化公平交换协议。
-
The security of PKI system itself is especially emphasized during the system design and implementation process, which is in accordance with the pervasive characteristic of PKI. Second, the concept of a Trusted Key Management Center is introduced for the first time. This technology greatly strengthens key management practices and allows for smooth transition from PKI to Key Management Infrastructure . Third, certificate status mechanisms are investigated in depth, and a certificate revocation performance simulation system is devised. All these work will provide guides to practice and employment of PKI applications. Based on time constraints, a new taxonomy for authenticated dictionaries is proposed. Fourth, formal analysis of OCSP protocol is carried out; then an efficient and scalable OCSP system is developed. Fifth, the special requirements caused by the working environments of Wireless PKI are analyzed. Based on communicative hashing and dynamic Merkle hash tree, an efficient certificate status validation method suitable for WPKI is presented. Sixth, one important kind of fair exchange protocols is studied, and a new CEMBS based on RSA cryptosystem is proposed. Afterwards, a novel fair exchange protocol totally based on RSA signature scheme is devised.
在系统设计和实现的过程中,考虑到PKI作为普适性安全基础平台的特点,特别强调PKI系统自身的安全性;第二,首次在PKI系统的设计中提出了"可信密钥管理中心"的概念,这一独特设计大大地强化了密钥管理功能的实施,为PKI向密钥管理基础设施的平滑过渡提供了良好的技术准备;第三,对证书状态验证机制进行了深入研究,设计了证书状态模拟系统,以指导PKI系统和应用的部署和实施;在此基础上,基于时间约束首次给出了认证字典的一种新的分类方法;第四,对OCSP协议进行了形式化分析,设计和实现了一种高效、可扩展的OCSP系统;第五,分析了WPKI工作环境对设计安全基础平台提出的特殊要求,结合无线移动设备的具体特点,基于可交换杂凑函数和动态Merkle杂凑树设计出了一种适用于WPKI环境的高效证书状态查询机制;第六,对一类公平交换协议进行了深入的研究,从设计公平交换协议的密码基础结构出发,提出了一种新型的基于RSA密码体制的高效CEMBS;在此工作的基础上,设计了一种基于RSA密码体制的最优化公平交换协议。
-
ShaoLin Microsystems's mission is to optimize our customers' systems efficiency.
少琳电脑的使命是最优化客户的系统效率。
-
The method applies the progressive optimization theory to derive preview control input based on minimalization of performance index of trajectory error area between desired and actual trajectory, the feature of preview control input is that feeback and preview feedforward coefficients are changed in every sampling time.
该方法从目标路径与实际路径之间的面积误差评价函数值最小化观点出发,运用逐次最优化原理来求取最优预见控制输入。
-
To overcome the difficulties, we use the method with three object functions which are the minimum Lp norm, the deviation between the calculated magnetic fields and the measured magnetic fields, and the number of the sources.
为了克服上述两种方法的困难,采用多目标函数最优化法。该方法的目标函数为,(1)未知源的Lp模,(2)由未知源计算出的磁场与测量的磁场之间的偏差,(3)源的数目。
-
In this paper, by using some characteristic quantities such as value function, trust region radius, etc. in trust region method, we present a global error bound for the distance between a feasible solution and the optimal solution under the condition that the gradient vector of the objective function is strongly monotone.
本文利用信赖域方法中的几个特征量(由预测下降量给出的价值函数与信赖域半径等),在目标函数的梯度向量是强单调的条件下,为约束最优化问题的可行解与最优解之间的距离提供了一个全局误差界。
- 推荐网络例句
-
But we don't care about Battlegrounds.
但我们并不在乎沙场中的显露。
-
Ah! don't mention it, the butcher's shop is a horror.
啊!不用提了。提到肉,真是糟透了。
-
Tristan, I have nowhere to send this letter and no reason to believe you wish to receive it.
Tristan ,我不知道把这信寄到哪里,也不知道你是否想收到它。