英语人>网络例句>离线的 相关的搜索结果
网络例句

离线的

与 离线的 相关的网络例句 [注:此内容来源于网络,仅供参考]

At last, the application of above modeling and control strategies has been demonstrated by the simulations of a nonlinear dc motor control problem. Under this control strategy, system identification phase is not needed, and only a controller based on the recurrent neural network is provided. Because the control and learning laws are designed with stable theory, stability and convergence problems are solved here with rigorous analysis, which can not been analyzed easily when usual BP neural networks are used.

最后通过非线性电机模型的仿真研究,表明了基于上述动态动态递归神经网络模型对非线性系统进行自适应控制的实际可行性,并且采用这种方法不需要对系统进行离线辨识,整个系统只采用了一个基于动态递归神经网络的控制器,由于整个系统是基于稳定性理论设计的,有效地解决了应用BP网络等其它前向网络时系统的稳定性和收敛性难以分析的问题。

Based on the characters of decision-tree nodes and the definition of LESS, the universal rules of transformation are proposed.

本文根据业务逻辑树节点的特性和LESS的定义,提出了通用的转化规则,实现了端业务的形式化建模,从而方便了业务的集成及业务间的离线检测。

In order to make the new recursive method convergence fast, the RLS-like forgetting factor is introduced to construct the new data Hankel matrices. In the framework of subspace methods, the gradient type subspace tracking method is used to implement the update of the state subspace, which results the unbiased estimate. Different from traditional offline method, the system matrices are recursively computed using RLS method. The convergence analysis of the proposed method is given and finally, the efficiency of this method is illustrated with a simulation example.A new closed-loop identification method is proposed to implement consistency estimation of closed-loop subspace identification.

引入RLS-like遗忘因子机制构造新的数据矩阵,更好地跟踪系统时变信息,提高递推算法的收敛速度;在子空间辨识框架内,采用梯度型子空间跟踪算法实现对状态子空间的更新,避免了子空间近似带来的估计有偏性;与传统的离线算法不同,在得到系统状态子空间后,基于递推最小二乘方法提出新的算法,实现对系统矩阵的递推估计;并给出递推子空间辨识算法的收敛性分析;最后通过仿真实例验证算法的有效性。

They allow that the backend server could delegate the reader to identify the tag information. But the Fouladgar and Afifi's SiDES protocol will suffer from the replay attack, forgery attack, Denial-of-Service attack and fail to achieve the forward security. Although Lin's protocol uses timestamp to control the delegation, it does not keep forward security property under the same time frame.

在2007年,Fouladgar和Afifi首先提出了离线式SiDES协定,接著Lin也提出了TCD-RP协定,可让后端伺服器可以授权读取器辨识标签的资讯,但Fouladgar和Afifi的SiDES定理,会遭受重送攻击、伪造攻击、阻断服务攻击以及不具有向前安全性的特性;而Lin的协定虽然使用时戳来做授权的控制,但在相同的时间区段下运作,并不具有向前安全性的特性。

In this paper, by considering the convenience of consumers, we use group blind signature technology with the character of hash chain to create the dividable and anonymous e-cash. Thus the users can consume not only in the home mobile domain but also visit mobile domain without register and authentic. We use off-line e-cash to increase the efficiency of payment exchange. Under the fair principle of all participators, we set a convenient and secure mobile payment.

因此,以消费者使用上的最大便利性为考量,本研究利用群体盲签章加入杂凑链之特性的方式来产生可分割的匿名电子现金,让消费者不只可以在主系统业者的网域内作消费,当其到漫游业者的网域内消费时,也不需要额外的认证及注册过程,并采用离线验证的方式来增加付款交易的效率性,在考虑各角色公平的原则下,提供一个方便、安全的行动付款系统。

Corolla pale blue, with distinct deep blue lines, lobes elliptic-lanceolate to elliptic; stem leaves lanceolate to broadly lanceolate, base subamplexicaul; stem fastigiate branched from base

浅蓝色的花冠,具离生的深的蓝色的线,裂片椭圆状披针形的到椭圆形;茎生叶披针形到宽披针形,基部;茎帚状的分枝自基部 4 Lomatogonium longifolium 长叶肋柱花

Now the manufacturers introduced Chanpianji are equipped with specialized senior language development environment, the Separation Line simulation system, online debugging functions, so that electrical systems development from the previous code jargonistic, readability is poor, the situation difficult to substantially shorten the software code for the preparation cycle, which call control system to control the use of higher precision, more complex control algorithms.

现在各厂家推出的单片机,都配有专门的高级语言开发环境、离线仿真系统、在线调试功能,使电控系统的开发摆脱了以前的代码晦涩难懂、可读性差、难于接近的局面,大幅度缩短了软件代码的编写周期,使得电控系统能够采用控制精度更高、更为复杂的控制算法。

Methods One hundred and fifteen extracted maxillary first premolars were included in this study. Radiograph of teeth in mesiodistal direction was taken.

收集115颗离体的上颌第一前磨牙,拍近远中向的X线片,用Photoshop5.0软件分析根管,用Weine氏法测量根管的弯曲度,测量的角度大于 18°时,则认为根管存在明显的弯曲,根管的构型采用Vertucci分类法。

Perfect Privacy protects your privacy by eliminating your Internet and offline computer usage traces, such as history lists, address bar drop downs, cache, accessed document lists and other tracks that are stored to your computer as you use it.

完美的隐私保护您的隐私,消除您的Internet和离线使用电脑的痕迹,如历史上的名单,地址栏的下拉落,缓存,访问的文件清单和其他轨道是储存到您的电脑,您可以使用它。

On the studies of three different assist characteristic of EPS, the method of founding curve type assist characteristic is discussed and the curve of assist characteristic is trained offline by neural network. And with the toolbox of MATLAB, the perfect expression of assist characteristic can be obtained.

本文对三种不同形式的EPS助力特性进行了理论上的分析,在离散助力特性研究的基础上,探讨了初步确立曲线型助力特性的方法,并提出以神经网络对助力特性曲线进行离线优化训练,通过MATLAB工具箱拟合得到了比较理想的电动助力系统的助力特性表达式。

第37/44页 首页 < ... 33 34 35 36 37 38 39 40 41 ... > 尾页
推荐网络例句

We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.

索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。

The relationship between communicative competence and grammar teaching should be that of the ends and the means.

交际能力和语法的关系应该是目标与途径的关系。

This is not paper type of business,it's people business,with such huge money involved.

这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。