全局优化算法可分为随机性算法和确定性算法。
Global optimization algorithms can be classified into two types: stochastic techniques and deterministic techniques.
最后,采用随机抽样一致性算法剔除误匹配点对。
Finally, the random sample Consensus algorithm was used to remove the false matching point pairs.
最后,分析了各个流数据挖掘任务中的代表性算法。
At last, the representative algorithms of every mining task are analyzed.
着重证明了K -树组法为多项式时间复杂性算法。
It is proved that K-Tree Term method is a multinomial time complexity algorithm.
本文给出“割集矩阵可实现性算法”的计算机程序。
This paper presents a computer program for the realizability of a cutset matrix.
安全性组件包含各种安全性算法和机制的IBM实现。
The security components contain IBM implementations of various security algorithms and mechanisms.
由此可见,奇性算法是实现高分辨率处理的一种有效途径。
It can be seen from this that the algorithm is an effective one for improving resolution.
用群体一致性算法检验专家评估提出的意见,并最终获得权重。
The weights from experts are tested with group consistency algorithm to obtain the normalized weights.
因此,对自适应阵列信号处理稳健性算法研究显得越来越重要。
Therefore the study of robust algorithm for adaptive array signal processing is becoming more urgent and important.
当成员关系发生变化时采用一种一致性算法使得视图达到一致。
When membership changes a, consensus algorithm is applied to obtain a consensus view.
我们已经制定了正式的规范并如第5章描述的一致性算法安全性的证明。
We have developed a formal specification and a proof of safety for the consensus mechanism described in Section 5.
采用具有通信时延的静态一致性算法研究二阶动态个体的耦合一致性问题。
The stationary consensus algorithm with communication delay was proposed to solve the coupled consensus problem of the second-order dynamic agents.
改名规则在创建有效的满足性算法和简化某些消解难例的证明中起到了重要作用。
The renamings has played a significant role in simplifying resolution proofs of some hard formulas and constructing the efficient satisfiability algorithms.
该算法是最短路径完全适应性算法,使用基于软件的死锁恢复机制来检测和解除死锁;
Minimal adaptive routing is adopted and software-based recovery mechanism is used to detect and resolve deadlocks in both algorithms.
由于压缩算法是空间和时间高效性算法,使得应用该算法的相异度度量也具有较好的性能。
Because compression algorithms are typically space and time efficient, the method based on it also has good performance.
DRBD使用Linux加密应用程序编程接口,因此在完整性算法使用方面是比较灵活的。
DRBD USES the Linux crypto application programming interface and is therefore flexible on the integrity algorithm used.
与历史文献中该问题的代表性算法比较,该算法可在调度质量与计算费用之间获得较好的平衡。
Compared with representative PFSP scheduling algorithms, the proposed algorithm can obtain good balance between quality of schedule and computational cost.
在配电网可靠性计算中,实现了一种非常灵活的可靠性算法,能够处理结构任意复杂的树型馈线。
In order to deal with complex tree-type structure of feeders. a smart reliability calculation method is developed.
在一个例子中,所交换的信号包括计算的抽头权重,其用作均衡器接收机内适应性算法的一部分。
In one example, the exchanged information includes computed tap weights that are used as part of the adaptive algorithm within the equalizer receivers.
本文还给出一种基于迭代序列的构造性算法,该算法调用了基本计算过程但不需要确定参数对入和。
A constructive algorithm, based on the iterative sequence of parameters and the procedure of fundamental calculation, is presented in this thesis.
根据人工势场法和振子相位一致性算法,设计了多水下机器人队形保持和艏向一致的编队控制算法。
A formation keeping and heading consensus controller was designed for MAUVS formation control, referencing the artificial potential algorithm and phase consensus algorithm of coupled oscillators.
该第一均衡器接收机34 A利用来自该用户的导频信号来根据该接收机的适应性算法训练均衡器。
The first equalizer receiver 34a utilizes the pilot signal from that user to train the equalizer according to the adaptive algorithm of that receiver.
然而,在某些情况下,高度毁灭性算法的巧妙设计,使得普通路人很难注意到遗漏数据的大型EMC。
In some cases, however, highly destructive algorithms are cleverly designed enough that it is hard for the average passerby to notice a large-scale EMC is missing data.
给出了一个直观性算法,并研究这个算法的最坏情形,最后说明此算法在某些方面优于著名的FFD算法。
The worst case of DLPT algorithm is also discussed. It is described that DLPT algorithm is better than FFD algorithm in some ways.
本文提出了一种结合人眼视觉特性(HVS)的自适应水印嵌入方法的基于最优小波包基数字图像水印鲁棒性算法。
In this paper, we present a novel robust digital image watermark arithmetic based on Wavelet Packet with Best Tree with combining HVS and embedding method of image adaptive.
我们构造了一个简单网络,将布点问题转化为该网络中的最小费用最大流问题,从而给出了求解布点问题的最优性算法。
Constructing a simple network and converting the allocation problem into the min-cost max-flow in the network, we have developed an optimal algorithm for the allocation problem.
通过提供强大的、基于标准的加密和完整性算法,ssl向系统开发人员和用户保证数据在Internet上不会受到危害。
By providing strong, standards-based encryption and integrity algorithms, SSL provides system developers and users with confidence that data will not be compromised in the Internet.
通过提供强大的、基于标准的加密和完整性算法,ssl向系统开发人员和用户保证数据在Internet上不会受到危害。
By providing strong, standards-based encryption and integrity algorithms, SSL provides system developers and users with confidence that data will not be compromised in the Internet.
应用推荐