similarity parameter 中文意思是什麼

similarity parameter 解釋
相似參數
  • similarity : n. 1. 類似,相像,相似。2. 類似點;類似物,相似物。
  • parameter : n. 1. 【數學】參數,變數;參詞;參項。2. 【物理學】參量;(結晶體的)標軸。3. 〈廢語〉【天文學】通徑。vt. -ize 使參數化。
  1. In this paper, several mathematical definitions of self - similarity are given, and some of their properties are described. the method of justifying a self - similar process and getting its autocorrelation coefficient ( or self - similar parameter ) are also discussed. achievements which are achieved by scientific research of predecessors are summarized

    本文給出了自相似的幾種常見定義,描述了該隨機過程在數學和物理上的一些特徵,並討論了如何識別一個序列是否是自相似或長相關的以及如何定量分析其相關性強弱的問題。
  2. Two important characteristics of the fractal are self - similarity and dilation symmetry. the fractal dimension is a basic parameter that describes the fractal quantificationally

    分形維數是定量描述分形的基本參量,是標度變換下的不變量。
  3. We proposed an improved simulated annealing algorithm with neighbor function based on self - optimization of scale parameter. furthermore incorporating disaster - modification and the improved annealing into genetic algorithm, an improved genetic - annealing algorithm is proposed. in order to solve the deceptive minimum problem, an improved evolutionary strategy combined with similarity detection and improved mutation operator

    提出了鄰域尺度函數自尋優的模擬褪火演算法,結合遺傳演算法,引入災變運算元,提出了改進遺傳模擬褪火演算法;為了解決尋優過程中的最小欺騙問題,我們提出了相似性檢測,結合改進的適應值無關變異運算元,提出了基於相似性檢測和適應值無關變異運算元的進化策略演算法。
  4. We do researches on constructing normal model of network traffic, analysizing self - similarity of network traffics - hurst parameter, and its time variable function h ( t ). experimental analysis confirmed the validity of the novel mechanism, limiting the extent of network traffic in time and detecting the ddos attack through measuring the change of h parameter brought by the attacks. moreover we use database to refine the ddos attack

    主要成果為: ( 1 )對網路流量的自相似性? hurst參數、 hurst參數的時變函數h ( t )進行分析,建立正常網路流量模型,比傳統的特徵匹配更準確描述了網路流量的特性; ( 2 )通過實驗驗證了,基於正常網路流量模型,對網路流量進行實時限幅,由自相似性的變化來預測ddos攻擊方法的正確性; ( 3 )對于不同的攻擊方式,我們使用不同的方法進行檢測,並用數據庫對流經的包頭信息進行統計分析,來對攻擊定位。
分享友人