logical algorithm 中文意思是什麼

logical algorithm 解釋
邏輯演算法
  • logical : adj. 1. 邏輯的,邏輯上的;邏輯學上的。2. 合乎邏輯的。3. 邏輯上必然的。adv. -ly ,-ness n.
  • algorithm : n. 【數學】演算法;規則系統;演段。
  1. All of data logical relationship, data logical structure, data physical structure and data algorithm is the theme of the whole data structure course, even more, that also is an important problem in computer information process

    摘要《數據結構》課程中數據的邏輯關系、邏輯結構、物理結構與演算法是貫穿整個教材的主題,而這也是計算機信息處理過程中必須面對的一個重要的課題。
  2. Describes the design and realization of partial run - time reconfigurable fpga in detail. in order to reduce the affect of the reconfiguration time on system execution time, mostly static circuit design method in logical design stage and incremental routing method in component implementation stage are proposed. the fft parallel processing algorithm is examined through vvp platform

    本章詳細闡述了基於vvp平臺的多sharc功能插板的具體硬體實現,以動態重構fpga設計為核心,論述了局部動態重構fpga設計流程和方法,提出了極大靜態電路邏輯設計方法和遞增式布線方法,以達到減小動態重配置時間,提高系統運行效率的目的。
  3. Performance analysis of modified logical track initiation algorithm

    修正的邏輯航跡起始演算法性能研究
  4. 6. presenting an authorization - based encryption algorithm, which using two encryption parameters, a public secret key and a private secret key, and converting user password into pc to save in database by exclusive - or logical operation

    ( 6 )提出了一種針對cms用戶權限的加密演算法,該演算法具有公匙和私匙兩個加密參數,通過異或等邏輯運算將用戶口令加密成偽碼再進行存儲。
  5. In this paper, an algorithm based on watershed transformation and fuzzy logical catchment basins combination is proposed to suppress or remove the feature of natural background, and applied to infrared object boundary detection and labeling

    文中在分水嶺演算法的基礎上,結合模糊邏輯方法,對自然背景下的紅外人工目標的邊界檢測和分割以及紅外背景的抑制進行了探討。
  6. The algorithm have the good one - way property, high sensitivity to initial values and good security due to the intrinsic characteristic of chaotic system and rijndael algorithm. the simulation experiment demonstrates the convenience and good hash performance ; 3 ) a new scheme of digital voice secure communication was proposed based on chaotic modulation without additional synchronization. the modulation sequence generated by chaotic logical mapping was used to encrypt the digital voice signal

    混沌系統和rijndael演算法的固有特點使該演算法具有較好的安全性、對初值有高度的敏感性以及較好的單向性能,並且易於實現,是一種有效的單向hash函數; 3 )研究了一種無需同步的基於混沌調制的數字語音保密通信系統的方案,利用邏輯映射產生混沌調制序列,以該序列作為密碼對數字語音進行加密處理,為了更好的隱匿信號特徵,混沌調制在小波分解的基礎上,對不同的通道使用不同的參數進行,並借鑒混沌掩蓋對信息信號進行了限幅處理,使密文完全隨機化。
  7. The logical control model is built based on pal - bool algebra based on a good deal of empirical data and characteristics of firing process of ceramic kiln. then simulation on this algorithm by matlab and shows the feasibility of the algorithm, and the result shows that this algorithm is much advantageous over traditional algorithms in stability

    在分析了大量經驗數據的基礎上,針對陶瓷窯燒成過程的特點,建立了基於泛布爾代數的邏輯控制模型,然後以matlab為模擬工具,對該邏輯演算法進行模擬,驗證了該演算法的可行性。
  8. For optical - layering approach, we propose an ant - based algorithm, which uses the ants " capability of finding shortest or near - shortest paths between a food source and their nests, to solve the logical topology reconfiguration problem. we give the ants routing formula based on dynamic load balancing and short path on the assumption that some conditions hold

    前者適合於業務矩陣變化不是太頻繁的網路,提出利用螞蟻演算法解決業務的再路由問題,即利用螞蟻具有找到最短徑及不同種類螞蟻具有互斥的天然特性來進行邏輯拓撲重配置,從而保證了鏈路負載分佈的平衡性。
  9. Robust learning algorithm for adaptive fuzzy logical systems

    自適應模糊邏輯系統的魯棒學習演算法
  10. Abstract : the state space, search heuristics, and move generator in searching solutions to a given problem are characterized by first order language, which implies that the logical properties of a search algorithm are determined by its state space, that is, the logic describing the searching process has compactness and the class of initial states has finite close property

    文摘:搜索演算法的初始空間、搜索策略、搜索過程可以用一階語言描述,搜索演算法的邏輯性質由初始狀態空間確定.這意味著描述搜索過程的邏輯具有緊致性,初始狀態的初等類具有有限封閉性
  11. Based on analyzing the relationship between linear separability and a connected set in boolean space, the particular effect of a restraining neuron in extraction of rules from a bnn is discussed, and that effect is explained through a example called a mis problem in boolean space. in this paper, a pattern match learning algorithm of bnns is proposed. when a bnn has been trained by the algorithm, all the binary neurons of hidden layer belong to one or more ls series, if the logical meanings of those ls series are clear, the knowledge in the bnn can be dug out

    另一個研究成果是在分析線性可分和樣本連通性關系的基礎上,以mis問題為例,討論了抑制神經元在二進神經網路規則提取中的獨特作用,提出了二進神經網路的模式匹配學習演算法,採用這種演算法對布爾空間的樣本集合進行學習,得到的二進神經網路隱層神經元都歸屬於一類或幾類線性可分結構系,只要這幾類線性可分結構系的邏輯意義是清晰的,就可以分析整個學習結果的知識內涵。
  12. The system used hight - performance dsp ( tms320c6202 ) to realize the real - time image object tracking algorithm, used large - scaled programmable logical array cpld to control logic and field programmable gate array fpga to preprocessing the image

    其中運用了高性能dsp ( tms320c6202 )完成實時圖像目標處理演算法,並結合大規模可編程邏輯陣列cpld進行邏輯控制和現場可編程門陣列fpga對採集的視頻圖像做預處理,滿足了系統的實時性。
  13. Based on studying and exploring the disadvantage of multi - plan fixed time control and vehicle actuated control modes, a more efficient traffic control mode - multi parameters logical algorithm mode has been put forward together with building up the optimized model and arithmetic for isolated intersections

    通過對傳統的多時段定周期控制方式和感應控制方式的剖析,指出了它們在現實交通信號控制中存在的不足,並在此基礎上提出了一種效率更高的平面交叉口獨立信號控制方式?多參數邏輯運算控制模式。
  14. The dissertation focuses on the logical structure, realization technology and corba standard of multi - layer distributed database application system, and also focuses on the realization method of corba - based multi - layer database application system. the theory and realization method of some core technology in the multi - layer database application system have been discussed in this dissertation including load - balancing technology, fault - tolerance technology and session pooling technology etc. corba visibroker provides a kind of random load - balancing algorithm

    本文深入研究了多層分散式數據庫應用系統的邏輯結構、實現技術、 corba規范以及基於corba的多層分散式系統的實現方法;論述了在多層分散式數據庫應用系統中的一些核心技術的原理和實現方法,包括:負載平衡技術、容錯技術、 sessionpooling技術等。
  15. The binary fat tree is a network topology which is prone to accomplish butterfly computing. according to this feature, a logical model for binary fat tree was constructed at first, and then a parallel fast fourier transform algorithm based on it was devel.

    二叉胖樹網路結構是一種易於實現蝶式計算的網路拓撲結構,基於這一特點,首先構造了一種二叉胖樹的邏輯模型,並提出了一種基於該模型的并行快速傅立葉變換演算法。
  16. The goal we must achieve, when designing distributed parallel file system, was analyzed also. the thesis present the logic structure of dpfs, the structure and the flush strategy of the module of directory cache and its role in the read - write operation, duplicate table ' s physical and logical structure, the management and synchronization algorithm of the duplicate table, and the model and the management algorithm of the module of intelligent duplicate management. also the effects that dpfs exerts to the system reliability and the read and write performance compared to ext2 were analyzed

    本文首先介紹了數據存儲的發展概況與新的需求,分散式文件系統對其發展的重要影響以及設計分散式文件系統需要考慮的各種問題;然後分析了為滿足分散式并行服務器的功能需求, dpfs應實現的目標;接著介紹了dpfs設計的總體邏輯結構,目錄緩存管理模塊的結構設計、刷新策略以及該模塊在文件讀寫重定向中的作用,副本表的邏輯、物理結構、對其緩存的管理和同步演算法的實現,以及副本智能管理的設計模型及其管理演算法的設計與實現,還分析了dpfs對系統可靠性的影響以及在讀寫文件時與ext2文件系統性能的比較。
  17. It integrated the advantages of physical clock and logical clock so that it can not only represent the time duration but also preserve the partial order of events. a postmortem clock adjustment algorithm has been designed

    結合物理時鐘和邏輯時鐘的優點,設計了一個事後分析的時鐘調整演算法,證明了其正確性和收斂性。
  18. A differentiated routing algorithm is proposed to route network traffic based on rdm bandwidth allocation model. advertising rdm model parameters and bandwidth utilization statics, different routing path is computed and established for different traffic class by using corresponding logical view of network. it is shown that diffroute can improve service quality in differentiated network effectly while improving resource utilization

    提出一種多路區分路由演算法:針對區分服務網路中存在的「類間效應」 ,以rdm鏈路帶寬分配模型為基礎,通過為不同類負載計算不同的傳輸通路,區分路由可以在確保資源分配公平性的基礎上有效改善各類網路負載的分佈狀況,提高區分服務網路的服務質量; 4
  19. Logical cipher contactless ic card chip is the most current in the entire world and our country, so this design direction is it, and the algorithm of cipher adopt stream cipher corresponding and compatible with philips mifare card

    非接觸ic卡中邏輯加密型是目前世界和國內應用比較廣泛的,故本設計的方向選擇了非接觸邏輯加密型ic卡,加密演算法採用了和philips的mifare卡相兼容的流密碼加密演算法。
  20. When a bnn has been trained, because the learning algorithm for it is various, some binary neurons perhaps belong to a kind of linearly separable ( ls ) series, and some others perhaps belong to another kind of ls series. so it is very significative for extraction of rules from a bnn that the general judging methods and logical meanings of all those ls series are studied

    由於二進神經網路的學習演算法是多種多樣的,因此在一個學習后的二進神經網路中,可能存在不同的神經元屬于不同的幾類線性可分結構系的情況,因此研究二進神經網路中各類線性可分結構系的判別方法和邏輯內涵,對二進神經網路的規則提取是十分有意義的。
分享友人