理学 >>> 数学 >>> 计算数学 >>> 计算数学其他学科 >>>
搜索结果: 106-120 共查到知识库 计算数学其他学科相关记录162条 . 查询时间(0.843 秒)
提供了分解投影拟牛顿法结合非单调信赖域算法求解非线性等式约束优化问题。在合理的条件下,证明了算法的整体收敛性,通过引进二阶矫正步克服了MARATOS效应,使算法保持了局部超线性收敛速度
提供了非光滑单值优化的非单调线搜索方法,基于线性规划的对偶定理,目标函数的方向导数可以表示成线性规划问题,这在实际计算非单调线搜索子问题时是非常重要的,在合理的条件下,证明了 法的整体收敛性和局部超线性收敛速率。
迄今为至关于带干扰的结构稳定线性调节器的设计,大都是在连续时间系统上讨论的。本文作者已将连续系统的主要结果推广于离散时间的情况。本文结合一个具体工程对象,讨论了如何应用上述结果。被控制的对象是在海上作业的拉降装置。拉降过程要求确保缆绳的张力平稳,使直升飞机降落时飞行员感觉平稳。并安全地在甲板上着陆。图一是拉降示意
本文针对以往元胞自动机方法中对固相分数计算模型进行了改进,根据相图计算将固液界面区域内固相分数表示为一个一元二次方程,这种方法不需假设界面的位置和形状,使得模型的物理意义更加明确。利用这种方法模拟了U-6%Nb二元合金的凝固组织和显微偏析,模拟结果表明最初形核部位的Nb溶质浓度最高,随着凝固的不断进行,晶核中心部位Nb 溶质浓度不断下降。当凝固要结束的时候,晶粒边界就会形成贫Nb晶界,Nb溶质浓度...
环Zpk上码字广度的递归算法。
We investigate the computational complexity of some basic problems regarding non-unique probe selection using separable matrices. In particular, we prove that the minimal d?separable matrix problem is...
In the Crypto’07 paper [5], Desmedt et al. studied the problem of achieving secure n-party computation over non-Abelian groups. The function to be computed is fG(x1, . . . , xn) := x1 · . . . · xn whe...
Recently, Desmedt et al. studied the problem of achieving secure nparty computation over non-Abelian groups. They considered the passive adversary model and they assumed that the parties were only all...
To reduce the risk of privacy disclosure during personal data publishing, the approach of anonymization is widely employed. On this topic, current studies mainly focus on two directions: (1)developin...
Holographic algorithms were introduced by Valiant as a new methodology to derive polynomial time algorithms. Here information and computation are represented by exponential sums using the so-called s...
To reduce the risk of privacy disclosure during personal data publishing, the approach of anonymization is widely employed. On this topic, current studies mainly focus on two directions: (1)developing...
With the growing demand of databases outsourcing and its security concerns, we investigate privacy-preserving set intersection in a distributed scenario. We propose a one-round protocol for privacy-pr...
With the growing demand of databases outsourcing and its security concerns, we investigate privacy-preserving set intersection in a distributed scenario. We propose a one-round protocol for privacy-pr...
Holographic algorithms were introduced by Valiant as a new methodology to derive polynomial time algorithms. Here information and computation are represented by exponential sums using the so-called si...
The closest string and substring problems find applications in PCR primer design, genetic probe design, motif finding, and antisense drug design. For their importance, the two problems have been exten...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...