搜索资源列表
21
- An agent-based metric for quality of services over wireless networks
bbbb
- 摘 要:提出一种新的基于Pareto多目标进化免疫算法(PMEIA)。算法在每一代进化群体中选取最优非支配抗体保存到记忆细胞文档中 同时引入Parzen窗估计法计算记忆细胞的熵值,根据熵值对记忆细胞文档进行动更新,使算法向着理想Pareto最优边界搜索。此外,算法基于点在目标空间分况进行克隆选择,有利于得到分布较广的Pareto最优边界,且加快了收敛速度。与已有算法相比, PMEIA在收敛性、多样性,以及解的分布性方面都得到很好的提高。-Abstract:This paperproposed a
gramsusingmarginalutilityinametricspacegeneratedby
- 国外博士论文Improving Knowledge Management Programs Using Marginal Utility in a Metric Space Generated by Conceptual Graphs-Improving Knowledge Management Programs Using Marginal Utility in a Metric Space Generated by Conceptual Graphs
hw1
- A crappy unit converter, converts inches, feet, miles, Fahrenheit to metric measurements
Labview_serial_port
- The P S N R is most commonly used as a measure of quality of reconstruction of lossy compression codec (e.g., for image compression). The signal in this case is the original data, and the noise is the error introduced by compression. When comparing c
Oscilloscope
- The PSNR is most commonly used as a measure of quality of reconstruction of lossy compression codecs (e.g., for image compression). The signal in this case is the original data, and the noise is the error introduced by compression. When comparing com
singnal
- The PSNR is most commonly used as a measure of quality of reconstruction of lossy compression codecs (e.g., for image compression). The signal in this case is the original data, and the noise is the error introduced by compression. When comparing com
FundamentalElectronics
- The PSNR is most commonly used as a measure of quality of reconstruction of lossy compression codecs (e.g., for image compression). The signal in this case is the original data, and the noise is the error introduced by compression. When comparing com
A-Weakest-Adversary-Security-Metric
- A security metric measures or asse s the extent to which a system meets its security objectives. Since meaningful quantitative security metrics are largely unavailable, the security community primarily uses qualitative metrics for security. I
ppt
- After identifying the best MNT− 1 nodes with the simplified branch metric and the accumulated branch metric at stage NT − 1, we then calculate the LLR of each coded bit utilizing the standard squared Euclidian distance metric. The log-lik
MK.Foundations.of.Multidimensional.and.Metric.Dat
- Hanan Samet, the world-reknown authority on multi-dimensional data, has written a comprehensive and stunningly beautiful book. The illustrations that appear in the margins of almost every page serve to wonderfully augment the text and convey the esse
20In-Search-of-a-Perceptual-Metric
- This paper presents a quantitative metric to describe the multidimensional spectral envelope perception related to the spectral element of timbre. Melcepstrum is chosen as a hypothetical metric for spectral envelope perception due to its desirable pr
ACCV10
- 很珍贵的论文,通常是需要付费下载的:Cosine Similarity Metric Learning for Face Verification.-Very precious papers, usually need to pay to download: Cosine Similarity Metric Learning for Face Verification.
