虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Solve

  • GloptiPoly 3: moments, optimization and semidefinite programming. Gloptipoly 3 is intended to so

    GloptiPoly 3: moments, optimization and semidefinite programming. Gloptipoly 3 is intended to Solve, or at least approximate, the Generalized Problem of Moments (GPM), an infinite-dimensional optimization problem which can be viewed as an extension of the classical problem of moments [8]. From a theoretical viewpoint, the GPM has developments and impact in various areas of mathematics such as algebra, Fourier analysis, functional analysis, operator theory, probability and statistics, to cite a few. In addition, and despite a rather simple and short formulation, the GPM has a large number of important applications in various fields such as optimization, probability, finance, control, signal processing, chemistry, cristallography, tomography, etc. For an account of various methodologies as well as some of potential applications, the interested reader is referred to [1, 2] and the nice collection of papers [5].

    标签: optimization semidefinite programming GloptiPoly

    上传时间: 2016-06-05

    上传用户:lgnf

  • 非常好的优化算法的书

    非常好的优化算法的书,详细介绍了蚁群算法和粒子群算法以及相关的matlab工具箱,讲了理论和应用给出了工具箱的下载地址。 Swarm intelligence is an innovative computational way to Solve hard problems. In particular, particle swarm optimization, also commonly known as PSO, mimics the behavior of a swarm of insects or a school of fish. If one of the particle discovers a good path to food the rest of the swarm will be able to follow instantly even if they are far away in the swarm. Swarm behavior is modeled by particles in multidimensional space that have two characteristics: a position and a velocity. These particles wander around the hyperspace and remember the best position that they have discovered. They communicate good positions to each other and adjust their own position and velocity based on these good positions.

    标签: 优化算法

    上传时间: 2014-01-26

    上传用户:zgu489

  • C 开发的有限元软件

    C 开发的有限元软件,界面还可以,不错,可以试试。 FElt is a free system for introductory level finite element analysis. It is primarily intended as a teaching tool for introductory type courses in finite elements - probably in the mechanical/structural/civil fields. In a command line environment, FElt uses an intuitive, straightforward input syntax to describe problems. It also includes a graphical user interface for workstations that allows the user to set-up, Solve and post-process the problem in a single CAD-like environment.

    标签: 有限元 软件

    上传时间: 2014-03-09

    上传用户:zycidjl

  • FreeFEM is an implementation of the GFEM language dedicated to the finite element method. It provid

    FreeFEM is an implementation of the GFEM language dedicated to the finite element method. It provides you a way to Solve Partial Differential Equations (PDE) simply. Although you can Solve quite complicated problems can be Solved also.

    标签: implementation dedicated the language

    上传时间: 2016-11-13

    上传用户:来茴

  • MATLAB Code for Optimal Quincunx Filter Bank Design Yi Chen July 17, 2006 This file introduces t

    MATLAB Code for Optimal Quincunx Filter Bank Design Yi Chen July 17, 2006 This file introduces the MATLAB code that implements the two algorithms (i.e., Algorithms 1 and 2 in [1], or Algorithms 4.1 and 4.2 in [2]) used for the construction of quincunx filter banks with perfect reconstruction, linear phase, high coding gain, certain vanishing moments properties, and good frequency selectivity. The code can be used to design quincunx filter banks with two, three, or four lifting steps. The SeDuMi Matlab toolbox [3] is used to Solve the second-order cone programming subproblems in the two algorithms, and must be installed in order for this code to work.

    标签: introduces Quincunx Optimal MATLAB

    上传时间: 2014-01-15

    上传用户:cc1

  • Introduction Computer security is undeniably important, and as new vulnerabilities are discovered a

    Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to Solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s

    标签: vulnerabilities Introduction discovered undeniably

    上传时间: 2014-01-05

    上传用户:yph853211

  • The combinatorial core of the OVSF code assignment problem that arises in UMTS is to assign some no

    The combinatorial core of the OVSF code assignment problem that arises in UMTS is to assign some nodes of a complete binary tree of height h (the code tree) to n simultaneous connections, such that no two assigned nodes (codes) are on the same root-to-leaf path. Each connection requires a code on a specified level. The code can change over time as long as it is still on the same level. We consider the one-step code assignment problem: Given an assignment, move the minimum number of codes to serve a new request. Minn and Siu proposed the so-called DCAalgorithm to Solve the problem optimally. We show that DCA does not always return an optimal solution, and that the problem is NP-hard. We give an exact nO(h)-time algorithm, and a polynomial time greedy algorithm that achieves approximation ratio Θ(h). Finally, we consider the online code assignment problem for which we derive several results

    标签: combinatorial assignment problem arises

    上传时间: 2014-01-19

    上传用户:BIBI

  • the function of the system is simulated ATM machine landing, balance inquiries, withdrawals, change

    the function of the system is simulated ATM machine landing, balance inquiries, withdrawals, change passwords, and other functions, use the JDBC interface, such as SWING. If ATM landing, withdrawals and change password must use JDBC interface and database links, I encountered a lot of problems, but the most important is that the database setting, in order to Solve this problem, I read four books, Inquiries related information ( s burden

    标签: withdrawals the inquiries simulated

    上传时间: 2017-01-27

    上传用户:我们的船长

  • )。-the function of the system is simulated ATM machine landing, balance inquiries, withdrawals, chan

    )。-the function of the system is simulated ATM machine landing, balance inquiries, withdrawals, change passwords, and other functions, use the JDBC interface, such as SWING. If ATM landing, withdrawals and change password must use JDBC interface and database links, I encountered a lot of problems, but the most important is that the database setting, in order to Solve this problem, I read four books, Inquiries related information

    标签: withdrawals the inquiries simulated

    上传时间: 2014-01-16

    上传用户:lnnn30

  • )。-the function of the system is simulated ATM machine landing, balance inquiries, withdrawals, chan

    )。-the function of the system is simulated ATM machine landing, balance inquiries, withdrawals, change passwords, and other functions, use the JDBC interface, such as SWING. If ATM landing, withdrawals and change password must use JDBC interface and database links, I encountered a lot of problems, but the most important is that the database setting, in order to Solve this problem, I read four books, Inquiries related information

    标签: withdrawals the inquiries simulated

    上传时间: 2017-01-27

    上传用户:ainimao