虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

problem-and-Solution

  • Host Identity Protocol on Linux is an implemetation of the Host Identity Protocol (HIP) and the rela

    Host Identity Protocol on Linux is an implemetation of the Host Identity Protocol (HIP) and the related architecture. HIP is a proposal to change the TCP/IP stack to securely support mobility and multi-homing. Additionally, it provides for enhanced security and privacy and advanced network concepts, such as moving networks and mobile ad hoc networks. HIP is "cool", which means that as a mobile VPN solution, when your network interfaces go up or down, there is no need to re-establish a secure tunnel.

    标签: Identity Protocol Host implemetation

    上传时间: 2016-09-01

    上传用户:皇族传媒

  • The main features of the considered identification problem are that there is no an a priori separati

    The main features of the considered identification problem are that there is no an a priori separation of the variables into inputs and outputs and the approximation criterion, called misfit, does not depend on the model representation. The misfit is defined as the minimum of the l2-norm between the given time series and a time series that is consistent with the approximate model. The misfit is equal to zero if and only if the model is exact and the smaller the misfit is (by definition) the more accurate the model is. The considered model class consists of all linear time-invariant systems of bounded complexity and the complexity is specified by the number of inputs and the smallest number of lags in a difference equation representation. We present a Matlab function for approximate identification based on misfit minimization. Although the problem formulation is representation independent, we use input/state/output representations of the system in order

    标签: identification considered features separati

    上传时间: 2016-09-20

    上传用户:FreeSky

  • Joomla 收费插件:企业客户管理系统。 Our suite of components and tools are architected and programmed specifical

    Joomla 收费插件:企业客户管理系统。 Our suite of components and tools are architected and programmed specifically for Joomla, the award winning CMS. jForce will provide you with: jAccounts – for your invoicing and billing needs jContacts – a new way to manage your sales funnel and business leads jProjects – efficient management of tasks, priorities and documents jSupport – manage trouble tickets and issues to keep your site smooth All these plugins packaged together as one fully integrated CRM solution. Built in Joomla! Whether you require one component or the entire suite of business automation, jForce can have you up and running with sleek and cost-efficient solutions today.

    标签: architected components programmed specifical

    上传时间: 2013-12-30

    上传用户:蠢蠢66

  • For solving the following problem: "There is No Free Lunch" Time Limit: 1 Second Memory Limit: 3

    For solving the following problem: "There is No Free Lunch" Time Limit: 1 Second Memory Limit: 32768 KB One day, CYJJ found an interesting piece of commercial from newspaper: the Cyber-restaurant was offering a kind of "Lunch Special" which was said that one could "buy one get two for free". That is, if you buy one of the dishes on their menu, denoted by di with price pi , you may get the two neighboring dishes di-1 and di+1 for free! If you pick up d1, then you may get d2 and the last one dn for free, and if you choose the last one dn, you may get dn-1 and d1 for free. However, after investigation CYJJ realized that there was no free lunch at all. The price pi of the i-th dish was actually calculated by adding up twice the cost ci of the dish and half of the costs of the two "free" dishes. Now given all the prices on the menu, you are asked to help CYJJ find the cost of each of the dishes.

    标签: Limit following solving problem

    上传时间: 2014-01-12

    上传用户:362279997

  • We describe and demonstrate an algorithm that takes as input an unorganized set of points fx1И

    We describe and demonstrate an algorithm that takes as input an unorganized set of points fx1􀀀    􀀀 xng 􀀀 IR3 on or near an unknown manifold M, and produces as output a simplicial surface that approximates M. Neither the topology, the presence of boundaries, nor the geometry of M are assumed to be known in advance — all are inferred automatically from the data. This problem naturally arises in a variety of practical situations such as range scanning an object from multiple view points, recovery of biological shapes from two-dimensional slices, and interactive surface sketching.

    标签: demonstrate unorganized algorithm describe

    上传时间: 2013-12-18

    上传用户:xc216

  • Problem B:Longest Ordered Subsequence A numeric sequence of ai is ordered if a1 < a2 < ... &l

    Problem B:Longest Ordered Subsequence A numeric sequence of ai is ordered if a1 < a2 < ... < aN. Let the subsequence of the given numeric sequence (a1, a2, ..., aN) be any sequence (ai1, ai2, ..., aiK), where 1 <= i1 < i2 < ... < iK <= N. For example, sequence (1, 7, 3, 5, 9, 4, 8) has ordered subsequences, e. g., (1, 7), (3, 4, 8) and many others. All longest ordered subsequences are of length 4, e. g., (1, 3, 5, 8).

    标签: Subsequence sequence Problem Longest

    上传时间: 2016-12-08

    上传用户:busterman

  • This paper studies the problem of tracking a ballistic object in the reentry phase by processing ra

    This paper studies the problem of tracking a ballistic object in the reentry phase by processing radar measurements. A suitable (highly nonlinear) model of target motion is developed and the theoretical Cramer—Rao lower bounds (CRLB) of estimation error are derived. The estimation performance (error mean and

    标签: processing ballistic the tracking

    上传时间: 2014-10-31

    上传用户:yyyyyyyyyy

  • This paper studies the problem of tracking a ballistic object in the reentry phase by processing ra

    This paper studies the problem of tracking a ballistic object in the reentry phase by processing radar measurements. A suitable (highly nonlinear) model of target motion is developed and the theoretical Cramer—Rao lower bounds (CRLB) of estimation error are derived. The estimation performance (error mean and

    标签: processing ballistic the tracking

    上传时间: 2014-01-14

    上传用户:奇奇奔奔

  • This paper studies the problem of tracking a ballistic object in the reentry phase by processing ra

    This paper studies the problem of tracking a ballistic object in the reentry phase by processing radar measurements. A suitable (highly nonlinear) model of target motion is developed and the theoretical Cramer—Rao lower bounds (CRLB) of estimation error are derived. The estimation performance (error mean and

    标签: processing ballistic the tracking

    上传时间: 2013-12-22

    上传用户:asddsd

  • SuperLU is a general purpose library for the direct solution of large, sparse, nonsymmetric systems

    SuperLU is a general purpose library for the direct solution of large, sparse, nonsymmetric systems of linear equations on high performance machines. The library is written in C and is callable from either C or Fortran. The library routines will perform an LU decomposition with partial pivoting and triangular system solves through forward and back substitution. The LU factorization routines can handle non-square matrices but the triangular solves are performed only for square matrices. The matrix columns may be preordered (before factorization) either through library or user supplied routines. This preordering for sparsity is completely separate from the factorization. Working precision iterative refinement subroutines are provided for improved backward stability. Routines are also provided to equilibrate the system, estimate the condition number, calculate the relative backward error, and estimate error bounds for the refined solutions.

    标签: nonsymmetric solution SuperLU general

    上传时间: 2017-02-20

    上传用户:lepoke