首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
在数据结构中键表的逆序输出都是用非递归算法来实现的,本文中我们将介绍一种实现键表逆序输出的瓣方法---递归方法。  相似文献   

2.
袁芳  朱大奇  叶银忠 《控制工程》2011,18(5):783-787
水下机器人故障检测与辨识是机器人实现主动客错控制的关键.针对一般非线性系统执行器和传感器故障辨识问题构造了一种基于递归神经网络的故障辨识模型,并将其应用于水下机器人执行器与传感器故障检测和辨识中.2个并行递归神经网络根据水下机器人实际输出与估计输出间的误差学习调整隐藏层与输出层权矩阵,辨识机器人中发生的执行器故障和传感...  相似文献   

3.
基于Flash AS3开发环境,实现了将汉诺塔问题递归算法的结果以动画的形式显示输出。  相似文献   

4.
本文基于非线形自回归滑动平均模型NARMA模 型和前馈神经网络建模的思想,提出一种输入层与输出层神经元递归的动态递归神经网络; 基于进化计算中遗传算法和进化策略与自寻优BP算法的不同结合方式,提出两种动态递归神 经网络全自动高效设计算法,实现了网络结构、权重和自反馈增益同时优化学习,实例应用 表明所提网络结构及其设计算法的有效性.  相似文献   

5.
一种基于中值滤波的非线性图像处理优化算法   总被引:1,自引:0,他引:1  
鲁瑞华  杨明 《计算机科学》2004,31(11):224-226
本文提出了一种允许实数值加权的递归加权中值滤波器。该滤波器优于无限脉冲响应线性滤波器、有限脉冲响应线性滤波器及非递归加权中值滤波器,除对噪声级提供稳健性,还可以提供近于完善的“阻带”特性,这在实践中很有用处。本文还提出了用于设计递归加权中值滤波器的自适应优化算法。该算法在平均绝对误差准则下得到了发展。在这个框架内,用于计算递归加权中值滤波器输出的前住输出被前位期望的输出所取代。这样,递归加权中值滤波器就近似于一个双输入单输出滤波器,它取决于输入样值和所期望的响应的延迟样值。这种结构避免了递归运算中固有的反馈,因而使得用于更新滤波系数的最陡下降算法中的梯度推导变得简单了许多。我们提出的自适应递归加权中值滤波算法与LMS算法相比,复杂性有所降低。  相似文献   

6.
王剑波 《计算机工程》2011,37(17):49-51
针对关系表达式难以进行无限制一到多数据转换的问题,通过关系代数的扩展表达一到多数据转换,采用递归查询和表函数实现无限制一到多数据转换,在每个输入元组上产生一个或者多个输出元组。递归查询通过创建初始结果,递归获取结果集,并返回最终结果集;表函数声明变量集合,使用过程体和游标循环访问表,迭代输出元组。实验分析不同参数影响因素下有限制和无限制转换的不同方法,结果表明扩展方法能够改善系统性能。  相似文献   

7.
殷春武  侯明善  李明翔 《控制与决策》2017,32(10):1879-1886
针对控制输入有界的变参数广义高阶非线性系统跟踪控制问题,给出一种多环递归跟踪的鲁棒控制方法.通过分层引入虚拟跟踪器,将高阶系统分解为多个独立子系统;内环虚拟跟踪器使内环输出指数收敛于外环虚拟输入,最内环设计自适应控制器补偿参数摄动和外部干扰,并保证输出指数收敛于外环虚拟输入;多环递归跟踪实现系统输出精确跟踪期望输入,理论证明闭环系统的全局渐近收敛性.数值仿真验证了多环跟踪控制器的可行性和合理性.  相似文献   

8.
递归是设计程序的一种重要方法,文中对递归的定义及递归的基本条件进行了分析,给出了递归程序设计的基本方法,并结合数据结构中二叉树遍历和单链表结点输出的实例进行了验证,最后对递归程序进行了深度分析,说明了递归是一种有效的程序设计方法。  相似文献   

9.
基于局部递归神经网络对非线性系统进行递归多步向前预测,将系统实际多步向前预测值按泰勒公式在其递归预测值上展开,实现对非线性系统多步预测输出值的二次逼近,减少了预测误差,进而通过对PID型多步预测性能指标函数极小化求取控制量,控制器与广义预测控制器结构相似,其参数通过神经网络在线辨识获得,仿真实验表明了该方法的有效性。  相似文献   

10.
分析了递归程序的实现原理及在FoxBASE ̄+中实现递归调用的可能性,提出了递归程序工作栈的概念。利用这一概念,使FoxBASE ̄+的解释程序与应用程序协同工作,从而在FoxBASE ̄+中实现递归调用。  相似文献   

11.
文章在跟踪和分析最新磁盘加密技术研究成果的基础上,设计了一种基于RFID的磁盘分区加密系统。该系统由磁盘分区加密软件Partition Crypt与RFID射频卡、USB射频读写端等硬件模块共同组成。软件部分对计算机硬件系统要求低、安装方便、使用简单、加密效果好;硬件部分由单片机与射频模块完成。其中,USB接口采用虚拟USB接口的方法,降低硬件复杂性与成本,具有很高的性价比。经过测试,整个系统功能稳定、性价比高、保密性好,可为广泛使用的基于Windows操作系统的涉密计算机提供加密技术保障,应用前景广阔。  相似文献   

12.
给出一个拟左群同构于拟群和左零带的直积的一个充分必要条件,同时给出了左群的收缩诣零扩张的一个刻画。  相似文献   

13.
A performance study of a water ramjet engine is described.The engine is powered by the reaction of a magnesium-based propellant and ingested water.In this study,a solid propellant,which consisted of a large percentage of magnesium,a binder and a small amount of oxidant,was used as a hydro reactive fuel.Cold water was injected into the combustion chamber as a main oxidant.A scaled-down experimental engine was tested in a direct-connect ground testing system to characterize the factors influencing the engine ...  相似文献   

14.
We show how Ohori and Sasano's recent lightweight fusion by fixed-point promotion provides a simple way to prove the equivalence of the two standard styles of specification of abstract machines: (1) in small-step form, as a state-transition function together with a ‘driver loop’, i.e., a function implementing the iteration of this transition function; and (2) in big-step form, as a tail-recursive function that directly maps a given configuration to a final state, if any. The equivalence hinges on our observation that for abstract machines, fusing a small-step specification yields a big-step specification. We illustrate this observation here with a recognizer for Dyck words, the CEK machine, and Krivine's machine with call/cc.The need for such a simple proof is motivated by our current work on small-step abstract machines as obtained by refocusing a function implementing a reduction semantics (a syntactic correspondence), and big-step abstract machines as obtained by CPS-transforming and then defunctionalizing a function implementing a big-step semantics (a functional correspondence).  相似文献   

15.
The blockchain is a radical innovation that has a considerable effect on payments, stock exchanges, cybersecurity, and computational law. However, its limitations in terms of the uncertainty involved in transaction confirmation are significant. In this paper, we describe the design of a decentralized voting protocol for the election of a block generator in a consortium blockchain and propose a new system framework that allows fast and exact confirmation of all transactions. In addition, to replace a transaction’s owner signature, a new interactive incontestable signature between the dealer and owner is used to confirm a transaction. By means of this signature, the dealer can assure the owner that a transaction will be permanently included in the blockchain in a non-repudiation manner. Moreover, the signatures of all transactions in a block share only one witness that provides membership proof between the block and these transactions. Finally, a security and performance analysis shows that the proposed schemes are provably secure and highly efficient.  相似文献   

16.
Background: An increasing number of industrial robots are being programmed using CAR (Computer Aided Robotics). Sensor guidance offers a means of coping with frequent product changes in manufacturing systems. However, sensors increase the uncertainty and to preserve system robustness, a tool is needed that makes it possible to understand a sensor guided robot system before and during its actual operation in real life.Scope: A virtual sensor is developed and integrated in a CAR hosted environment. The real sensor is of a type commonly used in the arc-welding industry and uses a triangulation method for depth measurements. The sensor is validated both statically and dynamically by matching it with a real sensor through measurements in setups and by comparing a welding application performed in a real and a virtual work-cell created with a CAR application. The experimental results successfully validates its performance. In this context, a virtual sensor is a software model of a physical sensor with similar characteristics, using geometrical and/or process specific data from a computerized model of a real work-cell.  相似文献   

17.
In this paper, we propose an interactive designing method and a system based on it to create 3D objects and 2D images. This system consists of two subsystems for virtual sculpting to create a 3D shape and virtual printing to produce a picture with a printing block. In the virtual sculpting subsystem, a user can form solid objects with curved surfaces as if sculpting them. The user operates virtual chisels, and can remove or attach arbitrary shapes of ellipsoids or cubes from or to the workpiece. A 3D object generated by virtual sculpting looks like a real wooden sculpture. If using a board as a workpiece, a user can generate a virtual printing block. In the virtual printing subsystem, a user can synthesize a woodcut printing image from the virtual printing block mentioned above, a virtual paper sheet, and a printing brush. The user can synthesize a realistic woodcut print with a procedure similar to the actual woodcut printing.  相似文献   

18.
Horizon computation on a hierarchical triangulated terrain model   总被引:2,自引:0,他引:2  
Hierarchical terrain models describe a topographic surface at different levels of detail, thus providing a multiresolution surface representation as well as a data compression mechanism. We consider the horizon computation problem on a hierarchical polyhedral terrain (in particular, on a hierarchical triangulated irregular network), which involves extracting the horizon of a viewpoint at a given resolution and updating it as the resolution increases. We present an overview of horizon computation algorithms on a nonhierarchical polyhedral terrain. We extend such algorithms to the hierarchical case by describing a method which extracts the terrain edges at a given resolution, and proposing a randomized algorithm for dynamically updating a horizon under insertions and deletions of terain edges  相似文献   

19.
针对充电桩现场测试设备的充电需求与实际输出不一致,出现电压、电流不匹配的问题,设计了一套检测方案,构建出包括电流检测模块、电压检测模块和示波器检测模块的检测电路,通过采样电压和电流信号,计算出不同负载下充电桩输出电流和电压值,并设计了包括直流电能采集电路,由双通道AD转换AD7380、可编程增益放大器、可编程增益放大器、增益电阻Rg2和电源变换器、低通滤波器电容CL、低通滤波器电阻RL组成的检测电路,在检测电路中,为了提高检测效率,还设置了校正电路。通过试验,本研究方法分析直观,误差低。  相似文献   

20.
Non-uniform deformation of an STL model satisfying error criteria   总被引:3,自引:0,他引:3  
In this research, a method is presented for generating a deformed model satisfying given error criteria from an STL model in a triangular-mesh representation suitable for rapid prototyping (RP) processes. A deformed model is a non-uniformly modified shape from a base STL model. In developing a family product with various sizes such as a shoe, sometimes prototypes for all sizes should be made using an RP machine. Although an STL model is generated from a solid model, it is well known that creating a non-uniformly modified solid model from a base solid model is very difficult. Generally there are some gaps between surfaces after modification, and stitching the gaps is very difficult. To solve this problem, the authors explored the possibility of generating a deformed STL model directly from a base STL model. This research includes a data structure for modifying the STL model, checking the error of a modified edge compared with the exact non-uniformly scaled curve, checking the error of a modified facet compared with the exact non-uniformly scaled surface, and splitting a facet with an error greater than the allowable tolerance. Using the results of this research, the difficult work of creating solid models to build non-uniformly deformed STL models could be avoided.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号