简介:Inordertoovercomethepoorlocalsearchabilityofgeneticalgorithm,resultinginthebasicgeneticalgorithmistime-consuming,andlowsearchabilityinthelateevolutionary,weusethegraycodinginsteadofbinarycodingatthebeginningofthecoding;weusemulti-pointcrossovertoreplacetheoriginalsingle-pointcrossoveroperation.Finally,theexperimentshowsthattheimprovedgeneticalgorithmnotonlyhasastrongsearchcapability,butalsothestabilityhasbeeneffectivelyimproved.
简介:<正>Withitsrise,Chinaattractedmoreandmoreattentionfromallovertheworld.PeoplearewillingtoknowhowChinaachievedsuchgreatdevelopmentunprecedentedinthehistoryofhumanbeingssincethereformandopeningupsome30yearsagoandwhattheriseofChinameanstotherestoftheworld.
简介:Histogramofcollineargradient-enhancedcoding(HCGEC),arobustkeypointdescriptorformulti-spectralimagematching,isproposed.TheHCGECmainlyencodesroughstructureswithinanimageandsuppressesdetailedtexturalinformation,whichisdesirableinmulti-spectralimagematching.Experimentsontwomulti-spectraldatasetsdemonstratethattheproposeddescriptorcanyieldsignificantlybetterresultsthansomestate-ofthe-artdescriptors.
简介:Aimingattheproblemssuchasmorerepeatedlydesignandlongerdesigncycle,inthispaper,thesimilaritytheorywasintroducedtothedesignprocessofthekeystructuresofflotationmachine.TheimpellerandU-shapedtankofflotationmachinesystemwereanalyzedassimilarityunit.Meanwhile,thelevelofsimilarityoftheunitsandthesimilarityofthesystemwerecalculated.BasedontheanalysisoftheimpellerandthesizeofU-shapedtank,thesimilaritycriteriawerederived.Thederivedconclusionsare:(1)Therelationshipbetweenthediameteroftheimpellerandthevolumeofthetankwaspowerfunctionandcalculatedasthesimilaritycriteriaoftheimpeller;(2)TherelationshipbetweentheratiobetweentheU-shapedtank’scross-sectionalareaandimpeller’sdiameterandthevolumeofthetankwaspowerfunctionandcalculatedasthesimilaritycriterionsoftheU-shapedtank.Usingthesimilaritycriterioncombinedwithcomputertechnologyanddatabasetechnologytorealizepartandsystemserializationdesign.Theresultsshowthattheresearchcanavoidrepeatedlydesign,shortendesigncycle,andraisethedesignefficiency.
简介:一般来说,量钥匙分发(QKD)由于量无常原则,量noncloning定理和意味着量不能进一步被划分的量nondividing原则为完美的设备被证明无条件地安全。然而,在系统使用的实际光、电的设备是有瑕疵的,它能被偷听者部分利用到或完全侦察在合法聚会之间的秘密钥匙。在这篇文章,我们简短首先在量关于国际性地执行的有瑕疵的设备砍在一些试验性的QKD系统上上考察最近的工作,然后,我们将在细节介绍我们的最近的砍工作包括被动法拉第镜子攻击,部分随机的阶段攻击,选择波长的photon-number-splitting攻击,频率移动攻击,和single-photon-detector攻击。那些量攻击提醒人改进安全由简单地增加反措施或采用象测量设备独立人士协议那样的一个完全不同的协议避免量砍在测量设备的瑕疵上由于有瑕疵的设备在实际QKD系统存在[Lo,等,Phys。加快。Lett,2012,108:130503]。
简介:当前网络社会治理已经成为影响国家治理能力和现状的重要领域。网络治理的好坏,直接关系到现实体制的治理状况。然而,现有研究对网络社会治理的基础一即网络社会的基础特性和运行规律,还缺乏探索。这就导致现有对网络社会的治理,基本延续了现实社会治理的策略和手段。本文试图从三个角度勾勒出网络社会的基础特性。首先从概念角度,辨析了网络社会的三种视角一虚拟社会说,现实社会延伸说,现实一虚拟混合说,提出网络社会的本质是虚拟与现实社会的混合态,从而扬弃了可以沿用现实治理手段有效治理网络的传统路径;其次从三个角度探索了网络社会的基础特性:作为信息网络的特性;作为复杂巨系统的社会特性;作为中国独特政治现象的特性。最后提出了网络社会的若干基础治理策略。