英语人>网络例句>addition theorem 相关的网络例句
addition theorem相关的网络例句

查询词典 addition theorem

与 addition theorem 相关的网络例句 [注:此内容来源于网络,仅供参考]

The problem of the error of calculation formula calculating the variance of grouping data within distances in statistics was put forward,and the concrete forms of correcting formula were given by the theorem of addition and the variance of even distribution.

提出统计学中的组距分组资料方差和标准差计算公式误差问题,由方差的加法定理和均匀分布方差给出分组资料方差计算和标准差计算的修正公式具体形式,并就均匀分布数列和正态分布数列组内方差平均数进行了讨论

In addition, the Lyapunov theorem is applied to have the asymptotic stability of the closed loop system with system parameters updated on line.

控制器便能依据当时振动情况,主动产生出反振动讯号输出给伺服马达,让控制系统进入至滑动平面来达到控制的目的。此外,理论中还使用了 Lyapunov 稳定法则来确保控制过程中之渐进稳定性,并更新系统所需之参数。

From the theory, the algorithm for determination of the degree of implicit polynomials is followed: detecting the stationary points in the object boundary based on its features, and then calculating the minimum degree according to the formula derived from the theorem. In addition, the theory can be extended to three-dimensional object.

该方法首先由给定物体边界的轮廓检测出其驻点数,然后根据驻点数得到拟合隐含多项式曲线方程次数的下界,进而推广到三维物体的隐含多项式曲面拟合次数的确定。

The main idea behind these methods is to take advantage of the known state variables and the theorem of addition for linear system without building up a new Jacobian matrix again. But the equivalent computation of algebraic equation must be performed to get state variables corrections. Accordingly, the speed required to model the contingencies is not fast enough to meet the demand of fast contingency analysis under emergency condition, which is proved by several well-known blackouts caused by flow transferring.

但是,这些算法中的大多数是在实时潮流计算的基础上,利用其中间结果和线性系统的叠加原理,直接求解出事故后的状态变量,都需要通过网络方程求解整个网络状态变量的增量,计算量较大,难于满足紧急状态下快速安全性评估的实时性要求,国内外一系列因静态潮流问题引起的大停电事故就是例证。

Then we use the diagram of Venn to analyse and predigest the theorem proof. And it is also used in probability addition and multiply、conditional probability、total probability formula、 Bayes formula to simplify the calculation of probability. So it is easy to understand and master.

进而利用Venn图分析、简化概率性质的证明以及Venn图在概率的加法与乘法、条件概率、全概率公式和贝叶斯公式中的应用,简化概率的计算,便于学习者理解和掌握。

In addition, we demonstrate the non-parametric performance of BP neural network by using Liapunov Central Limit Theorem, and give the structure and principle of BP neural network detector. Meanwhile, a set of computer simulation results are also given in the paper.

另外,我们还通过Liapunov中心极限定理证明了BP神经网络的非参数特性,并以此为依据提出了检测声呐信号的BP神经网络检测器的结构及原理,同时也提供了一系列计算机仿真实验的结果。

In addition, we prove in detail the triangular decomposition theorem of quantized generalized Kac-Moody algebras, and provide generators and defining relations for each part.

此外,我们还详细地证明了量子广义Kac-Moody代数的三角分解定理,给出了各部分的生成元和具体的定义关系。

We propose a dynamic identity authentication scheme through a theorem about relative prime numbers, which can prevent replay attacks from taking place. In addition, we present a threshold signature scheme without a trusted party by use of joint secret sharing technique. Finally, the security flaw in an enhanced password authentication scheme is pointed out and the security of an enhanced key agreement protocol is analyzed.

首先基于一个关于互素数的定理设计了一个动态身份认证协议,该协议使攻击者不可能通过回放攻击来假冒用户;利用联合秘密共享技术设计了一个无可信中心门限签名方案;最后,分析了一个改进的身份认证协议存在的安全漏洞,以及一个改进的密钥协商协议的安全性。

In addition, we consider some conditions under which Weyl\'s and Browder\'s theorem hold for operator matrices.In chapter 4, the relationship between the reduced minimum modulus of the left multiplicative operator L_A and the reduced minimum modulus of operator A is discussed.

第三章重点研究了Banach空间上的算子满足Weyl定理和a-Weyl定理,得到了解析余亚正规算子满足a-Weyl定理;同时也讨论了上三角算子矩阵的Weyl(来源:ABC论63文网www.abclunwen.com)定理和Browder定理。

The author mainly realized the method of generating the large random numbers and judging the prime number using Lehmann means,then three pairs of secure key with different lengths (256 bits,512 bits,1024 bits) was generated to meet the demand of different security grade. In encryption module,modular multiplication arithmetic of large number was realized adopting addition chaining. In decryption module,extended Euclid was used to get inverse,and the Chinese remainder theorem was used to realize decryption,which increased the speed of decryption greatly.

作者主要实现了大随机数的生成、采用整除小素数和勒曼测试法判定素数,可以生成三种不同长度的密钥对(256位、512位、1024位)来满足不同的加密安全等级的需求;加密模块中,选用了二进制序列的乘法方法,实现了大数模幂乘运算;解密模块中,引用了扩展的欧几里德法求逆元,并采用中国剩余定理实现解密过程,大大提高了解密速度。

第4/5页 首页 < 1 2 3 4 5 > 尾页
推荐网络例句

The split between the two groups can hardly be papered over.

这两个团体间的分歧难以掩饰。

This approach not only encourages a greater number of responses, but minimizes the likelihood of stale groupthink.

这种做法不仅鼓励了更多的反应,而且减少跟风的可能性。

The new PS20 solar power tower collected sunlight through mirrors known as "heliostats" to produce steam that is converted into electricity by a turbine in Sanlucar la Mayor, Spain, Wednesday.

聚光:照片上是建在西班牙桑路卡拉马尤城的一座新型PS20塔式太阳能电站。被称为&日光反射装置&的镜子将太阳光反射到主塔,然后用聚集的热量产生蒸汽进而通过涡轮机转化为电力