英语人>网络例句>algorithm theory 相关的网络例句
algorithm theory相关的网络例句

查询词典 algorithm theory

与 algorithm theory 相关的网络例句 [注:此内容来源于网络,仅供参考]

On the basis of brief introduction to fundamental theory of FD8, a new algorithm to accurately calculate the effective contour length in the accumulated flow partitioning involved in 1n computation by using internal tangent circle on conical surface method was proposed.

本文首先介绍了多流向算法的基本原理,并基于此对流动累积分配中的有效等高线长度精确计算提出了几何锥面内切圆算法,同时改进了传统的地形指数中单位等高线汇流面积α的计算方法,增强了多流向算法对DEM中异常栅格的处理能力。

The work in this thesis is based on continued fraction theory. Combining continued fractions with polynomial functions, we construct a new osculatory continued fraction interpolation—osculatory rational Hermite-like interpolation. Its representation is simpler than that of Hermite polynomial interpolation and its computation is concise since the continued fractions coefficients can be worked out by using Viscovatov algorithm.

与之相关的理论成果不断地推陈出新,本文就是在连分式理论的基础上做了相应的工作,将多项式和连分式相结合,构造了一种新的切触有理插值——类Hermite切触有理插值,新的插值方法在表示形式上比传统的切触有理插值更直观,并且通过引入Viscovatov算法,切触插值连分式的系数求解得以简化。

And the keytechniques are in the following:(1) The algorithm and program of intensified node arrangement near crack tip andalong crack line (2) The shape function calculation of point near crack based on visibility criteria (3) The contour integral method for calculation of stress intensify factor K_ⅠK_Ⅱ(4) The rock slope appraisal method using circular method, polygonal method orgraph theory method depending on the slope joints combination

程序实现的关键技术和算法如下:(1)沿裂隙结点布置及裂尖结点加密的算法及程序(2)采用可视准则的形函数算计算程序(3)围线积分计算复合型裂纹裂尖强度因子K_Ⅰ、K_Ⅱ的算法及程序(4)圆弧搜索法、折线搜索法和无网格—图论搜索法的算法及程序

Theory and algorithm of generating TIN by contour line are discussed in this article.

本文深入探讨了三角网数字高程模型建模及可视化的理论、方法。

In recent years, with in-depth study of control theory, many new control algorithm have appeared.

近年来,随着控制理论的深入研究,出现了许多新的控制算法。

In this project, the theory of convex models is generalized from convex domain to non-convex domain, from small-range algorithm based on Taylor's series to large-range one so that the range of its application is extended and the computational precision is improved.

本项目将凸区域的凸模型理论推广到非凸区域上,将小范围泰勒展式算法拓广到大范围问题的求解中,扩大了凸模型理论的适用范围,提高了运算精度。

From the perspective of covering points in high-dimensional space, we discussed the theory of constrictive PONN based on knowledge rules. PONN's general constructive algorithm and its two special methods based on random sampling and barycenter rules respectively were proposed in this paper.

从高维空间样本点覆盖的角度,讨论了基于知识规则的构造性优先排序神经网络算法的原理,提出了网络构造过程的一般算法以及基于随机取样规则和重心点规则的两个实例算法。

Chaper 3 is general description of ADA encryption. Chapter 4 deals with the transform domain encryption. Includes the element of perfect and quasi-perfect transform domain encryption, and presents two type new schemes. Chapter 5 deals with asynchronous ADA encryption. Extends the general theory and model of asynchronous ADA scrambling, and introduces two type phase-distortion-free a synchronous ADA schemes. Chapter 6 is about new direction of ADA encryption. Includes TASI scrambling, transform domain dummy insertion scrambling, noise coving scrambling and other multi-dimension ADA scrambling, and proposes an adaptive dummy spectrum insertion asynchronous scrambling and a new adaptive noise-coving DFT scrambling algorithm. Chapter 7 is on permutation key. presents part results on permutation features, selecting criterion and constructing method. Chapter 8 introduces the hard and software design of a common ADA encryption/decryption system, and presents the experimental results on several proposed ADA encryption schemes.

第一章为绪论;第二章为语声信号、及其处理基础;第三章为模数模加密的一般描述;第四章为变换域加密研究,包括变换域加密机理,变换域完善与准完善保密研究,提出两种新的变换域加密方案;第五章为异步模数模加密研究,扩充了异步模数模加密的一般理论,介绍了两种新的无相位失真异步加密方案的原理与实现方法;第六章对模数模加密新方向:TASI应用途径、变换域伪谱插空置乱、噪声掩盖、多维置乱加密的原理和方法进行介绍,提出了自适应伪频插空异步模数模置乱算法与自适应DFT系数噪声掩盖置乱新算法;第七章为置换密钥性质、筛选准则以及构造方法研究的部分结果;第八章介绍了通用模数模加/解密实验系统的硬件、软件研制概况,并给出了几种加密方法的实验结果。

Reliable cryptograph is set up in math and formal computer science. According to the computational theory, the paper expounds mathematical background for public-key cryptosystem including: the complexity of algorithm and problem, relationship between the length of key and security of cryptogram.

可靠的密码学是建立在数学和形式化的计算机科学产生的结论之上的,本文从计算理论的角度阐述了构建对称密码体制所需的数学背景:算法复杂性与问题复杂性的关系;NP问题与密码学的关系;密钥长度与密码安全的关系。

Methods The program algorithm was based on non-parametric and parametric ROC curve analysis theory.

但是这些指标受主观选定分界点的影响,难以准确反映诊断方法的优劣。

第23/54页 首页 < ... 19 20 21 22 23 24 25 26 27 ... > 尾页
推荐网络例句

I am accused of being overreligious," she said in her quiet, frank manner,"but that does not prevent me thinking the children very cruel who obstinately commit such suicide.""

客人们在卡罗利娜·埃凯家里,举止就文雅一些,因为卡罗利娜的母亲治家很严厉。

Designed by French fashion house Herm è s, this elegant uniform was manufactured in our home, Hong Kong, and was the first without a hat.

由著名品牌 Herm è s 设计,这件高贵的制服是香港本土制造,是我们第一套不配帽子的制服。

Do not 'inflate' your achievements and/or qualifications or skills .

不要 '夸大' 你的业绩或成果,条件或者技能。