英语人>网络例句>arithmetic function 相关的网络例句
arithmetic function相关的网络例句

查询词典 arithmetic function

与 arithmetic function 相关的网络例句 [注:此内容来源于网络,仅供参考]

Then described function agents using arithmetic. In the end,established a simulation model and analyzed information coordination, and validated the feasibility of the model.

结合Swarm平台构建了供应链仿真模型,对生产计划和采购计划等决策活动中的信息协调进行了模拟和分析,初步验证了模型的有效性。

There is important realism meaning in-depth researching for arithmetic of logic function complement set .

逻辑函数的求补在逻辑综合中最为常见,求补算法的优劣直接关系到逻辑优化算法的时效,在逻辑优化算法中由于会频繁调用逻辑函数求补运算过程[1~3],因此逻辑函数的求补是逻辑优化算法的基础。

In integral calculus, the mean value of a function on an interval is, in essence, the arithmetic mean of its values over the interval.

在积分学中,函数在一个期间内的平均值从本质上讲是它在这个区间内的各个值的算术平均值。

You need an arithmetic progression, just like the built-in function range, but with float values.

你需要一个代数表达式,就象内建函数range一样。但是它要的是浮点数(range仅仅在整数上工作

We realize the Neural Networks algorithm by exploring FPGA and MicroBlaze embedded hardware design. In this way, we can improve the arithmetic speed, realize the specific function in the chip, and diminish the system size.

神经网络评级算法采用FPGA和MicroBlaze嵌入式硬件实现,加快了该算法的运算速度,实现了专用芯片的功能,大大缩小了系统的体积,便于系统实现小型化、集成化。

In the paper, the researches and conclusions are:The basic theory and technique ofgeography information system, Introduce the history of the GIS technique developmentand it develops the trend, the GIS modernizes the meaning of the construction and thepurpose and the meaning of the topic researches to the our army artillery.The design ofartillerist numeric map, Make use of the soft strong graphics function of the SuperMapgeography information system, from how made the numerical map of artillery tocommence, carried on the processing and processed the piece to the artilleryappropriative paper quality diagram to manufacture the numerical map of artillery.Themold of choosing the position of artillerist and excavating the position of spacedata;Rules of space clustering analyzing and space relationship on the basis ofmathematics configuration;Choosing the path of positing convert;optimalpath arithmetic on the basis of chart theory and realize optimal path analyze.

论文研究内容有:地理信息系统的基本理论与技术,介绍GIS技术发展的历史及其发展趋势,GIS对我军炮兵现代化建设的意义和课题研究的目的及意义;炮兵地图数字化设计与制作,利用SuperMap地理信息系统软强大的制图功能,从如何制炮兵数字地图入手,对炮兵专用的纸质地图进行处理和加工件来制作炮兵数字地图;炮兵阵地选取分析模型、阵地空间数据挖掘模型的建立和挖掘过程,基于数学形态学的空间聚类分析法、空间关联规则法的挖掘模型;阵地转移的路径选择,对炮兵阵地转移路径进行分析,基于图论中的Dijkstra最优路径算法,实现转移最佳路径分析。

In this article,according to analysis of clan map that is one of most important map in cadastre management,based on platform of ArcGIS8 and ArcObjects as COM,expatiating arithmetic flow of automatic drawing clan map and enumerating some code of realize function and effect map.

以ArcGIS8为平台,以ArcObjects为二次开发组件,对宗地图这一地籍管理中的重要图件进行分析,阐述了自动绘制宗地图的算法流程,列举部分实现功能的代码,及其实现效果图。

It has the function about arithmetic auto-produce,the test bulletin auto-compile also.Debugging and system's exploitation become more convenienter.It can calculability the max force,the bend force,the no-votable bend force,the average peeling off force,the modulus of elasticity,etc.

还具有算法自动生成、试验报告自动编辑功能;大大方便了调试和系统再开发能力,可计算最大力、屈服力、非比例屈服力、平均剥离力、弹性模量等参数;使用高精度的测量仪器,集高度自动化、智能化于一体。

So when this arithmetic be used in mobile agent system,two function can be completed in one cryptogram system,and some redundancy can be cut down.

故在移动代理系统中,只使用改进后的协议,就可完成两项功能,减少了一些冗余。

In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.

本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。

第6/10页 首页 < ... 2 3 4 5 6 7 8 9 10 > 尾页
推荐网络例句

We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.

索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。

The relationship between communicative competence and grammar teaching should be that of the ends and the means.

交际能力和语法的关系应该是目标与途径的关系。

This is not paper type of business,it's people business,with such huge money involved.

这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。