查询词典 generating
- 与 generating 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The ES〓 mudstone has only one oil-generating peak, occurring at about 140℃, corespondent to VRo of 0.95%.
ES〓、ES〓泥岩只存在一个生油峰,出现在地质温度140℃左右,对应VRo在0.95%。
-
A new algorithm based on PS method was proposed for generating correlated normal variables with any given expectation, variance and correlation matrix. Theoretical proof and numerical experiment were shown.
以PS方法为基础提出了新算法,此算法在均位、方差和非负相关阵任意给定的条件下,可以求得相应的相关正态分布的随机数,并且对该方法进行了理论证明与数位实验,给出了数据分析表。
-
Finally, the most striking creation of this paper is to propose a new solution to OOI correspondence problem between wide baseline images, named multi-epipolar-line constraint. It defeats existing methods by generating the more accurate one-to-one OOI correspondence and thus can be more suitable for real-time system. The experimental results show that our new method is very portable, robust and efficient.
它弥补了以往基础矩阵法与单应矩阵法的缺陷,能够更适用于实时视觉系统,经过实验证明,它能够生成十分准确的一对一对应的感兴趣目标,并且不需要借助任何附加的对图像内容进行搜索的过程,鲁棒高效。
-
Corrugated packaging can make the most efficient use of space, thereby generating significant economic and environmental benefits.
瓦楞包装可以充分利用空间最有效的利用,从而产生显着的经济和环境效益。
-
A novel method that can identify moving status of birds accurately was proposed. The method can search the cross correlation coefficient of two neighboring high- resolution range profiles with advance-retreat method in spectrogram, based on the principal of generating micro-Doppler effects with the frequency-stepped chirp radar and characteristics of birds.
基于线性调频步进体制雷达微多普勒效应的产生原理,在距离一慢时间谱图上,针对鸟类目标特性,通过对精高分辨距离像进行分析,提出了一种利用进退法搜索相邻精高分辨距离像的互相关系数的方法来判别鸟类目标运动状态。
-
It summed up the attackers discarding information, generating information, linking information and cryptographical computational capabilities.
在串空间理论中,攻击者具有的原子行为用定义的攻击者迹描述,它总结了攻击者丢弃消息、生成消息、连接消息,以及攻击者的密码运算能力。
-
In the strand spaces, atomic behavior of the attackers is the definition of the attackers trace description. It summed up the attackers discarding information, generating information, linking information and cryptographical computational capabilities.
在串空间理论中,攻击者具有的原子行为用定义的攻击者迹描述,它总结了攻击者丢弃消息、生成消息、连接消息,以及攻击者的密码运算能力。
-
The model adopts cumulant generating function to analyze path-level packet transmission probability from end-to-end measurements and estimate link-level packet transmission probability.
该模型基于端到端的测量方式,采用累积母函数对网络路径级数据包通过率进行分析,估计出网络链路级数据包通过率的统计信息。
-
Secondly, the generating basis matrix composition of reverse cumulation is discussed.
给出了反向累加生成的定义,主要讨论反向累加生成基矩阵构成,得到了反向线性累加生成空间。
-
The second part discusses the method of generating arbitrary waveform data on the base of driver in the CVI development environment.
最后,本文对任意波形发生器的技术性能进行了介绍,论述了软件对于VXI器件的重要意义。
- 推荐网络例句
-
This one mode pays close attention to network credence foundation of the businessman very much.
这一模式非常关注商人的网络信用基础。
-
Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.
扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。
-
There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.
双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。