查询词典 method of difference
- 与 method of difference 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
For private managing high technologic corporate, it must set up its own culture that is useful to its own development, then it can cast off the conventional family management form and make the corporate lager and stronger.Taking account of the actual demand of the corporation culture in Xian Peri Technology Development Limited Corporation, and using the inner optimized control theory of the corporation culture, this paper set up the goal of the corporation culture. Then, using Investigation Table Method, Observing Method, Questionnaire Method, Conversazione Method and Statistics Method, and basing on thorough investigate the fact of Peri, this difference has been foundout and some effective measurement have been brought about too.
本文结合西安百瑞科技发展有限责任公司企业文化建设的实际需要,根据企业文化的内化控制原理,结合企业发展战略,构建了企业文化的目标,运用调查表法、观察法、问卷法、座谈法以及资料分析法,在深入调查企业的基础上,找出现实文化与企业文化目标之间的差距,并确定了企业文化培育的具体途径和保障措施。
-
In this paper, a high order accuracy difference method is presented for solving unsteady convection diffusion equation by using Implicit Perturbation Finite Difference scheme. Firstly, we use the steady convection diffusion equation, the constant coefficients of this equation are expanded to power series of grid-spacings, then the high-order Perturbation Finite Difference scheme is obtained by determining the coefficients of the power series. Put this scheme on unsteady convection diffusion equations and modified it, the IPFD scheme is constructed.
本文利用摄动差分思想,对定常对流扩散方程中的空间微商系数进行摄动展开,展开幂级数系数通过消去摄动格式修正微分方程的截断误差项求出,由此获得方程的隐式摄动差分格式,将此方法应用于非定常对流扩散方程,并加以修正,得到该方程的修正隐式摄动差分格式。
-
It includes four parts: 1 Part I, it introduces the basic knowledge of computer viruses such as computer virus definition, history and important viruses events, features, behavior phenomena, difference with computer software and hardware troubles, damage behavior and capability, classification, naming, future trend, etc; 2 Part II, it introduces the corresponding knowledge of computer systems related to computer viruses such as the composing of software and hardware of the computer system, storage media and its working mechanism, interrupt technologies,.com/.exe/.pe file formats and their working mechanism, etc; 3 Part III, it introduces computer virus mechanism and theory such as computer virus structure, work flow, working mechanism of key modules, typical technologies used to design computer viruses including the corresponding traditional technologies (interrupt filching, memory resident, etc.), the corresponding new routine technologies (self-encrypting, Mutation Engine, etc.), and the corresponding new technologies used by some prevalence computer viruses such as macro viruses, e-mail viruses, worm, hacker, Trojan, mobile phone viruses, the working mechanism analysis of some kinds of typical and prevalence computer viruses such as file-type viruses, macro viruses, e-mail viruses, worm viruses, hacker, Trojan, mobile phone viruses, the analysis of some typical and prevalence computer viruses examples including BALL viruses, WORD macro viruses, WantJob viruses, Code Red viruses, BO Trojan, etc; 4 Part IV, it introduces the defense and killing technologies of computer viruses such as the aim and criterion of computer viruses defense and killing, prevention methods and corresponding technologies, detection technologies (comparison method, character code scanning method, behavior inspecting method, analysis method, etc.), manual and automatic killing technologies, immunity technologies such as IBM digital immunity system, new anti-viruses technology trends (real-time anti-viruses technologies, 32 kernel technologies, active kernel technologies, etc.), some typical virus defense and killing softwares (Symantec AntiVirus product, PC-Cillin AntiVirus product, etc.), the defense and killing method analysis of some kinds of typical and prevalence computer viruses (file-type viruses, macro viruses, worm viruses, hacker, etc.), for example, firewall and intrusion detection technologies for anti-hacker, the defense and killing of some typical and prevalence computer viruses examples including WORD macro viruses, Code Red viruses, BO Trojan, etc.
课程内容具体包括四大部分:1)第一部分,介绍计算机病毒基本知识,包括:计算机病毒定义、病毒发展史及重大事件、病毒特点、病毒表现现象及与软硬件故障的区别、病毒破坏行为及危害性、病毒的传播途径及媒介、病毒分类、病毒的命名及计算机病毒技术发展趋势等内容;2)第二部分,介绍与计算机病毒有关的计算机系统相关知识,包括:计算机系统软硬件组成、存储介质结构及工作原理、计算机系统引导机理及流程、中断技术、。com/。exe/。pe等文件格式及工作机理等内容;3)第三部分,讲解计算机病毒机理,包括:计算机病毒的组成结构、病毒工作流程、病毒引导/触发/感染/破坏等模块的工作机理、计算机病毒所采取的编制技术(包括中断窃取/内存驻留等传统编制技术、自加密/隐形/变形机等新的常规编制技术、宏病毒/电子邮件病毒/网络蠕虫/特洛伊木马/黑客/手机病毒等一些新的流行病毒所采取的编制技术等)、一些类型的典型或流行计算机病毒的工作机理分析(包括:引导型病毒、文件型病毒、宏病毒、电子邮件病毒、蠕虫病毒、黑客、特洛伊木马、手机病毒等)、一些典型或流行的计算机病毒实例剖析(包括:小球病毒、WORD宏病毒、求职信病毒、红色代码病毒、冰河木马等)等内容;4)第四部分,讲解计算机病毒防治技术,包括:计算机病毒防治目的、病毒防治策略及规范、病毒在管理和技术上的预防措施、病毒检查技术(包括:比较法/病毒特征码扫描法/行为监测法/虚拟执行法/分析法等)、手工和自动病毒清杀技术、病毒免疫技术(包括:针对某种一次性感染病毒的基于病毒标签的免疫方法/基于自我完整性检查的计算机病毒免疫方法/IBM的数字免疫系统等)、反病毒技术的新发展(包括:实时反病毒技术/32位内核技术/主动内核技术/以毒攻毒技术等)、诺顿/趋势/金山等公司的病毒防治软件产品、一些类型的典型或流行的计算机病毒(包括:引导型病毒、文件型病毒、宏病毒、蠕虫病毒、电子邮件病毒、手机病毒、黑客、特洛伊木马)的防治措施(其中,也包括介绍面向防范黑客攻击的防火墙、入侵检测技术)、一些典型或流行的计算机病毒防治实例剖析(包括:WORD宏病毒、红色代码病毒、冰河木马v1.1/v2.2等)、多层次病毒防护体系等内容。
-
Based on the analysis of conventional phase difference detection method,a new algorithm of phase difference detection is presented according to Fourier series decomposition method and the characteristic that inner product of two orthogonal vectors in a linear space is zero.
在分析现有相位差检测算法的基础上,应用Fourier级数分解方法与线性空间中正交向量内积为零的特性,推导出了一种新的相位差检测算法。
-
Because our country executes is tax will be separated model, thus determine the tax on taxable profit in the confirmation and accounting, between many differences, must have permanent differences also has difference, the timing of the long-term equity investment difference compared to the equity method to control, because when the accounting of a long-term equity investment measured by employing the equity method under the condition of a long-term equity investment obtained from the disposal to every link existing accounting and tax laws are not consistent.
由于我国实行的是税会分离模式,因此税法上在确定应纳税所得额和会计在确认利润的时候,二者之间必然有很多的差异,既有永久性的差异也有时间性的差异,长期股权投资权益法导致的差异比较难以把握,因为当会计对长期股权投资采用权益法核算的情况下从取得长期股权投资到最后的处置每一个环节都存在会计处理和税法规定不相一致的地方。
-
Fist, comprehensive analysis on the current study on data processing is made, and characters of Newton methods about nonlinear surveying and mapping data processing are discussed, and then new solutions to parameters estimate with multi-sources, multi-types, multi-dimension, multi-precision bynonlinear least square are presented such as PSB algorithm, digital continuation and generalized digital continuation algorithm, cone model method, tensor analysis method, GCMA(mixed algorithm of gradient method and conjugate gradient method), combining algorithm based on Newton method and gradient method and confidence region and so on, and a new fast difference iterative algorithm is proposed towards parameters estimation containing random parameters in nonlinear models, and a new solutions to nonlinear least squares surveying and mapping adjustment by parameters estimation both considering the random and nonrandom parameters is presented after studying on nonlinear data processing in deformation monitoring, and at last primary analysis on error propagation of spatial data is made and approximate error propagation formula and error analysis formula to length and area are proposed.
首先比较全面分析了目前测量数据处理理论的研究现状,讨论了牛顿类方法在处理非线性模型参数估计方面的特点,研究并给出了求解多源、多类型、多维、多精度、非线性最小二乘测量平差参数估计的若干种新方法,这包括PSB算法、数值延拓及其广义数值延拓算法、锥模型法、张量分析法、基于最速下降法和牛顿法的组合算法、基于最速下降
-
Phase correlation and then reaches image mosaic by graph cut and poisson image fusion.graph cut is used to find a globally optimized seam-line for deghosting while poisson image fusion is used to realize smooth mosaic without exposure difference.a new weight calculation method based on the statistics of guadient direction histogram is presented here in order to robustly realize graph cut.an edge transition poisson image fusion method is also proposed to reach exposure difference removal
该方法在相位校正的基础上将图切割和泊松融合相结合实现拼接,图切割用于搜索全局最优的缝合线以去除鬼影,泊松融合用于曝光差异的处理。本文给出新的基于梯度方向直方图统计的权值计算方法,实现稳定的图切割。另外,本文还设计出重叠过渡的泊松融合方法,较好地完成图像合成。
-
In this paper, the maximum likelihood algorithm with process and measurement noise for nonlinear continuous-discrete system given by Jategaonkar and Plaetschke is improved in two aspects: 1 to avoid the disadvantages of sensitivities computation by common finite-difference method, in which the perturbation sizes should be selected optionally, an improved finite-difference method with best perturbations, is presented. 2 to improve the numerical stability of Jategaonkar's algorithm, maximum likelihood algorithm with fast triangular square-root decomposition filter is given.
摘要对Jategaonkar等人给出的同时计及过程及观测噪声的非线性连续-离散系统的极大似然算法从两个方面进行了改进:1给出了计算灵敏度的最佳摄动有限差分算法,避免了普通有限差分法计算灵敏度矩阵时需人为选择参数摄动量大小而带来的缺点;2给出了具有快速三角化平方根滤波的极大似然算法,提高了原算法的数值稳定性。
-
Based on Wu's elimination method and "divide-and-conquer" strategy, the undetermined coefficient method for constructing polynomial conservation laws of nonlinear differential-difference equations was improved. Furthermore, a Maple package CLawDDEs was developed to automatically derive conserved densities and associated fluxes of polynomial differential-difference equations.
基于吴消元法和"分治"策略,改进了基于标度不变性构造非线性微分差分方程多项式形式守恒律的待定系数算法,并在计算机代数系统Maple上实现了改进后的算法,其中的软件包CLawDDEs可自动推导出微分差分方程的守恒密度及连带流。
-
In theory, firstly, the numerical simulation methods, such as the boundary element method, the finite difference method and the finite element method, were utilized to calculate the distribution of electric field intensity and potential of the electron-gun system, the focusing system and the whole equipment, respectively. Then, the trajectories of the electron-beam were traced by using of the Runge-Kutta method and the Monte-Carlo method associatively. The point spread function was also calculated.
在理论分析中,先后采用边界元方法、差分方法、有限元方法等科学数值计算方法,编制程序,对X射线源的电子枪发射系统、聚焦系统以及发射系统与聚焦系统的组合系统等的电场分布进行了严格的计算,在准确求得各系统电场内各个剖分点的电场场强、偏导数等参量的基础上,采用蒙特-卡罗模拟方法和不等距龙格-库塔方法相结合,追踪由LaB_6单晶阴极表面发射出的大量电子束在电场内的运动轨迹,求出点扩展函数,并根据点扩展函数的优劣,反复调节、大量计算对比,挑选出X射线源最佳的电极结构及其组合。
- 推荐网络例句
-
But we don't care about Battlegrounds.
但我们并不在乎沙场中的显露。
-
Ah! don't mention it, the butcher's shop is a horror.
啊!不用提了。提到肉,真是糟透了。
-
Tristan, I have nowhere to send this letter and no reason to believe you wish to receive it.
Tristan ,我不知道把这信寄到哪里,也不知道你是否想收到它。