英语人>网络例句>operation of symmetric difference 相关的网络例句
operation of symmetric difference相关的网络例句

查询词典 operation of symmetric difference

与 operation of symmetric difference 相关的网络例句 [注:此内容来源于网络,仅供参考]

To effectively reconfigure General Bill of Material, reconfiguration process of GBOM based on data-mining was proposed. BOM instances were represented by the weighted unordered tree graph generally, and the algorithm of similarity measurement between two similar BOM instances were presented based on the minimum weighted symmetric difference. In terms of the results of the similarity measurement, all the typical BOM instances were clustered based on the k-Means clustering method.

为有效地重构新型的通用物料清单,提出了基于数据挖掘的通用物料清单重构过程,运用赋权无序树形图表示产品物料清单实例,基于最小赋权对称相异度给出了相似物料清单实例之间的相似度度量算法;基于物料清单实例之间的相似度度量结果,采用k-Means聚类方法对物料清单实例进行聚类。

The basic theories of mathematical morphology for binary image are stated, and the most simple structure elements of morphologic transformation for binary images are proposed and proved. The geodetic morphologic transformation models are also developed. For the purpose of improving the speed of transformation in computer, the"set symmetric difference"is introduced to adapt each model. Some new morphologic filtering models and quantitative evaluating model of filtering effects in image processing are proposed, under the applied condition. The morphologic thinning methods are studied, and two new morphologic thinning models are developed. On the basis of analyzing the characteristics of mining maps, the image vectorizing tactics and a series of algorithms are proposed, including dynamic adaptive image thresholding using two thresholds, graphic and text separation, noise removal, and multi elements extracting models with mathematical morphology. Accuracy preserving compressed vectorizing model for image vectorization is put forward to generate vector data in multi layer.

论文对二值图象形态学的基础理论进行了较系统的阐述,提出并证明了二值图象处理中形态变换的最简单结构元素,并发展了测地形态变换模型;为了提高形态变换的计算机实现速度,引入了集合论中"对称差"的概念对各形态变换模型进行了改化;针对数学形态学在图象处理中的实际应用,提出了新的形态滤波模型及滤波效果的度量评价模型;研究了形态细化方法,提出了快速形态细化和保形快速形态细化算法;在研究矿图基本特征基础上,提出了人机协同矿图扫描图象矢量化处理策略及一系列扫描图象处理算法模型,包括双阈值动态自适应图象二值化、图文分离、噪声去除、图面多种要素提取形态变换模型等;在图象栅格—矢量转换中,提出了保精度压缩矢量化模型,以生成分层要素矢量数据。

Using the high performance MRI scan is the reliable method of studying the cerebrum internal tissue's asymmetry;The cerebrum internal tissue(two sides of caudate nucleus、lentiform nucleus and lateral ventricle) are roughly symmetric,they don't exit obviously difference.

结论利用高性能的MRI仪器扫描测量可以作为研究大脑相关结构的可信赖的方法;大脑内部结构(双侧尾状核、豆状核及侧脑室)是基本对称的,不存在明显的侧别差。

Splitting of the nondegenerate symmetric deformation vibration is also interpreted by a vibration-vibration coupling mechanism which agrees well with the measured energy difference.

关联场理论计算结果给出分裂双峰的能量间距为19cm〓,与实验结果的27cm〓很好地吻和。

Secondly, it has drawn out the pointed YD-Lie algebras definition, in the category of Yetter-Drinfeld modules, let Z be a torsion-free abelian group, if we have a symmetric braiding c, for each G-graded algebra V over the G-graded space, a new Lie superalgebra with an operation _c satisfying an actions, then we can obtain a new Lie superalgebra, this paper to call it pointed YD-Lie algebra.

其次引出了点YD-李代数,即:在Yetter-Drinfeld模范畴中,对任意的一个G-分次代数Z(G为无挠群V,引入对称辫子c后,在V内作_c运算,即可得到一种新的李代数(本文称之为点YD-李代数)。

To the predicate calculus on Intuitionistic Fuzzy Logic, a symmetric synthetic method for finding the truth of IFL propositions using membership and hesitancy degree is proposed on the basis of the hypothesis of an equilibrium state of supportability and opposability of neutral evidences indicated in the intuitionistic index. The fundamental operation rules on IFL propositions are presented.

摘要针对直觉模糊逻辑及命题演算,基于直觉指数所表征的中立证据中支持与反对的程度呈均衡状态的假设,提出利用隶属度与犹豫度计算直觉模糊逻辑命题真值的对称合成方法,给出直觉模糊逻辑命题的运算规则。

This paper first analyses and summarizes the ststus quo and evolution trend of encryption, some common used cryptograph are introduced, including the algorithms used in symmetric cryptosystem and asymmetirc cryptosystem. We describe the theory of each algorithms and compare the elliptic curve cryptosystem with the other two asymmetric cryptosystems to show the advantages of this algorithm. Second, the principle of ECC is discussed, including the math foundation of ECC, basic conception of elliptic curves, constructiong idea of ECC, operation on the elliptic curve and so on. Third, the current attacks of ECC were analyzed deeply, and an algorithm based on limited prime number field was constructed. We analyzed its realizability in theory, and implement it by using certain function of MIRACL software package. Latter half in this paper, the implementation model of a simple elliptic curve encryption system which based on GF has been introduced. The paper also put a deep analysis on the algorithm of point addition and point multiplication.

本文首先对密码技术的发展现状及其发展趋势进行了分析和综述,详细的介绍了私钥密码系统和公钥密码系统的发展,说明各种算法的原理和优缺点,并给出了一些典型的密码体制的简要分析,重点将椭圆曲线算法与其它几种公钥密码算法比较,说明椭圆曲线算法的优势;其次,探讨了椭圆曲线密码体制的原理,包括椭圆曲线密码的数学基础、基本概念、椭圆曲线密码体制的构造思想等问题;第三作者对椭圆曲线的攻击现状作了详细的分析,针对所使用的大素数域F_p,设计了素数域上安全椭圆曲线产生的算法,从理论上做了可实施性分析,从软件上做了具体实现;在本文的后半部分,提出了一个简单的基于有限素数域上的椭圆曲线加密方按算实现模型,并对SECES中设计的点加和点乘运算进行了深入分析。

Discharge characteristics and operation parameters of non-symmetric shadow mask plasma display panel were simulated with two-dimensional fluid simulation model.

本文采用二维流体模型模拟了非对称荫罩式PDP结构的放电过程和放电特性。

Based on these basic circuit elements, two kinds of symmetric ternary operation units realizing addition and multiplication are further designed.

一己石会,、J。'翻在三值逻辑中,变量x可以取为{I,0,1},它的主要特点是在取直上直接考虑了负数表示,从而消除了符号位的需要。

The embedded information safety platform features the CPU micro controller as one network processing chip with ARM940T kernel containing real-time embedded operation system; enciphering and deciphering hardware chip comprising IPSec algorithm chip and symmetric algorithm chip; I/O interface including two 10/100 M adaptive Ethernet interfaces, one USB main control interface and one serial interface.

本发明涉及一种嵌入式信息安全平台,特点是,CPU微控制器为一个网络处理芯片,片内处理器为ARM940T核,嵌入式实时操作系统置于该核内;加解密硬件芯片由IPSec算法芯片、对称算法芯片组成;输入输出接口包括2个10/100M自适应以太网接口、USB主控接口,串口接口。

第24/500页 首页 < ... 20 21 22 23 24 25 26 27 28 ... > 尾页
相关中文对照歌词
Operation
Operation
The Difference
Operation: Working Vacation
The Difference In Me
Difference Is Time
Operation: Mind Control
Operation: Mindcrime
The Difference
The Difference
推荐网络例句

He studied their excrement for evidence of livestock hair.

他为家畜毛的证据研究他们的粪便。

Loneliness is not grounds for deportation, deportation of the people are not all lonely people.

寂寞也不是放逐的理由,放逐的人也并不都是孤独的人。

The molecular basis for the virulence of this virus is still poorly understood. We characterized two H5N1 subtype viruses, A/mallard/Huadong/Y/2003 is nonpathogenic to mallard whereas A/mallard/Huadong/S/2005 is highly pathogenic to mallard.

我们对从野鸭分离到的H5N1 亚型禽流感病毒的生物学特性进行鉴定,其中A/mallard/Huadong/Y/2003是对麻鸭无致病性病毒,而 A/mallard/Huadong/S/2005是对麻鸭高致病性病毒。