查询词典 permutation
- 与 permutation 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Topics include permutation tests, permutation limit theorems, 2-sample rank tests and their asymptotic efficiency, k-sample rank tests, 1-sample tests of location, paired comparisons, rank tests for symmetry and independence, and analogues of linear modeling based on ranks.
包括排列检验,排列极限理论,两样本秩检验及其渐进有效性,k个样本的秩检验,单样本的位置检验,配对比较检验,对称分布和独立分布的秩检验,基于秩的线性模型的模拟。
-
Topics include permutation tests, permutation limit theorems, 2-sample rank tests and their asymptotic efficiency, k-sample rank tests, 1-sample tests of location, paired comparisons, rank tests for symmetry and independence, and analogues
包括排列检验,排列极限理论,两样本秩检验及其渐进有效性,k个样本的秩检验,单样本的位置检验,配对比较检验,对称分布和独立分布的秩检验,基于秩的线性模型的模拟。
-
Chaper 3 is general description of ADA encryption. Chapter 4 deals with the transform domain encryption. Includes the element of perfect and quasi-perfect transform domain encryption, and presents two type new schemes. Chapter 5 deals with asynchronous ADA encryption. Extends the general theory and model of asynchronous ADA scrambling, and introduces two type phase-distortion-free a synchronous ADA schemes. Chapter 6 is about new direction of ADA encryption. Includes TASI scrambling, transform domain dummy insertion scrambling, noise coving scrambling and other multi-dimension ADA scrambling, and proposes an adaptive dummy spectrum insertion asynchronous scrambling and a new adaptive noise-coving DFT scrambling algorithm. Chapter 7 is on permutation key. presents part results on permutation features, selecting criterion and constructing method. Chapter 8 introduces the hard and software design of a common ADA encryption/decryption system, and presents the experimental results on several proposed ADA encryption schemes.
第一章为绪论;第二章为语声信号、及其处理基础;第三章为模数模加密的一般描述;第四章为变换域加密研究,包括变换域加密机理,变换域完善与准完善保密研究,提出两种新的变换域加密方案;第五章为异步模数模加密研究,扩充了异步模数模加密的一般理论,介绍了两种新的无相位失真异步加密方案的原理与实现方法;第六章对模数模加密新方向:TASI应用途径、变换域伪谱插空置乱、噪声掩盖、多维置乱加密的原理和方法进行介绍,提出了自适应伪频插空异步模数模置乱算法与自适应DFT系数噪声掩盖置乱新算法;第七章为置换密钥性质、筛选准则以及构造方法研究的部分结果;第八章介绍了通用模数模加/解密实验系统的硬件、软件研制概况,并给出了几种加密方法的实验结果。
-
If G is not of this form, H can be obtained by first performing a colunm permutation to put G into the form , and then performing the inverse permutation on .
如果G不具有这种形式,则可先通过列置换将G变换成形式,然后再对进行逆置换而得到H。
-
By using these "ranking" and "unranking" algorithms, any permutation that is positioned in lexicographic order, away from a given permutation by any specific distance, can be generated. This significant benefit is the main difference between the proposed method and previously published alternatives.
藉由此个演算法,我们可以产生一个n项目的排任意距,依字母大小序而言,的另一个排;此特点是我们的方法与其它研究最同的地方。
-
This dissertation mainly investigated two frameworks of H-matrix, such as SPB framework consisting of integer Subscript matrix, Permutation matrix and Bidiagonal matrix and MSPT framework consisting of Masking matrix, sparse Subscript matrix, Permutation matrix and approximately lower Triangular array matrix.
本文主要研究了两种H矩阵的类随机框架结构模型,一是SPB框架,由整数下标矩阵、置换矩阵、双对角线矩阵构成;二是MSPT框架,由稀疏下标矩阵、模板矩阵、置换矩阵和近似下三角阵列矩阵构成。
-
The determination of the suborbits of a permutation group is one of the basic problems in the permutation group theory.
一个有限传递置换群的点稳定子群的轨道称为该群的次轨道。
-
All patients we re randomly divided into four groups.Mannitol group,in which patients were trea ted only with mannitol .Permutation group in which patient's were treated with mannitol f ollowed cerebrospinal fluid permutation.
将患者随机分为4组治疗:单独应用甘露醇治疗头痛及在甘露醇应用的基础上行脑脊液置换、地塞米松鞘内注射和静脉注射,对比观察4个组的止痛效果。
-
The method for constructing LDPCC code includes encoder and decoder. Operational steps include as following: determining parameters of checkout matrix HQT of group code of permutation unit matrix LDPC; constructing checkout matrix HQT of group code of permutation unit matrix LDPC; constructing checkout polynomial matrix HT of LDPCC code; exporting generated matrix G of LDPCC code.
一种LDPCC码的构造方法,包括编、译码器,运行的步骤包括:初始化的步骤;确定一个置换单位矩阵LDPC分组码的校验阵HQT的参数的步骤;构造置换单位矩阵LDPC码校验阵HQT的步骤;构造LDPCC码的校验多项式矩阵HT的步骤;导出LDPCC码的生成矩阵G的步骤。
-
The Young operators can be distinguished as elimination operator and effective permutation operator by the normalization of Young basis, then the constructive rules of permutation operators of the orthogonal normalization of Young basis is given.
由杨盘基的归一化将杨盘的杨算符区分为消去算符和有效置换算符,进而给出了正交归一化杨盘基的置换算符构造规则。
- 推荐网络例句
-
Neither the killing of Mr Zarqawi nor any breakthrough on the political front will stop the insurgency and the fratricidal murders in their tracks.
在对危险的南部地区访问时,他斥责什叶派民兵领导人对中央集权的挑衅行为。
-
In fact,I've got him on the satellite mobile right now.
实际上 我们已接通卫星可视电话了
-
The enrich the peopling of Deng Xiaoping of century great person thought, it is the main component in system of theory of Deng Xiaoping economy, it is a when our country economy builds basic task important facet.
世纪伟人邓小平的富民思想,是邓小平经济理论体系中的重要组成部分,是我国经济建设根本任务的一个重要方面。