查询词典 quasi-human
- 与 quasi-human 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The course of conventionalization is very complex, and between the phase of unset phrases and idioms, there is a mid-phase, that is, the phase of quasi-set phrases.
非固定短语演化为熟语的过程是及其复杂的,并非一步到位,一般来说,中间都要经历一个过渡阶段,即准固定语阶段。
-
This paper applies a convex combination non-monotone Wolfe line-search proposed recently to the convergence analysis of Broyden's family quasi-Newton method.
将一类新提出的凸组合非单调Wolfe线搜索应用到修正Broyden拟牛顿法收敛性分析里。
-
Tan and Xu [1] had proved the theorem on convergence of Ishikawa iteration processes of asymptotically nonexpansive mapping on a compact convex subset of a uniform convex Banach space , Then Liu Qihou [3] presents the necessary and sufficient conditions for the Ishikawa iteration of asymptotically quasi-nonexpansive mapping with an error member on a Banach space convergent to a fixed point . Xu and Noor [5] had proved the theorem on convergence of three-step iterations of asymptotically nonexpansive mapping on nonempty closed, bounded and convex subset of uniformly convex Banach space.
Tan和Xu已经证明了建立在一致凸Banach空间紧凸子集上的渐进非扩张映射的Ishikawa迭代序列的收敛原理,随之,刘齐侯又阐述了Banach空间上渐进准非扩张映射T的具误差的Ishikawa迭代序列收敛于T的不动点的充分必要条件;之后,Xu和Noor也证明了定义在一致凸Banach空间某非空有界闭凸子集上的渐进非扩张映射的三步迭代序列的收敛原理。
-
In chapter three, we prove that there exist solutions to the Ky Fan variation inequality, as the set-valued mappings are defined on spheres in infinite dimensional Banach spaces or odd dimensional Euclidean spaces, following from these theorems, we obtain some fixed point theorems for set-valued mappings defined on a sphere. When G is an approximate compact convex subset of E, or G is a almost quasi-convex set-valued mapping, we prove that there exist solutions to and type generalized Ky Fan variation inequality, following these theorems, we prove several best approximation theorems and coincidence theorems involving two set-valued mappings and two different spaces. In chapter four, we first present a new Simplicial algorithm for computing the Leray - Schauder fixed points, the algorithm can solve the set-valued nonlinear complementarily problem. We give a condition to guarantee the computation proceeding in a bounded region. We present integer-labeling algorithms for computing fixed points of some set-valued mappings, the best approximation points and solutions to a kind of set-valued variation inequalities.
第四章给出了计算定义在非凸集上的非自映射的Leray-Schauder不动点的算法,而现有的不动点算法都是计算凸集的上半连续集值自映射的不动点;给出了保证计算有界的一个充分条件,我们的条件大大弱于Mdrrill条件,我们的算法也可用来计算Eaves不动点;给出了集值非线性互补问题存在解的一个充分条件,此时可利用Leray-Schauder不动点算法来求解;向量标号算法以往是计算集值映射不动点的唯一有效算法,我们给出用整数标号算法计算一类集值映射的Kakutani 不动点的算法;定义在紧凸集上的连续映射不一定有不动点,但一定有最近点,最近点是不动点概念的推广,我们给出了计算最近点的算法;集值映射变分不等式尚无有效的求解算法,我们给出求解一类集值映射变分不等式的算法。
-
It is a slow evolvement under quasi-balance of inertial force, Coriolis force and pressure gradient force.
显然,这种准平衡态是惯性力、柯氏力和气压梯度力三者之间的平衡。
-
The birth and evolution of corrugation are studied under the quasi-static condition by elasto-plastic rolling contact method.
波磨的形成是残余应变叠加的结果,忽略残余应变,在重复加载中计算结果会产生较大的误差积累。
-
The author uses I-fuzzy quasi-coincident neighborhood system to introduce the concepts of I-fuzzy first countability and I-fuzzy second countability, and proves the degree to second countability in each of I-fuzzy topological space must be less than that to first countability, and gives the equivalent characterations about the continuity of function by convergence of sequences in first countable I-fuzzy topological spaces.
作者利用方进明在[4]中提出的I-fuzzy重域系引入了I-fuzzy拓扑空间的第一可数性和第二可数性的概念,证明了一个I-fuzzy拓扑空间空间是第二可数的I-fuzzy拓扑空间的程度一定小于它是第一可数的I-fuzzy拓扑空间的程度,并且在第一可数的I-fuzzy拓扑空间中对映射的连续性进行了等价刻画。
-
Every weakly countably compact closed convex set in a locally convex space has the quasi-weak drop property.
局部凸空间中每个弱可数紧闭凸集具拟弱滴状性质。
-
He proved that the left ward turning of Yangtze river diluted water is mainly resulted from the interaction between the bottom declining and the lag of the transversal pressure gradient, made the numerical simulation and preliminary study on the thermohaline staircase structure formation mechanism, improved American Academician Wunsch's inverse method of ocean circulation, jointed the discover of " Mindanao Under Current", which is the first ocean current found and named by Chinese scientists and widely accepted over the world, simulated the horizontal and vertical carbon fluxes in East China Sea by a simple ecosystem model, estimated the photosynthesis efficiency less than 8% in Jiaozhou Bay, applied statistical downscaling technology to Chinese coast and Japanese islands realizing the simulation and forecast of sea level low frequency variations, pointed out that the quasi-periodicity of El Nino events should be resulted from the interaction between the 3~4 year oscillation in tropical Pacific and decadal oscillation in the northern Pacific of middle latitudes of the air-sea coupled climate system and at decadal time scale the precipitation influence on sea level variation along Chinese coast and Japanese islands becomes more important, which is closely related to the decadal oscillation of air-sea coupled climate system, therefore precipitation most likely play a major role for the decadal oscillation formation;; proposed Extended Associate Pattern Analysis to analyse combined observed datasets of sea surface temperature and sea level pressure or geopotential hight at 1000 hPa (GH1000) over the Pacific and related seas.
论证了长江冲淡水向左转向主要由于底形下倾与横向压力梯度滞后相互作用的结果。对温盐阶梯结构的形成过程及物理机制进行了数值模拟与初步探讨。改进了美国科学院院士Wunsch的大洋环流反演法。与胡敦欣院士共同发现了"棉兰老潜流",这是第一支由中国科学家发现、命名并得到普遍承认的洋流。借助较为简单的生态模式数值模拟了东海的水平与垂直碳通量;胶州湾浮游植物的屏蔽效应可以使底层海水温度在升温季节降低2度,由此推算出其光合作用的效率应小于8%;浮游植物春季水华的生物过程实际上强化了海水层化的物理过程。将统计学降尺度技术应用于日本列岛和我国沿海,实现了海平面长周期变化的模拟与预报。
-
Chaper 3 is general description of ADA encryption. Chapter 4 deals with the transform domain encryption. Includes the element of perfect and quasi-perfect transform domain encryption, and presents two type new schemes. Chapter 5 deals with asynchronous ADA encryption. Extends the general theory and model of asynchronous ADA scrambling, and introduces two type phase-distortion-free a synchronous ADA schemes. Chapter 6 is about new direction of ADA encryption. Includes TASI scrambling, transform domain dummy insertion scrambling, noise coving scrambling and other multi-dimension ADA scrambling, and proposes an adaptive dummy spectrum insertion asynchronous scrambling and a new adaptive noise-coving DFT scrambling algorithm. Chapter 7 is on permutation key. presents part results on permutation features, selecting criterion and constructing method. Chapter 8 introduces the hard and software design of a common ADA encryption/decryption system, and presents the experimental results on several proposed ADA encryption schemes.
第一章为绪论;第二章为语声信号、及其处理基础;第三章为模数模加密的一般描述;第四章为变换域加密研究,包括变换域加密机理,变换域完善与准完善保密研究,提出两种新的变换域加密方案;第五章为异步模数模加密研究,扩充了异步模数模加密的一般理论,介绍了两种新的无相位失真异步加密方案的原理与实现方法;第六章对模数模加密新方向:TASI应用途径、变换域伪谱插空置乱、噪声掩盖、多维置乱加密的原理和方法进行介绍,提出了自适应伪频插空异步模数模置乱算法与自适应DFT系数噪声掩盖置乱新算法;第七章为置换密钥性质、筛选准则以及构造方法研究的部分结果;第八章介绍了通用模数模加/解密实验系统的硬件、软件研制概况,并给出了几种加密方法的实验结果。
- 推荐网络例句
-
She gently rebuff ed him, but agreed that they could be friends
她婉言拒绝了,但同意作为朋友相处。
-
If in the penal farm, you were sure to be criticized.
要是在劳改农场,你等着挨绳子吧!
-
Several theories about reigniting and extinguishing of the arc have been refered.
本文综合考虑了几种电弧重燃和熄灭理论。