查询词典 scheme out
- 与 scheme out 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
It is shown that in Jameson's algorithm is not an orthogonal stream-lines coordinate system, but a local stream-lines coordinate system instead. Nevetheless, because of the finite-difference discretization in Jameson's scheme is not carried out along the direction of s and n, but along the Cartesian coordinates, the analysis on all terms of the full potential equation in Cartesian coordinates reveals that his scheme does take a back-ward difference along the streamwise exactly at all points in the supersonic flow region.
表明其所采用的坐标系不是真正的正交流线坐标系,而是局部流线坐标系;同时由于Jameson方法并不对s,n进行差分离散,而是在原笛卡尔坐标系下作差分离散,对笛卡尔坐标系下的全位势方程中的各项的分析表明,Jameson方法恰好能做到在超音速点沿真正的流线方向作后差分。
-
Aiming at the fade-out problem of the peak value existing in the traditional numerical filter after a sampling average, a filtering scheme based on the LabVIEW for the Infrared Spectrum measurement of the cellular water is proposed. A correlation algorithm responding to the filtering scheme is designed, and the filtering signal is analyzed in the time and frequency domain.
针对传统数字滤波在红外光谱细胞水分检测中采样点平均后各峰值削减的严重问题,提出了一种基于LabVIEW的滤波方案,设计了相应的相关算法,并对滤波信号进行时域和频域分析。
-
The cause of the target fade-out in Neural Network nonuniformity correction scheme for infrared focal plane arraywas studied. Based on analyzing the strength and limitation of edge-directed NN scheme and nonuniformity correction combining one-point calibration and NN-NUC, a new combinational algorithm for nonuniformity correction was proposed.
中文摘要:分析了传统神经网络非均匀性校正算法在空域处理过程中产生目标退化的原因,在总结基于边缘指导的神经网络校正算法与一点定标和神经网络结合的校正算法的基础上,提出了新的组合校正算法。
-
We analyze a simple group key management scheme, point out a security flaw of the scheme and give some improvements.
接着介绍了一个简单的群密钥管理方案,指出其中的一个安全漏洞,给出一点改进建议。
-
We propose a dynamic identity authentication scheme through a theorem about relative prime numbers, which can prevent replay attacks from taking place. In addition, we present a threshold signature scheme without a trusted party by use of joint secret sharing technique. Finally, the security flaw in an enhanced password authentication scheme is pointed out and the security of an enhanced key agreement protocol is analyzed.
首先基于一个关于互素数的定理设计了一个动态身份认证协议,该协议使攻击者不可能通过回放攻击来假冒用户;利用联合秘密共享技术设计了一个无可信中心门限签名方案;最后,分析了一个改进的身份认证协议存在的安全漏洞,以及一个改进的密钥协商协议的安全性。
-
First of all, the article analyzes the existed problems in this industry and point out that the Lodging Reformation is driving the revolution of the realty market, the new characters of the market demands developers converting their notions and chooses the new stratagem to adapt to the variances of market, the developers imperiously need to improve their ability of market research and level of prophase scheme that is strategic scheme.
首先分析了当前房地产业发展现状及存在问题,指出房改的进行促使整个房地产市场体系的变革,市场的新特点要求开发商转变观念,适应市场变化作出新的战略选择,开发商迫切需要提高市场研究能力和项目前期策划即战略策划水平。
-
By introducing the parameter , construct a new kind of weighted implicit difference scheme for (1+1)-dimension nonlinear Sine-Gordon equation and the generalized nonlinear Sine-Gordon equation respectively. Give out an ADI scheme for (2+1)-dimension nonlinear Sine-Gordon equation.
通过引进参数,分别为(1+1)维的非线性Sine-Gordon方程和广义的非线性Sine-Gordon方程建立了它们的加权隐式差分格式,给出了(2+1)维的非线性Sine-Gordon方程的ADI格式。
-
The action mechanism of the stun gun is analyzed in detail and the scheme design of the stun gun system is completed. With the SolidWorks software, three-dimensional model of the system has been constructed. The characteristics of the interior ballistics of the proposed scheme of stun gun are analyzed and the corresponding interior ballistics model is proposed. The numerical computation of the interior ballistics is also conducted. According to the functions of the electrical module ,the circuit is designed and the security and reliability of the system is analyzed. At last, the test scheme of the system is proposed and some experiments are carried out which validate the feasibility of the designed system.
论文中分析了电击枪的机理,完成了系统方案的设计;用SolidWorks软件建立了三维实体模型,分析了所提方案电击枪的内弹道的特点,建立相应的数学物理模型,并进行了内弹道分析计算;根据电子模块所要实现的功能设计了硬件电路;对设计的方案进行了安全性和可靠性的分析,最后拟定了试验的方案并进行了试验研究,验证了设计方案的可行性。
-
Work has complied with the applicative parallel angle several kinds TFT-LCD drive scheme first , has selected and used by comparing monolithic machine , DSP , ARM and the CPLD function with the queen who applies occasion owing to that the CPLD TFT drives the scheme applying, it can accomplish two RAM function by the fact that SRAM carries out a gap coming read-write , realize the outer-ring processor and TFT data interworking.
本作品首先从应用的角度比较了几种TFT-LCD的驱动方案,通过比较单片机、DSP、ARM及CPLD的性能和应用场合后选用了基于CPLD的TFT驱动应用方案,它可以通过SRAM进行间隔读写来完成双口RAM的功能,实现外围处理器和TFT数据的交互工作。
-
Harn and Kiesler proposed a public-key cryptosystem, digital signature and authentic encryption scheme based on Rabin's cryptosystem, in this chapter, we will analyze the security of H-K digital signature scheme and H-K authentic encryption scheme, and point out that these cryptosystem are insecure.
Shao设计了两种数字签名方案,并称这两种数字签名的安全性建立同时在离散对数和素因子分解问题之上。
- 推荐网络例句
-
With Death guitarist Schuldiner adopting vocal duties, the band made a major impact on the scene.
随着死亡的吉他手Schuldiner接受主唱的职务,乐队在现实中树立了重要的影响。
-
But he could still end up breakfasting on Swiss-government issue muesli because all six are accused of nicking around 45 million pounds they should have paid to FIFA.
不过他最后仍有可能沦为瑞士政府&议事餐桌&上的一道早餐,因为这所有六个人都被指控把本应支付给国际足联的大约4500万英镑骗了个精光。
-
Closes the eye, the deep breathing, all no longer are the dreams as if......
关闭眼睛,深呼吸,一切不再是梦想,犹如。。。。。。