查询词典 scheme out
- 与 scheme out 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
It is shown that in Jameson's algorithm is not an orthogonal stream-lines coordinate system, but a local stream-lines coordinate system instead. Nevetheless, because of the finite-difference discretization in Jameson's scheme is not carried out along the direction of s and n, but along the Cartesian coordinates, the analysis on all terms of the full potential equation in Cartesian coordinates reveals that his scheme does take a back-ward difference along the streamwise exactly at all points in the supersonic flow region.
表明其所采用的坐标系不是真正的正交流线坐标系,而是局部流线坐标系;同时由于Jameson方法并不对s,n进行差分离散,而是在原笛卡尔坐标系下作差分离散,对笛卡尔坐标系下的全位势方程中的各项的分析表明,Jameson方法恰好能做到在超音速点沿真正的流线方向作后差分。
-
Aiming at the fade-out problem of the peak value existing in the traditional numerical filter after a sampling average, a filtering scheme based on the LabVIEW for the Infrared Spectrum measurement of the cellular water is proposed. A correlation algorithm responding to the filtering scheme is designed, and the filtering signal is analyzed in the time and frequency domain.
针对传统数字滤波在红外光谱细胞水分检测中采样点平均后各峰值削减的严重问题,提出了一种基于LabVIEW的滤波方案,设计了相应的相关算法,并对滤波信号进行时域和频域分析。
-
The cause of the target fade-out in Neural Network nonuniformity correction scheme for infrared focal plane arraywas studied. Based on analyzing the strength and limitation of edge-directed NN scheme and nonuniformity correction combining one-point calibration and NN-NUC, a new combinational algorithm for nonuniformity correction was proposed.
中文摘要:分析了传统神经网络非均匀性校正算法在空域处理过程中产生目标退化的原因,在总结基于边缘指导的神经网络校正算法与一点定标和神经网络结合的校正算法的基础上,提出了新的组合校正算法。
-
We analyze a simple group key management scheme, point out a security flaw of the scheme and give some improvements.
接着介绍了一个简单的群密钥管理方案,指出其中的一个安全漏洞,给出一点改进建议。
-
We propose a dynamic identity authentication scheme through a theorem about relative prime numbers, which can prevent replay attacks from taking place. In addition, we present a threshold signature scheme without a trusted party by use of joint secret sharing technique. Finally, the security flaw in an enhanced password authentication scheme is pointed out and the security of an enhanced key agreement protocol is analyzed.
首先基于一个关于互素数的定理设计了一个动态身份认证协议,该协议使攻击者不可能通过回放攻击来假冒用户;利用联合秘密共享技术设计了一个无可信中心门限签名方案;最后,分析了一个改进的身份认证协议存在的安全漏洞,以及一个改进的密钥协商协议的安全性。
-
First of all, the article analyzes the existed problems in this industry and point out that the Lodging Reformation is driving the revolution of the realty market, the new characters of the market demands developers converting their notions and chooses the new stratagem to adapt to the variances of market, the developers imperiously need to improve their ability of market research and level of prophase scheme that is strategic scheme.
首先分析了当前房地产业发展现状及存在问题,指出房改的进行促使整个房地产市场体系的变革,市场的新特点要求开发商转变观念,适应市场变化作出新的战略选择,开发商迫切需要提高市场研究能力和项目前期策划即战略策划水平。
-
By introducing the parameter , construct a new kind of weighted implicit difference scheme for (1+1)-dimension nonlinear Sine-Gordon equation and the generalized nonlinear Sine-Gordon equation respectively. Give out an ADI scheme for (2+1)-dimension nonlinear Sine-Gordon equation.
通过引进参数,分别为(1+1)维的非线性Sine-Gordon方程和广义的非线性Sine-Gordon方程建立了它们的加权隐式差分格式,给出了(2+1)维的非线性Sine-Gordon方程的ADI格式。
-
The action mechanism of the stun gun is analyzed in detail and the scheme design of the stun gun system is completed. With the SolidWorks software, three-dimensional model of the system has been constructed. The characteristics of the interior ballistics of the proposed scheme of stun gun are analyzed and the corresponding interior ballistics model is proposed. The numerical computation of the interior ballistics is also conducted. According to the functions of the electrical module ,the circuit is designed and the security and reliability of the system is analyzed. At last, the test scheme of the system is proposed and some experiments are carried out which validate the feasibility of the designed system.
论文中分析了电击枪的机理,完成了系统方案的设计;用SolidWorks软件建立了三维实体模型,分析了所提方案电击枪的内弹道的特点,建立相应的数学物理模型,并进行了内弹道分析计算;根据电子模块所要实现的功能设计了硬件电路;对设计的方案进行了安全性和可靠性的分析,最后拟定了试验的方案并进行了试验研究,验证了设计方案的可行性。
-
Work has complied with the applicative parallel angle several kinds TFT-LCD drive scheme first , has selected and used by comparing monolithic machine , DSP , ARM and the CPLD function with the queen who applies occasion owing to that the CPLD TFT drives the scheme applying, it can accomplish two RAM function by the fact that SRAM carries out a gap coming read-write , realize the outer-ring processor and TFT data interworking.
本作品首先从应用的角度比较了几种TFT-LCD的驱动方案,通过比较单片机、DSP、ARM及CPLD的性能和应用场合后选用了基于CPLD的TFT驱动应用方案,它可以通过SRAM进行间隔读写来完成双口RAM的功能,实现外围处理器和TFT数据的交互工作。
-
Harn and Kiesler proposed a public-key cryptosystem, digital signature and authentic encryption scheme based on Rabin's cryptosystem, in this chapter, we will analyze the security of H-K digital signature scheme and H-K authentic encryption scheme, and point out that these cryptosystem are insecure.
Shao设计了两种数字签名方案,并称这两种数字签名的安全性建立同时在离散对数和素因子分解问题之上。
- 推荐网络例句
-
On the other hand, the more important thing is because the urban housing is a kind of heterogeneity products.
另一方面,更重要的是由于城市住房是一种异质性产品。
-
Climate histogram is the fall that collects place measure calm value, cent serves as cross axle for a few equal interval, the area that the frequency that the value appears according to place is accumulated and becomes will be determined inside each interval, discharge the graph that rise with post, also be called histogram.
气候直方图是将所收集的降水量测定值,分为几个相等的区间作为横轴,并将各区间内所测定值依所出现的次数累积而成的面积,用柱子排起来的图形,也叫做柱状图。
-
You rap, you know we are not so good at rapping, huh?
你唱吧,你也知道我们并不那么擅长说唱,对吧?