函数
- 与 函数 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
This paper gives a brief introduction to the fundamental theory and working process of uncabled depth measuring device. When using this system the depth time function is recorded above ground, coupling time function is done under well and the depth coupling function is got from functional exchange.
简要介绍了无缆深度检测装置的基本原理和工作过程,该系统由地面记录深度—时间函数,井下记录接箍—时间函数,经过函数变换得到深度—接箍函数,然后利用前磁、油管深度资料对接箍深度进行校正,从而可以得到井下仪器准确的位置,解决了基础试井深度监测中由于人为因素、机械因素等造成的深度记录误差。
-
The results show that these functions have better unimodality, same adjusting focus range and accuracy, but the functions related with gradient are too slow to use in the numerical quasi-real time reconstruction.
结果表明,这些函数都具有较好的单峰性、一致的调焦范围和准确性,但与梯度运算相关的调焦函数运算时间太长;傅里叶频谱函数调焦速度最快,是首选的聚焦评价函数。
-
Along with the password attack method unceasing renewal, the computation ability unceasing enhancement as well as to the operating speed request, the tradition disperses row algorithm MD5, SHA has demonstrated their shortcoming and the insufficiency day by day, and thestructure of hash function is mostly based on block cipher algorithm DES, but the HASH function security is established above the grouping function security, because the DES operand is very big, the operating speed very slowly by and its itself some characteristics, therefore disperses a row function based on the DES algorithm to have potential unsecurity.
随着密码攻击手段的不断更新、计算能力的不断提高以及对运算速度的要求,传统的散列算法MD5,SHA已日益显示出它们的缺点和不足,并且过去hash函数的构造多是基于分组密码算法DES的,而hash函数的安全性是建立在分组函数的安全性之上的,由于DES运算量很大、运算速度很慢以及其本身的一些特性,因此基于DES算法的散列函数具有潜在的不安全性。
-
Along with the password attack method unceasing renewal,the computation ability unceasing enhancement as well as to theoperating speed request, the tradition disperses row algorithm MD5,SHA has demonstrated their shortcoming and the insufficiency day byday, and thestructure of hash function is mostly based on block cipheralgorithm DES, but the HASH function security is established above the grouping function security,because the DES operand is very big, the operating speed veryslowly by and its itself some characteristics, thereforedisperses a row function based on the DES algorithm to havepotential unsecurity.
摘要随着密码攻击手段的不断更新、计算能力的不断提高以及对运算速度的要求,传统的散列算法MD5,SHA已日益显示出它们的缺点和不足,并且过去hash函数的构造多是基于分组密码算法DES的,而hash函数的安全性是建立在分组函数的安全性之上的,由于DES运算量很大、运算速度很慢以及其本身的一些特性,因此基于DES算法的散列函数具有潜在的不安全性。
-
The closed-characteristic expression is proven to be of a A-class entire function and some related propositions are also given. Based on them a series of nathematic deviations are done, which brings an analytic expression between the controller parameters and the cost funtion as well as the restrictions on the optimization problem. In this way the original proposition is concretized for solving.
从系统的传递函数出发,首先证明系统闭环特征函数为A-类整函数的性质并给出其它有关定理,然后进行一系列数学推导,得出了控制器参数与目标函数间的解析关系式及优化的约束条件,由此产生参数优化的具体命题。
-
The point spread function and optical transfer function is the basis for optical synthetic aperture design and optimization. The imaging of complex objects can be obtained by the object function convoluting with the point spread function.
在空间域从理论上分析光学综合孔径成像系统的点扩散函数,对复杂目标的成像通过目标函数与点扩散函数的卷积求得,点扩散函数决定了成像质量。
-
E. thickness of the copper wire wall, length of the single conductor wire, height of the solenoid, the exciting current and the current density, the working temperature of the conductor, time of exciting and demagnetizing, the cooling water pressure and flux density, etc..
所建立的数学模型包含3个目标函数(即能耗极小化目标函数、铜耗极小化目标函数和纯铁用量极小化目标函数)、7个设计变量(即铜管规格参数a、b、t,线圈匝数N〓、N〓,铁铠磁通密度B〓和冷却水压p)和8类14个约束条件(即铜管壁厚、单饼导线长度、螺线管高度、激磁电流与电流密度、导体工作温度、激退磁时间,冷却水压和铁铠磁通密度等约束条件)。
-
When we applied this model to the bank runs in the Credit Department of Farmer's Institutions, it has discovered that there is a bimodal distribution in the hazard rate function, and that is not apropos to continuously hypothesizing it as a single distribution function for the reason that a single distribution function does not include a bimodal distribution hazard function.
当我们将这个模型应用到农会信用部发生挤兑的问题上,发现它的危险率函数呈现双峰的形状,而由於单一分配函数并无法具有双峰型危险率函数,此时如继续假设单一分配函数,并不恰当。
-
In the fourth paragraph, how the theory of the damping to forging hammer foundation advances at home and abroad, the research and application of the implement for damping to forging hammer, the structure of damping to forging hammer and the calculation methods for forging hammer foundation vibration system, which are used at home nowadays, are particularly introduced.In the fifth paragraph, aiming at direct damping under anvil block of forging hammer, the author bases a mechanics model of two-degree with damping, and optimizes the vibration parameters both in frequency field and in time field, then finds out the new simple method of optimizing the vibration parameters of the damping device under anvil block of forging hammer.
第五章针对锻锤砧下直接支承式减振基础,建立了锻锤减振系统的二自由度有阻尼振动力学模型,然后用傅立叶变换法求出振动传递率的频率关系,用直接积分法求出砧座和基础位移的时域响应,并分别对频域函数和时域函数进行参数优化,最终建立起频率函数—时域函数—优化参数间的相互关系,从而找到了锻锤砧下隔振器参数优化的简便新方法。
-
Calling the next function in the filter function chain When a hook is set, Windows calls the first function in the hook's filter function chain, and the responsibility of Windows ends.
CallNextHookEx函数在设置挂钩函数以后,当触发挂钩调用的事件发生时,Windows只负责调用挂钩过滤函数链中的第一个函数,此后,系统的任务也就结束了。
- 推荐网络例句
-
This one mode pays close attention to network credence foundation of the businessman very much.
这一模式非常关注商人的网络信用基础。
-
Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.
扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。
-
There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.
双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。