英语人>网络例句>向量 相关的搜索结果
网络例句

向量

与 向量 相关的网络例句 [注:此内容来源于网络,仅供参考]

At first, the template is defined with Boolean vector space. The relationship between a template and an LC permutation is given.

首先,用布尔向量空间表示模板,并指出模板与LC置换的对应关系。

After the discussion of the organization and data access of the data,the paper presents some pop kinds of information retrieve models nowadays,such as Boolean logical model,Vector Space retrieve model and Probability retrieve model.

在讨论了分布式环境中的数据组织和访问后,本文又具体讨论了现今几种主要的信息检索模型:布尔逻辑模型,向量空间模型,以及概率模型等。

The article will mine Data-Item set compression to a Boolean Vector Matrix.The algorithm only needs to scan the database one time and rational use of data storage structure so that it would not generate a large number of candidate sets.

将挖掘的数据事务集压缩到一个布尔型向量矩阵中,只需扫描数据库一次,合理利用数据存储结构,且不会产生大量的候选集。

The generalized Walsh spectral characteristics and the generalized auto-correlation function characteristics of orthormophic permutations are studied by using of knowledge about the relation between orthomorphic permutations and vector Boolean functions.

运用向量布尔函数的知识研究了正形置换的广义一阶Walsh谱特征和广义自相关函数的特征,通过正形置换的广义一阶Walsh谱特征给出了正形置换的几种构造方法。

Generalized ε- correlation Immune Boolean Vector Functions ...

定理1 告诉我们布尔向量函数具有m 阶广义ε相关免疫性的一个必要条件是它各分量函数的。。。。。

The concepts of weighted α-lower product and weighted α-upper product between a relation matrix and a Boolean column vector are presented in weighted approximation space.

在加权近似空间中提出了关系矩阵和布尔列向量加权α下乘法和加权α上乘法的概念。

Second, in the viewpoint of crypto analysis, the practical requirement for the cryptographic function is to construct the function that can resist all the known crypto analysis and attacks. In advanced, the main cryptographic properties are compared, and the relation among these cryptographic properties is analyzed, including the trade-off ones. Get the conclusion that the construction of cryptographic Boolean function is to find out the proper Boolean function in the whole vector space under the restriction of several cryptographic properties required for the security system.

然后本文从密码分析的角度,讨论了密码函数的实际需求,即构造能够抵抗已有密码分析与攻击的布尔函数;分析了布尔函数的主要的密码学性质,并比较了这些性质之间的相互关系,包括制约的关系;得出了构造布尔函数的实质的结论,即在向量空间中构造全体布尔函数,以所需的若干密码学性质作为限制条件,用有限域上的多项式、Walsh谱、Hadamard矩阵等数学工具找出适当的布尔函数用于加密体制的设计。

Firstly, the decision matrix is transformed into an objective matrix, and then the weight of every objective is determined by means of entropy coefficient method. By Integration of experts' knowledge, the acceptable lower bound of degree of satisfaction and acceptable upper one of degree of dissatisfaction of every objective are decided. At last, by using the weight vector and the acceptable lower boun...

首先将决策矩阵转化为目标矩阵,然后利用熵权系数法计算各个目标的权重,综合专家的意见得到对于每个目标可以接受的满意度的下界和不满意度的上界,最后利用得到的权重向量以及得到的满意度的下界和不满意度的上界计算各方案的vague估计值,将得到的vague估计值按照评分函数进行排序,得到方案的排序结果。

With the help of the optimization theory, we present the vertex solution theorem for determining both the exact upper bounds or maximum values and the exact lower bounds or minimum values of the dynamic response of structures, in which these parameters reach their extreme values on the boundary of the interval mass, damping, stiffness matrices and the interval external loads vector.

借助于优化理论,提出了确定结构动力响应精确上下界的极点求解定理,其中极值将在区间质量矩阵、阻尼矩阵、刚度矩阵和外载荷列向量的顶点达到。

This paper proposed a novel shot boundary detection method based on the gradient angle.

本文提出一种新的基于梯度向量角的镜头边界检测方法。

第59/100页 首页 < ... 55 56 57 58 59 60 61 62 63 ... > 尾页
推荐网络例句

The labia have now been sutured together almost completely.The drains and the Foley catheter come out at the top.

此刻阴唇已经几乎完全的缝在一起了,排除多余淤血体液的管子和Foley导管从顶端冒出来。

To get the business done, I suggest we split the difference in price.

为了做成这笔生意,我建议我们在价格上大家各让一半。

After an hour and no pup, look for continued contractions and arching of the back with no pup as a sign of trouble.

一个小时后,并没有任何的PUP ,寻找继续收缩和拱的背面没有任何的PUP作为一个注册的麻烦。