应用函数
- 与 应用函数 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The mechanism of cohesion in the generation of ice rubble and ice ridging, the main factors arc demonstrated and analyzed elementarily. Considering three sea ice ridging process. the cohesion is set up as a function of initial ice thickness, total ice thickness, temperature and salinity, respectively. The theoretic expressions of sea ice cohesion were determined and to be introduced into the Mohr-Coulomb yield criterion.
考虑三种不同情况下的海冰堆积过程,将粘结力分别设为初始冰厚、当前堆积冰厚和海冰温盐的函数,分别建立了海冰粘结力的理论表达式,并将其应用到Mohr-Coulomb屈服准则中,建立了考虑粘结力影响的粘弹-塑性海冰动力学本构模型。
-
This method is also available for other problems of unsteady flow around complicated bluff bodies at medium or high Reynolds numbers and the results are used as reference for wake control The phenomena of the sinusoidally oscillating flow past a circular cylinder are also studied.
本文应用有限差分方法求解涡量-流函数形式的N-S方程,数值模拟了园柱瞬时起动后流动分离、旋涡生成、脱落以及随时间推进涡街产生和长期非定常演化过程,包括对称涡的生成,二次涡形成的α结构及卡门涡街等。
-
MD4 and f RIPEMD.and used the two of the fortieth power Hash operates under any initial value to give the collision of the SHA-0 This means that the algorithms of security authentication extensively applied currently in the electronic commerce,bank system,and slock system tumblingly breaks down,which is the field of Hash function analysis.
这意味着目前广泛应用于电子商务、银行系统、证卷系统的安全认证算法??Hash函数分析领域堡垒的轰然倒塌。面对严峻而残酷的现实,依赖于Hash算法的银证系统数据安全传输问题,也就成为人们不得不及时解决的实际问题。
-
The above code make sures, at any point of time only one instance of the application is available in the system tray.
上面的代码在任何时间只有一个应用程序实例点评价函数,在系统托盘可用。
-
Up to now, all of the methods of isolating the receiver function from teleseismic P waves are based on the data recorded at a single station.
迄今为止,广泛应用的分离接收函数方法主要基于单个台站的观测数据,并依赖等效震源假定的有效性。
-
Prestack migration method presented in this paper should be developed to apply in observational teleseismic P waveform data, to study the inhomogeneity of crust and upper mantle.
对本文所提出的接收函数叠前偏移方法作进一步的发展,可以用于实际的远震体波波形数据,在揭示地壳上地幔结构的横向非均匀性研究中,具有颇为广阔的应用前景。
-
An Integer Wavelet Transform with parameters is firstly constructed and the transmutative Rijndael code is used to construct a Hash function, and then a visible digital watermark algorithm based on the Integer Wavelet Translation with parameters, Discrete Cosine Transform and the Transmutative Rijndael encryption algorithm are presented.
构造出了带参数的整数小波,应用变型的Rijndael密码构造出了Hash函数。提出了一种基于带参数整数小波变换、离散余弦变换及变型Rijndael加密算法的可见数字水印算法。
-
A practical engineering application showed that the use of process function module and structure body can improve the program transportability, lower the development workload, and make the multisubstation monitoring system grow easily.
实际的工程应用表明,运用过程函数模块和结构体变量可提高程序的可移植性,降低开发工作量,便于多子站监控系统的扩容
-
The real world of this relationship Putin still exist, thereby trigonometrical function is a function of the most widely used.
现实世界中的这种关系普偏存在,因而三角函数是函数中应用最为广泛的一种。
-
In the 1990s, a more complete theoretical system - the achievement of statistical learning theory and neural networks, and other than because of the emerging machine learning methods of the difficulties encountered some important, such as how to determine the issue of network structure, overfitting and underfitting, the local minimum points ect, makes the rapid development and improvement of SVM in resolving the small sample, non-linear and high-dimensional pattern recognition problems in the performance of many unique advantages and can function to promote the use of fitted function and other machines learning problems.
上世纪90年代,一个较完善的理论体系--统计学习理论( Statistical Learning Theory,简称SLT)的实现和由于神经网络等较新兴的机器学习方法的研究遇到一些重要的困难,比如如何确定网络结构的问题、过学习与欠学习问题、局部极小点问题等,使得SVM迅速发展和完善,在解决小样本、非线性及高维模式识别问题中表现出许多特有的优势,并能够推广应用到函数拟合等其他机器学习问题中。
- 推荐网络例句
-
But we don't care about Battlegrounds.
但我们并不在乎沙场中的显露。
-
Ah! don't mention it, the butcher's shop is a horror.
啊!不用提了。提到肉,真是糟透了。
-
Tristan, I have nowhere to send this letter and no reason to believe you wish to receive it.
Tristan ,我不知道把这信寄到哪里,也不知道你是否想收到它。