式演演算法 的英文怎麼說

中文拼音 [shìyǎnyǎnsuàn]
式演演算法 英文
greedy algorithm
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • : 動詞1 (演變; 演化) develop; evolve 2 (發揮) deduce; elaborate 3 (依照程式練習或計算) drill;...
  • : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  1. We first present a number of desiderata for an xml - based query language, and based on this criterion, we introduce the syntax of a simple core ian - guage for semistructured data and then describe four extensions that have resulted in working prototypes. second, we present the algorithm for computing the result of a regular expression on data graph with cycles, the first - order interpretation of querying language for semistructured data, and explore structural recursion and bisimulation in semistructured data and propose an efficient and systematic way to computing a bisimulation between the two graphs. we also proposed and implemented a web querying system with database features

    基於這些準則,對一個簡單的半結構數據查詢核心語言的語提出了兩方面擴充;給出了計數據圖中正規表達;對半結構數據查詢語言的一階邏輯描述、結構遞歸和數據圖的雙態模擬( bisimulation )等問題進行了研究,提出了一種判定數據圖的bisimulation;在xml數據查詢語言研究的基礎上,設計並實現了一種具有數據庫查詢特性的web查詢系統原型。
  2. As you iterate over the query expressions, your algorithm may need to correct for double negatives

    在遍歷查詢表達時,可能需要糾正雙重否定。
  3. The disquisition includes choice of algorithm, accomplish of algorithm, collection of learning sample, parameter of net, shortcoming of bp algorithm, extraction and reduction form line etc. referring to shortcoming of traditional bp algorithm, a modified learning factor with adaptation is introduced. because of every different font has robust, the way based chain coded and knaggy feature is used. a bizarre sample feature database is constructed for speeding up modified bp learning and classification

    本文對人工神經網路理論進行了研究,探討了網路形的選擇、的實現、學習樣本的收集、網路參數選擇、 bp缺陷、表格線提取、還原、生成及字元識別、還原生成等問題,並針對bp的缺陷提出了和實現了改進型bp,使網路學習效率提高,對不同人的不同字型字體有較強的魯棒性,採用了基於鏈碼特徵和凹凸分佈特徵的方來抽取字元特徵。
  4. Topics covered include : specification and verification, concurrent algorithms, synchronization, naming, networking, replication techniques ( including distributed cache management ), and principles and algorithms for achieving reliability

    其中包含以下的主題:規格與驗證、同步、同步化、命名、網路、復制技術(包括分散快取管理) ,以及確保系統可靠度的設計原則與
  5. Hence an algorithm for the minimal polynomial of a block circulant matrix over the field is presented

    ) bner基,從而給出了求塊循環矩陣的極小多項
  6. An algorithm for finding the minimal polynomial of a fls r - circulant matrix

    循環矩陣的極小多項
  7. Both common forms of cryptographic algorithms

    加密的兩種常見形
  8. Topics covered include : sorting ; search trees, heaps, and hashing ; divide - and - conquer ; dynamic programming ; amortized analysis ; graph algorithms ; shortest paths ; network flow ; computational geometry ; number - theoretic algorithms ; polynomial and matrix calculations ; caching ; and parallel computing

    課程主題包含了:排序、搜尋樹、堆積及雜湊;各個擊破、動態規劃、攤提分析、圖論、最短路徑、網路流量、計幾何、數論;多項及矩陣的運;快取及平行計
  9. Various numerical method, standard algorithm, using library routines

    數值方、標準、利用現來副程庫之能力。
  10. ( 2 ) in order to validate the rightness of the parameters, hydrogeology parameters is measured, such as discharge, percolation coefficient and hydraulic pressure using the precise instruments and existing formula and arithmetic

    (二)利用各種精密測量儀器進行滲流量、滲透系數、水壓力等水文地質參數的測定,結合已有的公,驗證各種數據的取值合理性。
  11. The sliding mode controller with the line - of - sight ( los ) guidance is adopted for the rudder control to steer the ship in waves with the functions of track keeping and roll reduction, in which the design parameters are optimized from genetic algorithm

    配合los導引的滑動模控制器是以操舵控制的方,使船隻在波浪中的航跡能維持在既定航線並降低橫搖量,而控制器的設計參數是以基因來求得最佳化。
  12. Algorithms for the minimal polynomial and the inverse of a given block symmetric circulant matrix over a group algebra of a finite group over a field are presented. and a method of determining singularity of this block symmetric circulant matrix is given

    ?給出了求域上有限群的群代數上的塊循環矩陣的極小多項,西安電子科技大學博士學位論文:多項代數及其應用奇異性判別及其逆矩陣的求
  13. Chapter 2 describes the modulation and demodulation theory of 64qam, propose the algorithm scheme of the burst mode and analyze the theory knowledge among them

    第二章描述了64qam的調制解調理論,提出了突發模方案,分析了其中的理論知識。
  14. In the speed control system, because of the system ’ s low speed and high precision, incremental pid control algorithm is adopted. in the position control system, a dual mode control algorithm is designed, which can not only guarantee the rapidity in the position control, but also realize the small overshoot accurate positioning

    在控制系統的設計中,針對本系統轉速低、精度高的特點,在速率控制系統中,採用增量pid;在位置控制系統中,設計了雙模控制器,以保證系統定位過程的快速性和小超調精確定位。
  15. 27 he s, zhang b. solving sat by algorithm transform of wu s method

    基於這一方,我們給出了自動證明關于無窮數列恆等
  16. Cryptographic hash functions can be used as drop - in replacements for old style checksum algorithms

    密碼雜湊函數可以用做老校驗和的隨便替代物。
  17. This evaluation problem is formulated as a multi - attribute decision - making model in a fuzzy environment and solved by a fusion method based on the meowa operators

    首先,將製造彈性評估問題建構為一個模糊環境下多屬性決策模,並提出一種運用meowa運運元的語意融合于評估製造彈性。
  18. Basing on the thorough research and analysis of several essential technologies, we have implemented identity authentication, illegal link, network security aduit and anti - virus detection etc. we used digital certificate to accomplish identity authentication which was based on the study and analyzing of all kinds of authentication. in regard to network security audit, we mainly researched on the distributed model of network security audit and the audit strategy of the rule library. in view of the traditional rule library ’ s flaws, with the formalizing description of audit rule, we proposed a dynamic security audit strategy model which was based on the nature deduction system

    在研究並分析各種認證技術的基礎上,採用基於數字證書的認證方,實現用戶上網資格審查;針對網路安全審計,重點研究了網路安全審計分散模型以及基於規則庫的審計策略,並針對傳統審計規則庫的缺陷,通過對審計規則進行形化描述,提出了一種基於自然繹系統架構的動態安全審計策略模型dsasm ( dynamicsecurityauditstrategymodel ) ,並詳細論述了該模型的定義和推;通過深入研究非外聯的關鍵技術和檢測模型,提出了基於路由表查找的c / s架構的非外聯檢測模型;針對病毒檢測,提出了基於主機的防病毒檢測思想,在客戶端進行病毒防護。
  19. Moreover, it can be easily realized through fpga and operated in the requirement of real - time control cases

    欲實現小腦模控制,其最可行的辦即是植入人類最豐富的經驗知識。
  20. At last this dissertation give an example, the intelligent inquire system of tour, and compare the efficiency of general cbr system and the new cbr learning system. then summarize the features of this new cbr method and draw a conclusion that this method is a feasible and efficient method to resolve the problems faced by multi - user cbr systems

    然後本論文通過一個具體的cbr系統實例,即智能旅遊查詢系統,對比了雙向cbr與其他cbr的效果,總結了此的特點,認為此對于多用戶類型的智能自學習系統不失為一種實用的解決方案。
分享友人