數字運算元 的英文怎麼說

中文拼音 [shǔyùnsuànyuán]
數字運算元 英文
number operator
  • : 數副詞(屢次) frequently; repeatedly
  • : Ⅰ名詞1 (文字) character; word 2 (字音) pronunciation 3 (字體) form of a written or printed ...
  • : Ⅰ動詞1 (物體位置不斷變化) move; revolve 2 (搬運; 運輸) carry; transport 3 (運用) use; wield...
  • : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
  • 數字 : 1. (表示數目的文字; 表示數目的符號) figure; digit; numeral; character; numeric character 2. (數量) quantity; amount
  • 運算 : [數學] operation; arithmetic; operating
  1. Introducing the theory and application of boundary element method on the sound radiation, giving the process of solving vibration noise radiation problem using boundary element analysis software ; presenting the coupling theory and the combination analysis of finite element method and boundary element method, and doing relevant analysis based on close drum shell ; programming the noise data simulation program using the numerical calculation software, simulating the acoustic and pressure data of a key point in the transient response acoustic field of the close drum shell, realizing the audibility of the noise, using the virtual reality tools to simulate the vibration noise of the drum shell ; combining the finite element method and boundary element method to analyze the vibration noise radiation of some gear box, and completing the whole simulation process of the vibration noise of the gear box

    綜合介紹了邊界法在聲輻射問題上的理論及應用;並給出了用邊界法分析軟體求解振動聲輻射問題的過程。闡述了有限法和邊界法的耦合理論及組合分析方法,並以封閉鼓形薄殼為分析對象進行了相應的分析。利用軟體編制了噪聲據模擬程序,並模擬了通過組合方法分析封閉鼓形薄殼瞬態響應聲場而獲得一關鍵點的聲壓據,實現聲音的可聽化,隨后通過虛擬現實工具實現了該情形下橢球殼振動噪聲的虛擬模擬。
  2. Dsp chip is especially fit for digital signal processing, its main application is realizing all kinds of digital siginal processing arithmetics such as clove hitch 、 correlation 、 all kinds of transforms etc. realizing digital filters with dsp is an important application

    Dsp晶是一種特別適合於進行信號處理的微處理器,其主要應用是實時快速的實現各種信號處理演法,如卷積、相關以及各種變換等。其中,利用dsp來實現濾波器就是很重要的一種應用。
  3. Moreover, aiming at the location of inclined license plate, we have proposed the algorithm based on gray changing characteristic and orientation field. in this section, we discussed in detail the application of mathematical morphology operator in rough locating objective region and introduced the theory and realization method of orientation field. then we used it to detect inclined angel of objective region, finally we can precisely locate and emendate the inclined license plate based on detection result, and so we provided the favorable foundation for segmenting character

    此外針對傾斜車牌區域的定位分割問題,提出了基於灰度變化特性和方向場計的定位演法,其中詳細討論了學形態學在目標區域粗定位中的應用,重點介紹了方向場計理論和實現方法,並將其應用於目標區域傾斜角度的檢測,根據檢測得到的結果進行了傾斜車牌區域的準確定位和校正,為后續的分割打下良好的基礎。
  4. Based on the demand of power department, a full distributed multifuncitional monitoring device is studied. this instrument not only can measure the data of hydroelectric plant, but also integrate the funcition of control the dynamotor, by cooperate with the program of epigynous system, it can realization the auto generate electricity on the hydroelectric plant and ordinal startup - stop of the dynamotor. 2 furthermore, performance of integrated dft arithmetic enhances the acturacy and reliability of measure. by communication several devices can run online to be controlled dispersedly and managed centrally

    本文分析了國內外水電站自動控制裝置的研究和發展狀況,尤其是國內小型水電站的自動化現狀,針對現有電力部門的需求,設計並實現了一種單式的微機自動監控裝置,該裝置不僅實現了對水電站內各種模擬參信號的實時監測功能,還對水輪發電機組進行了調控,通過與上位機處理程序的配合,可以實現水電站的自動發電控制、機組順序啟停;在測量發電機組機端電壓和電流參的時候,採用32點離散傅立葉演法( dft ) ,增加了測量的準確性和可靠性;通過通訊可以實現裝置的聯網行,做到「分散控制、集中管理」 。
  5. Benchmarks among the three contenders are a mixed bag, but all three chips obtain quite similar performance all are remarkably fast, and suitable for intensive number crunching applications

    盡管三個競爭者採用各自不同的基準,但所有這三種晶卻獲得了相差無幾的性能(都很快,適用於對要求較高的應用) 。
  6. The expression language includes a cast operator that supports casting between string, numeric, date, and binary data types

    表達式語言包含支持在串、值、日期和二進制大型對象塊( blob )據類型之間進行轉換的轉換符。
  7. Due to the hardware characteristic ' s limitation, such as the poor speed of a / d, d / a conversion and dsp process, the most part of sr system adopt middle course. that is to say, by using the special digital converter or running relevant arithmetic, it converts the radio signal to intermediate frequency signal and completes the base - band signal process that is n ' t the veriest sr and is named " software defined radio ( sdr ) "

    由於受到硬體性能如a d 、 d a及dsp晶處理速度的限制,目前的軟體無線電系統多採用折中的實現方案,增加專用的變頻器或者變頻演法,將射頻信號變頻到中頻,然後再進行基帶信號處理,這樣的軟體無線電系統又被稱之為「軟體定義無線電」 ,它並不是真正意義上的軟體無線電。
  8. A string of one or more characters used to separate or organize elements of computer programs or data ; for example, parentheses, blank character, arithmetic operator, if, " begin "

    用來分隔或組織計機程序素或素的串。例如括號、空格符、符、 if (如果) 、 「 begin等。
  9. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了橢圓曲線密碼體制的優點及研究現狀;其次研究了橢圓曲線密碼體制的基本理論;第三,分析了橢圓曲線密碼的安全性並介紹了密鑰共享,加密,簽名等橢圓曲線密碼體制;第四,深入研究了特徵為2的有限域f _ 2m中的素在多項式基和最優正規基表示下的乘法和乘法逆的快速演法,並對hankerson等人提出的多項式基下的乘法的快速演法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中素在多項式基和最優正規基表示下的乘法和乘法逆的性能,還對這兩種基表示下的f _ 2m域中效率的優劣作了比較和研究,所得的結論可供在實現橢圓曲線密碼體制時參考;第五,研究了目前流行的計橢圓曲線標量乘法的快速演法,同時改進了固定基點梳形法,提高了整個系統的速度,並在實驗的基礎上分析研究了流行演法的優劣;第六,實現了基於f _ 2m的橢圓曲線密碼體制的演法庫,在我們的演法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線密碼體制;第七,實現了兩條安全橢圓曲線上的橢圓曲線密碼體制,包括ecdh , eces , ecdsa 。
  10. First, the paper introduces the basic knowledge of the image processing technique, emphasizes the image processing method that is used in the measur - ement system, such as edge detection operator, curve fitting algorithm, espe - cially hough change in detail, etc. second, the paper introduces the vc + + 6. 0 program language, analyses its peculiarity and advantage, explains the form of the image in the computer and dib visiting functions

    首先,介紹了圖像處理方法的基礎知識,特別重點講述了在本系統中將會應用到的一些圖像處理方法,如邊緣檢測、曲線擬合演法等等,尤其是對于哈夫變換的方法,進行了詳細闡述。其次,介紹了本系統所應用的編程語言vc + + 6 . 0 ,分析了其特點和優點,並說明了模擬圖像化后,在計機里的存儲格式以及相應的設備無關位圖訪問函
  11. Numeric - symbolic technique is introduced in the procedure of resultant elimination, procedure of number - spobol manipulation is transformed into that of matrix manipulation. because joini variables are treated as symbols and all structure paramcters are treated as real nuxnbers, the complexity of derivation for input - output equaion is reduced. the soluton is verified with a numerical example, its rsults withoot extraneous roots agree with the original equaions

    過程中引入了-符號方法,將結構參處理為值量,將關節變量處理為符號量,將、符號推導過程轉化為了矩陣過程,由於結構參值量的形式出現在方程推導中,降低了符號推導的難度,符號推導不需要復雜的符號處理軟體的支持。
  12. The categories of preprocessing token are : header names, identifiers, preprocessing numbers, character literals, string literals, preprocessing - op - or - punc, and single non - white - space characters that do not lexically match the other preprocessing token categories

    預處理標記有以下幾類:頭名稱,標識符,預處理量,串文量,預處理符或標點,以及不符合以上詞法類型的單個非空白
  13. Input value and return a string or numeric value

    )輸入值執行,然後返回一個串或值。
  14. For example, because of the limit of their cmos chip performances and the capability of their memorizers, this kind of balancing instruments based on singlechip machine are not fit for large digital operations in signal processing, and have difficult in test faint signal of vibration, and their expansibility are not good

    例如單片機類型的動平衡儀器,因其主晶性能和存儲器容量的限制,對于信號處理的大量能力不強,小振動信號的測試性能不佳,系統功能的可擴展性有限。
  15. A novel edge detection operator is presented, which is the simplest operator based on regular convolution kernel. moreover, its error is no more than one pixel in the noise - free case

    提出了最簡邊緣檢測,它精度高,速度快,針對于分塊均勻的圖象具有常規無可比擬的檢測效果。
  16. To study the realizition of the delta operator, we simulated and obtained a series of figures using matlab. from these figrues it can be seen that the delta form has clearly superior numerical properties ralative to the shift form

    對于delta的實現問題,本文通過一個例子用matlab語言進行編程,仿出一系列圖形,通過比較可以得出delta相對于移位有較好的特性。
  17. To solve the problem of watermark encryption, a novel permutation operator is proposed, based on which the permutation scheme and the substitution scheme for watermark encryption are designed ; encryption algorithms in spatial domain and transform domain are proposed. the ciphered image can be jpeg compressed before it is transmitted, and low - distortion plain image can be obtained after decrypting the compressed encryption image

    為解決水印信息加密問題,我們在第三章提出混沌有序化方法,設計了水印信息加密的置亂模塊和替代模塊;還給出了空間域和變換域圖像加密演法,密文圖像可以經過有損壓縮再傳輸,經過解密得到低失真的明文圖像。
  18. And by a monotone integral operator, we give an asymptotic approximation way which is further improving the older ways

    並且使用一個具有單調性的,給出了一種更實用更有效的對破產時刻赤分佈函漸進估計的方法。
  19. A sobel edge operator and an edge detection algorithm based on cp neural network was employed in this thesis, to achieve image processing of target digital images collecting from static explosion test of fragment warhead, and exactly detecting and analyzing of target fragments numbers, and also the ratio of perforation of fragments from the test, through which more accurate tactics performance characters can be obtained for warhead lethality assessment

    本文採用sobel邊緣和一種基於cp神經網路的邊緣檢測方法,對破片戰斗部靜爆試驗后所採集的目標靶板圖像進行了圖像處理,實現了對目標靶板破片量及破片穿透率試驗統計據的準確檢測與分析,為破片戰斗部殺傷威力評估提供了較為精確的技戰術指標。
  20. This paper use techniques of linear windows, differential operator, min operator, fuzzy - mathematics and mathematical morphology to complete the precise orientation of license plate, and use horizontal projection and local - least value techniques to complete the segmented of the characters, and the artificial neural network technology is applied to complete the character recognition

    本文應用線窗口、差分、 min、模糊學、學形態學等技術手段完成了車牌的精確定位,應用水平投影、局部最小值等方法完成了車牌的分割,應用神經網路感知機等技術解決了識別的問題,開發出實用的演法。
分享友人