法里數列 的英文怎麼說

中文拼音 [shǔliè]
法里數列 英文
farey sequence
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  • : 里Ⅰ名詞1 (襯料; 紡織品的反面) lining; liner; inside 2 (里邊; 里邊的) inner 3 (街坊) neighbo...
  • : 數副詞(屢次) frequently; repeatedly
  • : Ⅰ動1 (排列) arrange; form a line; line up 2 (安排到某類事物之中) list; enter in a list Ⅱ名詞1...
  • 數列 : progression; series; a series of numbers arranged according to a certain rule
  1. The mathematic model of antenna is used in digital tv system network layout and simulation. the disquisition educes the mathematic model of omnidirectional multilayer tv antenna

    摘要這利用電磁場理論和計算機輔助分析的方導出電視工程常用的全向多層振元電視系天線的學模型,並應用於地面字電視的單頻網組網實踐。
  2. Secondly, some encryption algorithms are introduced, with the analysis and comparison for these encryption algorithms, the author designs an appropriate project to accomplish the end - to - end encryption. thirdly, this paper accomplish the design of an encryption scheme which combining the strongpoint of the rsa algorithm and the idea algorithm. the main process is as following : first, input the digital signal to the encryption device, and then the digital signal exclusive or with the keying sequence which is generated by key stream generator ( ksg ) and the ksg is based on the idea encrypting and deciphering algorithm, the secret key synchronization is also studied

    本課題主要研究的內容是字集群通信系統加密機制的研究,首先介紹了字集群通信系統的安全保密機制,講述了單向和雙向鑒權的過程、單呼和群呼的空中介面加密過程及其密鑰的選用和管理,特別介紹了端到端加密;然後介紹了幾種常用的加密演算,通過分析其優劣,提出了端到端加密的解決方案;最後完成了基於rsa演算和idea演算字集群通信系統加密方案的設計,其具體過程為將經過字信號送入加密器,和以idea加密演算為基礎設計的密碼流發生器( ksg )產生的密碼序進行加解密運算,並且研究了此加密過程的密碼同步問題。
  3. In this paper, we study and analysis the base distribution in human dna sequences. on the basis of the distribution sphere whose radius equal to 1 / 4 by zhang et al. expounded, with the method of plane mapping figure studying 6000 human dna sequences, and according to the figure of sierpinski gasket ' s patch and the brillouin zones of the face - centered cube, we obtain two new distribution figures, one is the frustum - octahedron, another is the regular - octahedron

    我們在zhangetal .提出的人類dna序的堿基分佈為半徑是1 / 4球分佈的基礎上,用平面投影圖的方研究和分析了6000組人類dna序據,並且根據塞爾賓斯基鋪墊的補形和面心立方的布淵區圖形提出了兩種新的分布圖,一種是正八面體,另一種是截角八面體(十四面體) 。
  4. The sequence and activity characteristics of shuikou reservoir induced earthquake are analyzed with several methods, such as probabilistic evaluation, comprehensive effect parameter e evaluation, two - step comprehensive fuzzy evaluation, the maximum magnitude of historical earthquakes evaluation, etc. the results show that the shuikou m ( subscript l ) 4. 1 earthquake on april 21, 1996 is a main - earthquake, and from now on, the possibility occuring m ( subscript l ) > 3 induced earthquake in shuikou reservoir area is low

    摘要應用概率、綜合影響參預測、兩級模糊評判、古登堡克特公式外推預測等對水口水庫誘發地震序以及活動特徵進行了研究,認為: 1996年4月21日發生的m (下標l ) 4 . 1地震為水口水庫誘發地震主震,今後庫區發生大於3級以上誘發地震的可能性較小。
  5. The experiment demonstrates that the simulated calculations are in good agreement with experimental results. the conception and algorithm simulation of lattice digital filter in electronics are transplanted into optical filter, with a novice algorithm to resolve optical lattice array concrete parameter

    3 .將成熟的電子學的格型字濾波器的概念和設計演算移植到光學濾波器,給出了根據目標濾波傳遞函求解光格型陣具體參的演算
  6. The author mainly realized the method of generating the large random numbers and judging the prime number using lehmann means, then three pairs of secure key with different lengths ( 256 bits, 512 bits, 1024 bits ) was generated to meet the demand of different security grade. in encryption module, modular multiplication arithmetic of large number was realized adopting addition chaining. in decryption module, extended euclid was used to get inverse, and the chinese remainder theorem was used to realize decryption, which increased the speed of decryption greatly

    作者主要實現了大隨機的生成、採用整除小素和勒曼測試判定素,可以生成三種不同長度的密鑰對( 256位、 512位、 1024位)來滿足不同的加密安全等級的需求;加密模塊中,選用了二進制序的乘,實現了大模冪乘運算;解密模塊中,引用了擴展的歐幾求逆元,並採用中國剩餘定理實現解密過程,大大提高了解密速度。
  7. The main content includes : in assembling analysis, three - line - one - row matrixes are obtained by getting the length, width and height of packing cases. any given packing cases are assembled by using pedigree assembling analysis, thus, we can obtain the number of the sorts and the length, width and height of each sort ; in loading a container, the input is any four kinds of them that are just sorted. the chanced packing cases are loaded by using tier up tier principle, side method and recursive method so that we can obtain higher space occupation ; in diagrammatic representation, the result of loading a container is shown in the screen by using simple one - dimension and tow - dimension diagrams

    本文圍繞這一主題進行了深入的理論和實踐研究,具體內容有:在聚類分析中,利用譜系聚類分析原理,提取包裝箱的長寬高作為三行一矩陣,對給定的任意尺寸的包裝箱進行聚類分析,聚類后,得到聚類的個和各類的長寬高;在方案生成中,選取了聚類后其中的任意四種作為方案生成的輸入,利用層疊原理,邊際方,遞歸原理對選取的包裝箱進行裝箱,以達到佔有率較高的目的;在圖形顯示,對方案生成結果作了一個簡單的一維和二維的示意圖。
  8. Once a respected mental health facility. cunningham hall, is run by the stern dr. franks lance henriksen

    Cunning hall是一所陰深恐怖的神經病院,由嚴苛的蘭博士蘭斯軒克辛飾苦心經營,無精神病患者入住這
  9. It comes up with a new notion, d - solution, which is applied to the distance estimation, by virtue of hilbert space ; furthermore, the dissertation has gained a necessary condition which is identity of minimum mean - square value in linear function classes, so that d - solution extends minimum mean - square value within the domain of nonlinear function equation or equation system ; and, the dissertation studies in detail the classical moment estimation and maximal likelihood estimation on the parameters of ar ( p ), a series of theorems in the estimation section shows the moment estimators are consistent on the ground of large samples jikewise, those distribution functions of the estimated parameters accord to maximum likelihood estimation converge gauss distribution if the white noise is gaussan

    首先,藉助hilbert空間理論,提出了距離估計的d -解,給出了d -解的必要條件,這個條件在線性函即是極小二乘估計, d -解的必要條件滿足的方程實質上將極小二乘估計推廣到多函及非線性函類。再而,詳細地研究了多元弱平穩序自回歸模型ar ( p )的參經典的矩的替代估計和極大似然估計,獲得矩的替代估計的一致性的結果。對基於gauss白噪聲假設多元弱平穩序自回歸模型的均值、白噪聲的協方差陣的極大似然估計都有依分佈收斂到多元正態分佈的統計性質。
  10. 5. the 3d reconstruction algorithm with constrained triangulation has been tested on both simulate data and real images with satisfactory results. the long image sequence is taken from 360 degrees around the target

    採用帶邊緣約束的三角剖分演算,對模擬據和存在遮擋的真實圖像序進行三維重建,這的長圖像序是圍繞目標物體一周拍攝得到的。
  11. Through the analysis on the process of hydrological time - series data mining, we can find that there are many similar parts in this process in spite of the complex composition of business logic application. therefore, the process of time series comparability search is composed of three continuous phases, such as data pretreatment, characteristic mode mining and comparability measurement. there are a lot of different algorithms performing same function in every data mining phase

    經過對水文時間序據挖掘過程的分析,可以得到,雖然其中的業務邏輯構成比較復雜,但其基本成份卻有許多相同或相似的部分,所以,一般可以將時間序相似性搜索的過程分為據預處理、特徵模式挖掘和相似性度量等幾個連續的階段,而每個階段都有許多完成相同功能的基本演算
分享友人