d-algorithm 中文意思是什麼

d-algorithm 解釋
d演算法
  1. The procedure functions in the compare between partial image of dynamic collection and corresponding image of the airscape. in chapter 5, basing on the analysis of correlative theory of digital image, we introduce the improved fasted - down algorithm and simulative anneal algorithm, which applies to nn calculation, an d bring forward the unique and effective means, correlative original value evaluation. basing on the combination of correlative arithmetic, a stable, high - speed and exact correlative arithmetic is formed, which makes it possible to apply computer vision detection of single - needle quilting in industrial production

    本文展開研究並取得一定成效:構建了基於pci總線的微機實時圖像採集系統;在採集的布料總圖(鳥瞰圖)的基礎上,通過數字圖像的數字濾波、圖像增強、邊緣檢測等處理,提取布料圖像的邊緣,對輪廓的矢量化的象素點進行搜索,得到相應的圖案矢量圖,從而確定絎縫的加工軌跡,生成加工指令;在進給加工過程中,主計算機對動態局部圖像與總圖(鳥瞰圖)的對應部分進行圖像相關的匹配計算,應用數字圖像理論,結合神經網路計算的改進最速下降法和模擬退火演算法,提出獨特而有效的相關迭代初始值賦值方法,形成穩定、高速和準確的相關運算,實現單針絎縫視覺測量和自動控制。
  2. Between 1000 b. c. and 1000 a. d. various treatises on mathematics were authored by indian mathematicians in which were set forth for the first time, the concept of zero, the techniques of algebra and algorithm, square root and cube root

    在公元前1000年至公元1000年之間,由印度數學家所寫的各種數學論文首次闡明了出來,零的概念,代數和運演算法則的技巧,平方根與立方根都闡明了出來。
  3. The package of software contains the pid algorithm realizing for the dsp control system, the program for system initialization as well as the program for a / d and d / a transforming

    對控制系統進行了軟體設計。軟體包括控制系統pid演算法的dsp實現、系統初始化以及a d 、 d a轉換程序。
  4. The first kind of algorithm is based on s - box controlled by key, the algorithm distinguishes most of other block ciphers, its visible quality is that its s - box is not regular and fixative, but controlled by block cipher ' s key. the second kind of algorithm is based on smn ( d ) array code, it makes full use of the visible quality of smn ( d ) array code possessing big code distance ( d ). the thesis discusses the two algorithms " reversibility, security and their qualities, the

    第一種是基於「 s -盒由密鑰控制」的變結構分組密碼,該演算法區別于其它大部分分組密碼最大的特點是它的s -盒不是固定不變的而是由密鑰控制產生;第二種是基於smn ( d )陣列編碼的變結構分組密碼,該演算法充分利用了smn ( d )陣列編碼具有碼距大的特點;文中對這兩個演算法的可逆性、安全性及其性能等進行了探討和分析,分析結果認為這兩個變結構演算法正確、有效且安全。
  5. The new line against polygon window clipping algorithm which makes full use of two judgement conditions to confirm noneffective intersections between the lines and the polygon edges can only calculate the effective intersections and increases the efficiency of the clipping. third, a new 3 - d clipping algorithm of line against spherical surface window is introduced for the first time

    一般多邊形窗口線裁剪的改進演算法充分利用確定被裁線段與多邊形邊無交的兩個判斷條件,對完全不可見線段以及與被裁線段無有效交點的多邊形邊進行了排除,只有當線段與多邊形邊有有效交點時才求交,避免了不必要的求交,提高了演算法效率。
  6. In the hardware design, the paper completes modules ’ design like outside memory, patulous a / d, patulous d / a, rs232 communication, ecan communication, led control, keyboard control, distant control, emulation, reset, logic voltage switch, dsp supply power regulate and ac - dc power circuit, as well as room layout design like anterior panel, back panel etc. and dsp transfers data with peripheral equipments except outside memory using serial ports. besides, the whole circuit is configured in interrupt response. thus, it can meet system demand as well as take full advantage of tms320f2812 ’ s hardware resource. in the software design, the paper finishs programs like the interface programms intercommunicates with people, the distant control program, ad and da modules ’ control program, in addition, the paper select the velocity and acceleration state - feedback algorithm and is written in the program. the software design uses dsp integrate exploiting environment named ccs2. 2 of ti inc. as software instrument, and programs with the combination of c language and assembly language. moreover, in order to maintenance or modify the software expediently and shorten software ’ s exploitation time, the design adopt software modularization technique. finally, some air cylinder experiments are carried out to proved that the pneumatic controller is very practical

    在硬體設計中,本文完成了片外存儲器擴展、 a / d擴展、 d / a擴展、 rs232通信介面、 ecan通信總線介面、液晶顯示控制、鍵盤控制、遠程控制、模擬、復位、邏輯電平轉換、 dsp工作電源校正電路和ac - dc電源等模塊設計以及控制器前面板、後面板等的空間布局設計。其中dsp與除外部存儲器的外圍設備之間的數據傳送全部採用串口通信,同時系統電路配置成中斷響應方式,這樣既滿足了系統要求,又充分利用了tms320f2812的硬體資源。在軟體設計中,本文完成了人機界面功能模塊、遠程控制模塊、 ad擴展模塊、 da擴展模塊、速度和加速度狀態反饋的控制演算法的程序設計。
  7. Finite - element algorithm for skin friction calculation on 3 - d body surface

    三維物體表面摩阻的有限元演算法
  8. At present, the typic harmful current detection methods are the fast fourier transform algorithm in frequency domain and methods based on the instantaneous reactive power theory, these methods all require some transform and quick, real - time calculating, so high precision analog multipliers or high speed dsp chip with fast a / d are needed, this results in complex circuit and high cost , which have restricted the development of apf

    目前畸變電流檢測常用的方法有頻域法的fft和基於瞬時無功理論的畸變電流檢測法。這些方法均有一定的變換,需要快速、實時運算,因此必須使用高速的數字微處理器和高性能a / d轉換器,這必將大大提高系統成本,使得電路結構復雜,在一定程度上限制了有源濾波器的發展。
  9. During the procedure of system design and implementation, the author has made some innovative efforts such as : ( d establishing the user interest orientated model, the model receiving user interests continuously and conjecturing user interests by interaction with the user, accumulating user preferences in information demand, thereby achieving self - adaptive retrieval, ? roviding a feedback method which is based on the human - machine interaction, summarizing the user operations on the interface of result presentation, and designing an algorithm for capturing user operation behaviors, by which the changes in user interests and preferences can be learned potentially, ? ffering a method for user interest mining which can extract subjects of information confirmed by user, thereby conjecturing or predicting different kinds of expressions of the same interest or extracting the new interests or unexpressed interests, ? roposing a solution of personalized internet information retrieval based on the user interests in accordance with the above - mentioned work, the solution having very strong feasibility and practicality with taking user interest model as center, employing machine learning ( active learning and passive learning ) and data mining as tools, and being assisted with network robot,

    Piirs系統分析與設計過程中所做的創新性的嘗試主要有以下幾個方面:實現了基於用戶興趣的用戶模型,該模型通過與用戶的交互(主動交互和被動交互) ,不斷地接收用戶的興趣和推測用戶的興趣,積累用戶信息需求的偏好,實現自適應的檢索;提供了一種基於人機交互的反饋方法,對用戶在結果呈現界面上的操作進行了歸納總結,設計了用戶操作捕獲演算法, 「隱性地」學習用戶興趣和偏好的變化;提供了一種用戶需求挖掘的方法,對用戶已確定的信息做進一步的主題挖掘,由此推測或預測用戶同一興趣的不同表述方式或者挖掘出用戶新的或未表達出來的興趣;在上述工作基礎上提出了一套完整的基於用戶興趣的個性化網路信息檢索的解決方案,該方案以用戶興趣模型為中心,以機器學習(主動學習和被動學習)和數據挖掘為手段,輔以網路機器人,具有很強的可行性和實用性。
  10. Based on the ls alg orithm, the mobile packet routing is implemented using the propagation mode of d bf algorithm and the global routing topology table ( rtt )

    基於鏈路-狀態演算法,採用距離-矢量演算法的傳播方法和全局的路由拓撲表,實現了移動分組無線網的抗毀式路由協議。
  11. The problem discussed in this paper is to separate two ( or more ) input signals from observed signals which are generated by passing input signals through diffrent unknown multi - input multi - output linear systems. it is proved that the input signals can be separated when they are independent identitically distributed ( i. i. d ) signals. a new algorithm for multi - input multi - output blind deconvolution via maximum entropy is presented which needs no information about the input signals and mixing filters

    本文研究的問題是從觀察信號中分離出兩個(或者更多個)輸入信號,其中每一組信號分別通過不同的未知多輸入多輸出線性系統.本文證明了當輸入信號是兩兩相互獨立的獨立同分佈信號時可以分離出輸入信號,並導出了基於最大熵的多輸入多輸出盲解卷新演算法.這個演算法不需要任何關于輸入信號和混合濾波器的先驗知識
  12. In hardware designing, the feasibility to use a / d acquisition board, signal conditioning board and the relay output board which are more professional at present to construct the hardware of the computer control system was explored, the algorithm pid was used to advance the respond to error and stability of the whole system, through selecting proper a / d, d / a, di / do board cards, a special computer control system was constructed. in software designing, the language borland c + + was

    在硬體設計上,探索採用目前較為專業化的a / d轉換卡、信號調理板和繼電器輸出板構成計算機控制系統硬體結構的可行性,並採用pid控制以提高系統對誤差的響應和整個系統的穩定性,通過選用適當的a / d 、 d / a 、 di / do等板卡,構成一個很有特色的計算機控制系統。
  13. Therefore, the basic principle of k - m - d algorithm was presented and described. second, the system framework of the business analysis system of china unicom was described

    然後,介紹了黑龍江聯通經營分析系統的整體系統架構,在該系統架構之內,基於經營分析系統的數據倉庫,設計實現了客戶細分系統。
  14. In this paper, the main problem is to detect the position and velocity of moving target by fractional fourier transform which could be concluded by three parts, the echo model establishment of moving target, the realization of fractional fourier transform and parameters estimation of moving target, detailed contents are as follows. firstly, the paper analyses the echo model of sar static target and introduces a kind of sar imaging algorithm, range - doppler ( r - d ) algorithm

    本文的主要內容包括三個部分,即動目標回波模型建立、分數階傅立葉變換的實現和動目標參數估計,具體來說,其內容如下:首先,本文研究分析了合成孔徑雷達靜止點目標的回波模型並介紹了一種基本的合成孔徑雷達成像演算法? ?距離-多普勒( r - d )演算法。
  15. Then we image in the modified r - d algorithm, the result of images will be compared

    在此基礎上,我們採用修正的r - d演算法進行成像,對比分析前後兩次成像效果。
  16. In the end, we analyze the advantage and the disadvantage of r - d algorithm and explain the possible future work

    最後我們分析了r - d成像演算法的優缺點,並根據研究中發現的有待改進的方面提出自己看法。
  17. In chapter 3, the real time data is imaged in the r - d algorithm. at first, we compress the signal in range and azimuth direction respectively, at the time of the processing ; we will deal with rcmc in r - d domain

    第三章研究實測數據的r - d演算法成像,我們對實測數據進行距離向和方位向的壓縮,並且在r - d域進行距離徙動校正( rcmc ) ,從而實現成像。
  18. This particle gives out some detection method, mainly about creation algorithm of detection vector and checking up the fault - cover rate of detection vector by the way of fault simulation. creation algorithm of detection vector contains : pseudo - exhaustive testing, d algorithm, fault dictionary algorithm

    本文針對電子線路在使用過程中發生的故障,提出了幾種測試方法,主要講述測試向量的生成演算法及使用故障模擬的方法來檢測測試矢量在故障檢測過程中的故障覆蓋程度。
  19. Based on the above, the paper analyses the echo model of sar moving target and the impact that caused by the velocity of moving target in sar image with imaging theory. then the paper gives the intensity image of the real part of the echo for both static and moving targets, and the paper gives their imaging picture generated by r - d algorithm as well

    在此基礎上,本文推導出了運動點目標的回波模型,並結合成像原理分析了運動目標速度對sar圖像的影響,最後給出了靜、動目標回波的實部灰度圖及其r - d演算法成像圖,並進行了分析和比較。
  20. This dissertation simulates sar point target imaging with range - doppler ( r - d ) algorithm based on analyzing sar imaging theories and algorithms. based that, we analyze the technology of sar active jamming and the methods of jamming effectiveness evaluation, research suppression jamming and deception jamming systemically. and we simulate several jamming modalities of suppression jamming and deception jamming, which proves its validity and correctness. we then use three different methods to evaluate the jamming effectiveness, analyze the result of the simulation

    本文在對sar的工作原理及其典型成像演算法分析研究的基礎上,對sar的點目標成像進行了距離-多普勒演算法模擬;在此基礎上,詳細分析了sar的有源干擾技術及干擾效能評估方法,系統的研究了壓制式干擾和欺騙式干擾,實現了多種干擾樣式壓制式干擾和點目標欺騙式干擾的模擬,證明了其有效性和正確性,得出了結論;用多種不同的干擾效能評估方法對壓制式干擾模擬進行了干擾效能評估,分析了所得結果。
分享友人